1.1 IDENTIFY HARDWARE REQUIREMENTS 1.1.1 Minimum Requirements
Processor RAM HDD Graphics 800 MHz 512 MB min / 1 GB Recommended 20 GB min with 15 GB free / 40 GB rec DirectX 9 minimum… …WDDM Driver …Hardware Pixel Shader 2.0 …32 bits per pixel …Min. 128 MB graphics memory Home Basic
1 GHz 32/64 bit 512 MB RAM 20 GB HDD DirectX 9 + 32MB grphx mem. 1 CPU Max 8 GB RAM Max Parental Controls NA NA NA NA NA NA NA

Vista Starter

Home Prem.




DVD ROM 1 GHz & 32/64 bit 1 GB RAM 40 GB HDD DirectX 9 + 32 MB Graphics Memory+ WDDM Driver + Pixel Shader 2.0 + 128 MB Video memory 1 CPU Max 2 CPUs 16 GB Max 128 GB Max Parental Controls Parental NA NA Controls NA IIS & Shadow Copy NA Domain Support Aero Tablet PC NA NA SUA (subsystem for Unix Apps) NA NA HD Encryption Media Center NA NA Media Center



1.1.2 WPA: Windows Product Activation
1. 2. 3. Sends following info to Microsoft: Hardware ID: based upon current hardware configuration Product ID: from installation media Installation ID: automatically made by Vista from Hardware ID & Product ID DO NOT activate until system is confirmed settled & stable; can ONLY re-activate Vista once before have to contact Microsoft to unlock it! Windows Vista Capable: meets or exceeds Vista minimum requirements (but may not run Aero or run Aero at all) Windows Vista Premium Ready: exceeds Microsoft’s recommended specifications

1.1.3 WPA 30-day grace period 1.1.4 Definitions:


1.2 PERFORM A CLEAN INSTALLATION 1.2.1 Installs COMPLETE operating system; boots off DVD-ROM
Select Language & time/currency format & keyboard layout Click INSTALL NOW - DO NOT enter Product Key; CLEAR the “Automatically activate Windows when I’m online” checkbox When asked if you’re sure, click YES / OK Select your Vista Edition

PAGE 1 OF 69


***NOTE: if you select an edition higher than your purchased license edition, you’ll have to reinstall after the 30 day activation grace period Click on CUSTOM INSTALL “Where do you want to install Windows?” click on drive to select Click on DRIVE OPTIONS (ADVANCED) IF desired, can create New Partition, Format, Extend, Load Driver…if you choose no advanced options, Vista automatically creates & formats a partition Formatting / Partition-creation / etc. is performed Files are copied to the volume Features are installed Reboot Choose User Name & Password & Picture (account will be a local administrator) Computer Name Install Updates? o Use recommended settings – impt. & recommended updates installed o Install important updates only – self-explanatory o Ask Me Later – get a warning you may be vulnerable… Time & Date settings / auto-adjust for DST Select your Computer’s Current Location o Home – peer to peer communication assumed o Work – assumes active directory/domain o Public – limited network discovery Installation Completes Shows Rating (Windows Experience Index) VOILA – done!

1.2.2 Dual Booting
Install XP first, THEN Vista (otherwise you won’t like the results) Select the default OS & time for dual boot menu: Control Panel | System | Advanced Tab| Start Up & Recovery

NOTE: this procedure assumes XP Pro to Vista Ultimate Upgrade Start XP Pro & insert Vista installation DVD – if doesn’t auto start, open up the DVD in My Computer & click on setup.exe Click INSTALL NOW On the Get Important Updates For Installation page, select either: o Go Online To Get The Latest Updates – OR – o Do Not Get The Latest Updates For Installation DO NOT enter Product Key CLEAR the “Automatically activate Windows when I’m online” checkbox When asked if you’re sure, click YES / OK Select your Vista Edition ***NOTE: if you select an edition higher than your purchased license edition, you’ll have to reinstall after the 30 day activation grace period Accept the License Terms Click on UPGRADE (can also choose CUSTOM INSTALL) Review the Compatibility Report & click NEXT Upgrade process begins…may reboot several times… At the Help Protect Widows Automatically page, click
PAGE 2 OF 69



o Use recommended settings – impt. & recommended updates installed o Install important updates only – self-explanatory o Ask Me Later – get a warning you may be vulnerable… Time & Date settings / auto-adjust for DST – should be OK, imported from XP Select your Computer’s Current Location o Home – peer to peer communication assumed o Work – assumes active directory/domain o Public – limited network discovery Inherits previous computer’s name & local user account settings Click START on the Thank You page Installation Completes Shows Rating (Windows Experience Index) VOILA – done!

1.3.2 Windows Easy Transfer
Writes data ONLY to the Vista machine With 2000 SP4, can only transfer files – cannot use it to transfer other settings With XP SP2 & Vista, can transfer accounts, files, settings (bookmarks, mail, music, etc.) Does NOT migrate passwords Options for migrating account data to new computer: o Migrate a user account on original PC to new user account on Vista destination computer o Migrate a user account on original PC to an existing local account on the Vista destination computer (adds files to existing user instead of replaces) Using the Vista machine, can create CD to install Windows Easy Transfer on a computer running Windows 2000 SP4 or Windows XP SP2 General Procedure to transfer from XP to Vista: Run Windows Easy Transfer Tool on the destination OS (Vista) Click NEXT Click on START A NEW TRANSFER (vs. CONTINUE ONE IN PROGRESS) When asked Which Computer Are You Using Now, click MY NEW COMPUTER On the Do You Have An Easy Transfer Cable page, click NO SHOW ME MORE OPTIONS When asked Is Windows Easy Transfer Installed On Your Old Computer, click NO I NEED TO INSTALL IT NOW At the Choose How To Install Windows Easy Transfer On Your Old Computer page, click Windows Installation Disc or Windows Easy Transfer CD On the Are Your Computers Connected To A Network page, click YES I’LL TRANSFER FILES AND SETTINGS OVER THE NETWORK & unblock Windows Easy Transfer from the firewall (or alternately, click NO and pick another method of transfer) On the Do You Have A Windows Easy Transfer Key page, click NO I NEED A KEY A Windows Easy Transfer Key is generated – make note of it Insert the Vista Install DVD into the XP machine At the Windows Vista screen, click TRANSFER FILES AND SETTINGS FROM ANOTHER COMPUTER Click NEXT On the Choose How To Transfer Files And Settings To Your New Computer page, click TRANSFER DIRECTLY USING A NETWORK CONNECTION (or other applicable selection) On the Choose How To Transfer Files And Settings Over A Network page, click USE A NETWORK CONNECTION Click YES at the firewall prompt


PAGE 3 OF 69

3.3.4 - Windows Vista Upgrade Advisor Only runs on 32-bit Vista & 32-bit XP .0 on both. Ultimate & Enterprise YES XP Media Center YES only to 32-bit Ultimate & Home Premium YES Windows XP Tablet PC YES to 32-bit Business.USB HD. click CLOSE WINDOWS EASY TRANSFER DATA MOVING METHODS: Windows Easy Transfer Cable . just do a clean install of Vista – BUT you will need the XP product key AND the Vista product key to reinstall Can roll back a failed upgrade to Vista IF you haven’t logged on successfully yet PAGE 4 OF 69 . Files.CDs.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* On the Do You Have A Windows Easy Transfer Key page.5 Definitions & Notes: IF previously upgraded from XP to Vista & need to reload.exe: captures migration data on original computer o Loadstate. Enterprise.exe: imports migration data on destination computer 1. no settings transfer YES. & Ultimate YES Windows Easy Transfer? User State Migration Available? NO NO NO YES but not supported YES if SP4 installed.3.USB . settings & files are migrated & how to migrate them Can migrate user data from Vista to XP Can migrate digital certificates if the destination computer is Vista Can migrate encrypted files & folders Does NOT work with a Windows Easy Transfer Cable Does NOT automatically detect its partner computer over the network Uses two command line utilities: o Scanstate. click YES I HAVE A KEY Enter Windows Easy Transfer Key generated from Vista machine & Click NEXT Connection is attempted & prompts with What Do You Want To Transfer To Your New Computer page – click ADVANCED OPTIONS Select User Accounts.If USB 2. Upgradeable to Vista? Win 95/98/ ME NO NT 4 Workstation NO 2000 Pro NO XP Home YES to any 32-bit Vista XP Pro YES to only 32-bit Business. Ultimate & Enterprise YES XP Pro 64-bit YES to only 64-bit Business. And Settings To Transfer page – use checkboxes to select & click NEXT On the account mappings page. up to 1GB/min transfer rate LAN Optical Media . & transfers user settings YES YES YES YES YES YES 1. indicating the transfer is complete & click on CLOSE Log off or Restart for changes to take effect On the XP machine.Issues report at end of system check to advise of needed upgrades (if any) 1. DVDs Removable Storage . etc. create new accounts for each user that is getting migrated to Windows Vista & Click NEXT Transfer between computers finishes – DO NOT use either computer during this process – shows message on the original computer that you’re ready to transfer files & settings to the new computer Return to Vista/destination computer – WAIT until a summary is displayed on the destination computer.3 User State Migration Tool Can use Version 3 to automate migration of many user accounts on XP & Vista OSs Uses Migration Rules in XML format – specify which user accounts.

5.5 TROUBLESHOOT WINDOWS VISTA INSTALLATION ISSUES 1.2 Upgrade Methods Windows Anytime Upgrade: purchase disc OR Start | All Programs | Extras & Upgrades | Windows Anytime Upgrade | o ONLY works if current copy of Vista is activated In Place Upgrade: requires full version of new edition.2 Configuring Application Compatibility Mode PAGE 5 OF 69 .1 Application Compatibility If Vista detects problem running older program. migrate data back Must have AT LEAST 11 GB free to upgrade from XP to Vista VALID UPGRADE PATHS XP Home Any Vista “flavor” XP Pro Business / Ultimate XP Tablet Business / Ultimate Media Center Home Premium / Ultimate VALID VISTA-TO-VISTA UPGRADE PATHS Vista Home Basic Home Premium / Ultimate Vista Home Ultimate Premium Vista Business Enterprise / Ultimate Vista Enterprise Ultimate 1. data & user settings are retained Migrating – user settings & data are moved to a new Vista installation Side-by-Side Migration – migrate files from one computer to another Wipe-and-Load Migration – migrate data off. more expensive o Requires min. uses the Program Compatibility Assistant – automatically attempts to resolve conflicts with User Account Control or runs the program in mode to simulate previous version of Windows But if Program Compatibility Assistant doesn’t get it right.4. need to set manually… - 1.5. 11 GB free space on HD to store temporary files & data - 1. click RUN SETUP.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Upgrading – original OS is converted to Vista.4.EXE…if not. Start | Computer | double click on DVD… Click INSTALL NOW Select whether to updates for installation Clear the checkbox to automatically activate Windows when online Click NO to not enter the product key Select the edition & click NEXT Accept the License Terms & click NEXT Click on UPGRADE for the type of installation…and then wait… Make selections at the Help Protect Windows Automatically screen Time & Date settings & click NEXT Click START – Vista re-benchmarks the computer & gives it a new performance score Log On – VOILA.4 UPGRADE FROM ONE EDITION OF WINDOWS VISTA TO ANOTHER EDITION 1.3 General In Place Upgrade Procedures: **NOTE: Procedures assume upgrading from Vista Business to Vista Ultimate** Start up Vista machine & log on Insert installation DVD If AutoPlay runs. done! 1.4.1 Supported Upgrade Paths **ONLY 32-bit to 32-bit & 64-bit to 64-bit** (SEE CHART ABOVE FOR DETAILS) 1. perform clean install.

4 System Recovery Options Usually can access System Recovery Options when boot off Vista install media. be sure to disable all antivirus & antispyware & such Check BIOS for boot configuration If HD doesn’t appear during install/upgrade.3 General Troubleshooting Check HD space / capacity & other min. do not click on “Install Now”! Click on REPAIR YOUR COMPUTER .When prompted.Make selection off System Recovery Options screen: Startup Repair Automatically fixes problems that are preventing Windows from starting System Restore Restore Windows to an earlier point in time Windows Complete Restore your entire computer from a backup PC Restore Windows Memory Check your computer for memory hardware errors Diagnostic Tool Command Prompt Open a command prompt window 1.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Allows an installed application to run in emulation of previous Windows version Can also change display options to boost performance Run the program as an Administrator To configure compatibility for a specific program: Start | Right-click Program (or navigate to directory in Computer) Click PROPERTIES Click on COMPATIBILITY tab Click on checkbox for Run This Program In Compatibility Mode For: & select a previous OS from the drop-down menu Click OK to save settings **NOTE** can also run via Windows Help | “Program Compatibility Wizard” | Wizard runs & asks user location of program | enter OS to emulate | enter other display settings… Vista Compatibility Modes: Windows 95 Windows 98 / Windows Me Windows NT 4.5.5 Startup Repair Fixes most startup problems.5.5. requires no user interaction once started NOT usually helpful to repair problems caused by viruses or worms… Also accessible via: All Programs | Accessories | System Tools | System Restore System Restore Points automatically made before installation of drivers or applications To manually create Restore Point from within Vista: All Programs | Accessories | System Tools | System Restore | OPEN SYSTEM PROTECTION (Or click on System Protection tab in System Properties dialog box) PAGE 6 OF 69 1. need to load a hardware device driver 1.0 (SP5) Windows 2000 Windows XP SP2 Windows Server 2003 SP1 Available Display Alternations: Force the app to run in 256 color mode Force the app to run in 640 x 480 Disable Vista visual themes for the app (useful if buttons or title bar not displayed correctly) Disable Desktop Composition Disable Display Scaling On High DPI Settings 1.6 System Restore . requirements (11GB for any upgrade!) For Upgrades.Select the Vista installation to repair. first line of defense when Vista not booting right Can restore missing system files or repair basic disk errors Automatic process.5. load any drivers needed for HDs . tho sometimes installed on separate recovery partition .

7 Windows Complete PC Restore - 1.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Select the disk | click on CREATE OK.5.6.4 New / Updated Drivers 1.1 Device Manager: Control Panel | Classic View | Device Manager -OR. click RESTART to restart the computer Log On – System Restore dialog box states System Restore completed successfully – click CLOSE Restores computer from complete backup Reboots computer & performs series of memory tests Generally good idea to run when seeing random crashing errors Can use to replace corrupt or missing system files 1. click NEXT Click REPAIR YOUR COMPUTER on the Install Windows page Select the proper Vista installation & click NEXT Click SYSTEM RESTORE in System Recovery Options box In the Restore System Files And Settings dialog box. click NEXT Select the restore point from the list & click NEXT Confirm Disks To Restore – NEXT Click FINISH & click YES in the warning box Restore proceeds – when complete.8 Windows Memory Diagnostic Tool Driver Signing: Signed by Windows Signing Authority – WHQL tested Signed by Trusted Publisher – as chosen by the User Signed by Untrusted Publisher – as chosen by the User Altered – if changed since signed by Publisher Unsigned – no digital signature at all IF User has no administrative privileges. OK…close out of System Properties & System Restore Wizard To manually roll back to a previous System Restore Point: Insert Vista installation media Restart – press any key to boot from CD/DVD On Vista Language Preferences page.6.Control Panel | Classic View | Device Manager 1.5 Common Driver Issues - PAGE 7 OF 69 .6 INSTALL AND CONFIGURE WINDOWS VISTA DRIVERS 1. Vista automatically installs software from Trusted Publishers.6.6.3 Software/Driver installs & administrative privileges: - 1. & silently refuses all others Trusted Publishers are set by a User with admin rights via Certificate console New device drivers show as Optional Updates…go to: Start | All Programs | Windows Updates | Check for Updates Device not working Works erratically STOP error Warnings / error dialog boxes Unstable when new driver installed o Roll Back Driver: Device Manager | Right-click device | Properties | Driver Tab | ROLL BACK DRIVER | YES | CLOSE o If that doesn’t work. try last known good 1.9 Command Prompt 1.6.

5 Display Settings Resolution o Higher Resolution = smaller pixel o Windows Recommended Resolutions (based on monitor size): PAGE 8 OF 69 . CONFIGURING AND TROUBLESHOOTING POST-INSTALLATION SYSTEM SETTINGS 2. OS crashes. can also use automatic settings to be on the safer side… ETC.Disabling Devices: Device Manager > Right-click device > Disable o Disabled device shown with down-arrow icon next to the device - 2.Reports on: Software installation Information event or warning sign when software has been (un)installed & removal Applies to updates & rollbacks too Application Failures Red X icon shown when applications freeze or crash Hardware Failures Records when hardware device becomes unavailable or has failed Windows Failures Boot failures.2 Device Properties & Settings ONLY users with admin privileges are able to modify device drivers / hardware properties / uninstall devices .Shows Stability Graph & Index (score on a scale of 10) 2.1.1. Tools | Reliability & Performance Monitor | … Start | Computer | Right click | Manage | MMC Console Tree-navigate to Device Manager .Device Properties Tabs: General Basic info about device Device status shown (will reflect if any problems) Driver View details.1.1. STOP errors Miscellaneous Failures Any failures not fitting into above categories .Summary of all current & past issues & how they have been resolved 2.1 Device Manager: Control Panel | Classic Menu | Device Manager | Can also access via Computer Management Console: Right-Click Computer > Manage > opens CMC > click Device Manager in left pane To Install Non-Plug & Play device that’s not auto-detected: Device Manager Right-click computer name at top of device tree Click ADD LEGACY HARDWARE – starts Add Hardware Wizard 2.1. disable device Details Device properties – drop-down menu to select details to view Resources I/O range & IRQ Set basic configuration via drop-down list or manually enter. .1 TROUBLESHOOT POST-INSTALLATION CONFIGURATION ISSUES 2.Hardware Resources I/O Range Range of addresses thru which data is exchanged between device & computer IRQ Used to notify the CPU that it needs attention APIC (Advanced Programmable Interrupt Controller) manages IRQ settings Memory Range Specific area of computer’s memory allocated for that device to use .3 Reliability Monitor Start | Administrative Tools | Reliability & Performance Monitor | Reliability Monitor Control Panel | Classic View | Admin. etc. update/roll back/uninstall driver.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 2. Tabs vary by device – some have power settings.4 Problem Reports & Solutions Start | All Programs | Maintenance | Problem Reports & Solutions | View Problem History .

