Docstoc

Microsoft Certified Professional Manual

Document Sample
Microsoft Certified Professional Manual Powered By Docstoc
					                  Philippine International School in Buraydah
                   Information Technology Learning Center
                       Al Qassim, Kingdom of Saudi Arabia

                          Windows XP Professional




Microsoft Certified
Professional
(Windows XP Professional)



Engr. Michael E. Agustin, Coe, MCP, CCENT, CCNA
IT Engineer / IT Instructor
PISB-ITLC




                                       1
                               Philippine International School in Buraydah
                                Information Technology Learning Center
                                    Al Qassim, Kingdom of Saudi Arabia

                                        Windows XP Professional


Introduction to Windows XP Professional Administration
      Microsoft Windows XP Professional is designed primarily for workstations and network clients.
      It has many security and maintenance enhancements that fundamentally change the way the
       operating system works in domains and workgroups.


Security and Maintenance Changes
       The security and maintenance changes cover four broad areas of the operating system.
1. Networking – changes to networking features are designed to lock down systems, making them
more secure and less vulnerable to network-based attacks.
2. Internet options – changes to internet options affect the way Windows XP works with Internet
browsing and e-mail messaging.
3. Memory management – changes to memory management affect the core code of the operating
system and are mostly behind the scenes.
4. Computer maintenance – changes for computer maintenance affect the way key features of the
operating system work.


Key features that directly support usability, manageability, and availability are as follows:
     Support services
     Automated help
     Error reporting
     Automatic updates


Installing Windows XP Professional

System Requirements:


• 300MHz or higher processor clock speed recommended; 233 MHz minimum required
• 128MB of RAM or higher recommended,64 MB minimum supported
• 1.5GB of hard disk space
• SVGA (800 x 600) or higher-resolution video adapter and monitor
• CD-ROM/DVD drive
• Keyboard and Mouse




                                                     2
                              Philippine International School in Buraydah
                               Information Technology Learning Center
                                   Al Qassim, Kingdom of Saudi Arabia

                                       Windows XP Professional


Unattended Installation


      An Unattended Installation is a hands-free method of installing Windows XP. This is
       convenient for system administrators, original equipment manufacturers (OEMs), value-added
       resellers (VARs), users who install Windows XP on many computers or who frequently install
       Windows XP on the same computer.
      The answer file fills in the text portion of the setup and can even setup options that you would
       normally spend most of your day doing after a ―typical‖ or normal Windows install.


Requirements:
      At least one computer - One that has a Windows XP Operating System already in place.
      You’re Windows XP CD - To retrieve the tools you are going to need.
      One formatted floppy disk - This is where we will put the finished answer file.




                                                   3
                              Philippine International School in Buraydah
                               Information Technology Learning Center
                                   Al Qassim, Kingdom of Saudi Arabia

                                       Windows XP Professional


Managing User Access


Understanding User and Group Accounts
      Windows XP provides user accounts and group accounts (of which users can be members).
      User accounts are designed for individuals
      Group accounts, usually referred as groups, are designed to simplify the administration of
       multiple users.
      You can log on to user accounts, but you can’t log on to a group account


Local User Account Essentials
Two types of user accounts are defined in Windows XP:
   1. Local user accounts
             User accounts defined on a local computer are called local user accounts. These
              accounts have access to the local computer only, and they must authenticate
              themselves before they can access network resources.
             You create local user accounts with Administrative Tools, Computer Management,
              System Tools, Local Users and Groups utility.
             Example: MICROSOFT\wrstanek
   2. Domain user accounts
             User accounts defined in the Active Directory service are called domain user accounts.
              Through Single Sign-On, these accounts can access resources throughout a domain.
             Example: WRSTANEK@technology.microsoft.com


SIDs(Security Identifiers)
      These are unique key identifiers for and when accounts are created.
      It allows you to easily change user names and delete accounts without worrying that someone
       might gain access to resources simply by recreating an account.


Built-in Accounts in Windows XP
   1. Administrator
             Administrator is a predefined account that provides complete access to files,
              directories, services, and other facilities.
             You can’t delete or disable this account.




                                                     4
                             Philippine International School in Buraydah
                              Information Technology Learning Center
                                  Al Qassim, Kingdom of Saudi Arabia

                                      Windows XP Professional


   2. Guest
             Guest is designed for users who need one-time or occasional access.
             The risk is so great that the account is initially disabled when you install Windows XP.
   3. HelpAssistant
             Windows XP interactive support is built on an application framework that allows users
              to initiate Remote Assistance sessions.
   4. Support
             The Support account is used by the built-in Help And Support service.


