MCTS Guide to Microsoft Windows Vista Chapter 12 Application Support.

Slides:



Advertisements
Similar presentations
MCTS Guide to Microsoft Windows 7
Advertisements

MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 3 Configuring the Windows Server 2008 Environment.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Chapter 9 Chapter 9: Managing Groups, Folders, Files, and Object Security.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 14: Windows Server 2003 Security Features.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 5: Managing File Access.
10.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 9: Implementing and Using Group Policy.
Computer Forensics Principles and Practices by Volonino, Anzaldua, and Godwin Chapter 6: Operating Systems and Data Transmission Basics for Digital Investigations.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Fall 2011 Nassau Community College ITE153 – Operating Systems Session 24 NTFS Permissions and Sharing Printers 1.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 18: Configuring Application Restriction Policies
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
Hands-On Microsoft Windows Server 2003 Administration Chapter 6 Managing Printers, Publishing, Auditing, and Desk Resources.
7.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 7: Introducing Group Accounts.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Operating Systems.
Installing software on personal computer
Installing Windows XP Professional Using Attended Installation Slide 1 of 41Session 2 Ver. 1.0 CompTIA A+ Certification: A Comprehensive Approach for all.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 7 Configuring File Services in Windows Server 2008.
Maintaining Windows Server 2008 File Services
Working with the Windows XP Registry
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
Working with Applications Lesson 7. Objectives Administer Internet Explorer Secure Internet Explorer Configure Application Compatibility Configure Application.
Users and Groups Security Architecture Editing Security Policies The Registry File Security Auditing/Logging Network Issues (client firewall, IPSec, Active.
9.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
DB2 (Express C Edition) Installation and Using a Database
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 15 Installing and Using Windows XP Professional.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 9: Implementing and Using Group Policy.
Hands-On Microsoft Windows Server 2008
Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 3 Administration of Users.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
MCTS Guide to Microsoft Windows 7
Ch 11. Services A service is a specialized program that performs a function to support other programs Many services operate at a very low level – Interacting.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 5: Managing File Access.
Section 7: Implementing Security Using Group Policy Exploring the Windows Security Architecture Securing User Accounts Exploring Security Policies Hardening.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Module 7: Fundamentals of Administering Windows Server 2008.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Windows NT Chapter 13 Key Terms By Bill Ward NT Versions NT Workstation n A desktop PC that both accesses a network and works as a stand alone PC NT.
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
MCTS Guide to Microsoft Windows Vista Chapter 4 Managing Disks.
1 Chapter Overview Publishing Resources in Active Directory Service Redirecting Folders Using Group Policies Deploying Applications Using Group Policies.
Oracle 10g Database Administrator: Implementation and Administration Chapter 2 Tools and Architecture.
Introduction to Windows XP Professional
A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 13 Understanding and Installing Windows 2000 and Windows NT.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 14: Windows Server 2003 Security Features.
Module 5: Creating and Configuring Group Policies.
Week #2 Objectives Upgrade and Migrating to Windows 7 Image-Based Installation of Windows 7 Application Compatibility.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 11 Application Support.
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
Chapter Eleven Windows XP Professional Application Support.
CITA 171 Section 1 DOS/Windows Introduction. DOS Disk operating system (DOS) –Term most often associated with MS-DOS –Single-tasking operating system.
11 SUPPORTING WINDOWS XP FILE AND FOLDER ACCESS Chapter 5.
A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems.
SQL Database Management
Maintaining Windows Server 2008 File Services
Windows Internals Brown-Bag Seminar Chapter 1 – Concepts and Tools
Presentation transcript:

MCTS Guide to Microsoft Windows Vista Chapter 12 Application Support

MCTS Guide to Microsoft Windows Vista2 Objectives Describe application architecture terminology relevant to Windows Vista Describe supported application environments Describe the Window Vista Registry and know how to manipulate it when necessary Understand file and registry virtualization in conjunction with User Account Control

MCTS Guide to Microsoft Windows Vista3 Objectives (continued) Know how to use the new Run As Administrator feature for applications Understand how Windows Vista provides tweaked compatibility settings to run older applications Describe application compatibility research tools provided by Microsoft