216 colors o Some legacy apps need compatibility settings set to run in 256-color mode .1. Configuring this may reduce # of colors displayed!! Management Monitor Monitor Tab | Advanced | set refresh rate Refresh Rate=how fast monitor updates image on screen Higher Refresh Rate=Lower screen flicker=Lower screen resolution… **SO generally want to set best preferred resolution & pick highest available refresh rate Troubleshoot **CHANGE SETTINGS button on Troubleshoot tab needs admin privileges > opens Display Adapter Troubleshooter > adjust hardware acceleration 2. it is used as primary display device Extend The Desktop Onto This Can drag windows from one screen to Monitor checkbox another . color intensity.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* o o - Monitor Size (Diagonal) Recommended Resolution 15” 1024 x 768 pixels 17” – 19” 1280 x 1024 pixels 20” and larger 1600 x 1200 pixels Users without admin privileges can change monitor resolutions Changed globally for all users.Advanced Settings Adapter Shows graphics adapter properties (as if viewing in Device Manager). At least one display adapter on the system has been disabled because its driver is not compatible with the driver for the VGA adapter o Display Settings Items unique to 2+ display system: Identify Monitors button Helps determine which is which (1 / 2) This Is My Main Monitor checkbox When that monitor is selected. not globally on the machine . Properties Clicking LIST ALL MODES shows all output resolutions & monitor frequencies available Color Maintains color relationships between devices connected.6 Visual Appearance Settings Right Click Desktop | Personalize | > Windows Color & Appearance > Desktop Background > Screen Saver > Mouse Pointers > Theme > Display Settings ***Personalizations apply ONLY to a single user’s profile.777. will get following error message: “Incompatible display driver has been disabled.Multiple Monitor Settings Desktop | Right Click | Personalize | Display Settings o Vista supports as many monitors as you have graphics adapters – BUT all graphics adapters need to use same chipset & same WDDM driver…if have two different types.Windows Color & Appearance o Change color settings. not user-specific – same goes for monitor refresh rates & number of colors displayed… Colors o 16-bit = 65. nothing new PAGE 9 OF 69 .536 colors o 32-bit = 16. transparency OR o Open classic appearance properties for more color options .Desktop Background – set images to be desktop image…same old settings.

2.0 32 bits per pixel 32-bit color must be supported If set 16-bit color.3. displays log on screen 2.ASK ME LATER -&.SHOW ME OTHER WAYS TO ACTIVATE) If Use The Automated Pone System.3 WINDOWS GENUINE ADVANTAGE 2. in Basic theme. need to enter password to unlock – on resume. WPA succeeds BUT this only happens once…any more than that & you need to contact the WPA hotline o You CAN change computer components once without forcing a reactivation…if you change multiple components at once. Vista auto-changes to Vista Basic interface Min. need to reactivate DO take the 30-day WPA grace period if you can & let the system configuration settle To Perform WPA: Start | Control Panel | System & Maintenance Click SEE THE NAME OF THIS COMPUTER Click ACTIVATE WINDOWS NOW Select method of activation (ACTIVATE WINDOWS ONLINE NOW -&. Hardware ID & Product ID are logged & WPA succeeds IF been used but Hardware IDs match.2.1 WPA (Windows Product Activation) Required Start | Control Panel | System | Windows Activation | click CHANGE PRODUCT KEY (forces immediate activation when clicked) Before WGA. title bar is always opaque o o o o Right Click Desktop | Personalize Window Color And Appearance Open Classic Appearance Properties For More Color Options Select WINDOWS AERO in the Color Scheme box 2.2 WGA Process - .2 Setting Aero as Desktop Theme 2. but can help with security… o Can set to lock when goes into screen saver. 64 MB graphics memory Can only display low resolutions with 64 MB.2 CONFIGURE AND TROUBLESHOOT WINDOWS AERO AERO HARDWARE REQUIREMENTS DirectX 9 Capable Generally not a problem unless upgrading & using old adapter Run DXDIAG.1 Aero Features 3D Window Cascade – WINDOWS KEY + TAB KEY Transparency available in Aero. Must have gone through WPA Process: o Unique Hardware ID generated based on hardware configuration o Product ID for Vista install media & Unique Hardware ID are sent to Microsoft o Microsoft checks servers to verify Product ID not already used IF HAS been used before & is linked with different Hardware ID. as is case on most laptops 2.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Screen Saver o No real need for them to protect screen.0 Set of mathematical routines in graphics adapter’s programming to create visual effects on a pixel-by-pixel basis *MOST adapters released after 2006 include HPS 2. find the available phone numbers & follow screen & phone prompts & enter the confirmation ID Initiated when download app or feature for Vista that requires a WGA check PAGE 10 OF 69 - 2. so do want more Can be shared memory. WPA fails IF never been used.exe to check if running DirectX 9 WDDM Driver Windows Display Driver Modem – specifically written for Vista Hardware Pixel Shader 2.3.

5. revision number.4. games. all time is allowed OK to exit Time Restrictions PAGE 11 OF 69 . revision date) o Encrypted primary HD volume serial number o DOES NOT collect personal info!! Once go through WGA Process.5 CONFIGURE AND TROUBLESHOOT PARENTAL CONTROLS 2.1 Parental Controls Limit web content. not an average! Component Measurement Processor Calculations per second Physical memory (RAM) Memory operations per second Graphics Windows Aero desktop performance Gaming Graphics 3D graphics performance Primary Hard Disk Disk data transfer rate 2. click on the User account to be configured Select ON. Custom) Block file downloads checkbox Check the box for ONLY ALLOW WEBSITES WHICH ARE ON THE ALLOW LIST to further block content Can EDIT THE ALLOW AND BLOCK LIST to enter specific sites OK to exit Web Restrictions In User Controls dialog box. which collects following info: o Computer make & model o OS version & any existing WGA software o Region & language settings o Unique WGA identifier created by add-on component o Encrypted version of Product Key & Product ID o BIOS info (name.1 Windows Experience Index Control Panel | Classic View | System | Windows Experience Index | Update My Score | Control Panel | Home | System & Maintenance | System | … Rating shown is based on lowest rated component.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - Add-on for IE is installed during WGA Process. hours. Medium. ENFORCE CURRENT SETTINGS to turn on Parental Controls Under Activity Reporting. vulnerabilities that could be exploited o Important – should be installed ASAP. no apparent exploits yet that take advantage of the vulnerability associated with the update o Moderate – fix usability problems. generally not security exploit related WGA is an ONGOING PROCESS – each time visit Update site. & programs accessible on a per-user basis Cannot apply Parental Controls to an Administrator account Requires administrator password to bypass Parental Control’s blocks Parental Controls rundown: Control Panel | User Accounts and Family Safety | Set Up Parental Controls For Any User | click Continue in the UAC box In the Choose A User And set Up Parental Controls dialog box. click on TIME LIMITS Click & drag to specify hours to block (shaded dark) – by default. None.4 SYSTEMS PERFORMANCE RATINGS TOOL 2. have to go through WGA! 2. select ON. COLLECT INFORMATIN ABOUT COMPUTER USAGE Click WINDOWS VISTA WEB FILTER Select BLOCK SOME WEBSITES OR CONTENT Choose Web Restriction Level (High. can download any Microsoft update from all categories: o Critical – should be installed immediately.

click ALLOW AND BLOCK SPECIFIC PROGRAMS In Application Restrictions dialog box. change settings affecting other users (outside of some display settings. as it’s not protected by UAC & no security prompts whatsoever!! Cannot make changes that may affect other users or computer security without entry of administrator account credentials Can’t install/uninstall software & hardware. or create password Disabled by default & should LEAVE DISABLED PAGE 12 OF 69 2. select from • User can use all programs – OR – • User can only us the programs I allow OK to close Applications Restrictions OK to close User Controls Close Parental Controls 2. that is…) Can use computer without access to other users’ personal files Can’t install software or hardware. change settings.e. change security settings.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* Click GAMES in the User Control dialog box | Click SET GAME RATINGS Block/Allow games with no rating Select ratings which are OK for user to play • Early Childhood • Everyone • Everyone 10+ • Teen… Scroll down to see the Block These Types of Content list • Can block all & then just allow “Some Adult Assistance May Be Needed” OK to exit Game Restrictions In Game Controls dialog box.5.3 Setting Up Users & Configuring System Access Administrator Accounts Standard Accounts Guest Accounts .5. click ENABLE & click Continue in UAC Click General Tab – make sure “Supervisor Can Type A Password To Allow Users to View Restricted Content” is selected Click CREATE PASSWORD – Enter password & confirm & OK OK to close the Content Advisor message box & Click APPLY Click the Ratings tab – automatically set with least likely to offend settings & blocks unrated content as well… Set access level (None. Limited. Unrestricted) for various categories Click Apply & Click OK to close Content Advisor & save settings Click OK on any message boxes that pop up & OK to close out of Internet Options Can make changes affecting other users (i.. OK to exit Game Controls In User Controls. access all files) *NOTE: built-in administrator account also exists. select from: • User Rating Setting • Always Allow • Always Block OK to exit Game Overrides. click BLOCK OR ALLOW SPECIFIC GAMES For each game in the Game Overrides dialog box.2 Content Advisor Supervisor password is supplied/activated when configure Content Advisor – if enter the password. can view web content that is being blocked To Configure Content Advisor (NOTE: settings apply per machine NOT per user): Internet Explorer | TOOLS button | Internet Options | Click Content tab Under Content Advisor. but disabled by default. install hardware & software.

automatically logs user off at end of allotted time Activity Reports o Control Panel | User Accounts & Family Safety | Parent Controls | View Activity reports o To turn ON activity report logging: Control Panel … | Parental Controls | click/open User account | select: ON.2 Configuring RSS Feed Updates Aggregator – aka news aggregator or feed reader – client software that uses a web feed to poll news feed sites & retrieve syndicated web content.When subscribe to a feed. - 2.6.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 2. they will be listed Click on SUBSCRIBE TO THIS FEED link From the Create In drop-down list.5 Controlling Program Access - - 2. select Microsoft Feeds Click NEW FOLDER & type new name for Feed Click CREATE Click SUBSCRIBE 2..4 Web Browsing Issues Time Limits – specify logon hours to allow (select times/days of week) & rest blocked. o Can also use Parental Controls to control website access on a user.5. block/allow downloads.5.1 Managing RSS Subscriptions .6 Addressing Gaming Issues - - 2. select age ratings. set up content filters.specific basis Parental Controls – can specify programs a child can use o Can select/permit ALL programs & then clear/block any unwanted programs…OR o Can unselect/clear all & select ONLY the programs you want them to run Parental Controls | click child user’s account | ensure ON.5. Works in PAGE 13 OF 69 . IE7 adds to common feed list.6. .5. checks website settings/ratings as users visit them.Subscribing to a feed: Click FEEDS button If more than one feed provided by website. etc.6 CONFIGURE WINDOWS INTERNET EXPLORER 2. updated info is automatically downloaded. age rating & content rating) Are all programs blocked & some allowed may block critical programs Advise clients of proper age ratings. or block/allow specific websites o Content Advisor – automatically blocks unrated websites (unless specifically configured otherwise).7 Troubleshooting Parental Controls & Content Advisor - 2. Collect Information about computer usage o Can monitor child’s online activities Website Access o Can restrict websites. ENFORCE CURRENT SETTINGS is selected | click ALLOW AND BLOCK SPECIFIC PROGRAMS | select PERSON’S NAME CAN ONLY USE THE PROGRAMS I ALLOW… Can block: o All games o Specific chosen games o Specific games based on age ratings o Specific games based on content ratings Can use blocks in combination (i.e.

Clouds – web service that notifies aggregator of feed updates & eliminates need for periodic polling.4 Configuring IE7+ Search Bar & Search Providers * Type keyword/phrase into Search bar & press ALT+ENTER to open in new tab! .Click arrow to right of Search Bar & select FIND MORE PROVIDERS to add/change . orientation.6. Print Preview Page Setup – print vertically (portrait) Page Setup – print horizontally (landscape) Change paper size. margins. specify headers or footers Turn specified headers or footers on/off Stretch/shrink page size to fill printed page (replaces zoom in previous IE’s) Adjust margins by dragging horizontal or vertical markers Print webpage Print Preview-specific controls (only affect view. not printing) View Full Width / Full Page Show Multiple Pages Specify The Page To Display Display The First / Previous / Next / Last Page Specifying Headers & Footers Print Preview / Page Setup –user can change or turn off a website’s header/footer To Print This: Type This: Window Title &w Page address (URL) &u Date in short format &d Date in Long Format &D Time &t Time in 24-hour format &T Current page number &p Total number of pages &P Right-aligned text &b <text to right align> Centered text &b <text to center> &b A single ampersand (&) && Troubleshoot Print Preview Issues Check the Stretch/Shrink The Page Size to Fill The Printed Page default Margins dragged out of whack? 2. Pull system – user receives email that feed is updated & then can go online to download updates for later reading. Push system.To add a search provider to IE7+ beyond the current browsing session type TEST into the website’s search box on that page & copy the resulting URL Click arrow to right of Search bar Select Find More Providers Add Search Providers To Internet Explorer 7 Paste the copied URL into the Create Your Own section Name the search provider Click on INSTALL PAGE 14 OF 69 . Checks for new content & regularly downloads updates.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - background while user is online.6.3 Configuring Print & Viewing Controls - - - - 2. should use bandwidth more efficiently.

CONFIGURING WINDOWS SECURITY FEATURES 3. search for “Compatibility Wizard” | click START THE PROGRAM COMPATIBILITY WIZARD link | Click the CLICK TO OPEN THE PROGRAM COMPATIBILITY WIZARD link The Welcome screen appears – click NEXT Select an option – generally want to select “I WANT TO LOCATE THE PROGRAM MANUALLY” from the list & click NEXT & then BROWSE • Can select from: o I want to choose from a list of programs o I want to use the program in the CD-ROM drive o I want to locate the program manually Select legacy program you want to run & click NEXT Select OS that is recommended for the program. click ALLOW If configured correctly.MSC | OK ) Continue Expand LOCAL POLICIES Select SECURITY OPTIONS Double-click USER ACCOUNT CONTROL: BEHAVIOR OF THE ELEVATION PROMPT FOR ADMINISTRATORS IN ADMIN APPROVAL MODE Select PROMPT FOR CREDENTIALS & click OK To Enable the Built-In Administrator Account: Log on with an Administrator account Start | All Programs | Administrative Tools | Computer Management | Continue TIP: can right click on right pane & click on CREATE NEW USER Expand LOCAL USERS AND GROUPS Click on USERS Right-click on the built-in Administrator account & select PROPERTIES In the GENERAL tab. OR OS on which it ran well Specify the display settings & click NEXT • 256 colors • 640x480 screen resolution • Disable visual themes • Disable desktop composition • Disable display scaling on high DPI settings Select RUN THIS PROGRAM AS AD ADMINISTRATOR check box & click NEXT To finalize settings. if yes. click on NEXT & in the UAC dialog box.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 3. legacy program should run When prompted by Vista as to whether the compatibility settings are satisfactorily configured. select YES. try different compatibility settings o No. I am finished trying compatibility settings PAGE 15 OF 69 - - . clear the ACCOUNT IS DISABLED checkbox & click OK Configuring Legacy Software to run in Vista: Log on with an Administrator account Start | Control Panel | Category View | Programs | Programs & Features | “User an older program with this version of Windows” (OR in Windows Vista Help & Support.1 CONFIGURE AND TROUBLESHOOT USER ACCOUNT CONTROL Increasing UAC security to always prompt for admin credentials: Log on with an Administrator account Start | All Programs | Administrative Tools | Local Security Policy (OR Start | Run | SECPOL. SET THIS PROGRAM TO ALWAYS USE THESE COMPATIBILITY SETTINGS & click NEXT • Can also choose from: o No.

*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - You can choose to send info about your settings to Microsoft (yes/no) & NEXT Click FINISH to close the wizard.2 Running User Accounts as Standard Users - 3. a simple Continue/Cancel window shows (or standard users are prompted for credentials) Secure Desktop – when a UAC window appears. user logs on in Admin Approval mode. a UAC “an unidentified program wants to access your computer – Cancel or Allow” window appears If application that IS digitally signed. which prompts for consent Behavior of Elevation Prompt for Administrators in Admin Approval Mode Prompt For Consent (default) – prompts user to Continue or Cancel PAGE 16 OF 69 3. NOT to be run for Antivirus programs. usually run if the Program Compatibility Assistant doesn’t fix the issue. Administrator accounts belong to Administrators and Users groups – run as standard users except when performing administrator tasks Standard accounts are members of the Users groups.1 Backward Compatibility - - 3. does NOT prompt for approval to run an administrator task IF PC is not part of Active Directory & is a stand-alone or workgroup computer. cannot perform administrator tasks. can use Local Security Policy console to configure UAC.4 Using Local Security Policies to Configure User Account Control - - . Disk utilities. when task is completed.1. Backup programs.MSC | CONTINUE | expand Computer Configuration | expand Windows Settings | expand SECURITY SETTINGS | expand LOCAL POLICIES | click SECURITY OPTIONS -OR. or roll back NOTE: Vista locks down registry & file system – UAC provides registry & file system virtualization services that silently redirect read & write operations from protected portions of the registry & file system to unprotected locations in the user’s profile. when turned on.ADMINISTRATIVE TOOLS | LOCAL SECURITY POLICY | LOCAL | SECURITY | Admin Approval Mode for Built-in Administrator Account Default is DISABLED – can run all apps by default If ENABLED.1. UAC facts: If an admin tries to execute an application that’s NOT digitally signed or validated. or other system programs Drivers – sometimes compatibility issues are due to drivers – update drivers.1. Vista takes screenshot of desktop & switches to Secure Desktop…you can’t do anything outside of the UAC dialog box Program Compatibility Assistant – feature of Vista that runs automatically if detects compatibility problem when a legacy program is run Program Compatibility Wizard – has to be run manually on a program if compatibility issues are noticed. user returns to normal standard user status The built-in Guest account is a member of the Guests group – turned OFF by default.1. Access via: RUN | GPEDIT. run as standard users Built-in Administrator account is member of ONLY the Administrators group – does not run as standard user account & ALWAYS has elevated privileges. Standard users can perform most (but not all) administrator tasks by entering administrator credentials when prompted Windows Vista Admin Approval Mode – both administrator & standard user accounts run by default as standard users Standard users supply admin credentials (password of an admin account.3 Elevating User Privileges - 3.

