using application compatibility toolkit (act) 4.0 to manage application compatibility on xp sp2 and...
TRANSCRIPT
Using Application CompatibilityUsing Application CompatibilityToolkit (ACT) 4.0 to Manage Toolkit (ACT) 4.0 to Manage Application Compatibility on XP Application Compatibility on XP SP2 and Server SP1SP2 and Server SP1
Corey HynesCorey Hynes
DSK304
AgendaAgenda
Application Compatibility Toolkit goalsApplication Compatibility Toolkit goalsApplication compatibility challengesApplication compatibility challengesACT 4.0 in DetailACT 4.0 in Detail
Feature overviewFeature overviewThree-phase approachThree-phase approach
Evaluate application compatibility issuesEvaluate application compatibility issuesMitigate compatibility issuesMitigate compatibility issuesDeploy issue solutionsDeploy issue solutions
Architecture and FeaturesArchitecture and Features
Areas of continued investmentAreas of continued investmentCall to ActionCall to ActionAppendixAppendix
7 Steps to Get Started with ACT 4.07 Steps to Get Started with ACT 4.0Top 10 Reasons to Deploy Microsoft Windows XP SP2Top 10 Reasons to Deploy Microsoft Windows XP SP2
GoalsGoals
Enable adoption of Microsoft Windows by reducing Enable adoption of Microsoft Windows by reducing application compatibility as a deployment blockerapplication compatibility as a deployment blocker
Provide a unified, end-to-end system to address Provide a unified, end-to-end system to address application issuesapplication issues
Tools for EvaluationTools for Evaluation
Tools for MitigationTools for Mitigation
Tools for DeploymentTools for Deployment
Listen, learn and respond to corporate application Listen, learn and respond to corporate application compatibility issuescompatibility issues
Provide a secure and privacy-compliant web service for Provide a secure and privacy-compliant web service for customers to share application issues and solutions with customers to share application issues and solutions with MicrosoftMicrosoft
Challenges (Windows XP)Challenges (Windows XP)
Changes to Microsoft Windows XP code baseChanges to Microsoft Windows XP code base9x was more “relaxed” in heap management9x was more “relaxed” in heap management
Subtle changes in Win32 API behaviorSubtle changes in Win32 API behavior
Registry value changesRegistry value changes
Changes to Folder LocationChanges to Folder LocationDocuments & SettingsDocuments & Settings
My DocumentsMy Documents
Applications with platform-specific driversApplications with platform-specific driversCommon in anti-virus, backup and partitioning softwareCommon in anti-virus, backup and partitioning software
Applications hard-coding to work on specific Applications hard-coding to work on specific OS versionOS version
Challenges (Windows XP SP2)Challenges (Windows XP SP2)
Microsoft Internet ExplorerMicrosoft Internet ExplorerBinary behaviors, local machine lockdown, Binary behaviors, local machine lockdown, mime handling & sniffing, zone elevation, mime handling & sniffing, zone elevation, Windows restrictions, download blockingWindows restrictions, download blocking
DCOM & RPCDCOM & RPCLaunch and activation permissions, remote anonymous Launch and activation permissions, remote anonymous accessaccess
Windows FirewallWindows FirewallPorts closed by defaultPorts closed by default
Data Execution Prevention (DEP) Data Execution Prevention (DEP) Access violations for applications that do not handle NXAccess violations for applications that do not handle NX
Feature OverviewFeature Overview
Built on top of 3.0 technologyBuilt on top of 3.0 technology
Improved evaluation toolsImproved evaluation tools
Improved mitigation toolsImproved mitigation tools
Improved deployment toolsImproved deployment tools
Task-based interfacesTask-based interfaces
Three-Phase ApproachThree-Phase Approach
