Professional Documents
Culture Documents
PAGE 1 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
***NOTE: if you select an edition higher than your purchased license edition, you’ll have to
reinstall after the 30 day activation grace period
Click on CUSTOM INSTALL
“Where do you want to install Windows?” click on drive to select
Click on DRIVE OPTIONS (ADVANCED)
IF desired, can create New Partition, Format, Extend, Load Driver…if you choose no
advanced options, Vista automatically creates & formats a partition
Formatting / Partition-creation / etc. is performed
Files are copied to the volume
Features are installed
Reboot
Choose User Name & Password & Picture (account will be a local administrator)
Computer Name
Install Updates?
o Use recommended settings – impt. & recommended updates installed
o Install important updates only – self-explanatory
o Ask Me Later – get a warning you may be vulnerable…
Time & Date settings / auto-adjust for DST
Select your Computer’s Current Location
o Home – peer to peer communication assumed
o Work – assumes active directory/domain
o Public – limited network discovery
Installation Completes
Shows Rating (Windows Experience Index)
VOILA – done!
1.2.2 Dual Booting
- Install XP first, THEN Vista (otherwise you won’t like the results)
- Select the default OS & time for dual boot menu:
Control Panel | System | Advanced Tab| Start Up & Recovery
PAGE 2 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 3 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
On the Do You Have A Windows Easy Transfer Key page, click YES I HAVE A KEY
Enter Windows Easy Transfer Key generated from Vista machine & Click NEXT
Connection is attempted & prompts with What Do You Want To Transfer To Your
New Computer page – click ADVANCED OPTIONS
Select User Accounts, Files, And Settings To Transfer page – use checkboxes to
select & click NEXT
On the account mappings page, create new accounts for each user that is getting
migrated to Windows Vista & Click NEXT
Transfer between computers finishes – DO NOT use either computer during this
process – shows message on the original computer that you’re ready to transfer files
& settings to the new computer
Return to Vista/destination computer – WAIT until a summary is displayed on the
destination computer, indicating the transfer is complete & click on CLOSE
Log off or Restart for changes to take effect
On the XP machine, click CLOSE
WINDOWS EASY TRANSFER DATA MOVING METHODS:
Windows Easy Transfer Cable - USB
- If USB 2.0 on both, up to 1GB/min transfer rate
LAN
Optical Media - CDs, DVDs
Removable Storage - USB HD, etc.
Win NT 4 2000 Pro XP Home XP Pro XP Pro XP Media Windows XP
95/98/ ME Workstation 64-bit Center Tablet PC
Upgrade- NO NO NO YES to any YES to only YES to only YES only to YES to
able to 32-bit Vista 32-bit 64-bit 32-bit 32-bit Business,
Vista? Business, Business, Ultimate & Enterprise, &
Ultimate & Ultimate & Home Ultimate
Enterprise Enterprise Premium
Windows NO NO YES if SP4 YES YES YES YES YES
Easy installed, no
Transfer? settings transfer
User State NO YES but not YES, & transfers YES YES YES YES YES
Migration supported user settings
Available?
PAGE 4 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
- Upgrading – original OS is converted to Vista; data & user settings are retained
- Migrating – user settings & data are moved to a new Vista installation
- Side-by-Side Migration – migrate files from one computer to another
- Wipe-and-Load Migration – migrate data off; perform clean install; migrate data back
- Must have AT LEAST 11 GB free to upgrade from XP to Vista
VALID UPGRADE PATHS
XP Home Any Vista “flavor”
XP Pro Business / Ultimate
XP Tablet Business / Ultimate
Media Center Home Premium / Ultimate
VALID VISTA-TO-VISTA UPGRADE PATHS
Vista Home Basic Home Premium / Ultimate
Vista Home Ultimate
Premium
Vista Business Enterprise / Ultimate
Vista Enterprise Ultimate
PAGE 5 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 6 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 7 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 8 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 9 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
- Screen Saver
o No real need for them to protect screen, but can help with security…
o Can set to lock when goes into screen saver; need to enter password to unlock –
on resume, displays log on screen
PAGE 10 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
- Add-on for IE is installed during WGA Process, which collects following info:
o Computer make & model
o OS version & any existing WGA software
o Region & language settings
o Unique WGA identifier created by add-on component
o Encrypted version of Product Key & Product ID
o BIOS info (name, revision number, revision date)
o Encrypted primary HD volume serial number
o DOES NOT collect personal info!!
- Once go through WGA Process, can download any Microsoft update from all categories:
o Critical – should be installed immediately; vulnerabilities that could be exploited
o Important – should be installed ASAP; no apparent exploits yet that take
advantage of the vulnerability associated with the update
o Moderate – fix usability problems, generally not security exploit related
- WGA is an ONGOING PROCESS – each time visit Update site, have to go through WGA!
PAGE 11 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Click GAMES in the User Control dialog box | Click SET GAME RATINGS
Block/Allow games with no rating
Select ratings which are OK for user to play
• Early Childhood
• Everyone
• Everyone 10+
• Teen…
Scroll down to see the Block These Types of Content list
• Can block all & then just allow “Some Adult Assistance May Be Needed”
OK to exit Game Restrictions
In Game Controls dialog box, click BLOCK OR ALLOW SPECIFIC GAMES
For each game in the Game Overrides dialog box, select from:
• User Rating Setting
• Always Allow
• Always Block
OK to exit Game Overrides, OK to exit Game Controls
In User Controls, click ALLOW AND BLOCK SPECIFIC PROGRAMS
In Application Restrictions dialog box, select from
• User can use all programs – OR –
• User can only us the programs I allow
OK to close Applications Restrictions
OK to close User Controls
Close Parental Controls
2.5.2 Content Advisor
- Supervisor password is supplied/activated when configure Content Advisor – if enter the
password, can view web content that is being blocked
- To Configure Content Advisor (NOTE: settings apply per machine NOT per user):
Internet Explorer | TOOLS button | Internet Options |
Click Content tab
Under Content Advisor, click ENABLE & click Continue in UAC
Click General Tab – make sure “Supervisor Can Type A Password To Allow Users to
View Restricted Content” is selected
Click CREATE PASSWORD – Enter password & confirm & OK
OK to close the Content Advisor message box & Click APPLY
Click the Ratings tab – automatically set with least likely to offend settings & blocks
unrated content as well…
Set access level (None, Limited, Unrestricted) for various categories
Click Apply & Click OK to close Content Advisor & save settings
Click OK on any message boxes that pop up & OK to close out of Internet Options
2.5.3 Setting Up Users & Configuring System Access
Administrator Can make changes affecting other users
Accounts (i.e., change security settings, install hardware & software, access all files)
*NOTE: built-in administrator account also exists, but disabled by default,
as it’s not protected by UAC & no security prompts whatsoever!!
