Your SlideShare is downloading. ×
Utilize Windows Vista www.utilizewindows.com
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

Utilize Windows Vista www.utilizewindows.com

1,018
views

Published on

Read about common administration tasks in Windows Vista. Among other things you will learn about user and group management, hardware management, network settings configuration, file system management, …

Read about common administration tasks in Windows Vista. Among other things you will learn about user and group management, hardware management, network settings configuration, file system management, security including NTFS permissions, printer configuration, optimization tools, recovery options, and a few things considering the process of installation.

Published in: Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
1,018
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
8
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. This e-book is a collection of articles that were originally published onwww.utilizewindows.com. As we update articles on our site, we will alsoupdate this e-book. Check our site for the latest version of this e-book onwww.utilizewindows.com/e-booksThis e-book is published under Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. To view a copy of thislicense, visit http://creativecommons.org/licenses/by-nc-sa/3.0We offer free quizzes which you can use to test your knowledge aboutWindows operating systems. You can find them here:www.utilizewindows.com/quizzesIf you have a comment or if you would like to report some error, please useour contact form:www.utilizewindows.com/contact-usIf you would like to support us, you can take action(www.utilizewindows.com/support-us) or you can donate(https://flattr.com/thing/710994)
  • 2. CONTENTSBASICS.............................................................................................................................................................. 1INTRODUCTION TO WINDOWS VISTA............................................................................................................................................. 1NEW INTERFACE IN WINDOWS VISTA............................................................................................................................................ 2UPGRADE TO WINDOWS VISTA - OVERVIEW ............................................................................................................................... 10MIGRATE TO VISTA USING WET.................................................................................................................................................. 11MANAGE DRIVERS IN VISTA......................................................................................................................................................... 15SOLVE PROBLEMS WITH VISTA INSTALLATION ........................................................................................................................... 20JOIN VISTA TO A DOMAIN ............................................................................................................................................................ 27CONFIGURE AERO IN VISTA ......................................................................................................................................................... 31CONFIGURE PARENTAL CONTROLS IN VISTA............................................................................................................................... 38SET UP ACCESSIBILITY OPTIONS IN VISTA................................................................................................................................... 44APPLICATIONS................................................................................................................................................ 48TASK MANAGER IN VISTA............................................................................................................................................................. 48MICROSOFT MANAGEMENT CONSOLE IN VISTA .......................................................................................................................... 54SECURITY CENTER IN VISTA......................................................................................................................................................... 63CONFIGURE UAC IN VISTA .......................................................................................................................................................... 67WINDOWS DEFENDER IN VISTA................................................................................................................................................... 71FIREWALL IN VISTA...................................................................................................................................................................... 80MEDIA PLAYER AND MEDIA CENTER IN VISTA............................................................................................................................ 97NETWORKING .............................................................................................................................................. 104NETWORK AND SHARING CENTER IN VISTA .............................................................................................................................. 104CONFIGURE TCP/IP SETTINGS IN VISTA................................................................................................................................... 108CONFIGURE DIAL-UP AND VPN CONNECTION IN VISTA ........................................................................................................... 120CONNECT TO A WIRELESS NETWORK IN VISTA.......................................................................................................................... 128CONFIGURE INTERNET CONNECTION SHARING (ICS) IN WINDOWS VISTA ............................................................................. 136MANAGEMENT ............................................................................................................................................ 139MANAGE HARD DISKS AND FILE SYSTEM IN VISTA................................................................................................................... 139CONFIGURE WINDOWS MAIL IN VISTA...................................................................................................................................... 146WORKING WITH WINDOWS MEETING SPACE IN VISTA ............................................................................................................ 152MANAGE PERFORMANCE IN VISTA............................................................................................................................................. 157WINDOWS UPDATE FEATURE IN VISTA ..................................................................................................................................... 162HOW TO USE TROUBLESHOOTING TOOLS IN VISTA................................................................................................................... 164WORKING WITH BACKUP TOOLS IN VISTA ................................................................................................................................ 168WORKING WITH MOBILE DEVICES IN VISTA............................................................................................................................. 175USER ACCOUNT MANAGEMENT IN VISTA .................................................................................................................................. 177POWER OPTIONS IN VISTA ......................................................................................................................................................... 184FILE SYSTEM................................................................................................................................................. 187ENCRYPTING FILE SYSTEM CONFIGURATION IN VISTA ............................................................................................................. 187NTFS AND SHARE PERMISSIONS MANAGEMENT IN VISTA ....................................................................................................... 191
  • 3. Utilize Windows VistaBasics1www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)BasicsIntroduction to Windows VistaParent Category: VistaCategory: BasicsWindows Vista comes in several editions. Each edition is aimed at particular target audience and each edition hasa particular price point.Before you startObjectives: learn about main features in certain Vista editions and minimal hardware requirements.Prerequisites: no prerequisites.Key terms: vista editions, starter, home basic, home premium, business, enterprise, ultimate, 32bit, 64bit,hardware requirements.Vista EditionsVista editions are: Starter Home Basic Home Premium Business Enterprise UltimateStarterWindows Vista Starter edition does not support domains, Aero graphical user interface, Media Center, hard driveencryption, inbound network connections, and it can not be run on a Tablet PC. This edition supports only asingle, 32-bit processor, and allows only three applications to run simultaneously.Home BasicWindows Vista Home Basic edition comes in 32-bit and 64-bit version. Home Basic does not support domains,Aero graphical user interface, Media Center, hard drive encryption, and can not be run on a Tablet PC. HomeBasic does support parental controls and allows more than three applications open at once.Home PremiumWindows Vista Home Premium does not support domains. Home Premium supports Aero graphical userinterface, Media Center, and it can be run on a Tablet PC. Home Premium does support parental controls andallows more than three applications open at once.BusinessWindows Vista Business supports domains, Aero graphical user interface and it can be run on a Tablet PC. Itdoes not support Media Center and full hard drive encryption.Enterprise
  • 4. Utilize Windows VistaBasics2www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Windows Vista Enterprise supports domains, Aero graphical user interface, it can use full hard drive encryption,and it can be run on a Tablet PC. It does not support Media Center functionality.UltimateWindows Vista Ultimate supports all features of Windows Vista Enterprise and Premium.32-bit versus 64-bitWindows Vista comes in boh 32-bit and 64-bit editions (except Vista Starter edition). It is possible to run 32-bitedition of Windows Vista on a computer with a 64-bit processor, but it is not possible to run 64-bit editions on a32-bit processor. The most important advantage of 64-bit edition of Windows is that it allows a computer to usemore RAM than the 32-bit edition.Hardware RequirementsTo run Windows Vista our computer should meet (at a minimum) the following hardware specification: 1-GHz or faster processor 512 MB of RAM 40 GB of available hard disk space DVD-ROM drive DirectX-capable graphics card with a Windows Display Driver Model (WDDM) driver, Hardware Pixel Shader 2.0support, and a minimum of 128 MB of graphics memory Keyboard and Microsoft mouse or compatible pointing deviceIf we have an Windows XP machine which we want to upgrade, we can use Windows Vista Upgrade Advisor.Windows Vista Upgrade Advisor is a downloadable tool that allows us to determine whether a Windows XPcomputer is capable of running Windows Vista. We can download it from Microsoft web pages.RememberVista editions are: Starter, Home Basic, Home Premium, Business, Enterprise and Ultimate. Windows VistaBusiness, Enterprise and Ultimate support domains. Windows Vista comes in both 32-bit and 64-bit editions(except Vista Starter edition). It is possible to run 32-bit edition of Windows Vista on a computer with a 64-bitprocessor, but it is not possible to run 64-bit editions on a 32-bit processor. To run Windows Vista our computershould meet (at a minimum) the following hardware specification: 1-GHz or faster processor, 512 MB of RAM, 40GB of available hard disk space, DirectX-capable graphics card with a Windows Display Driver Model (WDDM)driver, Hardware Pixel Shader 2.0 support, and a minimum of 128 MB of graphics memory.New Interface in Windows VistaParent Category: VistaCategory: BasicsThere are a lot of differences between Vista and previous operating systems. WindowsVista has a greatly redesigned interface. The Windows Vista graphical user interface isthree-dimensional and includes animations, transitions, and fades.Before you startObjectives: learn about new user interface, new elements and how to configure them.Prerequisites: no prerequisites.Key terms: graphics, customization, sidebar, taskbar, start menu, notification area, control panel, windowsexplorer, options
  • 5. Utilize Windows VistaBasics3www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)GraphicsRich graphics, animations, and transitional effects require a graphics card that supports a new graphic drivermodel called the Windows Display Driver Model (WDDM). These effects are part of the Windows Vista Aerodesktop experience and include glass effects, advanced window management features, and a more stableexperience through desktop composition. This rich graphical functionality is built on the Windows PresentationFoundation (WPF) graphics subsystem, formerly called Avalon.CustomizationTo customize Vista desktop, right-click on the desktop and select Personalize from the menu. Here we can findmany options for customizing appearance and sounds.Image 131.1 - Vista Personalization MenuThe default Windows Vista (Aero) scheme is active by default if you have a supported video card. Aero allows youto see other items behind your window through a slightly blurred glass effect. If you dont want your desktop touse the default transparent glass, you can choose some other color scheme. There are even advanced colorcontrol settings that allow us to disable transparent glass, specify the intensity, and even custom-mix colors andspecify color saturation so that we can really get the look we want.SidebarThe first thing to notice on the desktop is the Sidebar. Sidebar lets us add small applications called Gadgets toour desktop. If the Sidebar gets in our way, we can easily close it by right-clicking on it and choosing the CloseSidebar option.
  • 6. Utilize Windows VistaBasics4www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 131.2 - SidebarTaskbarThe Taskbar, the bar at the bottom of the screen can be locked, or we can turn on auto hide option.Image 131.3 - Taskbar options
  • 7. Utilize Windows VistaBasics5www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 131.4 - Taskbar PropertiesSimilar buttons can be grouped together. We can show the Quick Launch and show live thumbnails of programswe currently use. We can use the ALT+TAB command to see live thumbnails, or Windows key + TAB to viewopened programs in 3D. To cycle through the Windows 3D view, we can use the arrow/cursor keys or use thescroll wheel on our mouse.Start MenuThe Start Menu has been redesigned. Our most recently used programs are on the left, and if we click AllPrograms, all applications installed on our computer will appear in the same area.Image 131.5 - Start Menu Image 131.6 - All Programs
  • 8. Utilize Windows VistaBasics6www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)There is a Search tool built-in and this is also the Run dialog box. We dont even have to know the full name of theprogram we want to run. We can type one to three letters and the search engine will display content that beginswith those letters or includes those letters within the body of the name.Image 131.7 - Search and Run dialog boxWe can also customize the Start Menu by right-clicking the on the Task-bar, going into Properties and specifyhow we want the Task-bar and Start Menu to look.Image 131.8 - Start Menu OptionsOf course, we can always revert the Start Menu back to the classic Start Menu if we dont like the new one.Notification AreaNotification area is the area in the lower right-hand corner, next to the Clock. In Properties we can choose to hideinactive icons. In Properties we have options for the Toolbars as well. We can add a bunch of Toolbars to theTaskbar.
  • 9. Utilize Windows VistaBasics7www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 131.9 - Notification Area OptionsImage 131.10 - ToolbarsControl PanelAnother thing that has been redesigned is the Control Panel. If we dont like the new interface of the ControlPanel, we can go back to the Classic View by clicking on the Classic View on the left.
  • 10. Utilize Windows VistaBasics8www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 131.11 - Control PanelWhen we click on things in the Control Panel, some of them will open in the same window and some of them willopen in new window. For example, if we click on Back up And Restore Center, it will open up in the same window.Now, notice the Breadcrumb bar at the top of the window. If we want to go back to the Control Panel, we cansimply do that by clicking the right option in the Breadcrumb bar. We can also click on the down-arrow to see allother places that we can go in the Control Panel. If we, for instance, click on the Security Center, it will open up inthe separate window.Image 131.12 - BreadcrumbsWindows ExplorerWindows Explorer has also been redesigned. If we go to the Computer, on the left we can see our favorite linksand folders, so we can easily browse our hard drives, network, etc. This is where the Breadcrumb bar is veryhandy. In Windows Vista we are able to sort and group files by various criteria, including date, author, type, andkeywords. Keywords use meta-data that is included in files stored on our computer. We can add keywords to ourdata files, for example, our image files, that Windows Vista will index. Search is integrated into everything now. Aswe will see, searching files on our computer is now much more efficient. We can easily change the defaultlocation of where documents are saved from within Windows Vista. The new Locations tab on the properties pagefor Documents allows us to move the location. The default Pictures and Music folders can also be moved in thesame manner.
  • 11. Utilize Windows VistaBasics9www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Another function that has been included in the Windows shell functionality is "Open Command Prompt Here." Toinvoke a command prompt while using Windows Explorer, press the shift key while you right-click the folder whereyou want the command prompt to appear and select Open Command Window Here from the menu.Image 131.13 - Open CMD HereBy default Vista does not display classic navigation menus in Windows Explorer. We can turn the Classic menuon or off by choosing the Organize option, then Layout and then choosing Menu Bar option.Image 131.14 - Menu BarRememberRich graphics, animations, and transitional effects require a graphics card that supports a new graphic drivermodel called the Windows Display Driver Model (WDDM). The default Windows Vista (Aero) scheme is active bydefault if you have a supported video card. Sidebar lets us add small applications called Gadgets to our desktop.We can use the ALT+TAB command to see live thumbnails, or Windows key + TAB to view opened programs in3D. The Start Menu has been redesigned. There is a built-in Search tool and this is also the Run dialog box.Notification area is the area in the lower right-hand corner, next to the Clock. Another thing that has beenredesigned is the Control Panel. Windows Explorer has also been redesigned. This is where the Breadcrumb bar
  • 12. Utilize Windows VistaBasics10www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)is very handy. To invoke a command prompt while using Windows Explorer, press the shift key while you right-click the folder where you want the command prompt to appear and select Open Command Window Here fromthe menu.Upgrade to Windows Vista - OverviewParent Category: VistaCategory: BasicsWhen upgrading to Vista from previous versions of Windows, we have to keep some things in mind. Before doingan upgrade it is strongly recommended to do a full backup, just in case of any problems with the upgrade. It isalso recommended to turn off antivirus software, because Vista can have problems with it.Before you startObjectives: learn which Windows versions can be upgraded to VistaPrerequisites: you should know about different ways to install Windows.Key terms: upgrade, in-place, vista, windows editions, versionIn-place UpgradeAn in-place upgrade keeps all user applications, settings, files and other user settings. To do in-place upgrade wecan use a Vista DVD or do an install across the network. It is important to know which previous versions ofWindows can upgrade to Vista. Any version prior to Windows 2000 cannot be upgraded to Vista. Windows 2000can only be migrated to Vista and cannot be upgraded. That means that we can only upgrade Windows XP whichhas to be Service Pack 2 at minimum.Different XP EditionsDifferent editions of XP can only upgrade to certain Vista editions. XP Home can upgrade to all Vista editions. XPProfessional only upgrades to Vista Business, Enterprise or Ultimate edition. XP Media Center only upgrades toVista Home Premium or Vista Ultimate because only those two editions of Vista contain Windows Media Center.XP Tablet PC only upgrades to Business, Enterprise or Ultimate. Any 64-bit edition of Windows XP can not beupgraded at all.Upgrade from Vista to VistaThere are two ways to upgrade from one edition of Vista to another. One is to simply insert the Vista DVD of thehigher edition and upgrade. The second is to go the Control Panel where we can find Windows Anytime Upgradeapplet trough which we can do an upgrade. When doing an upgrade for one edition of Vista to another, we alsohave to be careful about which editions can upgrade to which other edition . First of all we can not downgradeeditions . For example, if we have the Windows Vista Ultimate we can not downgrade to Vista Enterprise withoutdoing a clean installation. All editions can upgrade to higher versions in the hierarchy, and the hierarchy beingStarter, Home Basic, Home Premium, Business, Enterprise and Ultimate. The one exception to that is that VistaHome Premium can only be upgraded to Vista Ultimate. The reason for that is that it contains Windows MediaCenter and DVD authoring and burning capabilities.RememberWindows 2000 can only be migrated to Vista and cannot be upgraded. We can only upgrade Windows XP whichhas to be Service Pack 2 at minimum. XP Home can upgrade to all Vista editions. XP Professional only upgradesto Vista Business, Enterprise or Ultimate. XP Media Center only upgrades to Vista Home Premium or VistaUltimate. Any 64-bit edition of Windows XP can not be upgraded at all. We can not downgrade versions. When
  • 13. Utilize Windows VistaBasics11www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)talking about Vista to Vista upgrade, all editions can upgrade to higher edition in the hierarchy. The hierarchy isStarter, Home Basic, Home Premium, Business, Enterprise and Ultimate. The one exception to that is that VistaHome Premium can only be upgraded to Vista Ultimate.Migrate to Vista using WETParent Category: VistaCategory: BasicsWe can perform migration to Windows Vista from Windows 2000 operating system andlater. We do a migration when we want to transfer settings from old to the newinstallation, whether they are on the same or different computer. We have two toolsavailable for migration and those are Windows Easy Transfer (WET) and User StateMigration Tool (USMT).Before you startObjectives: learn where to find WET, how to run it and which options to use in different situations.Prerequisites: you have to be familiar with migration terms and utilities.Key terms: wet, profile migration, transfer types, location typesWindows Easy Tranfer (WET) ExampleIn this tutorial we will use WET which we can find on Vista installation DVD. We will insert our DVD on a sourcecomputer and DVD menu should appear. If autorun is not enabled, browse the DVD and open setup.exe for mainmenu to run.Image 161.1 - Vista DVD MenuOn the menu notice the option Transfer files and settings from another computer. When we click that optionwe will actually run the WET tool.
  • 14. Utilize Windows VistaBasics12www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 161.2 - WET MenuOn the WET menu we can see a list of the things that we can transfer, like multiple user profiles, data files andfolders, application settings, Internet Explorer settings and even e-mail messages. On the next screen we canchoose how to transfer files to the new computer.Image 161.3 - WET Transfer OptionsWe can use an Easy Transfer Cable to do it directly to the other computer (used only if we have two computers).We can also use a network connection to do a direct transfer if we have two computers on the same network. Ifwe dont have two computers we can use a network connection to transfer files to a third-party server. We canalso put our data on a removable media such as a CD, DVD or USB drive. In our case we will use the third option.
  • 15. Utilize Windows VistaBasics13www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 161.4 - LocationFor this example we will choose an External hard disk or a network location option. This way we can browse tothe location where we want to save our data.Image 161.5 - Location for MIG fileFor this example we will simply save the data to our C: drive. Notice that the data will be saved with .MIGextension and that we can also password protect it. On the next screen we can choose what to transfer.
  • 16. Utilize Windows VistaBasics14www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 161.6 - What to transferHere we can go to advanced options and select which data from which users we want to transfer. For thisexample we will simply choose to transfer all data (All users, files and settings option).Image 161.7 - ReviewThe system will ask us to confirm our selection. When we click the Transfer button, copying will begin.
