PAGE 5

Home Up APLUS WIN2K NT 4.0 CISCO NETPLUS FEED BACK BRAINDUMPS WEBRING SPONSORS

PAGE 6

Monitoring and Optmizing System Performance and Reliability:

Driver signing: (KB# Q224404)

Configuring Driver Signing: (KB# Q236029)

  • Open System applet in Control Panel and click Hardware tab. Then in the Device Manager box, click Driver Signing to display options:
  • Ignore - Install all files, regardless of file signature
  • Warn- Display a message before installing an unsigned file
  • Block- Prevent installation of unsigned files
  • The Apply Setting As System Default checkbox is only accessible to Administrators

Using System File Checker (sfc.exe): (KB# Q222471)

  • /scannow - scans all protected system files immediately
  • /scanonce - scans all protected system files at next startup
  • /scanboot- scans all protected system files at every restart
  • /cancel- cancels all pending scans
  • /quiet - replaces incorrect files without prompting
  • /enable - sets Windows File Protection back to defaults
  • /purgecache - purges file cache and forces immediate rescan
  • /cachesize=x- sets file cache size

Windows Signature Verification (sigverif.exe):

  • running sigverif launches File Signature Verification
  • checks system files by default, but non-system files can also be checked
  • saves search results to Sigverif.txt

Task scheduler: (KB# Q235536 & Q226262)

  • used to automate events such as batch files, scripts and system backups
  • tasks are stored in the Scheduled Tasks folder in Control Panel
  • running task with a user name and password allows an account with the required rights to perform the task instead of an administrative account
  • set security for a task by group or user

Using offline files:

Offline files replaces My Briefcase and works a lot like Offline Browsing in IE5. By default, offline files are stored in the %systemroot%\CSC (Client Side Caching) directory.

Share a folder and set it's caching to make it available offline - three types of caching:

  • manual caching for documents - default setting. Users must specify which docs they want available when working offline
  • automatic caching for documents - all files opened by a user are cached on his local hard disk for offline use - older versions on users machine automatically replaced by newer versions from the file share when they exist
  • automatic caching for programs -same as above, but for programs

When synchronizing, if you have edited an offline file and another user has also edited the same file you will be prompted to keep and rename your copy, overwrite your copy with the network version, or to overwrite the network version and lose the other user's changes (a wise SysAdmin will give only a few key people write access to this folder or everyone's work will get messed up).

Using Synchronization Manager, you can specify which items are synchronized, using which network connection and when synchronization occurs (at logon, logoff, and when computer is idle).

Encrypted files (EFS) are NOT encrypted in the offline cache. You must be a member of the Administrators group to view the offline cache (on an NTFS volume). File and folder permissions still apply in the offline cache, even when it is located on a FAT or FAT32 volume.

Performance Console: (KB# Q146005)

  • Important objects are cache (file system cache used to buffer physical device data), memory (physical and virtual/paged memory on system), physicaldisk (monitors hard disk as a whole), logicaldisk (logical drives, stripe sets and spanned volumes), and processor (monitors CPU load)
  • Processor - % Processor Time counter measure's time CPU spends executing a non-idle thread. If it is continually at or above 80%, CPU upgrade is recommended
  • Processor -  Processor Queue Length - more than 2 threads in queue indicates CPU is a bottleneck for system performance
  • Processor - % CPU DPC Time (deferred procedure call) measures software interrupts.
  • Processor - % CPU Interrupts/Sec measures hardware interrupts. If processor time exceeds 90% and interrupts/time exceeds 15%, check for a poorly written driver (bad drivers can generate excessive interrupts) or upgrade CPU.
  • Logical disk - Disk Queue Length - If averaging more than 2, drive access is a bottleneck. Upgrade disk, hard drive controller, or implement stripe set
  • Physical disk - Disk Queue Length - same as above
  • Physical disk - % Disk Time- If above 90%, move data/pagefile to another drive or upgrade drive
  • Memory - Pages/sec - more than 20 pages per second is a lot of paging - add more RAM
  • Memory - Commited bytes - should be less than amount of RAM in computer
  • diskperf command for activating disk counters has been modified in Windows 2000, physical disk counters are now enabled by default, but you will have to type diskperf -yv at a command prompt to enable logical disk counters for logical drives or storage volumes. (KB# Q253251

Performance Alerts and Logs: (KB# Q244640)

  • Alert logs are like trace logs, but they only log an event, send a message or run a program when a user-defined threshold has been exceeded
  • Counter logs record data from local/remote systems on hardware usage and system service activity
  • Trace logs are event driven and record monitored data such as disk I/O or page faults
  • By default, log files are stored in the \Perflogs folder in the system's boot partition
  • Save logs in CSV (comma separated value) or TSV (tab separated value) format for import into programs like Excel
  • CSV and TSV must be written all at once, they do not support logs that stop and start. Use Binary (.BLG) for logging that is written intermittantly
  • Logging is used to create a baseline for future reference

Virtual memory/Paging file:

