Microsoft Press Windows Vista Administrator's Pocket Consultant ebook

Home > Other > Microsoft Press Windows Vista Administrator's Pocket Consultant ebook > Page 64
Microsoft Press Windows Vista Administrator's Pocket Consultant ebook Page 64

by MS

Figure 12-9: Resolve the problem by making a selection or performing a required action.

  Chapter 13: Managing Mobile Networking and Remote Access

  Figure 13-1: Use a dial-up connection to access an office network through a modem pool.

  Figure 13-2: Use broadband and VPN to access an office network.

  Figure 13-3: The first time you use Phone And Modem Options, you must configure the initial location.

  Figure 13-4: Check dialing rules to ensure they are configured properly.

  Figure 13-5: Configure manual or automatic connections by using the Connections tab.

  Figure 13-6: Proxy settings can be automatically configured through detection or scripts.

  Figure 13-7: You can use the same proxy for all services, or you can configure multiple proxies.

  Figure 13-8: Manage wireless network connections using Network And Sharing Center.

  Figure 13-9: Determine the status and signal strength of a wireless network connection.

  Figure 13-10: Enter the information for connecting to the wireless network.

  Figure 13-11: Manage wireless network connections.

  Chapter 14: Managing Advanced Internet Options and Security

  Figure 14-1: Use the Important URLs dialog box to set custom URLs for a home page, search bar page, and online support page.

  Figure 14-2: Use the Favorites And Links dialog box to configure quick access links to important online resources.

  Figure 14-3: Use the Browser Title dialog box to add custom titles to Internet Explorer.

  Figure 14-4: Once you create custom logos for Internet Explorer, you can use the Custom Logo dialog box to configure them to be used through Group Policy.

  Figure 14-5: Use the Browser Toolbar Button Information dialog box to add custom buttons to the toolbar.

  Figure 14-6: In the Internet Properties dialog box, specify the default programs to use.

  Figure 14-7: If your organization has proxy servers, you can configure Internet Explorer proxy settings using the Proxy Settings policy.

  Figure 14-8: ActiveX controls and other browser add-ons can be enabled, disabled, or updated using the Manage Add-Ons dialog box.

  Figure 14-9: Use the Pop-Up Blocker Settings dialog box to configure the way pop-ups are blocked.

  Figure 14-10: If automatic detection doesn't work, optimize the Local Intranet settings for your environment by including or excluding various options.

  Chapter 15: Optimizing Windows Vista

  Figure 15-1: Check Disk is available by clicking Check Now in the Properties dialog box. Use it to check a disk for errors and repair them.

  Figure 15-2: Disk Defragmenter analyzes and defragments disks efficiently. The more frequently data is updated on drives, the more often you should run this tool.

  Figure 15-3: Set the desired run schedule for automated defragmentation.

  Figure 15-4: Windows Security Center provides a quick overview of the status of essential areas of security.

  Figure 15-5: Use the General tab to completely enable or disable Windows Firewall.

  Figure 15-6: Use the Exceptions tab to allow some types of remote connections.

  Figure 15-7: Use Windows Firewall With Advanced Security to configure advanced firewall settings.

  Figure 15-8: Manage the settings for each profile separately.

  Figure 15-9: Specify the type of connection security rule to create.

  Figure 15-10: Use Windows Defender to protect a computer from spyware.

  Chapter 16: Supporting and Troubleshooting Windows Vista

  Figure 16-1: Manage Remote Assistance sessions.

  Figure 16-2: Event Viewer displays events for the selected log.

  Figure 16-3: View and manage scheduled tasks.

  List of Tables

  Chapter 1: Introduction to Windows Vista Administration

  Table 1-1: Upgrade Paths for Windows Vista Editions

  Chapter 3: Configuring Systems, Hardware Devices, and Drivers

  Table 3-1: Support Services in Windows Vista

  Table 3-2: Common Device Errors and Techniques to Resolve Them

  Table 3-3: Global Configuration Settings for Windows Time Services

  Chapter 4: Customizing the Desktop and the Interface

  Table 4-1: Classic Start Menu Options

  Chapter 8: Configuring User and Computer Policies

  Table 8-1: Disk Quota Policies

  Table 8-2: Offline File Policies

  Table 8-3: Network Policies

  Table 8-4: Computer and User Script Policies

  Table 8-5: Logon and Startup Policies

  Chapter 9: Managing Disk Drives and File Systems

  Table 9-1: Understanding and Resolving Disk Status Issues

  Table 9-2: Understanding and Resolving Volume Status Issues

  Chapter 10: Managing File Security and Resource Sharing

  Table 10-1: Basic File and Folder Permissions

  Table 10-2: Special Identities Used When Setting Permissions

  Table 10-3: Special Permissions for Files and Folders

  Table 10-4: Special and Administrative Shares

  Table 10-5: Default Permissions for Publicly Shared Folders and Files

  Chapter 11: Configuring Advanced Windows Explorer Options, Offline Files, and Disk Quotas

  Table 11-1: Policies for Windows Explorer

  Chapter 12: Configuring and Troubleshooting TCP/IP Networking

  Table 12-1: Key TCP/IP Enhancements in the Next Generation TCP/IP Stack

  Table 12-2: Key TCP/IP Enhancements for IPv6

  Table 12-3: Private IPv4 Network Addressing

  Chapter 13: Managing Mobile Networking and Remote Access

  Table 13-1: Connection Protocol Availability by Connection Type

  Table 13-2: Default Component Configuration by Connection Type

  Table 13-3: Wireless Networking Technologies

  Chapter 14: Managing Advanced Internet Options and Security

  Table 14-1: Understanding Secure Browsing and Lockdown

  Table 14-2: Additional Policies for Managing Internet Explorer

  Chapter 15: Optimizing Windows Vista

  Table 15-1: Policies for Managing Automatic Updating

  List of Listings

  Chapter 1: Introduction to Windows Vista Administration

  Listing 1-1: BCD store entries displayed using BCDEdit

  Chapter 9: Managing Disk Drives and File Systems

  Listing 9-1: Using DiskPart to Set the Active Partition

 

 

 


‹ Prev