  • 17. Utilize Windows VistaBasics15www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 161.8 - TransferThe whole transfer can take some time to finish. When the transfer is complete we have to copy our .MIG file tothe destination computer. Then we need to double-click it and follow the instructions. If we use direct transferusing cable or network, file copying is not necessary.RememberWET is designed for end users and it is easy to use. The transfer can be done using Easy Transfer Cable,network or by using removable media. We can transfer all users and their settings or only particular users andsettings.Manage Drivers in VistaParent Category: VistaCategory: BasicsAfter the successful installation of Vista, we need to make sure that all our devices haveappropriate drivers installed. The driver is a software which enables interaction betweenthe operating system and a specific piece of hardware. Drivers are specifically designedfor different types of hardware and operating systems.Before you startObjectives: learn where to find Device Manager, how to work with devices and their drivers, what different labelsmean, and where to find some specific options.Prerequisites: you should know what drivers are.Key terms: driver, device manager, hardware, device, rollback, installationDevice InstallationWhen installing devices we should follow the instructions that came with the device. Typically the device will havean installation disk that includes the driver and often other software for getting the most out of the device. Forsome devices Windows will already have drivers built in. For that devices we can simply attach the device, andWindows will automatically install appropriate devices. For some type of devices we will never have installationdisks or files. For example, Windows will always detected and configure the appropriate drivers for USB flashdrives. To manage devices and their drivers we will use the Device Manager.Device Manager
  • 18. Utilize Windows VistaBasics16www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)To open Device Manager go to Control Panel and select Device Manager from the list. Another way is to right-click Computer, select Properties and then click on the Device Manager. If we get User Account Control (UAC)prompt, we simply select Continue.Image 172.1 - Device ManagerIn Device Manager we can see all devices attached to our system. Notice that devices are organized by type. Wecan right-click any device and see the information about the device by going to its properties. Devices that have aregular icon identify devices that are correctly installed. A yellow exclamation mark identifies a device that Vistacould not recognize (no driver was found for the device). The Windows has detected the name of the device butdoesnt know how to configure it. To correct this problem we can click on the device and search for a suitabledriver. To do that, right-click on the device with no drivers and select Update Driver Software. In many cases wewill need to download the driver from the manufacturers Web site or install the driver from the devices installationdisc. The drivers on the installation disc are often outdated. To get the latest driver for a device, check themanufacturers Web site.Image 172.2 - Right-Click
  • 19. Utilize Windows VistaBasics17www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 172.3 - Search For DriversA down arrow identifies a disabled device. Do disable particular device, right-click it and then select Disable. Wetypically do that for devices that we dont want to use, but we cant physically remove them from the system.When the device is disabled, the computer cant use it. To use a disabled device, enable it in Device Manager. Incontrast to Vista, Windows XP will have a red x for disabled devices, instead of down arrow.Image 172.4 - Disabled DeviceFor most devices, we will typically physically install the device, then start Windows. The device will be detectedand the drivers installed automatically or the Found New Hardware wizard will appear. The wizard will tell usthat it needs to find the driver for the device. We have three options when this happens.
  • 20. Utilize Windows VistaBasics18www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image - 172.5 - Found New Hardware WizardIf we choose the first option our computer will search the Windows Update website for a driver that is compatiblewith the device. The behavior for looking for drivers at Windows Update is controlled by a setting on the advancedsystem properties. Lets go to Control Panel > System and Maintenance > System > Advanced SystemSettings > Hardware tab > Windows Update driver settings.Image 172.6 - Update Driver SettingsIn our case Windows will ask us each time we connect new device before checking for drivers. If Windows Updateserver doesnt have the appropriate driver, Windows will ask us to insert the disk that came with this hardware. Assoon as we insert the disk, Windows will automatically search the disk for the appropriate drivers. If we dont havea disk we can try other options. For example, we can download the drivers to our computer, so we will need to tell
  • 21. Utilize Windows VistaBasics19www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)the installation process to browse our computer for the driver software that weve already downloaded. Windowswill always check if the driver is digitally signed. If the driver is not signed, by default Vista will prompt us if wewant to continue with the installation.UninstallationIf we physically remove the device from the system, Windows will automatically remove it from the list in DeviceManager. If we attach that device again, Windows will automatically configure it since it already has drivers for it.If we uninstall a device in Device Manager, we can also choose to delete the driver software for that device. Inthat case when we insert the device again, we would have to reinstall the drivers. Also, if that physical device isstill present in the system, rebooting the system or scanning for hardware changes in Device Manager will usuallyre-detect the device. To prevent a device from being used, disable it instead of uninstalling it.TroubleshootingIf we are having problems with a device, we can try and update the driver through Device Manager or downloadthe latest driver. If changing a driver causes system instability, we can use the Rollback feature to revert to aprevious version. To use the Rollback feature, right-click on a particular device, select Properties, select theDrivers tab and click on the Roll Back Driver button.Image 172.7 - Driver OptionsIf we cant log on after changing the driver, we can press F8 during the reboot process and choose the LastKnown Good Configuration option. We can also select Safe Mode. In Safe Mode, we can use driver rollback ordisable the device. All kernel mode drivers in 64-bit Vista editions must be digitally signed. If we find that wecannot install a driver, it could be because it is not digitally signed.
  • 22. Utilize Windows VistaBasics20www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Hardware ResourcesTo see the hardware resources used by devices, in Device Manager we can go to the device properties, and thenon the Resources tab.Image 172.8 - Resource SettingsHere we can see device resources like memory range, I/O range and IRQs. Here we can also see whether thereare any conflicts with other devices on our system. By default, resources for plug and play devices are configuredautomatically. Today we will rarely need to change the hardware resources used by a device.RememberWhen installing new devices, the first thing we should do is follow the instructions that came with the device. Inmany cases this means running a setup program that came with the device. We can find Device Manager inControl Panel. A yellow mark identifies a device that Vista could not recognize (no driver was found for thedevice). A down arrow identifies a disabled device. For most devices, we will typically physically install the device,then start Windows. The device will be detected and the drivers installed automatically or the Found NewHardware wizard will appear. If changing a driver causes system instability, we can use the Rollback feature torevert to a previous version.Solve Problems With Vista InstallationParent Category: VistaCategory: BasicsWhen troubleshooting Windows installation, we have to identify what is causing theproblem and then test a potential solution. For example, if Vista wont install on ourcomputer, we should check that our machine has minimum hardware requirements to runVista.Before you startObjectives: learn what should you check before you try and install Vista on your computer. Also, learn whatcommon problems occur after the installation and how to deal with them.
  • 23. Utilize Windows VistaBasics21www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Prerequisites: no prerequisites.Key terms: compatibility, device manager, hardware requirements, display problem, driver compatibility,application compatibilityBefore InstallationCheck Hardware RequirementsThere are several ways to check that our computer meets the minimum hardware requirements for Vista. Forexample, we can use System Information, System Properties or we can use Vista Upgrade Advisor. VistaUpgrade Advisor also checks our software to see if it will be compatible with Vista.Image 179.1 - Upgrade AdvisorTo start Microsoft System Information in XP, use either of the following methods: Click Start, point to Programs, point to Accessories, point to System Tools, and then click System Information. Click Start, click Run, type msinfo32.exe in the Open box, and then click OK.To open the System Properties dialog box, use either of the following methods: Right click the My Computer icon on your desktop and click Properties. Go into the Control Panel and double click the System applet.Check Devices and System EventsBefore we install Vista, we should check Device Manager to verify that we dont have any current problems withour hardware. To open Device Manager in Windows XP, go to Control Panel, System, Hardware tab and thenclick Device Manager button.
  • 24. Utilize Windows VistaBasics22www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 179.2 - Device Manager in XPWe should also check Event Viewer to to verify that were not having any serious error messages or warnings. Toopen Event Viewer in Windows XP, go to Control Panel, Administrative Tools and then Event Viewer.Image 179.3 - Event Viewer in XPIf we find serious error messages we should go to the Internet and investigate how to fix those problems. Greatplace to check is Microsoft support website support.microsoft.com. Of course, we can also use a search enginelike Google.We should also check that hardware devices are attached properly. Its always possible that, for example,memory chips, CPUs or hard drive cables become loose. If we cant boot from Vista installation DVD, we shouldcheck our BIOS settings and make sure that the proper boot order is configured. It is also possible that the DVDreader is malfunctioning itself.
  • 25. Utilize Windows VistaBasics23www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)After InstallationDisplayCommon problems after installation are Display problems. To try and correct visual problems in Vista we can goto Control Panel and then Appearance and Personalization (or Personalization if we are in Classic view).Image 179.4 - Personalization in VistaHere we can change settings for color, transparency, desktop background, resolution and other display settings.Display problems are often the result of a video card that does not meet minimum Windows Vista requirements.DevicesIn Vista we should also check Device Manager. To open Device Manager in Vista go to Control Panel, Hardwareand Sound and select Device Manager (if using Classic view in Control Panel, select System and then DeviceManager).
  • 26. Utilize Windows VistaBasics24www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 179.5 - Device Manager in VistaIn Device Manager we can see devices that dont have drivers installed. To update drivers on a device that we arehaving trouble with, we can right-click it and select Update Driver Software. Here we can also disable devices thatwe dont want to use.Application CompatibilityAnother common problem is application compatibility. We can download and use the Application CompatibilityTool Kit (ACT) from Microsoft to determine which applications are compatible with Windows Vista. For anyprogram with which we are having problems, we can right-click, select Properties and go to the Compatibility taband choose a compatibility mode.
  • 27. Utilize Windows VistaBasics25www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 179.6 - Compatibility TabThis way we can simulate an environment of some other operating system. For example, if we need to use somelegacy application that works on Windows XP and does not work on newer operating system, we can useWindows XP compatibility mode for that application.Repairing the InstallationIf we have problems with booting our Vista machine, we can try and use Startup Repair Tool. This tool isautomatically available if the Windows Recovery Environment is preinstalled. But, we can always manually bootfrom Vista installation DVD and run this tool. Lets do that now. When we boot from Vista DVD, the Installationmenu appears.
  • 28. Utilize Windows VistaBasics26www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 179.7 - Installation MenuIn the lower left-hand corner we can select Repair your computer option. This will initiate the Startup RepairTool. It is going to ask us which operating system to repair, so we choose Vista and click Next. After that,the System Recovery Options window will appear.Image 179.8 - System Recovery OptionsHere we have several options that we can use to repair our installation. We can try to repair startup, attempt touse restore points, attempt to use complete PC restore if we have done complete PC backup before, do memory
  • 29. Utilize Windows VistaBasics27www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)diagnostics on RAM or run CMD prompt. For example, if we run Startup Repair it will perform a number of tests tomake sure that our PC is bootable.RememberBefore installing Vista be sure to check if your computer meets hardware requirements for Vista. To do that youcan use System Information, System Properties or Vista Upgrade Advisor. We should also check Device Managerand Event Viewer to verify that we dont have any current problems with our computer. Common problems afterinstallation are Display problems, problems with devices with no drivers installed and application compatibility. Ifwe have problems with booting our Vista machine, we can use Startup Repair Tool to repair our installation.Paths that are mentioned in this articleXP Start > Programs > Accessories > System Tools > System Information - open System Information Control Panel > System - open System Properties Control Panel > System > Hardware tab > Device Manager - open Device manager Control Panel > Administrative Tools > Event Viewer - open Event ViewerVista Control Panel > Appearance and Personalization - personalize appearance and sounds Control Panel > Hardware and Sound > Device Manager - open Device Manager (if using Classic view, inControl Panel select System and then Device Manager) Startup Repair Tool - available on Vista installation DVD (Repair your computer option in main menu)Join Vista to a DomainParent Category: VistaCategory: BasicsIf we are in a domain environment we will have to know how to join our Windows Vistamachine to a doman.Before you startObjectives: learn where you can find options to join a Vista computer to a domain.Prerequisites: knowledge about Active Directory environment is recommended.Key terms: domain, settings, vista, group policy, system, joining, workgroup, serverCheck Current StateTo verify if our computer is on a workgroup or a on a domain, go to the Control Panel and then System (in ClassicView). In our case we see that our computer name is WIN-Q2O8O8MDPEP and that our computer is in aWorkgroup.
  • 30. Utilize Windows VistaBasics28www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 184.1 - Vista System PropertiesWhile our computer is in a Workgroup, we only have a single, local Group Policy. To open local Group Policyeditor, enter gpedit.msc in the Search bar and hit Enter. Select Continue if the User Account Control promptappears.Image 184.2 - Local Group Policy Editor
  • 31. Utilize Windows VistaBasics29www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)In local Group Policy editor we can set various settings for our computer and while we are in a workgroup, thereare no domain policies that can override our settings.Join to a DomainTo join Vista to a domain, open the Control Panel, then System. In the Computer name, domain and workgroupsettings section click on Change settings. We need to have administrative privileges to join computer to adomain. The System Properties window will open.Image 184.3 - System PropertiesNow, on the Computer Name tab click the Change button. This will open the Computer Name/Domain Changeswindow. First we will change the name of the computer to ivancic-v. Note that we will not join a domain just yet.Lets click OK now.
  • 32. Utilize Windows VistaBasics30www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 184.4 - Computer Name ChangedChanges will take effect after we restart our computer so we will do that now. Changing a computer name is not arequirement, but it is recommended that all computers in a domain have names that mean something to us.Lets go to System properties again. We will try and join our computer to a utilizewindows.localdomain. To dothat we will select the Domain option and enter the utilizewindows.local domain name.
  • 33. Utilize Windows VistaBasics31www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 184.5 - Joining FailedIn our case something is wrong and the joining failed. We didnt even get a prompt for our credentials. A commonproblem when joining to a domain is problem with DNS settings. In our case a DNS name does not exist. Thiscould mean that our server is not configured correctly or it could mean that we have wrong DNS settings on ourlocal computer. We should check our local TCP/IP properties and ensure that we use a DNS server that is awareof the existence of the Active Directory domain.When joining computer to a domain we have to have domain level administrative privileges. Also, after the joiningis successful, any local Group Policy settings that come in conflict with domain settings, will be overridden by thedomain Group Policy settings.RememberTo join a Vista computer to a domain, go to the Control Panel and then System (in Classic View). Then on theComputer Name tab click the Change button. This will open the Computer Name/Domain Changes window. Wehave to have domain level administrative privileges to join a computer to the domain.Configure Aero in VistaParent Category: VistaCategory: BasicsWe have four user interfaces available in Vista. The first is the Classic interface which issimilar to Windows 2000 and previous operating systems. This interface will give us goodperformance in Vista. It is also good for backward compatibility.Before you startObjectives: learn what is Aero interface, what is required to run it and where you can find Aero configurationoptions.Prerequisites: no prerequisites.
  • 34. Utilize Windows VistaBasics32www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Key terms: aero, color, display, graphics, settings, video, features, performanceVista Basic InterfaceWindows Vista Basic interface is similar to XP. It is designed for maximum compatibility and is available in alleditions of Windows Vista.Vista Standard InterfaceThe Windows Vista Standard interface is like the Aero interface without the glass effects. Also, we cant use Flip3D or live thumbnails. It provides smoother window handling than the Vista basic interface. Vista standard doesrequire a video card capable of WDDM (Windows Display Driver Model) and the DirectX 9. The Windows Vistastandard interface is not available in the Vista Starter edition and its the default interface for Vista Home Basic.Vista AeroThe Windows Aero interface has the transparent glass design, smooth animations, graphics stability, Flip 3D andlive thumbnails. It is not available in Home Basic or Starter editions. Video card must support WDDM, have atleast 128MB video RAM, support DirectX 9.0, Pixel Shader 2.0 and the color has to be set to 32 bit.Start MenuIn addition to Aero, the new thing in Vista is the Start Menu. The Start Menu no longer has expanding menus andit has integrated Search. The Search box is now also the Run dialog box.SidebarThe Sidebar provides a way to display information to which we desire quick and easy access. It is made up ofsmall programs called Gadgets. Gadgets can display virtually anything, including weather forecasts, notes, etc.IndexingVista indexes certain locations on our computer. By default, Vista builds an index of all files on the computer,including e-mail, data files, programs, media files, events, tasks and contacts. Those settings can be customizedby going to Control Panel > System and Maintenance > Indexing Options. Here we can select defaultindexing locations, select which file extensions we would like to index or we can rebuild indexing. The Search istypically fast because it is not searching the complete hard drive but instead is looking through an index whichcontains all of the data you can search as criteria, including file name, author, creation date and tags.Aero FeaturesIn our example, we have one window opened. If we move our mouse above the taskbar, over the respectiveprogram, we will see a thumbnail of running program. This is called Live Thumbnails and they help us to figure outwhich program we want to switch to.
  • 35. Utilize Windows VistaBasics33www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 191.1 - Live ThumbnailsWe can still use ALT+TAB where we will see live thumbnails as well. Vista displays those windows in real time.Image 191.2 - ALT +TABWe also have Flip 3D feature. Flip 3D comes up when we press Windows key and the Tab key. We can keeppressing Tab key to flip trough all windows.
  • 36. Utilize Windows VistaBasics34www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 191.3 - Flip 3DCustomizationWe can customize video settings by going to the Control Panel > Appearance and Personalization >Personalization. We can also open this window by right-clicking anywhere on Desktop, and then selectingPersonalization. Here we can alter various settings regarding our appearance, and also sounds. Lets first checkDisplay Settings.Image 191.4 - Display SettingsThis window will show us monitors that are currently plugged in into our computer. In our case we have twomonitors that have been detected. To show image on both monitors we have to select the monitor which is notactive, and then check the Extend the desktop onto this monitor option. We can also drag monitors from left toright and from right to left. We would do this if the actual layout of our monitors is different from the one shown onthis window. If we are unsure which monitor we are looking at, we can click the Identify Monitors button, and abig number will be shown on the monitor to tell us which monitor it is. The This is my main monitor optionidentifies the monitor where the Start Menu and the Taskbar information show. When we select particular monitor,we will see the settings that apply to that monitor, like the resolution and the color depth. By changing theresolution we actually change the amount of information that is shown on the screen. A higher resolution makesimages on the screen smaller, but it allows us to see more information on the screen. A lower resolution makesitems larger. When configuring resolution for LCD monitor, we will typically set the resolution to the nativeresolution thats supported by the monitor to get the best results. CRT monitors usually support multipleresolutions, so we can choose the one that fits best for us. Remember that Aero is not supported if color is below32 bit.
  • 37. Utilize Windows VistaBasics35www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Another thing that we can manage in Personalize window is the Theme. A theme is a predefined look forWindows. For Aero to function properly the theme must be Windows Vista. If we switch to some other theme, theAero will not be available. Notice that we can browse for custom themes that have been saved as theme files.Image 191.5 - Theme SettingsTo customize our theme we can go to Windows Color and Appearance.
  • 38. Utilize Windows VistaBasics36www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 191.6 - Color and AppearanceHere we have the Enable transparency check box and we can also control the intensity of that transparency.We can also change the color of the windows by picking one of the available colors or create our own color usingthe color mixer. We can also change the intensity of the selected color. Another option that we can changeis Desktop Background.
  • 39. Utilize Windows VistaBasics37www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 191.7 - Desktop BackgroundHere we can choose the graphic that shows on the background on our desktop.Windows Experience IndexAero functionality requires significant processor, memory, graphic card, and disk drive resources. WindowsExperience Index is a tool that measures how well a computers hardware and software can respond to Vistasfunctions. The measurement is expressed in a base score. The higher the base score, the better our computerresponds to Aeros functionality. Each hardware component receives an individual sub score. Your computersbase score is determined by the lowest sub score. The test is performed on processor (calculations per second),memory (RAM - memory operations per second), graphics (desktop performance for Aero), gaming graphics (3Dbusiness and gaming graphics performance), primary hard disk (disk data transfer rate). Typically, a computerwith a base score of 3.0 or higher can display all Aero functionality. Each sub score ranges from 1.0 to 5.9, with afull point indicating a significant difference. As hardware technologies improve in quality and capacity, the subscore range will increase. To view the base score go to the to the Control Panel > System and Maintenance >Performance Information and Tools.A base score of 1.0 is assigned to any computer that can upgrade to Windows Vista. This allows basicperformance with operating system and applications. PCs with scores of 2.0 to 2.9 will run Vista but not be Aerocapable. A score of 3.0 is the minimum specification needed to run Windows Vista Premium features, includingAero features. Also we can run Media Center with standard definition TV and basic graphical games. A score of4.0 represents very good performing PCs which is capable of running high-definition video, high resolutionmonitors or dual monitors. A base score of 5.0 or higher is given to systems with top-end hardware which iscapable of running fast moving games with rich graphics, 3D modeling, high-end multimedia and highperformance applications.Problems
  • 40. Utilize Windows VistaBasics38www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Sometimes it can happen that some visual features are being turned off automatically. The possible reason canbee that a program that we are running is not compatible with Windows Aero color scheme. Also, it is possiblethat our computer does not have enough memory to run all of the programs we have open as well as run theWindows Aero color scheme. To improve display quality we could reduce the number of opened programs orwindows, avoid running too many graphic-intensive programs at the same time, reduce the monitor resolution,change the color scheme to Windows Aero Basic, turn off automatic resizing in programs that arent designed forhigh-DPI display or upgrade to a more powerful video card.RememberFour user interfaces available in Vista are Classic, Basic, Standard and Aero. Aero is not available in Home Basicor Starter Vista edition. Aero features include The transparent glass design, smooth animations, graphics stability,Flip 3D, live thumbnails, etc. Typically, a computer with a base score of 3.0 or higher can display all Aerofunctionality.Paths that are mentioned in this article Control Panel > System and Maintenance > Indexing Options - path to the indexing settings Control Panel > Appearance and Personalization > Personalization - various settings when it comes toappearanceConfigure Parental Controls in VistaParent Category: VistaCategory: BasicsWe can use Parental Controls in Vista to protect children, other computer users, and ourcomputer against offensive and unsafe Internet content and games, as well as set timelimits and to log user activity.Before you startObjectives: learn where can you configure Parental Controls, and which restrictions can be set.Prerequisites: no prerequisites.Key terms: block, parental, controls, rating, games, web, level, account, allowed, programs, restriction, activityAvailabilityParental controls are designed for controlling home users with standard accounts. Parental Control is available inWindows Vista Home Basic, Home Premium, or Ultimate. Parental controls are not included in the Business orEnterprise editions of Windows Vista. Also, when you connect a computer using Windows Vista Ultimate to adomain, the Parental Controls are by default no longer accessible. We also have to have at least two useraccounts - an administrator account for the parent and a standard user account for the child. Parental Controlsare configured by someone using an administrator account, and apply only to standard user accounts.Administrator needs to be protected with password. There are four main things that we can restrict for ourcomputer users.Logon HoursThe first thing that we can control is the logon hours. We can restrict what times of day the user is allowed toaccess our computer. If a user tries to log in to Windows Vista outside the allowed window of time, the login willfail. If user login stretches outside the time allotment, the user is automatically logged off.
