Top Banner

of 42

50331B-EnU StudentGuide M02

Apr 14, 2018

Download

Documents

Manchitas Rules
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/30/2019 50331B-EnU StudentGuide M02

    1/42

  • 7/30/2019 50331B-EnU StudentGuide M02

    2/42

  • 7/30/2019 50331B-EnU StudentGuide M02

    3/42

    Module 2: Resolve Software Configuration Issues 2-1

    Overview

    Change Default Settings on the ImageEnable and Disable Features

    Pointing to a Network Resource

    Configuring Updates

    Resolve Configuration Issues with Group Policy

    Driver Updates

    Problem Steps Recorder

    Resolve Software Configuration Issues

    Most software configuration problems can be solved quickly if accurate information about the problem is obtained in atimely manner and appropriate tools are used to solve the issue. Isolating the problem area is often the first step. Isit at the operating system, network or application level? Are other users experiencing the same issue?

    The best time to solve a problem is before deployment, proper testing of the software in typical usage scenarios canshow up problems early in the process. Some problems are solved by enabling or disabling features on the system.Others can be dealt with by changing the environment in which the application is run. Group Policy and other toolscan be used to apply updates and fixes quickly and consistently in the network. Updates can be deployed in a stagedmanner to catch unresolved problems without disrupting the production environment severely.

    New tools, like the Problem Steps Recorder, can be used by technicians to solve remote end-user problems moreefficiently. Other tools like GPMC and gpresult.exe can be used to solve problems with the way Group Policy Objects(GPOs) are deployed.

    In this chapter, you will be able to work with different Windows tools, old and new to identify and resolve configurationproblems with the operating system, applications and drivers.

  • 7/30/2019 50331B-EnU StudentGuide M02

    4/42

    2-2 Module 2: Resolve Software Configuration Issues

    Lesson 1: Change Default Settings on the Image

    Using ImageXUsing WDS

    Using the Microsoft Development Kit

    Images are a popular way to deploy operating systems and their applications in a corporate environment. Onceproperly configured, the image can be used on computers running compatible hardware. Most environments willneed multiple images to meet their needs and these might have to be updated regularly to include new applicationsor remove old ones. The Sysprep utility can be used to remove unique information before image creation. Itemssuch as the computer SID and computer name must be removed to make allow easier deployment.

    Once an image type and configuration is selected, the Windows Deployment Services and MDT tools can be used todeploy the images and make necessary changes to them. The Windows Imaging Format (wim) type is most oftenchosen because of the flexibility it provides. They are hardware independent and provide a system of storinginformation where a single copy of file is recorded only once even if it is referenced in multiple locations (singleinstance storage). This can significantly reduce the amount of space needed to create the image. Since WIM filescan contain multiple disk images, common files that are used by all of them will not need to be duplicated either.WIM images support non-destructive deployments. If the partitions being copied to already have data on them, thesefiles do not need to be overwritten. The partitions used by WIM images must be created before they are deployed.Diskpart.exe or some other utility can be used to do this.

  • 7/30/2019 50331B-EnU StudentGuide M02

    5/42

    Module 2: Resolve Software Configuration Issues 2-3

    Using ImageX

    /append/apply /capture/commit/compress

    /delete/dir/export/ref /split

    /verify /mount/mountrw /unmount

    When changes need to be made to a WIM image, the modifications can be done with the ImageX command-line tool.These modifications can be made offline by mounting the image and changing the necessary files. Because ImageXis a command-line tool, its configuration is very flexible and it lends itself easily to scripting operations. Some of themore useful parameters are listed below:

    /append Appends a volume image into an existing WIM file

    /apply Applies a volume image to the specified drive

    /capture Copies a volume image into a new WIM file

    /commit Commits the changes made to a mounted WIM

    /compress Sets the compression type to (none, fast, or maximum)

    /delete Deletes an image from a WIM file with multiple images

    /dir Displays a list of files and folders within a volume image

    /export Transfers an image from one WIM file to another WIM file

    /ref Sets WIM references for an apply operation

    /split Splits an existing WIM file into multiple read-only WIM parts

    /verify Verifies duplicate and extracted files

  • 7/30/2019 50331B-EnU StudentGuide M02

    6/42

    2-4 Module 2: Resolve Software Configuration Issues

    /mount Mounts an image, with read-only access, to the specified directory

    /mountrw Mounts an image, with read-write access, to the specified directory

  • 7/30/2019 50331B-EnU StudentGuide M02

    7/42

    Module 2: Resolve Software Configuration Issues 2-5

    Using WDS

    Create and Deploy Windows 7 ImagesSupport for RIS

    Unattended Setup

    Command-line Tool

    When WDS is used to deploy Windows 7, it will also include the capability to create, convert and copy images. Older RIS images can be converted to newer WIM formats. Client computers can also be configured to use unattendedinstall files to complete the operating system setup. Management of images can be done from the WindowsDeployment Services MMC snap-in or the wdsutil.exe command-line tool. Client computers that are not pre-staged inactive directory can be automatically created during the setup process.