EvaluationEvaluation MitigationMitigation DeploymentDeployment
Inventory Inventory applicationsapplications
CollectCollectapplication application
issuesissues
Package Package solutionssolutions
Deploy Deploy solutionssolutions
Create and testCreate and testsolutionssolutions
Architecture and FeaturesArchitecture and Features
Sales Support
ServersHR
Test Environment
Production Environment
Collector
DCOM
WindowsFirewall
IEIE
CollectorCollectorCollectorCollectorCollectorCollectorCollectorCollectorCollectorCollector
DCOMDCOMDCOMDCOM
WindowsWindowsFirewallFirewall
WindowsWindowsFirewallFirewall
Compatibility EvaluationAgents
IEIE
Distribute agents to Distribute agents to Collect application inventoryCollect application inventory Assess application issuesAssess application issues
Run IE test toolRun IE test tool Detect SP2 compatibility issuesDetect SP2 compatibility issuesClient
Distribute via Distribute via SMSSMS Log on scriptsLog on scripts
Configure agents to collect Configure agents to collect specific dataspecific data Department nameDepartment name User name, Machine name, IPUser name, Machine name, IP Custom name-value pairsCustom name-value pairs
Evaluation Phase ArchitectureEvaluation Phase Architecture
Production Environment
NetworkShare
Application EvaluationApplication EvaluationTool: Application AnalyzerTool: Application Analyzer
Sales Support
Servers
HR
Collector
DCOM
WindowsFirewall
Collector
Collector
Collector
Collector
Collector
Collector
Collector
Collector
DCOM
DCOM
WindowsFirewall
WindowsFirewall
WindowsFirewall
Server
MSFTMSFTOnline DBOnline DB
SQLSQLServerServer
NetworkShare
NetworkShare
Web ServiceWeb Service
NetworkNetworkShareShare
ReportReportViewerViewer
(Analyzer)(Analyzer)
Client
Web Application EvaluationWeb Application EvaluationTool: Internet Explorer compatibility evaluatorTool: Internet Explorer compatibility evaluator
View Log View Log of Errorsof Errors
ChangeChange
IE Security IE Security
SettingsSettings
SaveSaveLogsLogs
Evaluates issues related toEvaluates issues related to
1.1. Automatic Download Blocking Automatic Download Blocking
2.2. Bad Certificate ActiveX Bad Certificate ActiveX Blocking Blocking
3.3. Binary Behaviors Restrictions Binary Behaviors Restrictions
4.4. Local Machine Zone Local Machine Zone Lockdown (LMZL) Lockdown (LMZL)
5.5. MIME Handling Restrictions MIME Handling Restrictions
6.6. MK Protocol Blocking MK Protocol Blocking
7.7. Object Caching Protection Object Caching Protection
8.8. Pop-up Blocking Pop-up Blocking
9.9. Windows Restrictions Windows Restrictions
10.10. Zone Elevation Restrictions Zone Elevation Restrictions
Windows XP SP2 Client (Test Machine)Windows XP SP2 Client (Test Machine)
Browse Internet or Intranet sites
with a “logging enabled” version of
Internet Explorer
Evaluation Feature HighlightsEvaluation Feature Highlights
Automated application inventory agentAutomated application inventory agentLight-weight toolLight-weight toolData collected about installed Application and machine Data collected about installed Application and machine configuration configuration
Windows XP SP2 compatibility evaluatorsWindows XP SP2 compatibility evaluatorsChecks whether an application uses DCOM interfaces that will be Checks whether an application uses DCOM interfaces that will be blocked by SP2blocked by SP2Windows Firewall compatibility evaluator is configured to monitor Windows Firewall compatibility evaluator is configured to monitor ports over time that violate new Windows Firewall defaultsports over time that violate new Windows Firewall defaultsDetects violations to new Internet Explorer security feature Detects violations to new Internet Explorer security feature settingssettings