  • 41. Utilize Windows VistaBasics39www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Web AccessWe can also control Web access, which means that we can configure block and allow lists for certain websites.We can also set web restriction level to high, medium or none. Web restriction level of high is designed only forchildren. It is going to block all websites except those designed for children. Web restriction level of medium willblock unrated contents and malicious websites. In web restriction area we can also block file downloads.Malicious software (also known as malware), adware, and viruses are often downloaded by unknowing children orinexperienced computer users. When limiting browser settings, the browser itself does not matter (InternetExplorer, Firefox, Opera, and so on).GamesOne way to restrict games is rating based system using the ratings designed by the Entertainment SoftwareRating Board (ESRB). There are different ratings and the first one is Early Childhood rating EC. This rating meansthat the game is designed for those ages three and older. Second rating is Everyone or E which is designed forthose ages six and older. Everyone 10+ or E10+ is designed for those 10 and older. Teen or T is designed for 13and older, Mature (M) for 17 and older, and Adults Only or AO is not intended for anyone under the age of 18. Wealso have the option to block games with no rating. Rating settings are cumulative, which means that, forexample, AO rating will include all other ratings, or M will include EC, E, E10+, T but not AO.Another way to block games is content-based. We can block games with inappropriate sexual content, violencegambling etc. We can also block specific games installed on the system.ProgramsWe can also restrict specific programs from being used. We simply specify the path to the program that we wantto restrict.If the user attempts to access restricted sites, he will be prompted for the admin credentials. This allows us toallow the user to do specific tasks. As administrators and parents we can do activity reporting and find out whatwebsites our users are going to, look at their e-mails, Instant Messenger, and we can look at what media werethey looking at. There are some legal issues here. If we are dealing with a child, then we have to make sure thatwe are their legal guardian. These parental controls could be used in a small business environment, but thecomputer can not be a member of a domain. In this case we also have to ensure that we are not violating userrights.ConfigurationTo configure Parental Controls we can go to Control Panel > User Accounts and Family Safety > ParentalControls.
  • 42. Utilize Windows VistaBasics40www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 201.1 - Parental ControlsRemember, parental controls only work with standard user accounts. If the second account also hasadministrative privilege we can not assign parental controls to that account. Also, our administrative account hasto be password protected.Now, we need to choose a user on which to set up parental controls. In our case we will select Kim.
  • 43. Utilize Windows VistaBasics41www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 201.2 - Selected UserThe first thing to do is to turn on Parental Controls. We can also choose to turn Activity Reporting to collectinformation about computer usage. Next, we can filter out what websites they are allowed to go to, specify whattime of day they are allowed to log on, we can restrict games and specific programs. First, lets block somewebsites by clicking on the Windows Vista Web Filter.Image 201.3 - Web FilterHere we can allow all websites or block some websites. We can setup specific lists by clicking on the Edit theAllow and block list. Here we can also select to only allows websites which are on the allow list. We can alsoblock web content automatically were the browser will attempt to figure out the rating level and then block sitesbased on the rating level. The default restriction level for automatic blocking is Medium. This will block unratablecontent, mature content, pornography, drugs, hate speech and weapons. The High restriction level will block allweb content except websites approved for children. We can also select the None level, which will remove anyrestrictions. If we select Custom we can choose categories that we want to block. Here we can also block filedownloads.Next, we can configure Time Restrictions. This way we can configure exact time when the Kim is allowed to useour computer. We can simply click and drag the hours we want to block or allow. Blue color means blocked.
  • 44. Utilize Windows VistaBasics42www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 201.4 - Time RestrictionsLets configure Game Controls. We can block all games or block or allow games by rating and content types. Wecan allow games with no rating or block them, and specify what level of rating the child is allowed to play. We canalso block games based on content. We can also block specific games.Image 201.5 - Game Ratings
  • 45. Utilize Windows VistaBasics43www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Next, we can block specific programs. In this window we simply check which programs we want to block.Image 201.6 - Allowed ProgramsNext, we can check Activity Monitor for Kim. We can use activity reports to display information about what wasdone online and offline, including visited Web sites, instant Messenger recipients, downloads and accessedprograms.
  • 46. Utilize Windows VistaBasics44www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 201.7 - Activity ReportRememberParental controls are designed for controlling home users with standard accounts. Four main things that we canrestrict are logon hours, web access, games and programs. Parental Controls can only be applied to standarduser accounts. Parental Controls are not accessible in domain environment.Paths that are mentioned in this article Control Panel > User Accounts and Family Safety > Parental ControlsSet Up Accessibility Options in VistaParent Category: VistaCategory: BasicsWindows Vista has a number of Ease of Access settings available to help users who arevisually impaired, hearing impaired, physically impaired or cognitively impaired.Before you startObjectives: learn where and which options can you configure to make your computereasier to use.Prerequisites: no prerequisites.Key terms: easier, mouse, keys, keyboard, access, accessibility, settings, ease, pointer, recommendation,controlEase of Access CenterPlace to configure accessibility settings is the Ease of Access center in Control Panel.
  • 47. Utilize Windows VistaBasics45www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 208.1 - Ease of Access CenterThe top part of the screen lists quick access to common tools. For example, we have the Magnifierwhich canhelp somebody who is visually impaired. This tool creates an enlarged view of the area around the mouse pointer.Image 208.2 - MagnifierWe can also use Narrator tool which reads English text on the screen including menu and button text. We canalso start On-Screen Keyboard. Users who have trouble using the keyboard can use the mouse pointer to presskeys.
  • 48. Utilize Windows VistaBasics46www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 208.3 - On-screen KeyboardWe can also set up high contrast which reduces eyestrain and makes things easier to read.If we are not sure where to start we can click on Get recommendations to make your computer easier to use.Image 208.4 - Recommendations
  • 49. Utilize Windows VistaBasics47www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)In this wizard we simply answer all questions and we will get recommendations to make our computer easier touse.In addition to these tools we can choose various settings that make the computer easier to see, easier to usewithout a mouse or keyboard, or to make the mouse or keyboard easier to use. For example, we can increase thefont size to improve readability, or change the mouse settings such as the cursor behavior or the mouse buttonresponse. Special keyboard settings for accessibility include the Sticky Keys (use Shift, Ctrl, or Alt in combinationwith other keys by pressing one key at a time), Filter Keys (ignore repeated keystrokes), Toggle Keys (associatesounds with Caps Lock, Num Lock, and Scroll Lock keys) and Mouse Keys (control the mouse pointer with thenumber keypad).RememberFeatures which we can use to make our computer more accessible are Magnifier, Narrator, On-Screen Keyboardand High Contrast.
  • 50. Utilize Windows VistaApplications48www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)ApplicationsTask Manager in VistaParent Category: VistaCategory: ApplicationsTask Manager is very helpful when we have problems with processes which are frozen,or if we need to check current resources utilization.Before you startObjectives: learn how to use Task Manager in Vista.Prerequisites: you should know about Task Manager in general.Key terms: task, manager, application, process, service, user, network, performance,informationOpen Task ManagerIn our case we will open Task Manager by right-clicking on Taskbar and selecting Task Manager option. Thereare 6 different tabs which we can use to check different things about our computer.Applications TabIn this tab we can see all opened applications which are shown on the Taskbar, with the exception of the TaskManager itself. In our case we only have Windows Media Player opened, so we only see one entry in the list.Notice the status of the application - it is Running.
  • 51. Utilize Windows VistaApplications49www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 195.1 - Applications TabEach time we open an application we will get a new entry in the list of running applications. If our application is notresponding, we can select it and then click the End Task button. We can also start new applications by clickingthe New Task and entering the name of the program we want to run.Image 195.2 - New TaskIn our case we have entered wmplayer which will open Windows Media Player.Processes TabYou will notice that there will always be many processes that are running even though we dont have anyapplication running and showing on the Taskbar.
  • 52. Utilize Windows VistaApplications50www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 195.3 - Processes TabFor example, taskmgr.exe is the process associated with Task Manager itself, and wmplayer is the process ofthe application which we have previously open. In this tab we can see information about the running process suchas the CPU percentage and the memory that its using. From here we can also end the process, for example if aprocess isnt responding. We can do that by selecting the desired process and then pressing the EndProcess button.Services TabThe Services tab shows services on our computer.
  • 53. Utilize Windows VistaApplications51www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 195.4 - Services TabFor example, the DHCP is a service that registers and updates IP addresses and DNS records for our computer.If this service is stopped, this computer will not receive dynamic IP addresses and DNS updates. If this service isdisabled, any services that explicitly depend on it will fail to start.Performance TabThe Performance tab gives us a snapshot of information about our computer.
  • 54. Utilize Windows VistaApplications52www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 195.5 - Performance TabWe can see a meter that shows us the percent of use of our CPU along with a graph. If we had multiple CPUsinstalled we would have multiple graphs. If we notice that the CPU usage is constantly high, we should reduce theamount of workload on our it. Here we also have information about how much system memory is currently beingused, along with a graph that shows memory usage.Networking TabThe Networking tab shows us information about our network connection. In our case we are currently sending andreceiving small amount of data over our network link.
  • 55. Utilize Windows VistaApplications53www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 195.6 - Networking TabUsers TabThe Users tab shows us the users who are currently connected to our computer. To disconnect or log off a user,simply right-click it and then select the appropriate option.
  • 56. Utilize Windows VistaApplications54www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 195.7 - Users TabRememberUsing Task Manager we can close unresponsive applications, end processes, run and stop services, checkcomputer performance, check network utilization, and see logged on users.Microsoft Management Console in VistaParent Category: VistaCategory: ApplicationsThe Microsoft Management Console (MMC) is a tool developed by Microsoft whichprovides a consistent interface for management tools.Before you startObjectives: learn where to find and how to use MMC in VistaPrerequisites: you have to know what is MMC in general.Key terms: computer management, snap-in, console, mmc, service, monitorRun MMCWe can open MMC by going to the Start Menu and typing in mmc in the search menu.
  • 57. Utilize Windows VistaApplications55www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 198.1 - Empty MMCThis way we will open a blank MMC. To work with our computer we need to add snap-ins. To do that we can go tothe File menu and then select Add/Remove Snap-ins.Image 198.2 - Snap-insSnap-ins are programs that we can add to the Management Console to manage a part of our computer. Forexample, we can add Computer Management. To do that select Computer Management and click Add. Afterthat we need to specify whether we want to see events on this computer or remote computer.
  • 58. Utilize Windows VistaApplications56www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 198.3 - Local or Remote ComputerIn our case we will select Local computer and click Finish. Lets also add Disk Management andLocal Usersand Groups.Image 198.4 - Selected Snap-insWhen we are finished adding snap-ins we can click the OK button. The selected snap-ins will appears inside theManagement Console.
  • 59. Utilize Windows VistaApplications57www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 198.5 - Console1There are three different parts of the Management Console. The left side shows us a tree view of the differentsnap-ins and option within each snap-in. By expanding any snap-in we can see options that we can configure inthat snap-in. In our example we clicked on the Disk Managementsnap-in.Image 198.6 - Disk Management Snap-in
  • 60. Utilize Windows VistaApplications58www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Notice how the middle pane changed based on what we selected on the left hand side. Lets take a look atanother example, Local Users and Groups. When we select an object in the middle the Actions pane on theright changes to show the types of tasks that we can perform for that specific object.Image 198.7 - Local Users and GroupsWe could save this console as a preset console by going to the File menu and then selecting Save As. That waywhen we open it again we would have these same snap-ins already added.Computer Management ConsoleIn many cases we will probably use predefined consoles that ship with Windows. One common one is ComputerManagement. To open Computer Management, right-click Computer, and choose Manage. This opens theComputer Management pre built MMC Console.
  • 61. Utilize Windows VistaApplications59www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 198.8 - Computer Management ConsoleThis console has several snap-ins that have already been added to it. For example, Event Viewer shows usevents that have taken place on our computer. We can Use Event Viewer to view logs about programs, systemevents, and security. Each entry can be listed as a warning, error, or information event. There are three groups oflogs in the Event Viewer. The Application log contains events such as application installations, un-installations,and application errors. The System logcontains a list of events such as system modifications, malfunctions, anderrors. The Security logcontains a list of events such as security modifications and user login events. If webrowse to theWindows Log and then go to Application, we can see a list of events that have occurred on thesystem related to the applications. Also, if we select an event we can see more information about what it was.
  • 62. Utilize Windows VistaApplications60www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 198.9 - EventsIf we have a problem with our PC, it is a good idea to check system related events in Event Viewer and look forerrors. Another snap-in that is included in Computer Management is Device Manager. In Device Manager we cansee a list of devices within our computer, organized by type.Image 198.10 - Device Manager
  • 63. Utilize Windows VistaApplications61www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)By right clicking on a device and going to its properties, we can see additional information about that device andwe can manage the details of how it operates. We can use the Device Manager to add, remove, or update devicedrivers for hardware, to enable or disable devices and to view properties of devices. Another predefined snap-inis Reliability and Performance Monitor.Image 198.11 - Reliability and Performance MonitorHere we can see the statistics about how our computer is working. We can see the CPU utilization percentage,disk use, network usage and memory information. A counter identifies a specific statistic, such as % ProcessorTime or % Disk Free Space. We can add or remove counters to customize the statistics you can see. Real-timedata are displayed in a graph. To save statistics we have to use use a data collector set, since PerformanceMonitor does not save any data by itself. Under Reliability Monitor we can see a historical data about ourcomputer. Reliability Monitor shows an historical chart that identifies when software installs/uninstalls and failureshave occurred. By clicking on a day, you can view the changes to the system that have affected its stability. Herewe can also see our system stability index that ranges from 1 to 10 (10 being the most stable). The stability ratingis affected by application, hardware, Windows, and other failures.
  • 64. Utilize Windows VistaApplications62www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 198.12 - Reliability MonitorAnother snap-in thats within Computer Management is a Services snap-in.Image 198.13 - Services
  • 65. Utilize Windows VistaApplications63www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)A service is a program that runs in the background that provides some kind of functionality for the system. Forexample, a DHCP service enables us to register and update IP addresses. By looking at the services we can seethe status of these various services. In our case the DHCP service is started and the Startup type is Automatic.Image 198.14 - DHCP ServiceIn this window we can also stop a service that is already running. In most cases we need to be careful that we donot stop services that are required for the system.RememberWe can open empty MMC and add snap-ins to it, or we can use predefined Management Consoles which alreadyhave default snap-ins added to it. Predefined consoles provides most of the functions that we will need to workwith when we are troubleshooting and managing our computer.Security Center in VistaParent Category: VistaCategory: ApplicationsThe Windows Security Center is a central place to check various security applicationsthat are being monitored on our computer.Before you startObjectives: learn where to find Security Center and which settings can be monitoredtrough it.Prerequisites: no prerequisites.Key terms: security, firewall, center, updates, settings, automatic, malware, softwareFirewall
  • 66. Utilize Windows VistaApplications64www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)To open Security Center we can go to Control Panel > Security > Security Center. Security Center monitorsfour different kinds of settings. The first thing that we can see is Firewall.Image 230.1 - FirewallFirewall is a system or software designed to prevent unauthorized access to or from a private network orcomputer. In our case we are using built-in Windows Firewall and it is actively protecting our computer by default.We can turn it off or on. Of course, we can also use any other Firewall as well. If we use a third-party Firewall weshould use the Security Center to identify which Firewall is running. Also, when we are on a domain, it is possiblethat we find Firewall turned off. This is typical because Firewall settings are set trough domain.Automatic UpdatesAutomatic Updates are also monitored to make sure that we always get the latest updates from WindowsUpdate.Image 230.2 - Automatic UpdateAutomatic Update checks for, downloads, and installs critical updates for our computer. The default setting is tocheck download, and install updates automatically every day at 3:00 a.m. We can customize the frequency andthe schedule of automatic updates. The second option is to download updates but not install them. We mustmanually install any necessary updates in this case. The third option is to check for updates, but not downloadthem or install them. The fourth option is to turn off updates.
  • 67. Utilize Windows VistaApplications65www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Malware ProtectionBy default Windows Defender is actively protecting our computer against Spyware and other malware.Image 230.3 - Malware ProtectionIn our case we can see that we do not have any antivirus software installed on our computer. This can a bigsecurity issue so we will fix it. We are going to install Microsoft Security Essentials which is free antivirus software.After the installation, in Security Center we can see that the virus scanning is on.Image 230.4 - Antivirus InstalledMalware is any program that is harmful to our computer and it includes viruses, worms, Trojan horses, andspyware. While some of those programs only collect Internet browsing information, others locate and exposeimportant personal information, as well as cause harm to computer components such as a hard drive. SecurityCenter monitors programs used to eliminate these dangers, including antivirus and malware agents. WindowsDefender helps protect against slow performance and security threats caused by spyware and other unwantedsoftware and is monitored by Security Center.
  • 68. Utilize Windows VistaApplications66www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Other Security SettingsHere we have Internet security settings for Internet Explorer and User Account Control.Image 230.5 - Other Security SettingsIn our case we dont have any warnings. All security settings are set to to their recommended levels. We cantoggle UAC on and off. By turning UAC off, Vista will not prompt for administrative credentials before performingan action which may affect performance (such as security settings or new software installations).Left MenuFrom the menu on the left we can go directly to the Windows Update, Windows Firewall, Windows Defender andInternet Options. Also, we can change the way Security Center alerts us in case of problems.Image 230.6 - Alerts
  • 69. Utilize Windows VistaApplications67www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Typically it will notify us and display the icon in the notification area. If a computer is member of a domain, manyof the security settings are likely managed by a network administrator. If this is the case, status indicators mightnot be displayed.RememberThings that are monitored trough Security Center are Firewall, Automatic Updates, Malware Protection, InternetSecurity settings and User Account Control.Paths that are mentioned in this article Control Panel > Security > Security Center - path to the Security CenterConfigure UAC in VistaParent Category: VistaCategory: ApplicationsThe purpose of User Account Control (UAC) is to reduce the exposure and attack surfaceof the operating system by requiring all users to run in a standard user mode instead ofusing administrator credentials. This way user is logged on with least privilege. If the userneeds to do something with administrative privilege they are prompted for a password.Privileges are escalated for that one instance.Before you startObjectives: learn how to configure User Account Control (UAC) feature in VistaPrerequisites: you have to know what is UAC in Windows.Key terms: user, uac, administrator, account, credentials, prompt, uac, token, privilegesAccess TokenWhen a user logs on to the system, an access token is generated for the user. The access token controls thetype of actions that the user can perform on the system. The access token identifies the user account as either astandard user or an administrator. Certain actions can only be performed by a user with an administrator accesstoken.Lets say that we log on to Windows Vista as a standard user and we try to install some application or edit someimportant system settings. Lets go to Start, right-click Computer and then select Manage. We will get UACprompt asking us to provide Admin password. The standard user token is used to attempt to perform all tasks forboth standard users and administrators. If standard user rights are not sufficient to perform the task, the systemrequests privilege elevation. The standard user is prompted to provide administrator user credentials (usernameand password). This process is referred to as Prompt for credentials.