MCTS Guide to Microsoft Windows Vista4 Application Architecture Evolved from the traditional Windows NT model Windows Vista operates in a layered approach –Different layers provide targeted functionality –Conceptual layers add complexity Allow a controlled and secure flow Windows Vista key components –Environment subsystems –Executive Services

MCTS Guide to Microsoft Windows Vista5 Application Architecture (continued) Executive Services –Provide the core operating system functionality that supports executing applications –Multiple modules, such as the core kernel, object manager, memory manager, and several others –Interact with each other and hardware directly –Much hardware-specific knowledge is in the Hardware Abstraction Layer (HAL) service –Run in kernel mode

MCTS Guide to Microsoft Windows Vista6 Application Architecture (continued)

MCTS Guide to Microsoft Windows Vista7 Application Architecture (continued) Environment subsystems –Support applications and provide indirect access to Executive Services –Primary subsystem used by applications is the Win32 subsystem –Run in user mode.NET Framework 3.0 subsystem –New subsystem introduced with Windows Vista –Provides application developers with options to design and build applications that interact with Windows Vista

MCTS Guide to Microsoft Windows Vista8 Supported Application Environments Primary application types and special considerations –Win32 Applications –.NET Applications –DOS Applications –Win16 Applications –x64 Application Considerations

MCTS Guide to Microsoft Windows Vista9 Win32 Applications Most common type of application in use with Windows XP Win32 application runs in its own virtual memory space –Executed by the processor in user mode If the Win32 application crashes, it will not affect other Win32 applications –Or the operating system’s kernel Executive Services

MCTS Guide to Microsoft Windows Vista10.NET Applications.NET Framework 3.0 –Preferred method for applications to access operating system services –Ensures compatibility with future operating systems –Isolates applications from any changes to the Win32 subsystem

MCTS Guide to Microsoft Windows Vista11 DOS Applications 32-bit versions of Windows Vista support the execution of legacy DOS applications When a legacy DOS application runs –ntvdm.exe is started to create a Virtual DOS Machine (VDM) environment for the DOS application DOS application appears to be running on a DOS computer –Access to computer hardware is virtualized through ntvdm.exe and the Win32 subsystem A new instance of ntvdm.exe is created for each DOS application that is executed

MCTS Guide to Microsoft Windows Vista12 Win16 Applications Win16 applications were originally designed to run with Windows 3.x By default, a single Virtual DOS Machine is created to run all Win16 applications –Instance of ntvdm.exe combined with Windows 3.x core operating system files –And an application shim called wowexec.exe Part of Windows Vista operating and supports Win16- on-Win32 execution Applications cannot directly transfer information to Vista

MCTS Guide to Microsoft Windows Vista13 Win16 Applications (continued) Thunking –Translation of requests for service from the Win16 environment to 32-bit and vice-versa All Win16 applications run in a single VDM by default –Any one application that crashes can crash all other Win16 applications running with it in the VDM Win16 environment can take a lot of time to initialize the first time it is started –Once a Win16 VDM is created, it is not immediately shut down when all Win16 applications terminate

MCTS Guide to Microsoft Windows Vista14 x64 Application Considerations x64 version of Windows Vista –For use with new applications for 64-bit processors Application compatibility is limited to Win32 application –Win32-on-Win64 (WOW64) virtualized environment is created to host legacy Win32 applications

MCTS Guide to Microsoft Windows Vista15 Windows Vista Registry Registry –Structure and security needed to centrally manage an application configuration and operational parameters Windows 3.x introduced the concept of a registry Windows 95 registry became a well defined and centrally required element –In the operations of the operating system and applications

MCTS Guide to Microsoft Windows Vista16 Registry Structure Registry is divided into sections and levels of data Multiple sections exist to organize data by purpose –Individual sections are called hives Within a single hive data is stored in keys and values –Identified by name and position relative to each other Registry keys can contain sensitive information that can crash the computer –If improperly configured

MCTS Guide to Microsoft Windows Vista17 Registry Structure (continued)

