![Page 1: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/1.jpg)
Microsoft Windows OverviewTyronne Nash
Perry Holloway
William Wright
![Page 2: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/2.jpg)
Overview
Evolution of Windows
DOS extensions
GUI front-end styles
Operating system
Server platforms
File systems
![Page 3: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/3.jpg)
Overview (cont)
Windows 2000 design goals
Windows 2000 basic install
Windows 2000 Registry
![Page 4: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/4.jpg)
![Page 5: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/5.jpg)
Sources for some of the historical information and images:
http://www.microsoft.com/windows/winhistorydesktop.mspx
http://toastytech.com/guis
![Page 6: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/6.jpg)
1985
Windows 1.0
Extension to DOS
GUI front end
Added use of mouse
Task manager
Used underlying DOS
![Page 7: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/7.jpg)
Windows 1.0
![Page 8: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/8.jpg)
1987
Windows 2.x
Windows /386
Overlapping Windows
VGA
DDE
Used underlying DOS
![Page 9: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/9.jpg)
Theme used: “MS Eye Bleeder”
![Page 10: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/10.jpg)
1990
Windows 3.x (WIN3.x)
32 bit processing
File Manager
Print Manager
Presentation Manager
Modular Virtual device drivers (VxDs)
Use of extended memory
Used underlying DOS
![Page 11: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/11.jpg)
![Page 12: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/12.jpg)
1993
Windows for Workgroups 3.11 (WFW)
Native networking support
RAS
Used underlying DOS
![Page 13: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/13.jpg)
1993
Windows NT 3.1 (WINNT)
Windows Advanced Server 3.1
Designed to be application server
Client /server
Microsoft Mail
Network management
(Security, Sever management)
![Page 14: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/14.jpg)
1993
Windows NT Workstation 3.5 (WINNT WS)
Open GL
Long file names
![Page 15: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/15.jpg)
1994
Windows NT server 3.5
(based on NT Server 3.1)
![Page 16: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/16.jpg)
1995
WINNT 3.51
Minor server upgrade release
Windows 95 (WIN95)
Integrated 32 bit TCP/IP stack
Plug and Play (PnP)
Attempt to add security
![Page 17: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/17.jpg)
![Page 18: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/18.jpg)
WIN95
Security ??
Multiple logons
Use of ESC key will bypass login process
Policy editor (POLEDIT)
Note: this not well documented
Still able to drop to DOS and the machine is yours
![Page 19: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/19.jpg)
1996
WINNT WS 4.0
Added the W95 interface
WIN95 OEM Service Release 2 (OSR2)
FAT32 introduced
Bugfix
![Page 20: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/20.jpg)
1996
WINNT 4.0
Full 32 bit OS
Look and feel of WIN95
![Page 21: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/21.jpg)
1997
NT Server Enterprise Edition (EE)
Scaled up server for corporate clients with large networks
![Page 22: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/22.jpg)
1998
NT Server Terminal Server (TS)
The NT product line was renamed to Windows 2000
Windows 98
USB support
![Page 23: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/23.jpg)
![Page 24: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/24.jpg)
1999
WIN98 Second Edition (SE)
Fixed must of the bugs in WIN98
Networking support for home users
![Page 25: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/25.jpg)
2000
Windows Millennium Edition (WIN ME)
System Restore
Windows 2000 Professional W2K Pro)
Based on NT code
![Page 26: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/26.jpg)
2000 (cont)
USB Firewire
Added support for Kerberos protocol
NTFS 5.0
Encrypting file system (EFS)
![Page 27: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/27.jpg)
![Page 28: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/28.jpg)
2001
Windows XP Professional
WINNT and WIN9X derivatives combined into one code base
Windows XP Home
Easier networking
No Domain authentication
![Page 29: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/29.jpg)
![Page 30: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/30.jpg)
![Page 31: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/31.jpg)
File systems
FAT12 and FAT16 (FAT)
FAT
FAT started with DOS
Max size 32MB
Can be read by all Windows operating systems
![Page 32: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/32.jpg)
File systems (cont)
FAT32
Started with WIN95 OSR2
Max size 2 terabytes
Supported size is much less
Can be read by all WIN9X, WIN ME, W2K and WIN XP
![Page 33: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/33.jpg)
File systems
NTFS
Max size can more than 2TB
NTFS 5.0 supports EFS
Can be read by W2K, WIN XP, maybe WINNT 4.0 SP4
![Page 34: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/34.jpg)
Window 2000 Design Goals
Windows NT
Compatibility
Reliability
Extensibility
Scalability
Distributability
Certifiability
![Page 35: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/35.jpg)
Windows 2000
Internet Standardization
Ease of Administration
Scalability
Security
Performance
Reliability
![Page 36: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/36.jpg)
Internet Standardization Was a new focus because of the growth of the internet
Increased support for the open Standards
Networking is improved ( added new Microsoft Management Console (MCC) administrative interfaces) (TCP/IP network services have been improved and updated)
Support for the Layer 2 Tunneling Protocol (L2TP) (industry standard Internet protocol used for building Virtual Private Networks (VPN)) (Builds secure tunnels across internetworks) (can Leverage public key certificates and IP Security)
Supports IP Security, Kerberos, and PKI (public key infrastructure)
Most important addition is the Active Directory
Supports Lightweight Directory Access Protocol (LDAP) – Specifies the way clients and servers exchange directory information
![Page 37: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/37.jpg)
Ease of Administration Has Support for many Items
Improved management infrastructure
Microsoft Management Console
Windows Management
Active Directory and Group Policy
Component Object Model
Windows Driver Model
Plug and Play and Advanced Configuration and Power Interface
Quality of Service
![Page 38: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/38.jpg)
Ease of Administration – Cont.