1. redirects to locations in the user’s profile. turns on consent dialog boxes for administrator tasks Disabled – turns OFF UAC!!! Need to reboot to change this setting Control Switch to the Secure Desktop When Prompting for Elevation Enabled – default setting.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - - - - - Prompt for Credentials – prompts user to enter password Elevate Without Prompting – gives an administrator same privileges (ala XP) as the built-in Administrator account. turns off access to the desktop & rest of Vista until deal with the UAC dialog box prompt Disabled – dangerous. an application can launch with UIAccess integrity only if it resides in a secure location in the file system.5 Troubleshooting UAC & Program Compatibility - . with no prompts for elevated tasks Behavior of Elevation Prompt for Standard users Prompt For Credentials (default) – prompts user to select admin account & enter password Automatically Deny Elevation Requests – access denied message received when standard user tries to perform an operation that requires administrative privileges – generally used in an Active Directory domain Detect Application Installations & Prompt for Elevation Enabled (default for admin) – UAC detects application installation packages that need elevated privileges to install & automatically triggers an elevation prompt (type of which is dependent upon the type of user account logged on) Disabled – generally done in an enterprise environment to prevent standard users from installing software or where GPSI/Group Policy Software Install or SMS/Systems Management Servers are used Only Elevate Executables That Are Signed and Validated Determines whether UAC enforces PKI (public Key Infrastructure) signature checks on any interactive app that requests privilege elevation Disabled – does not enforce PKI certificate chain validation before an executable can run Enabled – PKI certificate chain validation is required to run an executable Only Elevate UIAccess Applications That Are Installed in Secure Locations Enabled – default setting. can lose the UAC dialog box in the shuffle…but useful if want to take screenshots of the UAC dialog boxes! Virtualize File and Registry Write Failures to Per-User Locations Enable – default – virtualized the registry & file system for legacy applications that try to read or write from private parts of the system. such as: • xxx\Program Files\…including subdirectories • xxx\Windows\system32\r• xxx\Program Files (x86)\…including subdirectories for 64-bit versions of Windows Disabled – application can launch with UIAccess integrity even if it doesn’t reside in a secure location in the file system Run All Administrators In Admin Approval Mode Enabled – default. typical legacy write-to spots: %Program Files% %Windir% %Windir%\system32 HKLM\Software\ Disable – NOT RECOMMENDED Check Group Membership via: Computer Management | System Tools | Local Users & Groups | PAGE 17 OF 69 3.

2. changing settings immediately without knowledge/consent) Medium Potentially affect privacy or make changes to Review alert details..2 CONFIGURE WINDOWS DEFENDER 3.Also alerts users when program tries to change important Windows settings Alert Level What Has Been Detected What You Need To Do Severe Widespread or exceptionally malicious programs Remove software (viruses. computer that could affect “computing experience” consider blocking or settings removing software Low Might collect info about you or computer or change Usually benign unless how computer works BUT is operating according to installed without your license terms you agreed to knowledge/consent Not Yet Typically benign unless installed without your Usually OK unless you Classified consent/knowledge don’t recognize it Available alert level actions (depending on the alert level shown): Ignore Allows software to be installed or run Quarantine Moves software to another location on computer & prevents from running until restored to original location or until removed Remove Permanently deletes/removes software Always Allow Adds to the Windows Defender allowed list & allows to run. ONLY do this is you’re SURE it’s okay Actions Available When Alerted that Software is Attempting to Change Important Windows Settings: Permit Always allow software to change security-related settings Deny Prevents software from changing security-related settings To Configure real-time protection: Control Panel | Programs | Windows Defender | Tools | Options Control Panel | Security | Windows Defender | Tools | Options Can choose software & settings you want Windows Defender to monitor BUT Microsoft highly recommends you use all of the real time protection options or AGENTS Real-Time Protection Purpose Agent Auto Start Monitors programs allowed to automatically run when computer is started System Configuration Monitors security-related Windows settings (Settings) - PAGE 18 OF 69 .1 Real-Time Protection .Alerts users when spyware/potentially unwanted software tries to run . no longer get alerts from Windows Defender about this software. worms. etc) that affect privacy & immediately computer security & could damage computer High Potentially collect personal info & affect privacy or Remove software damage your computer (i.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Does the user’s group have sufficient privileges? Are they member of Administrators group? Check Software Status If UAC set to only allow signed/validated executables & the exe is UNsigned… Check the UAC Settings UAC is configured on a PER-COMPUTER BASIS – user experience will vary from PC to PC 3.e.

*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* Internet Explorer Addons Internet Explorer Configuration (Settings) Internet Explorer Downloads Services & Drivers Application Execution Application Registration Windows Add-ons Monitors programs that automatically run when IE7+ is started Manages browser security settings Monitors files & programs designed to work with IE7+.Configuring Administrator Options Located below the Advanced Scanning Options in Windows Defender Options - PAGE 19 OF 69 . SpyNet – if join. etc. but spyware can install Folders For Potential Threats itself in these locations too Use Heuristics To Detect Potentially Harmful Uses Heuristics (educated guesses based on Or Unwanted Behavior By Software That Has behavior patterns) to alert about software Not Been Analyzed For Risks not yet listed in a definition file Create A Restore Point Before Applying Can restore system settings if you Actions To Detected Items accidentally remove software you wanted to keep (or if Defender auto-removes it) Do Not Scan These Files Or Locations Specify files/folders you don’t want Defender to scan .2.3 Configuring Custom Scans Windows Defender | click Arrow next to SCAN button | click CUSTOM SCAN | SCAN SELECTED DRIVES AND FOLDERS | click SELECT | OK | SCAN NOW . ActiveX controls & installers Monitors services & drivers. i. potentially unwanted software. multimedia. i.e. browsing.Choosing Advanced Scanning Options Windows Defender | TOOLS | OPTIONS | ADVANCED OPTIONS Available Advanced Options: Scan The Contents Of Archived Files And Increases scan-time. which may have access to important routings in the OS Monitors when programs start & operations they make while running Monitors tools & files in the OS Monitors add-on programs. productivity.e.2 Internet Explorer Integration Integrates with IE7+ to scan files when downloaded. Windows Defender automatically sends info to Microsoft about spyware. software utilities for security. can block suspicious downloaded files when user tries to execute them Defender also integrates with SpyNet & with Windows Live OneCare (subscription) Windows Live One Care: Automatically optimizes PC Regularly backs up files & settings Virus & spyware scanners Managed 2-way firewall Regularly defrags Manages security updates Runs continuously in background Can also run/scan on demand 3. & software not yet analyzed for risks & what actions you perform on them & shares this info with the community to better understand the program/software and update their ratings for it 3.2.

4 Working With Windows Defender Definitions - - 3. all users are alerted (if Windows Defender is on) when spyware/potentially harmful software tries to install/run on the computer…BUT…if ONLY this option is selected. or Notifying Me About Updates To check for new spyware definitions before performing scheduled scans: Windows Defender | TOOLS | OPTIONS | scroll to AUTOMATIC SCANNING | make sure checkbox is checked for CHECK FOR UPDATED DEFINITIONS BEFORE SCANNING | SAVE | CONTINUE Troubleshooting Definition Update Issues Check scan times – during daytime with high computer usage = bad performance experience for user Is computer turned off when scans or updates are scheduled? NOTE: optional updates are NOT downloaded or installed automatically – must be done manually Check Defender Activities: Windows Defender | History | Check Defender updating & other security info via: Control Panel | Security | Windows Security Center | Check Security Status | • Firewall • Automatic Updating • Malware Protection o Virus Protection o Spyware & other malware protection • Other Security Settings o Internet security settings o User Account Control To perform manual uninstall: If Defender informs you that it can’t remove spyware automatically & you can’t remove it manually by other instructions provided by Defender. click on UNINSTALL A PROGRAM IN CONTROL PANEL & remove it from there PAGE 20 OF 69 3. Installing. allows all users to scan. configure. not just Defender definition files) | Recommended Updates | Checkbox for: Include Recommended Updates When Downloading. Controlling Definition Downloads All Programs | Windows Updates | Change Settings | (settings apply to ALL updates.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - If Select the USE WINDOWS DEFENDER check box. and review Defender activities Scheduling Windows Defender Scans Windows Defender | TOOLS | OPTIONS Can’t schedule custom scans.5 Troubleshooting Spyware Removal - .2.2. but can schedule Quick Scans or Full System Scans Recommended to do a daily quick scan Based on alert level. elevated privileges are required to configure Windows Defender & determine when scans occur If you also select the ALLOW EVERYONE TO USE WINDOWS DEFENDER check box. can select to: • Automatically remove spyware & other potentially harmful software if detected during a scan • Ignore items • Perform a default action that Windows Defender determines based on the definition of the software detected CANNOT select a default action for severe alert ratings because Defender automatically removes it.

mouse pointer.3 CONFIGURE DYNAMIC SECURITY FOR INTERNET EXPLORER 7 3. favorites you didn’t add on your browser Home page. by who - 3. Local Intranet & Restricted Sites BUT NOT for Trusted Sites “Internet Protected Mode: ON” Icon appears in browser status bar (bottom right of browser window) – double click this icon to change settings IE7+ also warns users when web pages try to install software outside of the browser and outside protected mode NOTE: a browser that’s infected in Protect Mode does not stay infected – when you close & restart the browser. All Users Startup folder or Registry) Ships With Operating System Indicates if program installed as part of Windows Vista Classification Indicates whether program has been analyzed for risks to privacy & security Digitally Signed By Indicates if software is digitally signed and if so. links.Displaying Software Explorer Details Title Description Auto Start Indicates whether program is registered to start automatically when Windows starts Startup Type Location where the program is registered to start automatically (i.6 Managing Applications by Using Software Explorer Windows Defender | TOOLS | SOFTWARE EXPLORER | CONTINUE | SHOW FOR ALL USERS **NOTE: “SHOW FOR ALL USERS” button won’t appear if you only have one user account enabled on your Vista PC Software Explorer Category drop-down list: Startup Programs Programs that run automatically when Windows starts Currently Running Programs Programs currently running on the screen or in background Network Connected Programs Programs/processes that can connect to the internet or to a home/office network Windows Sockets (Winsock) Programs that perform low-level networking & communications services for Windows & programs that Service Providers run on Windows .*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - If still see evidence of spyware after uninstall. try rolling back to Restore Point OR might need to reinstall the OS Evidence of Spyware New toolbars.1 Resolving Protected Mode Issues Prompts user every time a program running in the browser needs to write to areas other than Temporary Internet Files folder Enabled by default for Internet.2.3. have following ratings: Permitted – has a link to learn more about the item Not Yet Classified – can submit the program to SpyNet for further analysis Potentially Unwanted – has a link to learn more about the item . or search program changes Website redirection Pop-ups Computer running slower 3. it flushes the infection! PAGE 21 OF 69 .For each type of item..e.. remove. etc.

5 Configuring Privacy Settings .3.3. blocks most pop-ups – user can still see a pop-up by clicking the IE7+ Information bar NOTE: some pop-ups are legit – needed for banking/payment websites & for Outlook Web Access to reply to messages Internet Explorer | Tools | Pop Up Blocker | Pop Up Blocker Settings | Can enter exceptions on the Allowed sites list Can set Filter Level too • High: Block All Pop-ups (CTRL+ALT to override & opens in a new window) • Medium: Block Most Automatic Pop-ups (default) • Low: Allow Pop-ups from Secure Sites Can set so opens pop-ups in a new tab in same window if you wish: • Tools | Options | General tab | Tabs Section | Settings | Always Open PopUps In A New Tab To add a site to Trusted Sites zone or Restricted Sites zone: Navigate to the Page Tools | Internet Options | Security tab | • Internet • Local Intranet | Advanced | can specify sites manually instead of automatically detecting intranet network • Trusted Sites | click on SITES | ADD | CLOSE | OK o Check status of the “Require Server Verification (https:) For All Sites In This Zone” – if checked. ONLY can add secure sites & not regular http: sites – set to ON by default • Restricted Sites | click on SITES | ADD | CLOSE | OK Five levels of predefined security settings for security zones: High – applies to Restricted Sites zone Medium-High – applies to Internet Medium – applies to Trusted Sites Medium-Low – applies to Local Intranet Low Can change default setting for a zone by dragging the slider control Can also click on RESET ALL ZONES TO DEFAULT LEVEL Can also set custom levels by clicking on zone & clicking on CUSTOM LEVEL Allows specific options/settings.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 3.3 Using the Pop-Up Blocker - 3.4 Utilizing Security Zones - - - Configuring the Phishing Filter Helps determine whether a website is legit or a phishing site – blocks websites & cautions users about reported & suspected phishing sites Enabled by default: Internet Explorer | Tools | Phishing Filter Settings Checks known lists AND uses heuristics too When Automatic Web Checking is ENABLED & comes across a suspect site: RED warning – appears if site is confirmed phishing site – can CONTINUE or CLOSE • Can click on REPORT THAT THAIS IS NOT A PHISHING WEBSITE YELLOW warning – appears if site has characteristics similar to known phishing sites (not yet confirmed as bad) • Can click on REPORT WHETHER OR NOT THIS IS A PHISHING WEBSITE ENABLED by default. but be careful… NOTE: IE7 Security Settings are PER USER & NOT PER PC!! Internet Explorer | Tools | Internet Options | Privacy Tab | (Default = MEDIUM) PAGE 22 OF 69 3.

3. firewall analyzes & either drops traffic or allows to pass Vista Firewall functions in bidirectional manner PAGE 23 OF 69 .Secure Websites Security Certificate – electronic document that identifies a website When access secure website in IE7+.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* Cookie Types Temporary/Session Cookies Persistent/Saved Cookies First-Party Cookies Third-Party cookies Removed from computer when browser closes – used to store temp info (i. Can be Persistent or Temporary. Browser help objects.6 Managing Add-Ons Tools | Manage Add-Ons | Enable or Disable Add-Ons Find More Add-Ons Add-Ons can be: toolbars. shopping cart) Remain on computer after browser closes – used for sign on info. Browser extensions… Use the SHOW drop-down menu to select from following: Add-ons that have been used by Internet Explorer Add-ons currently loaded in Internet Explorer Add-ons that run without requiring permission Downloaded ActiveX Controls (32-bit) To temporarily disable Add-Ons: Start | All Programs | Accessories | System Tools | select INTERNET EXPLORER (NO ADD-ONS) - - 3. come directly from a website a user is viewing Come from other websites’ advertisements that are on the website the user is viewing Settings for Cookie Handling: Block All Cookies Even ones already stored on a computer High Blocks cookies from sites without compact privacy policy Medium-High Block Third-Party & tracker cookies without explicit consent Medium (Default) Block those with no privacy policy Restricts private info collected Low Restricts information collection without consent Blocks sites without privacy policy Accept All Cookies BAD!!!!! Can also block/allow cookies for specific sites: Tools | Internet Options | Privacy Tab | Sites | type url & click BLOCK or ALLOW | To disable automatic cookie handling. click on ADVANCED | Advanced Privacy Settings | select the OVERRIDE AUTOMATIC COOKIE HANDLING checkbox .4.4 CONFIGURE SECURITY SETTINGS IN WINDOWS FIREWALL 3.Privacy Policies To View a site’s Privacy Policy. etc. ActiveX controls.e.1 Firewall Basics When traffic reaches firewall. password. click PAGE | Select WEB PAGE PRIVACY POLICY | opens the Privacy Report dialog box Clicking the SETTINGS button from the Privacy Report dialog box shows you the privacy settings on your computer . display a lock in the Security Status bar at top of browser window – clicking on the lock allows user to view security report 3.

modem. “Home” = Private Public Profile – activated when Private or Domain profiles do not apply.4. or FireWire connection NLA – assign profile based on network environment (Private – Public – Domain) Private Profile – becomes active when network types of all active network connections are categorized as Private by NLA. 80 is used for internet traffic & 25 is used for email transmission) IPSec (Internet Protocol Security) – method of securing internet traffic using encryption & digital signing. can restore default settings Configuring Exceptions Windows Firewall | CHANGE SETTINGS | click on EXCEPTIONS tab | Can select program on the list OR Add Program OR Add Port When Add Program or Port. provides sender verification Network address – unique to each computer on a network Inbound traffic – network data that comes from an external computer & is addressed to your computer Outbound traffic – network data your computer sends to other computers on local or remote networks through a network interface Network interface – can be a LAN. VPN.e.4. wireless. can Change Scope to apply to • Any Computer • My Network (subnet) only • Custom List (enter IP addresses or MAC addresses) Click OK & Click OK to close Add a Program/Port dialog box Main differences with advanced vs.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Incoming traffic is dropped if no rule allows it to pass Full Stealth – feature that stops an external host from performing an OS fingerprint (one of the first steps in an attack) – cannot be disabled Boot time filtering – new feature of Vista Firewall – network interfaces are protected as soon as they become active Terms: Protocol: TCP & UDP • TCP – more reliable & used for majority of internet traffic • UDP – used for broadcast & multicast & online gaming Port – TCP or UDP info. regular Configure outbound & inbound exceptions Edit & apply firewall configuration for ALL network profiles Configure separate rules for IPSec traffic 3.3 Windows Firewall - - 3. used to map network traffic to particular services or programs (i..2 Profiles & Network Location Awareness - 3. firewall rules are most restrictive with this setting Domain profile – activated when computer has authenticated with a domain controller on all active network interfaces NOTE: can ONLY check the Firewall settings for the current network profile (whether Public/Private/Domain) Checking & Modifying the State of Windows Firewall Can enable/disable Windows Firewall on a per-connection basis or completely Control Panel | Classic View | Windows Firewall | check details | click on CHANGE SETTINGS | NOTE: if click “block all incoming connections” check box.4. trumps the exception list and EVERYTHING is blocked If Click on the ADVANCED tab.4 Windows Firewall With Advanced Security - PAGE 24 OF 69 .

