Introduction |
|
xxiii | |
|
Chapter 1 Planning for the Installation of Windows 7 |
|
|
1 | (56) |
|
Choosing a Windows 7 Edition |
|
|
2 | (5) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (1) |
|
|
7 | (3) |
|
Designing User State Migration |
|
|
10 | (14) |
|
User State Migration Toolkit |
|
|
11 | (2) |
|
Performing In-Place Migration |
|
|
13 | (7) |
|
Wipe-and-Load Migration vs. Side-by-Side Migration |
|
|
20 | (1) |
|
Determining Which User Data and Settings to Preserve |
|
|
21 | (1) |
|
Local vs. Remote Storage Considerations |
|
|
22 | (1) |
|
|
23 | (1) |
|
Testing Designed Strategy |
|
|
23 | (1) |
|
Virtualization Considerations |
|
|
24 | (18) |
|
Considering a VDI Environment |
|
|
24 | (5) |
|
|
29 | (9) |
|
Installing Integration Components |
|
|
38 | (4) |
|
Planning and Managing Client Licensing and Activation |
|
|
42 | (12) |
|
Licensing Strategy and Compliance |
|
|
42 | (3) |
|
Software Manager Licensing Manager Tool |
|
|
45 | (2) |
|
Volume Activation Methods |
|
|
47 | (1) |
|
|
48 | (2) |
|
Key Management Service and Licensing Infrastructure |
|
|
50 | (4) |
|
|
54 | (1) |
|
|
54 | (1) |
|
|
55 | (2) |
|
Chapter 2 Automating the Deployment of Windows 7 |
|
|
57 | (64) |
|
Understanding and Designing Images |
|
|
58 | (7) |
|
|
59 | (1) |
|
|
60 | (2) |
|
Creating Images on Reference Computers |
|
|
62 | (1) |
|
|
63 | (2) |
|
Choosing a Deployment Strategy |
|
|
65 | (3) |
|
A Comparison of Installations |
|
|
66 | (1) |
|
Deployment Tools Overview |
|
|
67 | (1) |
|
Imaging with the Windows Automated Installation Kit |
|
|
68 | (20) |
|
|
69 | (6) |
|
Understanding the Deployment Image Servicing and Management Tool |
|
|
75 | (5) |
|
Preinstallation Environment |
|
|
80 | (4) |
|
|
84 | (4) |
|
Deploying Images with Windows Deployment Services |
|
|
88 | (19) |
|
|
88 | (1) |
|
Deploying Images with WDS |
|
|
89 | (2) |
|
Adding and Configuring WDS |
|
|
91 | (13) |
|
Capturing Images with WDS |
|
|
104 | (3) |
|
Using the Microsoft Deployment Toolkit 2010 |
|
|
107 | (12) |
|
|
109 | (1) |
|
Creating a MDT 2010 Deployment Share |
|
|
110 | (3) |
|
|
113 | (6) |
|
|
119 | (1) |
|
|
120 | (1) |
|
Chapter 3 Using the Command Prompt and PowerShell |
|
|
121 | (58) |
|
Using the Windows Command Prompt |
|
|
122 | (28) |
|
Launching the Command Prompt |
|
|
123 | (1) |
|
|
124 | (3) |
|
System Variables Identify the Environment |
|
|
127 | (1) |
|
|
128 | (6) |
|
Copy and Paste with the Command Prompt |
|
|
134 | (1) |
|
|
135 | (1) |
|
|
136 | (7) |
|
|
143 | (2) |
|
|
145 | (2) |
|
|
147 | (3) |
|
|
150 | (1) |
|
Using Windows PowerShell and the PowerShell ISE |
|
|
150 | (26) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
Sending Output to a Text File |
|
|
154 | (1) |
|
|
154 | (3) |
|
Running PowerShell Scripts |
|
|
157 | (7) |
|
Using PowerShell Commands |
|
|
164 | (12) |
|
|
176 | (1) |
|
|
176 | (3) |
|
Chapter 4 Managing the Life Cycle---Keeping Windows 7 Up to Date |
|
|
179 | (44) |
|
Keeping Windows Up to Date |
|
|
180 | (10) |
|
|
182 | (1) |
|
|
182 | (1) |
|
Deploying Service Packs and Rollups |
|
|
183 | (1) |
|
|
184 | (1) |
|
Viewing Windows Update Settings |
|
|
185 | (2) |
|
Installing, Hiding, and Restoring Updates |
|
|
187 | (2) |
|
|
189 | (1) |
|
|
190 | (2) |
|
Using MBSA for Security Audits |
|
|
192 | (10) |
|
Picking Computers to Scan |
|
|
193 | (2) |
|
|
195 | (3) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
199 | (3) |
|
Using Windows Server Update Services |
|
|
202 | (19) |
|
|
204 | (1) |
|
|
205 | (1) |
|
Installing, Configuring, and Using WSUS |