  • 70. Utilize Windows VistaApplications68www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 231.1 - Admin CredentialsIf we install some application with admin credentials, it does not mean that we can run it without admincredentials. Notice the window shield icon on the System Restore shortcut telling us that we are going to beprompted.Image 231.2 - System Restore IconAny time we see that shield we will be prompted. Also, we are prompted for admin password every single time weuse a particular piece of software. Instead of double-clicking the software we can also right-click it and select Runas Administrator. It is the same thing.
  • 71. Utilize Windows VistaApplications69www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 231.3 - Run as AdministratorIf we log on to Vista as an administrator, UAC acts a little bit differently. The difference when we are administratoris that we are prompted for consent and not for credentials. This is called Admin Approval Mode. Theadministrator user is asked whether the administrative token should be used to perform the task. Because theadministrator has already logged on with the username and password, this is a simple Continue or Cancelquestion. This process is referred to as Prompt for consent.Image 231.4 - Admin Approval ModeIn our case we tried to run System Configuration. All we have to do is click Continue. As administrators we stillsee the shield icon and we are prompted for credentials. This feature of UAC helps protect the system when anadministrator user account is used by running all processes using the least administrative privileges necessary.Secure Desktop
  • 72. Utilize Windows VistaApplications70www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Prompting for credentials or consent activates the Secure Desktop. With the Secure Desktop, the Desktop and allactive applications are darkened, and the prompt appears over the shaded desktop. We must respond to theprompt before we can continue with the requested operation or return to the desktop.Turn UAC OffUAC can be turned off, but it is not recommended. To turn it off we can go to Control Panel > User Accountsand Family Safety > User Accounts.Image 231.5 - Admin User AccountHere we have an option to turn User Account Control on or off. If we turn it off here it will be turned off for all userson the machine.UAC BehaviourWe can change how UAC acts in our Local Group Policy. To open group policy editor enter gpedit.msc in Runmenu and hit Enter. Lets go to Computer Configuration > Windows Settings > Security Settings > LocalPolicies > Security Options. Here we can find UAC options.
  • 73. Utilize Windows VistaApplications71www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 231.6 - Security OptionsWe scrolled down to the bottom and we can see 9 different UAC settings. As administrators we can control thebehavior of the elevation prompts for standard users and administrators. We can select, for example, to elevatewithout prompting or to only elevate files that are signed and validated.RememberUAC is a feature in Vista that helps minimize the dangers of unwanted actions or unintended softwareinstallations. We will see Prompt for credentials when a standard user tries to install some application or tries toedit some important system setting. If we log on as an administrator we will be prompted for consent and not forcredentials. Prompting for credentials or consent activates the Secure Desktop which forces us to respond to theprompt. UAC can be turned off, and we can edit UAC behaviour trough Group Policy.Windows Defender in VistaParent Category: VistaCategory: ApplicationsIn Windows we should always have some type of software that will protect us from thespyware and other security threats. Windows Defender will help us do just that, and it isoffered by Microsoft for free.Before you startObjectives: learn where to find and how to configure Windows Defender in VistaPrerequisites: no prerequisites.Key terms: software, defender, scan, program, information, real time, system, spyware, alert, action, securityWhat is Windows DefenderWindows Defender replaces the Microsoft anti-spyware beta software and is installed in Windows Vista andWindows 7 by default. It is also available as a free download for XP installations verified with WGA (WindowsGenuine Advantage). Windows Defender helps protect against slow performance and security threats caused byspyware and other unwanted software. It has a database of spyware definitions which is similar to antivirusdefinitions for antivirus programs. Those definitions help Windows defender to detect spyware on our machine.UpdatingBy default, at 2 a.m. Windows Defender will go to the update server and make sure that it has the latestdefinitions. We can also manually check for definitions.Real-time MonitoringWindows defender also includes real-time monitoring agents to help protect our PC. Real-time protection alerts uswhen spyware or potentially unwanted software attempts to install itself or run on our computer. It also alerts uswhen programs attempt to change important Windows settings. Real-time protection uses security agents thatmonitor specific system components and software.Real-time AgentsThere is an agent for IE configuration that keeps track of changes made to our browser security settings. Alsothere are agents for IE downloads and add-ons such as ActiveX. There is real-time agent for auto startupprograms designed to eliminate the danger of spyware running without our knowledge. Defender checks the list ofapplications configured to run when we start our computer. There are real-time agents for system configuration
  • 74. Utilize Windows VistaApplications72www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)(monitors security-related settings in Windows so that spyware cannot collect personal information), services anddrivers (they perform essential software and hardware functions and Defender monitors and protects so thatspyware cannot gain access to them), Windows add-ons (monitors software utilities for Windows so that spywarecannot collect and transmit our online activities), application execution (monitors applications as they start,checking for suspicious activity that may run in the background) and application registration (monitors registeredapplications, making sure malicious software does not start without our knowledge). By default WindowsDefender does a quick scan at 2 a.m. each day. We can modify the automatic scan frequency, schedule, and typeor manually initiate a scan. The results of the scan are shown in the message center (the Home screen forDefender). We can configure Defender to notify us in the System Tray when a real-time threat is detected.Automatic ScanningAutomatic scanning checks files on our computer. Defender can run Quick scan, Full scan and a Custom Scan. AQuick scan checks hard drive locations which are most likely to be infected by spyware. A Full scan checks allfiles on the hard disk, the registry, currently running applications, and all other critical areas of the operatingsystem. A Custom scan checks only the drives and folders that we specify.Alert LevelsAlert actions define what to do when a security threat is detected. Each alert is classified with an alert level thatdescribes the seriousness of the potential threat. Alert levels are Severe, High, Medium, Low and Not yetclassified.Severe level warns us about exceptionally malicious programs, similar to viruses or worms, which negativelyaffect our privacy, the security of our computer and damage our computer. We should remove this softwareimmediately.High level warns us about programs that might collect our personal information, damage our computer bychanging settings, typically without our knowledge or consent. We should remove this softwareimmediately. Medium level warns us about programs that might affect our privacy by collecting personalinformation or make changes to computer that could negatively impact our computing experience. We shouldreview and consider removing this software.Low level warns us about potentially unwanted software that might collect personal information about us or ourcomputer or change how our computer works, but is operating in agreement with licensing terms displayed whenwe installed the software. We should review the alert details or check to see if we recognize and trust thepublisher of the software.Not yet classified warns us about programs that are typically benign unless they are installed on our computerwithout our knowledge. If we do not recognize the software or the publisher we should review the alert details todecide how to take action.Prompts and ActionsWhen a real-time agent detects a threat we may get prompted to manually inspect the notification and decide onthe best course of action to take. We can respond to those prompts in four ways. We can ignore the warningmessage, remove the software, quarantine the software and choose to always allow.Ignore takes no action. The program is left on the system, and it will be detected the next time the system isscanned or the software is run.Remove deletes the program from your computer. Quarantine prevents the program from running by creating abackup of the program and removing it from the system. Quarantined items will not be reported in future scans.Use the Quarantined items list to view items in quarantine. From the list we can restore a program (which allowsus to run it again) or remove it from the system.
  • 75. Utilize Windows VistaApplications73www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Always allow lets the program run anytime without further prompts. Future scans will not warn us of softwareadded to the Allowed items list. Removing the item from the list does not delete it, but will cause Defender todetect it again.When we are reviewing an item after a warning or a scan, we must review the item details before we can select toquarantine or always allow the program.Defender in VistaWe can open Defender in Vista by going to Control Panel > Security > Windows Defender.Image 234.1 - DefenderFrom this window we can manually scan our computer. We can select to do a Quick scan, Full scan or Customscan. From custom scan we can select which files and folders to scan.Image 234.2. - Scan Options
  • 76. Utilize Windows VistaApplications74www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 234.3 - Custom ScanOptionsTo check automatic scan settings we can go to Tools and then Options.Image 234.4 - Options
  • 77. Utilize Windows VistaApplications75www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)As we can see, our computer will be scanned around 2 a.m. every day. We can change those settings as we like.It is recommended to check for updated definitions before scanning. Also, we can select to apply default actionsto items detected during scan. Default actions are set below.Image 234.5 - Default ActionsHere we can choose the default action that we want Defender to apply when items with certain levels aredetected. If we scroll down again, we can see real-time monitoring agents that are running.
  • 78. Utilize Windows VistaApplications76www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 234.6 - Real-time MonitoringWe can turn them off or on. Scrolling down we can find other options relevant to scanning.SpyNetLets go to the Tools and then Microsoft SpyNet. The SpyNet community is an online Microsoft community thatallows us to see if other people have downloaded and installed certain software. This may help us when trying todecide whether to trust downloaded software or not. SpyNet also allows our computer to send Defenderinformation to Microsoft for use in analyzing software.Image 234.7 - SpyNet OptionsJoining SpyNet with a basic membership sends information about detected software and the actions we took toMicrosoft. Most (but not all) personal information is excluded. We will not be notified of software that has not yetbeen analyzed.Joining SpyNet with an advanced membership sends more information to Microsoft, which might includeadditional personal information (although this information will not be shared). We will be notified of software thathas not yet been analyzed.QuarantineIf we go to Tools and then Quarantined items, we can see which programs are prevented from running until wechoose to restore them or remove them.
  • 79. Utilize Windows VistaApplications77www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 234.8 - Quarantined ItemsIf we go back to Tools, and then to Allowed items, we can see which programs are always allowed to run.Image 234.9 - Allowed ItemsSoftware Explorer
  • 80. Utilize Windows VistaApplications78www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)From Tools we can open Software Explorer. Software Explorer displays information about software on oursystem, including programs that start with the computer boot process, programs running on screen or in thebackground, programs connected to the Internet (useful for spyware and malware, such as a Trojan horse,because they may create an unwanted Internet connection, passing personal data or downloaded unwantedsoftware), and Winsock service providers (programs that provide low-level networking features on the computer).Image 234.10 - Software ExplorerBy default, list of programs is sorted by Publisher. We can also sort those programs by startup type by right-clicking on any program and selecting Startup Type. When we select particular program, on the right side we cansee additional information about that program.
  • 81. Utilize Windows VistaApplications79www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 234.11 - Selected SoftwareWhen we select particular software, we can remove it or disable it by clicking on the appropriate buttons below. Ifwe select the Currently Running Programs category, we can select particular software and end it by clicking theEnd Process button.AlertsWhen Windows Defender finds suspicious item it will warn us. Depending on the alert levels we can get differentwarnings and choose different actions.Image 234.12 - Severe Alert
  • 82. Utilize Windows VistaApplications80www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 234.13 - Medium AlertFor best protection, we should always keep the definition files up to date. Defender can check for new updatesevery time a system scan takes place. Windows Defender also uses Windows Updates to automatically downloaddefinition files. Non-administrators can use Defender and take actions on software (such as Ignore, Remove, orQuarantine). To run a program in the Quarantined items list, we must restore it on our system. When we run it,Defender will identify it again as a potential security threat. When detected, then we can choose Always Allow toadd the program to the list of allowed items so that we can run it again in the future without a prompting. We canreview past actions taken by Windows Defender through the History screen, or check for Defender events inEvent Viewer. In a corporate environment Group Policy can be used to manage Windows Defender settings ondomain members.RememberWith defender, we can select to do a Quick scan, Full scan or Custom scan. It is recommended to check forupdated definitions before scanning. We can select default actions for items detected during scan. The SpyNetcommunity may help us when trying to decide whether to trust downloaded software or not. Quarantined itemsare prevented from running until we choose to restore them or remove them. Software Explorer displaysinformation about software on our system. When Windows Defender finds suspicious item it will warn us.Depending on the alert levels we can get different warnings and choose different actions.Paths that are mentioned in this article Control Panel > Security > Windows Defender - path to the Defender in VistaFirewall in VistaParent Category: VistaCategory: ApplicationsWindows firewall allows us to control the flow of traffic to our network interfaces. Firewallhas inbound rules for traffic that will be allowed through the firewall from the outsideworld, and outbound rules which are concerning traffic going from inside to outside. Also,we can have connection specific rules, which are specific to the network interface.Before you startObjectives: learn where to find and how to configure Windows Firewall in Vista.Prerequisites: no prerequisites.Key terms: firewall, rule, network, settings, profile, traffic, exception, allowed, user, port, advanced
  • 83. Utilize Windows VistaApplications81www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Default ConfigurationThe default behavior of Windows Firewall in Vista is like XP Firewall. That means that all outbound connectionsare allowed and the replay traffic is allowed back in. However, all externally initiated traffic coming to the Firewallis blocked.The difference between the XP version of the Firewall and Windows Firewall in Vista is that in XP there were nooutbound rules. There was no way to control outbound traffic. Now, in Windows Firewall we can control outboundtraffic. Outbound blocking is off by default, so we need to use the firewall MMC snap-in to configure that.We can make exceptions to allow certain traffic through the Firewall. For example if we are hosting a Web serveror FTP server behind the Firewall, we can allow those exceptions trough the firewall.To work with Windows firewall with advanced security, we need to use the Windows Firewall MMC snap-in. Herewe can get into great detail when customizing the firewall.Network LocationGreat new feature is the ability of blocking the traffic based on the network location type. There are three optionsfor network location type: a domain profile, public profile or a private profile. If we are at work and logged onto an Active Directory domain, we are in the domain profile. In situation like this, it is likely that our Firewall will beturned off to make it easier for administrators at corporate environment to manage our computer. Public profilemeans that we are connected to a public network and we want to protect ourselves, for example, on the Internet.Private profile is used when were not connected to the Internet, perhaps at home or some other small network.Based on the profile were in we will have different Windows Firewall settings. We can also configure settingsspecifically for each profile.MMC Snap-inAt the Firewall MMC Snap-in we can create very detailed inbound and outbound rules. We can filter our viewby profile when we want to work with specific profile, we can enable or disable existing rules, we can require theuse of IPsec for certain rules and we can restrict what users and computers are allowed to use. We can alsoimport or export our policy settings from or to other computers. In MMC we also have real-time monitoringcapabilities. We can also configure ICMP exceptions. ICMP is a protocol used for common network diagnostictools such as ping andtracert. By default, incoming ICMP requests are blocked. We can enable Edge Traversal.Edge Traversal allows the application or service to be accessible from outside of a Network Address Translation(NAT) device. We can configure connection-specific rules such as different port exceptions for different interfaces.For example, we can allow Remote Desktop on the wired interface while keeping it blocked on the wirelessinterface.RulesRules are still based on protocols port numbers and programs. We can specify rules that only apply to certainrange of IP addresses. We can also customize them to only apply to certain profiles.Common Firewall ExceptionsFile and Printer Sharing is used to share files stored locally on the computer as well as printers with other userson the network. This exception is useful when we need to share media or other files stored on or printers directlyconnected to our computer. By default it is disabled, but if we turn on File sharing in Network and Sharing Center,Windows automatically enables this exception in the Firewall.The Network Discovery exception enables our computer to see and be seen by other computers on the network.This is useful when accessing information on the network on other computers. The enabled status depends on
  • 84. Utilize Windows VistaApplications82www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)the current network profile. This feature is controlled through the Network and Sharing Center and if modified, itwill change the status of this exception in the Firewall.The Performance Logs and Alerts exception allows non-local computers to view and manage Performance Logsand Alert services, viewable in Windows Firewall with Advanced Security. This is useful for network administratorsto remotely troubleshoot performance issues.The Remote Administration exception allows remote administration tools to work through Windows Firewall,including tools that use Windows Management Instrumentation (WMI), remote procedure calls, and DCOM.The Windows Remote Management exception allows remote management of the computer by a web-basedprotocol called WS-Management.The Remote Assistance exception allows users to view and sometimes control remote desktops. By default thisexception is disabled, but is automatically enabled when Remote Assistance is enabled or when a user sends aRemote Assistance request for the first time.The Remote Desktop exception allows a remote user to log on and access the desktop of a computer, allowingaccess to all programs and files on the computer. This is disabled by default and must be manually enabled.The Windows Media Player exception allows users to receive streaming media over an IP network.The Windows Media Player Network Sharing Service exception allows users to share media on their computerwith other network users.Example ConfigurationThere are two main areas where we can configure the Windows firewall. The first is the standard view forWindows Firewall. For that we can go to Control Panel > Security > Firewall. Here we can see if our Firewall isturned on or off and change those settings.Image 235.1 - Windows Firewall
  • 85. Utilize Windows VistaApplications83www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)We can see that inbound connections that do not have an exception are blocked, which means that any externallyinitiated traffic coming in is blocked unless we have an exception. Also, by default notification will be displayedwhen a program is blocked. It would be a good idea to turn that off in corporate environments, so we dont botherend users with that information. We can also see that our network location is Private network. Firewall will changeits settings based on that location type.Lets click on Change settings. On the General tab we can see some common options like to turn Firewall on oroff.Image 235.2 - Firewall SettingsWe can turn on our Firewall with or without exceptions. We would select Block all incoming traffic connectionsoption when we connect to less secure networks. When we select that, all exceptions will be ignored and we willnot be notified when Windows Firewall blocks programs. Typical we will leave it to On. We can see whichprograms or services are allowed trough a Firewall on the Exceptions tab.
  • 86. Utilize Windows VistaApplications84www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.3 - Exceptions TabOn the Exceptions tab we can see a list of programs and ports that are allowed or not allowed trough the firewall(checked programs or ports are allowed). The Exceptions list is initially created based on the services originallyinstalled on our computer. Each time a program attempts Internet access it is added to the list but not allowedunless we grant permission. We can select any entry in the list and click on the Properties button to get moreinformation on what it does, but not in great detail. For example, lets do that for File and Printer Sharing.
  • 87. Utilize Windows VistaApplications85www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.4 - File and Printer Sharing PropertiesOn the Exceptions tab we can also add our own programs or ports which we want to allow trough the Firewall. Toadd a program click on the Add program... button.Image 235.5 - Add ProgramIf the program is not on the list we can browse for it. Also, Notice the Change scope... button.Image 235.6 - Scope
  • 88. Utilize Windows VistaApplications86www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)In the Change Scope windows we can specify exactly which computers or computers form certain networks areallowed to use particular software. If we select, for instance, the My network (subnet) only option, only computersfrom our local subnet will be allowed to use our software.On the Exceptions tab we can also add specific port numbers by clicking on the Add port... button.Image 235.7 - Add a PortWe simply enter the application name, enter the port number which the application is using and select thetransport layer protocol (TCP or UDP). Here we can also change scope for that particular port.On the Advanced tab we can see network connections on which we have enabled our Firewall.
  • 89. Utilize Windows VistaApplications87www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.8 - Advanced TabAdvanced ConfigurationAll settings mentioned until now are enough for end users. Advanced users should configure Windows Firewallwith Advanced Security. We can find those advanced features in the MMC console. Enter mmc in search menuand hit enter. Empty MMC will open up. From the File menu select Add or Remove Snap-ins, select WindowsFirewall with Advanced Security and hit OK. We will manage our local computer. The following windows willappear.
  • 90. Utilize Windows VistaApplications88www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.9 - Firewall With Advanced SecurityAs we said before, Firewall settings change based on the network location type. Overview window shows us howour firewall will behave in various profiles. Of course, all these settings can be managed trough Group Policies. Ifwe scroll down, we can see that we can set up IPsec connections here.Image 235.10 - IPSecHere it is referred to as communication authentication or Connection Security Rules, but actually we areconfiguring IPsec here. IPsec is used to secure IP traffic from one computer to the other.Notice that on the right-hand side of the Console windows we have Actions. We can import and export all ourfirewall settings. Also, here we can find the Properties button. We can also go to properties if we right-click on theWindows Firewall with Advanced Security.
  • 91. Utilize Windows VistaApplications89www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.11 - Firewall PropertiesIn the Properties window we can customize settings based on profiles. Notice the Domain, Private and PublicProfile tabs. In each profile we can specify the Firewall state (on or off). For example, common settings forDomain Profile could be that the firewall is turned off. This is the case because administrators manage ourFirewall from central location. However, in Private and Public profiles we want to have our Firewall turned on. Foreach profile we can set some customized settings, so lets click on the Customize button.
  • 92. Utilize Windows VistaApplications90www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.13 - Custom SettingsIn the Custom Settings windows we can set how notifications are displayed, or how to respond to multicast orbroadcast network traffic. Also, we can select how to merge local rules and rules set trough Group Policy. Lets goback and check out Logging.Image 235.14 - Logging
  • 93. Utilize Windows VistaApplications91www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Logging is great for troubleshooting. The default log file is called pfirewall.log and we can find itin%windir%sysstem32LogFilesFirewallpfirewall.log. We can change the default size limit of the file, andwhat to do with dropped packets and successful connections. In the fourth tab we can see IPsec Settings.Image 235.15 - IPSec Settings TabLets go back to Domain Profile and turn off our firewall for that profile. When we go back to the Overview windowwe can see that the Firewall is turned off for Domain Profile.Image 235.16 - Firewall Turned Off on Domain ProfileWe assume that we have some kind of enterprise firewall protecting our whole network in this case.On the left-hand size we select to customize our Inbound and Outbound rules. Lets select Inbound rules.