Standard Cannot make changes that may affect other users or computer security
Accounts without entry of administrator account credentials
Can’t install/uninstall software & hardware, change settings affecting other
users (outside of some display settings, that is…)
Guest Accounts Can use computer without access to other users’ personal files
Can’t install software or hardware, change settings, or create password
Disabled by default & should LEAVE DISABLED
PAGE 12 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 13 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
background while user is online. Push system. Checks for new content & regularly
downloads updates.
- Pull system – user receives email that feed is updated & then can go online to
download updates for later reading.
- Clouds – web service that notifies aggregator of feed updates & eliminates need for
periodic polling; should use bandwidth more efficiently.
2.6.3 Configuring Print & Viewing Controls
- Print Preview
Page Setup – print vertically (portrait)
Page Setup – print horizontally (landscape)
Change paper size, orientation, margins; specify headers or footers
Turn specified headers or footers on/off
Stretch/shrink page size to fill printed page (replaces zoom in previous IE’s)
Adjust margins by dragging horizontal or vertical markers
Print webpage
- Print Preview-specific controls (only affect view, not printing)
View Full Width / Full Page
Show Multiple Pages
Specify The Page To Display
Display The First / Previous / Next / Last Page
- Specifying Headers & Footers
Print Preview / Page Setup –user can change or turn off a website’s
header/footer
To Print This: Type This:
Window Title &w
Page address (URL) &u
Date in short format &d
Date in Long Format &D
Time &t
Time in 24-hour format &T
Current page number &p
Total number of pages &P
Right-aligned text &b <text to right align>
Centered text &b <text to center> &b
A single ampersand (&) &&
- Troubleshoot Print Preview Issues
Check the Stretch/Shrink The Page Size to Fill The Printed Page default
Margins dragged out of whack?
2.6.4 Configuring IE7+ Search Bar & Search Providers
* Type keyword/phrase into Search bar & press ALT+ENTER to open in new tab!
- Click arrow to right of Search Bar & select FIND MORE PROVIDERS to add/change
- To add a search provider to IE7+ beyond the current browsing session
type TEST into the website’s search box on that page & copy the resulting URL
Click arrow to right of Search bar
Select Find More Providers
Add Search Providers To Internet Explorer 7
Paste the copied URL into the Create Your Own section
Name the search provider
Click on INSTALL
PAGE 14 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 15 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
You can choose to send info about your settings to Microsoft (yes/no) & NEXT
Click FINISH to close the wizard.
- UAC facts:
If an admin tries to execute an application that’s NOT digitally signed or
validated, a UAC “an unidentified program wants to access your computer –
Cancel or Allow” window appears
If application that IS digitally signed, a simple Continue/Cancel window shows
(or standard users are prompted for credentials)
Secure Desktop – when a UAC window appears, Vista takes screenshot of
desktop & switches to Secure Desktop…you can’t do anything outside of the UAC
dialog box
3.1.1 Backward Compatibility
- Program Compatibility Assistant – feature of Vista that runs automatically if detects
compatibility problem when a legacy program is run
- Program Compatibility Wizard – has to be run manually on a program if compatibility
issues are noticed; usually run if the Program Compatibility Assistant doesn’t fix the
issue; NOT to be run for Antivirus programs, Backup programs, Disk utilities, or other
system programs
- Drivers – sometimes compatibility issues are due to drivers – update drivers, or roll back
- NOTE: Vista locks down registry & file system – UAC provides registry & file system
virtualization services that silently redirect read & write operations from protected
portions of the registry & file system to unprotected locations in the user’s profile.
3.1.2 Running User Accounts as Standard Users
- Standard users can perform most (but not all) administrator tasks by entering
administrator credentials when prompted
- Windows Vista Admin Approval Mode – both administrator & standard user accounts run
by default as standard users
3.1.3 Elevating User Privileges
- Standard users supply admin credentials (password of an admin account; when task is
completed, user returns to normal standard user status
- The built-in Guest account is a member of the Guests group – turned OFF by default;
when turned on, cannot perform administrator tasks.
- Administrator accounts belong to Administrators and Users groups – run as standard
users except when performing administrator tasks
- Standard accounts are members of the Users groups; run as standard users
- Built-in Administrator account is member of ONLY the Administrators group – does not
run as standard user account & ALWAYS has elevated privileges; does NOT prompt for
approval to run an administrator task
3.1.4 Using Local Security Policies to Configure User Account Control
IF PC is not part of Active Directory & is a stand-alone or workgroup computer,
can use Local Security Policy console to configure UAC.
Access via:
RUN | GPEDIT.MSC | CONTINUE | expand Computer Configuration | expand
Windows Settings | expand SECURITY SETTINGS | expand LOCAL POLICIES | click
SECURITY OPTIONS
-OR- ADMINISTRATIVE TOOLS | LOCAL SECURITY POLICY | LOCAL | SECURITY |
- Admin Approval Mode for Built-in Administrator Account
Default is DISABLED – can run all apps by default
If ENABLED, user logs on in Admin Approval mode, which prompts for consent
- Behavior of Elevation Prompt for Administrators in Admin Approval Mode
Prompt For Consent (default) – prompts user to Continue or Cancel
PAGE 16 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 17 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Does the user’s group have sufficient privileges? Are they member of
Administrators group?
- Check Software Status
If UAC set to only allow signed/validated executables & the exe is UNsigned…
- Check the UAC Settings
UAC is configured on a PER-COMPUTER BASIS – user experience will vary from
PC to PC
Actions Available When Alerted that Software is Attempting to Change Important Windows Settings:
Permit Always allow software to change security-related settings
Deny Prevents software from changing security-related settings
- To Configure real-time protection:
Control Panel | Programs | Windows Defender | Tools | Options
Control Panel | Security | Windows Defender | Tools | Options
Can choose software & settings you want Windows Defender to monitor BUT
Microsoft highly recommends you use all of the real time protection options or
AGENTS
Real-Time Protection Purpose
Agent
Auto Start Monitors programs allowed to automatically run when computer is started
System Configuration Monitors security-related Windows settings
(Settings)
PAGE 18 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Internet Explorer Add- Monitors programs that automatically run when IE7+ is started
ons
Internet Explorer Manages browser security settings
Configuration
(Settings)
Internet Explorer Monitors files & programs designed to work with IE7+, i.e. ActiveX
Downloads controls & installers
Services & Drivers Monitors services & drivers, which may have access to important routings
in the OS
Application Execution Monitors when programs start & operations they make while running
Application Monitors tools & files in the OS
Registration
Windows Add-ons Monitors add-on programs, i.e. software utilities for security, browsing,
productivity, multimedia, etc.