  • 7/30/2019 50331B-EnU StudentGuide M02

    8/42

    2-6 Module 2: Resolve Software Configuration Issues

    Using the Microsoft Deployment Toolkit

    Lite Touch Installation (LTI)Zero Touch Installation (ZTI)

    The MDT can be used as a single tool to manage all the deployment needs for client and server computers. Twotypes of deployment methods are available with MDT:

    Lite Touch Installation (LTI): Software distribution tools are not necessary with this deployment method.This method allows interaction at the desktop during the install for some options, like computer name, to beconfigured.

    Zero Touch Installation (ZTI): This allows for a totally automated installation to be configured. Additionalapplications must be used for the actual deployment, like Systems Management Server (SMS) or SystemCenter Configuration Manager (SCCM).

  • 7/30/2019 50331B-EnU StudentGuide M02

    9/42

    Module 2: Resolve Software Configuration Issues 2-7

    Lesson 2: Enable and Disable Features

    Compatibility Mode Windows XP Mode

    UAC Configuration

    Internet Explorer 8

    Some application setup problems can be solved by changing the Windows 7 configuration or by modifying theconfiguration of optional components. The management of older applications that are compatible with Windows XPhas been greatly improved with the addition of new virtualization options. Other issues caused by the configuration of the display settings, Internet Explorer, Windows Search, Firewall settings or other features can sometimes bemitigated.

    The solution will sometimes involve a simple configuration change to the Windows 7 feature. Some cases mightrequire the removal of the offending component. When the modification of existing features does not provide asolution, the application might need to be upgraded to a newer version or configured on a Terminal Server. Beforesuch options are used, one of the following configuration settings might be used to solve the problem.

  • 7/30/2019 50331B-EnU StudentGuide M02

    10/42

    2-8 Module 2: Resolve Software Configuration Issues

    Compatibility Mode

    Operating System SupportDesktop Settings

    Run as Administrator

    Visualization Themes

    Apply to All Users

    Sometimes a program needs to be installed or executed using compatibility mode. Compatibility modes can beconfigured for Windows Vista, XP, 2000, NT 4.0 or 98. Other options can be changed if they are creatingcompatibility problems like desktop settings, executing as administrator or visualization themes. When different userswork with the application on the same machine, the option to apply configured settings to all users can be used toavoid having to make the same changes multiple times.

  • 7/30/2019 50331B-EnU StudentGuide M02

    11/42

    Module 2: Resolve Software Configuration Issues 2-9

    Windows XP Mode

    Virtual PC ImageLicensing

    Windows 7 Edition Support

    Applications that are not compatible with Windows 7 can be installed in a virtual Windows XP environment thatinstalls the application using Virtual PC. The XP virtual machine is an optional download that includes a fully licensedversion of Windows XP with Service Pack 3. The Virtual PC 7 image is only available on the Professional, Enterpriseand Ultimate editions of Windows 7. Although the applications are installed in this virtual image, they are executedfrom the Windows 7 desktop like any other software program.

    This installation option should solve most application compatibility issues. If this method is used for all desktopupgrades, the process of verifying that old programs will work on the newly deployed systems could be much faster and easier.

  • 7/30/2019 50331B-EnU StudentGuide M02

    12/42

    2-10 Module 2: Resolve Software Configuration Issues

    UAC Configuration

    Support for Older ApplicationsNotification Messages

    Auto-elevation

    UAC is an important security tool that provides administrators with greater control over user actions on the desktop.In most cases, there should not be a need to disable it because of compatibility problems. New options available inWindows 7 can make the user and software setup experience much smoother than on Windows Vista.

    The new UAC configuration reduces the number of prompts for elevation a user will get during simple operations likeinstalling new ActiveX controls. The operating mode of UAC is also configurable. The administrator can decide toprevent notification messages when windows settings are being changed and allow desktop interaction with theprompt for the elevation account is present. Using these options allows certain operations to use auto-elevation andimprove the user experience without totally disabling this useful security feature.