specify TCP or UDP & the port number(s). also possible to choose ALL programs here IF selected Port.Used to isolate groups of computers from others on the network Authentication .Creates encrypted tunnels across the internet Importing & Exporting Policies Windows Firewall With Advanced Security | click on that in the file tree | click “Import Policy” or “Export Policy” in the Actions section on the right hand side of the console PAGE 25 OF 69 . Port. also possible to choose ALL ports Specify what firewall should do when traffic meeting that criteria is encountered • Allow The Connection • Allow The Connection If It Is Secure • Block The Connection Click NEXT & enter a Name & Description | Connection Security Rules Special rules that deal with IPSec traffic Four Types of Connection Security Rules Isolation Rule . Predefined.Usually used in conjunction with an isolation rule to allow exceptions to that rule Server-To-Server Rule .Protect connections between servers (i.Prevents a Vista computer from authenticating connections Exception Rule from computers specified in the rule .. Kerberos V5… Configuring Inbound and Outbound Rules Open Windows Firewall With Advanced Security | right click type of rule to configure | select NEW RULE | opens New Inbound/Outbound Rule Wizard (OR go to Action. New Rule) Select Rule Type – Program. presented with program page – select program & path for which the rule will apply. between web server app & a database hosting credit card info) Tunnel Rule .Isolates Vista computers based on authentication credentials such as a common domain . Custom Rule – & click NEXT IF selected Program.e.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - - - Access via: Start | Control Panel | Classic View | Admin Tools (or All Programs | Admin Tools | ) Open Windows Firewall With Advanced Security | Continue | To change settings for Windows Firewall With Advanced Security via MMC: Run | MMC | File | Add Snap In | Right Click Windows Firewall With Advanced Security node at the top right of the console | Select PROPERTIES | Can turn off/on inbound & outbound connections on a per profile basis Clicking CUSTOMIZE opens the Customize Settings For The Selected Profile dialog box | configure: • Firewall notification • Unicast response • Rule merging (if applicable – if have group policy) Clicking on the IPSec Settings tab allows you to configure: • Key Exchange – Default is recommended • Data protection – Default is recommended • Authentication Method settings – Default.

compares to route table & decides what action to take .255. an Active Directory directory service domain controller uses multicasting to replicate Active Directory information to other domain controllers .1 Introduction to Networking & TCP/IP Internet Protocol (IP) .1 CONFIGURING NETWORKING BY USING THE NETWORK AND SHARING CENTER 4. not on test) .xxx. CONFIGURING NETWORK CONNECTIVITY 4. provides diagnostic tools (ping.Resolves IP address to MAC addresses .txt” : displays Connection-specific DNS Suffix Link-Local IPv6 Address IPv4 Address Subnet Mask Default Gateway – IP address of router connection on the same subnet as the IP address of the host computer – datagrams pass through the routing device (router/server/wireless router) on their way to the internet .1.TRACERT: checks connectivity to device on another network & gives details of hops .Datagram = incoming/outgoing packets – each includes sender’s source IP address & destination IP address of recipient .IPv6 is automatically configured .IP examines destination address.16. .Run | cmd | “ipconfig > ipconfig. can merge 2+ contiguous subnets (extra info.Subnets are connected by a router .NOTE: ICMP may be blocked by firewall – might need to allow ICMP in one or more firewalls or turn firewalls off .For example.16. then network address of subnet is 10.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 4. adjusts flow control to prevent link or router saturation.By adding ones to the end of the ones in the subnet mask.16.10.0 & IP address is 10.Provides maintenance & routing facilities for P .xxx – can ping your gateway IP address to test connection .Can display MAC address using “ipconfig /all” Subnetting Supernetting Internet Control Message Protocol (ICMP) Internet Group Management Protocol (IGMP) Address Resolution Protocol (ARP) PAGE 26 OF 69 .PING: Run | cmd | ping xxx.255.Encapsulated within IP datagrams & can be routed throughout a network .xxx.10.Each subnet has own subnet address within network & own gateway or router connection . tracert) .Controls packet sorting & delivery (routing). performs router discovery.Supports IP multicasting (group of hosts ID’d by one multicast address) .0 & broadcast address is 10. can split into smaller subnets (extra info) By changing one or more ones at the end of the ones in the subnet mask to zero.SOME subnets can connect to more than one router .Builds & maintains route tables.If Subnet is 255.MAC = 6 byte (48-bit) .143.10.255 .

255.255. any other network.Used by NT & early Windows .0.1 – (192.0.254-255.One to one communication with defined start & end points .x. sooooo… .x. browsing.1 – 192.Uses multicast Neighbor Solicitation messages in lieu of ARP broadcasts . as UDP does not guarantee delivery . 169.254.0.Resolves NetBIOS names to IP addresses .Use one public IP address for many devices on a private network .254 with 255.255.x .Does NOT send IP datagrams to.255 169. are issued ONE public IP address for a whole network to use Reserved IPv4 addresses for Private Networks 10.255.ca --> 1xx.254) 4. If have ICS set up. etc.1 – 172.Provides a dynamic database .0.169.Assigns IP addresses & handles IP address leasing & renewal .254 192.254 172.0.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* IPv6 Transmission Control Protocol (TCP) User Datagram Protocol (UDP) Dynamic Host Configuration Protocol (DHCP) Domain Name Service (DNS) Automatic Private IP Addressing (APIPA) Network Services Windows Internet Name Service (WINS) Network Address Translation (NAT) -128 bits vs.0/12 172. IPv4’s 32-bits .0.168.Connectionless .google.Does NOT configure a default gateway .0/16 192.31.One-to-many communication .Automatically assigns IP addresses to DHCP enabled hosts .255.Uses handshake protocol . (Internet Connection Sharing) uses 192.168.2 Connecting To A Network Most often.168.16.Use broadcast & multicast IP datagrams .254.Commonly used for email. Windows set to receive IP configuration automatically…to check settings: PAGE 27 OF 69 .Translates between private/internal addresses & public addresses .1. or receive them from.1 – 169.Configures internal private network when DHCP not provided .Resolves local host names & fully qualified domain names to IP addresses (www.254 . adding a computer to an existing network & DHCP service probably already exists on network. streaming video . File & Print Sharing.0.1-192.Most often.0.1 – 10.Applications need own reliability monitoring.138. the computer on your network that directly access the modem automatically configures all the other computers on its LAN ICS: Internet Cable (DSL/Cable/phone) > Modem > PC > Router > Other PCs By Default.Used for Log on.0/8 10.Replaces IGMP with Multicast Listener Discovery (MLD) messages .DDNS – Dynamic Domain Name Service – uses dynamic database & enables dynamic updates .Connection based .Can also specify IP address of default gateway(s) & DNS server(s) .255.0.0 subnet mask .254. .0.

might need to also change that on any computers added to the network .3 Setting Up A Network Connection . other computers on a wireless SOHO connect to the internet via the first computer configured on the network…need to enable ICS on that computer Network & Sharing Center | click MANAGE NETWORK CONNECTIONS Right click the connection you want to share | Click PROPERTIES Continue Click the SHARING tab | select “Allow Other Users To Use This Connection” Can also click Allow Other Network Users To Control Or Disable The Shared Internet Connection” box Can also allow other network users to use services running on your network by clicking SETTING | select services you want to allow .4 Adding A Wireless Device to a Network If have a wireless network. your LAN connection is configured with a new static IP address (192.When configure ICS.1.TYPICALLY.To connect to the internet (for the first computer that’s connected to a modem) Network & Sharing Center | Set UP A Connection Or Network | Connect To The Internet | Next | Select method (PPPoE for example) Enter User Name & Password Select “Allow Other People To Use This Connection” to share Enter a Connection Name Click CONNECT .If you’ve change the default workgroup name (WORKGROUP) on your network.1) is used as the default gateway for the subnet. . can run the SET UP A WIRELESS ROUTER OR ACCESS POINT WIZARD on one computer already on the network & save settings to a USB flash drive PAGE 28 OF 69 .*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Control Panel | Network And Internet | Network And Sharing Center | Click VIEW STATUS beside the Local Area Connection that connects to the SOHO network OR – Network And Sharing Center | click MANAGE NETWORK CONNECTIONS | right click the Local Area Connection | click PROPERTIES Select “Internet Protocol Version 4” & click PROPERTIES Default is “Obtain IP Address Automatically” & “Obtain DNS Server Address Automatically” SIDENOTE – need to install Link Layer Topology Discovery on XP systems if want to see them/be seen by Vista Hybrid network = WAP typically connected to modem & computers are connecting using wired connections to Ethernet ports on the WAP as well as wirelessly WAP – Wireless Access Point Provide internal DNS services Forwards any datagrams via modem to ISP for external DNS resolution specify name for your network: Network & Sharing Center | click CUSTOMIZE | select Private or Public | Type a Network Name | Next | Close .If want to set up a VPN: Windows Help & Support Search for “set up a connection to your workplace by using VPN” Opens the Connect To A Workplace Wizard Enter internet address & name… 4.0. The static address (192.1 perhaps) & other settings (subnet mask & default gateway & DNS Server address).

not on test… 4.11g 2.11g Up to 54 Mbps More simultaneous users than 802.11a Up to 54 Mbps More simultaneous users than 802.11a & 802. click NO.11b Smaller signal range & not easily obstructed Relatively expensive Backward compatible with 802.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* Wireless Network Setup Wizard runs automatically when the USB flash drive is inserted Control Panel | Network And Internet | Network & Sharing Center | Set Up A Connection Or Network | Set UP A Wireless Router Or Access Point | NEXT | NEXT| Continue | searches for wireless access device by running the Detecting Network Hardware And Settings Utility | when prompted if you want to turn on network discovery for all private networks.11b More easily disrupted signal Not compatible with 802.11b Up to 11Mbps Good signal range Low Cost Allows fewer simultaneous users than 802.1.11n Up to 300 Mbps Draft format currently.11b Smaller signal range than 802.5 Managing Network Connections Right click the Connection | click on STATUS | Network Connection Details are shown Shows info similar to ipconfig info PAGE 29 OF 69 . access points 5 GHz Frequency 50’ / 15 meters indoors 100’ / 30 meters indoors 802.4 GHz Frequency 150’ / 46 meters indoors 300’ / 92 meters indoors 802. routers.11b adapters/routers/access points Uses 2.Can also manually add a wireless computer running Vista via: Start | Connect To | choose wireless network from the list | click CONNECT Type in network security key or passphrase (if prompted) & click OK Common Wireless Network Technologies 802.4 GHz Frequency 150’ / 46 meters indoors 300’ / 92 meters indoors 802.11b adapters. MAKE THE NETWORK I AM CONNECTED TO A PRIVATE NETWORK (other choice is to turn on network discovery for all public networks) | click CREATE WIRELESS NETWORK SETTINGS AND SAVE TO USB FLASH DRIVE | Enter name for your wireless network (only letters & numbers & underscores) | click NEXT | name specified becomes the SSID | either accept the suggested passphrase or provide one of your own | Continue | Specify file & printer sharing settings (typically use the custom settings on your computer by default) | Click NEXT | plug USB device into computer when prompted | specify drive location | instructions are shown on how to add other devices to network | click CLOSE .

1.e. BUT elevated privileges ARE required to specify whether these files can be opened (or opened & changed) by users logged onto other computers on the network PAGE 30 OF 69 4.7 Sharing Files & Folders - . can use channels 1. can click on the PROPERTIES button Can also just click on CONFIGURE in the Local Area Connections Properties dialog box to configure the adapter itself. i. devices & Mapper Input/Output (I/O) Driver network infrastructure components on network & determines network bandwidth Link-Layer Topology Discovery Allows computer to be discovered & located on Mapper Responder the network IF an item listed above is configurable.6 Managing Preferred Wireless Connections - - 4. & 11 NOTE: sharing files & folders on a network from any folder on a computer requires elevated privileges Can share regular files/folders OR can place them in the Public folder Users do NOT need elevated privileges to place files in the Public folder.. typically see: Client For Microsoft Networks Enables the computer to access resources on a Microsoft network Quality of Service (QoS) Packet Provides traffic control.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - Clicking CLOSE returns you to the Local Area Connect Status dialog box – clicking PROPERTIES & then CONTINUE accesses the Local Area Connections Properties dialog box In the Local Area Connection Status dialog box.11b & g – phones & microwaves Can maybe change the WAP settings to use different wireless channel or configure channel to be selected automatically In US & Canada.1. streaming video) on your network File And Printer Sharing for Enables other computers to access resources on Microsoft Networks your computer in a Microsoft network (and other networks) Internet Protocol Version 6 IPv6 configuration (TCP/IPv6) Internet Protocol Version 4 IPv4 configuration (TCP/IPv4) Link-Layer Topology Discovery Discovers & location other computers.e. update the driver… Can create a network bridge if have more than one network connection See available networks via: Network & Sharing Center | Connect To A Network | select WIRELESS in the Show list | select a network & click CONNECT | IF not shown. can be vital if have highScheduler bandwidth traffic (i. click SET UP A CONNECTION OR NETWORK in the Network & Sharing Center | select from list of available options To see saved wireless networks: Control Panel | Manage Wireless Networks – click & drag to change order Preventing Your Computer From Switching Between Wireless Access Points Open Network & Sharing Center | click MANAGE WIRELESS NETWORKS Right click the preferred network | click PROPERTIES CLEAR the CONNECT TO A MORE PREFERRED NETWORK IF AVAILABLE checkbox Networks with the same Service Set Identifier (SSID) Best course of action is to change the default SSID (which is usually “Default”) Hardware & Interference Problems Typically see interference with 802. 6..

video files .If Disabled.1 Basic Troubleshooting Run through normal procedures & checks first: Cable OK? Connected OK at port / socket? Dynamic/static settings? Bridge interface ICS WAP settings Faulty equipment ISP outage Unplug – replug – reboot – ping – view network map… Checking Computer-to-Computer Connectivity Ensure all computers are ON (duh) & check ICS settings. 4. permits ONLY users who have an account on the computer (and therefore can supply credentials) to access shared resources .*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - Configuring File & Folder Sharing Via Network & Sharing Center.2.Can configure to allow anyone logged onto any computer on the network to open/change/create files OR specify that only read access is permitted Printer Sharing . make sure WAP is on Troubleshooting Device Drivers Device Manager: Start | right click Computer | click PROPERTIES | click DEVICE MANAGER | Expand NETWORK ADAPTERS | right click the adapter | click PROPERTIES | go to General Tab | shows whether device is working properly - PAGE 31 OF 69 .2 TROUBLESHOOT CONNECTIVITY ISSUES 4.Turn on/off network discovery File Sharing .If Enabled. pictures.Automatically sets up an ad-hoc network & requires wireless connections Windows-compatible file-sharing programs Third-party software designed to share files Websites File/photo sharing websites Instant Messaging Can share files while chatting online via Windows Live Messenger.Click CHANGE & allow sharing Configuring Sharing Permissions To Access Public Folder: Windows Explorer | Documents | Public Roles for sharing permissions: • Owner – full permission on the share • Reader – read-only • Contributor – can amend • Co-Owner – can also change sharing permissions Other Methods of Sharing Files Ad-Hoc Networks .Allows sharing of music. can enable or disable: Network Discovery . etc. grant access to users who don’t have accounts on the computer(s) storing the files to be accessed Media Sharing .On/Off Public Folder Sharing .Temporary wireless connection between computers & other devices Windows Meeting Space .On/Off Password Protected Sharing .

auto-connect is the default) Click NEXT | Computer connects to the network 4. so no one can access Consider assigning status IP Most WAP’s allow you to disable DHCP… addresses to wireless devices .2.To connect to a network that does NOT broadcast its SSID: Network & Sharing Center | Set Up A Connection Or Network | Select MANUALLY CONNECT TO A WIRELESS NETWORK | click NEXT Type Network’s name & select the security type Type the security key or passphrase & decide whether to connect automatically (if network is secure.2.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 4. during holidays.3 Troubleshooting Wireless Network Settings Check if automatic switching is on/off for preferred networks Networking & Sharing Center | Manage Wireless Networks | right lick network profile | select PROPERTIES | Change channel the WAP uses (can usually access via IE Reduces interference & risk of multiple networks with same SSID Use the highest available encryption available on your WAP & devices - 4.e.2.5 Using the Diagnose Internet Connection Tool to troubleshoot connectivity issues If enter a website address & IE can’t connect.. closures – best defense is to turn it extended periods of non-use off. applies to ALL network adapter interfaces Tracert Check for excessive delays & where they are (which “hop”) NOTE: to run Command Prompt Console as Administrator: Start | All Programs | Accessories | right click Command Prompt | click RUN AS ADMINISTRATOR 4.2 Troubleshooting IP Configuration ping 127.0.4 Configuring Wireless Network Security Change Default SSID Turn on Wi-Fi Protected Access (WPA) or Wireless Equivalent Privacy (WEP) encryption Change default admin passwords Enough said… Enable MAC address filtering Allows ONLY specified MAC addresses to use network Disable SSID Broadcast No one can find the network unless already know it’s there Do NOT auto-connect to open Auto-connecting exposes computer to security risks! wireless networks Enable firewalls Use the Windows firewall and/or WAP firewall Position the WAP centrally Allows for best signal strength Turn off the network during I. can click on “Diagnose Connection Problems” on the “Internet Explorer cannot display the webpage” screen in IE7+ PAGE 32 OF 69 .0.2.1 ping computer’s IP address ping default gateway and DNS servers ipconfig /all ipconfig /release & ipconfig /renew ipconfig /registerdns Ping loopback address Can get these from ipconfig /all Returns same info as the Network Connection Details dialog box for all network interfaces - Forces registration MUST be run as Administrator ipconfig /flushdns Clears out the DNS cache to work around negative caching MUST be run as Administrator ipconfig /allcompartments When used before /all or /renew.