SpyNet – if join, Windows Defender automatically sends info to Microsoft about
spyware, potentially unwanted software, & software not yet analyzed for risks &
what actions you perform on them & shares this info with the community to
better understand the program/software and update their ratings for it
3.2.2 Internet Explorer Integration
- Integrates with IE7+ to scan files when downloaded; can block suspicious downloaded
files when user tries to execute them
- Defender also integrates with SpyNet & with Windows Live OneCare (subscription)
Windows Live One Care:
Automatically optimizes PC
Regularly backs up files & settings
Virus & spyware scanners
Managed 2-way firewall
Regularly defrags
Manages security updates
Runs continuously in background
Can also run/scan on demand
3.2.3 Configuring Custom Scans
- Windows Defender | click Arrow next to SCAN button | click CUSTOM SCAN | SCAN
SELECTED DRIVES AND FOLDERS | click SELECT | OK | SCAN NOW
- Choosing Advanced Scanning Options
Windows Defender | TOOLS | OPTIONS | ADVANCED OPTIONS
Available Advanced Options:
Scan The Contents Of Archived Files And Increases scan-time, but spyware can install
Folders For Potential Threats itself in these locations too
Use Heuristics To Detect Potentially Harmful Uses Heuristics (educated guesses based on
Or Unwanted Behavior By Software That Has behavior patterns) to alert about software
Not Been Analyzed For Risks not yet listed in a definition file
Create A Restore Point Before Applying Can restore system settings if you
Actions To Detected Items accidentally remove software you wanted to
keep (or if Defender auto-removes it)
Do Not Scan These Files Or Locations Specify files/folders you don’t want Defender
to scan
- Configuring Administrator Options
Located below the Advanced Scanning Options in Windows Defender Options
PAGE 19 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
If Select the USE WINDOWS DEFENDER check box, all users are alerted (if
Windows Defender is on) when spyware/potentially harmful software tries to
install/run on the computer…BUT…if ONLY this option is selected, elevated
privileges are required to configure Windows Defender & determine when scans
occur
If you also select the ALLOW EVERYONE TO USE WINDOWS DEFENDER check box,
allows all users to scan, configure, and review Defender activities
- Scheduling Windows Defender Scans
Windows Defender | TOOLS | OPTIONS
Can’t schedule custom scans, but can schedule Quick Scans or Full System Scans
Recommended to do a daily quick scan
Based on alert level, can select to:
• Automatically remove spyware & other potentially harmful software if
detected during a scan
• Ignore items
• Perform a default action that Windows Defender determines based on the
definition of the software detected
CANNOT select a default action for severe alert ratings because Defender
automatically removes it.
3.2.4 Working With Windows Defender Definitions
- Controlling Definition Downloads
All Programs | Windows Updates | Change Settings | (settings apply to ALL
updates, not just Defender definition files) | Recommended Updates | Checkbox
for: Include Recommended Updates When Downloading, Installing, or Notifying
Me About Updates
To check for new spyware definitions before performing scheduled scans:
Windows Defender | TOOLS | OPTIONS | scroll to AUTOMATIC SCANNING | make
sure checkbox is checked for CHECK FOR UPDATED DEFINITIONS BEFORE
SCANNING | SAVE | CONTINUE
- Troubleshooting Definition Update Issues
Check scan times – during daytime with high computer usage = bad
performance experience for user
Is computer turned off when scans or updates are scheduled?
NOTE: optional updates are NOT downloaded or installed automatically – must
be done manually
Check Defender Activities: Windows Defender | History |
Check Defender updating & other security info via:
Control Panel | Security | Windows Security Center | Check Security Status |
• Firewall
• Automatic Updating
• Malware Protection
o Virus Protection
o Spyware & other malware protection
• Other Security Settings
o Internet security settings
o User Account Control
3.2.5 Troubleshooting Spyware Removal
- To perform manual uninstall:
If Defender informs you that it can’t remove spyware automatically & you can’t
remove it manually by other instructions provided by Defender, click on
UNINSTALL A PROGRAM IN CONTROL PANEL & remove it from there
PAGE 20 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
- If still see evidence of spyware after uninstall, remove, etc., try rolling back to Restore
Point OR might need to reinstall the OS
- Evidence of Spyware
New toolbars, links, favorites you didn’t add on your browser
Home page, mouse pointer, or search program changes
Website redirection
Pop-ups
Computer running slower
3.2.6 Managing Applications by Using Software Explorer
- Windows Defender | TOOLS | SOFTWARE EXPLORER | CONTINUE | SHOW FOR ALL USERS
**NOTE: “SHOW FOR ALL USERS” button won’t appear if you only have one user account
enabled on your Vista PC
Software Explorer Category drop-down list:
Startup Programs Programs that run automatically when Windows starts
Currently Running Programs Programs currently running on the screen or in
background
Network Connected Programs Programs/processes that can connect to the internet or
to a home/office network
Windows Sockets (Winsock) Programs that perform low-level networking &
Service Providers communications services for Windows & programs that
run on Windows
- For each type of item, have following ratings:
Permitted – has a link to learn more about the item
Not Yet Classified – can submit the program to SpyNet for further analysis
Potentially Unwanted – has a link to learn more about the item
- Displaying Software Explorer Details
Title Description
Auto Start Indicates whether program is registered to start automatically
when Windows starts
Startup Type Location where the program is registered to start automatically
(i.e., All Users Startup folder or Registry)
Ships With Operating System Indicates if program installed as part of Windows Vista
Classification Indicates whether program has been analyzed for risks to
privacy & security
Digitally Signed By Indicates if software is digitally signed and if so, by who
PAGE 21 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 22 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Cookie Types
Temporary/Session Cookies Removed from computer when browser closes – used to
store temp info (i.e. shopping cart)
Persistent/Saved Cookies Remain on computer after browser closes – used for sign on
info, password, etc.