Total Cost of Ownership
IntelliMirror
User Document Management
User Setting Management
Software installation
Remote Installation Services
Group Policy
![Page 39: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/39.jpg)
Scalability
One that will run on many hardware environments
Provides multi-platform support through its layered, microkernel architecture and use of the Hardware Abstraction Layer (HAL)
Two different security models – the workgroup and domain models
![Page 40: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/40.jpg)
Security Built in support for certification authorities and smart cards, as well as the
standards-based Kerberos authentication protocol
Active Directory – Cornerstone – its granular access control, inheritance, and delegation of administrative tasks gives you the flexibility to secure resources without compromising you network’s purpose
Key Improvements
Security Configuration Editor (SCE)
Security Configuration Manager (SCM)
Windows 2000 Authentication
Public Key Cryptography
![Page 41: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/41.jpg)
Performance
Microsoft distributed file system (Dfs) allows shares to be mirrored between file
servers and enables clients to automatically choose the closest server
![Page 42: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/42.jpg)
Reliability
Error and exception handling – uses structured exception handling for capturing error conditions and responding uniformly.
Component Redundancy – provides reliability by providing redundant systems that protect the computer when a single component fails
IntelliMirror – users will never lose access to their most critical network documents, application, and desktop settings because of this
![Page 43: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/43.jpg)
Installing Window 2000Step One
Make sure that your system meets all the System requirement
Device are in the Hardware Compatibility List
Pentium 166 or greater with 64 MB of memory
At least 650 MB of hard drive space
![Page 44: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/44.jpg)
Step Two
Insert the Window 2000 CD into the CD-ROM and run the WINNT or WINNT32 program from the disk
Or simply reboot the machine if it is capable of booting from the CD_ROM
![Page 45: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/45.jpg)
Step Three
Windows 2000 Setup
It tells you what it believes you have on the system such as: type of
PC, Video Card, Keyboard, Mouse, etc
It sets you video card to the VGA mode. It is a good idea to keep this until the installation is complete so to avoid loading the wrong video card, and thus having to start over.
![Page 46: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/46.jpg)
Step Four
Disk Partition
At this point of the installation it will ask you to tell it what partition on the harddrive to install it on
![Page 47: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/47.jpg)
Import to choose the correct partition especially if it is going on a dual boot machine
It is a good Idea to know what kind of partition to use. NTFS or FAT32. NTFS is more secure and allows file-level security. Its downfall is that it cannot use DOS Based, low-level utilities to read or manipulate the drive. If you have these issue one resolution is when you partition the drive to make a small FAT32 Partition
Disk Partition - Cont
![Page 48: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/48.jpg)
Step Four
Ask you to personalize your copy with your name and company name. This is
optional
![Page 49: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/49.jpg)
Step Five
Ask you to pick the Licensing option you are going to use when installing Windows Server 2000
Per Seat
Per Server
It requires you to make the decision however it will allow you to change it one time
![Page 50: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/50.jpg)
Step Six
It next ask to create the Emergency Repair Disk
Gives windows enough information to bring up your system based on the last time you updated the disk
Stores the critical system configuration files needed to recover Window 2000
Needs to be updated regularly – Start + Programs + Accessories + System Tools + Backup
Good idea to do every time you make major changes
![Page 51: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/51.jpg)
Step Seven
Network Setup
During the network setup Window 2000 will do the following
Connecting to the network – it will ask you if the computer will participate on a network or Wired to the network
![Page 52: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/52.jpg)
Network Setup – Cont
Installing the Network Card
Installing Protocols - It automatically assumes you want NetBeui, TCP/IP, and IPX/SPX
![Page 53: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/53.jpg)
Step Eight
Service Installation
Internet Information Server
Gateway Services for Novell
DNS and DHCP Server
Remote Access Service (RAS)
TCP/IP and SNMP
![Page 54: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/54.jpg)
Step Nine
Security
Need to tell the machine is joining a workgroup or domain
Windows 2000 server and workstations must be granted access to join a domain
Very secure machine – It needs to validate all other machines in the network.