Group Account Essentials
Windows XP uses the following three types of groups:
   1. Local groups
             Defined on a local computer and used on the local computer only.
             You create local groups with the Local Users and Groups utility.
   2. Security groups
             Can have security descriptors associated with them. You use a Windows server to
              define security groups in domains, using Active Directory Users and Computers.
   3. Distribution groups
             Used as e-mail distribution lists. They can’t have security descriptors associated with
              them.


Built-in Group Accounts in Windows XP
   1. Administrators
             Members of this group are local administrators and have complete access to the
              workstation. They can create accounts, modify group membership, install printers,
              manage shared resources, and more.
   2. Backup Operators
             Members of this group can back up and restore files and directories on the workstation.
   3. Guests
             Guests are users with very limited privileges. Members of this group can access the
              system and its resources remotely, but they can’t perform most other tasks.
   4. Network Configuration Operators
             Members of this group can manage network settings on the workstation. They can also
              configure Transmission Control Protocol/Internet Protocol (TCP/IP) settings and
              perform other general network configuration tasks.
                                                  5
                         Philippine International School in Buraydah
                          Information Technology Learning Center
                              Al Qassim, Kingdom of Saudi Arabia

                                  Windows XP Professional


5. Power Users
          Members of this group have all the privileges of the Users group, as well as a few
           additional privileges, such as the capability to modify computer settings and install
           programs.
6. Remote Desktop Users
          Members of this group can log on to the workstation remotely using Terminal Services
           and Remote Desktop.
7. Replicator
          Members of this group can manage the replication of files for the local machine.
8. Users
          Users are people who do most of their work on a single Windows XP workstation.
           Because of this, members of the Users group have more restrictions than privileges.




                                              6
                              Philippine International School in Buraydah
                               Information Technology Learning Center
                                   Al Qassim, Kingdom of Saudi Arabia

                                       Windows XP Professional


Configuring User and Computer Policies


Group policies
      Simplify administration by giving administrators central control over privileges, permissions,
       and capabilities of both users and computers.
      Group policies can be applied to multiple domains, to individual domains, to subgroups within
       a domain, or to individual systems.
      On the run dialog box type GPEDIT.MSC to access the Group Policy


Using the Group Policy Console
       The Group Policy console has two main nodes:
              Computer Configuration – allows you to set policies that should be applied to
               computers, regardless of who logs on
              User Configuration – allows you to set policies that should be applied to users,
               regardless of which computer they log on to
       Subnodes of the two main nodes:
              Software settings – sets policies for software settings and software installation. When
               you install software, subnodes may be added to Software Settings
              Windows settings – sets policies for folder redirection, scripts, and security
              Administrative Templates – sets policies for the operating system, Windows
               components, and programs.


Configuring Policies
       Any changes you make to policies available through the administrative templates are saved in
the registry. Computer configurations are saved in HKEY_LOCAL_MACHINE and user configurations
are saved in HKEY_CURRENT_USER. Policies are one of three states:
      Not configured – the policy isn’t used, and no settings for it are saved in the registry.
      Enabled – The policy is actively being enforced, and its settings are saved in the registry.
      Disabled – The policy is turned off and isn’t enforced unless overridden. This setting is saved
       in the registry.




                                                    7
                              Philippine International School in Buraydah
                               Information Technology Learning Center
                                   Al Qassim, Kingdom of Saudi Arabia

                                       Windows XP Professional


Windows Registry


      It is a directory which stores settings and options for the operating system for Microsoft
       Windows.
      It contains information and settings for all the hardware, operating system software, most non-
       operating system software, users and preferences of the PC.
      Whenever a user makes changes to Control Panel settings, file associations, system policies,
       or most installed software, the changes are reflected and stored in the registry.
      On the run dialog box type: REGEDIT to access the registry editor

Keys and values

The registry contains two basic elements: keys and values.


      Registry Keys - are similar to folders - in addition to values, each key can contain subkeys,
       which may contain further subkeys, and so on.
      Registry Values - are name/data pairs stored within keys. Values are referenced separately
       from keys.

Registry Keys

HKEY_CLASSES_ROOT (HKCR)


      Stores information about registered applications, such as file associations and OLE Object
       Class IDs tying them to the applications used to handle these items.

HKEY_CURRENT_USER (HKCU)


      Stores settings that are specific to the currently logged-in user.

HKEY_LOCAL_MACHINE (HKLM)


      Stores settings that are general to all users on the computer.

HKEY_USERS (HKU)


      Contains subkeys corresponding to the HKEY_CURRENT_USER keys for each user profile
       actively loaded on the machine.