First-Party Cookies Can be Persistent or Temporary; come directly from a
website a user is viewing
Third-Party cookies Come from other websites’ advertisements that are on the
website the user is viewing
PAGE 23 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 24 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
- Access via:
Start | Control Panel | Classic View | Admin Tools
(or All Programs | Admin Tools | )
Open Windows Firewall With Advanced Security | Continue |
- To change settings for Windows Firewall With Advanced Security via MMC:
Run | MMC | File | Add Snap In | Right Click Windows Firewall With Advanced
Security node at the top right of the console | Select PROPERTIES |
Can turn off/on inbound & outbound connections on a per profile basis
Clicking CUSTOMIZE opens the Customize Settings For The Selected Profile dialog
box | configure:
• Firewall notification
• Unicast response
• Rule merging (if applicable – if have group policy)
Clicking on the IPSec Settings tab allows you to configure:
• Key Exchange – Default is recommended
• Data protection – Default is recommended
• Authentication Method settings – Default, Kerberos V5…
- Configuring Inbound and Outbound Rules
Open Windows Firewall With Advanced Security | right click type of rule to
configure | select NEW RULE | opens New Inbound/Outbound Rule Wizard
(OR go to Action, New Rule)
Select Rule Type – Program; Port; Predefined; Custom Rule – & click NEXT
IF selected Program, presented with program page – select program & path for
which the rule will apply; also possible to choose ALL programs here
IF selected Port, specify TCP or UDP & the port number(s); also possible to
choose ALL ports
Specify what firewall should do when traffic meeting that criteria is encountered
• Allow The Connection
• Allow The Connection If It Is Secure
• Block The Connection
Click NEXT & enter a Name & Description |
- Connection Security Rules
Special rules that deal with IPSec traffic
Four Types of Connection Security Rules
Isolation Rule - Isolates Vista computers based on authentication credentials
such as a common domain
- Used to isolate groups of computers from others on the
network
Authentication - Prevents a Vista computer from authenticating connections
Exception Rule from computers specified in the rule
- Usually used in conjunction with an isolation rule to allow
exceptions to that rule
Server-To-Server Rule - Protect connections between servers (i.e., between web server
app & a database hosting credit card info)
Tunnel Rule - Creates encrypted tunnels across the internet
- Importing & Exporting Policies
Windows Firewall With Advanced Security | click on that in the file tree | click
“Import Policy” or “Export Policy” in the Actions section on the right hand side of
the console
PAGE 25 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 26 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 27 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Control Panel | Network And Internet | Network And Sharing Center | Click VIEW
STATUS beside the Local Area Connection that connects to the SOHO network
OR – Network And Sharing Center | click MANAGE NETWORK CONNECTIONS |
right click the Local Area Connection | click PROPERTIES
Select “Internet Protocol Version 4” & click PROPERTIES
Default is “Obtain IP Address Automatically” & “Obtain DNS Server Address
Automatically”
SIDENOTE – need to install Link Layer Topology Discovery on XP systems if want
to see them/be seen by Vista
- Hybrid network = WAP typically connected to modem & computers are connecting using
wired connections to Ethernet ports on the WAP as well as wirelessly
- WAP – Wireless Access Point
Provide internal DNS services
Forwards any datagrams via modem to ISP for external DNS resolution
4.1.3 Setting Up A Network Connection
- To connect to the internet (for the first computer that’s connected to a modem)
Network & Sharing Center | Set UP A Connection Or Network | Connect To The
Internet | Next |
Select method (PPPoE for example)
Enter User Name & Password
Select “Allow Other People To Use This Connection” to share
Enter a Connection Name
Click CONNECT
- To specify name for your network:
Network & Sharing Center | click CUSTOMIZE | select Private or Public | Type a
Network Name | Next | Close
- TYPICALLY, other computers on a wireless SOHO connect to the internet via the first
computer configured on the network…need to enable ICS on that computer
Network & Sharing Center | click MANAGE NETWORK CONNECTIONS
Right click the connection you want to share | Click PROPERTIES
Continue
Click the SHARING tab | select “Allow Other Users To Use This Connection”
Can also click Allow Other Network Users To Control Or Disable The Shared
Internet Connection” box
Can also allow other network users to use services running on your network by
clicking SETTING | select services you want to allow
- When configure ICS, your LAN connection is configured with a new static IP address
(192.168.0.1 perhaps) & other settings (subnet mask & default gateway & DNS Server
address). The static address (192.168.0.1) is used as the default gateway for the
subnet.
- If you’ve change the default workgroup name (WORKGROUP) on your network, might
need to also change that on any computers added to the network
- If want to set up a VPN:
Windows Help & Support
Search for “set up a connection to your workplace by using VPN”
Opens the Connect To A Workplace Wizard
Enter internet address & name…
4.1.4 Adding A Wireless Device to a Network
- If have a wireless network, can run the SET UP A WIRELESS ROUTER OR ACCESS POINT
WIZARD on one computer already on the network & save settings to a USB flash drive
PAGE 28 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Wireless Network Setup Wizard runs automatically when the USB flash drive is
inserted
Control Panel | Network And Internet | Network & Sharing Center | Set Up A
Connection Or Network | Set UP A Wireless Router Or Access Point | NEXT |
NEXT| Continue | searches for wireless access device by running the Detecting
Network Hardware And Settings Utility | when prompted if you want to turn on
network discovery for all private networks, click NO, MAKE THE NETWORK I AM
CONNECTED TO A PRIVATE NETWORK (other choice is to turn on network
discovery for all public networks) | click CREATE WIRELESS NETWORK SETTINGS
AND SAVE TO USB FLASH DRIVE | Enter name for your wireless network (only
letters & numbers & underscores) | click NEXT | name specified becomes the
SSID | either accept the suggested passphrase or provide one of your own |
Continue | Specify file & printer sharing settings (typically use the custom
settings on your computer by default) | Click NEXT | plug USB device into
computer when prompted | specify drive location | instructions are shown on
how to add other devices to network | click CLOSE
- Can also manually add a wireless computer running Vista via:
Start | Connect To | choose wireless network from the list | click CONNECT
Type in network security key or passphrase (if prompted) & click OK
Common Wireless Network Technologies
802.11a Up to 54 Mbps
More simultaneous users than 802.11b
Smaller signal range than 802.11b
More easily disrupted signal
Not compatible with 802.11b adapters, routers, access points
5 GHz Frequency
50’ / 15 meters indoors
100’ / 30 meters indoors
802.11b Up to 11Mbps
Good signal range
Low Cost
Allows fewer simultaneous users than 802.11a & 802.11g
2.4 GHz Frequency
150’ / 46 meters indoors
300’ / 92 meters indoors
802.11g Up to 54 Mbps
More simultaneous users than 802.11b
Smaller signal range & not easily obstructed
Relatively expensive
Backward compatible with 802.11b adapters/routers/access
points
Uses 2.4 GHz Frequency
150’ / 46 meters indoors
300’ / 92 meters indoors
802.11n Up to 300 Mbps
Draft format currently, not on test…
4.1.5 Managing Network Connections
- Right click the Connection | click on STATUS | Network Connection Details are shown
Shows info similar to ipconfig info
