Tài liệu Microsoft Windows XP Registry Guide ppt

440 1.3K 0
Tài liệu Microsoft Windows XP Registry Guide ppt

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

Microsoft Windows XP Registry Guide Table of Contents Microsoft Windows XP Registry Guide 1 Introduction 4 This Book Is Different—Really 4 Power Users First; Then IT Professionals 5 Some Terminology 6 Gotta Love Windows XP 7 Final Note 7 Part I: Registry Overview 9 Chapter List 9 Part Overview 9 Chapter 1: Learning the Basics 10 Overview 10 Heart and Soul of Windows XP 10 For Power Users 11 For IT Professionals 12 Registry Warnings and Myths 14 Must−Know Concepts 14 Security Identifiers 14 Globally Unique Identifiers 17 Hexadecimal Notation 17 Bits and Bit Masks 18 Little−Endian and Big−Endian 19 ANSI and Unicode Encoding 20 Null and Empty Strings 20 Structure of the Registry 20 Keys 22 Values 23 Types 24 Organization of the Registry 26 HKEY_USERS 27 HKEY_CURRENT_USER 28 HKEY_LOCAL_MACHINE 29 HKEY_CLASSES_ROOT 29 HKEY_CURRENT_CONFIG 30 Registry Management Tools 30 Registry Hive Files 31 Hives in HKLM 31 Hives in HKU 32 Chapter 2: Using the Registry Editor 33 Overview 33 Running Regedit 33 Exploring Regedit 34 Key Pane 35 Value Pane 36 Searching for Data 37 Searching Incrementally 38 i Table of Contents Chapter 2: Using the Registry Editor Searching in Binary Values 38 Bookmarking Favorite Keys 39 Using Better Techniques 40 Editing the Registry 41 Changing Values 41 Adding Keys or Values 44 Deleting Keys or Values 45 Renaming Keys or Values 45 Printing the Registry 46 Exporting Settings to Files 47 Registration Files 48 Win9x/NT4 Registration Files 49 Hive Files 50 Text Files 51 Working with Hive Files 51 Getting Beyond Basics 52 Chapter 3: Backing up the Registry 53 Overview 53 Editing the Registry Safely 53 Copying Single Values 54 Backing Up to REG Files 55 Backing Up to Hive Files 55 Fixing Corrupt Settings 57 Allowing Windows XP to Fix Errors 58 Repairing an Application's Settings 59 Removing Programs from the Registry 61 Using Another Computer's Settings 62 Using System Restore 62 Taking Configuration Snapshots 63 Peeking Under the Covers 64 Managing System Restore 66 Hacking System Restore 66 Scripting System Restore 67 Backing Up the Registry Regularly 68 Planning a Backup Strategy 69 Backing Up System State Data 70 Restoring System State Data 71 Backing Up User Settings 72 Recovering from Disasters 73 Advanced Options Menu 73 Recovery Console 74 Automated System Recovery 76 Chapter 4: Hacking the Registry 78 Overview 78 Redirecting Special Folders 78 Customizing Shell Folders 80 Renaming Desktop Icons 82 ii Table of Contents Chapter 4: Hacking the Registry Using Custom Icon Images 83 Adding Desktop Icons 83 Hiding Desktop Icons 85 Customizing File Associations 85 Running Programs from My Computer 86 Open Command Prompts at Folders 88 Rooting Windows Explorer at a Folder 89 Adding InfoTips to Program Classes 90 Adding File Templates 92 Preventing Messenger from Running 93 Personalizing the Start Menu 93 Configuring the Menu's Contents 94 Trimming the Frequently Used Programs List 96 Restoring the Sort Order 97 Customizing Internet Explorer 98 Extending the Shortcut Menus 98 Changing the Toolbar Background 99 Customizing Search URLs 99 Clearing History Lists 102 Running Programs at Startup 102 Controlling Registry Editor 103 Default Action for REG Files 103 Storing Window Position and Size 103 Logging On Automatically 104 Changing User Information 104 Looking for More Hacks 105 Chapter 5: Mapping Tweak UI 106 Overview 106 General 106 Focus 108 Mouse 109 Hover 110 Wheel 110 X−Mouse 110 Explorer 111 Shortcut 112 Colors 113 Thumbnails 113 Command Keys 114 Common Dialog Boxes 115 Taskbar 116 Grouping 116 XP Start Menu 117 Desktop 118 First Icon 119 My Computer 119 Drives 119 Special Folders 120 iii Table of Contents Chapter 5: Mapping Tweak UI AutoPlay 121 Control Panel 122 Templates 122 Internet Explorer 123 Search 123 View Source 124 Command Prompt 125 Logon 125 Autologon 125 Part II: Registry in Management 127 Chapter List 127 Part Overview 127 Chapter 6: Using Registry−Based Policy 128 Overview 128 Editing Local Policies 