  • 7/30/2019 50331B-EnU StudentGuide M02

    13/42

    Module 2: Resolve Software Configuration Issues 2-11

    Internet Explorer 8

    Compatibility View Intranet Zone Support

    URL Support

    Some web-sites may not have made changes to display information properly in the newest version of InternetExplorer. The Compatibility View can be configured from the toolbar to allow web-sites to be viewed as they wouldlook in Internet Explorer 7. You have the option to display all sites this way or only intranet sites. A specific list of URLs can also be specified.

  • 7/30/2019 50331B-EnU StudentGuide M02

    14/42

    2-12 Module 2: Resolve Software Configuration Issues

    Lesson 3: Pointing to a Network Resource

    Security DFS Configuration

    When automating the installation of operating systems and applications, the majority of setups normally occur over the network from a distribution point. These network shares should be secure, highly available and be easilyaccessible. When the same application can be installed from multiple locations, any changes made to one should beconsistently applied to the others. A number of strategies can be used to accomplish these tasks. Taking advantageof Windows Server features and services, a software distribution architecture that is manageable can be configured.Some of the options discussed here depend on a properly configured Active Directory environment.

  • 7/30/2019 50331B-EnU StudentGuide M02

    15/42

    Module 2: Resolve Software Configuration Issues 2-13

    Security

    NTFSNetwork Share

    Authentication

    Securing the data on software distribution shares is necessary to prevent unauthorized updates to setup files. Youcan also stop the unlicensed and unsupported installation of software by end users. Share and NTFS permissionscan be used together to prevent non-administrator access. If the volume is not formatted as NTFS, the FAT or FAT32 partition can be converted without the loss of existing data on the drive. This operation can be done from thecommand-line or scripted with the convert.exe utility.

    When both NTFS and share of permissions are applied, the more restrictive of the two permission sets will be used.Because the NTFS permissions allow a greater granularity of control, these permissions are often preferred. The useof the Everyone group should be avoided when assigning permissions via NTFS or shares. The Authenticated Usersgroup should be used instead so that domain authentication will be required before access to the resources isgranted.

    To prevent users from even finding the shares in the first place, they should also be hidden. Adding a dollar sign ($)to the end of the share name will accomplish this. When customized updates are made to distribution shares, theyshould also be backed up regularly. If security sensitive data is copied across the network during setup operations, itshould be encrypted. Using customized IPSec policies can protect confidential data without unnecessarily affectingperformance. Encrypting File System (EFS) only protects data while it is on the drive and not while it is in transit over the network.

  • 7/30/2019 50331B-EnU StudentGuide M02

    16/42

    2-14 Module 2: Resolve Software Configuration Issues

    DFS Configuration

    Replica SetsSite-Aware

    Access Permissions

    Creating a DFS tree to support software distribution points can improve the availability of those shares and allowautomated replication of changes to identical shares. DFS uses logical names to identify network shares. End userscan use these logical names or leaves as connection points instead of connecting directly to the share. The DFS leaf names can remain the same even when the share name is changed or moved to a different server. For example,even if the Office 2007 install share is moved from \\Server1\Office2007 to \\Server2\Office07, the original DFS leaf name can remain the same so end users and applications that point to it continue to work the same.

    DFS also uses replica sets to provide load balancing. A single leaf can point to two or more shares that contain thesame files. When users connect to the leaf, the client computers will connect to different shares to balance the load.DFS is also site-aware, so a user will automatically connect to servers in their own location. If one is not available,the DNS service records can be used to find one that is least costly in terms of WAN bandwidth usage.

    Replication can be configured between shares in the same replica set so that updates only have to be directly madeto one of them. The replication engine uses a multi-master model so updates can be made from any share location.DFS replication will also work over WAN connections with limited bandwidth.

    Normal NTFS and share permissions cannot be violated because of DFS permission settings. Access-based

    enumeration can also be used to prevent users from seeing files or folders they do not have permissions to access.DFS can be used in combination with other services, like Server Clustering to improve the availability of networkshares.

    http://server1/Office2007http://server2/Office07http://server2/Office07http://server1/Office2007
  • 7/30/2019 50331B-EnU StudentGuide M02

    17/42

    Module 2: Resolve Software Configuration Issues 2-15

    Lesson 4: Configuring Updates

    Windows UpdatesMicrosoft Updates

    Application Updates

    To maintain the security and integrity of network computers, regular operating system and application updates shouldbe done. Although many updates are done to improve the functionality of software, a lot of them are also done toprotect applications from known malicious attack methods. Many of these attacks are successful because criticalupdates were not applied to systems in a timely manner. A defense in depth strategy often works best whenprotecting applications on a network so updates and patches are done at the firewall, network servers and clientcomputers.

