Save 70% on video courses when you use code OCTVID during checkout. Offer ends Oct. 17. Shop now.
This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.
This book will show administrators how to manage and administer the advanced functions and security features in Windows Vista. The recommendations, tips, tricks, and best practices are based on years of early-adopter implementations of Windows Vista in large corporate and private environments. The authors highlight the functions of Windows Vista that both large and small environments have found to be the most useful, including all-new features such as Complete PC Backup, BitLocker, and the powerful Group Policy options that are only available in Windows Vista.
Understand how to…
Andrew Abbate is a consultant in and best-selling author on various Microsoft technologies and security and operational practices.
James Walker, MCSE, CPM, BSME, has been a consultant, author, and technical editor to several best-selling Windows Unleashed books involving design, security, performance optimization, and data communications.
Scott G. Chimner, CISSP, MCSE, MCSA, TCSE 2, A+, is a consultant for Convergent Computing, an ISSA member, and has been in the computer industry for more than 12 years with a concentration on Information Security. Scott has also served as a contributing writer for several books on Microsoft technologies.
Part I: Windows Vista Health Check
1: Windows Vista Technology Primer 9
2: Getting to Understand Your Windows Vista System 29
3: Understanding Windows Vista Performance Optimization 65
Part II: Security for Windows Vista Systems
4: Securing a Windows Vista System 97
5: Patching and Keeping Windows Vista Up-to-Date 133
6: Using User Account Control to Establish System Security 157
7: Implementing BitLocker Drive Encryption to Improve Data Privacy 185
Part III: Windows Vista Mobility
8: Configuring and Using Offline Files 209
9: Configuring Mobile Functionality in Windows Vista 233
10: Creating a Secured Mobile Communications Configuration 261
Part IV: Backup and Recovery of Information
11: Using Shadow Copy to Recover Lost or Damaged Files 293
12: Backing Up and Recovering Windows Vista Information 309
13: Using the Complete PC Backup Utility 333
14: Microsoft Vista System Restore 351
Part V: Managing Vista
15: Setting Up Users and Computers in Windows Vista 375
16: Establishing Printer Management in Windows Vista 399
17: Troubleshooting Windows Vista 419
18: Using Internet Explorer 7 451
Part VI: Deploying Vista
19: Creating Windows Vista Images 481
20: Imaging Tools and Processes 501
21: Deploying Windows Vista in an Automated Fashion 527
Part VII: Windows Vista in an Active Directory Environment
22: Understanding Group Policy Basics to Manage Windows Vista Systems 563
23: Expanding on the Use of Group Policies to Better Manage Windows Vista Systems 587