Rich client tool for reporting and analysisRich client tool for reporting and analysisFaster and more comprehensive data filteringFaster and more comprehensive data filteringReports can be sharedReports can be sharedManaged application (requires .NET Framework 1.1)Managed application (requires .NET Framework 1.1)Data stored in SQL Server 2000Data stored in SQL Server 2000Secure data encryption to/from Microsoft online Web servicesSecure data encryption to/from Microsoft online Web services
Evaluation PhaseEvaluation Phase
Test EnvironmentTest Environment
Command line tool that can generate a single EXE
Mitigation Phase ArchitectureMitigation Phase Architecture
Query File Query File .ADQ File .ADQ File
(Application List with (Application List with DCOM and Firewall DCOM and Firewall
Issues)Issues)
Compatibility Compatibility Administrator fileAdministrator file
.SDB File.SDB File
(Database with Win32 (Database with Win32 Fixes)Fixes)
Solution Builder ToolSolution Builder ToolTest EnvironmentTest Environment
One Mitigation Package One Mitigation Package
for Applicationsfor Applications
(Machine-wide Fix) (Machine-wide Fix)
Application Mitigation Application Mitigation Tool: Compatibility administratorTool: Compatibility administratorWithout Compatibility Fixes: Error message on Windows XPWithout Compatibility Fixes: Error message on Windows XP
Calls GetVersion
Returns 5.1.2600
Calls GetVersion
Returns 4.0.950setup.exe
setup.exe kernel32.dll
Compat Compat FixFix
kernel32.dll
With Compatibility Fixes: Setup Continues on Windows XPWith Compatibility Fixes: Setup Continues on Windows XP
100s of Fixes: Limited User Account, Registry Keys, File Paths, Display100s of Fixes: Limited User Account, Registry Keys, File Paths, Display
Web Application MitigationWeb Application MitigationTool: Internet explorer compatibility evaluatorTool: Internet explorer compatibility evaluator
Registry PackageRegistry Package
(.REG file)(.REG file)
for Internet Explorerfor Internet Explorer
View Log of View Log of ErrorsErrors
ChangeChange
IE Security IE Security
SettingsSettings
Windows XP SP2 Client (Test Machine)Windows XP SP2 Client (Test Machine)
Browse Internet or Intranet sites
with a “logging enabled” version of
Internet Explorer
Mitigation Feature HighlightsMitigation Feature Highlights
Enable application-specific solutions while Enable application-specific solutions while minimizing impact on overall security minimizing impact on overall security One Mitigation package for applications One Mitigation package for applications
For DCOM and Firewall fixesFor DCOM and Firewall fixesApplications added to exception listApplications added to exception list
For Win32 Compatibility fixesFor Win32 Compatibility fixesDatabase Installed on target machineDatabase Installed on target machine
Machine wide fixesMachine wide fixesUninstall option availableUninstall option available
Registry package for Internet Explorer Registry package for Internet Explorer Can be deployed via logon scripts or SMSCan be deployed via logon scripts or SMS
Registry changes can also be done via Registry changes can also be done via group policiesgroup policies
Mitigation PhaseMitigation Phase
Deployment ArchitectureDeployment Architecture
Production Environment
Sales Support
ServersHRServer
Option 1. Log on Scripts Distribute evaluation agents OR fix package via logon scripts
Option 2. Systems Management Server Distribute evaluation agents OR fix package via SMS
NetworkShare
NetworkShare
Log On ScriptsLog On Scripts
System Management
Server
Client
Mitigation Mitigation PackagePackage
Evaluation Evaluation PackagePackage
Deployment Feature HighlightsDeployment Feature Highlights
Easy to distribute and installEasy to distribute and installSelf-installing executableSelf-installing executable
Can be deployed via logon scripts or SMSCan be deployed via logon scripts or SMS
SMS integrationSMS integrationExtends SMS’s existing targeting capabilitiesExtends SMS’s existing targeting capabilities
