Synopses & Reviews
The Windows 2000 Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows 2000 Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book, which is an update of Managing the Windows NT Registry, addresses four main areas:
- What is the Registry? Where does it live on disk? How do system services access and use it? What do you do if it's damaged or corrupted? Every 2000 administrator faces questions like this, often in a desperate attempt to fix something that's broken.
- What tools are available? Detailed descriptions of Regedit, RegEdt32, the System Policy Editor, Group Policy Editor and selected Resource Kit utilities explain how to edit and secure the Registry both on local and on remote computers.
- How can I access the Registry from a program? Regularly monitoring the Registry's contents is one way to preclude unpleasant surprises. Using examples in C++, Visual Basic, and Perl, Managing the Windows 2000 Registry demonstrates how to create Registry-aware tools and scripts.
- What's in the Registry? Not all Registry keys are adequately documented by Microsoft or by the other vendors who store configuration data in the Registry. Managing the Windows 2000 Registry offers a guided tour of some of these undocumented keys.
This book is a "must have" for every 2000 system manager or administrator.
Synopsis
This is the system administrator's guide to maintaining, monitoring, and updating the Registry database. A "must-have" for every 2000 systems manager or administrator, it covers what the Registry is and where it lives on the disk, available tools, Registry access from programs, and Registry content.
About the Author
Paul Robichaux is an experienced consultant who specializes in Exchange. Besides a dozen or so successful books, he has written regular weekly and monthly columns on Exchange for years. Microsoft recognized Paul's knowledge and community participation when the company selected him as an Exchange Most Valuable Professional (MVP), an honor given to a few dozen product-area experts each year. Paul is a prolific author who's written successful books for O'Reilly (most notably Managing Exchange Server).
Table of Contents
Preface; Keys and Values and Classes, Oh My!; Who's This Book For?; How This Book Is Organized; Conventions Used in This Book; Comments and Questions; Acknowledgments; Chapter 1: A Gentle Introduction to the Registry; 1.1 A Brief History of the Registry; 1.2 What Does the Registry Do?; 1.3 Advantages Offered by the Registry; 1.4 Registry Zen; Chapter 2: Registry Nuts and Bolts; 2.1 How the Registry Is Structured; 2.2 What Goes in the Registry; 2.3 Getting Data In and Out; Chapter 3: In Case of Emergency; 3.1 Don't Panic!; 3.2 Safety Strategies; 3.3 All About Emergency Repair Disks; 3.4 Backing Up the Registry; 3.5 Restoring a Backed-up Registry; Chapter 4: Using RegEdit; 4.1 Know Your Limitations; 4.2 Learning the RegEdit Interface; 4.3 "Just Browsing, Thanks"; 4.4 Connecting to Other Machines' Registries; 4.5 Searching for Keys and Values; 4.6 Printing Registry Contents; 4.7 Working with Keys and Values; 4.8 Exporting and Importing Data; 4.9 RegEdit Command-Line Options; Chapter 5: Using RegEdt32; 5.1 How RegEdt32 and RegEdit Differ; 5.2 Learning the RegEdt32 Interface; 5.3 Browsing with RegEdt32; 5.4 Remote Registry Editing; 5.5 Searching for Keys; 5.6 Saving and Loading Registry Keys; 5.7 Printing Registry Contents; 5.8 Editing Keys and Values; 5.9 Registry Security Fundamentals; 5.10 Securing Registry Keys in Windows 2000; 5.11 Securing Registry Keys in Windows NT; Chapter 6: Using the System Policy Editor; 6.1 All About System Policies; 6.2 Introducing the System Policy Editor; 6.3 Managing Policies with POLEDIT; 6.4 Distributing Policies; 6.5 What's in the Standard Policy Templates; 6.6 Picking the Right Policies; Chapter 7: Using Group Policies; 7.1 What Are Group Policies?; 7.2 Introducing the Group Policy Snap-in; 7.3 Managing Policies; 7.4 Distributing Policies; 7.5 What's in the Standard Policy Templates?; Chapter 8: Programming with the Registry; 8.1 The Registry API; 8.2 The Shell Utility API Routines; 8.3 Programming with C/C++; 8.4 Programming with Perl; 8.5 Programming with Visual Basic; Chapter 9: Administering the Registry; 9.1 Setting Defaults for New User Accounts; 9.2 Using Initialization File Mapping; 9.3 Limiting Remote Registry Access; 9.4 Fixing Registry Security ACLs in Windows NT; 9.5 Adding Registry ACLs to Group Policy Objects; 9.6 Encrypting HKLM\SAM with SYSKEY; 9.7 Miscellaneous Good Stuff; 9.8 Using the Resource Kit Registry Utilities; 9.9 reg: The One-Size-Fits-All Registry Tool; 9.10 Spying on the Registry with RegMon; Chapter 10: Registry Tweaks; 10.1 User Interface Tweaks; 10.2 Filesystem Tweaks; 10.3 Security Tweaks; 10.4 Performance Tweaks; 10.5 Network Tweaks; 10.6 Printing Tweaks; Chapter 11: The Registry Documented; 11.1 What's Here and What's Not; 11.2 HKLM\HARDWARE; 11.3 HKLM\SOFTWARE; 11.4 HKLM\SYSTEM; 11.5 HKU; 11.6 HKCR; 11.7 HKCU; 11.8 HKCC; 11.9 HKDD; User Configuration Group Policy Objects; Administrative Templates; Computer Configuration Group Policy Objects; Windows Settings; Administrative Templates; Colophon;