Zero Administration Kit For Windows : An Implementation Guide
* Master system policies, user profiles, and other key TCO tools * Standardize on easy-to-support configurations * Prevent users from installing unauthorized software * Customize Microsofts built-in ZAK templates, step by step * Comprehensive lab exercises and troubleshooting tips Slash the costs of administering Windows systems! Microsofts Zero Administration Kit (ZAK) for Windows makes use of powerful tools for centrally controlling and managing user workstations--and dramatically reducing your total cost of ownership. However, implementing these tools can be extremely complex. Now, a Windows expert with extensive ZAK experience walks you through every stage of the process, giving you all the real-world help and insight you need to deploy and manage ZAK successfully. Youll discover how to use system policies and user profiles to secure your desktops--and how to avoid the costly support calls that result from unauthorized changes. Learn how to streamline your system rollouts by standardizing on one (or a few) easy-to-support configurations. Master ZAKs powerful tools for controlling desktop access, preventing users from adding unauthorized, unlicensed, and difficult-to-support sof
- Paperback | 289 pages
- 177.8 x 228.6 x 22.86mm | 635.03g
- 01 Mar 2000
- Pearson Education (US)
- Prentice Hall
- Upper Saddle River, United States
- w. figs.
About Michael McInerney
Michael McInerney is a Dublin-based consultant on Microsoft technologies specializing in security issues. His clients include Barclays Bank Global Network Infrastructure Group. He is currently assisting a US Fortune 100 company in ensuring the security of the NT environment in its European Treasury Centre. McInerney is author of Windows NT Security (Prentice Hall PTR).
Table of contents
I. EVALUATION ENVIRONMENT. 1. Introduction to the Zero Administration Kit. Introduction. The Zero Administration Initiative for Windows (ZAW). Zero Administration Kit (ZAK) Overview. Windows NT, Windows 95, and Windows 98 Support. ZAK Availability. System Requirements for ZAK. Network Configuration. Server Configuration. Workstation Configuration. Others. Introduction to the Task-Based Worker. TaskStation Mode. AppStation Mode. Windows NT File System Access. System Lockdown. Desktop Security. User Profiles. System Policies. Unattended System Installation. A ZAK Comparison: Windows NT vs Windows 95/98. Windows NT. Windows 95/98. Summary.2. How to Build a Basic Environment. Overview. Windows NT. Windows 95/98. Test Network Requirements. Server. Workstation. NT TaskStation Setup. NT AppStation Setup. Windows 95/98 ZAK Quick Setup. Network Shares. Share Creation. NTFS Permissions. ZAK Setup File Structure. Move Administration Files. Default System Policy File Configuration. User Creation. Home Directory Share Creation. User Account Creation. Global Group Creation. Summary.3. How to Adapt the Basics for Your Requirements. Network Boot Disk. NCAdmin. NCAdmin for Unsupported NICs. Manually Configured Boot Floppy. Answer File. Section Headers. Keys and Values. File Structure. Network Card Configuration. Windows 95/98 Answer File. Summary.4. What Happens During an Unattended Client Installation. Overview. Script Files. An Unattended Installation of Windows NT 4.0. Manual Installation. How the ZAK Helps with an Unattended Installation. Character-mode Setup. Graphical Mode: Part One. Graphical Mode: Part Two. ZAK Mode. User Logon. Logon Scripts. Troubleshooting. Summary.II. USER ENVIRONMENTAL CONTROL. 5. User Profiles and Desktop Control. User Profile Defined. User Profile Types. Structure and Location. Local User Profiles. Creating a Local User Profile. Browsing Local Profiles. Profile Maintenance. Permissions. Default User Profile. All Users Profile. Windows 95/98. Roaming User Profiles. Locally Cached Copy. Creating a Roaming Profile for NT 4.0. You've Heard the Good News Now for the Bad News. Mandatory Profiles. NTuser.xxx Permissions 127 Creating a Roaming Profile for Windows 95/98. Making the Windows 95 Profile Read-Only (Mandatory). Summary. Lab Exercises. Prerequisites. Lab 1: Local Profiles. Lab 2: Roaming and Mandatory Profiles. Lab 3: Windows 9x Profiles.6. System Policies. Introduction. Policy Editor Installation. Policy Editor Modes. Registry Mode. File Mode. Exposed Settings Types. User-Related Settings. Computer-Related Settings. An Overview of the Policy Editor Tool. Categories. Policy Settings. Template Files. Default NT Templates. File Structure. Building Custom Template Files. NTconfig/Config Policy Files. Individual User and Group Policies. Prioritizing Between Multiple Groups. Saving the Policy. How Policy Conflicts Are Resolved. Computer Policies. User Policies. Policy Application Flowchart. Application of Policy Settings. Policy Implementation vs User Profiles. Summary. Lab Exercises. Prerequisites. Lab 1: Create a Policy File. Lab 2: Make Policy Settings.7. ZAK-Supplied System Policies. Introduction. ZAK-Related Policy Template Files. ZAKconfig.pol/NTconfig.pol Files 172 Default Computer Policy. Default User Policy. TaskUsers/AppUsers Policies. Policy Categories. Control Panel. Desktop. Shell. System. Windows NT Shell. Windows NT System. ZAK Policies. Summary. Lab Exercises. Prerequisites. Lab 1: Environmental Changes.III. ZAK CUSTOMIZATION. 8. Customizing the Windows NT Unattended Setup. Introduction. Installation Size Reduction. Peer Web Services. Third-Party Network Drivers. Optional Installation Features. InstallType. Controlling the Options and Accessories Process. Preventing a Single Option from Installing. Preventing a Full Options Category from Installing. Uniqueness Database Files. File Structure. Construction of a Uniqueness Database. System Tools. Attrib.exe. Cacls.exe. Con2Prt.exe. FloppyLock. INSTsrv.exe. Regedit.exe. Shutdown.exe. SysDiff.exe.9. Step-Through Customization. Introduction. Project 1: Windows NT Installation. Prerequisites. Customization Goals. Service Pack Replacement. Optional Components. Excluding the Copy of Unwanted Optional Software. Adjusting File System Security. SysDiff Installation-Internet Explorer. Project 2: System Policies. Prerequisites. Customization Goals. User Definition. Template Amendment. Policy Creation. Building Group Policies. Summary.IV. APPENDICES. Appendix A: Network Interface Cards. NICs Supported by Windows NT NCadmin Tool. Drivers Supplied in the \I386 Directory. Drivers Supplied in the \DRVLIB\NETCARD\X86 and \I386\DRVLIB.NIC Directories.Appendix B: Sample Unattend.txt Files. Sample 1. Sample 2. Sample 3.Appendix C: Answer File OEM Key Options. Answer File Key/Value Pairs for OEM. [Unattended]. [PointingDeviceDrivers]. [MassStorageDrivers]. [GuiUnattended]. Example.Appendix D: Manual Installation Synopsis. Character Mode. Graphical Mode.Appendix E: ZAK Command Script Listings. Acls.cmd. App/Tskcmds.cmd. Autologon.reg. Cleanup.cmd. Cmdlines.txt. Hide.cmd. Newtemp.reg. Noautolog.reg. NoSavcon.reg. Off97.cmd. RunOnce.reg. Zakb1wrk.cmd. Zakboot1.cmd. Glossary.Index.