128 Group Policy Extensions 130 Registry−Based Policy 131 Group Policy Storage 134 Extending Registry−Based Policy 135 Comments 137 Strings 137 CLASS 138 CATEGORY 139 KEYNAME 140 POLICY 140 EXPLAIN 142 VALUENAME 142 VALUEON and VALUEOFF 142 ACTIONLIST 142 PART 143 CHECKBOX 145 COMBOBOX 147 DROPDOWNLIST 148 EDITTEXT 150 LISTBOX 151 NUMERIC 152 TEXT 154 Deploying Registry−Based Policy 155 Windows 2000 Server−Based Networks 155 Windows NT−Based and Other Networks 156 Customizing Windows XP 157 Using the Group Policy Tools 159 Gpresult 159 Gpupdate 160 Help and Support Center 161 Resultant Set of Policy 162 Finding More Resources 163 iv Table of Contents Chapter 7: Managing Registry Security 164 Overview 164 Setting Keys' Permissions 164 Adding Users to ACLs 166 Removing Users from ACLs 166 Assigning Special Permissions 167 Mapping Default Permissions 168 Taking Ownership of Keys 172 Auditing Registry Access 173 Preventing Local Registry Access 174 Restricting Remote Registry Access 175 Deploying Security Templates 175 Creating a Security Management Console 176 Choosing a Predefined Security Template 177 Building a Custom Security Template 178 Analyzing a Computer's Configuration 179 Modifying a Computer's Configuration 180 Deploying Security Templates on the Network 181 Chapter 8: Finding Registry Settings 182 Comparing REG Files 182 Using WinDiff 184 Using Word 2002 185 Comparing with Reg.exe 186 Auditing the Registry 187 Setting Audit Policy 188 Auditing Registry Keys 188 Analyzing the Results 189 Monitoring the Registry 189 Using Winternals Regmon 189 Filtering for Better Results 191 Part III: Registry in Deployment 192 Chapter List 192 Part Overview 192 Chapter 9: Scripting Registry Changes 193 Overview 193 Choosing a Technique 193 Installing INF Files 194 Starting with a Template 195 Linking Sections Together 197 Adding Keys and Values 198 Deleting Keys and Values 200 Setting and Clearing Bits 200 Using Strings in INF Files 202 Setting Values with REG Files 203 Exporting Settings to REG Files 204 Creating REG Files Manually 205 Encoding Special Characters 206 v Table of Contents Chapter 9: Scripting Registry Changes Deleting Keys Using a REG File 207 Editing from the Command Prompt 207 Adding Keys and Values 208 Querying Values 209 Deleting Keys and Values 209 Comparing Keys and Values 210 Copying Keys and Values 211 Exporting Keys to REG Files 211 Importing REG Files 212 Saving Keys to Hive Files 212 Restoring Hive Files to Keys 212 Loading Hive Files 212 Unloading Hive Files 213 Scripting Using Windows Script Host 213 Creating Script Files 214 Running Script Files 215 Formatting Key and Value Names 217 Adding and Updating Values 218 Removing Keys and Values 218 Querying Registry Values 219 Creating Windows Installer Packages 219 Chapter 10: Deploying User Profiles 221 Overview 221 Exploring User Profiles 221 Profile Hives 224 Profile Folders 224 Special Profiles 227 Getting User Profiles 228 Local Profiles 228 Roaming Profiles 229 Using Roaming User Profiles 230 Managing Roaming User Profiles 232 Understanding Fast Network Logon 233 Understanding the New Merge 234 Deploying Default User Profiles 235 Customizing User Settings 236 Cleaning User Profiles 237 Creating Default User Folders 239 Deploying Default User Folders 240 Coexisting with Earlier Versions of Windows 240 Migrating User Settings to Windows XP 241 Files And Settings Transfer Wizard 241 User State Migration Tool 242 Chapter 11: Mapping Windows Installer 243 Overview 243 Repairing Registry Settings 243 Managing Windows Installer with Policies 244 vi Table of Contents Chapter 11: Mapping Windows Installer Installing with Elevated Privileges 246 Caching Transforms in Secure Location 247 Locking Down Windows Installer 247 Removing Windows Installer Data 248 Msizap.exe 248 Msicuu.exe 249 Inventorying Applications 250 Chapter 12: Deploying with Answer Files 253 Overview 253 Creating Distribution Folders 253 Customizing Answer Files 255 Setup Manager 258 Notepad and Other Text Editors 260 Adding Settings to Unattend.txt 262 [GuiRunOnce] 262 Cmdlines.txt 263 Logging On Automatically After Installation 264 Chapter 13: Cloning