1 General Info Terms: Helper – the person providing the assistance PAGE 33 OF 69 .3 CONFIGURE REMOTE ACCESS/SUPPORT 4.2.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Network Diagnostics returns a message that might help you diagnose the problem Can also go to: Network & Sharing Center | Diagnose & Repair Can also run diagnostics on a specific interface via: Network & Sharing Center | Manage Network Connections | right click the connection | click on DIAGNOSE By default. Windows Firewall is ENABLED & blocks all incoming traffic other than traffic that meets criteria defined in exceptions Windows Firewall settings are dependent on the network location you defined when installed Vista – is on for all locations.6 Configuring Network Settings in Windows Firewall - - - - 4.Control Panel | Allow A Program Through Windows Firewall | in Advanced Tab click Restore Defaults Control Panel | Allow A Program Through Windows Firewall | Continue | displays the Exceptions tab of the Windows Firewall Settings • Add Program | select or browse for program | can click CHANGE SCOPE & define the range of computers the exception applies to o Any Computer o My Network (subnet) only o Custom List • Add Port | enter TCP or UDP Port | can click CHANGE SCOPE & define the range of computers the exception applies to (same list as above) • Clear/select checkboxes for Programs or Ports (can select a program or port & then click on PROPERTIES to see the exception details) Examining Advanced Security Settings Start | Admin Tools | Windows Firewall With Advanced Security | • Inbound Rules • Outbound Rules • Connection Security Rules Applying Public & Private Firewall Settings Open Windows Firewall with Advanced Security| click Windows Firewall Properties in OVERVIEW pane | opens the Windows Firewall With Advanced Security On Local Computer dialog box | Can change settings by profile (Domain Profile & Private Profile & Public Profile) via individual tabs for each • Firewall state (on/off) • Inbound Connections (block/allow) • Outbound Connections (block/allow) • Customize settings for Firewall behavior • Customize logging 4. but with separate profiles for each location Configuring Exceptions To restore default firewall settings: • Windows Firewall | Change Settings | Advanced | Restore Defaults • OR .3.

numbers and symbols Hosts need to keep the Remote Assistance panel open after they create the invitation – if close it. Vista asks host if want to keep waiting – can extend the invitation timeframe that way… Exploring a Remote Assistance Session Start | Help And Support | under the “Ask Someone” heading.3. hours. select “USE WINDOWS REMOTE ASSISTANCE TO GET HELP FROM A FRIEND OR OFFER HELP” Clicking the “INVITE” option opens screen to select method to invite someone to help you: • Use e-mail to send an invitation (If your email program is not configured yet. which are NOT automatically included in the invites – can verbally give the password to the helper to keep more secure • At least 6 characters long • No enforcement of using mixed case letters.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Host – the person asking for assistance/sending the invitation. the host user can still control what’s going on & must manually approve the helper taking control To Configure helper settings: • Control Panel | Classic View | System | • Click REMOTE SETTINGS | click CONTINUE • Click ADVANCED | select “Allow This Computer To Be Controlled Remotely” • Set timeframe for invitations to remain open (minutes.2 Remote Assistance - - - . days) – max is 30 days • Select/Clear checkbox to “Create invitations that can only be used from computers running Windows Vista or later” NOTE: if invitation period expires. will be necessary to generate a new invite. choose this option) Invitations are protected with passwords. choosing this option will start the configuration process) • Save this invitation as a file (If you use web-based e-mail. must manually allow the connection Improvements in Remove Assistance & Remote Desktop Use less bandwidth Can now work through NAT firewalls If host computer must be rebooted as part of troubleshooting process. Remote Assistance session is automatically reestablished (COOL!) Activating and Securing Remote Assistance Start | Right click Computer | select PROPERTIES | in Tasks pane click REMOTE SETTINGS | click CONTINUE | In REMOTE tab of System Properties dialog box select/check the ALLOW REMOTE ASSISTANCE CONNECTIONS TO THIS COMPUTER ONLY users with elevated privileges can configure security settings for Remote Assistance Three security options apply to Remote Assistance invitations issued from computers running Vista…these settings control: • Whether the person connecting from the remote computer can control the host computer • The length of time the invitation can remain open • Whether invitations can be used only by Vista+ computers Remote Assistance settings CANNOT be configured individually each time an assistance invitation is issued If the “Take Control” option is enabled. Using an Invitation to Make a Connection Helper can start connection by either PAGE 34 OF 69 4.

host switches from using Aero to Basic interface (Aero will be restored when session is disconnected) The Remote Assistance Session Remote Assistance Panel Icons • Disconnect – allows either host or helper to terminate session • Request Control – allows helper to request ability to interact with host’s desktop.Remote Desktop connections used to administer a server to NOT require extra licenses Terminal Services ..e. well.3 Remote Desktop - . ensure appropriate exceptions configured in Windows Firewall and/or Windows Firewall With Advanced Security Always check the firewall settings if having issues with connectivity • • Does not require anyone to be logged on or to approve the session Only way to be kicked off is by user w/authority to log you off if locked normally Remote Desktop . I.3. Turn off background Medium-High Don’t allow full widow drag High No bandwidth optimization Troubleshooting Remote Assistance Vista uses TCP & UDP ports 49152-65535 XP uses TCP port 3389 If XP computer is used as a helper to a Vista host. info about when session was connected.Only allows single inbound connection (two to server OS’s) . Session logs include chat activity done via Remote Assistance o Bandwidth usage – only available to the host • Chat – basic text-based chat program for host & helper to. host can select whether to allow helper to view UAC dialog boxes • Stop Sharing – keeps helper from being able to interact with desktop – does NOT stop helper from being able to see desktop though • Pause – pauses session (i. chat! • Send File – allows transmission of files • Help – brings up Help And Support Bandwidth Usage Features Low Don’t allow full window drag. duration.e. Turn off background Use 8-bit color Medium Don’t allow full window drag.Allows multiple inbound connections – each user presented with his/her own separate desktop environment & most often not aware that other users are logged on . if the host wants to open a sensitive document without the helper seeing) • Settings – most settings can only be configured on the host computer o Use Esc key to stop sharing control o Save a log of this session – available to both host & helper Log ONLY contains Remote Assistance-associated activity.. whether request for control was granted…no info about actual tasks carried out during the session. when granting control.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - Double-clicking the invitation file & entering the password – OR Starting Windows Remote Assistance | selection option to offer help | load the invitation file Host is prompted on whether they want to accept the connection from helper (yes/no) When accepted.Terminal Services connections must be licensed PAGE 35 OF 69 4.

or on computer making the Remote Desktop connection only Local Devices And Resources – can connect your local printer & clipboard & other resources to the Remote Desktop session – clicking the MORE button brings up a new dialog box.8 Kbps Modem 56 Kbps Broadband (128 Kbps – 1.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - Configuring Remote Desktop Start | Right click Computer | select PROPERTIES | in Tasks pane click REMOTE SETTINGS | click CONTINUE | In REMOTE tab of System Properties dialog box select an option for Remote Desktop: • Don’t allow connections to this computer (default) • Allow connections from computers running any version of Remote Desktop (less secure) • Allow connections only from computers running Remote Desktop with Network Level Authentication (more secure) – XP SP2 & Vista & Longhorn The Remote Desktop Users Group To add user to Remote Desktop Users local group (must be a member in order to connect remotely!) • Log on as administrator • Start | Right click Computer | Select MANAGE | CONTINUE | • In The Computer Management Console. Modem 28. allows connection to other volumes on your computer o Programs tab Can configure an app to run right after a connection is successfully established o Experience Configure how responsive Remote Desktop will be at particular bandwidths. on the host computer only. open a connection settings file o Display – configure display settings: Display size: specific resolution to full screen Number of colors Connection bar – visible or not when connected in full screen o Local Resources Sound – by default. sound on host is transmitted to remote Keyboard Shortcuts – can configure to work in full screen mode only (default). Allows you to specify own combo of features PAGE 36 OF 69 . double-click the Remote Desktop Users group | opens the Remote Desktop Users Properties dialog box • Click ADD & add users to grant access to by typing user account names • Close the Select Users dialog box | Click OK Remote Desktop Connection Application Start | All Programs | Accessories | Remote Desktop Connection | enter name or IP address of remote computer • Clicking OPTIONS enables more detailed configuration for the session o General – computer name or IP.5 Mbps) LAN (10 Mbps or higher) Custom. expand the LOCAL USERS AND GROUPS node | • Click the GROUPS folder | • In the details pane of console.

can leave programs running at work & continue working from home If user logged on remotely & same user account is used to log on locally. then can log back in to reconnect & don’t lose the session If user tries to log on remotely while different user logged on locally.. check firewall settings If cannot connect to any computers via Remote Desktop. remote connection attempt is rejected If user is logged on remotely and a user tries to log on locally. remote user will automatically connect to the local session. the session continues…i.e. local user will receive a prompt saying that a remote user wants to connect • If local user clicks OK. he/she will be logged off & remote user can log on • If click Cancel. local connection attempt is rejected o Troubleshooting Remote Desktop If only certain users cannot connect. local user will automatically connect to the remote session. Options are: • Connect Always • Warn If Authentication Fails • Do Not Connect If Authentication Fails Connect From Anywhere – configures Terminal Services gateway settings • Allows authorized users on the internet to connect to remote computers on a protected network • Alternative to creating a protected network through VPN Starting & Ending Sessions If user is logged on locally & same user tries to log on remotely. that might be the issue NOTE: Remote Desktop user can always respond to UAC dialog boxes - PAGE 37 OF 69 .*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Advanced Server Authentication – verifies the identity of the computer you’re connecting to. can leave programs running remotely from home & pick up where you left off at work the next day If Remote Desktop session disconnects. check Windows Firewall With Advanced Security settings If there’s an extra firewall between the computers trying to connect. he/she will be logged off & local user can log on • If click Cancel. remote user will be informed that a local user wants to connect • If remote user clicks OK. if power outage & didn’t log out. ONLY computers running Vista or Longhorn able to verify their identities properly. check if they’re members of Remote Desktop Users group If can connect via Remote Desktop to one computer & not another.

1 Using Windows Mail as an E-mail Client Starting Windows Mail for the First Time Setup wizard runs | enter Display Name | enter email address (first one entered becomes primary. but can change this later) | On Setup Email Servers page • Select Incoming email server type (POP3 or IMAP) • Enter the incoming mail server address • Enter outgoing SMTP email server address • Click check box if Outgoing server requires authentication • Click NEXT Enter mailbox name in the Email User Name text box & enter the mailbox password (not necessary to enter a password) • Clearing the Remember Password checkbox means Windows Mail will prompt the user for a password each time they open the application By Default. Connection.1. Read. Receipts. Security. Send. Compose. & SMTP POP3 – retrieves email stored on a POP3 server. Spelling. used by most ISP’s • Usually retrieve & delete the messages from the mail server • Can configure to leave messages on the POP3 server • Uses TCP/UDP port 110 • If used with SSL. Windows Mail is set to download any email stored in the configured mailbox when wizard is completed BUT can turn this off by selecting the Do Not Download My Email At This Time checkbox POP3. CONFIGURING APPLICATIONS INCLUDED WITH WINDOWS VISTA 5. Signatures. uses port 995 IMAP4 • More advanced than POP3 • Allows continuous connection to a mailbox on the incoming mail server • Can connect multiple email clients to the same mailbox simultaneously • Can create mail folders on incoming mail server & move messages SMTP • Can only be used to send email.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 5. Advanced • Can change settings such as: o Whether sound displayed when message arrives o Whether Windows Mail synchronizes as startup o How often Windows Mail checks for new messages o Whether message sent immediately or next time synchronizes o Signatures for outgoing messages o Spell check o Etc… • Offline mode – allows you to use Windows Mail without synchronizing Multiple Accounts and Advanced E-Mail Account Settings To add new accounts • Tools | Internet Accounts | Add | Email Account | • Editing account properties allows for advanced configuration - - - PAGE 38 OF 69 . IMAP4.1 CONFIGURE WINDOWS MAIL 5. not retrieve • Uses TCP/UDP port 25 Windows Mail Settings Tools | Settings | • Tabs: General.

message that have been read are displayed less prominently than unread (usually bolded) • Hide Read Messages – after read message. configure timeouts.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - General Tab Servers Tab Connection Tab – specify what type of connection to make when synchronizing the account if different than IE Internet Options settings. Deleted Items & Junk Email folders on the server Viewing the Windows Mail Inbox View Menu | Current View | Preconfigured message views: • Show All Messages – default view. for when have 2+ email account set up in Windows Mail) o Message was sent more than XX days ago o Message is longer than XX lines o Message has an attachment o Message has been read o Message body has been downloaded o Message is flagged o Message is watched or ignored o Message is secure NOTE: cannot use views to move message between folders or copy/delete Message Rules & Folders Configure Windows Mail to process incoming mail prior to reaching the mailbox Can create folders for specific senders.e. Drafts. “disappears” • Hide Read Or Ignored Messages – hides read & also uses message rules to designate less important messages & hide them from you NOTE: Grouping Messages – Message grouping my conversation can be used with any of the preceding options for the message views… Creating Custom View via: Define Views | New View | • Available Conditions for creating Custom Views: o Message is from one of a group of listed emails o Subject line contains one or more specific words o Sender has marked the message as a priority o Message received from a particular account (i. leave messages on server (can remove from server after xx days). or break apart messages larger than xxx size into smaller parts • NOTE: IMAP accounts have different set of properties – main difference is in the Advanced properties: o Can set Windows Mail to check for new messages in all folders on an IMAP server o Can configure special folder properties for Sent Items. useful for VPN-only accounts o Security Tab o Advanced Tab – can configure account to use nonstandard ports. topics. etc. & create rules to • Move message to specific folder • Copy message to specific folder • Delete message • Forward message to email address or set of emails • Highlight message in chosen color • Flag message o o o PAGE 39 OF 69 .

1.5.2 Using Newsgroups with Windows Mail Adding News Servers NNTP: Network News Transfer Protocol To add News Server: • Open Windows Mail | Tools | Select ACCOUNTS | click ADD| • On Select Account Type page. click NEWSGROUP ACCOUNT & NEXT PAGE 40 OF 69 . data received. subject. MUST perform an export before importing into Mail To Import. recipient. message. message text. & news account settings Windows Mail can only export to a Microsoft Exchange Server through Message Application Programming Interface (MAPI) or to Windows Mail 5. use Edit | Find Message dialog box • Searches through all mail folders on basis of sender. but some regular mail may be caught as well. 2003 & 2007 Microsoft Outlook Express 6 Microsoft Outlook PST Files Windows Mail • Except for Exchange. attachments. flagged status Importing and Exporting Messages Can import message from: Microsoft Exchange 5.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - • Automatically mark message as read • Mark message as watched or ignored • Send an automatic reply • Not download message from the mail server • Delete message from mail server • Stop processing more rules – useful when there are multiple rules… Clicking APPLY NOW in the Message Rules dialog box applies new rules to a chosen folder & subfolders immediately Junk Email Options Options tab • No Automatic Filtering – mail from blocked senders still sent to Junk email folder • Low – move most obvious junk email to Junk email folder • High – most junk email is caught. Check your Junk email folder often • Safe List Only – only mail from people or domains on your Safe Senders List will be delivered to your Inbox • CLEAR the ‘Permanently delete suspected junk email instead of moving to the Junk email folder’ box to be safe Safe Senders tab • All messages from email addresses added here BYPASS junk email filters • Can add domain names to Safe Senders list too Blocked Senders tab • Can add email addresses & domains International tab • Blocked Top-Level Domain List – can block based on origin country only. go to File Menu | select Import | select Messages | select message format from which to import NOTE: Windows Mail can also import contacts. 2000. mail account settings. not other top-level domains Phishing tab • Protected by default but can disable protection here if so wish Searching Email Quickest way is to enter a query in the Search box at top right corner For more detailed search.

including their content o New Messages Only – only those posted since last synch with server o Headers Only – downloads all headers currently stored on news server.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - In Display Name text box. enter email address of account configured in Windows Mail & Click NEXT • On Internet News Server Name page. need to combine & decode them (Select messages | Message Menu | Combine & Decode) Message Menu: • Flag Message • Watch Conversation • Ignore Conversation • Unscramble • Combine & Decode Views and Newsgroups • Default newsgroup views o Show All Messages o Hide Read Messages • PAGE 41 OF 69 . click on the newsgroup & click GO TO Clicking RESET LIST button to retrieve entire list of newsgroups from server Clicking NEW tab shows only newsgroups added since you last subscribed Downloading Articles When you open a newsgroup message. go back online & download body of marked messages • When right click a newsgroup under its newsgroup server. enter name of the NNTP server to connect to. Windows Mail retrieves the content of the message from the news server Can use filters to automatically download message that meet selected criteria Online & Offline Modes • Online mode – opening a message downloads the body of the message from the NNTP server & displays on the screen • Offline mode – can connect. mark message of interest for download. checked against headers you already have so no duplication • Right clicking “CATCH UP” marks all articles in group as read Reading Newsgroups • Flags – work on a per message basis & are usually applied via filters • Watching – works on a per conversation basis • Can ignore conversations (select conversation & select Ignore on Message menu) • To access large files that have been split into multiple attachments. disconnect. download headers. if required. Windows Mail asks if you want to download list of newsgroups that the server carries OR can use the Search box Access via Tools | Newsgroups | If want to see the contents. enter your authentication credentials & click NEXT…otherwise click FINISH & the news server account is displayed in the Internet Accounts dialog box Subscribing & Unsubscribing to Newsgroups When add a new news server. check “My news server requires me to log on” & click NEXT • If selected the log on required checkbox. enter name (usually same as for mail account) & click NEXT • On Internet News Email Address Page. can configure following Synchronization settings: o All Messages – 300 messages at a time.

vs. not all • Need to be logged on with Microsoft Passport account • Right click a post to rate | click RATE | click Please Sign In To Microsoft Communities | enter Passport email & password | click SIGN IN • Can rate as “useful” or “not useful” • Can use ratings as view or rule criterion Posting and Replying • NEW POST: Open newsgroup & click the New Message icon | verify the Newsgroup field contains the group you want to post to | enter multiple newsgroups separated with semicolon but discouraged | can also use CC field to copy through email • Selecting a Post Type – Comment / Question / Suggestion • Format menu – can choose between Plain Text (generally used on Usenet) & HTML PAGE 42 OF 69 . Rules which apply only to the newsgroups that they are configured for • Defining Custom Views o In Windows Mail. Where the Message is Flagged: • Show/Hide • Show Message • Enter name of view o Click OK | select the newly created view | click APPLY VIEW o Click OK to close Define Views dialog box Newsgroup Rules • Tools | Message Rules | News | New News Rules Window | • Possible Conditions: o Message is in a specified newsgroup o From line contains people o Subject line contains specific words o Message is from specific account o Message sent more than X days ago o Where number of lines in message is not more than X lines o All Messages • Possible Actions o Delete message o Highlight message in chosen color o Flag the message o Mark the message as read o Mark the message as watched or ignored o Mark the message for download o Stop processing rules Rating Posts • Supported by some news servers. click a newsgroup o Select two message in the newsgroup o On the Message menu.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* o Show Downloaded Messages o Hide Read Or Ignored Messages o Hide Answered Messages o Show Only Useful Conversations • Views apply to ALL newsgroups. click FLAG MESSAGE o Click YES to add the Flagged Message Column o Click the VIEW menu | Click CURRENT VIEW | Click DEFINE VIEWS o Click NEW.