Deployment of evaluation agentsDeployment of evaluation agents
Deployment of mitigation packagesDeployment of mitigation packages
Consolidation of mitigation solutionsConsolidation of mitigation solutionsOne mitigation package for App issuesOne mitigation package for App issues
Registry fixes for Internet ExplorerRegistry fixes for Internet Explorer
FeatureFeature ACT 3.0ACT 3.0 ACT 4.0ACT 4.0Deployment Task ListDeployment Task List Application inventory agentApplication inventory agent DCOM and Firewall issue detectionDCOM and Firewall issue detection Internet Explorer compatibility test Internet Explorer compatibility test tooltool
Client tool for reporting and Client tool for reporting and analysisanalysis
Tool for creating solutionsTool for creating solutions Tool for packaging solutionsTool for packaging solutions SMS integrationSMS integration DocumentationDocumentation
New Features in ACT 4.0New Features in ACT 4.0
Areas of Continued InvestmentAreas of Continued InvestmentTask Based Interfaces
EvaluationMitigation
Deployment
AppCompat Information Exchange
Leveraging the
community
XML BasedPlatform
Automation and Integration
Automated AgentsSMS Integration
Call to ActionCall to Action
Download ACT 4.0Download ACT 4.0http://www.microsoft.com/windows/appcompatibihttp://www.microsoft.com/windows/appcompatibility/act4.msplity/act4.msp
Give us your feedbackGive us your feedbackPost messages on the newsgroupPost messages on the newsgroupmicrosoft.public.windows.app_compatibilitymicrosoft.public.windows.app_compatibility
Support is offered via Microsoft Support is offered via Microsoft productproductSupport servicesSupport services
http://http://support.microsoft.comsupport.microsoft.com
Your FeedbackYour Feedbackis Important!is Important!Please Fill Out a Survey forPlease Fill Out a Survey forThis Session on CommNetThis Session on CommNet
AppendixAppendix
7 Steps to Get Started with ACT 4.07 Steps to Get Started with ACT 4.0
Top 10 Reasons to Install Top 10 Reasons to Install Windows XP SP2 Windows XP SP2
Step 1: Familiarize Yourself with Step 1: Familiarize Yourself with ACT 4.0ACT 4.0
Download from Download from http://www.microsoft.com/windows/appcohttp://www.microsoft.com/windows/appcompatibility/act4.mspxmpatibility/act4.mspx
Install ACT 4.0Install ACT 4.0Recommended operating systems:Recommended operating systems:
Microsoft Windows XP ProfessionalMicrosoft Windows XP Professional
Microsoft Windows Server 2003Microsoft Windows Server 2003
Note: Individual components support varying Note: Individual components support varying operating systems.operating systems.
Step 1: Familiarize Yourself Step 1: Familiarize Yourself with ACT 4.0with ACT 4.0
ComponentComponent DescriptionDescription OS OS RecommendedRecommended
Application Compatibility Application Compatibility Toolkit (Framework)Toolkit (Framework)
Help files and deployment task listMicrosoft WindowsXP Pro
Microsoft Windows Server 2003
Application AnalyzerApplication Analyzer Client tool for Reporting and Analysis
Application Compatibility Application Compatibility AdministratorAdministrator
Client Tool for applying common compatibility fixes
Internet Explorer Internet Explorer Compatibility EvaluatorCompatibility Evaluator
Client Tool for testing web sites/Web Apps and applications on XPSP2 Windows XP Pro SP2
Collect.exeCollect.exeCollects application inventory on a specified set of computers
Microsoft Windows 98, ME, Microsoft NT4
Microsoft Windows2000 Pro
Microsoft Windows2000 Server
Windows XP
Microsoft Windows Server 2003
WFCE.exe WFCE.exe
DCOMCE.ExeDCOMCE.Exe
Identifies potential application issues related to DCOM and Windows Firewall
Windows XP Pro
Windows Server 2003
Step 1: Familiarize Yourself Step 1: Familiarize Yourself with ACT 4.0with ACT 4.0
Review the prescriptive guidance Review the prescriptive guidance on using ACTon using ACT
