Académique Documents
Professionnel Documents
Culture Documents
• Accessibility - Five tabs are keyboard, sound (Can have visible sound indications), display, mouse(Can move the
mouse with the keyboard), and general (alternatives to keyboard and mouse).
• Add/Remove Hardware - Can add and remove hardware device drivers for display devices, CDROM and DVD
drives, I/O devices (Keyboard, mouse, USB devices and more), Mobile computer hardware, modems, multimedia,
and network cards. A device driver is a software3 program that allows the system to interact with hardware. If the
driver is signed, it has a digital signature from its creator verifying its authenticity.
• Add/Remove Programs - Allows programs to be installed or removed from the system including optional Windows
2000 components. Vendor programs must be written to use this applet.
• Administrative Tools - Only the members of the Administrators group can use these tools.
• Console - Allows settings for MS-DOS console. Uses four tabs which are options (for cursor size, command history,
and display options), font, layout, and colors tabs.
• Date/Time
• Display - Tabs are Background, Screen Saver, Appearance, Web, Effects, and Settings( Sets the video mode). The
Screen saver allows power settings to be adjusted along with selection of the screen saver. Appearance tab adjusts
the Windows color schemes. The Web tab allows a specific web page to be displayed all the time on the desktop.
The effects tab allows desktop icons to be changed. The Settings tab allows screen size and colors to be changed.
• Fax - Is used to configure Fax information and access theFax Service Management Console which allows a Fax to
be setup to receive or send faxes. It is also accessed using "Start", "Programs", "Accessories", "Communications",
and "Fax".
• Folder Options - Allows the way files and folders are displayed to be modified. It includes the tabs "General", "View",
"File Types", and "Offline Files". The View tab allows settings to specify whether the whole path is displayed, and
whether hidden files are shown. The File Types tab specifies the application to be used to open files with extensions
of specific types. The Offline Files tab allows setting of whether offline files are displayed and worked on. Once
changed these files may be placed back into the online source. The default setting is on for Windows Professional
and off for Windows Servers.
• Fonts - Allows viewing of current fonts and installation of new fonts. It is a shortcut to the fonts folder.
• Game Controllers- Allows configuration of joysticks and gamepads.
• Internet Options - These are options for Internet Explorer. They can be accessed from the Tools menu of IE. Tabs
include General (Control of temporary files, history, and home page), Security (Allows trusted site settings, cookie
settings, JavaScript settings and more), Content (Allows certificates, and storage of private information),
Connections, Programs (Specification of programs for e-mail, HTML editing, newsgroups, and more), and Advanced
tabs(JavaScript debugging options, HTML versions and more).
• Keyboard - Includes Speed, Input Locales (assign hotkeys), and Hardware (physical type of keyboard) tabs.
• Mouse and mouse pointer settings including mouse speed - Tabs include, Buttons (to set right or leeft handed
mouse), Motion (speed), Pointers (Selection of mouse icons for normal, waiting, and other states), and Hardware
(Sets up the mouse type such as PS2 Intellimouse and options available in the Device Manager).
• Network and Dial-up Connection - Can change computer name, and set to workgroup or domain. bindings are set
here with the first one on the list to be the first one tried when services are attempted to be used. Also used to install
NIC drivers. Tabs are:
o Identification - computer name and domain or workgroup name
o Services - Can add, or remove services and check their properties.
o protocols - Can add or remove protocols or check their setup (properties).
o Adapters - Add or remove NIC adapter drivers.
o bindings - Where the binding priority may be set for various services.
• Phone and Modem Options - Modem properties and dialing rules are configured here.
• Power Options - Settings for how long hard drives and the monitor stays on are configured here. Tabs are "Power
Schema", "Advanced", "Hibernate", "APM", and "UPS". The Power Schema tab controls how long of a period of
inactivity to wait before turning off the monitor and hard drives. The Advanced Power Management (APM) tab
controls older power management for laptops. The UPS tab is used to configure commands to execute when a UPS
event occurs.