  • Recommended minimum paging file size is 1.5 times the amount of RAM installed. A system with 64 MB should have a 96 MB page file. Maximum page file size should not exceed 2.5 times the amount of RAM installed
  • Set through Control Panel > System applet > Advanced tab > Performance Options > Change
  • The most efficient paging file is spread across several drives, but is not on the system or boot partitions. (KB# Q123747)
  • Maximum registry size can also be changed through the Virtual Memory dialog box

Hardware profiles:

  • Created to store different sets of configuration settings to meet a users different needs (usually used with portables) such as whether a computer is docked or undocked.
  • User selects the desired profile at Windows 2000 startup
  • Profiles are created through Control Panel > System applet > Hardware tab > Hardware Profiles
  • Devices are enabled and disabled in particular profiles through their properties in the Device Manager snap-in

Data recovery:

  • Windows 2000 Backup is launched through Control Panel > System applet > Backup or by running ntbackup from the Start menu (KB# Q241007)
  • Users can back up their own files and files they have read, execute, modify, or full control permission for
  • Users can restore files they have write, modify or full control permission for
  • Administrators and Backup Operators can backup and restore all files regardless of permissions
Backup type Description
Normal All selected files and folders are backed up. Archive attribute is cleared if it exists (fast for restoring)
Copy All selected files and folders are backed up. Archive attribute is not cleared (fast for restoring)
Incremental Only selected files and folders that have their archive attribute set are backed up and then archive markers are cleared
Differential Only selected files and folders that have their archive attribute set are backed up but archive attributes are not cleared
Daily All selected files and folders that have changed throughout the day are backed up. Archive attributes are ignored during the backup and are not cleared afterwards

The Windows 2000 Registry:

Database that stores Windows 2000 configuration information for all installed software, hardware and users in a hierarchical structure. Consists of five main subtrees:

  • HKEY_CLASSES_ROOT - holds software configuration data, file associations and object linking and embedding (OLE) data
  • HKEY_CURRENT_CONFIG - holds data on active hardware profile extracted from SOFTWARE and SYSTEM hives
  • HKEY_CURRENT_USER - contains data about current user extracted from HKEY_USERS and additional info pulled down from Windows authentication
  • HKEY_LOCAL_MACHINE - contains all local computer hardware, software, device driver and startup information. Remains constant regardless of the user
  • HKEY_USERS - holds data for user identities and environments, custom settings, etc

The Registry Editor (Regedt32.exe) has a read-only mode, a security menu, and supports the REG_EXPAND_SZ and REG_MULTI_SZ data types. Regedit.exe (another registry editing tool installed by Windows 2000) does not. Registry Editor automatically saves changes as they are made.

Secondary Logon Service (Run As): (KB# Q225035)

  • Similar to the SU (Super User) command in UNIX
  • Used to test setting using a particular user account while logged in with a different account
  • Select the application icon using a single left-click, hold down the Shift key and right-click the icon. When the pop-up menu appears, click Run As. This brings up a dialog box titled "Run program as other user" - enter your credentials and click OK

Configuring and Troubleshooting the Desktop Environment:

User profiles:

  • Is a collection of data and folders that store the user's desktop environment and application settings along with personal data.
  • When a user logs onto a client computer running W2K Pro, he/she always receives his/her individualized desktop settings and all of their network connections regardless of how many users share the same computer.
  • A user can change their user profile by changing their desktop settings - when they log off, Windows 2000 incorporates the changes into their user profile.
  • Setting a profile as mandatory forces Windows to discard any changes made during the session so the next time the user logs on, the session remains unchanged from their last login.
  • User profiles are stored in the %systemroot%\Documents and Settings\%username% folder in a fresh install of W2K. When upgraded from NT4, they are stored in %systemroot%\Profiles\%username%
  • Roaming profiles are used in Windows 2000 domains for users who move from one computer to another but require a consistent desktop environment.

Multiple languages and locations:

Changed through the Regional Options applet in Control Panel. Open Region Options and click Input Locale tab to add more locales. Check each locale or language you want your system to support. (KB# Q177561)

On the Regional Options applet General tab, scroll through the items in the box labelled "Your System is Configured to Read and Write Documents in Multiple Languages" to see the available languages as well as the current default.

Manage and troubleshoot software by using Group Policy:

Deploy software by using Group Policy:

  • Replaces setup.exe. Windows Installer packages are recognized by their .MSI file extension.
  • Integrates software installation into Windows 2000 so that it is now centrally controlled, distributed, and managed from a central-point.
  • The software life cycle consists of four phases, Preparation, Deployment, Maintenance, and Removal.