Step-by-step tasks divided into three Step-by-step tasks divided into three phasesphases
Track your deployment progress Track your deployment progress in the task listin the task list
In-context help documentationIn-context help documentation
Step 2: Configure Application Step 2: Configure Application AnalyzerAnalyzer
Launch application Launch application analyzeranalyzer
Go to configuration Go to configuration screenscreen
Set up Analyzer SQL Set up Analyzer SQL DBDB
Specify the SQL Server Specify the SQL Server name and click name and click “Refresh”“Refresh”
Type in the name of the Type in the name of the new database to create new database to create and click “Create New” and click “Create New”
(NOTE: you must be a (NOTE: you must be a member of the SQL member of the SQL Server admin role)Server admin role)
Step 2: Configure Application Step 2: Configure Application Analyzer (cont’d)Analyzer (cont’d)
Configure Collector Configure Collector SettingsSettings
set up file share(s) for set up file share(s) for collecting datacollecting data
Application data will be Application data will be collected with Collect.execollected with Collect.exeApplication issue data will Application issue data will be collected with be collected with DCOMCE.exe and DCOMCE.exe and WFCE.exeWFCE.exe
Add the log path(s) to the Add the log path(s) to the list list
Configure the Merger Configure the Merger ServiceService
In Service Control Manager In Service Control Manager find the “merger” servicefind the “merger” serviceConfigure it to log on with Configure it to log on with a user account that has a user account that has privileges on the Analyzer privileges on the Analyzer SQL DB.SQL DB.
Step 2: Configure Application Step 2: Configure Application Analyzer (cont’d)Analyzer (cont’d)
Configure Merger Permissions on Analyzer SQL DBConfigure Merger Permissions on Analyzer SQL DBIn SQL Enterprise Manager expand the Analyzer SQL DB In SQL Enterprise Manager expand the Analyzer SQL DB and click on “Users”.and click on “Users”.
Find the user you added to the Merger service and grant Find the user you added to the Merger service and grant them the role of db_AnalyzerMergerthem the role of db_AnalyzerMerger
Step 2: Configure Application Step 2: Configure Application Analyzer (cont’d)Analyzer (cont’d)
Configure Solution Builder Permissions on Analyzer SQL DBConfigure Solution Builder Permissions on Analyzer SQL DBIn SQL Enterprise Manager expand the Analyzer SQL DB and click In SQL Enterprise Manager expand the Analyzer SQL DB and click on “Users”.on “Users”.
Find the user that you will use to create solutions (mitigation Find the user that you will use to create solutions (mitigation package) and add it to the role of db_SolutionBuilderpackage) and add it to the role of db_SolutionBuilder
Step 3: Collect Application and Issue Step 3: Collect Application and Issue DataData
Inventory ApplicationsInventory ApplicationsRun Collect.exeRun Collect.exe
Located in Located in C:\Program Files\Microsoft C:\Program Files\Microsoft Application Compatibility Toolkit 4\Application Application Compatibility Toolkit 4\Application Analyzer Analyzer
Common command line optionsCommon command line optionsExample: Example: collect.exe /o c:\TestLogscollect.exe /o c:\TestLogs
/o defines output path for logs/o defines output path for logs
Default filename is name of the machineDefault filename is name of the machine
Step 3: Collect Application and Issue Step 3: Collect Application and Issue Data (cont’d)Data (cont’d)
Collect DCOM and Windows Firewall Compatibility Collect DCOM and Windows Firewall Compatibility IssuesIssues
Run DCOMCE.exeRun DCOMCE.exeLocated in Located in C:\Program Files\Microsoft Application C:\Program Files\Microsoft Application Compatibility Toolkit\Application Analyzer\CEAgentsCompatibility Toolkit\Application Analyzer\CEAgentsCommon command line optionsCommon command line options