  • 94. Utilize Windows VistaApplications92www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.17 - Inbound RulesBy default, all externally initiated traffic is blocked unless we have made an inbound rule exception. In contrast,outbound rules are wide opened by default which means that any traffic is allowed out. Now, notice that each rulein Inbound Rules are several times in the list. Thats because settings are set for different profiles. Lets try andcustomize some rule. Lets select Netlogon service, right-click and select Properties.
  • 95. Utilize Windows VistaApplications93www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.18 - NetLogon ServiceWe can see if it is enabled or not and short description. On the General tab in the Action section we see IPsecrelated configuration. Also, important tab is Users and Computers.
  • 96. Utilize Windows VistaApplications94www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.19 - Users and ComputersThis is where we can configure which computers and users are allowed to use this rule. On the Protocols andPorts tab we can see which protocols and which port this rule applies to. On the Scope tab we can set which IPaddresses are allowed to use that particular service. On the Advanced tab we can select to which profiles andwhich interfaces does this rule apply to.Since there are some settings that we cant modify because this is a predefined rule, we might want to create ourown rule. To do that simply right-click on Inbound Rules and select New Rule, or select New Rule option from theActions pane. New Inbound Rule Wizard will open.
  • 97. Utilize Windows VistaApplications95www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.20 - Rule WizardIn the first step we have to select what type of rule we want to create. Our rule can control a program, port, somepredefined connections or we can create custom rule. In our case we will select Port and click Next.Image 235.21 - Protocols and PortsOn the next screen we have to select our protocol, TCP or UDP. We also have to specify port numbers (if our ruledoesnt apply to all ports). We will just enter some example port, choose TCP and click Next. On the next screenwe set what to do if the traffic meets specified conditions. In our case we will block the connection and click Next.
  • 98. Utilize Windows VistaApplications96www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.22 - ActionOn the next screen we select which profiles does this rule apply to. We will select all profiles and click Next.Image 235.23 - ProfilesOn the next screen we can name our rule and give it short description. In our case we named it Example BlockRule. After that we can click Finish. Notice that in the rule list, our rule has little red icon, which means that it willblock the traffic that meets this rule.Image 235.24 - Example Block RuleDisabled rules are grayed out. Lets disable our rule now by right-clicking it and selecting Disable Rule.
  • 99. Utilize Windows VistaApplications97www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 235.25 - Example Block Rule DisabledOutbound rules function exactly the same way, we just have to set them up.RememberAdvanced users should configure Windows Firewall with Advanced Security. We can find those advancedfeatures in the MMC console. Firewall settings change based on the network location type. For each networkprofile we can set customized settings. We can import and export all our Firewall settings. The default log file iscalled pfirewall.log. By default, all externally initiated traffic is blocked unless we have made an inbound ruleexception. In contrast, outbound rules are wide opened by default which means that any traffic is allowed out.Since there are some settings that we cant modify because this is a predefined rule, we might want to create ourown rule. Rules with red icon are blocking rules. Green icons represent rules which allow traffic. Disabled rulesare grayed out.Paths that are mentioned in this article Control Panel > Security > Firewall - end user application which can be used to configure Firewall %windir%sysstem32LogFilesFirewallpfirewall.log - default location of the log file called pfirewall.logMedia Player and Media Center in VistaParent Category: VistaCategory: ApplicationsKnowing how to work with or configure media players in Windows is not ofcrucial importance for computer administrators, but nevertheless, we shouldknow how do default players look and how to work with them.Before you startObjectives: familiarize yourself with the look and feel of Media Player andMedia Center in Vista.Prerequisites: no prerequisites.Key terms: media, tv, center, player, windows, content, setup, extender, play, wmc, optionsWindows Media PlayerWindows media player allow us to download and play digital music, play audio CDs, rip music from CDs, burnaudio CDs, listen to Internet radio, watch digital video, sync with portable devices, organize media content andplay lists. We should be careful with security settings because Windows media player can download and runscripts and read media streams from websites. Windows media player can also play enhanced contents. We canalso control security based on Internet Explorer zone settings. To run WMP we can go to Start > All Programs >Windows Media Player.
  • 100. Utilize Windows VistaApplications98www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Windows Media PlayerNotice that when we open WMP, we see our library with all our music by default. The media library organizesdigital media on our computer. WMP can go to the Internet and get album covers, song names and otherinformation about our music. We can enable media sharing in the Media Player properties. We can do the samething through the Network and Sharing Center. Once the sharing is enabled, we can share media with users onthe same computer or with users on the same network. Media Player can monitor specific folders on ourcomputer, so when we add media content to any of the monitored folders, the content is added to the libraryautomatically. By default, Media Player will monitor all of our personal folders. We can select other types of mediain our library by clicking on the down arrow on the Library tab.Library TabNotice that we can see video files, pictures, recorded TV, and play lists.Using WMP we can also rip audio CDs which we have purchased.
  • 101. Utilize Windows VistaApplications99www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Rip TabWe can also change some advanced rip options.Rip OptionsWith WMP we can also burn audio CDs and DVDs. CD burning is available in all versions of Vista, and DVDburning is only available in Home Premium and Ultimate editions. We can also sync our media with removabledevices. There are also a bunch of other options to play with in WMP. One of the important ones are privacy and
  • 102. Utilize Windows VistaApplications100www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)security options. We can use the settings on the Privacy tab to control how Media Player uses the Internet, whichincludes cookie settings, problem reporting, sending the player ID, etc. On the Security tab we can allow scriptsembedded in media, enable rich media streams and change Internet zone settings.Security OptionsInteresting options are also on the DVD tab. From here we can set playback restrictions and set defaultlanguages to use when playing DVDs.DVD OptionsProtected Content
  • 103. Utilize Windows VistaApplications101www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Protected content or protected media uses licences or usage rights, also known as Digital Rights Management(DRM) to prevent playback and distribution of media. Without proper media rights protected media can not beplayed on our computer. When we purchase protected media, media rights are downloaded automatically with thecontent but are stored on our computer separately from the audio and video files. To view the rights on somemedia we can open its properties and view the Media Usage Rights tab. If there is nothing in the box, the media isnot protected or we dont have usage rights on our computer.The downside of usage rights is that there is no wayto back them up. Because of that there is always a chance that we lose usage right. Common way to retrievethem is to go back to the store where we purchased media in the first place.Windows Media CenterWindows Media Center includes extra features. It is only available in Vista Home Premium and Vista Ultimateeditions. It provides additional support for the online media portal where we can take a look at free, premium andsubscription-based online content. We can also download movies on demand. Windows Media Center also has alive TV support. We can watch live TV if we have a tuner card installed. We can also record and playback TV. Weget one TV stream per one TV tuner card. For example, if we have one TV tuner card, we can record a TV showwhile watching another previously recorded video. To record one TV program while watching another live TVprogram, we must have two TV tuner cards (one for each live TV channel feed). In Windows Media Center wealso have better support for DVD (we can burn DVDs). DVDs are manufactured to play only in certain countries orregions. We can change the region of our DVD drive properties, but we can do that only a certain number of timesbefore the setting becomes permanent. If we would like to play and burn DVDs, but we dont have WindowsMedia Center, we can purchase a separate MPEG-2 decoder.ExtendersThe extender accesses digital media on our PC through a network connection and plays that content on the TV. Ifwe have a PC running Windows Media Center, we can get media content from that PC to other devices such asTVs, by using extenders feature. In that case, extender is a TV configured to accept media from Windows MediaCenter. To send media to other devices we have to go to the extender (the TV), and run a setup program whichwill connect back to the PC running Windows Media Center. Then we will have to enter eight digit code which willbe provided by the extender and enter that digit code in the Windows Media Center, where we will continue theinstallation of the extender. Because of the availability of wireless networks, we can port our media filesusing wireless connection to the extender and have our media content available on any supporting device. Wecan also use wired network if necessary. Each TV requires its own extender. We can connect up five extenders toour PC. Also, we have to ensure that Media Center Extenders is allowed to go trough our firewall. When usingwireless connections, we must use an infrastructure wireless setup. Ad hoc wireless networks are not supported.Media Center includes a Network Performance Monitor that tests the network to see if it can support mediaplayback.To open WMC we can go to all programs and then Windows Media Center. The first time we run it, we will see awelcome screen in which we can choose to run setup now or to run it later. In our case we will selest "Customsetup" option.
  • 104. Utilize Windows VistaApplications102www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)WMC SetupWhen we click next, we will be warned that we will need to complete required setup and optional setup in order tofully utilize Windows Media Center.StepsOn the next screen we will be asked to view privacy statement. When we click next again we will be asked to helpimprove WMC by sending anonymous reports about WMCs performance. In our case we will choose not to jointhis program. When we click next after that, we will have an option to connect to the Internet to download contentlike cover art for albums and DVDs, music and movie information, TV Program Guide listings and other Internetservices. In our case we will choose "Yes" for that feature.Connect to the Internet
  • 105. Utilize Windows VistaApplications103www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)That are all the required components to set up our Windows Media Center. When we click Next, we will get to theoptional setup. Optional setup includes setting up our speakers, music, pictures, and video libraries. In our casewe will not configure this, we will select the "I am finished" option. After that we will get to the WMC interface.Optional SetupWMC interface is designed for remote control, but we can easily move trough menu by using the arrow keys onour keyboard. You will notice that you can go up and down, but you can also go right and left on particularsection. When we enter some menu item, we can hit the backspace key if we want to go back.To fully utilize WMC we have to have TV tuner card. This will enable us to watch and record TV signal on ourcomputer by using WMC. To add an extender device we can go to the Tasks > add extender. There are a bunchof other options to play with in WMC. We will not cover them here since it is not not of crucial importance forcomputer administrators to know how to configure WMC.
  • 106. Utilize Windows VistaNetworking104www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)NetworkingNetwork and Sharing Center in VistaParent Category: VistaCategory: NetworkingIn Windows Vista we can access and configure all networking settings using Network andSharing Center. We can use it to check the status of network connections, connect to anetwork, view a graphical representation of network connections, and diagnose andrepair network connectivity issues.Before you startObjectives: learn what can you do with Network and Sharing Center in Vista.Prerequisites: no prerequisitesKey terms: sharing, location, device, discovery, center, file, folder, share, mediaNetwork and Sharing CenterThis is a centralized location to control all aspects of networking. We can use it to check the status of networkconnections, connect to a network, view a graphical representation of network connections, and diagnose andrepair network connectivity issues. There are four main areas. One is Common Network Tasks, the second is theNetwork Map, the third is Network Connection Customization, and the fourth is the Sharing and DiscoveryControl. Sharing and Discovery area allows us to enable or disable many features of networking. For example,Network Discovery.Network DiscoveryNetwork Discovery allows our computer to discover others and others to discover our computer. When NetworkDiscovery is on, our computer can see other network computers and devices, and it is also visible to othercomputers and devices. We can also specify if were going to allow Printer Sharing, File Sharing, or MediaSharing. When Printer Sharing is on, people with network access can use printers attached to ourcomputer. When File Sharing is on, files stored on our computer are accessible to people on the network. Weshould use this method of sharing if we prefer to share files directly from any folder on our computer withoutcopying or moving them to the Public folder, and if we require more control over who we share files with on thenetwork. The thing is that there are two ways of sharing files on our network. One way is using standard FileSharing, where we can set shared folders and appropriate permissions. A new feature in Vista, designed to makeit easier for end users to share their information is called Public Folder Sharing.Public FolderPublic Folder Sharing is a way to share files with other people on the network. These files are stored in onecentral location on our hard drive, in C:UsersPublic. We should use this method of file sharing if we prefer thesimplicity of sharing files from a single location on our computer (in the Public folder) and if we want everything weshare to be kept in a separate location from the rest of our files. Everyone can access our public folder so wedont have to worry about sharing permissions for individuals.There are some restrictions that we can set. We can set that users can only open files, or we can set that userscan open, change, and create files. We can also turn off sharing.Media Sharing
  • 107. Utilize Windows VistaNetworking105www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)When Media Sharing is on, computers and network devices can access music, pictures, and videos on ourcomputer that have been added to the Media Players library. Typically those files are locatedin C:Usersuser_namemusic, pictures, and videos folders. Also, when Media Sharing is on, our computerwill be able to find those types of files on other computers within the network.Network Location TypesWhen we first connect our machine to the network, Vista will do its best to figure out our network location type.There are three network location types. Also, we choose a network location by ourselves. The network locationidentifies the type of network we are connecting to, controls Firewall settings, security settings and enabledcertain services. Network location types are: private, public and domain.Domain Network LocationDomain is the most simple, because if our computer is a member of Active Directory domain, we are in theDomain network location type. Security settings are controlled through Group Policy.Private Network LocationIf our connection type is set to Private, our computer will be able to discover other devices on the network andother devices will be able to discover our computer. Network Discovery is enabled by default. Even in a privatenetwork situation we should have up-to-date Firewall and antivirus software enabled on our computer.Public Network LocationIf our network location type is set to Public, our computer will not be able to discover other devices nor will otherdevices be able to discover us. Were basically invisible to other computers on the network. A Public network is anuntrusted network (such as when we are in an airport or library). Default settings keep our computer from beingvisible (Network Discovery is turned off) or sharing files. When connecting to a public network we should have up-to-date Firewall and antivirus software installed and running on our computer to avoid viruses, malicious hackers,and unwanted software. Also, when we connect to an unsecured wireless network, all that we do on the Internetcan be monitored by someone with the correct equipment, including websites that we visit, online documents wework on, user names and passwords we use.Windows firewall configures itself differently depending on our location type. There si also new protocol thatcomes with Vista that helps us discover other computers on the network. It is called Link Layer DiscoveryTopology or LLDT. This is a new way to browse for computers on the network. It is not like the old broadcastbased method for creating the browse list. For LLTD to function correctly network discovery must be enabled.LLDT will send WMI queries to discover other devices and also discover their capabilities. LLTD Responderresponds to requests from other Vista machines. By using all this information from the queries, LLTD can create anetwork map. This is a full summary of information that LLTD has discovered in a graphical format. LLTD keepseverything up-to-date through a version control system.Example ConfigurationTo open Network and Sharing Center, go to Control Panel > Network and Internet > Network and SharingCenter.
  • 108. Utilize Windows VistaNetworking106www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 236.1 - Network and Sharing CenterIn our example we can see that we are connected to the private network. On the network map we can see ourcomputer (ivancic-v), the network that we are in (Home Network), and we can see that we are connected to theInternet. Below the map we can wee we have local and Internet access and that we are using Local AreaConnection. To change the name or network location we can click on the Customize link.Image 236.2 - Customize Network Settings
  • 109. Utilize Windows VistaNetworking107www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)If we go back to our Network and Sharing Center, we can see that in the Sharing and Discoverysection we havevarious options to share our resources and to secure our computer. For example, in our case we have Networkdiscovery turned on. This enables our computer to be visible on the network and lets us find other devices aswell. This will be set based on network location that we are in. File sharing is off, so we are not able to share ourfiles in our case. Public folder sharing is turned off. Public folder sharing is a new way to share files for end users,in which we share only one folder (/users/public). To contrast Public folder sharing with File sharing, with Filesharing we can have multiple shares. Printer sharing is turned off since we dont have any printers installed. Weare password protecting our sharing and media sharing is turned off.Lets see computers and devices on our network. To do that click on the View computers and devices from themenu on the left or simply click on the network icon in the network map (Home Network in our case).Image 236.3 - Visible Devices on the NetworkIn our case we can see some network devices, but also notice the warning that File sharing is turned off. Now,lets try to turn off Network discovery.Image 236.4 - Network Discovery Turned Off
  • 110. Utilize Windows VistaNetworking108www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)When we do that and try to see devices on our network, we wont be able to.Image 236.5 - No Devices Since Discovery is Turned OffThe list of devices is now gone. We can click on the notification to change Network discovery back to on.There are other things that we can do in Network and Sharing Center. We can connect to another network, set upnew connection or network, manage existing network connections and troubleshoot network problems.RememberWe can configure various network settings using Network and Sharing Center. To change the name of network,or to change network location, we can click on the Customize link. In the Sharing and Discovery section we havevarious options to share our resources and to secure our computer on the network. To see computers anddevices on our network we can click on the View computers and devices.Paths that are mentioned in this article Control Panel > Network and Internet > Network and Sharing Center - path to the Network and SharingCenter C:Usersuser_name[music] [pictures] [videos] - typical locations which are added to the Media Playerslibrary.Configure TCP/IP Settings in VistaParent Category: VistaCategory: Networking
  • 111. Utilize Windows VistaNetworking109www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)To configure Windows Vista for networking we need to know the basics about TCP/IPand DNS. In this article we will use the Network and Sharing Center to configure basicTCP/IP parameters.Before you startObjectives: learn where and how can we configure TCP/IP settings in VistaPrerequisites: you should know which parameters are required for TCP/IP connection. Also, you have toknow about IP addresses and MAC addresses.Key terms: configuration, server, settings, address, alternate, ip, vista, tcp, option, properties, dhcp, statusNetwork and Sharing CenterFirst, we will go go to Control Panel > Network and Internet > Network and Sharing Center.Image 237.1 - Network and Sharing CenterNotice that the connection that we are using is Local Area Connection. To view details about this connection clickthe View status link.
  • 112. Utilize Windows VistaNetworking110www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.2 - Connection StatusWe can see that we do have connectivity. Our speed is 1 Gbps. To see even more details we can click onthe Details button.
  • 113. Utilize Windows VistaNetworking111www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.3 - Connection DetailsInteresting things here are the MAC address, DHCP status, IPv4 address, Link-local IPv6 address, etc. Wecan close this window now. To change settings on this connection we have to click the Properties button.
  • 114. Utilize Windows VistaNetworking112www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.4 - Connection PropertiesIn our case we want to check IPv4 settings so we will select Internet Protocol Version 4 (TCP/IPv4) option fromthe list and click the Properties button. The following window will appear.
  • 115. Utilize Windows VistaNetworking113www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.5 - IPv4 SettingsIn our case we currently have the default settings. Our computer will try to obtain an IP address automatically.When this option is set, notice that we have an Alternate Configuration tab visible. Only if DHCP fails, ourcomputer will use the settings from the Alternate Configuration.
  • 116. Utilize Windows VistaNetworking114www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.6 - Alternate ConfigurationIn Alternate Configuration tab we have two options that we can use. We can use APIPA or Automatic Private IPaddress or we can set our own IP settings. This second option (User configured) is also often called AlternateConfiguration. If we dont want to use DHCP we can use static configuration. To do that, in General tab we simplycheck the Use the following IP address option.
  • 117. Utilize Windows VistaNetworking115www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.7 - Static ConfigurationNotice that the Alternate Configuration tab is not visible in this case. Lets cancel all changes that we made fornow.Another way to get to our network connections is to go back to the Network and Sharing Center and then from theleft menu select the Manage network connections option.
  • 118. Utilize Windows VistaNetworking116www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.8 - Manage Network ConfigurationsHere we can right-click it and go to the properties of the connection, disable it, diagnose any problems, check thestatus, etc. Lets open the properties of our connection and open IPv4 configuration.
  • 119. Utilize Windows VistaNetworking117www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.9 - IPv4Notice that the current configuration is set to obtain the DNS server address automatically. If we go to the detailsof our connection we can find the address of our DNS server.
  • 120. Utilize Windows VistaNetworking118www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.10 - DNS ServerIn our case the DNS server is also the Default Gateway as well as our DHCP server. Remember that the DNSserver IP address can be on different subnet than our computer is. Notice also that we can have proffered andalso alternate DNS server configured.
  • 121. Utilize Windows VistaNetworking119www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.11 - Preferred and Alternate DNSNow, lets try and use the static configuration. We will use the 192.168.1.0 network. Our subnet mask will be255.255.255.0. The IP address will be 192.168.1.100. Default gateway as well as our DNS server will be192.168.1.1. Alternate DNS server will be 172.16.1.1.