Disks with Sysprep 266 Overview 266 Cloning Windows XP 266 Windows XP Tools 268 Sysprep Limitations 268 Building a Disk Image 269 Customizing Mini−Setup 270 Preparing for Duplication 272 Cloning the Disk Image 272 Reducing Image Count 275 Filling SysprepMassStorage Manually 275 Filling SysprepMassStorage Automatically 276 Cleaning Up After Sysprep 276 Mapping Sysprep Settings 277 Keeping Perspective 278 Chapter 14: Microsoft Office XP User Settings 280 Overview 280 Profile Wizard 280 Customizing the Wizard 281 Capturing Settings 288 Deploying Settings 289 Custom Installation Wizard 290 Add/Remove Registry Entries 291 Customize Default Application Settings 292 Change Office User Settings 293 Add Installations and Run Programs 294 Custom Maintenance Wizard 295 Group and System Policy 295 vii Table of Contents Chapter 15: Working Around IT Problems 298 Controlling Just−in−Time Setup 298 Outlook Express 299 Windows Media Player 300 Desktop Themes 300 Other Shortcuts 301 Removing Components 302 Answer File [Components] Section 302 Extending Windows Components Wizard 304 Removing Components After Installation 305 Hiding Non−Removable Components 306 Removing Policy Tattoos 307 Elevating Processes' Privileges 309 Group Policy 309 Secondary Logon 310 Scheduled Tasks 310 AutoLogon 311 Severing File Associations 313 Deploying Office XP Trusted Sources 314 Enabling Remote Desktop Remotely 314 Customizing the Windows XP Logon 315 Part IV: Appendices 316 Appendix List 316 Part Overview 316 Appendix A: File Associations 317 Overview 317 Merge Algorithm 317 File Extension Keys 317 OpenWithList 318 PerceivedType 319 ShellNew 319 Program Class Keys 319 DefaultIcon 321 EditFlags 321 Shell 322 Specialized Keys 323 Applications 324 SystemFileAssociations 324 Unknown 324 COM Class Keys 324 Appendix B: Per−User Settings 327 Overview 327 AppEvents 327 Console 328 Control Panel 329 Desktop 330 Desktop\Window Metrics 333 viii Table of Contents Appendix B: Per−User Settings Mouse 335 Environment 336 Keyboard Layout 336 Network 337 Printers 337 SessionInformation 337 Software 337 Classes 338 Microsoft\Command Processor 338 Microsoft\Internet Connection Wizard 339 Microsoft\Internet Explorer 339 Microsoft\Internet Explorer\MenuExt 340 Microsoft\Internet Explorer\SearchURL 341 Microsoft\MessengerService 342 Microsoft\Office 343 Microsoft\Search Assistant 344 Microsoft\VBA\Trusted 344 Policies 345 Software\Microsoft\Windows\CurrentVersion 346 Explorer\Advanced 346 Explorer\AutoComplete 350 Explorer\ComDlg32 350 Explorer\HideDesktopIcons 350 Explorer\HideMyComputerIcons 350 Explorer\MenuOrder 350 Explorer\RecentDocs 351 Explorer\RunMRU 351 Explorer\User Shell Folders 351 Appendix C: Per−Computer Settings 353 Overview 353 HARDWARE 353 DESCRIPTION 354 DEVICEMAP 354 SAM 355 SECURITY 355 SOFTWARE 356 Classes 356 Clients 356 Microsoft\Active Setup 357 Microsoft\Command Processor 358 Microsoft\Driver Signing 359 Microsoft\InternetExplorer 360 Microsoft\Sysprep 360 Microsoft\Windows NT\CurrentVersion 360 Policies 361 SOFTWARE\Microsoft\Windows\CurrentVersion 361 App Paths 362 Applets 362 ix [...]... 3 Introduction The registry is the heart and soul of Microsoft Windows XP In my other registry books, I said the same thing about the registry in every version of Windows since Microsoft Windows 95, and by the time you're finished reading this book, I hope you'll agree The registry contains the configuration data that makes the operating system work The registry enables developers to organize... behind just about every feature in Windows XP that you think is cool More importantly, it enables you to customize Windows XP in ways you can't through the user interface Windows XP and every application that runs on Microsoft' s latest desktop operating system do absolutely nothing without consulting the registry first When you double−click a file, Windows XP consults the registry to figure out what to... "Managing Registry Security" Windows XP secures settings in the registry This chapter shows you how to manage the registry' s security It also shows you how to poke selective holes in the registry' s security so that you can deploy and run