|
|
205 | (16) |
|
|
221 | (1) |
|
|
222 | (1) |
|
Chapter 5 Maintaining and Troubleshooting Windows 7 |
|
|
223 | (66) |
|
Identifying and Resolving Performance Issues |
|
|
224 | (24) |
|
Analyzing Logs with Event Viewer |
|
|
225 | (3) |
|
|
228 | (6) |
|
|
234 | (8) |
|
|
242 | (6) |
|
|
248 | (15) |
|
|
249 | (5) |
|
|
254 | (9) |
|
Managing Hardware in Windows 7 |
|
|
263 | (13) |
|
|
263 | (4) |
|
|
267 | (4) |
|
|
271 | (1) |
|
|
271 | (5) |
|
Troubleshooting Boot Issues |
|
|
276 | (10) |
|
Understanding the Boot Phases |
|
|
276 | (4) |
|
Using Advanced Boot Options |
|
|
280 | (2) |
|
|
282 | (3) |
|
Startup and Recovery Options |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (2) |
|
Chapter 6 Configuring and Troubleshooting Application Issues |
|
|
289 | (28) |
|
Installing and Configuring Software |
|
|
290 | (9) |
|
|
291 | (1) |
|
|
292 | (1) |
|
|
292 | (4) |
|
Enabling and Disabling Features |
|
|
296 | (3) |
|
Designing a Delivery Strategy |
|
|
299 | (2) |
|
|
299 | (1) |
|
|
299 | (1) |
|
|
300 | (1) |
|
Application Virtualization |
|
|
301 | (1) |
|
Designing a Deployment Strategy |
|
|
301 | (4) |
|
Identifying Deployment Concerns |
|
|
301 | (2) |
|
Choosing a Deployment Method |
|
|
303 | (2) |
|
Identifying and Resolving Software Failure Issues |
|
|
305 | (9) |
|
Checking and Repairing Installations |
|
|
305 | (2) |
|
|
307 | (2) |
|
|
309 | (1) |
|
Checking Whether an Application Runs in Safe Mode |
|
|
310 | (1) |
|
Managing Application Compatibility |
|
|
310 | (4) |
|
|
314 | (1) |
|
|
314 | (3) |
|
Chapter 7 Networking with Windows 7 |
|
|
317 | (40) |
|
Understanding Network Connectivity in an Enterprise |
|
|
318 | (19) |
|
Unicast, Multicast, and Broadcast |
|
|
320 | (1) |
|
|
320 | (2) |
|
Understanding the DHCP Lease |
|
|
322 | (5) |
|
Understanding the IP Addresses |
|
|
327 | (5) |
|
Configuring a Network Interface Card |
|
|
332 | (2) |
|
|
334 | (3) |
|
Resolving Names to IP Addresses |
|
|
337 | (5) |
|
Hostname Resolution Methods |
|
|
337 | (3) |
|
NetBIOS Name Resolution Methods |
|
|
340 | (1) |
|
|
340 | (2) |
|
Using the Network and Sharing Center |
|
|
342 | (7) |
|
Public vs. Private Networks |
|
|
344 | (4) |
|
Changing Advanced Sharing Settings |
|
|
348 | (1) |
|
Troubleshooting Network Connectivity Problems |
|
|
349 | (6) |
|
Verifying Hardware and Cabling |
|
|
350 | (2) |
|
|
352 | (1) |
|
Using Ping to Determine Scope of the Problem |
|
|
353 | (1) |
|
Troubleshooting and Resolving Name Resolution Issues |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (2) |
|
Chapter 8 Accessing Resources on a Network |
|
|
357 | (36) |
|
Accessing Network Resources |
|
|
358 | (13) |
|
Pointing to Network Resources |
|
|
359 | (1) |
|
Creating Shares on Windows 7 |
|
|
360 | (4) |
|
Working with Printers on Windows 7 |
|
|
364 | (4) |
|
Installing and Sharing Printers on Windows 7 |
|
|
368 | (2) |
|
Connecting to a Shared Printer |
|
|
370 | (1) |
|
Understanding Permissions |
|
|
371 | (17) |
|
|
372 | (2) |
|
|
374 | (8) |
|
|
382 | (2) |
|
Combining NTFS and Share Permissions |
|
|
384 | (2) |
|
|
386 | (2) |
|
Identifying and Resolving Network Printer Issues |
|
|
388 | (3) |
|
|
389 | (2) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
391 | (1) |
|
|
392 | (1) |
|
Chapter 9 Managing Windows 7 in a Domain |
|
|
393 | (38) |
|
|
394 | (8) |
|
|
394 | (8) |
|
Authentication vs. Authorization |
|
|
402 | (8) |
|
|
402 | (1) |
|
|
402 | (1) |
|
|
403 | (2) |
|
Organizing Users with Groups |
|
|
405 | (1) |
|
Group Scope and Group Type |
|
|
406 | (4) |