Example: Example: DCOMCE.exe /o c:\TestLogsDCOMCE.exe /o c:\TestLogs/o defines output path for logs/o defines output path for logsDefault file name is MachineName.Issue.GUIDDefault file name is MachineName.Issue.GUID
Run WFCE.exeRun WFCE.exeLocated in Located in C:\Program Files\Microsoft Application C:\Program Files\Microsoft Application Compatibility Toolkit\Application Analyzer\CEAgentsCompatibility Toolkit\Application Analyzer\CEAgentsCopied to a directory where regular users do not have write Copied to a directory where regular users do not have write access (E.g. access (E.g. c:\Windows\System32c:\Windows\System32))Common command line optionsCommon command line options
Example: Example: WFCE.exe /o c:\TestLogsWFCE.exe /o c:\TestLogs/o defines output path/o defines output pathDefault file name is MachineName.Issue.GUIDDefault file name is MachineName.Issue.GUID/ct defines completion time in hours/ct defines completion time in hours
Step 3: Deploy Collection Agents Step 3: Deploy Collection Agents Using SMS (optional)Using SMS (optional)
Collector and the Compatibility Evaluator Collector and the Compatibility Evaluator Agents can be distributed via the SMS Agents can be distributed via the SMS Deployment WizardDeployment Wizard
Step 3: Collect Application and Issue Step 3: Collect Application and Issue Data (cont’d)Data (cont’d)
Collect Internet Explorer Compatibility Issues Collect Internet Explorer Compatibility Issues Run Internet Explorer Compatibility Evaluator (IECE)Run Internet Explorer Compatibility Evaluator (IECE)
Update IE with the test logging infrastructureUpdate IE with the test logging infrastructure
Run test cases on business critical web applications Run test cases on business critical web applications against Windows XP SP2against Windows XP SP2
Step 4: Process Issue DataStep 4: Process Issue Data
Merge collected Merge collected Data into Analyzer Data into Analyzer SQL DBSQL DB
Launch Application Launch Application AnalyzerAnalyzer
Go to Configuration Go to Configuration screenscreen
Click on “Log Click on “Log Processing”Processing”
Click on “Start Log Click on “Start Log Processing”Processing”
Step 4: Process Issue DataStep 4: Process Issue Data
Get the Latest Issue Data from Get the Latest Issue Data from MicrosoftMicrosoft
Connection via a secure connectionConnection via a secure connection
Step 5: Analyze Issue DataStep 5: Analyze Issue Data
Analyze application compatibility issue dataAnalyze application compatibility issue dataLaunch Application AnalyzerLaunch Application Analyzer
Go to ReportsGo to Reports
Pivot between three data views: Applications, Machines, or Pivot between three data views: Applications, Machines, or IssuesIssues
Step 5: Analyze Issue Data (cont’d)Step 5: Analyze Issue Data (cont’d)
Drill-down to see details of an Drill-down to see details of an applicationapplication
Step 5: Analyze Issue Data (cont’d)Step 5: Analyze Issue Data (cont’d)
Drill-down to see details of an issueDrill-down to see details of an issue
Step 5: Analyze Issue Data (cont’d)Step 5: Analyze Issue Data (cont’d)
Analyze Web application compatibility issue Analyze Web application compatibility issue datadata
View log of reported issuesView log of reported issues
Drill-down into issues to find out more about Drill-down into issues to find out more about them, including work-arounds and mitigationsthem, including work-arounds and mitigations
Step 6: Mitigate Compatibility IssuesStep 6: Mitigate Compatibility Issues
Mitigate Legacy Applications Compatibility IssuesMitigate Legacy Applications Compatibility IssuesRun Compatibility AdministratorRun Compatibility AdministratorApply “Layers” and “Fixes” as appropriateApply “Layers” and “Fixes” as appropriate