legacy applications on Windows XP • Chapter 8, "Finding Registry Settings" Finding the location where Windows XP stores a setting in the registry is easy, as long as... of the Registry The structure of Windows XP' s registry is so similar to the structure of its file system that I can't help but make the analogy Figure 1−4 compares Registry Editor, the tool you use to edit the registry, and Windows Explorer (You learn how to use Registry Editor in Chapter 2, "Using the Registry 20 Editor.") In the editor's left pane, which is called the key pane, you see the registry' s... show you how to prevent Windows XP from creating the Microsoft Outlook Express icon on the desktop when a user logs on to the computer for the first time This Book Is Different—Really This book contains information that you're not going to find in any other book about the Windows XP registry You'll learn how to track down where Windows XP and other programs store settings in the registry You'll learn... job easier A lot of the book focuses on how the registry affects Windows XP and Office XP deployment You'll learn about creating and deploying effective default user profiles You'll learn how to deploy settings with Windows XP and Office XP You'll even learn how to build your own Windows Installer package files expressly for managing settings in the registry The best part is that just about every tool... Per−Computer Settings Explorer 362 Explorer\AutoplayHandlers 363 Explorer\Desktop\NameSpace .363 Explorer\FindExtensions 363 Explorer\HideDesktopIcons 364 Explorer\HideMyComputerIcons 364 Explorer\MyComputer 364 Explorer\NetworkNeighborhood\NameSpace 364 Explorer\RemoteComputer\NameSpace 365 Explorer\StartMenu... the registry itself, there are a few changes that struck me right away First Microsoft got rid of the dueling registry editors Windows 2000 had two editors: Regedit and Regedt32 Both had strengths and weakness, and you had no choice but to flip back and forth between each Windows XP combines both editors into a single registry editor Another new feature is Console Registry Tool for Windows (Reg) Windows. .. contains most of Windows XP' s settings You can do nothing in Windows XP that doesn't access the registry I use a tool to monitor registry access and often leave it running while clicking around the operating system's user interface I almost never see this monitor idle With every click, Windows XP consults the registry Every time I launch a program, the operating system consults the registry Every application... Introducing Microsoft Windows 2000 Professional (Microsoft Press, 1999) He has written six other books about the registry Most of his books are sold internationally and are available in a variety of languages Jerry is also a columnist for Microsoft Expert Zone, a Web site for Windows XP enthusiasts, and makes frequent contributions to a variety of content areas on Microsoft' s Web site: Office XP, TechNet, . Microsoft Windows XP Registry Guide Table of Contents Microsoft Windows XP Registry Guide 1 Introduction 4 This Book. 426 List of Sidebars 428 x Microsoft Windows XP Registry Guide Jerry Honeycutt Microsoft Press A Division of Microsoft Corporation One Microsoft Way Redmond

Ngày đăng: 26/01/2014, 20:20

Từ khóa liên quan

Mục lục

  • Header

  • Cover

  • Table of Contents

  • Microsoft Windows XP Registry Guide

  • Introduction

    • This Book Is DifferentŠReally

    • Power Users First; Then IT Professionals

    • Some Terminology

    • Gotta Love Windows XP

    • Final Note

    • Part I: Registry Overview

      • Chapter List

        • Part Overview

        • Chapter 1: Learning the Basics

          • Overview

          • Heart and Soul of Windows XP

            • For Power Users

            • For IT Professionals

            • Registry Warnings and Myths

            • Must-Know Concepts

              • Security Identifiers

              • Globally Unique Identifiers

              • Hexadecimal Notation

              • Bits and Bit Masks

              • Little-Endian and Big-Endian

              • ANSI and Unicode Encoding

Tài liệu cùng người dùng

Tài liệu liên quan