|
Identifying and Resolving Logon Issues |
|
|
410 | (6) |
|
|
410 | (1) |
|
|
411 | (1) |
|
|
412 | (1) |
|
Determining Logon Context |
|
|
412 | (2) |
|
|
414 | (1) |
|
|
415 | (1) |
|
Understanding User Profiles |
|
|
416 | (10) |
|
|
417 | (1) |
|
|
418 | (3) |
|
|
421 | (1) |
|
Super-Mandatory User Profiles |
|
|
422 | (1) |
|
Modifying the Default User Profile |
|
|
423 | (2) |
|
Configuring Settings with Scripts |
|
|
425 | (1) |
|
|
426 | (2) |
|
|
426 | (2) |
|
Third-Party Anti-malware Software |
|
|
428 | (1) |
|
|
428 | (1) |
|
|
429 | (2) |
|
Chapter 10 Managing Windows 7 with Group Policy |
|
|
431 | (44) |
|
Group Policy and the GPMC |
|
|
432 | (28) |
|
|
434 | (2) |
|
|
436 | (8) |
|
RSAT and the Group Policy Management Console |
|
|
444 | (3) |
|
User vs. Computer Settings |
|
|
447 | (2) |
|
Forcing Group Policy Updates |
|
|
449 | (1) |
|
Advanced Group Policy Settings |
|
|
450 | (8) |
|
|
458 | (1) |
|
Using Group Policy Results |
|
|
458 | (2) |
|
Using Group Policy Modeling |
|
|
460 | (1) |
|
|
460 | (12) |
|
Managing User Profiles with Group Policy |
|
|
461 | (1) |
|
Logon and Startup Scripts |
|
|
462 | (4) |
|
Deploying an Application via Group Policy |
|
|
466 | (1) |
|
|
467 | (2) |
|
|
469 | (3) |
|
|
472 | (1) |
|
|
473 | (2) |
|
Chapter 11 Managing Security in Windows 7 |
|
|
475 | (36) |
|
|
476 | (6) |
|
|
479 | (1) |
|
Configuring UAC via Group Policy |
|
|
480 | (2) |
|
|
482 | (17) |
|
Local Security Policy vs. Group Policy |
|
|
483 | (1) |
|
|
484 | (5) |
|
|
489 | (8) |
|
|
497 | (1) |
|
Removable Storage Access Policy |
|
|
498 | (1) |
|
Designing BitLocker Support |
|
|
499 | (6) |
|
|
500 | (1) |
|
|
501 | (1) |
|
BitLocker and Data Drives |
|
|
501 | (1) |
|
|
501 | (2) |
|
Storing BitLocker Recovery Data in AD DS |
|
|
503 | (1) |
|
BitLocker Active Directory Recovery Password Viewer Tool |
|
|
503 | (2) |
|
|
505 | (4) |
|
Checking the Firewall Status |
|
|
506 | (2) |
|
|
508 | (1) |
|
|
509 | (1) |
|
|
510 | (1) |
|
Chapter 12 Supporting Mobile Windows 7 Users |
|
|
511 | (38) |
|
Configuring and Troubleshooting Wireless Connectivity |
|
|
512 | (15) |
|
|
513 | (2) |
|
Configuring Wireless on Windows 7 |
|
|
515 | (4) |
|
Connecting to a Wireless Network |
|
|
519 | (3) |
|
|
522 | (1) |
|
Troubleshooting Wireless Connections |
|
|
523 | (4) |
|
Troubleshooting Remote Access Issues |
|
|
527 | (17) |
|
|
527 | (2) |
|
Creating a Dial-up Connection |
|
|
529 | (3) |
|
Creating a VPN Connection |
|
|
532 | (2) |
|
|
534 | (1) |
|
Troubleshooting a VPN Client |
|
|
535 | (8) |
|
|
543 | (1) |
|
Understanding DirectAccess |
|
|
544 | (1) |
|
|
545 | (2) |
|
|
546 | (1) |
|
|
546 | (1) |
|
|
547 | (1) |
|
|
547 | (2) |
|
Chapter 13 Administering Internet Explorer |
|
|
549 | (30) |
|
Managing Windows Internet Explorer Settings |
|
|
550 | (13) |
|
|
551 | (5) |
|
|
556 | (2) |
|
|
558 | (1) |
|
|
559 | (2) |
|
|
561 | (1) |
|
|
562 | (1) |
|
Understanding Advanced Settings |
|
|
563 | (8) |
|
|
565 | (3) |
|
|
568 | (1) |
|
Branding Internet Explorer |
|
|
568 | (1) |
|
|
569 | (2) |
|
Troubleshooting Internet Explorer Issues |
|
|
571 | (5) |
|
Check Network and Proxy Settings |
|
|
572 | (1) |
|
Troubleshoot Plug-ins and Add-ons |
|
|
572 | (2) |
|
Restore IE Original Settings |
|
|
574 | (1) |
|
Disable Add-on Crash Detection |
|
|
575 | (1) |
|
Enable Compatibility View |
|
|
576 | (1) |
|
|
576 | (1) |
|
|
577 | (2) |
Appendix A Objective Mapping to Chapter Titles |
|
579 | (10) |
Appendix B About the Companion CD |
|
589 | (4) |
Glossary |
|
593 | (22) |
Index |
|
615 | |