    If automatic updates are not configured for operating systems and applications, there will be a greater need tomanage manual updates efficiently. Having a strategy to test updates before deployment is important and these testsshould be performed in a timely manner. Using services like SCCM or WSUS can simplify this testing process.

  • 7/30/2019 50331B-EnU StudentGuide M02

    18/42

    2-16 Module 2: Resolve Software Configuration Issues

    Windows Updates

    Operating System Updates WSUS Support

    Configuring Automatic Updates

    These updates will install fixes and patches to the operating system. They can be automatically installed from theMicrosoft web-site or configured through a WSUS server created on the local network. Many updates occur in thebackground or after the user logs off or reboots. Some updates might have to reboot the system for the changes totake effect, which could disrupt work activity. The automatic reboot that some updates may cause, can be disabled toprevent interruption of work activity on the system.

    The greatest control over updates is allowed with the configuration of a WSUS server. When clients are configured toget their updates directly from it instead of the Microsoft web-site, updates can be tested, staged or skippedaltogether. You can control what groups of computers will get what updates and at what times.

  • 7/30/2019 50331B-EnU StudentGuide M02

    19/42

    Module 2: Resolve Software Configuration Issues 2-17

    Microsoft Updates

    Microsoft Application SupportIntegration with Windows Updates

    In environments where Microsoft applications are used on the desktop like Microsoft Office or SQL Server, updatesneed to be done separately from the Windows Updates since they only apply to the operating system. MicrosoftUpdates presents a way to check for and fix problems with both the operating system and Microsoft applicationsinstalled on the computer. There will be no need to do separate Microsoft Office updates, for example.

    Once a computer starts using Microsoft Updates, it will automatically replace Windows Updates since it includes allthe fixes available through that site. Once Microsoft Updates are configured on a computer, it will always be usedeven if you click the old Windows Update link.

  • 7/30/2019 50331B-EnU StudentGuide M02

    20/42

    2-18 Module 2: Resolve Software Configuration Issues

    Application Updates

    Vendor Considerations Automatic vs. Manual Updates

    Mitigating Update Issues

    Non-Microsoft applications on a desktop might also need updates from time to time. Like Microsoft Updates, a choicemust be made as to whether automatic updates will be configured, or if they will be done manually. Automaticupdates are more convenient but the vendor must be reputable and trusted. The timing of these updates and howthey could disrupt user activity must also be considered. Manual updates allow the patches to be tested in aprotected environment and for any bugs and compatibility problems to be worked out.

    In any environment where automatic updates are configured, a good backup plan should be in place along with astrategy for restoring systems that might be damaged by upgrades that went badly. Drive space and other resourcesneeded by the upgrade must also be considered. The documentation that comes with the updates should also bechecked. Some compatibility issues might have already been identified by the vendor and mitigation strategiesalready specified.

  • 7/30/2019 50331B-EnU StudentGuide M02

    21/42

    Module 2: Resolve Software Configuration Issues 2-19

    Lesson 5: Resolve Configuration Issues with Group Policy

    Configuring WSUSGPO Filtering

    Other Configuration Options

    GPO Tools

    Group Policy objects can be used to fix and prevent software configuration problems on a desktop. The centralizednature of administration and the quick deployment of configuration changes make it an ideal tool for changing thedesktop configuration in a network.

    GPOs can be used to control changes to the desktop configuration, limit access to the hard-drive and manage theconfiguration of some applications. It can also be used to create testing groups when deploying new software or updates.

  • 7/30/2019 50331B-EnU StudentGuide M02

    22/42

    2-20 Module 2: Resolve Software Configuration Issues

    Configuring WSUS Updates

    GPO ConfigurationReschedule Automatic Update

    No Auto-restart

    Enabling Windows Update Power Management

    Delay Restart for Scheduled Installations

    Having a WSUS server on a network allows administrators to deploy Windows and Microsoft Updates from a localserver. Deployment can be configured to occur in a staged manner to specific groups of computers at scheduledtimes. Desktop computers will point to the Microsoft Update server on the Internet by default, but this can bechanged through group policy settings.