                                                    8
                            Philippine International School in Buraydah
                             Information Technology Learning Center
                                 Al Qassim, Kingdom of Saudi Arabia

                                     Windows XP Professional


HKEY_CURRENT_CONFIG (HKCC)


     Contains information gathered at runtime; information stored in this key is not permanently
      stored on disk, but rather regenerated at the boot time.




                                                  9
                              Philippine International School in Buraydah
                               Information Technology Learning Center
                                   Al Qassim, Kingdom of Saudi Arabia

                                       Windows XP Professional


Managing Disk Drives and File Systems


Basic Disks
      Is a physical disk that has one or more basic volumes that can be configured as primary
       partitions, extended partitions, and logical drives.
      A primary partition is a drive section that you can access directly for file storage.


Dynamic Disks
      Is a physical disk that has one or more dynamic volumes that can be configured as simple,
       spanned, or striped volumes.
      Unlike a basic disk, a dynamic disk can have an unlimited number of volumes-any one of
       which can be extended or used as a system volume.
      A key advantage of dynamic disks is the capability to combine physical disks using the
       spanning or striping feature of Windows XP.


   Simple volume – a volume that uses free space on a single dynamic disk. If you later need more
   space, you can extend the volume by adding free space on the same disk or another disk.


   Spanned volume – a volume that uses free space on multiple dynamic disks. If you have
   unallocated space on two or more dynamic disks, you can combine this space to create a
   spanned volume. Files are written first to one disk and then the next as space is used.


   Striped volume – a volume that uses free space on multiple disks and stripes the data as it is
   written. Striping gives you faster read/write access to data because data is read from and written
   to multiple disks.


Configuring Disk Quotas


Disk Quota
      Allow you to manage disk space usage, and they are configured on a per volume basis.
      Only NTFS volumes can have quotas.




                                                    10
                             Philippine International School in Buraydah
                              Information Technology Learning Center
                                  Al Qassim, Kingdom of Saudi Arabia

                                      Windows XP Professional


Microsoft Management Console

      MMC is a common presentation service for management applications.

      MMC provides a common host environment for snap-ins, provided by Microsoft and third party
       software vendors. Snap-ins provide the actual management behavior. The MMC environment
       provides for seamless integration between snap-ins.

      Administrators and other users can create custom management tools from snap-ins.

      The MMC project's goal is to support simplified administration through integration, delegation,
       task orientation, and overall interface simplification—all key customer requirements.

      To open the Microsoft Management Console, on the run dialog box type: MMC




                                                  11
                             Philippine International School in Buraydah
                              Information Technology Learning Center
                                  Al Qassim, Kingdom of Saudi Arabia

                                      Windows XP Professional


Managing Advanced Internet Options


Customizing URLs
      Internet Explorer is configured with many default Uniform Resource Locators(URLs), which
       are used for everything from the default home page to favorite lists.
      Custom home page, search, and support URLs provide users with quick access to important
       resources that can make their lives a bit easier. To configure these options: access Group
       policy for the system you want to work with. Next, access User Configuration\Windows
       Settings\Internet Explorer Maintenance


Managing Browser Cookies and Other Temporary Internet Files
      Browser cookies are used to store information on client computers so that it can be retrieved
       in other pages or in other browser sessions.
      Internet Explorer browsers save cookies in a domain-specific text file which is stored in the
       %UserProfile%\Cookies folder.


Managing Internet Explorer Security Zones
      You can use security zones to restrict or permit access to specific types of Web content
       including ActiveX controls and plug-ins, file and font downloads, Java applets, and scripts.




                                                  12
                              Philippine International School in Buraydah
                               Information Technology Learning Center
                                   Al Qassim, Kingdom of Saudi Arabia

                                           Windows XP Professional


Offline Files
      Using offline files, users can store network files on their computer so that they are available
       when the users are not connected to the network.
      When working offline, users can work with network files in the same way that they do when
       they are connected to the network.
      Users know they are working offline when they see a red X over Network Drives or in the
       notification area of the taskbar.
      When users reconnect to the network, their changes are automatically updated on the
       network.




                                                     13
                               Philippine International School in Buraydah
                                Information Technology Learning Center
                                    Al Qassim, Kingdom of Saudi Arabia

                                       Windows XP Professional


Optimizing Windows XP Professional
      To improve system performance, you can optimize settings and remove unnecessary
       applications and services.
      To optimize drives and improve their performance, you can clean up temporary files, check for
       disk errors, and defragment disks.
      To enhance security, you can encrypt disk contents, use the Security Center, and configure
       the Windows Firewall.
      To improve the user’s experience, you can resolve problems with applications, services, and
       processes using the event logs.
      To make it easier to maintain systems, you can schedule routine maintenance tasks to run
       automatically.