Compatibility Layers are designed to “hook” Win32 APIs and Compatibility Layers are designed to “hook” Win32 APIs and emulate the prior behavioremulate the prior behaviorExamplesExamples
Hard-coding paths to Special Folders Hard-coding paths to Special Folders “CorrectFilePaths” “CorrectFilePaths”OS Version Number OS Version Number Version Lie Compatibility Fix Version Lie Compatibility Fix
Generate a custom database of fixes (called a custom SDB)Generate a custom database of fixes (called a custom SDB)Install the custom SDB in order to apply itInstall the custom SDB in order to apply it
Mitigate Internet Mitigate Internet Explorer Compatibility Explorer Compatibility IssuesIssues
Option 1 - Export Option 1 - Export mitigation from IECE mitigation from IECE into a .REG file (Binary into a .REG file (Binary Behaviors, Pop-up Behaviors, Pop-up Blocking , Windows Blocking , Windows RestrictionsRestrictions))
Option 2 - Change IE Option 2 - Change IE security settings security settings globallyglobally
Option 3 - Change Option 3 - Change underlying problem (i.e. underlying problem (i.e. code)code)
Step 6: Mitigate Compatibility Issues Step 6: Mitigate Compatibility Issues (cont.)(cont.)
Step 6: Mitigate Compatibility Issues Step 6: Mitigate Compatibility Issues (cont’d)(cont’d)
Mitigate DCOM and Windows Firewall (WF) Compatibility IssuesMitigate DCOM and Windows Firewall (WF) Compatibility IssuesLaunch Application AnalyzerLaunch Application Analyzer
Filter report to just show DCOM and WF issues you want to mitigateFilter report to just show DCOM and WF issues you want to mitigate
Save report as an ADQ fileSave report as an ADQ file
Copy FixPack.Exe, FixInst.Exe, dbapi.dll, mtadq.dll, and sdbproxy.dll to Copy FixPack.Exe, FixInst.Exe, dbapi.dll, mtadq.dll, and sdbproxy.dll to where your ADQ file is savedwhere your ADQ file is saved
Run Solution Builder to generate a packaged executable of the DCOM and Run Solution Builder to generate a packaged executable of the DCOM and WF fixesWF fixes
Step 7: Deploy MitigationsStep 7: Deploy Mitigations
One EXE package for easy deploymentOne EXE package for easy deploymentDCOM and Firewall fixesDCOM and Firewall fixes
Win 32 compatibility fixesWin 32 compatibility fixes
One registry package for Internet One registry package for Internet Explorer compatibility issuesExplorer compatibility issues
Can also be configured via group policiesCan also be configured via group policies
Top 10 Reasons to Deploy Windows Top 10 Reasons to Deploy Windows XP SP2XP SP21.1. Help protect your PC from harmful attachments.Help protect your PC from harmful attachments.
2.2. Improve your privacy when you’re on the WebImprove your privacy when you’re on the Web
3.3. Avoid potentially unsafe downloadsAvoid potentially unsafe downloads
4.4. Reduce annoying pop-upsReduce annoying pop-ups
5.5. Get firewall protection from startup to shutdownGet firewall protection from startup to shutdown
6.6. Take control of your security settingsTake control of your security settings
7.7. Get the latest updates easilyGet the latest updates easily
8.8. Help protect your e-mail addressHelp protect your e-mail address
9.9. Take action against crashes caused by browser Take action against crashes caused by browser add-onsadd-ons
10.10. Go wireless without the hassleGo wireless without the hassle
We invite you to participate in ourWe invite you to participate in our online evaluationonline evaluation on CommNet,on CommNet,
accessible Friday onlyaccessible Friday only
If you choose to complete the evaluation online, If you choose to complete the evaluation online, there isthere is no need to complete the paper evaluationno need to complete the paper evaluation
© 2005 Microsoft Corporation. All rights reserved.This presentation is for informational purposes only. Microsoft makes no warranties, express or implied, in this summary.