by MS
Figure 12-9: Resolve the problem by making a selection or performing a required action.
Chapter 13: Managing Mobile Networking and Remote Access
Figure 13-1: Use a dial-up connection to access an office network through a modem pool.
Figure 13-2: Use broadband and VPN to access an office network.
Figure 13-3: The first time you use Phone And Modem Options, you must configure the initial location.
Figure 13-4: Check dialing rules to ensure they are configured properly.
Figure 13-5: Configure manual or automatic connections by using the Connections tab.
Figure 13-6: Proxy settings can be automatically configured through detection or scripts.
Figure 13-7: You can use the same proxy for all services, or you can configure multiple proxies.
Figure 13-8: Manage wireless network connections using Network And Sharing Center.
Figure 13-9: Determine the status and signal strength of a wireless network connection.
Figure 13-10: Enter the information for connecting to the wireless network.
Figure 13-11: Manage wireless network connections.
Chapter 14: Managing Advanced Internet Options and Security
Figure 14-1: Use the Important URLs dialog box to set custom URLs for a home page, search bar page, and online support page.
Figure 14-2: Use the Favorites And Links dialog box to configure quick access links to important online resources.
Figure 14-3: Use the Browser Title dialog box to add custom titles to Internet Explorer.
Figure 14-4: Once you create custom logos for Internet Explorer, you can use the Custom Logo dialog box to configure them to be used through Group Policy.
Figure 14-5: Use the Browser Toolbar Button Information dialog box to add custom buttons to the toolbar.
Figure 14-6: In the Internet Properties dialog box, specify the default programs to use.
Figure 14-7: If your organization has proxy servers, you can configure Internet Explorer proxy settings using the Proxy Settings policy.
Figure 14-8: ActiveX controls and other browser add-ons can be enabled, disabled, or updated using the Manage Add-Ons dialog box.
Figure 14-9: Use the Pop-Up Blocker Settings dialog box to configure the way pop-ups are blocked.
Figure 14-10: If automatic detection doesn't work, optimize the Local Intranet settings for your environment by including or excluding various options.
Chapter 15: Optimizing Windows Vista
Figure 15-1: Check Disk is available by clicking Check Now in the Properties dialog box. Use it to check a disk for errors and repair them.
Figure 15-2: Disk Defragmenter analyzes and defragments disks efficiently. The more frequently data is updated on drives, the more often you should run this tool.
Figure 15-3: Set the desired run schedule for automated defragmentation.
Figure 15-4: Windows Security Center provides a quick overview of the status of essential areas of security.
Figure 15-5: Use the General tab to completely enable or disable Windows Firewall.
Figure 15-6: Use the Exceptions tab to allow some types of remote connections.
Figure 15-7: Use Windows Firewall With Advanced Security to configure advanced firewall settings.
Figure 15-8: Manage the settings for each profile separately.
Figure 15-9: Specify the type of connection security rule to create.
Figure 15-10: Use Windows Defender to protect a computer from spyware.
Chapter 16: Supporting and Troubleshooting Windows Vista
Figure 16-1: Manage Remote Assistance sessions.
Figure 16-2: Event Viewer displays events for the selected log.
Figure 16-3: View and manage scheduled tasks.
List of Tables
Chapter 1: Introduction to Windows Vista Administration
Table 1-1: Upgrade Paths for Windows Vista Editions
Chapter 3: Configuring Systems, Hardware Devices, and Drivers
Table 3-1: Support Services in Windows Vista
Table 3-2: Common Device Errors and Techniques to Resolve Them
Table 3-3: Global Configuration Settings for Windows Time Services
Chapter 4: Customizing the Desktop and the Interface
Table 4-1: Classic Start Menu Options
Chapter 8: Configuring User and Computer Policies
Table 8-1: Disk Quota Policies
Table 8-2: Offline File Policies
Table 8-3: Network Policies
Table 8-4: Computer and User Script Policies
Table 8-5: Logon and Startup Policies
Chapter 9: Managing Disk Drives and File Systems
Table 9-1: Understanding and Resolving Disk Status Issues
Table 9-2: Understanding and Resolving Volume Status Issues
Chapter 10: Managing File Security and Resource Sharing
Table 10-1: Basic File and Folder Permissions
Table 10-2: Special Identities Used When Setting Permissions
Table 10-3: Special Permissions for Files and Folders
Table 10-4: Special and Administrative Shares
Table 10-5: Default Permissions for Publicly Shared Folders and Files
Chapter 11: Configuring Advanced Windows Explorer Options, Offline Files, and Disk Quotas
Table 11-1: Policies for Windows Explorer
Chapter 12: Configuring and Troubleshooting TCP/IP Networking
Table 12-1: Key TCP/IP Enhancements in the Next Generation TCP/IP Stack
Table 12-2: Key TCP/IP Enhancements for IPv6
Table 12-3: Private IPv4 Network Addressing
Chapter 13: Managing Mobile Networking and Remote Access
Table 13-1: Connection Protocol Availability by Connection Type
Table 13-2: Default Component Configuration by Connection Type
Table 13-3: Wireless Networking Technologies
Chapter 14: Managing Advanced Internet Options and Security
Table 14-1: Understanding Secure Browsing and Lockdown
Table 14-2: Additional Policies for Managing Internet Explorer
Chapter 15: Optimizing Windows Vista
Table 15-1: Policies for Managing Automatic Updating
List of Listings
Chapter 1: Introduction to Windows Vista Administration
Listing 1-1: BCD store entries displayed using BCDEdit
Chapter 9: Managing Disk Drives and File Systems
Listing 9-1: Using DiskPart to Set the Active Partition