![Page 55: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/55.jpg)
Step Ten
Setting the Time Zone and Rebooting
![Page 56: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/56.jpg)
Registry2000 Registry – Was created to improve the configuration mess
Windows 2000 Tries to improve on the configuration mess with the Registry
It is one big, central, secure database containing all the configuration information about the server, its applications, and its users
Describes the hardware configuration, installed system and application software, user and group account security, desktop settings and profiles, file association, and applications supporting object Linking and Embedding (OLE)
Can be modified by the configuration tools in control panel, the windows 2000 setup applet, Active Directory Users and computers, third-party configuration tools, and soft ware installation procedures
A Database containing configuration data for application, hardware, and device drivers, as well as data on network protocols and adapter card settings.
![Page 57: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/57.jpg)
Changing the Registry
Can be do by Administrative tools directory, applications within Control Panel, or by opening up Registry Editor and Manually changing fields values
It is a good idea to save your registry before you make any changes manually so that you can reverse it at anytime if something goes wrong.
This can be do by going to start, run and typing regedt32.
![Page 58: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/58.jpg)
Benefits to the Administrator
Collects all configuration information while accommodating the data and storage needs of system components
Allows discretionary access control to local and remote configuration data. Can be protected by Access Control List (ACL)
Records and preserves security and desktop information on an individual basis.
Use it to determine all the hardware components installed on a local or remote system, the BIOS revision levels for motherboards and video adapters, the numbers and types of SCSI adapters, the devices installed on each adapter, and IRQ and base address and DMA channel assignments for specific components
![Page 59: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/59.jpg)
Contains the Following Types of configuration information
AUTOEXEC.BAT,CONFIG.SYS, WIN.INI, SYSTEM.INE, CONTROL.INI, LANMAN.INI, PROTOCOL.INI and miscellaneous INI files
Device Driver Data
Network Protocols and Network Adapters
![Page 60: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/60.jpg)
Component and Application that use the Registry
Setup
Hardware Detector
Windows 2000 Kernel
Device Drivers
Administrative tools
![Page 61: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/61.jpg)
HKEY_LOCAL_MACHINE
This is where the system stores hardware, software, and security information
Hardware and operating system data such as bus type, system memory, device drivers, and startup control data
Five main KEYS
![Page 62: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/62.jpg)
HKEY_LOCAL_MACHINE\HARDWARE
Describes the physical hardware in the computer, the way that device drivers use the hardware, and mappings and related data that link kernel mode drivers with various user mode code
All information in it is volatile, meaning that the settings are recomputed each time the system is started and then discarded when the system is shut down
Description Key – describes the actual computer hardware – the make of the motherboard, type of video adapter, SCSI adapters, serial ports. Parallel ports, sound cards, network adapters, and so on
Device Map Key – contains miscellaneous data in formats specific to particular classes of drivers
Resource Map Key – describes which device drivers claim specific hardware resources
![Page 63: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/63.jpg)
HKEY_LOCAL_MACHINE\SAM HKEY_LOCAL_MACHINE\SECURITY
Has no visible information – the point to set security policies such as specific user rights, as well as information for user and group accounts and for the domains in Window 2000 Server
HKEY_LOCAL_MACHINE\SOFTWARE –
Contains data about software installed on the local computer, along with miscellaneous configuration data
HKEY_LOCAL_MACHINE\SYSTEM
Controls system startup, device driver loading, W2K services, and operating system behavior
Describes bootable and nonbootable configuration in a group of ControlSets, where each ControlSet represents a unique configuration
![Page 64: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/64.jpg)
HKEY_CLASSES_ROOT
Contains information on file associations and data required to support Microsoft’s Object Linking and Embedding technology
Provides information on filename-extension association and OLE that can be used by Windows shell application and OLE applications
![Page 65: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/65.jpg)
HKEY_USERS
Information about active users
Includes Profiles on any user who has local access to the system, including environment variables, personal program groups, desktop settings, network connections, printers, and application preferences
It contains a default profile for user that have never logged on
Security ID for other users
![Page 66: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/66.jpg)
HKEY_CURRENT_USER
Contains the user profile for the person currently logged onto the machine
User’s profile groups, desktop settings, printers, application preferences, and network connections
![Page 67: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/67.jpg)
HKEY_CURRENT_CONFIG
Contains the configuration information for the particular hardware
configuration you booted with
![Page 68: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/68.jpg)
Event Viewer
Events are significant occurrences in the operating system (power interruption, hard drive out of free space)
Viewed with Event Viewer
Three main types of event logsApplication – e.g., database query malformed
Security – e.g., all attempted logins
System – e.g., modem failure
![Page 69: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/69.jpg)
Logging Information
Logs are stored in \SystemRoot\SYSTEM32\CONFIG
Events can be filtered by many criteria
Three types of log entries:Information – Successful events, failed events or both
Warning – Irregular event that doesn’t affect system
Error – A failed event or network error
![Page 70: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/70.jpg)
Security EventsEnabled in Group Policy Editor
Logon and logoffFile and object (applications) access (including attempts at accessing restricted files)User and group managementSecurity policy changesRestart, shutdownProcess tracking – enable only when absolutely necessary!