PAGE 29 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
- Clicking CLOSE returns you to the Local Area Connect Status dialog box – clicking
PROPERTIES & then CONTINUE accesses the Local Area Connections Properties dialog
box
- In the Local Area Connection Status dialog box, typically see:
Client For Microsoft Networks Enables the computer to access resources on a
Microsoft network
Quality of Service (QoS) Packet Provides traffic control; can be vital if have high-
Scheduler bandwidth traffic (i.e., streaming video) on your
network
File And Printer Sharing for Enables other computers to access resources on
Microsoft Networks your computer in a Microsoft network (and other
networks)
Internet Protocol Version 6 IPv6 configuration
(TCP/IPv6)
Internet Protocol Version 4 IPv4 configuration
(TCP/IPv4)
Link-Layer Topology Discovery Discovers & location other computers, devices &
Mapper Input/Output (I/O) Driver network infrastructure components on network &
determines network bandwidth
Link-Layer Topology Discovery Allows computer to be discovered & located on
Mapper Responder the network
IF an item listed above is configurable, can click on the PROPERTIES button
- Can also just click on CONFIGURE in the Local Area Connections Properties dialog box to
configure the adapter itself, i.e., update the driver…
- Can create a network bridge if have more than one network connection
4.1.6 Managing Preferred Wireless Connections
- See available networks via:
Network & Sharing Center | Connect To A Network | select WIRELESS in the
Show list | select a network & click CONNECT |
IF not shown, click SET UP A CONNECTION OR NETWORK in the Network &
Sharing Center | select from list of available options
- To see saved wireless networks:
Control Panel | Manage Wireless Networks – click & drag to change order
- Preventing Your Computer From Switching Between Wireless Access Points
Open Network & Sharing Center | click MANAGE WIRELESS NETWORKS
Right click the preferred network | click PROPERTIES
CLEAR the CONNECT TO A MORE PREFERRED NETWORK IF AVAILABLE checkbox
- Networks with the same Service Set Identifier (SSID)
Best course of action is to change the default SSID (which is usually “Default”)
- Hardware & Interference Problems
Typically see interference with 802.11b & g – phones & microwaves
Can maybe change the WAP settings to use different wireless channel or
configure channel to be selected automatically
In US & Canada, can use channels 1, 6, & 11
4.1.7 Sharing Files & Folders
- NOTE: sharing files & folders on a network from any folder on a computer requires
elevated privileges
Can share regular files/folders OR can place them in the Public folder
Users do NOT need elevated privileges to place files in the Public folder, BUT
elevated privileges ARE required to specify whether these files can be opened (or
opened & changed) by users logged onto other computers on the network
PAGE 30 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 31 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 32 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Network Diagnostics returns a message that might help you diagnose the
problem
- Can also go to:
Network & Sharing Center | Diagnose & Repair
- Can also run diagnostics on a specific interface via:
Network & Sharing Center | Manage Network Connections | right click the
connection | click on DIAGNOSE
4.2.6 Configuring Network Settings in Windows Firewall
- By default, Windows Firewall is ENABLED & blocks all incoming traffic other than traffic
that meets criteria defined in exceptions
Windows Firewall settings are dependent on the network location you defined
when installed Vista – is on for all locations, but with separate profiles for each
location
- Configuring Exceptions
To restore default firewall settings:
• Windows Firewall | Change Settings | Advanced | Restore Defaults
• OR - Control Panel | Allow A Program Through Windows Firewall | in
Advanced Tab click Restore Defaults
Control Panel | Allow A Program Through Windows Firewall | Continue | displays
the Exceptions tab of the Windows Firewall Settings
• Add Program | select or browse for program | can click CHANGE SCOPE &
define the range of computers the exception applies to
o Any Computer
o My Network (subnet) only
o Custom List
• Add Port | enter TCP or UDP Port | can click CHANGE SCOPE & define the
range of computers the exception applies to (same list as above)
• Clear/select checkboxes for Programs or Ports (can select a program or
port & then click on PROPERTIES to see the exception details)
- Examining Advanced Security Settings
Start | Admin Tools | Windows Firewall With Advanced Security |
• Inbound Rules
• Outbound Rules
• Connection Security Rules
- Applying Public & Private Firewall Settings
Open Windows Firewall with Advanced Security| click Windows Firewall
Properties in OVERVIEW pane | opens the Windows Firewall With Advanced
Security On Local Computer dialog box |
Can change settings by profile (Domain Profile & Private Profile & Public Profile)
via individual tabs for each
• Firewall state (on/off)
• Inbound Connections (block/allow)
• Outbound Connections (block/allow)
• Customize settings for Firewall behavior
• Customize logging
PAGE 33 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Host – the person asking for assistance/sending the invitation; must manually
allow the connection
- Improvements in Remove Assistance & Remote Desktop
Use less bandwidth
Can now work through NAT firewalls
If host computer must be rebooted as part of troubleshooting process, Remote
Assistance session is automatically reestablished (COOL!)
4.3.2 Remote Assistance
- Activating and Securing Remote Assistance
Start | Right click Computer | select PROPERTIES | in Tasks pane click REMOTE
SETTINGS | click CONTINUE | In REMOTE tab of System Properties dialog box
select/check the ALLOW REMOTE ASSISTANCE CONNECTIONS TO THIS COMPUTER
ONLY users with elevated privileges can configure security settings for Remote
Assistance
Three security options apply to Remote Assistance invitations issued from
computers running Vista…these settings control:
• Whether the person connecting from the remote computer can control
the host computer
• The length of time the invitation can remain open
• Whether invitations can be used only by Vista+ computers
Remote Assistance settings CANNOT be configured individually each time an
assistance invitation is issued
If the “Take Control” option is enabled, the host user can still control what’s
going on & must manually approve the helper taking control
To Configure helper settings:
• Control Panel | Classic View | System |
• Click REMOTE SETTINGS | click CONTINUE
• Click ADVANCED | select “Allow This Computer To Be Controlled
Remotely”
• Set timeframe for invitations to remain open (minutes, hours, days) –
max is 30 days
• Select/Clear checkbox to “Create invitations that can only be used from
computers running Windows Vista or later”
NOTE: if invitation period expires, Vista asks host if want to keep waiting – can
extend the invitation timeframe that way…
- Exploring a Remote Assistance Session
Start | Help And Support | under the “Ask Someone” heading, select “USE
WINDOWS REMOTE ASSISTANCE TO GET HELP FROM A FRIEND OR OFFER HELP”
Clicking the “INVITE” option opens screen to select method to invite someone to
help you:
• Use e-mail to send an invitation (If your email program is not configured yet,
choosing this option will start the configuration process)
• Save this invitation as a file (If you use web-based e-mail, choose this option)
Invitations are protected with passwords, which are NOT automatically included
in the invites – can verbally give the password to the helper to keep more secure
• At least 6 characters long
• No enforcement of using mixed case letters, numbers and symbols
Hosts need to keep the Remote Assistance panel open after they create the
invitation – if close it, will be necessary to generate a new invite.