MCTS Guide to Microsoft Windows Vista18 Registry Structure (continued) Registry maintains its own security settings –To restrict which entities can read or change keys HKEY_CLASSES_ROOT –Settings define the types (classes) of documents and properties associated with those types HKEY_CURRENT_USER –Settings in this hive define the preferences of the currently logged-on user

MCTS Guide to Microsoft Windows Vista19 Registry Structure (continued)

MCTS Guide to Microsoft Windows Vista20 Registry Structure (continued)

MCTS Guide to Microsoft Windows Vista21 Registry Structure (continued) HKEY_LOCAL_MACHINE –Global settings for entire computer and applications HKEY_USERS –Multiple subsections to define user-specific settings for new users and any user who ever logged on HKEY_CURRENT_CONFIG –Details about the current hardware profile in use

MCTS Guide to Microsoft Windows Vista22 Registry Structure (continued)

MCTS Guide to Microsoft Windows Vista23 Registry Structure (continued)

MCTS Guide to Microsoft Windows Vista24 Registry Editing Tools REGEDIT.EXE –Graphical Registry editor –Allows user to connect to the active registry database And make changes that are effective immediately REG.EXE –Command-line tool –Used to read data from or write data to the registry from inside a scripted batch or command file –Requires intimate knowledge of the registry’s hierarchy and values

MCTS Guide to Microsoft Windows Vista25 Registry Editing Tools (continued)

MCTS Guide to Microsoft Windows Vista26 Registry Editing Tools (continued)

MCTS Guide to Microsoft Windows Vista27 Registry Backup and Restore Methods Both REGEDIT.EXE and REG.EXE –Can export the current settings from part of the registry database to a text-based file File has a.REG extension Backing up the entire registry –Perform a complete PC backup Including the system state of the operating system A user may import a.REG file

MCTS Guide to Microsoft Windows Vista28 Registry Security Registry database is protected by its own security system Each key is assigned permissions, an owner, and optionally a list of users to audit when the key is accessed Access to a registry key and the values it contains can be explicitly allowed or denied –Based on the user or the groups they belong to Basic permissions usually do not reveal all of the fine security details that exist

MCTS Guide to Microsoft Windows Vista29 Registry Security (continued)

MCTS Guide to Microsoft Windows Vista30 Registry Security (continued)

MCTS Guide to Microsoft Windows Vista31 Registry Security (continued) Security settings are inherited from the top of the hive down to the bottom of the hive Permission inheritance and default security options should not be changed –Without a good reason to do so Owner of the keys is usually listed as SYSTEM In Windows Vista, the operating system code and services run in a user session –If registry permissions are altered, the registry data may not be available to the operating system

MCTS Guide to Microsoft Windows Vista32 File and Registry Virtualization Some pre-Windows Vista applications store data and configuration settings –In file and registry locations not meant for this purpose With User Account Control –Windows Vista can distinctly recognize and control access to sensitive system areas 32-bit version of Windows Vista has virtualized select system file and registry areas

MCTS Guide to Microsoft Windows Vista33 File and Registry Virtualization (continued) Key system areas that are virtualized include: –HKLM\Software –%SystemRoot% –%ProgramFiles% File and registry virtualization is not supported in the 64-bit version of Windows Vista UAC-aware applications can include an XML file called the application manifest –Specifies required code modules that must be available at run time And the requested execution level for the application

MCTS Guide to Microsoft Windows Vista34 File and Registry Virtualization (continued)

MCTS Guide to Microsoft Windows Vista35 Run As Administrator Applications run with the same security privileges as the currently logged-on user Run As option existed to run an application as a different user –Modified in Windows Vista –Now known as the Run As Administrator option Details of the security privileges for the currently logged-on user are stored in a security token –Compiled when the user first logs on Useful when a program must run at an elevated level

MCTS Guide to Microsoft Windows Vista36 Run As Administrator (continued)