Maintain software by using Group Policy:

  • Software package is installed on a Windows 2000 Server in a shared directory. A Group Policy Object (GPO) is created. Behavior filters are set in the GPO to determine who gets the software. Then the package is added to the GPO under User Configuration > Software Settings > Software Installation (this is done on the server). You are prompted for a publishing method - choose it and say OK.
  • Set up Application Categories in Group Policy > computer or user config > Software Settings > Software Installation (right-click) > Properties > Categories > Add. Creating logical categories helps users locate the software they need under Add/Remove Programs on their client computer. Windows does not ship with any categories by default.
  • When upgrading deployed software, AD can either uninstall the old application first or upgrade over top of it.
  • When publishing upgrades, they can be option or mandatory for users but are mandatory when assigned to computers.
  • When applications are no longer supported, they can be removed from Software Installation without having to be removed from the systems of users who are using them. They can continue using the software until they remove it themselves, but no one else will be able to install the software through the Start menu, Add/Remove Programs, or by invocation.
  • Applications that are no longer used can have their removal forced by an administrator. Software assigned to the user is automatically removed the next time that user logs on. When software is assigned to a computer, it is automatically removed at start up. Users cannot re-install the software.
  • Selecting the "Uninstall this application when it falls out of the scope of management" option forces removal of software when a GPO no longer applies.

Configure deployment options:

  • You can assign or publish software packages.
  • Software that is assigned to a user has a shortcut appear on a user's Start > Programs menu, but is not installed until the first time they use it. Software assigned to a computer is installed the next time the user logs on regardless of whether or not they run it.
  • When software is assigned to a user, the new program is advertised when a user logs on, but is not installed until the user starts the application from an icon or double-click a file-type associated with the icon. Software assigned to a computer is not advertised - the software is installed automatically. When software is assigned to a computer it can only be removed by a local administrator - users can repair software assigned to computers, but not remove it.
  • The software settings of a Group Policy is not refreshed like the rest of the settings. The user may need to logoff/logon or the system may need to be restarted for the new settings to take place (depending on type of software installation).
  • Published applications are not advertised. They are only installed through Add/Remove Programs in the Control Panel or through invocation. Published applications lack resiliency (do not self-repair or re-install if deleted by the user). Finally, applications can only be published to users, not computers.
  • With invocation, when a user double-clicks on an unknown file type, the client computer queries Active Directory to see what is associated with the file extension. If an application is registered, AD checks to see if it has been published to the user. If it has, it checks for the auto-install permission. If all conditions are met, the application is invoked (installed).
  • Non-MSI programs are published as .ZAP files. They cannot take advantage of MSI features such as elevated installation priveleges, rolling back an unsuccessful installation, installing on first use of software or feature, etc. (KB# Q231747) .ZAP files can only be published, not assigned.
  • Non-MSI programs can be repackaged using a 3rd party tool on the W2K Server CD called WinINSTALL LE. It works like SYSDIFF as it lets you take a snapshot of a system, install your application, take another snapshot and create a difference file that becomes your MSI install package. If you wish to assign a non-MSI program to a user or computer, you must first repackage it as an MSI file. (KB# Q236573)
  • When software requires a CD key during installation, it can be pushed down with the installer package by typing misexec /a <path to .msi file> PIDKEY="[CD-Key]" (KB# Q223393)
  • Modifications are created using tools provided by the software manufacturer and produce .MST files which tell the Windows Installer what is being modified during the installation. .MST files must be assigned to .MSI packages at the time of deployment. (KB# Q236943)
  • Patches are deployed as .MSP files. (KB# Q226936)

Configure and troubleshoot desktop settings:

Desktop settings can be configured using the Display applet in Control Panel or by right-clicking on a blank area of the desktop and selecting properties.

User can change the appearance of the desktop, desktop wallpaper, screen saver settings and more.

Fax support:

  • If a fax device (modem) is installed, the Fax applet appears in Control Panel. Does not appear when no fax device installed
  • If the Advanced Options tab is not available in the Fax applet log off then log back on as Administrator
  • Use the Fax applet to setup rules for how device receives faxes, number or retries when sending, where to store retrieved and sent faxes, user security permissions, etc.
  • The Fax printer in your printer folder cannot be shared

Accessibility services: (KB# Q210894)

  • Accessibility Wizard is used for deploying accessibility features to users who require them. Using the wizard, define the settings you want to deploy and, on the Save Settings to File page, save them to a file that has the .acw extension. Place the file on a network share and modify each user's login script so that it imports the settings. The command to import the file is this: %SystemRoot%\System32\Accwiz.exe filename. (KB# Q256956)
  • Utility Manager enables users to check an Accessibility program's status, and start or stop an Accessibility program. Users with administrator-level access can designate to have the program start when Windows 2000 starts. The built-in programs accessible from the Utility Manager are Magnifier, Narrator, and On-Screen Keyboard.
  • By default, automatic reset for accessibility options is disabled. When enabled, accessibilty options will be turned off if they have not be used for a pre-defined period of time. MS recommends enabling automatic reset on systems that are shared by more than one user.
  • StickyKeys allows you to press multiple key combinations (CTRL-ALT-DEL) one key at a time
  • FilterKeys tells the keyboard to ignore brief or repeated keystrokes
  • SoundSentry displays visual warnings when your computer makes a sound (for aurally impaired)
  • ShowSounds forces programs to display captions for the speech and sounds they make
  • MouseKeys lets you control the mouse pointer with the numeric keypad
  • Magnifier magnifies a portion of the desktop (for visually impaired) - available during GUI phases of OS installation (KB# Q231843)
  • Narrator reads menu options aloud using speech synthesis (for visually impaired) - available during GUI phases of OS installation.