- Using an Invitation to Make a Connection
Helper can start connection by either
PAGE 34 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 35 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 36 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
o Advanced
Server Authentication – verifies the identity of the computer
you’re connecting to; ONLY computers running Vista or
Longhorn able to verify their identities properly. Options are:
• Connect Always
• Warn If Authentication Fails
• Do Not Connect If Authentication Fails
Connect From Anywhere – configures Terminal Services
gateway settings
• Allows authorized users on the internet to connect to
remote computers on a protected network
• Alternative to creating a protected network through VPN
- Starting & Ending Sessions
If user is logged on locally & same user tries to log on remotely, remote user will
automatically connect to the local session; can leave programs running at work &
continue working from home
If user logged on remotely & same user account is used to log on locally, local
user will automatically connect to the remote session; can leave programs
running remotely from home & pick up where you left off at work the next day
If Remote Desktop session disconnects, the session continues…i.e., if power
outage & didn’t log out, then can log back in to reconnect & don’t lose the
session
If user tries to log on remotely while different user logged on locally, local user
will receive a prompt saying that a remote user wants to connect
• If local user clicks OK, he/she will be logged off & remote user can log on
• If click Cancel, remote connection attempt is rejected
If user is logged on remotely and a user tries to log on locally, remote user will
be informed that a local user wants to connect
• If remote user clicks OK, he/she will be logged off & local user can log on
• If click Cancel, local connection attempt is rejected
PAGE 37 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 38 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
o General Tab
o Servers Tab
o Connection Tab – specify what type of connection to make when
synchronizing the account if different than IE Internet Options
settings; useful for VPN-only accounts
o Security Tab
o Advanced Tab – can configure account to use nonstandard ports,
configure timeouts, leave messages on server (can remove from
server after xx days), or break apart messages larger than xxx size
into smaller parts
• NOTE: IMAP accounts have different set of properties – main difference is
in the Advanced properties:
o Can set Windows Mail to check for new messages in all folders on an
IMAP server
o Can configure special folder properties for Sent Items, Drafts, Deleted
Items & Junk Email folders on the server
- Viewing the Windows Mail Inbox
View Menu | Current View |
Preconfigured message views:
• Show All Messages – default view; message that have been read are
displayed less prominently than unread (usually bolded)
• Hide Read Messages – after read message, “disappears”
• Hide Read Or Ignored Messages – hides read & also uses message rules
to designate less important messages & hide them from you
NOTE: Grouping Messages – Message grouping my conversation can be used
with any of the preceding options for the message views…
Creating Custom View via: Define Views | New View |
• Available Conditions for creating Custom Views:
o Message is from one of a group of listed emails
o Subject line contains one or more specific words
o Sender has marked the message as a priority
o Message received from a particular account (i.e. for when have 2+
email account set up in Windows Mail)
o Message was sent more than XX days ago
o Message is longer than XX lines
o Message has an attachment
o Message has been read
o Message body has been downloaded
o Message is flagged
o Message is watched or ignored
o Message is secure
NOTE: cannot use views to move message between folders or copy/delete
- Message Rules & Folders
Configure Windows Mail to process incoming mail prior to reaching the mailbox
Can create folders for specific senders, topics, etc. & create rules to
• Move message to specific folder
• Copy message to specific folder
• Delete message
• Forward message to email address or set of emails
• Highlight message in chosen color
• Flag message
PAGE 39 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 40 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
• In Display Name text box, enter name (usually same as for mail account) &
click NEXT
• On Internet News Email Address Page, enter email address of account
configured in Windows Mail & Click NEXT
• On Internet News Server Name page, enter name of the NNTP server to
connect to; if required, check “My news server requires me to log on” & click
NEXT
• If selected the log on required checkbox, enter your authentication
credentials & click NEXT…otherwise click FINISH & the news server account is
displayed in the Internet Accounts dialog box
- Subscribing & Unsubscribing to Newsgroups
When add a new news server, Windows Mail asks if you want to download list of
newsgroups that the server carries OR can use the Search box
Access via Tools | Newsgroups |
If want to see the contents, click on the newsgroup & click GO TO
Clicking RESET LIST button to retrieve entire list of newsgroups from server
Clicking NEW tab shows only newsgroups added since you last subscribed
- Downloading Articles
When you open a newsgroup message, Windows Mail retrieves the content of
the message from the news server
Can use filters to automatically download message that meet selected criteria
Online & Offline Modes
• Online mode – opening a message downloads the body of the message from
the NNTP server & displays on the screen
• Offline mode – can connect, download headers, disconnect, mark message of
interest for download, go back online & download body of marked messages
• When right click a newsgroup under its newsgroup server, can configure
following Synchronization settings:
o All Messages – 300 messages at a time, including their content
o New Messages Only – only those posted since last synch with server
o Headers Only – downloads all headers currently stored on news
server; checked against headers you already have so no duplication
• Right clicking “CATCH UP” marks all articles in group as read
Reading Newsgroups
• Flags – work on a per message basis & are usually applied via filters
• Watching – works on a per conversation basis
• Can ignore conversations (select conversation & select Ignore on Message
menu)
• To access large files that have been split into multiple attachments, need to
combine & decode them (Select messages | Message Menu | Combine &
Decode)
Message Menu:
• Flag Message
• Watch Conversation
• Ignore Conversation
• Unscramble
• Combine & Decode
Views and Newsgroups
• Default newsgroup views
o Show All Messages
o Hide Read Messages
PAGE 41 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 42 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
• When replying, can Reply To Group (goes through newsgroup to all) or Reply
(goes through email to post originator)
• To Cancel a post, select it & from the Message menu, select Cancel Message
(can only cancel your own messages)
5.1.3 Troubleshooting Windows Mail
- Usually, problems caused by issues external to application
- Check that mail server supports POP3 or IMAP
- If can receive but not send, check SMTP server address
- Send test email to yourself from within Windows Mail
- Google the error messages received in Windows Mail
- If configure Windows Mail to leave mail on your server, check mailbox quota
- When creating view, double-check your view/hide options
- Check Junk folder for “missing” emails & place sender on Safe Senders list
Tools | Junk Email Options | Safe Senders |
- If rule not functioning properly, check that message not being bounced by another rule
with higher priority
PAGE 43 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 44 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 45 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
• Work – ditto
• Family – gender, birthday, anniversary, spouse/partner, children
• Notes – can enter misc notes about a contact
• IDs – associate digital certificates with email accounts – NECESSARY to
have a certificate associated with a contact in order to become a Trusted
Contact for Windows Meeting Space
- Importing and Exporting Contacts
Windows Contacts Toolbar | Import/Export buttons |
Import:
• CSV
• LDIF (LDAP server)
• vCard (VCF file)
• Windows Address Book File (Outlook Express Contacts)
Export:
• CSV – share all
• vCards – share some
- Using Contact Groups
To Create New: click New Contact Group button | click Add to Contact Group |
enter individual emails without entering as contacts OR click Create New Contact
OR select an existing contact
5.3.2 Windows Calendar
- Can publish & subscribe to shared calendar without NOS or Server
- Creating a New Appointment Details to consider:
Appointment title
Location
Calendar – if have multiple calendars, drop-down menu allows you to select one
URL – can place URL for the meeting agenda to share the plan
Appointment information – configure date & time of appointment (if attendees
are in different time zones, automatically adjusts when they import the item)
Recurrence – how often the meeting will recur, if at all
Reminder – display a dialog box as a reminder at a preset time before meeting
Participants – enter contacts or email addresses
• Clicking the INVITE button generates an email addressed to meeting
participants
• Can also right click an existing appointment & select Send, manually adding
addresses you want to send it to using Windows Mail
Notes area – add misc. info about the appointment.