    In the Group Policy Object Editor, expand Computer Configuration > Administrative Templates > WindowsComponents > Windows Update . Edit the Configure Automatic Updates setting and choose the Enabled option.Even after this option is enabled, the administrator will still have additional options to specify how updates are done.These options include:

    Notify for download and notify for install. This gives the end user the option to specify how and whenupdates are installed. This is the least disruptive option since it prevents installs that can interfere with thework users are doing.Auto download and notify for install. This option still gives the user the option to specify when updates willbe installed, but the files needed for the updates will be downloaded automatically when they becomeavailable.Auto download and schedule the install. This option is chosen to make sure that updates are installed in atimely manner. It is possible that updates might interfere with work that is being done on the system at the

    time, especially if the update requires a reboot of the system. To prevent this problem, a time for thescheduled installations should be chosen when the desktop is not in use. The scheduling options allow adaily or weekly installation of updates.Allow local admin to choose setting. If the user has administrative privileges, they will be able to specifywhen the updates are installed.

    Once Automatic Updates are configured, use the Specify intranet Microsoft update service location setting to pointto the URL of the WSUS server. The Enable client-side Targeting setting should also be enabled to allow WSUS totarget specific updates to the desktop depending on its group membership. Other useful options include:

  • 7/30/2019 50331B-EnU StudentGuide M02

    23/42

    Module 2: Resolve Software Configuration Issues 2-21

    Reschedule Automatic Update Scheduled Installations. When updates are not installed at their scheduledtime, they can be rescheduled to occur a set number of minutes after the computer is next started.No Auto-restart with logged on users for scheduled automatic updates installations. To prevent disruption inuser activity, any update that requires a reboot can be configured to wait until the logged in user does it.The user will be notified that a reboot is required. The updates will not take effect until the required restart of the system.

    Enabling Windows Update Power Management to automatically wake up the system. When systems arehibernating, the Windows Power Management features can be used to wake up the system to allow theinstallation of the updates.Delay Restart for scheduled installations. If an update needs to restart the system, the restart can bedelayed for a specified number of minutes. This option can be used to give end-users time to complete anywork they are doing on the computer.

  • 7/30/2019 50331B-EnU StudentGuide M02

    24/42

    2-22 Module 2: Resolve Software Configuration Issues

    GPO Filtering

    Testing New SoftwareGPO Permissions

    Group Assignment

    When group policies are applied in the Active Directory hierarchy, any group of systems can be affected by thesettings depending on the location of the OU that the computer and user account are in. When new updates arebeing tested, the normal policy inheritance hierarchy might not prove advantageous. Filtering the policy settingsallows you to get around this problem.

    Normally GPOs are configured with permissions that give Authenticated Users Read and Apply Group Policypermissions. This allows the policy to affect all users in the hierarchy. When this permission is removed and specificgroups of users are given these permissions, the policy will apply only to them. This configuration allows you to testnew software and configuration changes for specific users, regardless of where they are located in Active Directory.

  • 7/30/2019 50331B-EnU StudentGuide M02

    25/42

    Module 2: Resolve Software Configuration Issues 2-23

    Other Configuration Options

    Windows FirewallInternet Explorer Maintenance

    Slow Link Detection

    Group Policy settings are extensible through the use of administrative template settings that allow you to manageregistry settings on computers. This allows many applications to be modified after installation through a GPO. Other popular software configuration settings include:

    Windows Firewall with Advanced Security. Inbound and Outbound rules can be configured to allowapplications to run properly. Logging can be enabled to troubleshoot future problems and limits placed onthe size of log files.Internet Explorer Maintenance. In addition to logo and toolbar customizations, other application specificsettings can be modified like proxy configuration, default programs for Internet resources and security zoneoptions.Slow Link Detection. This setting allows an administrator to control how the system applies certain policysettings if the network speed is 500 Kbps or slower (this default bandwidth setting can be changed). Thesettings will prevent the installation of new software and provide control over other options like IP Security,EFS, Scripts, Folder Redirection and Internet Explorer Maintenance.

  • 7/30/2019 50331B-EnU StudentGuide M02

    26/42

    2-24 Module 2: Resolve Software Configuration Issues

    GPO Tools

    GPResult.exeGpupdate.exe

    GPMC

    When policy settings are not being applied or if they are not being applied in an expected fashion, GPO tools can beused to find and solve these problems.