  • 122. Utilize Windows VistaNetworking120www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 237.12 - Example ConfigurationAfter we hit OK, our computer will be able to communicate with all devices on the 192.168.1.0 network.RememberWe can configure TCP/IP settings for particular connection trough Network and Sharing Center. We have to haveadministrative rights to make changes. If we have DHCP server on the network, we will use the Obtain an IPaddress automatically option. If there are some problems with DHCP, our computer will use APIPA or AlternateConfiguration (if its configured). Another option is to use Static Configuration, where we have to manually enter IPaddress, Subnet Mask, Default Gateway and DNS Server. In that case we will use the Use the following IPaddress option.Paths that are mentioned in this article Control Panel > Network and Internet > Network and Sharing Center - path to the Network and SharingCenterConfigure Dial-up and VPN Connection in VistaParent Category: VistaCategory: Networking
  • 123. Utilize Windows VistaNetworking121www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Although Dial-up is obsolete technology today, we may still use it in some specialsituations. VPN connections are great when we have to connect to remote networks securely, such as ourworkplace. Dial-up can be used for the same reason.Before you startObjectives: learn how to create a Dial-up and a VPN connection in Vista.Prerequisites: in order to use a Dial-up we have to have a modem installed on our computer. In order to useVPN, we must have a VPN server which we will connect to.Key terms: connection, vpn, dial-up, connect, network, option, password, server, properties, internet, manage,securityDial-upTo configure dial-up and VPN connections in Vista we can go to Control Panel > Network and Internet > Networkand Sharing Center and then select Set up a connection or network from the menu on the left. The wizard willappear.Image 238.1 - Connection WizardOn the picture we can see that we can set up a connection to the Internet, wireless router, dial-up connection, andat the bottom we have a VPN connection. If we had a wireless network adapter, we would see more options. Letsnow create a dial-up connection. We already have our dial-up modem installed so we will select Set up a dial-upconnection option and click Next.
  • 124. Utilize Windows VistaNetworking122www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 238.2 - Dial-up ParametersOn this screen we type in the phone number that our ISP gave us, our user name and password. We also haveoptions to remember our password so we dont have to type it in every time we connect to our ISP. We can alsochange the connection name. We will allow other people to use this connection. In our case, the exampleconfiguration looks like this:Image 238.3 - Example Configuration
  • 125. Utilize Windows VistaNetworking123www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)If all settings are entered correctly, we should be able to connect to our ISP once we click on the Create button.When we create our connection we can manage it by going to the Network and Sharing Center and selectingManage network connections from the menu on the left.Image 238.4 - ConnectionsHere we can right-click any connection and go to its Properties. On the General tab we can manage dialing rules,on the Options tab we can set redial attempts, progress display, etc. On the Security tab we can set how to verifyour identity. If we go to the advanced settings in the Security tab, we can see that we can use various protocolslike PAP, CHAP or MS-CHAP-v2. We can also use EAP or Extensible Authentication Protocol if we have smartcards or certificates.
  • 126. Utilize Windows VistaNetworking124www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 238.5 - Security ProtocolsVirtual Private Network (VPN)Now, lets create a VPN connection. Again we will select the Set up a connection or network option in theNetwork and Sharing Center. This time, in the wizard we will choose the Connect to a workplace option and clickNext.
  • 127. Utilize Windows VistaNetworking125www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 238.6 - Choose or Create New ConnectionFirst we have to choose if we want to use a connection that we already have or we want to create a newconnection that we will use to connect to the Internet. As we can see on the picture above, we can use ourexisting dial-up connection which will connect first, and then our VPN will go over that dial-up connection. In ourcase we will create a new connection, so we will just click Next.Image 238.7 - How to ConnectOn the next screen we have to choose how we want to connect to our workplace. In our case we will use VPN,which means that we will use our Internet connection. We will not Dial directly. So, we will select the firstoption. On the next screen we have to enter the IP address or host name of the VPN server.
  • 128. Utilize Windows VistaNetworking126www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 238.8 - VPN SettingsIn our case the IP address is 100.100.100.100. We will leave the default Destination name. We will allow otherpeople to use this connection. We will also select the option not to connect right away. When we click Next we willhave to enter our credentials.Image 238.9 - Credentials
  • 129. Utilize Windows VistaNetworking127www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)In our case we will enter admin as our username. We will choose the option to remember our password. Ourdomain name is intranet. When we click the Create button, our VPN connection is ready. Again, we can go andmanage our existing connections. Lets go to the Properties of our VPN connection.Image 238.10 - VPN PropertiesThese properties are similar as Dial-up properties. One difference is that on the Networking tab we can specifywhat kind of tunneling protocol we would like to use.
  • 130. Utilize Windows VistaNetworking128www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 238.11 - Networking TabThe Automatic option will simply select whatever is available on the VPN server.RememberFor Dial-up connection we must have a Dial-up modem installed. We have to have valid credentials which will beused to connect to remote server. For VPN connection we must have a VPN server already configured. Typically,we will also have to have some kind of credentials. There are several types of VPN, and we can choose theappropriate one in the properties of the VPN connection (Networking tab).Paths that are mentioned in this article Control Panel > Network and Internet > Network and Sharing Center > Set up a connection or network -path to the connection wizardConnect to a Wireless Network in VistaParent Category: VistaCategory: Networking
  • 131. Utilize Windows VistaNetworking129www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Wireless network management has been simplified in Vista. Connecting towireless networks is now more user friendly.Before you startObjectives: learn how to connect to wireless networks, how to manage existing and how to create new wirelessnetworks.Prerequisites: you have to have a wireless NIC installed.Key terms: network, wireless, connect, security, option, type, list, ad, click, hoc, select, wpa, iconNotification AreaWhen trying to connect to wireless networks the first place we can try is the notification area, which is located inthe lower right-hand corner. We will click on the icon with two monitors. This icon tells us that we are connected tothe network, but in our case this is a wired network.Notification AreaList of NetworksTo see which wireless networks are available we can click on the Connect to a network option. We can also do aright-clik on the icon and select the Connect to a network option. We can also go to the Start Menu and selectConnect To option. When we do that, we will see a list of available networks, including wireless networks.
  • 132. Utilize Windows VistaNetworking130www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)List of NetworksNotice that we have a drop down arrow which we can use to filter different types of networks in the list. Here wecan select between Dial-up, VPN and wireless connections. Also notice that we have a refresh button which wecan use to refresh our list ov available wireless networks.Vista will rank available wireless networks based on their signal strength. On the left side we can see the SSID ofthe network. In the second column we can see if the network is security enabled. Security enabled wirelessnetwork can use WEP, WPA or WPA2 configuration. In the last column we see the signal strength. When we putour mouse over some network, we will see a little window in which we can see the SSID, radio type, signalstrength and also the security type of the wireless network.Pop-up WindowIn our case we can see that the security type is WPA2, which is good. In contrast to that, we could have WEP,which is easily cracked using some Linux tools. Also notice that the radio type is 802.11g. The wirelessconnection that we see (H1 Telekom) is infrastructure network, and we can see that by the icon of the network.We can also have an ad-hoc (peer to peer) network. The ad-hoc icon is shown on the picture (SSID: ad-hoc-new).Ad Hoc IconIf the network is not using any security method, we will see that in the second column. The icon will also have asmall yellow shield on it.
  • 133. Utilize Windows VistaNetworking131www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Unsecured NetworkWhen we try to connect some unsecured network, we will get a warning because our information will be visible toothers on the network.Warning About Unsecured NetworkConnecting to Wireless NetworkWhen connecting to a security enabled network we will be prompted for a WEP or a WPA passphrase. In ourexample we will try to connect to H1 Telekom network.Security KeyWhen we set up a wireless network we have an option to save all the necessary settings for clients to a USB flashdrive. If we had this kind of USB flash drive we would insert it at this point and it would automatically set up theconnection for us. This is great if we dont want to share the passphrase with end-users.So, we simply enter the network key, click on the Connect button, and we will be connected to the wirelessnetwork (if the key is correct of course).Management of Wireless Networks
  • 134. Utilize Windows VistaNetworking132www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Now, lets see how can we manage our network connections. To do that we will go to Control Panel > Networkand Internet > Network and Sharing Center, and then select Manage network connections option from the menuon the left.Network ConnectionsNotice that in our case we have three network connections. Two of them are wired, and one is wirelessconnection. One connection doesnt have a cable plugged in, other connection is currently connected, and awireless connection is disconnected. Interesting option that we have here is Bridge Connections. If we right clickwireless connection we can select the Bridge Connections option.Bridge Connections OptionThis allows us to combine different types of networks (like wireless and wired networks) into one logical network.When we do that, clients on the wireless network will be able to access our wired network and clients on the wirednetwork will be able to access clients on the wireless network. Important thing to know is how to see theproperties of the wireless connection. To do that, right-click it and select the Properties option. There we can editTCP/IP settings for our connection.Now, lets go back to Network and Sharing Center and lets select the Manage Wireless Networks from the left.Here we can set a lot of options for our wireless networks. Notice that we already see one wireless network in thelist. Thats because we have connected to that network previously.
  • 135. Utilize Windows VistaNetworking133www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Wireless OptionsLets click on the Profile types option that is available here.Profile TypesBy default, all users in Vista can connect to any wireless network that has been set up. We can change this sothat users can only use and modify connections that they made themselves. When we do that, there might besome loss of connectivity when we change form one user that has access to some connection, to another userwhich doesnt have access to that particular connection.Creating New ConnectionsLets close that and click on another interesting button which is the Add button.Add New Network
  • 136. Utilize Windows VistaNetworking134www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Here we have three options. The first option allows us to see a list of networks that are currently available andlets us connect to one. This will open the same window which we already saw when we tried to connect to awireless network. The second option (Manually create a network profile), is used when we dont see the wirelessnetwork in the list of available networks (it is hidden, it is not broadcasted), but we know the SSID and securitykey of the wireless network. This way we can manually configure and connect to hidden wireless network.Manually ConnectSo, we need to know all of the parameters of the wireless network. When it comes to security types, Noauthentication (Open) means that there is no security set on the network. WEP type is better then nothing, but itis easily cracked. With WPA-Personal and WPA2-Personal we will use a passphrase to secure our network. Withthose two types we can also select the encryption type which can be TKIP or AES. 802.1x security type usescertificates to secure the network connection. In our case we have entered SampleSSID as our network name,the security type is WPA2-Personal, encryption type is AES, and we have entered our passphrase. Thisconnection will be saved for all users on our computer and everyone will be able to use it. If you dont want that,you should go back to the Profile types windows and change the settings. One other important thing is to choosethe Connect even if the network is not broadcasting option. When we choose that we will be able to connect tothe wireless network which doesnt broadcast its SSID. Thats it. If all settings are correct, that connection will belisted as the connection that we can connect to.Create an Ad Hoc NetworkThe third option to add a network is to create an ad hoc network. This is used to create a temporary wirelessnetwork which we can use to connect computers without using any Access Point (peer to peer network). Whenwe click Next, we will have to choose the network name, security type and security key if necessary.
  • 137. Utilize Windows VistaNetworking135www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Ad Hoc ParametersIn our case the network is called peer-wireless, security type is WPA2-Personal, and we have entered ourpassphrase. We will also choose to save our network. When we click Next, other people will be able to connect tous, to this wireless network, if they know the security key. Notice that we can also turn on Internet connectionsharing if we want others to access Internet trough our computer using this ad hoc network.Ad Hoc is ReadyIf we go to Start > Connect To, we will see our newly created ad hoc network. Notice the Waiting for users toconnect status.
  • 138. Utilize Windows VistaNetworking136www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)List of NetworksRememberVista will rank available wireless networks based on their signal strength. We should only connect to securednetworks. When connecting to a security enabled network we will be prompted for a WEP or a WPA passphrase.When we set up a wireless network we have an option to save all the necessary settings for clients to a USB flashdrive. Bridge Connections option allows us to combine different types of networks (like wireless and wirednetworks) into one logical network. By default, all users in Vista can connect to any wireless network that hasbeen set up on our computer. We can connect to a network which is not broadcasting if we know all all of itsparameters. Ad hoc network is peer to peer network.Configure Internet Connection Sharing (ICS) in Windows VistaParent Category: VistaCategory: NetworkingIn this tutorial we will use a ICS feature in Windows to configure our Vistamachine as the default gateway on our private network.Before you startObjectives: Learn how to configure ICS in Windows Vista, and when shouldwe use this feature.Prerequisites: you should understand what is ICS in general.Key terms: ics, network, connection, internet, private, address, configure, enable, ip, nat, selectHow to Enable ICSWhen we enable ICS in Windows, we actually configure our machine as a simple NAT router. To configure ICS inVista, lets go to the Control Panel > Network Connections. Notice that we have two connections in our case.One connection is connected to the Internet, and the other is connected to our private network.
  • 139. Utilize Windows VistaNetworking137www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Network ConnectionsRemember that we have to enable ICS on the connection which is connected to the Internet. Thats because wewant to share that Internet connection with other computers on the network. In our case we will right-click the"Internet Connection", select Properties, and then open the Sharing tab. Here we have to select the "Allow othernetwork users to connect trough this computers Internet connection" option.ICS CheckedTo configure NAT features we can click on the Settings button here. In this window we can select the serviceswhich will be available to Internet users. We will not enable any services now.
  • 140. Utilize Windows VistaNetworking138www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Advanced SettingsWhen we click on the OK button, several things will happen. First, our LAN (private) network adapter will beconfigured to use IP address 192.168.0.1. We can check this on our private connection. Lets open the propertiesof our Local Area Connection, select "Internet Protocol Version 4 (TCP/IPv4)", and click the Properties button.IPv4 SelectedNotice that our adapter is configured to use the IP address 192.168.0.1 and the subnet mask 255.255.255.0. Thishappened when we enabled ICS on our Internet connection.Private Adapter SettingsOur ICS computer is now configured as a limited NAT router. It uses NAT on the Internet connection to translateaddresses from the private network to the public address. Our ICS server is also configured as a limited DHCPserver which provides IP address information for hosts on the private network. ICS computer is also configured asa DNS proxy. Note that other computers on the private network must be DHCP enabled. This way they will getproper IP address information from our ICS server.
  • 141. Utilize Windows VistaManagement139www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)ManagementManage Hard Disks and File System in VistaParent Category: VistaCategory: ManagementHard disk management is closely related to file system management, so weneed to be familiar with Disk Management console which we can use to workwith our disks.Before you startObjectives: learn how to manage disks in Vista.Prerequisites: you have to know what is File system.Key terms: volume, create, spanned, file, drive, space, simple, stripped, unallocated, letterDevice ManagerFirst lets check our disks in Device Manager. Right-click on computer, select the Manage option, and then go toDevice Manager. Lets open Disk drives. Notice that in our case we have one disk installed.Image 330.1 - Disk Drives in Device ManagerLets open the properties of that hard disk and then go to the Volumes tab. Here we will click the Populate buttonwhich will query the hard drive and find the various volumes that have been configured on the disk.
  • 142. Utilize Windows VistaManagement140www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 330.2 - Volume TabIn our case we can see that theres one volume with a drive letter of C. While we can see the physical disks thatare in our system using Device Manager, to manage file system we will typically go to Disk Management. Letssay that we have bought two new disks and that we have attached the to our computer. We will use DiskManagement console to set them up.Disk ManagementDisk Management is also part of the Computer Management console which we have already opened. Simplyselect it from the menu on the left. To open Disk Management we can always go toControl Panel > System andMaintenance > Administrative Tools > Computer Management > Disk Management. On the top of the DiskManagement window we can see all of the volumes that exist on our computer. Notice that we have only onevolume. The bottom portion in the middle shows us each individual disk along with the volumes on each disk.Notice that we have two new disks with unallocated space.
  • 143. Utilize Windows VistaManagement141www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 330.3 - Disk ManagementIn our case Disk 0 is the first disk and it has one volume (C). To be more precise, we have one partition on ourdisk, and one volume which is using that single partition. Notice that we also have two other disks which are notinitialized and the space is unallocated, so before we move on we have to solve that issue. To initialize a disksimply right-click it (in Disk Management) and select the Initialize Disk option. The following window will appear.Image 330.4 - Initialize DiskWe will use the MBR partition style and click OK. After we have done that we can work with our disks. Lets playwith them a bit. Lets create a spanned volume from two disks.
  • 144. Utilize Windows VistaManagement142www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Spanned VolumeSpanned volume is made up of disk space on more than one disk. We can create a spanned volume if we need avolume that is too big for a single disk. We can also expand a spanned volume by adding free space from anotherdisk. To do that right click on Disk and select the New Spanned Volume option. The wizard will appear. We wantour new volume to be 512 MB in size so in in our configuration notice that we have taken 256 MB from everydisk.Image 330.5 - Spanned Volume ConfigurationAfter we click Next we will select to assign a drive letter E to our new volume and to format it using NTFS filesystem. We will also named it Spanned. Before we continue we will get a warning that our disks have to beconverted to dynamic disks.Image 330.6 - Dynamic Disk WarningThats fine with us so we can just click OK. If we look in Disk Management console now, we can see our newvolume E. Notice that when we click on it on one disk, it will also be selected on all other disks.Image 330.7 - Spanned Volume in Disk ManagementSo, the spanned volume contains space from two separate partitions on two separate disks, Disk 1 and Disk 2.Lets create a Stripped Volume now.Stripped Volume
  • 145. Utilize Windows VistaManagement143www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Stripped volume stores data in stripes on two or more disks. That gives us faster access to our data than a simpleor spanned volume. To create stripped volume, right-click on disk (in Disk Management console) and select theNew Stripped Volume option. The wizard will appear. In our case we will select both disks and take 256 MB oneach disk. Our configuration looks like this.Image 330.8 - Stripped Volume ConfigurationWe will assign drive letter F to it, format it with NTFS, and label it with Stripped. Our disks in Disk ManagementConsole now look like this.Image 330.9 - Spanned and Stripped Volumes CreatedSimple VolumeLets also create a simple volume on Disk 1. A simple volume can only be on a single disk. To do that we willright-click on Disk 1 and select the New Simple Volume option. The wizard will appear. In our case we will selectthe rest of the space on Disk 1 which is 478 MB.Image 330.10 - Simple Volume Configuration
  • 146. Utilize Windows VistaManagement144www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)We will assign drive letter G to it, format it with NTFS and label it with Simple. Our volumes now look like this.Image 330.11 - Simple Volume AddedIf we dont assign a drive letter to our volume and if we dont format it, we wont be able to use it in Windows. It willexists as a volume in Disk Management, but as a volume without a drive letter label.Unallocated SpaceNotice that on Disk 2 theres additional space on the disk that is labeled as unallocated. Unallocated simplymeans that it is a portion of a disk that has not been assigned to a partition or a volume. We can use theunallocated space on the disk to create additional partitions or volumes.Windows ExplorerWe can look at the data that exists on a volume by going to Computer or My Computer in Windows Explorer.Here we can see the volumes that exist on our computer. Those are C:, E:, F: and G:.Image 330.12 - Hard Disk Drives in ComputerNotice that they correspond to the volumes that we have defined in Disk Management. Also notice that theunallocated portion on Disk 2 can not be used in Explorer. To see the files that are saved on a volume we can justdouble click on the volume. Lets open our Spanned volume. We currently dont have any files on it. To create afile we can simply right-click and chose New. Then we choose a type of document that we want to create. In ourcase we will create two text documents, Text 1 and Text 2. Of course we can open a program and edit thesedocuments.
  • 147. Utilize Windows VistaManagement145www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 330.13 - Text DocumentsWe can also use folders to organize our documents. Folders are simply markers that allow us to organize how thefiles are viewed on the disk. They dont actually change the position of the file on the disk. They simply changehow we see the files when we browse the file system. For example, lets create new folder called Intro and moveour file Text 2 to it.Image 330.14 - Intro FolderSo, we didnt actually moved the file to a different location on the disk. We have simply associated the Text 2 filewith the Intro directory. That way as we browse the volume we can use the folders to organize our files.FormattingFormatting prepares the volume with the structure that is necessary to save files on the volume. Withoutformatting the operating system does not know how to identify files within the portion of the disk. Lets see how toformat hard drive from Explorer. We wil work on our simple volume which has drive letter G. We have alreadyformatted it, but for the purpose of demonstration we will do it again trough Explorer. We will right click it andselect the Format option.
