Synopses & Reviews
Get the in-depth information you need to modify—and seamlessly manage—the Windows registry. Written for IT professionals and power users, this vital resource reveals little-known registry techniques, tricks, tips, and secrets to make your job easier. Understand the inner workings of the Windows operating system—and use the registry to get Windows Server 2003 and Windows XP to run the way you want, on a single desktop or across the network. You’ll learn how to pinpoint registry settings and script registry changes, deal with registry permissions, use Windows Installer, and map Tweak UI settings. Also, find best practices for how to back up, restore, and maintain registry settings with confidence. The CD includes 100+ registry files for customizing operating system appearance and behavior, and the complete eBook. You’ll learn how to: Apply best practices to back up, restore, manage, and modify the registry Customize group and system policies to manage multiple PCs and users remotely Track down registry settings and script changes Optimize server services, including network connections and authentication Deploy user profiles and Microsoft Office program settings Configure security services, including Windows Firewall, templates, and service pack features Troubleshoot the registry—resolving common problems and corruption issues
For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
About the Author
Jerry Honeycutt, MVP for Windows, is a popular author with more than 25 books to his credit, including Microsoft Windows Desktop Deployment Resource Kit. In addition, he is a columnist for Windows XP Expert Zone and Microsoft TechNet.
Table of Contents
Acknowledgments; Introduction; This Book Is DifferentReally; Power Users First, Then IT Professionals; Some Terminology; Why I Love Windows XP; Sample Files and Scripts; Resource Kit Support Policy; Final Note; System Requirements; Part I: Registry Overview; Chapter 1: Learning the Basics; Heart and Soul of Windows; Registry Warnings and Myths; Must-Know Concepts; Registry Structure; Registry Organization; Registry Management Tools; Registry Hive Files; Chapter 2: Using Registry Editor; Running Regedit; Regedit; Searching for Data; Editing the Registry; Printing the Registry; Exporting Settings to Files; Working with Hive Files; Getting Beyond Basics; Chapter 3: Backing Up the Registry; Editing the Registry Safely; Using System Restore; Backing Up the Registry Regularly; Backing Up User Settings; Chapter 4: Hacking the Registry; Redirecting Special Folders; Customizing Shell Folders; Reorganizing Control Panel; Customizing File Associations; Adding File Templates; Preventing Messenger from Running; Personalizing the Start Menu; Disabling Windows Tour; Creating Program Aliases; Customizing Internet Explorer; Clearing History Lists; Running Programs at Startup; Controlling Registry Editor; Logging On Automatically; Changing User Information; Looking for More Hacks; Chapter 5: Mapping Tweak UI; General; Mouse; Explorer; Common Dialog Boxes; Taskbar and Start Menu; Desktop; My Computer; Control Panel; Templates; Internet Explorer; Command Prompt; Logon; Chapter 6: Configuring Servers; Server Customizations; Authentication; Internet Information Services; Network Connections; Shutdown Event Tracker; Part II: Registry in Management; Chapter 7: Using Registry-Based Policy; Editing Local Policies; Extending Registry-Based Policy; Deploying Registry-Based Policy; Customizing Windows; Using the Group Policy Tools; Using DesktopStandard PolicyMaker; Finding More Resources; Chapter 8: Configuring Windows Security; Setting Permissions for Keys; Mapping Default Permissions; Taking Ownership of Keys; Auditing Registry Access; Preventing Local Registry Access; Restricting Remote Registry Access; Deploying Security Templates; Configuring New Security Features; Internet Explorer Privacy Settings; Internet Explorer Security Zones; Chapter 9: Troubleshooting Problems; Fixing Corrupt Settings; Recovering from Disasters; Diagnosing Registry Corruption; Repairing a Corrupt Registry; Chapter 10: Finding Registry Settings; Comparing REG Files; Comparing with Reg.exe; Auditing the Registry; Monitoring the Registry; Chapter 11: Scripting Registry Changes; Choosing a Technique; Installing INF Files; Setting Values with REG Files; Editing from the Command Prompt; Scripting Using Windows Script Host; Creating Windows Installer Packages; Part III: Registry in Deployment; Chapter 12: Deploying User Profiles; Exploring User Profiles; Getting User Profiles; Using Roaming User Profiles; Deploying Default User Profiles; Coexisting with Earlier Versions of Windows; Migrating User Settings to Windows; Chapter 13: Mapping Windows Installer; Repairing Registry Settings; Managing Windows Installer with Policies; Removing Windows Installer Data; Inventorying Applications; Chapter 14: Deploying with Answer Files; Creating Distribution Folders; Customizing Answer Files; Adding Settings to Unattend.txt; Adding Multiple Settings with One Script; Logging On Automatically After Installation; Chapter 15: Cloning Disks with Sysprep; Cloning Windows; Building a Disk Image; Reducing Image Count; Removing the Paging File; Mapping Sysprep Settings; Keeping Perspective; Chapter 16: Configuring Windows PE; Exploring Windows PE; Using Windows PE as an Installation Platform; Customizing Windows PE; Starting Windows PE; Automating Installations; Chapter 17: Deploying Office 2003 Settings; Profile Wizard; Custom Installation Wizard; Custom Maintenance Wizard; Group and System Policy; Chapter 18: Fixing Common IT Problems; Controlling Just-in-Time Setup; Removing Components; Removing Policy Tattoos; Elevating Privileges of Processes; Severing File Associations; Deploying Office Trusted Sources; Enabling Remote Desktop Remotely; Customizing the Windows Logon; Restoring Administrative Shares; Changing Source Location; Part IV: Appendixes; Appendix A: File Associations; Merge Algorithm; File Exteeeeeension Keys; Program Class Keys; Specialized Keys; COM Class Keys; Appendix B: Network Settings; HKCU\Network; HKLM\SYSTEM\CurrentControlSet\Services; Appendix C: Per-User Settings; AppEvents; Console; Control Panel; Environment; Keyboard Layout; Network; Printers; SessionInformation; Software; Software\Microsoft\Windows\CurrentVersion; Appendix D: Per-Computer Settings; HARDWARE; SAM; SECURITY; SOFTWARE; SOFTWARE\Microsoft\Windows\CurrentVersion; SYSTEM; Appendix : About the Author;