- Sharing Calendars with Others
To Publish a Calendar:
• Right click the calendar in the Calendars list on the left side of the screen
• Select PUBLISH | opens the Publish Calendar dialog box
• Enter a Calendar Name (no spaces, but can use underscores)
• Enter location to publish to (website or fileshare)
• Select whether to Automatically Publish Changes Made To This Calendar
• Select Calendar Details to Include (Notes / Reminders / Tasks)
• Click PUBLISH
If Calendar not automatically set to publish updates, can right click & select SYNC
- Subscribing to Shared Calendars
Must know location/URL – cannot browse to it
Right click in the Calendars area & select SUBSCRIBE
Can be located on Network Shares or on Websites
PAGE 46 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 47 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 48 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Media Player can only play back television broadcasts, cannot record like Media
Center
WMP can be used to only display media through a Media Center Extender
Device, cannot share through one like Media Center
Can be used to rip audio from CD; Media Center can only play
- Ripping & Digital Rights Management
Click on Rip tab | hold down ALT key & select OPTIONS from TOOLS menu | click
RIP MUSIC tab to show ripping options |
• Rip music to this location – can change location & file name
• Rip Settings – format; copy protect music; rip CD when inserted; eject CD
when ripping complete
• Audio quality – slide bar from Smallest Size to Best Quality
Can rip audio with following formats
Audio data type: CD consumes this much space:
Windows Media Audio 56 MB
Windows Media Audio Pro 28 MB
Windows Media Audio (Variable Bit Rate) 18-33 MB
Complex audio uses higher bit rate
Simple audio uses lower bit rate
Windows Media Audio (Lossless) 206-411 MB
Highest quality recording format
MP3 57 MB
WAV (Lossless) 600 MB
Older format, from earlier Windows
NOTE: higher bit-rate = higher audio quality = higher disk space usage
MP3 & WAV formats do not support copy protection technology
Rights backup – WMP does NOT allow for backup of media usage rights
- Media Sharing Configuration: in WMP, click on ANY tab menu & click MORE OPTIONS
Navigate to LIBRARY tab & click CONFIGURE SHARING
Select the SHARE MY MEDIA checkbox & click OK
When compatible device connected to network, select if share media with it
- Codecs
Codec – Method of encoding data
Each media format requires separate codec
May need to obtain codec for WMP to play new media file type
Options | Player Tab | check “Download codecs automatically”
- Adding MetaData
Right click file in library | click ADVANCED TAG EDITOR | TABS:
Track Info Artist Info Lyrics Pictures Comments
Title Artist Language Picture types Language
Subtitle Lyricist Text Cover Text
Genre Album Artist Synchronize lyrics Description
Mood Conductor
Track No Orig. Artist
BPM Orig. Lyricist
Key Composer
Album Websites
Original Album
Set
Subgenre
Language
PAGE 49 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 50 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 51 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 52 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 53 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Displays problem solutions available & gives info on reported problems that don’t
have a solution yet
Stores problem history so can check for solutions in future
- Dealing with Unresponsive Programs
Vista usually fixes automatically
Otherwise, can use Task Manager to close or restart program
If IE hangs regularly, check for spyware or viruses or other malware
PAGE 54 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 55 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 56 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
o Conflicts/Sharing
o DMA
o Forced Hardware
o I/O
o IRQs
o Memory
• Components – info re disk drives, sound devices, modems, other components
• Software Environment – info about drivers & network connections; displays
other program-related info
PAGE 57 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
• Also, if firewall blocks bitspeer port (UDP & TCP port 2178) can result in
problems
User did not accept the Microsoft software license terms
• Open Windows Update & review error messages
Insufficient free disk space – self-explanatory; will fail if this happens
User cancelled installation process or computer disconnected from internet – if
interruption lasts for too long, download times out & update not downloaded
User installs an update & device stops working
• Roll back to previous driver
• Access manufacturer website to obtain new driver
Update cannot complete because restart is required – self-explanatory, restart!
Computer turned off at time of scheduled update – change timing, otherwise
installed when next start computer
Computer in power-saving state (sleep or hibernate) at time of scheduled update
• If plugged into power source, will wake & install
• If on battery power, new updates will not install
6.3.2 Windows Update Driver Settings
- Control Panel | System & Maintenance | Advanced System Settings | Hardware | Update
Settings
- Available Settings:
Check automatically for drivers each time a device is connected
Ask user whether to perform the check when a new device is connected
Never check Windows Update for new drivers
6.3.3 Hiding & Restoring Hidden Updates
- Hiding an Update
Right click update in View Available Updates dialog box | select HIDE UPDATE |
CONTINUE | press F5 to refresh view & VOILA it’s gone!