  • 148. Utilize Windows VistaManagement146www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Image 330.15 - Formatting OptionsBy default NTFS is the file system type that Windows prefers, although we can also chose FAT or FAT32. We willleave our label Simple and check the Quick Format option. When we click on Start we will get a warning whichtells us that formatting erases all the data thats on the disk. In our case this is fine because theres nothing on thedisk to begin with. If we have something important on our disk, we have to be sure to back it up.RememberWe can use Device Manager to view the physical disks that are installed on our computer. By viewing theproperties of the disk we can also look at the volumes that have been defined on that disk. With DiskManagement we can view the disks, the partitions as well as the volumes for each of the disks. We can also seeunallocated space on a disk. We use Disk Management to create partitions, volumes, to perform formatting andassign drive letters. We use Explorer to browse the file system and view the contents of the disk. Folders areways of organizing files. Files contain the data that programs create.Configure Windows Mail in VistaParent Category: VistaCategory: ManagementWindows Mail is a free application available in Windows Vista which we canuse to send and receive e-mail messages.Before you startObjectives: familiarize yourself with the Windows Mail application inWindows Vista.Prerequisites: no prerequisites.Key terms: mail, e-mail, windows, messages, junk, settings, server, account, options, application
  • 149. Utilize Windows VistaManagement147www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Windows Mail ApplicationWindows Mail is actually an updated version of the Outlook Express. So, it is a simple e-mail and newsgroupclient. When we download e-mail messages from the server, we can choose to delete the message from theserver or to leave it once it is downloaded to the Windows Mail client. Windows mail provides new tools which willhelp us to manage junk mail more efficiently. Junk mail filtering now has four levels. The first level is "no filter",second is "low", third is "high" and the fourth is "safe list only". In the last level, only messages from our contactswill get to our Inbox folder. All others will be sent to junk e-mail folder.We also have an option to block HTML content in e-mails. Phishing filter which is integrated in Internet Exploreralso protects our e-mails (Windows Mail uses the same engine filter). There are also rules that we can set up inWindows Mail. For example, we can route certain type of messages to certain folders. Also, we can use multipleprofiles in Windows Mail. That means that if we have multiple users on our computer (different accounts), oneuser cant see messages from another user. All messages are exportable, so if we need to move to anotherenvironment, that can be easily done.There are some default settings in Windows Mail that we should be aware of. For example, it will block imagesand other file attachments with extensions like .exe, .pif and .scr files. We should always use caution whenopening e-mail attachments. HTML format for e-mails is susceptible to malicious intent. Phishing links are oftenused in spam e-mails that we view in HTML format. We should always be careful when clicking on links inmessages. Windows Contacts are integrated in Windows Mail.To set up e-mail account we need to have a valid e-mail address. We have to know e-mail server names so thatwe can send and receive e-mail. We have to know which type of server will we use (POP3, SMTP, IMAP). Wealso have to know our credentials (user name and password) to sign in to our account.ConfigurationTo open Windows Mail we can go to Start Menu, and then select E-mail. When we first open it, it will prompt us toopen e-mail account. For the purpose of this demo we will use a Utilize Windows e-mail account. The name willbe "Marko Ivancic".Name (Marko Ivancic)On the next screen we will enter our e-mail address, which is forum (at) utilizewindows.com.E-mail Address
  • 150. Utilize Windows VistaManagement148www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)On the next screen we have to enter information about incoming and outgoing mail servers. In our case we willselect the POP3 protocol. In our case, the incoming and outgoing mail server is mail.utilizewindows.com, but thisdoesnt have to be the case with your settings. Incoming and outgoing servers can be different and are oftennamed something like pop.domainname.com or imap.domainname.com or smtp.domainname.com.Server NamesOn the next screen we have to enter our username and password.CredentialsIf everything went fine, the Windows Mail application will now open. On the left hand side we can see LocalFolders which contains our Inbox, Outbox, etc. We can also see the Microsoft Communities which stands fornewsgroups. On the right hand side we can see a list of e-mails. In our case, we have only one e-mail in ourInbox. If we select that mail, we will see its content in the preview pane which is located below the list of e-mails.
  • 151. Utilize Windows VistaManagement149www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)ApplicationIf we want to add additional e-mail accounts, we can go to Tools > Accounts. Here we will see existing accounts,which we can edit. We can also add new accounts by clicking the Add button.List of AccountsSome servers will require that we use some advanced settings for our account, like special port numbers, secureconnection (SSL) settings, and other settings. For example, if you use a GMail account, you will have to check theMy server requires authentication option for the Outgoing mail server. This is enabled in the Servers tab. In ourcase we dont have to use that option.
  • 152. Utilize Windows VistaManagement150www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Account PropertiesAlso, sometimes servers will use different ports for their services. For example, GMail requires the use of SSL.The outgoing mail (SMTP) port is 465, while the incoming (POP3) port is 995. All that options can be configured inthe Advanced tab. In our case our account can use the default settings, and we dont have to change anything.Advanced SettingsWe can also configure options for Junk filter. To do that we can go to Tools > Junk E-mail Options. As we said,there are several levels of junk e-mail protection levels, and we can choose the right one for us here. We shouldbe careful with those levels, because sometimes we will have legitimate mail sent to the junk folder: We should becareful when deleting e-mails from our junk folder and check for regular e-mails.
  • 153. Utilize Windows VistaManagement151www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Junk Mail OptionsOn the Safe Senders tab we can add addresses or domain names to the safe senders list. That way their e-mailwill never go to the junk folder. The same is with the Blocked Senders list (their mail will always go to the junkfolder). We can also block Top-Level Domain names on the International tab. As we know, some countries arefamous for sending a lot of spam. But we should also be careful with those options, because we will block all e-mails from some country, including legitimate ones. There is also a Phising tab where we can choose to enableprotection from messages with potential phishing links. By default it is turned on.For more Windows Mail options we can go to Tools > Options. Here we can choose what to do when we send orreceive messages, how often to check for messages, etc. On other tabs we can choose how to format ourmessages and how to display the ones that we receive. We can also configure our signatures. We should befamiliar with settings in the Security tab.General OptionsWe can also set rules for our messages if we go to Tools > Message Rules > Mail.
  • 154. Utilize Windows VistaManagement152www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)RulesTroubleshootingIf we can send e-mail but cannot receive it, we should check our e-mail account settings, especially the Incomingserver part. We should also verify that firewall settings allow incoming e-mail. If we can receive e-mail but notsend it, we should check our configuration with the outgoing mail server settings. If Windows Mail doesnt openwhen we click on some e-mail link, Windows Mail is probably not set as the default e-mail application on ourcomputer.Working With Windows Meeting Space in VistaParent Category: VistaCategory: ManagementWindows Meeting Space is a collaboration tool which can be used to view andedit documents by multiple people at the same time. Meeting Space is notavailable in Vista Starter edition. Vista Home edition can only join a meeting(cannot host a meeting). Meeting Space uses the People Near Me feature ofVista. People Near Me lets us find meetings and send invitations to otherpeople to join meetings.Before you startObjectives: familiarize yourself with the Windows Meeting Space application in Windows VistaPrerequisites: no prerequisites.Key terms: meeting, space, people, windows, options, file, handouts, invitation, join, share, applicationOpen Windows Meeting Space
  • 155. Utilize Windows VistaManagement153www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)To open Windows Meeting Space we can go to Start > All programs > Windows Meeting Space. When we firstopen Windows Meeting space we will get a warning that we need to allow this application to go trough ourWindows Firewall in order to share information with other users. We will select the "Yes" option so that we cancontinue setting up Windows Meeting space.Firewall WarningThe new window will pop up. Here we will set up the People Near Me feature. We will enter our display name andchoose to allow invitations from anyone. We could also allow invitations only from trusted contacts or from no one.Trusted contacts are those who have digital certificates to verify their authenticity.People Near Me OptionsThe next thing we will see is the Windows Meeting Space window. On the left-hand side we can start a newmeeting, join an existing meeting, or open an invitation file to join the meeting.
  • 156. Utilize Windows VistaManagement154www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Meeting SpaceLets start a new meeting. We have to enter a meeting name and a password which has to have at least 8characters.New MeetingBefore we continue lets look more options by clicking on the Options link. Here we will be able to edit visibilityoptions. With visibility options we can allow people which are signed in People Near Me feature to see ourmeeting, or we can disable that. If we disable this, only people with invitation will be able to join our meeting. Herewe can also configure a private ad hoc peer-to-peer wireless network and set up meetings that way.Visibility OptionsWe will continue creating our meeting by clicking on the green arrow button. This will create our meeting. As wecan see on the picture, we have a very simple interface.
  • 157. Utilize Windows VistaManagement155www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)InterfaceOn the left-hand side we can choose to share some program or our whole desktop with others. When we clickthat we will get a warning about a security risk. The risk is that others will see all items on our desktop, but we canactually avoid that by choosing the program from the list. Notice that in our case we have a Windows Calendarapplication running in the background. In our case we will choose only that application and share it with others.List Of ProgramsWe can see how our shared session looks like on other computers by clicking the appropriate option on theMeeting Space window. We can also stop sharing at any time. On the upper right-hand corner we can see the listof participants attending the meeting and invite people to our meeting. To invite others to this meeting, they haveto be signed in to the People Near Me.
  • 158. Utilize Windows VistaManagement156www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Invite WindowWe dont see anybody on the list, so we will click on the "Invite others" button and create an invitation file. We cansend an invitation in e-mail or simply create an invitation file and save it on our computer.Invitation OptionsIn our case we will select the second option and save or file to our Documents folder with the name"CicnaviMeeting". This file can then be sent by e-mail, instant messaging, or shared on the network. So, otherpeople have to get this invitation file somehow. The password for the meeting can also be phoned in person, inaddition to mentioned methods.In meeting we also have a handouts feature. We can add handouts to our meeting which will then be copied toeach participants computer. In our case we have added one handout which is a picture of a creek.Handouts
  • 159. Utilize Windows VistaManagement157www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)All handouts can be edited during the meeting. All handouts can be saved by going to the upper left-hand cornermenu.Save HandoutsHere we can also leave the meeting, we can invite others, share our desktop or application, and add handouts. Inthe upper right-hand corner we can give control of the program we are sharing or our desktop to someone else.We can take it back with the Windows+Escape buttons.Give ControlOn the Options button we can show windows meeting space window, and also connect to a network projector.OptionsWe cannot be joined to two meetings simultaneously. We have to leave one meeting and then join anotherseparately. We always have to be sure that we trust the people in a meeting since we will typically share ourresources. Also, we should only share the specific resources we need to share.TroubleshootingIn order to set up a meeting we have to make sure that we have network connectivity. Firewall settings also haveto be set up. Meeting Space will try to automatically open the correct firewall ports when we first start theapplication. We must sign in to People Near Me before we can use all the Meeting Space features. The maximumnumber of participants in a meeting is 10 (one presenting while 9 watch). If Meeting Space wont run, we have tomake sure that the proper services are running. Those services are Peer name resolution protocol, Peernetworking grouping, Peer networking identity manager and DFS replication. Sometimes others wont be able tosee or join a meeting. To resolve this, the person who set up the meeting should have Network discovery enabledin the Network and Sharing Center. Also, other people might not have the correct firewall ports open. During themeeting certain file types cannot be shared. Those files are Encrypting File System (EFS) files.Manage Performance in VistaParent Category: VistaCategory: Management
  • 160. Utilize Windows VistaManagement158www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Windows Vista has many tools which can be used to manage performanceissues. In this article we will consider most important ones.Before you startObjectives: familiarize yourself with important performance and reliabilitytools in Windows Vista.Prerequisites: you should know what do we mean by performance andreliability.Key terms: data, system, performance, reliability, logs, select, time, case, cpu, menu, monitorReliability and Performance MMCTo open the Reliability and Performance Monitor tool we can right-click Computer, select the Manage option, andthen select the Reliability and Performance option from the menu.MMC Snap InOn the main screen we can see the resource overview which includes the CPU, Disk, Network and Memory.Notice that in our case we have a lot of CPU and Memory usage. To get more details about specific area we canexpand specific option. Lets see which process actually consumes our CPU. For that we will expand the CPUsection and then click on the CPU column to see the highest value first.
  • 161. Utilize Windows VistaManagement159www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)svchost.exeIn our case we can see that the svchost.exe is currently consuming a lot of processing power. This is OK in ourcase.Lets now select the Performance Monitor option from the menu on the left. Here we will click on the "plus" icon toadd a counter. Notice that here we can add counters from other machines. In our case we added few processorcounters, including C1 Time, Idle Time, User Time and Interrupts/sec.CountersThis will give us real time view of the performance but notice that the data is deleted during time. We only seesmall portion of data.
  • 162. Utilize Windows VistaManagement160www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)GraphNow lets select the Reliability Monitor from the menu on the left. Reliability monitor keeps track of our systemstability over time. Notice that we have a score indicating how stable our installation is.Reliability Monitor
  • 163. Utilize Windows VistaManagement161www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)In our case our index is 10, which indicates a very stable system. On the graph we will see small red X if we hadsome kind of failure. Below the graph we have grouped reports which can be used to get more details on specificfailures.Now lets choose Data Collector Sets. There are system defined data collector sets or you can define your ownwas just look at the built in system data collector sets. We can define our own (user) data sets, or we can workwith predefined system data sets. In our case we will go to System, and then right-click the System Diagnosticsset, and select the Start option.DCSsAfter some time we will stop the process of collecting data in the same way. All data will be saved in theC:perflogs folder. But, now we can also take a look at reports of our data set. From the menu on the left we willselect Reports, then System, then System Diagnostics. Notice that now we have a ready report available.ReportsFrom the report we can see all kinds of information, and among other things we can see that our CPU has highload so we should investigate this. We can get a lot of details from those reports.
  • 164. Utilize Windows VistaManagement162www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Event ViewerEvent Viewer is another snap-in so we can simply select it from the menu on the left, if we have openedComputer Management console. In Windows Vista, Event Viewer has a redesigned interface. It is designed tolook like Microsoft Operations Manager (MOM). In the menu we still have standard Windows Logs portion.Event ViewerWindows Logs section includes Application, Security and System logs. We also have some new sections whichinclude Custom Views and Application and Services Logs. We also have Microsoft logs which gives us manyways in which we can keep track of whats going on the computer. On the right side we have some additionalactions that we can take. Among others we can filter our logs which is often useful. If we go to Properties, we cansubscribe to other computers to receive logs from them also. So in one location we can gather data from multiplemachines.Windows Update Feature in VistaParent Category: VistaCategory: ManagementUpdates are used to fix bugs in thecode, to fix security issues or to addnew features to our installation.Before you startObjectives: Learn how and where to configure Windows Updates feature in Vista.Prerequisites: you have to know what are updates.Key terms: updates, windows, installed, download, programs, vista, check, configure, controlWindows Update LocationWe can configure Windows Update feature in Start > All Programs > Windows Update, or we can find itin Control Panel > System and Maintenance > Windows Update.
  • 165. Utilize Windows VistaManagement163www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Windows UpdatesNotice that in our case there are 15 important updates that we should install. We are using Vista Ultimate so wealso have some additional (Extras) available for download. On the menu on the left we can choose to manuallycheck for updates. We can also choose to change the update settings.Update SettingsNotice that in our case the system will check for updates, but we will choose when to download them and installthem. Starting from Vista we can also choose to download and install recommended updates automatically. Onthe previous window we can also choose to view update history.
  • 166. Utilize Windows VistaManagement164www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Update HistoryOn this list we can right-click any update and view the details about it. On this windows there is a link to "InstalledUpdates". From Installed Updates we can remove particular update if we need to.Installed UpdatesInstalled Updates can be found in Control Panel > Programs > Programs and Features > Installed Updates.How to Use Troubleshooting Tools in VistaParent Category: VistaCategory: Management
  • 167. Utilize Windows VistaManagement165www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Windows Vista has several diagnostic tools which can be used to troubleshootvarious problems.Before you startObjectives: Learn where to find and how to use common troubleshooting tools in Vista.Prerequisites: no prerequisites.Key terms: tab, tool, problems, solutions, manager, task, check, diagnostics, memory, optionTask ManagerTask manager is the classic tool used to troubleshoot our computer. To open Task Manager, right-click on theTaskbar and select Task Manager option. In Vista, Task Manager is a bit different then previous versions. Wehave several new tabs, and some new features. For example, in Processes tab we can now see processes thatbelong to all users. In this tab we can also end particular process, set its priority, etc. A new tab is the Servicestab. This tab lists all services on our system and their status (running or stopped). From this tab we can also go toServices MMC snap-in directly by clicking the "Services" button.The Performance tab is the same as in previous version of Windows. In this tab we can see current CPU andmemory usage. The new thing here is the Resource Monitor button. This button will open up Resource Monitortool. Resource Monitor will basically give us more detailed information about the performance of our computer.We have a separate article in which we discuss performance issues in Vista.In Task Manager we can also track network usage on the Networking tab, and see all active users on the Userstab.
  • 168. Utilize Windows VistaManagement166www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Processes Tab in Task ManagerNetwork Diagnostics ToolTo open this tool we will go to Network and Sharing Center, and click on the "Diagnose and repair" option fromthe left menu.Network DiagnosticsProblem Reports and Solutions Tool
  • 169. Utilize Windows VistaManagement167www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)This tool can be found in Control Panel > System and Maintenance > Problem Reports and Solutions.Problem ReportingAs you can see, in our case we dont have any problems right now. If we had some problems, we could click onthe "Check for new solutions" option to check for solutions on the Internet. After we have done that, some newsolutions appeared. Thats because we had some problems in the past, and now there are solutions available tothose problems.New Solutions
  • 170. Utilize Windows VistaManagement168www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)We can also check the history of problems if we click on the "View problem history". If we click on the "Changesettings" option, we will be able to choose how to check for solutions to computer problems (automatically or not).We can also clear problem history by clicking on the "Clear solution and problem history" option.Windows Memory Diagnostics ToolTo run this tool we can simply enter "Memory Diagnostics Tool" in search menu. We can use this tool to check forhardware errors in our RAM.Memory DiagnosticsWe can choose to reboot our computer immediately and then scan our memory, or we can choose to check forproblems the next time we start our computerWorking With Backup Tools in VistaParent Category: VistaCategory: ManagementThe older NT Backup program that was available in Windows XP is replacedby the Backup and Restore Center in Windows Vista. It comes with somegreat new features.Before you startObjectives: Learn how to work with different backup tools that are availablein Windows Vista.Prerequisites: no prerequisites.Key terms: restore, backup, files, file, disk, center, complete, option, PC, create, Windows Vista, pointNew Features
  • 171. Utilize Windows VistaManagement169www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)The new Complete PC Backup feature makes it very easy to backup and restore the entire PC. However, it is onlyavailable in Vista Business, Enterprise and Ultimate editions.The Backup and Restore Center also has System Restore option. System Restore feature saves registry andoperating system files at regular intervals. System Restore point is often created before application or unsigneddriver installations, update installations, etc. Of course, we can also manually create a System Restore point.Remember that restore points do not protect user data files and that it works only on NTFS partitions. SystemRestore feature can take up to 15% of the available disk space, so we have to make sure that we have enoughspace on the disk. Newer snapshots will delete earlier records when disk space is low.The Backup and Restore Center also manages Shadow Copies (previous versions) of files. This way we canrestore earlier version of the file. It is turned on by default. Backups are saved on the same disk, so note that thisfeature doesnt protect from disk failure. We can restore the previous version of the file to a new location oroverwrite the existing file on the same location. This feature only works on NTFS partitions.Backup Status and ConfigurationTo open backup tools in Vista, we can go to Start > All Programs > Accessories > System Tools > BackupStatus and Configuration. This is where we can back up files, restore files or configure complete PC backupfeature.Backup StatusOn the first screen we see that the automatic file backup is not set up in our case. We will click on the "Set upautomatic file backup" option. On the next screen we can select where do we want to save our backup. Theoptions are hard disk, CD, DVD, or a network location. In our case we will enter the UNC path to the networklocation and click Next.
  • 172. Utilize Windows VistaManagement170www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Backup LocationIf we had multiple disks on our computer we would be able to select which disks do we want to back up. In ourcase we only have one disk, so we move on to the next screen where we have to select the file types that wewant to back up.What to Back UpNote that we cant actually choose specific files and folders, but using the Recovery Wizard we can select specificfiles to restore. System files, executables, temporary files, files encrypted using Encrypting File System (EFS),program files, recycle bin, files stored on FAT file systems and user profile settings will not be backed up. Wecannot back up files to the system or the boot partition. For the purpose of this demo, we will only selectDocuments.