Checking for Disk Errors
      Check Disk examines disks and can correct many types of common errors on FAT16, FAT32,
       and NTFS drives


Defragmenting Disks
      Whenever you add files to or remove files from a drive, the data on the drive can become
       fragmented.
      To reduce fragmentation, you should periodically analyze and defragment disks using Disk
       Defragmenter.


Compressing Drives and Data
      With compression, all files and directories stored on a drive are automatically compressed
       when created.


Encrypting Drives and Data
      Encryption allows users to store data in encrypted format, which is more secure than standard
       file access permissions.
      The process that handles encryption and decryption is called the Encrypting File System
       (EFS).


Using Security Center
      The central location for checking the most important aspects of system security.
      The following are the key areas of security tracked by Security Center:
                                                   14
                              Philippine International School in Buraydah
                               Information Technology Learning Center
                                   Al Qassim, Kingdom of Saudi Arabia

                                       Windows XP Professional




       Windows Firewall – helps protect the computer against network-based attacks and other
       security threats from remote systems.
       Automatic Updates – keeping the operating system up to date with the latest security patches,
       hot fixes and service packs.
       Virus Protection – antivirus software helps protect a computer from viruses, Trojan horses,
       and other similar types of attacks.


Scheduling Maintenance Tasks
      You can use the Task Scheduler service to schedule one-time or recurring tasks to run
       automatically.


Backup
      Runs Backup, which you can use to back up and recover the Windows XP system.


Types of Backup
1. Normal – backs up selected files, and marks each file as backed up.
2. Copy – backs up selected files, but does not mark any as backed up.
3. Differential – backs up selected files, only if they were created or modified since the previous
backup, but does not mark them as backed up.
4. Incremental – backs up selected files only if they were created or modified since the precious
backup.
5. Daily – backs up only files that were created or modified today.




                                                   15
                             Philippine International School in Buraydah
                              Information Technology Learning Center
                                  Al Qassim, Kingdom of Saudi Arabia

                                     Windows XP Professional


Troubleshooting Windows XP Professional


Using Remote Assistance to Resolve Problems
      Allows support personnel to view a user’s desktop and take control temporarily to resolve
       problems or walk the user through the execution of complex tasks.


Resolving Startup Issues Using Safe Mode
      In Safe Mode, Windows XP loads only basic files, services, and drivers.


Repairing Missing or Corrupted System Files
      Automated System Recovery (ASR) data can often help you recover a system that won’t boot.


Repairing and Reinstalling Windows XP
      When you cannot recover Windows any other way, your final recovery option is to reinstall
       Windows XP with the repair option.




                                                 16
                            Philippine International School in Buraydah
                             Information Technology Learning Center
                                 Al Qassim, Kingdom of Saudi Arabia

                                     Windows XP Professional


ACTIVE DIRECTORY


     Active Directory is a directory service. The term directory service refers to two things — a
      directory where information about users and resources is stored and a service or services that
      let you access and manipulate those resources.
     Active Directory is a way to manage all elements of your network, including computers,
      groups, users, domains, security policies, and any type of user-defined objects.
     Active Directory is built around Domain Name System (DNS) and lightweight directory access
      protocol (LDAP) — DNS because it is the standard on the Internet and is familiar, LDAP
      because most vendors support it. Active Directory clients use DNS and LDAP to locate and
      access any type of resource on the network. Because these are platform-independent
      protocols, Unix, Macintosh, and other clients can access resources in the same fashion as
      Windows clients




                                                 17
                            Philippine International School in Buraydah
                             Information Technology Learning Center
                                 Al Qassim, Kingdom of Saudi Arabia

                                     Windows XP Professional


Remote Installation Services


      RIS is an automated installation technology that you can use to create installation images of
       operating systems or of complete computer configurations, including desktop settings and
       applications.


      RIS is typically used during large-scale deployments when it would be too slow and costly to
       have administrators or end users interactively install the operating system on individual
       computers.


Using answer files with a RIS installation
      Using answer files with a RIS installation is similar to using an unattended answer file with
       RIS-specific sections and values. For a CD-based installation, the default answer file is
       Ristndrd.sif.




                                                18

				
DOCUMENT INFO
Shared By:
Stats:
views:17
posted:12/3/2011
language:
pages:18
Description: Networking and Computer Basics