- Restoring Hidden Updates:
All Programs | Windows Update | click RESTORE HIDDEN UPDATES | select
update(s) to be restored | Click RESTORE | Click CONTINUE | scans for updates |
restored updates listed in View Available Updates dialog box again
6.3.4 Viewing Update History
- Windows Update | Click on VIEW UPDATE HISTORY | Click INSTALLED UPDATES |
- OR via: Control Panel | Programs | Programs & Features | View Installed Updates |
- Opens Uninstall An Update dialog box
Not all installed updates will be shown in the Uninstall An Update dialog box
To uninstall, select update & click UNINSTALL | CONTINUE
6.3.5 Windows Ultimate Extras
- If running Ultimate, Windows Updates also displays link to “Windows Ultimate extras”
- Can download & install extras by selecting “Download Programs, Services, & Unique
Content From Windows Ultimate Extras” OR visit Vista Ultimate website directly
PAGE 58 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 59 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
Click SAVE SETTINGS & START BACKUP if want to start immediately instead
6.4.2 Accessing & Encrypting Backup Files
- Saved in following format:
<backup location> \ <computer name> \ Backup Set <year-month-day> <time>
e.g., F:\Glasgow\Backup Set 2007-02-28 110830 (for Feb. 28, 2007 at 11:08:30 am
Backup files are in ZIP format
- When make a full backup, backup folder is created & labeled with date for that day; as
you add updates, the folder name stays the same
- Encrypting Backed-up files
Can use EFS to encrypt backup files with your personal encryption certificate
NOT convenient if several users log onto computer, would need to decrypt files
before another user can carry out a restore
For another Full Backup, do a Manual Backup
EFS not included with Vista Starter, Basic, or Home Premium editions
To Encrypt: Right click Parent folder | click on PROPERTIES | General tab |
Advanced | select “Encrypt contents to secure data” | Click on DETAILS for
further configuration | OK & OK
- Viewing Backup Files
6.4.3 Changing Backup Settings
- Backup & Control Center | Click CHANGE SETTINGS under the BACK UP FILES Button |
opens Backup Status & Configuration dialog box |
View Backup Status – indicates if last backup was successful
Can Click on BACK UP NOW | CONTINUE |
Can click on CHANGE BACKUP SETTINGS (for scheduled backup) | CONTINUE |
Can also TURN OFF automatic backup | Click CONTINUE |
6.4.4 Copying Files Manually
- Cannot save registry settings or other system settings (need to use Restore Points)
- Cannot create complete image
- Copies aren’t marked as previous versions & can’t be restored using Restore Previous
Versions feature described next
6.4.5 Restoring Files
- Backup & Restore Center | Click on RESTORE FILES | select Files From (latest/older)
Backup | select & click NEXT |
Add Files
Add Folders
Search
- Select location to restore to
In original location
In following location: & specify
6.4.6 Advanced Restore
- Backup & Restore Center | Advanced Restore |
- OR – via Backup Status & Configuration | Restore Files | Advanced Restore |
When using another PC as your backup medium
Restore from backup older than most recent one
Can restore files for all users
6.4.7 Using System Restore
- System Restore Points made:
Daily
Before major changes
Manually
PAGE 60 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
- Control Panel | System & Maintenance | System | System Protection | System Protection
Tab of System Properties | click on SYSTEM RESTORE |
- Also accessible via: Control Panel | Classic | System | System Protection |
- Also accessible via: Control Panel | Classic | System | System Protection |
- Click CREATE to manually create a restore point & name it
- Shadow copies are automatically saves as part of restore point in System Properties
If System Protection is turned on, Windows automatically creates shadow copies
of files that had been modified since last restore point was made
If TURN OFF System Protection on a disk, ALL RESTORE POINTS ARE DELETED
- Restore Points are made until 300 MB of reserve space is used; might use up to 15% of
HD capacity
When reserve space is used up, deletes oldest…
- System Restore doesn’t work on HD’s smaller than 1 GB
6.4.8 Using Complete PC Backup
- To Create Windows Complete PC Backup Image:
Control Panel | System & Maintenance | Backup & Restore Center | Click BACK
UP COMPUTER next to Create Windows Complete PC Backup & Restore image of
entire computer | Click CONTINUE | runs Complete PC Backup Wizard | configure
to save to a hard disk (internal or external but CANNOT contain system files) |
Receive warning if have insufficient space
Can save to CD-R, CD-RW, DVD-RW, HD
- Restoring a Computer from a Complete PC Backup
Complete restoration of PC
Insert Install media | Restart computer | select language | click NEXT | select
REPAIR YORU COMPUTER | OS | SYSTEM RECOVERY OPTIONS | select WINDOWS
COMPLETE PC RESTORE |
IF have Recovery partition, Restart | Press F8 repeatedly | select REPAIR YOUR
COMPUTER from Advanced Boot Options Menu | press ENTER | select keyboard
layout & click NEXT | select User Name & type Password & click OK | on System
Recovery Options menu, select WINDOWS COMPLETE PC RESTORE |
Backup image = large virtual hard disk (VHD file) + XML documents
- ONLY on Vista Business, Enterprise & Ultimate
6.4.9 Restoring Damaged or Deleted Files by Using Previous Versions
- Shadow Copies – automatically saved as part of restore point if System Protection
enabled
- Access previous versions of a file by: Right click file/folder in Windows Explorer | click
RESTORE PREVIOUS VERSIONS | goes to PREVIOUS VERSIONS tab of file/folder
PROPERTIES | select Previous Version & Click RESTORE |
- Can use shadow copies to recover previous versions of files, rather than from backup
- If some files do not have Shadow Copies, then maybe System Protection not turned on
for that HD or maybe files might be offline files (not available for offline files)
6.4.10 Summary of Backup Types & When to Use Them
- Backup Files Wizard – use to backup personal files like music or documents
- Create restore points to store system settings & create shadow copies
- Use Windows Complete PC Backup to create image of entire computer when new &
periodically (maybe every 6 months or so)
- Use Restore Files wizard to restore personal files like documents or pictures
- Use previous copies to restore personal files from shadow copy or backup OR if want to
go back to previous version
PAGE 61 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
- Use System Restore if a change OS, a new program, or a new device driver causes
problems & want to restore system or registry settings; System Restore does NOT alter
personal files
- Use Windows Complete PC Restore if virus or hardware fault has corrupted OS & deleted
restore points
Will likely need to run Restore Files wizard to restore more recent versions of
personal files
- Make copies of files stored on USB flash memory & of encrypted files; copy to NTFS
formatted HD or optical storage so remain encrypted!
PAGE 62 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 63 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 64 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 65 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 66 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 67 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 68 OF 69
*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT*
PAGE 69 OF 69