  • 173. Utilize Windows VistaManagement171www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)How OftenOn the next screen we can select how often do we want to create a backup. We will do it weekly. The first backupwill be performed right away.Complete PC BackupThis feature creates a image-based backup including programs, system settings and files. In short, everything weneed to restore our system is backed up, so we can use it in case of hard dick crash or similar. We can create theComplete PC backup manually by clicking on the "Create a backup now" option.Complete BackupComplete PC Backup can only be stored on hard disk or on DVDs. In our case we have plugged in a hard disk sowe will select the hard disk option, and click Next.
  • 174. Utilize Windows VistaManagement172www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)LocationOn the next screen we have to confirm our backup settings. Here we can also see how much space the backupcould take.To restore from the Complete PC Backup, we can boot our computer from the Vista DVD and choose a CompletePC Restore option, or we can go to the Backup and Restore Center in Vista and select the "Restore computer"option.Backup and Restore CenterThe Backup and Restore Center can be found in Control Panel. Backup and Restore Center is a bit different fromBackup Status and Configuration.The Center
  • 175. Utilize Windows VistaManagement173www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)If we click on the "Back up files" button, we will get the same wizard as in Backup Status and Configuration. Thesame is with the "Back up computer" button.System RestoreThe different part is the left menu with tasks. Here we can choose to repair Windows using System Restore or tocreate a restore point. If we click on the "Create a restore point" option, a System Protection tab will open.System ProtectionHere we can create restore points manually or change restore settings. Restore points can be used to undounwanted system changes. By default restore points are only made on the system drive. If we need to restore oursystem files to an earlier point in time we can click on the System Restore button. A new window will pop up inwhich we will be able to choose the recommended restore, or some other restore point.
  • 176. Utilize Windows VistaManagement174www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Restore SystemIf we select "other restore point" option, we will get a list of available restore points.Restore PointsThis is great because if we installed some application which caused some problems, from here we can restoreour system to the date prior the installation of problematic application.Thanks to the System Restore technologies, we can also restore previous versions of files. If we go to theproperties of some file, we will see a Previous Versions tab.
  • 177. Utilize Windows VistaManagement175www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Previous VersionsIf the System Restore created a snapshot of the file, we will see a previous version of the file here.Working With Mobile Devices in VistaParent Category: VistaCategory: ManagementWindows Vista comes with bunch of options to effectively work with mobiledevices.Before you startObjectives: Learn what are specific settings that we can configure whenworking with mobile devices in Vista and where to configure them.Prerequisites: no prerequisites.Key terms: display, center, mobile, devices, mobility, sync, Vista, configure, optionsMobile DevicesMobile devices such as laptops, tablets, PDAs, smart phones, cell phones, all have some special configurationoptions which ordinary desktop computers dont require. Most mobile devices can be synchronized with a desktopPC. Vista has the sync center which we can use to synchronize data between the Vista machine and other PCs,servers, and mobile devices.Sync CenterThe Sync Center enables us to configure synchronization partnerships. Partnerships are a set of rules whichcontrol the synchronization. In general, we simply connect our device, configure the partnership and then choosewhat we want to sync. Mobile Device Center is another name for Active Sync feature. Sync Center is available inControl Panel.
  • 178. Utilize Windows VistaManagement176www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Sync CenterIn our case we currently dont have any partnerships configured, but this is where we would go to set syncpartnerships with other computers and mobile devices. Partnerships can be either one-way or two-way.Windows Mobility CenterVista also includes Windows Mobility Center which has all of our mobile settings in one place. There are eightareas in Mobility center that we can configure: display brightness, power plans, volume, wireless networking,external display, display orientation, synchronization status, and presentation settings. To open Mobility Centerwe can go to Control Panel > Mobile PC > Windows Mobility Center. Note that you wont have this option if youhave installed Vista on ordinary desktop computer.Mobility CenterMobile DisplayThere are two basic options when configuring mobile display settings. This depends on whether we are workingwith the external display or some kind of projector. With an external display we can go to the Windows MobilityCenter to connect to the display device. We can also go to Appearance and Personalization option in the ControlPanel to configure display settings. External display can be: mirrored - Desktop is duplicated on all display devices. extended - every display shows different parts of Desktop. By default, the source display has the Start Menu. only external display used - original display is turned off.Vista also has an option to connect to a network projector across the network.
  • 179. Utilize Windows VistaManagement177www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Presentation OptionsIn Mobility Center we can also work with presentation options. With this options we can make sure that thecomputer always stays turned on. We can also disable system notifications, screen saver, set the volume, choosethe background, and work with connected displays.User Account Management in VistaParent Category: VistaCategory: ManagementUser accounts in Windows are used for controlling the security on thecomputer and for saving user settings.Before you startObjectives: Learn how to manage users accounts and group membership inWindows Vista.Prerequisites: you should know what is user account in general.Key terms: account, users, group, select, option, administrators, members, disabled, passwordUser Account AppletOne way of managing users is to go to Control Panel and then choose "User Accounts and Family Safety" option.From here we can choose the "Add or remove user accounts" option. The following window will appear.
  • 180. Utilize Windows VistaManagement178www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Manage UsersNotice that the Guest account is here but it is disabled. Also, notice that we dont have a default Administratoraccount visible. We will see the reason for that shortly.To create a new account we can simply click on the "Create a new account" option. In our case, the name of ournew user will be Ana, and she will have administrative rights on the system.New UserTo change an account we can simply select it from the list of accounts. The following window will appear.Change User SettingsHere we can change the account name, change the picture, etc. Here we can also set the password for theaccount.
  • 181. Utilize Windows VistaManagement179www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Set PasswordSo, all this is just one way of managing user accounts on the Vista system. Another way is to use the ComputerManagement console.Computer Management ConsoleTo open Computer Management console we can go to the Start, right-click on Computer, and select the Manageoption. On the window that appears we select the Local Users and Groups option.Local Users and Groups Snap-inWhen we select Users, we will see all available users on the system.
  • 182. Utilize Windows VistaManagement180www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)UsersNotice that we can see the Administrator account here, but it has a little down-arrow on it. This means that theaccount is disabled. If we right-click the account, we can go to its properties.Administrator PropertiesOn the properties window we can see that the Administrator account is disabled. If the account is disabled, it cantbe used to log on to the system. To enable the account, we can simply uncheck the "Account is disabled" option.To set the password for the account we can right-click the account and select the "Set Password" option. We canalso reset the password this way if the user forgot the password.To manage groups we can select the Groups option from the menu on the left.
  • 183. Utilize Windows VistaManagement181www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)GroupsHere we have a list of the default groups on the system. Every group has its description so we can see what typeof access the members of the group have. To see the members of the group we can right-click it and go to itsproperties. Lets check the properties of the Administrators group.Administrators Group
  • 184. Utilize Windows VistaManagement182www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)In our case we have three members of the Administrators group. Notice that the default Administrator account isthe member of the Administrators group. Lets check the members of the Users group.Users GroupNotice that here we have users that are also members of the Administrators group. So, users can belong tomultiple groups. In fact, all users that we create will be members of the Users group.To add the user to the group we can click on the Add button from the properties window. The Select Userswindow will appear. Here we have to enter the name of the user and click the Check Names button. We will try toadd Kim user to the Administrators group.
  • 185. Utilize Windows VistaManagement183www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Find UsersIn our case we entered "Kim" and clicked on the Check Names button. If we are not sure of the user name, wecan click on the Advanced button and search for users on the system.We can also manage group membership for particular users. Lets go back to users, go to the properties of theKim user account, and then go to the Member Of tab.Member Of TabHere we can see that the Kim user is now member of the Administrators and Users groups. To add this user toanother group we can click on the Add button. The Select Groups window will appear, so now we have to enterthe name of the group and click on the Check Names.
  • 186. Utilize Windows VistaManagement184www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Select GroupsIn our case we entered the "Backup Operators" group and clicked on the Check Names button. Again, if we dontknow the exact group names, we can always click the Advanced button, and search the system for availableoptions.Power Options in VistaParent Category: VistaCategory: ManagementWith Power Options in Vista we can configure how our computer uses power.Before you startObjectives: Learn where and how can you configure Power Options in Vistain order to conserve your battery.Prerequisites: you should read about Power Management in Windows ingeneral.Key terms: power, options, plan, configure, vista, balanced, computer, advancedPower OptionsTo configure Power Options in Vista we will go to the Control Panel > Hardware and Sound > Power Options.
  • 187. Utilize Windows VistaManagement185www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Power PlansHere we can select a power plan. As you can see there are three predefined plans: Balanced, Power saver, andHigh performance. We can customize each plan as we like. Lets look at the balanced plan.Balanced Power PlanIn our case we see options in case our computer runs on battery and in case our computer is plugged in. If youdont have a battery, youll only see option for the plugged in state. If we click on the "Change advanced powersettings" option we will see many other options that we can configure.
  • 188. Utilize Windows VistaManagement186www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Advanced OptionsHere we can change the plan which we want to customize and then change particular setting. We can configurehow logn the computer will wait after a period of inaction before turning off the hard disk, we can modify the howour wireless adapter, USB devices, PCI devices, display devices, CPU, and other use power.On the left hand side of the Power Options window we have a "Choose what the power button does" option.If you are not on a laptop, you will probably only see the power button option.We can also create a custom power plan, but I dont think that you will be using that option very often :).
  • 189. Utilize Windows VistaFile System187www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)File SystemEncrypting File System Configuration in VistaParent Category: VistaCategory: File SystemIn this tutorial we will see how to work with file encryption in Windows Vista.Before you startObjectives: Learn how to use Encryption File System (EFS) in WindowsVista, and how to manage private keys used for EFS.Prerequisites: you have to know what is EFS in general.Key terms: file, access, user, button, efs, encrypted, folder, case, keys,window, list, accountEncrypting FilesIn this example we will first take a look at how to encrypt some file. We have some example text file in ourexample folder. To encrypt our "Example File", we will right-click it, and on the General tab we will click on the"Advanced" button. The "Advanced Attributes" windows will appear, and here we will check the "Encrypt contentsto secure data" option.EFS CheckedWhen we click OK button, and then OK again, we will get an Encryption Warning window. We will have to chooseif we want to encrypt the file and its parent folder, or if we want to encrypt the file only. If we choose the firstoption, everything inside the folder will be encrypted. In our case we will encrypt the file only.
  • 190. Utilize Windows VistaFile System188www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)EFS WarningNotice that the file which is encrypted is colored green. This tells us visually that the file is encrypted. We can stillopen that file because we have encrypted it (we have the private key).Green FileIf we right-click that file again, go to its properties, and click the Advanced button again, we can now click the"Details" button. When we do that, a "User Access" window will open. This window lists all users which haveaccess to that particular file. By default this list will contain only the user which encrypted the file.
  • 191. Utilize Windows VistaFile System189www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)User Access WindowNote that in this window we can click on the "Add" button to name additional users which will have access to ourencrypted file. We can only add individual users, meaning we cant add groups of users. The lower part of thiswindow lists all DRAs which have access to the file. Vista installation which is not a member of the domain doesnot have a DRA by default.Now lets try to access that encrypted file by using another account on our system. In our case we will use the"hrlec" account, which is a standard user account (doesnt have administrative rights). Our file is located in"C:Example FolderExample File.txt". Lets try and open that file with "hrlec" account.Access DeniedWe are able to access the folder in which the file is located, but we are not able to open the file. We get a "Accessis denied" message. EFS doesnt care about the NTFS permissions which are set on the folder and file, it onlycares about its own permissions. Now, lets create new file in this folder by using the "hrlec" account and encryptit. We will encrypt the file only. Now we have two files which are both green, so we dont actually know which userhas access to which file.
  • 192. Utilize Windows VistaFile System190www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Two FilesLets go to the properties of the "hrlec file", and add another user which will have access to that file. To do that wewill click the Details button in "Advanced Attributes" window, and then click on the "Add" button. In our case weonly have two accounts which can be added to the list. In order for users to appear in this list, users have toalready use EFS in some form. If they are not using EFS, they will not be in this list. To use EFS, user can simplyencrypt some file, and that will include him in the EFS. This will create their certificates.User CertificatesIn our case we will select the "ivancic" certificate and add it to the list. Remember that if we loose our EFS keys,we wont be able to access our files which are encrypted. To back-up keys we can click on the "Back up keys"button in the "User Access" window. We have to select the user from the list and then click the button. The wizardwill appear. In our case we are able to create a PFX file which contains the private key.hrlecKey FileWe should keep that file in a safe place. Only original user should have access to that file. When we click Next,we have to enter the password to maintain security. After the password, we simply specify the name of the filewhich will be exported. In our case this will be "hrlecKey", and we will save it in "C:Example Folder".
  • 193. Utilize Windows VistaFile System191www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)If we try to open that certificate, a Certificate Import Wizard will appear. This way we can recover our encryptedfiles in case if we have lost original keys. We can also manage our keys in Control Panel > User Accounts andFamily Safety > User Accounts.Manage Keys in Control PanelTo open the key management wizard we have to click the "Manage your file encryption certificates" option. Wecan use this wizard to select or create certificates, back up certificates and keys, etc.NTFS and Share Permissions Management in VistaParent Category: VistaCategory: File SystemAs computer administrators we have to know how to manage NTFS andShare permissions on our computer. This will help us to ensure privacy of ourdata.Before you startObjectives: Learn where and how to manage NTFS and Share permissionsin Windows Vista.Prerequisites: you have to know what are NTFS and Share permissions.Key terms: access, advanced, data, effective, permissions, folder, owner, NTFS, user, share, roleNTFS Permissions ManagementTo manage NTFS permissions we can simply use Windows Explorer. In our example, we have created a "Demo"folder on our Desktop. We will use it to check and manage NTFS and Share permissions. To check thepermissions we have to go to the properties of the folder or file. Once in Properties window, we will open theSecurity tab and this is where we work with NTFS permissions.
  • 194. Utilize Windows VistaFile System192www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Security TabBy default, all permissions are inherited from parent object (parent folder). This is why we will always see somedefault permissions on our folders and files, even if they are newly created. As we see in our case, certain usersand groups are already in the list. Also, notice that we cant change inherited permissions by default (they aregrayed out). The inheritance can be turned off, and in that case we will be able to change all permissions.To change current permissions we can click the Edit button. A new window will pop up, and here we we will beable to add new users or groups of users to the list, or change permissions for current users or groups.
  • 195. Utilize Windows VistaFile System193www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Edit PermissionsTo add new users or groups, we can click the Add button. New windows will pop up, and here we have to selectthe object which will be added to the list. In our case we will add the "Users" user group.Add Users
  • 196. Utilize Windows VistaFile System194www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Now that the Users group is in the list, we can change its permissions on the current folder (and subfolders ifinheritence is left turned on). In our case we will only allow the Read permission for the Users group.Users Group PermissionsTo turn inheritance on or off, we have to click the Advanced button which is located on the Security tab. Newwindow will pop up.
  • 197. Utilize Windows VistaFile System195www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Advanced PermissionsNotice that in this list we can see from which objects are our permissions inherited from. In our case our "Demo"folder which is located on the Desktop inherits permissions from the C:UsersAdmin object. To changeinheritance settings we can click the Edit button. New window will pop up. To turn off inheritance we have touncheck the "Include inheritable permissions from the objects parent" option. When we do that we will get thefollowing warning.Inheritance WarningWe have to select if we want to leave all existing entries (the Copy option), or remove them. If we leave existingentries we will be able to change them. If we remove them, we will be able to set brand new permissions. In ourcase will select the Remove option. When we do that, we will see that the only permissions that are left are thosethat we manually set previously (we have added the Users group to the list).
  • 198. Utilize Windows VistaFile System196www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Inheritance RemovedEven if we remove all users from this list, the owner of the object will always be able to access it and setpermissions on it. The owner of the object is the user who created it, but we can also change the owner. To dothat we can go to the Owner tab in the advanced Security settings.Owner Tab
  • 199. Utilize Windows VistaFile System197www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)To change the owner of the object we can click the Edit button. In our case the Admin is the owner of the "Demo"folder, and because of that it can still manage that folder (even though we have previously deleted that user fromthe list). The ownership of the file or folder is a very powerful feature, especially if we have administrative rights onthe computer. For example, if we have administrative rights we can take ownership of the file from some user andby editing the NTFS permissions forbid him to ever access that file again.When thinking about permissions always bare in mind that they are accumulative. That means that if we belong tomultiple user groups, permissions will add up. To see the effective permissions on some object we can always goto the Effective Permissions tab in the advanced options. In this window we first have to select the user or groupof users for which we want to see the effective permissions. In our case we have selected the Users group, so wecan see effective permissions below.Effective PermissionsEffective Permissions tab is great when we need to determine permissions for users which belong to multiplegroups. Another interesting feature is the Auditing tab. Here we can set events which will be tracked on thecurrent folder. Events will then be visible in the Event Viewer console.Sharing PermissionsWe share folders on our computer to allow users to access our data over the network. To get to the Share optionsand permissions, we can right-click certain folder and select the "Share" option, or we can go to the Properties ofthe folder and select the Sharing tab. First lets check the Sharing tab.
  • 200. Utilize Windows VistaFile System198www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Sharing TabNotice that our "Demo" folder is not shared currently. Lets click the Advanced Sharing button. New window willpop up.
  • 201. Utilize Windows VistaFile System199www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Share NameIn this window we can select to share this folder and enter the share name. Notice that the share name doesnthave to be the same as the folder name. To set Share permissions we can click the Permissions button. Newwindow will pop up.
  • 202. Utilize Windows VistaFile System200www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Share PermissionsThe default permission for Shares is the Everyone group with Read permission. This means that everyone will beable to read the content from our shared folder, so we should be careful when dealing with the Everyone group.We may or we may not want that group in the list. As with NTFS permissions, here we can add additional users orgroups of users to this list.When thinking about effective permissions on shared folders, we have to keep in mind that both NTFS and Sharepermissions are applied to shared folders. So, the cumulative NTFS permissions and cumulative Sharepermissions are combined, and then the more restrictive permission is applied. For example, if we have FullControl NTFS permission, but we have Read Share permission, the effective permission will be Read (when weaccess the folder over the network). Also, if we have the Full Control Share permission, and we have the ReadNTFS permission, the effective permission will be Read. So, as you can see when combining NTFS and Sharepermission, the effective permission will be the more restrictive one. Remember that the NTFS and Sharepermissions are only combined when we access folder over the network. If we access folder locally, only NTFSpermissions are applied.To check for some general sharing settings we can go to the Network and Sharing Center in the Control Panel.
  • 203. Utilize Windows VistaFile System201www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Sharing CenterNotice that the File Sharing setting is currently turned on. This happens automatically when we share some folderon our computer. Even if we turn off this option in the Network and Sharing Center, shared folders that wepreviously configured manually will still be available over the network. So, we should be careful when looking thisoption in the Network and Sharing Center. In fact, if we want to turn sharing off, we should do that manually onevery single shared folder.Now, lets also check the new sharing procedure intended for end users. Lets right click our Demo folder andselect the Share option. Our folder is already shared, so we will get the following window.Sharing for End Users 1Here we will choose to change sharing permissions. On the next screen we can set additional options.
  • 204. Utilize Windows VistaFile System202www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Sharing for End Users 2Note that we dont see the standard sharing options and permissions. Here we can also add or remove users andgroups, and we can give them specific permission levels or roles. The roles are Reader, Contributor and Co-owner. Reader role has read access, Contributor role has read and change permissions, and Co-owner has fullcontrol. This new interface is intended to make sharing easier for end users.In Network and Sharing Center we also have an option for Public folder sharing. The public folder is a singlefolder on the computer which can be used by all users to share their files. Local users will always have access tothe public folder, but for network users we have to enable this option.Public Folder Network SharingWe have an option to allow users to only read files, or to allow them to also change and create files. Public folderis located in C:UsersPublic. Public folder is also here to make it easier for end users to share their files with allusers.Computer administrators should be familiar with the Administrative Tools MMC console where all the sharedfolders can be listed. To open Computer Management we can go to Control Panel, or we can run it from theSearch menu by entering the compmgmt.msc. Once in Computer Management we can go to the Shared Foldersto see the list of all shared folders on our computer.
  • 205. Utilize Windows VistaFile System203www.utilizewindows.comFree Windows TutorialsLicence: Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported (CC BY-NC-SA 3.0)Folder Sharing ConsoleNotice that we can see our "Demo Share" folder, and we can also see some other shares which end in "$". Thoseshares are automatically created and users with administrative rights can always use those shares to access dataon computer over the network.