• Printers - Allows addition and deletion of printers. Right clicking and selection properties for a specific printer, opens
a properties window with General (Driver Selection, Separator page, print processor [RAW, text], print test page),
ports, Scheduling (priority, When printing starts relative to spooling, Hours of availability), Sharing, Security, and
About tabs.
• Regional Options - Set up regional and language settings for NT. Select General, Numbers, Currency, Time, Date,
or Input Locales tabs. The Regional Options tab is used to add additional language support.
• Scanners and Cameras - Digital cameras and scanners may be installed and configured here.
1
• Scheduled Tasks - Also called the "Task Scheduler", it is used to schedule programs or scripts to run at specific
times. An "Add Scheduled Task" icon is in this folder.
• Sounds and Multimedia - Used to setup sound schemes and sounds to play for specific events. Tabs are "Sounds",
"Audio", and "Hardware". The Sounds tab is used to associate events and sounds. The Audio tab allows the device to
use for playing and recording sound to be set. The Hardware tab is used to configure and view multimedia devices.
• System
o General - Describes the name and version of the system, who it is registered to and the hardware it is
running on.
o Network Identification - Allows the changing of the computer name, workgroup, or domain.
o Hardware - Allows selection of hardware profiles and what to do if the system cannot determine which profile
to use. Includes Hardware Wizard, Device Manager, and Hardware Profiles sections. The Hardware Profiles
section allows additional hardware profiles to be created. The Device Manager section includes a Device
Manager and a Driver Signing button. The Device signing allows configuration of what to do when system
files are not digitally signed. Options are Ignore, Warn, or Block. Sigverif command line utility is used to
find unsigned files on the computer. Sfc.exe command line utility is used to replace any unsigned
files with the original Microsoft version from the SystemRoot\System32\Dllcache directory. The
device manager includes the ability to configure:
Computer - Used to configure for multiple processors.
Disk drives
Display adapters
DVD/CD-ROM drives
Floppy disk controllers
Floppy disk drives
IDE ATA/ATAPI controllers
Imaging devices
Infared devices
Keyboards
Mice and other pointing devices
Modems
Monitors
Network adapters
PCMCIA adapters - (Card Services)
Ports (COM & LPT)
Sound, video and game controllers
System devices
Universal Serial Bus controllers
o User Profiles - Allows user profiles to be added and changed which will affect desktop settings. Roaming
profiles may be set using this tab.
o Advanced - Used to set:
Environment variables - Used to set environment variables. If the path is modified to include
applications run on Win95, these applications can be run when using a dual boot system or
migrating from Windows 95.
Performance options- Allows performance to be optimized for applications or background services
(all programs with equal priority). Also allows configuration of page files.
Startup and shutdown options - Allows default selection of system to boot and amount of delay
before timeout. Allows selection of what to do when a stop error occurs. More than one choice may
be selected.
Write an event to the system log
Send an administrative alert
Automatically reboot
Write debugging information (selection of none, small, kernel dump, and complete
memory dump) to a specified file (default is Memory.dmp).
• Users and Passwords (Only on 2000 Professional) - Manage user access and passwords on this computer.
• Wireless Link - Configuration of infared devices. Tabs include "File Transfer", "Image Transfer", and "Hardware".
• ports - Allows configuration of serial and parallel ports.
• SCSI Adapters - SCSI adapters may be added or removed here. They are not configured here but may be
configured at boot time using the manufacturer bIOS.
• Server - Tells who is connected, see shared resources, directory replication.
o Users - Shows users logged onto the domain and where they are logged on from. (NT Server ONLY)
o Shares - Shows resource name and path along with connected users.
2
o In Use - Shows resources being used and the associated permissions.
o Replication - Allows setup of directory replication.
o Alerts - Controls where administrative alerts are sent
• Services - Can start or stop services or set them to automatically start when the system is booted. Description
entries include:
o Service - The name of the service.
o Status - Whether the service is running.
o Startup - Manual or automatic.
buttons include:
o Start
o Stop
o pause
o Continue - Restart a service that is paused.
o Startup - Set the service to be started by selecting one ot the radio buttons automatic, manual or disabled.