not a centralized server – so can create meetings without traditional network infrastructure – BONUS! Need Firewall exceptions.2. select Cancel Message (can only cancel your own messages) 5. check that message not being bounced by another rule with higher priority 5.2 Configuring People Near Me - - 5.1. problems caused by issues external to application Check that mail server supports POP3 or IMAP If can receive but not send.3 Using Meeting Space - PAGE 43 OF 69 . select it & from the Message menu.3 Troubleshooting Windows Mail Usually.2.2. given three options: Start A New Meeting | • Enter meeting name & password (default is People With Me & current time) • NOTE: if setting up an ad hoc meeting. can Reply To Group (goes through newsgroup to all) or Reply (goes through email to post originator) To Cancel a post.2 CONFIGURE WINDOWS MEETING SPACE 5. name must be > 15 characters - 5. and hence Administrative privileges Broadcasts: Nickname Computer Name PC’s IPv6 address Port # When first run. so need other means of oral communication (conference call or at a meeting table) Private messaging is allowed Users can share: Desktops Documents Applications – including open documents! Uses peer-to-peer technology. check mailbox quota When creating view.1 Windows Meeting Space Capabilities Does NOT broadcast audio.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* • • When replying. check SMTP server address Send test email to yourself from within Windows Mail Google the error messages received in Windows Mail If configure Windows Mail to leave mail on your server. double-check your view/hide options Check Junk folder for “missing” emails & place sender on Safe Senders list Tools | Junk Email Options | Safe Senders | If rule not functioning properly. get UAC prompt Control Panel | Classic View | People Near Me | Defaults to User Log On name (but can be changed) Clicking CHANGE PICTURE will change it for the User log on too Can set to only allow invitations from Trusted Contacts (with digital certificates) Blocking invitations does NOT block a user from joining Meeting Space meetings – can still view available meetings or use an invite file to connect to a meeting Can allow People Near Me to automatically start when user logs onto Windows • This is a PER USER setting Sign In Tab – sign into & out of People Near Me When run Meeting space.

invited participants are dimmed in the Participants listing • A RED X next to an invitee’s name indicates they declined the invite ANY user who is connected to a meeting can send invitations to other people. symbols • Send passwords to participants prior to meeting via pone. click the green Plus icon • Click OK to reminder message • Select handout & click OPEN Any meeting participant can delete handouts – removes from meeting only User Status & Passing Notes User Status Busy Options: Away Be Right Back Available PAGE 44 OF 69 . IM… Joint A Meeting Near Me Open An Invitation File Sending Invitations Three methods of sending invites: • Using People Near Me – used only if all users are logged onto People Near Me o In Meeting Space | Click INVITE PEOPLE | o Select check box for each person you want to invite to the meeting o Click SEND INVITATIONS • Sending an email using the default email application – usually the winner o Click INVITE PEOPLE | o Click on INVITE OTHERS button | o Click Send An Invitation In Email o Launches default email client • Generating an Invitation file – commonly used if have web based email o Click INVITE PEOPLE | o Click on INVITE OTHERS button | o Click Create An Invitation File o Asks for location to save Invitation File Once invites are sent. but need to reenter password Share an Application or Document or Desktop Only one person can interact with shared object at a given time Only one meeting user can share an application at a time Shared apps displayed with a modified title bar (states “Currently Sharing”) Can delegate control of a shared app to another participant if you’re the person currently control of the app • BUT original sharer can always interact with it even when someone else is delegated control • Can PAUSE & do a fix that you don’t want others to see & then resume • To take back control o Click Control menu | select TAKE CONTROL | o OR – WINDOWS KEY + ESC Handouts To add a handout: • Click Add Handout Icon in Handouts area | • If handouts are currently distributed in the meeting. email. so people you invite can add people you might not want & you can’t block them Meetings only finish when ALL participants leave Can reconnect after leaving. SMS. numbers.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - - • NOTE: password must be 8 characters with mixed case.

check that IPv6 has been enabled on all network interfaces If IPv6 enabled. & DirectX applications cannot be shared using Windows Meeting Space 5. country/region. an IPv4/v6 transition technology that comes with Vista. post code. state/province. website PAGE 45 OF 69 - . they will see the meeting listed under “Join A Meeting Near Me” & can joint the meeting if provide the password NOTE: to join an Ad Hoc Meeting.4 Troubleshooting Windows Meeting Space - - - - 5.1 Windows Contacts Stored in: Desktop > User Name > Contacts Access Via: Start | All Programs | Windows Contacts Each contacts stored in separate file in special directory Creating New contacts using emails stored in Windows Mail Can set Windows Mail to automatically add everyone you send emails to onto your Contacts list (but can be a bit long then…) Creating a New Contact Manually New Email | To | New Contact Can also click the New Contact button & enter at least one piece of name information (first name. need to manually disconnect form a wireless network first. nickname) – generally put in a name & email address…if synch with a mobile device. users on separate IPv4 subnets can join the same meeting if one of the following conditions is met: All routers between subnets must support IPv6 An Intrasite Automatic Tunnel Addressing Protocol Deployment (ISATAP) server is used on the network (Windows Server 2003 & later & can configured as ISATAP servers – they lease global IPv6 addresses Clients are using Teredo. last name.3. check IPv6 address configuration & firewall settings If client can’t connect.2. city. cell. audio. might include more info When open a new contact the Name And Email Tab is displayed. fax. middle name. can Set Preferred contact email if more than one exists Other tabs: • Home – street address. otherwise will fail!! If participant can’t connect to meeting.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - To send another user a private note: • Right click the user name | click SEND A NOTE | type message | Click SEND Ad Hoc Wireless Meetings To Start an Ad Hoc Meeting: • Start Windows Meeting Space | click START A NEW MEETING • Select a meeting name & password | click OPTIONS | • Select the CREATE A PRIVATE AD HOC WIRELESS NETWORK checkbox • Select your country/region from drop-down list • When users with wireless adapters in range of convener’s computer open Meeting Space. phone.3 CONFIGURE WINDOWS CALENDER & WINDOWS CONTACTS 5. allows IPv6 connectivity across IPv4 internet even when two end-point computers are located behind NAT devices Check for following firewall exceptions Windows Peer-To-Peer Collaboration Foundation Windows Meeting Space Connect To A Network Projector Limit participants to 10 or less for optimal performance Video.

Sharing Calendars with Others To Publish a Calendar: • Right click the calendar in the Calendars list on the left side of the screen • Select PUBLISH | opens the Publish Calendar dialog box • Enter a Calendar Name (no spaces. spouse/partner. manually adding addresses you want to send it to using Windows Mail Notes area – add misc.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - Work – ditto Family – gender. can right click & select SYNC Subscribing to Shared Calendars Must know location/URL – cannot browse to it Right click in the Calendars area & select SUBSCRIBE Can be located on Network Shares or on Websites PAGE 46 OF 69 5. if at all Reminder – display a dialog box as a reminder at a preset time before meeting Participants – enter contacts or email addresses • Clicking the INVITE button generates an email addressed to meeting participants • Can also right click an existing appointment & select Send. automatically adjusts when they import the item) Recurrence – how often the meeting will recur. anniversary. birthday. drop-down menu allows you to select one URL – can place URL for the meeting agenda to share the plan Appointment information – configure date & time of appointment (if attendees are in different time zones.3. children Notes – can enter misc notes about a contact IDs – associate digital certificates with email accounts – NECESSARY to have a certificate associated with a contact in order to become a Trusted Contact for Windows Meeting Space Importing and Exporting Contacts Windows Contacts Toolbar | Import/Export buttons | Import: • CSV • LDIF (LDAP server) • vCard (VCF file) • Windows Address Book File (Outlook Express Contacts) Export: • CSV – share all • vCards – share some Using Contact Groups To Create New: click New Contact Group button | click Add to Contact Group | enter individual emails without entering as contacts OR click Create New Contact OR select an existing contact • • • • Can publish & subscribe to shared calendar without NOS or Server Creating a New Appointment Details to consider: Appointment title Location Calendar – if have multiple calendars.2 Windows Calendar - - - . info about the appointment. but can use underscores) • Enter location to publish to (website or fileshare) • Select whether to Automatically Publish Changes Made To This Calendar • Select Calendar Details to Include (Notes / Reminders / Tasks) • Click PUBLISH If Calendar not automatically set to publish updates.

click START SCAN | Click NEXT | Click FINISH • Configure TV or Monitor • Audio • Closed Captioning When configuring Media Center for TV. scans for following Digital Signal Types: Antenna Direct Cable Connection Satellite Set Top Box Setting Up Media Center & Configuring a Windows Media Center Extender Can use a Media Center Extender to act as intermediary between computer & TV Commonly Xbox 360 – can connect to LAN. Music & Video libraries PAGE 47 OF 69 - - .ics) | …saved to users Documents folder File | Import | • Can create new OR • Merge with Existing Troubleshooting Shared Calendars For person sharing their calendar. the Setup Wizard runs • Privacy policy pages…blah blah blah • Select whether Media Center periodically connects to internet to retrieve album/DVD cover art & TV Program Guide listings & music/movie info Configuring TV Settings and Digital Cable Devices Media Center | Tasks | Settings | TV | • Setup TV Signal | Next | Confirm Region | You Are Done! page | click on SET UP GUIDE & click NEXT | click NEXT on Set Up Your TV Program Guide page | click YES & NEXT on Guide Privacy Page | select I AGREE on Guide Terms Of Service Page & click NEXT | Enter Your Postal Code & click NEXT | guide listings downloaded | select TV signal provider & click NEXT | TV Program Guide downloaded | click NEXT when download completed | On Scan For Services page.1 Configuring Windows Media Center Available with Home Premium & Ultimate editions Configuring TV Settings and Digital Cable Devices Should install TV Tuner PRIOR to setting up Media Center First time run Media Center. would you like to set it up now? – YES/NO • YES launches Windows Media Center • Optional Setup Page allows configuration of the Extender o Can set up the Pictures. either wirelessly or via UTP cable If connect Media Center Extender to Media Center computer’s subnet: • Dialog box is automatically displayed: this device was found on your network.4 CONFIGURE & TROUBLESHOOT MEDIA APPLICATIONS 5. check settings to automatically publish changes when made Check if person sharing calendar has stopped publishing Check update interval for person subscribing 5.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - Must have permission to access the location where calendar is hosted After enter location.4. configure subscription settings • Calendar Name • Update interval (none / 15 min / hourly / daily / weekly) • Include Reminders? • Include Tasks? • FINISH Importing and Exporting Calendar Files File | Export | File Name (*.

amount of disk space to allocate to recorded programs • Configure Live TV Pause Buffer (Stop When Possible – xx min.4. check Firewall settings • Should also determine whether want to have computer running Windows Media Center using AWAY MODE – allows Extender to connect at any time. if you move) Automatic vs. even when computer appears shut down…can wake up computer remotely with the Media Center Extender • BUT increases power consumption Configuring Media Center Display Video Setup Wizard – queries you on which monitor you want to display content if multiple monitors are connected User provides info about connection type. Manual signal configuration • Can scan for services • Easier to let Media Center perform automatic tuning than to perform Manual one BUT may need Manual to add weak channel… Library Issues • Media Center looks for content only in configured directories • Add new directories: Media Center | Add Folder To Watch | o Add folders on this computer o Add shared folders from another computer o Add folders from both locations • Browse to location o WMP facts: Available with all Vista editions PAGE 48 OF 69 5.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - NEED to configure libraries if want to show/display something other than TV or DVD’s through your Media Center Extender • If select option to SET UP EXTENDER. configure to use native resolution for best results Troubleshooting Recording Issues Scheduling Recording issues – inaccurate schedule or Vista time settings Recording quality – use Advanced Recording function to reduce quality to use less space Tasks | Settings | TV | Recorder | Recorder Storage | Recording Defaults | Keep Settings: Until Space Needed Until I Delete Until I Watch For One Week Tasks | Settings | TV | Recorder | Recorder Storage | • Configure disk volume you’re recording to • Configure max. monitor aspect ratio. display resolution NOTE: when LCD monitor.2 Configuring Windows Media Player - . before/after) Parental Controls – cannot be applied on a per-user basis • Media Center requires access code to view restricted content Configuring Region • TV Signal | Confirm Your Region | (uses Vista install settings by default) • Can select different region if so wish (i. opens Extender Setup Page • On the Xbox 360. enter the Setup Key – 8-digit key displayed on TV that is connected to Windows Media Center Extender If Media Center Extender not automatically detected. navigate in the console to the Media section & use controller to select the Media Center item – the Xbox then provides info about how to complete the setup o Performs a check on the network o Displays an 8-digit key on the TV • On the Vista Computer.e.

cannot share through one like Media Center Can be used to rip audio from CD. rip CD when inserted.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - - Media Player can only play back television broadcasts. copy protect music. select if share media with it Codecs Codec – Method of encoding data Each media format requires separate codec May need to obtain codec for WMP to play new media file type Options | Player Tab | check “Download codecs automatically” Adding MetaData Right click file in library | click ADVANCED TAG EDITOR | TABS: Track Info Artist Info Lyrics Pictures Comments Title Artist Language Picture types Language Subtitle Lyricist Text Cover Text Genre Album Artist Synchronize lyrics Description Mood Conductor Track No Orig. cannot record like Media Center WMP can be used to only display media through a Media Center Extender Device. Media Center can only play Ripping & Digital Rights Management Click on Rip tab | hold down ALT key & select OPTIONS from TOOLS menu | click RIP MUSIC tab to show ripping options | • Rip music to this location – can change location & file name • Rip Settings – format. eject CD when ripping complete • Audio quality – slide bar from Smallest Size to Best Quality Can rip audio with following formats Audio data type: CD consumes this much space: Windows Media Audio 56 MB Windows Media Audio Pro 28 MB Windows Media Audio (Variable Bit Rate) 18-33 MB Complex audio uses higher bit rate Simple audio uses lower bit rate Windows Media Audio (Lossless) 206-411 MB Highest quality recording format MP3 57 MB WAV (Lossless) 600 MB Older format. Lyricist Key Composer Album Websites Original Album Set Subgenre Language PAGE 49 OF 69 . from earlier Windows NOTE: higher bit-rate = higher audio quality = higher disk space usage MP3 & WAV formats do not support copy protection technology Rights backup – WMP does NOT allow for backup of media usage rights Media Sharing Configuration: in WMP. Artist BPM Orig. click on ANY tab menu & click MORE OPTIONS Navigate to LIBRARY tab & click CONFIGURE SHARING Select the SHARE MY MEDIA checkbox & click OK When compatible device connected to network.

*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 5.5. Recipient Fax #) • Redialing (# of attempts & dial again after xx minutes) • Discount rates settings (times of day) Fax Options Windows Fax & Scan | Tools | Options | • General tab o Set sound played when message received • Receipts tab o Delivery Receipts NONE –or– Email To: enter address or select from address book • Can use one rcpt.5 CONFIGURE WINDOWS FAX AND SCAN 5. a New Printer with the fax account’s name is in the Printer list in Control Panel Windows Fax & Scan • Click NEW FAX button | fill out recipient details | add attachment Send Cover Page Only • Do not attach document.1 Setting Up Fax and Scan Fax Accounts Tools | Fax Accounts | Each account allows you to configure a separate fax device Multiple Fax Modems Tools | Fax Settings | Select Fax Device | select from drop-down menu Sending Faxes Print To Fax • After you configure new fax account. for delivery to multiple recipients • Can Attach copy of sent fax • Send tab PAGE 50 OF 69 - - - - - . ONLY send cover page Configuring Scanners NOTE: fax resolution significantly lower than that of normally printed documents Therefore. don’t need to set scanner resolutions very high or in color Receiving Faxes Windows Fax & Scan | Tools | Fax Settings: • Manually Answer – when incoming call detected. user is notified & user can choose to receive the fax • Automatically Answer after specified number of rings – does not require user interaction to accept faxes • Clicking MORE OPTIONS in General tab brings up ability to: Configure TSID & TSID: Transmitting Subscriber Identification – info about you sent to fax machine you’re sending a fax to CSID settings CSID: Called Subscriber Identification – info sent back to person who is sending you a fax Specify what Fax Print each received fax automatically to a printer & Scan should do Save copy of incoming fax to another location when a fax is received Advanced Fax Settings Tools | Fax Settings | Advanced Tab | • Set Fax Archive location • Chose whether to Include banner in sent faxes (TSID. page #.

