1 / 61

Chapter 16

Chapter 16. Managing and Supporting Windows XP. You Will Learn…. How to use Windows XP features to secure the PC and protect users and their data About the Windows NT/2000/XP registry About tools for troubleshooting and maintaining Windows XP How to troubleshoot the Windows XP boot process.

tudor
Télécharger la présentation

Chapter 16

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 16 Managing and SupportingWindows XP

  2. You Will Learn… • How to use Windows XP features to secure the PC and protect users and their data • About the Windows NT/2000/XP registry • About tools for troubleshooting and maintaining Windows XP • How to troubleshoot the Windows XP boot process

  3. Security Using Windows NT/2000/XP • Two goals • Secure system resources, including hardware and software, from improper use • Secure users’ data from improper access • Concept of user accounts is key to understanding Windows XP

  4. User Accounts • Define users to Windows • Record information about users (eg, user name, password used to access the account, groups the account belongs to, and rights and permissions assigned to the account) • Three types • Global user accounts • Local user accounts • Built-in user accounts

  5. User Profiles • Created by the system after administrator creates a local user account and user logs on for first time • Types • Roaming user profile • Mandatory user profile • Group profile

  6. Viewing Profiles

  7. Administering Local User Accounts • Password guidelines for users and administrators • Usernames can consist of up to 15 characters • Passwords can be up to 127 characters • Do not use a password that is easy to guess • Use combination of letters, numbers, and non-alphanumeric characters for greatest security • Always set a password for the Administrator account • Passwords can be controlled by administrator, but generally users should be allowed to change their own • Each user should create a forgotten password floppy disk

  8. Creating a User Account

  9. Options for Controlling How a User Logs On • Use the Welcome screen (default) • Press Ctrl+Alt+Del to get to a logon window similar to Windows NT/2000 • Use Fast User Switching

  10. Controlling How a User Logs On

  11. User Groups • Efficient way for administrator to manage multiple user accounts that require same privileges and similar profiles • Choices • Administrators • Backup Operators • Power Users • Limited Users • Guests

  12. Creating a New User Group

  13. ChangingGroup Profile Settings

  14. Group Policy • Another way to control how the system can be used • Normally intended to be used on a domain, but can also be used on a standalone or computer in a workgroup • Can be applied to the computer or can be applied to each user who logs on • MMC snap-in that can be accessed by typing gpedit.msc in the Run dialog box

  15. Disk Quotas • Limit how much disk space a user can access • Does not specify location of files, just total space allowed • Can be set only if you are using NTFS

  16. Setting Disk Quotas

  17. Setting Disk Quotas

  18. EFS (Encrypted File System) • Process of putting readable data into code that must be translated before it can be accessed (usually done using a key) • Protects encrypted data even when someone who is not authorized to view files or folders has full access to computer’s data storage • Applies only to Windows 2000/XP NTFS file system

  19. How to Use Encryption • Can be implemented at either the folder or file level • Folder level is encouraged and considered a “best practice” strategy

  20. Encrypting Folder Contents

  21. Encrypting Folder Contents

  22. The Cipher Command • For use when encrypting a large number of files or folders from a command prompt or using a batch file • CIPHER [/E, /D] [/S:dir] [pathname[…]] • /E encrypts specified files or folders • /D decrypts specified files or folders • /S:dir applies the action to the specified folder (directory) and all its subfolders • Pathname is the name of the file/folder and its path that is to be encrypted/decrypted

  23. Internet Connection Firewall (ICF) • Designed to protect a PC from unauthorized access from the Internet when the PC is connected directly to the Internet • Examines every communication that comes to the PC to determine if it: • Has been initiated by the PC (permitted) • Is being initiated by an outside device/computer (refused)

  24. Enabling IFC

  25. The Windows NT/2000/XP Registry • Hierarchical database containing information about all hardware, software, device drivers, network protocols, and user configuration needed by the OS and applications • Provides a secure and stable location for the information

  26. How the Registry Is Organized • Logical organization • Upside-down tree structure of keys, subkeys, and values • Physical organization • Stored in five files called hives

  27. Logical Organizationof the Registry

  28. Windows Registry Editor

  29. The Five Subtrees of the Registry

  30. Physical Organizationof the Registry

  31. Editing the Registry • Modified automatically when you make a change (eg, in Control Panel or Device Manager) • Rare occasions when you might need to edit manually • Changes take effect immediately and are permanent • Registry editors • Regedt.32exe (Windows NT/2000) shows each key in a separate window • Regedit.exe (Windows NT/2000/XP) shows all keys in the same window

  32. Editing a Registry Subkey Value

  33. Other Maintenance and Troubleshooting Tools • Executed from a command line (.exe file extension); some can be executed from the Run dialog box • Microsoft Management Console snap-ins (.msc file extension) • Executed from the Run dialog box or can sometimes be accessed using Windows menus • Built-in graphical tools (eg, Device Manager)

  34. Windows XP Maintenance and Troubleshooting Tools continued…

  35. Windows XP Maintenance and Troubleshooting Tools continued…

  36. Windows XP Maintenance and Troubleshooting Tools continued…

  37. Windows XP Maintenance and Troubleshooting Tools continued…

  38. Windows XP Maintenance and Troubleshooting Tools continued…

  39. Windows XP Maintenance and Troubleshooting Tools continued…

  40. Windows XP Maintenance and Troubleshooting Tools continued…

  41. Windows XP Maintenance and Troubleshooting Tools continued…

  42. Windows XP Maintenance and Troubleshooting Tools continued…

  43. Windows XP Maintenance and Troubleshooting Tools

  44. System Information Window

  45. Help on the Web • Windows Update feature • Automated process • Windows XP newsgroups • Post a question in a forum or read questions and answers posted by other users

  46. Windows Update

  47. Windows Update

  48. Troubleshooting theBoot Process (Hierarchical List) • Last Known Good Configuration (and sometimes Driver Rollback) • Safe mode from Advanced Options menu • System Restore (new) • Does not affect user data on hard drive • Recovery Console • Automated System Recovery (new) • Affects user data on hard drive • Reinstall Windows XP using Windows XP CD

  49. Advanced Options Menu

More Related