Can also select one of two radio buttons called "System Account" or "This Account".
o HW profiles - Allows selection of the hardware profile the service is being configured for.
There is also a "Startup parameters" text box used to configure special startup parameters for the service.
UpS - Configure the UpS. UpS command configuration is configured here so the systems may receive information from the
UpS unit. Commands can be programmed here to execute when a UpS event occurs.
This section only describes control panel applets and features not described for Windows 2000 Professional.
The Windows Registry is a database which stores settings and options for Microsoft
Windows operating systems. It contains information and settings for all the hardware,
operating system software, most non-operating system software, and per-user settings. The
3
registry also provides a window into the operation of the kernel, exposing runtime
information such as performance counters and currently active hardware.
Hives
The Registry is split into a number of logical sections, or "hives"[3] (the reason the word hive was used is an in-
joke[4]) Hives are generally named by their Windows API definitions, which all begin "HKEY". They are abbreviated to
a three- or four-letter short name starting with "HK" (e.g. HKCU and HKLM).
The HKEY_LOCAL_MACHINE and HKEY_CURRENT_USER nodes have a similar structure to each other; applications
typically look up their settings by first checking for them in "HKEY_CURRENT_USER\Software\Vendor's
name\Application's name\Version\Setting name", and if the setting is not found look instead in the same location
under the HKEY_LOCAL_MACHINE key. When writing settings back, the reverse approach is used —
HKEY_LOCAL_MACHINE is written first, but if that cannot be written to (which is usually the case if the logged-in
user is not an administrator), the setting is stored in HKEY_CURRENT_USER instead.
[edit] HKEY_CURRENT_CONFIG
Abbreviated HKCC, HKEY_CURRENT_CONFIG contains information gathered at runtime; information stored in this
key is not permanently stored on disk, but rather regenerated at the boot time.
[edit] HKEY_PERFORMANCE_DATA
This key provides runtime information into performance data provided by either the NT kernel itself or other
programs that provide performance data. This key is not displayed in the Registry Editor, but it is visible through the
registry functions in the Windows API.
4
[edit] HKEY_DYN_DATA
This key is used only on Windows 95, Windows 98 and Windows Me. [6] It contains information about hardware
devices, including Plug-and-Play and network performance statistics. The information in this hive is also not stored
on the hard drive. The Plug and Play information is gathered and configured at startup and is stored in memory. [7]
Windows 2000 has 2 Group Types - Security and Distribution. Security groups are used to assign permissions for access to
network resources. Distribution groups are used to group users together for Email distribution lists. Security groups can be
used as a Distribution Group, but Distribution Groups cannot be used as Security Groups. Proper planning of group
structure affects maintainability in the future, especially in the enterprise environment where multiple domains are involved.
Win2K groups (both security and distribution) are classified into one of three group scopes - Domain Local, Global and
Universal. Below you can see how these groups are used. Although Local Groups are not considered part of the Win2k
group scope, they are included for your information.
Group Scope
Local Groups (or machine local groups) - For backward compatibility with NT, there are local groups. Also called Builtin
Local Groups.
They are the only type of local group available in a Windows 2000 mixed-mode domain.
Local groups can have members from anywhere in the forest, from trusted domains in other forests, and from trusted
down-level domains.
A local group has only machine-wide scope. It can be used to grant resource permission only on the machine on which it
exists. However, the local groups on a domain controller are available on every domain controller in that domain.
Domain Local groups – assign access permissions to domain global groups for local domain resources.
Available only in native mode (not mixed-mode) domains if you want to use them as anything other than machine local
groups on DCs only.
Can have members from anywhere in the forest, from trusted domains in other forests, and from trusted down-level
domains.
They have domain-wide scope, can be used to grant resource permission on any Win2K machine within the domain in
which it exists, but not beyond. Used as a resource group.