![Page 71: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/71.jpg)
Sample Error Event
![Page 72: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/72.jpg)
Encrypting File System (EFS)
Allows encryption of files and directors to be transparent to user and applications
Deters “back door” methods of accessing NTFS partitions via boot disks or other operating systems
![Page 73: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/73.jpg)
Brief Summary of Inner Workings
Each file has a randomly generated number called the File Encryption Key (FEK)
FEK used to encrypt file with DESX
User’s public RSA key encrypts FEK
Encrypted FEK appended to end of file
Private RSA keys can be stored on smart cards or disk (not recommended)
![Page 74: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/74.jpg)
W2K Command Line Magic
Start -> Run -> CMD
Command buffer accessible by pressing up and down arrows
Auto complete directories by pressing TAB
Surround files or directories with spaces in double-quotation marks (e.g., “My Documents”)
Commands can be used in batch files or login scripts
“Help” command displays list of all W2K commands, “command-name /?” displays help for specific command
![Page 75: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/75.jpg)
ipconfig
Displays IP and ARP (Address Resolution Protocol) informationRenews, releases DHCP IP licensesWorks on devices similar to Linux’s eth0 but without obfuscated names, e.g., “Ethernet 3COM” or “Local Area Connection 1”; wildcards * and ? AcceptedWorks on all interfaces to the computer (serial, parallel)
![Page 76: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/76.jpg)
![Page 77: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/77.jpg)
arp
Displays the ARP table on the machine
If connectivity problems exist between two machines, running arp on both machines and comparing the MAC (unique 6x16-bit addressed stored in network interface card) values for the two machines might gives clues as to why the two machines can’t see one another
![Page 78: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/78.jpg)
nbtstat and netstat
Displays network usage statistics including bytes received and sent, errors
Displays list of ports open and what connections to and from the machine exist
nbtstat gives statistics for connections using NetBios over TCP/IP (a.k.a. NBT)
netstat gives statistics from a network adapter on a local or remote machine
![Page 79: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/79.jpg)
![Page 80: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/80.jpg)
route
Views and modifies the route table
If a better route is known by a network administrator between two hosts, the admin can add this route to the route table.
![Page 81: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/81.jpg)
ping
Ping, or Packet InterNet Gopher, is a TCP/IP utility
Sends a message to a specified host, waits for a reply
Useful for checking if a host can be accessed and the latency between two hosts
![Page 82: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/82.jpg)
![Page 83: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/83.jpg)
tracert – the funnest command of all
Displays the route a packet will take when transferring from your machine to the specified IP
Displays latency/ping at each step along the route
Useful for determining network bottlenecks between key servers
![Page 84: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/84.jpg)
![Page 85: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/85.jpg)
net
accounts – modifies password restrictions, synchronizes user accounts databasecomputer – adds or deletes computers from a domainconfig – views and allows certain modifications to how a computer behaves on the network (e.g., max users connected)continue – restarts a paused servicefile – find out if a specified file is open and who is using the filename – sends a message to the specified computer on the networkpause – pauses a serviceprint – gets a list of jobs current printing, deletes a specified jobsession – displays information about connections between a W2K server and a client, disconnect a specified machine from the servershare – shares files, directories over the networkstart – displays list of available services to run, starts the specified servicestatistics – displays statistics about clients connected to a servertime – synchronizes the clock to a specified machine’s clockuse – maps network drivesuser – adds, edits and deletes user accountsview – displays a list of network resources
![Page 86: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/86.jpg)
![Page 87: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/87.jpg)
Beyond Windows XP
![Page 88: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/88.jpg)
![Page 89: Microsoft Windows Overview Tyronne Nash Perry Holloway William Wright](https://reader036.vdocuments.site/reader036/viewer/2022081516/56649d5c5503460f94a3b371/html5/thumbnails/89.jpg)
Fleetwood Mac or Microsoft?
Stevie Nicks