60% .1 Configuring Side Bar Settings Right click Sidebar | Select PROPERTIES | shows Windows Sidebar Properties dialog box.80% .*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* • o Whether original message included when fax is replied to Compose tab o Font used 5. can’t connect to service to display information Once connectivity restored.100% (default) Placing Gadgets on the Desktop Place on Sidebar & then drag to desktop position Often allows more info to be displayed Can move detached gadgets back to Sidebar from Desktop Can modify properties of detached gadgets by Right Clicking (modify opacity) Right click Sidebar | BRING GADGETS TO FRONT also displays detached gadgets If Gadget displays “Service Unavailable”.3 Troubleshooting Gadgets - - PAGE 51 OF 69 .6.6.2 Configuring Gadgets - 5. gadget automatically displays info Can restore gadget after it’s uninstalled by opening Windows Sidebar Properties & clicking RESTORE GADGETS INSTALLED WITH WINDOWS (if installed from internet.6. where you can configure: Whether Windows Sidebar starts automatically when Vista starts Whether Sidebar is displayed on top of all other windows Which side of screen Sidebar is displayed on Which monitor Sidebar is displayed on if more than one installed A list of running gadgets that you can view • NOTE: can uninstall a gadget ONLY from the Gadget Gallery If close Sidebar. can open via Start | All Programs | Windows Sidebar | Adding Gadgets to Windows Sidebar Click PLUS SIGN on top of the Sidebar | opens Gadget Gallery | drag gadget directly to Sidebar OR double-click gadget Click GET MORE GADGETS ONLINE to launch browser & download more gadgets Click on the CONFIGURE GADGET ICON (the little tool) OR Right click & select OPTIONS Configuring Gadget Opacity Right click | Select OPACITY | 20% .40% .6 CONFIGURE WINDOWS SIDEBAR 5. will have to download again) - 5.

may change in future Vista’s USB HDDs are not currently fast enough to be used as ReadyBoost Devices ReadyBoost Considerations Cannot use ReadyBoost-allocated space to store data/files Improving Performance with ReadyBoost Control Panel | System & Maintenance | Performance Information & Tools | Click on ADVANCED TOOLS | Click on GENERATE A SYSTEM HEALTH REPORT | CONTINUE | Check if RAM warnings present / check RAM ratings Use flash memory device for ReadyBoost & rerun tool – check for improvement Transfer Rate Considerations Flash memory is NOT as fast as RAM – has good read speed. MAINTAINING & OPTIMIZING SYSTEMS THAT RUN VISTA 6.75MBps for 512 KB random writes Can use up to 4GB flash memory for ReadyBoost (limitation due to FAT32) & as small as 256 KB ReadyBoost does NOT put paging file onto flash memory – only used as cache. Vista continues on – all pages on the USB device are backed up by a page on hard disk Data written to ReadyBoost device is encrypted using AFS-128 algorithm Can use only one ReadyBoost device per machine.0 – 480 Mbps (but usually peaks at 300 Mbps in practice) Internal fiber channel HDD – 200 Mbps+ External FireWire HDD – up to 400 Mbps 7200 RPM SATA drives – up to 500 Mbps Page-File vs.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 6. 95% of available free space • Recommended to set to be 1x – 3x physical RAM ReadyBoost Facts Needs fast & consistent random performance memory • 2. slower write speed USB 2.5MBps for 4 KB random reads • 1.1 TROUBLESHOOT PERFORMANCE ISSUES 6.1. can also allocate flash memory for this purpose IF not already allocated for ReadyBoost – little advantage to doing this. Solid-State Hard Disk Drive Can use flash memory device to hold page file In addition to moving virtual memory to a second hard disk. choose from • Use the Device to Store Files • Use the Device to Speed Up The System Select second option | user needs to specify (in ReadyBoost tab of device’s Properties dialog box) that Vista should use device for this purpose & indicate how much flash memory should be allocated • By DEFAULT.1 Implementing ReadyBoost Configuring a Flash memory Device for ReadyBoost Insert USB flash memory device (or other type of flash memory device) When autoplay dialog box appears. paging file still stored on hard disk drive ReadyBoost reduces paging because increases amount of RAM system can use for caching BUT ReadyBoost cache memory is NOT virtual memory If user pulls ReadyBoost USB device. many disadvantages (doesn’t really boost performance) Hybrid Hard Disk Drives (HHDD) Can be SDRAM & require battery backup OR Flash memory so not lost if battery fails Vista ReadyDrive feature can take advantage of H-HDD by using built-in RAM to intercept data & dispatch to hard disk for long-term storage… PAGE 52 OF 69 - - - - - .

| Perf. prompted to select: • Drive to clean up • Specify whether want to clean up your own files only OR all users on computer Control Panel | System & Maint. Info & Tools | Advanced Tools | Event Log Appearance/Performance Reliability & Performance Monitor Disk Defrag Task Manager System Health Report System Information Using the Problems Reports And Solutions tool Control Panel | System & Maintenance | Problem Reports & Solutions | PAGE 53 OF 69 6. if DEP notices program using memory incorrectly. Shutdown.1.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - • Improves laptop battery life • Reduces mechanical HD usage • Allows for faster recovery from Sleep Solid State Hard Disk Built-in RAM 4 GB – 64 GB+ flash memory devices Phase-change Random Access Memory (PRAM) may use SSDs Control Panel | Performance Information & Tools | Managing Startup Programs Opens Software Explorer – can disable programs in startup to speed up Adjusting Visual Effects Let Windows Vista select best (recommended) Best Appearance Best Performance Custom NOTE: in Data Execution Prevention Tab.1. | System | Advanced System Settings | Settings | ) • Click CHANGE in Virtual Memory Section | adjust virtual memory settings Adjusting Indexing Options Indexing options can speed up search functions – can narrow search to focus on files & folders in common use Control Panel | System & Maintenance | Power & Indexing Options | Indexing Options | Advanced Options | adjust indexing settings / restore defaults / specify location for index / specify file types to be indexed Adjusting Power Settings (laptops & tablets) Control Panel | System & Maintenance | Power & Indexing Options | Adjust Power Settings | Performing a Disk Cleanup When Click on OPEN DISK CLEANUP. just accessible from here • Advanced Tab • (Also accessible via Control Panel | System & Maint.2 Using Performance Information & Tools to Troubleshoot Performance Issues - - - - - 6.3 Resolving Startup. can ensure that DEP is enabled for: • Essential Windows programs & services OR • For all programs & services except those specified • DEP is security feature – helps prevent damage from virus or malware attack that tries to execute code from system memory locations reserved for Windows & other authorized programs. shuts it down & notifies User Performance Options dialog box – shown here but NOT actually part of Visual Effects. and Hanging Issues - .

rare Control Panel | System & Maint.2 Using Event Viewer - - - PAGE 54 OF 69 .*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Displays problem solutions available & gives info on reported problems that don’t have a solution yet Stores problem history so can check for solutions in future Dealing with Unresponsive Programs Vista usually fixes automatically Otherwise. program.2.2 TROUBLESHOOT RELIABILITY ISSUES USING BUILT-IN DIAGNOSTIC TOOLS 6.2. or service Security Log: • Audit Success • Audit Failure Setup Log – stores setup events System Log – stores system events logged by Vista & Vista system services • Critical • Error • Warning • Information Forwarded Events – stores events forwarded by other computers Custom Views – To create custom view to show events from Network Diagnostics: Log on using Administrator account used to install Vista if possible 6. can use Task Manager to close or restart program If IE hangs regularly. | Perf. might have problem with HDTV Rating or 4+: will run software & multimedia apps well Rating of 5: high performance or customized computers. Info & Tools | Advanced Tools | Event Viewer | Categories for Critical recorded events: Error Warning Information Windows Logs Application Log – program events • Errors – significant problem. data loss • Warning – nothing bad yet.1 Using the Windows Experience Index Tool Access via: Control Panel | System & Maintenance | click CHECK YOUR COMPUTER’S WINDOWS EXPERIENCE INDEX BASE SCORE under “System” OR via: Control Panel | Classic View | Performance Information & Tools | … Components Used to Determine System Performance Component Measurement Processor Calculations per second Physical Memory (RAM) Memory operations per second Graphics Windows Aero Desktop performance Gaming graphics 3D graphics performance Primary hard disk Disk date transfer rate Rating of 1-2: can usually perform basic tasks but shouldn’t be used for games or multimedia Rating of 3: usually can run Aero & play DVDs. i.e. check for spyware or viruses or other malware 6. but maybe… • Information – successful operation of a driver.

2. right click Custom Views | select CREATE CUSTOM VIEW In Filter tab. disk.4 Using Advanced Diagnostics & Analysis Tools .*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - Control Panel | System & Maintenance | Click PERFORMANCE INFORAMTION & TOOLS | click ADVANCEED TOOLS | click VIEW PERFORMANCE DETAILS IN EVENT LOG | CONTINUE | In Event Viewer. select from any combo of: Critical & Error & Warning & Information event level checkboxes Select BY SOURCE | in Event Sources drop-down list. expand CUSTOM VIEWS & select newly created view Applications & Services Logs Distributed file system (DFS) replication log Encrypted file system (EFS) debug log Function discovery provider host service tracing log Hardware events log Internet Explorer log Key management service log Media center log Windows logs Microsoft Windows services performance diagnostic provider diagnostic log Attaching Tasks to Events Event Viewer | click on an event in the Security Log or other log | click ACTION | ATTACH TASK TO THIS EVENT | OR Right click event | select ATTACH TASK TO THIS EVENT Using Network Diagnostics with Event Viewer Windows Logs | System | can filter for “Source” = Diagnostics-Networking Control Panel | System & Maintenance | Problem Reports & Solutions Click CHANGE SETTINGS in left pane | enable “Check for solutions automatically” (recommended) Click ADVANCED SETTINGS | (requires elevated privileges) Specify whether all users can alter Problem Reports & Solutions Tool settings OR They can specify whether they want to send report to Microsoft Check Problem History: Problem Reports & Solutions |Click SEE PROBLEMS TO CHECK | CHECK FOR SOLUTIONS TO THESE PROBLEMS Can click CHECK FOR NEW SOLUTIONS in left pane of Problem Reports & Solutions Tool Available via: Control Panel | Classic View | Performance Information & Tools | Advanced Tools dialog box | Reliability and Performance Monitor • Resource View – Windows reliability & Performance Monitor home page o Monitor CPU. network. select DIAGNOSTICSNETWORKING & TCP/IP & TCPIP checkboxes (or any combination thereof) Click OK | in Save Filter To Custom View dialog box.2. enter name & description Click OK In Event Viewer.3 Using the Problems Reports and Solutions tool - - 6. & memory resources in real time • Monitoring Tools | Performance Monitor – provides visual display of built-in Windows performance counters o Add performance counters by dragging & dropping o OR by creating custom data collector sets o Multiple Views – report format or real time line graph/histogram o Benchmarking with Performance Monitor – collect date from counters & repeat later & compare • Monitoring Tools | Reliability Monitor PAGE 55 OF 69 6.

Private Working Set displayed by default): Memory – Working Set: private + shared memory Memory – Peak Working Set: max working set amount Memory – Working Set Delta: change in working set memory used by process Memory – Commit Size: amount of virtual memory reserved for use by process Memory – Paged Pool: committed virtual memory for a process that can be written to another storage medium. hard disk Memory – Nonpaged Pool: committed virtual memory for processes that cannot be written to another storage medium • Services – lists currently running services • Performance o CPU usage & CPU Usage History graph o Memory & Physical Memory Usage History graph o Physical Memory in MB Total – total installed physical RAM Cached – amount of physical memory used recently for system resources Free – amount of memory current unused & available o Kernel Memory in MB Total – amount of memory being used by core part of Windows. manufacturer. i. BIOS. etc.e.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* o Provides overview of system stability & trend analysis o Software (Un)Installs o Application Failures o Hardware Failures o Windows Failures o Misc.. Failures Task Manager | Tabs: • Applications – lists currently running applications • Processes o Can end a processor OR set Process Priority o To add columns to view memory usage: View | Select Columns | select memory value from following (Memory .) • Hardware Resources – details about computer hardware PAGE 56 OF 69 . aka the kernel Paged – amount of virtual memory kernel is using Non-Paged – amount of RAM memory used by kernel o System Handles Threads Processes Up Time Page File o If click on RESOURCE MONITOR displays Windows Reliability & Performance Monitor Resource View described earlier in this section • Networking • Users System Information – categories: • System Summary – general info about computer & OS (name.

displays other program-related info 6. sound devices. or notifying me about updates Start | All Programs | Windows Updates | Get Updates For More Products | CONTINUE| click on I ACCEPT TERMS OF USE checkbox | Click INSTALL | Click CONTINUE | Access Microsoft Update website & can set Windows Update to get Microsoft updates too If performed Clean install. modems. other components Software Environment – info about drivers & network connections.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* • • o Conflicts/Sharing o DMA o Forced Hardware o I/O o IRQs o Memory Components – info re disk drives.1 Configuring Windows Update Settings NOTE: updates apply to COMPUTER. not to USER Start | All Programs | Windows Updates | Click CHANGE SETTINGS | Choose how Windows can Install Updates: • Install [recommended & important] updates automatically (recommended) o Every Day (or other interval) at (TIME) • Download updates but let me choose whether to install them • Check for updates but let me choose whether to download & install them • Never check for updates (not recommended) o BUT useful if using Windows Server Update Services (WSUS) on a network… Recommended Updates: • Checkbox to Include recommended updates when downloading. need to carry out this procedure If performed upgrade. installing. fixes or enhancements (or all three) to an OS or software program delivered in a single installable package Troubleshooting Update Problems User needs to provide credentials – can happen when computer uses proxy server to connect to internet to get updates • Get Windows Update Error 8024401B & user needs to click CHECK FOR UPDATES & provide log on credentials Firewall settings are blocking downloads – non-Vista firewalls usually • Check that Background Intelligent Transfer Service (BITS) is enabled/allowed PAGE 57 OF 69 - - - - . will install at next scheduled update install time Can click CHECK FOR UPDATES in left pane | View Available Updates MUST manually install optional updates Select updates & click INSTALL –OR– click INSTALL UPDATES in Windows Update dialog box (home) Standard users can download & install recommended updates. BUT elevated privileges required to stop a download or installation Terms Service Pack: collection of updates. no need to do this & won’t be visible Installing Updates All Programs | Windows Updates | indicates whether updates are available & can click on INSTALL UPDATES If don’t.3.3 CONFIGURE WINDOWS UPDATE 6.


Also, if firewall blocks bitspeer port (UDP & TCP port 2178) can result in problems User did not accept the Microsoft software license terms • Open Windows Update & review error messages Insufficient free disk space – self-explanatory; will fail if this happens User cancelled installation process or computer disconnected from internet – if interruption lasts for too long, download times out & update not downloaded User installs an update & device stops working • Roll back to previous driver • Access manufacturer website to obtain new driver Update cannot complete because restart is required – self-explanatory, restart! Computer turned off at time of scheduled update – change timing, otherwise installed when next start computer Computer in power-saving state (sleep or hibernate) at time of scheduled update • If plugged into power source, will wake & install • If on battery power, new updates will not install •

6.3.2 Windows Update Driver Settings
Control Panel | System & Maintenance | Advanced System Settings | Hardware | Update Settings Available Settings: Check automatically for drivers each time a device is connected Ask user whether to perform the check when a new device is connected Never check Windows Update for new drivers Hiding an Update Right click update in View Available Updates dialog box | select HIDE UPDATE | CONTINUE | press F5 to refresh view & VOILA it’s gone! Restoring Hidden Updates: All Programs | Windows Update | click RESTORE HIDDEN UPDATES | select update(s) to be restored | Click RESTORE | Click CONTINUE | scans for updates | restored updates listed in View Available Updates dialog box again Windows Update | Click on VIEW UPDATE HISTORY | Click INSTALLED UPDATES | OR via: Control Panel | Programs | Programs & Features | View Installed Updates | Opens Uninstall An Update dialog box Not all installed updates will be shown in the Uninstall An Update dialog box To uninstall, select update & click UNINSTALL | CONTINUE If running Ultimate, Windows Updates also displays link to “Windows Ultimate extras” Can download & install extras by selecting “Download Programs, Services, & Unique Content From Windows Ultimate Extras” OR visit Vista Ultimate website directly

6.3.3 Hiding & Restoring Hidden Updates


6.3.4 Viewing Update History

6.3.5 Windows Ultimate Extras

6.4 CONFIGURE DATA PROTECTION 6.4.1 Using Windows Backup & Restore
Configuring Automatic Backup Settings Control Panel | System & Maint. | Backup & Restore Center Back up Files or your entire computer • Click BACK UP FILES next to Create Backup copies of your files and folders | Click CONTINUE | Back Up Files wizard starts | Specify location (Hard disk/CD/DVD -OR- Network location) | Click NEXT |

PAGE 58 OF 69







Click BACK UP COMPUTER next to Create Windows Complete PC Backup & Restore image of entire computer | Click CONTINUE | (Assuming selected “backup files”) Choosing Backup Media Another Fixed HD on computer Removable media (USB or FireWire HD) CD-R, CD-RW, DVD-R/RW Another computer on network Stand-alone network drive CANNOT use flash memory drives, USB sticks, tape drives. CANNOT use source disk as backup destination Files stored in FAT filing system Cannot backup files stored on FAT media – ergo usually cannot USB backup flash memory since by default formatted using FAT FAT32 & NTFS FAT32 – no files larger than 4 GB; no partitions larger than 32 GB User “convert” command line utility to convert from FAT/FAT32 to NTFS with NO data loss Choosing Files to Backup Pictures Music Videos Email Documents TV Shows Compressed Files “Additional Files” NO: • System files • Exe files • Temp files • EFS encrypted files (user has to copy these files directly) – can search for “Create Recovery Certificate for Encrypted Files” in Windows Help & Support o ONLY available on Vista Business & Enterprise & Ultimate o To create Recovery Certificate: Insert Removable Media | Run | cmd | navigate to chosen directory | type “cipher /r:filename” & press ENTER | o To Install Recovery Certificate: Admin Tools | Local Security Policy | Public Key Policy | Right click on “Encrypting File System” | Click on ADD RECOVERY AGENT | NEXT | BROWSE | Select recovery certificate | YES to install | NEXT | open Command Prompt | type “gpupdate” o To view encrypted files with New Recovery Certificate: Log on with account used to encrypt files | Command Prompt | “cipher /u” & click ENTER (Files auto-update when next opened if not explicitly updated this way) • FAT files • Recycle Bin • User Profile settings Scheduling Backups Select how often to create backup • How often: daily, weekly, monthly • What day: S, M, Tu, etc. • What time: whole hours only (10 am, 2 pm, etc.) •
PAGE 59 OF 69


Click SAVE SETTINGS & START BACKUP if want to start immediately instead

6.4.2 Accessing & Encrypting Backup Files
Saved in following format: <backup location> \ <computer name> \ Backup Set <year-month-day> <time> e.g., F:\Glasgow\Backup Set 2007-02-28 110830 (for Feb. 28, 2007 at 11:08:30 am Backup files are in ZIP format When make a full backup, backup folder is created & labeled with date for that day; as you add updates, the folder name stays the same Encrypting Backed-up files Can use EFS to encrypt backup files with your personal encryption certificate NOT convenient if several users log onto computer, would need to decrypt files before another user can carry out a restore For another Full Backup, do a Manual Backup EFS not included with Vista Starter, Basic, or Home Premium editions To Encrypt: Right click Parent folder | click on PROPERTIES | General tab | Advanced | select “Encrypt contents to secure data” | Click on DETAILS for further configuration | OK & OK Viewing Backup Files