MCTS Guide to Microsoft Windows Vista37 Application Compatibility Some applications designed for older operating systems will not work smoothly with Windows Vista Compatibility options –Windows Vista can emulate an operating system closer to what the application was first written for –Windows Vista can try to emulate a Windows 95, 98, ME, 2000, XP, or Windows Server 2003 environment Compatibility setting can be configured using: –Program Compatibility Assistant –Program Compatibility Wizard –Manually through Program Compatibility Settings

MCTS Guide to Microsoft Windows Vista38 Program Compatibility Assistant When an application is run for the first time –Windows Vista will automatically try to notice if the application has an issue It will automatically launch the Program Compatibility Assistant the next time the same application runs Program Compatibility Assistant –Designed to make it easy for home users to adjust their legacy applications to work with Windows Vista Without having to know a lot about compatibility settings

MCTS Guide to Microsoft Windows Vista39 Program Compatibility Assistant (continued) Program Compatibility Assistant does not allow any manual adjustments –While it is reconfiguring the compatibility settings for an application

MCTS Guide to Microsoft Windows Vista40 Program Compatibility Wizard –Tool that operates similarly to the Program Compatibility Assistant –Started manually and controlled with screen prompts Can start Wizard from inside Windows Help and Support

MCTS Guide to Microsoft Windows Vista41 Program Compatibility Wizard (continued)

MCTS Guide to Microsoft Windows Vista42 Program Compatibility Wizard (continued)

MCTS Guide to Microsoft Windows Vista43 Program Compatibility Wizard (continued)

MCTS Guide to Microsoft Windows Vista44 Program Compatibility Wizard (continued)

MCTS Guide to Microsoft Windows Vista45 Program Compatibility Settings Once an application is installed –It can optionally have its compatibility settings adjusted as part of its properties Program’s compatibility settings can be viewed and changed through the Compatibility tab in the program’s Properties window

MCTS Guide to Microsoft Windows Vista46 Program Compatibility Settings (continued)

MCTS Guide to Microsoft Windows Vista47 Kernel Patching Kernel patching –System whereby applications modify the core functionality of the Windows operating system To obtain low-level access to the operating system and its resources –Considered a security risk –Can cause operating system instability if not done properly Windows Vista is the first 32-bit version of Windows to prevent kernel patching

MCTS Guide to Microsoft Windows Vista48 Application Compatibility Research Tools Primary compatibility research tools include: –Microsoft Application Compatibility Toolkit V5.0 –Windows Application Compatibility Toolkit 4.1 –Microsoft Standard User Analyzer and Microsoft Application Verifier

MCTS Guide to Microsoft Windows Vista49 Microsoft Application Compatibility Toolkit V5.0 Currently a beta product available from Microsoft on a limited basis Lifecycle management tool for the applications required by a user or company Assists in identifying and managing what applications must be reviewed Assists in reporting and tracking application compatibility issues Helps deploy Windows Vista as fast as possible with required compatibility changes

MCTS Guide to Microsoft Windows Vista50 The Windows Application Compatibility Toolkit 4.1 Application Compatibility Toolkit 4.1 –Free download from Microsoft –Originally designed to assist with application compatibility with Windows XP (Service Pack 2) If ACT 5.0 is not available, this version is preferable as an application lifecycle management tool

MCTS Guide to Microsoft Windows Vista51 Microsoft Standard User Analyzer and Microsoft Application Verifier –Tools designed to simulate a regular user working with the applications under compatibility investigation Application Verifier –Monitors an application while it runs and collects the raw data detailing the experience Standard User Analyzer –Will collect the output from the Application Verifier And present it in a concise view

MCTS Guide to Microsoft Windows Vista52 Summary Application architecture and its layers as they apply to the execution of the user’s applications and the operating system itself Different application environments are supported for DOS, Win16, and Win32 in the 32-bit version of Windows Vista Registry in Windows Vista is based on the original Windows NT registry model Select portions of the file system and registry are virtualized so that a running application believes it is writing to those locations

MCTS Guide to Microsoft Windows Vista53 Summary (continued) Applications that require administrative privileges to run properly can be granted to Run as administrator Legacy applications that have trouble running natively in Windows Vista can run in a compatibility mode that simulates an older version of Windows Application compatibility is not a one-time operation that is only performed when a new operating system is introduced