Notes:
Groups having global or domain local scope are also listed in the global catalog, but the individual members of the group
are not. Using these groups will reduce the size of the global catalog and replication traffic.
Microsoft advises against using Domain Local groups when filtering Group Policy objects. See this KB article for more info:
http://support.microsoft.com/default.aspx?scid=kb;[LN];309172
5
Group Scope Allowable Objects Native Mode Replication
Domain Local Computer accounts, users, global groups and Group object and its membership are
universal groups from any domain. Domain replicated only to DCs within the same
Local groups from the same domain. Nest in domain; not included in GC (Global Catalog)
other Domain Local groups in same domain. replication to other domains.
Domain Global Only users, computers and global groups from Group object is replicated to all DCs in the
same domain. Nest in other Global (in same same domain and to all GCs in the forest.
domain), Domain Local, or Universal groups. Membership is replicated only to DCs within
the domain.
Universal Universal groups, global groups, users and Group object and its membership are
computers from any domain in the forest. replicated to all GC servers in the forest.
Nest in Global, Domain Local or Universal
groups.
Domain Local Computer accounts, users, global groups from Same as Native Mode
any domain. Cannot be nested.
Domain Global Only users and computers from same domain. Same as Native Mode
Cannot be nested.
Built-In Groups - There is another category of groups that you will see if you open Active Directory Users and Computers.
It is called Builtin. The Built-in groups are groups that Windows 2000 creates for you. They have a predetermined set of
user rights and group membership, and can be used to assign permissions to network resources. You can find Built-in
groups in the Builtin folder and in the Users folder.
Using Groups
The official Microsoft-sanctioned method for using groups in a domain setting is known
as the A-G-DL-P method.
Of course, always following this method is not practical. You have to use common sense and judgment when assigning
groups to permissions. The above is just an official Microsoft guideline.
Special Identities
There are also some special groups, referred to as Identities, because they are managed by the system and not by
administrators. They are also automatically installed on all Windows 2000 computers. However, they do not appear in
Active Directory Users and Computers, or in the Computer Management Tool. Here are the special identities:
Everyone: Represents all current network users, including guests and users from other domains. Whenever a user logs on
to the network, they are automatically added to the Everyone group.
Network: Represents users currently accessing a given resource over the network (as opposed to users who access a
resource by logging on locally at the computer where the resource is located). Whenever a user accesses a given resource
over the network, they are automatically added to the Network group.
6
Interactive: Represents all users currently logged on to a particular computer and accessing a given resource located on
that computer (as opposed to users who access the resource over the network). Whenever a user accesses a given resource
on the computer to which they are currently logged on, they are automatically added to the Interactive group.
Anonymous Login: The Anonymous Login group refers to any user who is using Windows 2000 resources, but that didn’t
go through the authentication process.
Authenticated User: The Authenticated User group includes all users who are authenticated into the network by using a
valid user account. When assigning permissions, you can use the Authenticated User group in place of the Everyone group
to prevent anonymous access to resources.
Creator Owner: The Creator Owner group refers to the user who created or took ownership of the resource that you’re
assigning permissions to. For example, if the User Jack created a resource, but the Administrator took ownership of it, then
the Creator Owner would be the Administrator.
Dialup: The Dialup group includes anyone who’s currently connected to the network through a dialup connection.
These groups can be assigned permissions to network resources, although caution should be used when assigning some of
these groups to permissions. Members of these groups are not necessarily users who have been authenticated to the
domain. For instance, if you assign full permissions to a share for the Everyone Group, users connecting from other
domains will have access to the share.
Domain Computers and Member Servers can add the following users/groups to the ACLs of their local resources:
Domain Controllers can add the following users/groups to the ACLs of their local resources:
Profile shows an organization exactly how good they are and what areas they can
focus on to enable further improvements and productivity gains
Profile opens up new possibilities for the development of your organisation and it’s performance. Though it is still
based on the same 3 principles as the Standard - Plan, Do and Review - it goes beyond the current scope of the
Standard.