6.4.3 Changing Backup Settings
Backup & Control Center | Click CHANGE SETTINGS under the BACK UP FILES Button | opens Backup Status & Configuration dialog box | View Backup Status – indicates if last backup was successful Can Click on BACK UP NOW | CONTINUE | Can click on CHANGE BACKUP SETTINGS (for scheduled backup) | CONTINUE | Can also TURN OFF automatic backup | Click CONTINUE | Cannot save registry settings or other system settings (need to use Restore Points) Cannot create complete image Copies aren’t marked as previous versions & can’t be restored using Restore Previous Versions feature described next Backup & Restore Center | Click on RESTORE FILES | select Files From (latest/older) Backup | select & click NEXT | Add Files Add Folders Search Select location to restore to In original location In following location: & specify Backup & Restore Center | Advanced Restore | OR – via Backup Status & Configuration | Restore Files | Advanced Restore | When using another PC as your backup medium Restore from backup older than most recent one Can restore files for all users System Restore Points made: Daily Before major changes Manually
PAGE 60 OF 69

6.4.4 Copying Files Manually

6.4.5 Restoring Files


6.4.6 Advanced Restore

6.4.7 Using System Restore

select WINDOWS COMPLETE PC RESTORE | Backup image = large virtual hard disk (VHD file) + XML documents ONLY on Vista Business. Enterprise & Ultimate Shadow Copies – automatically saved as part of restore point if System Protection enabled Access previous versions of a file by: Right click file/folder in Windows Explorer | click RESTORE PREVIOUS VERSIONS | goes to PREVIOUS VERSIONS tab of file/folder PROPERTIES | select Previous Version & Click RESTORE | Can use shadow copies to recover previous versions of files. CD-RW. might use up to 15% of HD capacity When reserve space is used up.4. ALL RESTORE POINTS ARE DELETED Restore Points are made until 300 MB of reserve space is used. Restart | Press F8 repeatedly | select REPAIR YOUR COMPUTER from Advanced Boot Options Menu | press ENTER | select keyboard layout & click NEXT | select User Name & type Password & click OK | on System Recovery Options menu.4. then maybe System Protection not turned on for that HD or maybe files might be offline files (not available for offline files) Backup Files Wizard – use to backup personal files like music or documents Create restore points to store system settings & create shadow copies Use Windows Complete PC Backup to create image of entire computer when new & periodically (maybe every 6 months or so) Use Restore Files wizard to restore personal files like documents or pictures Use previous copies to restore personal files from shadow copy or backup OR if want to go back to previous version 6.9 Restoring Damaged or Deleted Files by Using Previous Versions - 6. DVD-RW.4.10 Summary of Backup Types & When to Use Them - PAGE 61 OF 69 . deletes oldest… System Restore doesn’t work on HD’s smaller than 1 GB To Create Windows Complete PC Backup Image: Control Panel | System & Maintenance | Backup & Restore Center | Click BACK UP COMPUTER next to Create Windows Complete PC Backup & Restore image of entire computer | Click CONTINUE | runs Complete PC Backup Wizard | configure to save to a hard disk (internal or external but CANNOT contain system files) | Receive warning if have insufficient space Can save to CD-R.8 Using Complete PC Backup - - 6.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - Control Panel | System & Maintenance | System | System Protection | System Protection Tab of System Properties | click on SYSTEM RESTORE | Also accessible via: Control Panel | Classic | System | System Protection | Also accessible via: Control Panel | Classic | System | System Protection | Click CREATE to manually create a restore point & name it Shadow copies are automatically saves as part of restore point in System Properties If System Protection is turned on. rather than from backup If some files do not have Shadow Copies. Windows automatically creates shadow copies of files that had been modified since last restore point was made If TURN OFF System Protection on a disk. HD Restoring a Computer from a Complete PC Backup Complete restoration of PC Insert Install media | Restart computer | select language | click NEXT | select REPAIR YORU COMPUTER | OS | SYSTEM RECOVERY OPTIONS | select WINDOWS COMPLETE PC RESTORE | IF have Recovery partition.

a new program. System Restore does NOT alter personal files Use Windows Complete PC Restore if virus or hardware fault has corrupted OS & deleted restore points Will likely need to run Restore Files wizard to restore more recent versions of personal files Make copies of files stored on USB flash memory & of encrypted files.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - Use System Restore if a change OS. or a new device driver causes problems & want to restore system or registry settings. copy to NTFS formatted HD or optical storage so remain encrypted! PAGE 62 OF 69 .

Brightness – temporarily adjusts brightness.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 7. Click TURN ON Advanced Settings 7.Battery Status Shows how much charge remains & Can select power plan from list Wireless Network Indicates status of wireless network Can select network to connect to Can turn wireless adapter on/off Screen Rotation – portrait or landscape External Display – Connect additional monitor & customize display settings Sync Center View status of in-progress file synchronization Start New synchronization Set up synchronization partnership Adjust synchronization settings Presentation Settings – adjust settings like speaker volume & desktop background image - - 7. PC stays awake & system notifications and IM‘s are turned off Mobility Center | Presentation Settings | o Can select I AM CURRENTLY GIVING A PRESENTATION o When I am giving a presentation: Turn off screen saver Set Volume To: Show this Background: o Settings turn OFF automatically when Disconnect from network projector Disconnect from additional monitor Shut down/log off mobile PC Mobility Center | Turn On | Presentation Settings | click on CONNECTED DISPLAYS | Display options: Mirrored Extended External Display Only Can also set via: Control Panel | Appearance & Personalization | Personalization | Display Settings | Select the 2nd monitor | click desired display settings (Can extend or use as main monitor) | Apply | YES to keep settings | Click IDENTIFY MONITORS to be sure of which is which (labeled with 1 & 2) | Configure colors for external monitor • Low: 8-bit • Medium: 16-bit • High: 32-bit Move Resolution slider to desired resolution & click OK | YES to keep settings | Open Windows Mobility Center – in Presentation Settings tile. CONFIGURING AND TROUBLESHOOTING MOBILE COMPUTING 7.1 CONFIGURE MOBILE DISPLAY SETTINGS 7.1 Using Windows Mobility Center (settings shown vary by PC…) .1.3 Configuring Multiple Monitors - - PAGE 63 OF 69 .1.Volume – adjust speaker volume for mobile PC & can select MUTE checkbox . to change brightness for your power plan to go Control Panel | Power Options | .2 Configuring Presentation Settings - When turned ON.1.

4 Using a Network Projector NOTE: Uses RDP (Remote Desktop Protocol) over IP Connecting to a Network Projector Infrastructure Network Connection – projector can be on same subnet (use connection wizard) or specify a UNC (Universal Naming Convention) path to projector Ad Hoc Connection – can be included on ad hoc network. wait a few minutes & try again.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* 7.Not designed to transmit video unless in VERY poor quality…try using TV or other higher quality equipment . examine CPU usage .1 Using Sync Center to Synchronize Network Files All Programs | Accessories | Synch Center OR – Mobility Center | Synch Center | (for laptops only…) Synch Partnerships Open Synch Center | click on SETUP NEW SYNC PARTNERSHIP | click device on list & click SET UP | OR can right click device & access PROPERTIES or click SET UP Select files & folders to synch PAGE 64 OF 69 .1. but couldn’t find projector Ensure PC connected to LAN If connected to Network but none listed. can open Mobility Center & enable presentation settings for that projector No projectors appear on list when search in Connect To A Network Projector Wizard Connect to a network projector but nothing happens Entered correct network address.2. Search option will not find projector and entering a UNC path or URL won’t work either…try typing in the IP address Troubleshooting Network Projector Problems Click RESUME in Network Presentation dialog box but presentation doesn’t restart Video Clip in a presentation plays for a few seconds & restarts Firewall settings prevent connection 7.CPU might be busy with another system task.Configure Firewall settings on mobile PC .If DNS not working. if persists. enabling your or other participants in ad hoc network connection to connect to it Connection through a Network Projector Adapter – can use existing data projector & connect through adapter (wirelessly or wired) Can be used for: • Simple PowerPoint Presentations • Displays to a single projector (one-to-one connection) • Mirrored or extended display Start | All Programs | Accessories | Connect To A Network Projector | Search for a projector (recommended) -OR. none shared? Turn off projector & restart Check if someone else using it already Turn off & restart projector Refresh DNS cache: Accessories | Right click Command Prompt | Run As Administrator | Continue | type “ipconfig /registerdns” | Restart projector | try again .2 CONFIGURE MOBILE DEVICES 7.Enter projector address (if not on local subnet & have UNC or URL) | Search | select from list of unsecured & secured projectors | click NEXT | Network Presentation dialog box opens (regardless of whether search or enter address) | & minimizes on the Windows taskbar • Can use to resume or pause presentation • Can use to disconnect from network projector Once a Network projector is selected & connected to.

Business. detects new photos on Windows Mobile device & tags them for import into Windows Vista Photo Gallery Runs on Ultimate. & Home Basic Compatible with Microsoft Outlook 2000. 2007 WMDC does NOT ship with Vista – when connect Mobile Device. Home Premium. XP. calendars. 2003.2. & doesn’t keep synch from finishing Offline Files Can use Sync Center to synch with network files you made available offline > creates copy of offline/network files to your computer Offline files are located on the Mobile PC NOTE: using offline files is a TWO STAGE process • First. Vista downloads & installs the WMDC driver as an update Establishing a Partnership & Synchronizing Information Device can have sync relationships with at MOST 2 computers. Music & Video • File Management • MOBILE DEVICE SETTINGS 7. make files on network server available offline • Then need to sync files so copied to Mobile PC Network Servers ANY computer on the network that shares files/folders Windows Explorer | folder | Properties | Sharing Tab | Advanced Sharing | Caching | Offline Settings dialog box shown • Only the files & programs that users specify will be available offline (default) • All files and programs that users open fro the share will be automatically available offline o Checkbox for “Optimized for performance” • Files or programs from the share will not be made available offline Replaces ActiveSync Features: Enhanced user interface Partnership wizard & improved partnership management Device browsing – can browse files/folders & open documents on your Mobile Device from your PC Synchronization of email. WMDC opens & can click • Programs & services • Pictures. but can set up partnerships with multiple PCs Windows Mobile Device Center | Set up your Device | select content type to synchronize Name device | click SETUP to Windows Mobile Partnership When connect device to computer. Enterprise. favorites. tasks. files Synchronization & shuffling of Microsoft WMP music files Picture management.2 Using the Windows Mobile Device Center - - PAGE 65 OF 69 .*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - Clicking VIEW SYNCH PARTNERSHIPS in Sync Center shows available partnerships | can select device & click BROWSE to view synched files & synch additional files Synch Conflicts: in Synch Center | click VIEW CONFLICTS | NOTE: Also shows in notification area of taskbar of there’s a conflict… Conflict: you need to resolve Error: synch can’t be completed Warning: less severe than error. contacts.

shows relationships & partnerships & sync statuses… Adding & Removing Programs on a Mobile Device - - PAGE 66 OF 69 . Video & Pictures Connect device | WMDC starts | click Pictures. can backup files on mobile device to your computer (ONLY if have relationship established with your computer): • WMDC | Mobile Device Settings | Backup & restore | click on Backup Tab | select Automatically Backup each Time The Device Connects | click CHANGE to use different backup file than previously used | select file | select from Full Backup or Incremental Backup | click BACK UP NOW | RESTORE: Mobile Device Settings | Backup & Restore | Backup | RESTORE NOW | Synchronizing Music. in ActiveSync. Music & Video | opens WMP & click ADD MEDIA TO YOUR DEVICE | select files to synchronize ALL media file sync settings are in WMP o Importing Pictures & Videos from your device Connect device | WMDC starts | Pictures.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - - - - Click CHANGE CONTENT SYNC SETTINGS | select checkbox for type of info you wish to sync & click SYNCH SETTINGS (if available) for each content type o Sync wirelessly with Exchange Server o Manage a partnership o Connection Settings o End a Partnership Connecting Without Setting Up A Partnership Connect device & select QUICK CONNECT | Follow screen prompts | Opening WMDC All Programs | Windows Mobile Device Center Control Panel | Network & Internet | Windows Mobile Device Center | Opens automatically when connect Mobile Device Using Bluetooth Need Bluetooth enabled Control Panel | Hardware & Sound | Bluetooth Devices | Options tab | Allow Bluetooth Devices to Find This Computer | OK | On Mobile Device. Music & Video | click Import Pictures/Video From Your Device | automatically imports … Can access Windows Mobile Device Center from Synch Center. click Menu | click/tap Connect Via Bluetooth | click YES to set up a partnership | (may need to click Add New Device) | when computer name appears on list select it & click NEXT | enter passcode when prompted & click NEXT | On computer will be prompted that Bluetooth Device is trying to connect | Click To Allow This Connection | Click This Message | In Add Bluetooth Device Wizard enter same passcode | Click NEXT | On Mobile Device ensure checkbox for the ActiveSynch service appears & is selected on mobile device On computer complete Bluetooth Wizard On Mobile Device complete the Add Bluetooth Device Wizard Working With Device Files WMDC | File Management | opens Mobile Device folder | can browse files If running Windows Mobile 2003 or Windows Mobile Second Edition.

make sure logged on if set to autowake computer to update info… Some Device content is missing – Disable any SideShow gadgets not needed & make sure have enough space Device failed – try restarting device Device screen dims – Configure the Off The Device Backlight Automatically settings - - 7. Enterprise. Home Premium & Ultimate editions .3.Settings available on Business.Control Panel | Tablet PC Settings | General tab • Handedness (right or left) • Calibration – can calibrate touch screen & select orientation too Handwriting Recognition tab • IF disable automatic learning & turn on again. often used in Portrait mode Convertible – looks like normal laptop & has keyboard .3 CONFIGURE TABLET PC SOFTWARE 7.Two general categories of Tablet PCs: Slate – no dedicated keyboards. PC begins learning again… • Targeting Specific Recognition Errors o Select specific character or word or set of characters w/similar shapes • Teaching Recognizer your Handwriting Style o Perform Handwriting Personalization & enter series of 50 sentences in a single session • Managing Handwriting Recognition Data o Stored as part of User’s profile PAGE 67 OF 69 .2. 7. not classic view) | Hardware & Sound | Windows SideShow • View Gadgets By Name • View Gadgets By Date Installed Uninstalling Devices & SideShow Gadgets Control Panel | Programs & Features | Uninstall or Change A Program | Changing Device & Side SideShow Gadget Settings Lock The Device – specify how long remains inactive before auto-locked Turn Off The Device Backlight Automatically – to save power. dims screen (not all devices have this feature) Show Notifications For Gadgets On This Device – small pop up windows displayed in notification area of device screen • Can clear checkbox under Gadgets & click OK Change Order In Which SideShow Gadgets Appear • Only Gadgets turned on & appearing in Windows SideShow dialog box can be reordered Troubleshooting SideShow Devices Device not connected to computer – not connected or wrong driver or no driver Updated information doesn’t appear on Device – check if on. connected.1 Tablet PC .3 Configuring & Troubleshooting Windows SideShow Devices SideShow Gadgets & Devices Can be used to remotely control applications on main PC Using SideShow Gadgets Control Panel (home.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* WMDC | Programs & Services | More | Add/Remove Programs | select programs(s) & click OK | follow screen prompts for further instructions as nec.

4. sleep process same as Hibernation Hibernating – data in active memory is written to HD & computer is powered off completely.3.2 Power Plans - 7. Files & Settings to Transfer Display tab • Four screen orientations o Primary Landscape – default for most laptops o Primary Portrait – default for slate mode on Tablets (convertibles shift between Primary Landscape & Primary Portrait) o Secondary Landscape – rotated 180 degrees from Primary Landscape o Secondary Portrait – rotated 180 degrees from Primary Portrait Other tab 7.4. resumes MUCH faster than cold boot Balanced Balances battery life & performance Power Saver Great battery life. double tap.4.4 CONFIGURE POWER OPTIONS 7. tap & hold.*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* o Transfer handwriting recognition data via Windows Easy Transfer Wizard | make sure “Handwriting Recognition selected when performing step to Select User Accounts.3. keeps data that was in active memory available…after 15 minutes.1 Power Option Basics Three powered-down states: Shut down – without power Sleeping – requires small amount of power.3 Tablet PC Input Panel - - 7. press button & hold Flicks – customize flicks in up to 8 directions Primary method for Tablet PC users to input data Three ways to input info into Input Panel On-screen keyboard – shows full keyboard onscreen & use stylus or pen Character pad – letter by letter handwriting recognition routine Writing pad – can handwrite full words & have Vista recognize them Change dock location for PC Input Panel via TOOLS menu: Float Dock at top of screen Dock at bottom of screen 7. not so good performance High Performance Bad for battery life.2 Configuring Pens & Input Devices Control Panel | Classic View | Pen & Input Devices | Customize how pen or stylus is used Pen Options: Can configure specific pen actions to mouse actions Pointer Options: single tap.3 Advanced Settings - . great for performance Whether password required on wakeup How long to wait before turning off hard disk Power & performance settings for wireless adapters How much inactivity before sleep mode How much inactivity before hibernation mode How log to wait before suspending supported USB devices What action to take when press power button What action to take when shutting the lid PAGE 68 OF 69 7.

*MCTS 70-620 CONFIGURING WINDOWS VISTA CLIENT* - Configuring Button Behavior & Security - PAGE 69 OF 69 .4 Custom Plans - PCI Express card power management Processor power management (power saver limits processor to 50% of normal capacity) Search & Index performance settings Display power settings Multimedia settings Battery warning thresholds Power Settings | Create Your Own | Create Power Plan wizard Select an existing plan to use as template | rename & customize/edit away! Power Options | Power Options System Settings dialog box | Define Power Buttons & Turn On Password Protection dialog box opened when click on: • Require password on wakeup • Choose what power buttons do • Choose what closing the lid does Configures settings for Battery Power & Plugged In separately for: • Power Button • Sleep Button • Close Lid Can set password protection on wakeup to require or not require from here too 7.

Sign up to vote on this title
UsefulNot useful