    GPResult.exe: This command-line tool is used to verify the policy settings that apply to a specific user andcomputer. It can be executed to retrieve information about remote computers. The results can be displayedin the command window or exported to a text file.Gpupdate.exe: Gpupdate.exe is used to force group policy settings to be applied immediately on the localsystem. These policy settings can take up to 90 minutes to be updated on a computer after a change ismade to a GPO. This tool allows an administrator to refresh the policy settings without logging off or rebooting the system. This option will not work for some settings, like the installation of new softwareassigned to computer objects.GPMC: The Group Policy Management Console can be used to create, edit and move GPOs with the

    Active Directory hierarchy. It can also display reports about policy settings that will be applied when specificusers log into specific machines. The user does not need to login to the system for these reports to be run.What if scenarios can also be created to find out how policy settings will be applied if computer and user accounts are moved to different OUs. Administrators can use this feature to be proactive in detectingconfiguration issues caused by planned changes in the future.

  • 7/30/2019 50331B-EnU StudentGuide M02

    27/42

    Module 2: Resolve Software Configuration Issues 2-25

    Lesson 6: Driver Updates

    Device ManagerCompatibility ModeUsing Safe ModeDriver Verifier

    Driver stability has been improved in Windows 7 with additional features to detect function calls and actions that candisrupt applications or operating system. Taking advantage of Driver Signing options can also protect the computer from faulty driver updates.

  • 7/30/2019 50331B-EnU StudentGuide M02

    28/42

    2-26 Module 2: Resolve Software Configuration Issues

    Device Manager

    Identify Driver Information Verify Device Installation

    Rollback Driver Updates

    Hardware Profile Configuration

    Remote Configuration

    When driver installs and updates create issues on a system, one of the first tools used to provide insight into such aproblem is Device Manager. Details about how the driver is configured, the version number, conflicting settings andcompatibility problems can be seen from this tool.

    In the case of new installs, Device Manager can be used to verify that the install was successful and that the device isseen and being used by the system. Conflicting device settings can be fixed and the driver version be verified.Depending on the type of device being managed, the driver can be disabled or uninstalled. If an upgrade of anexisting driver has caused a problem, the rollback feature in Device Manager can be used to revert the system to theolder configuration.

    Older devices that require driver settings to be configured manually should be tested carefully. In some cases twodevices will not run at the same time. Hardware Profiles can be used to prevent these devices from running at thesame time. Hardware profiles can also be used to disable drivers that need to be disabled in certain environments.

    Most driver changes should be done locally, but Device Manager can also be run remotely using the Computer Management console or the Device Manager mmc snap-in.

  • 7/30/2019 50331B-EnU StudentGuide M02

    29/42

    Module 2: Resolve Software Configuration Issues 2-27

    Using Compatibility Mode

    Changing Application Install ModeCompatibility Options

    Programs written for older operating systems will not always install their drivers properly during setup on Windows 7.To perform the setup in Compatibility Mode, right-click the install program and click on Properties to get access to theCompatibility tab. Choose the appropriate operating system and settings and then start the install process again.

  • 7/30/2019 50331B-EnU StudentGuide M02

    30/42

    2-28 Module 2: Resolve Software Configuration Issues

    Safe Mode

    Some driver updates might cause the system to crash before allowing an opportunity to revert to an older driver.When the Last Known Good Configuration option is unable to resolve the problem, Safe Mode can be used to fix theproblem. Boot the system in Safe Mode to either remove the device or uninstall the driver.

  • 7/30/2019 50331B-EnU StudentGuide M02

    31/42

    Module 2: Resolve Software Configuration Issues 2-29

    Driver Verifier

    To isolate and troubleshoot driver problems on a computer, the driver verifier can be used. Specific drivers can betargeted to make sure that they access and use memory and other resources on the system properly. It can be runfrom the command-line (verifier.exe) with parameters or as a GUI tool to apply driver settings and then recordviolations of those settings.

    When driver issues are suspected of causing problems on a system, the verifier can be used to test existing drivers tofind which ones might be the source of the problem. Specific driver names can be picked from a list if you have anidea which one is causing the problem. The tool can also detect which drivers were written for older operatingsystems and only check those. Unsigned drivers can also be isolated and tested. If the source of the problem isunclear, you can simply configure the tool to test all of them.

  • 7/30/2019 50331B-EnU StudentGuide M02

    32/42

    2-30 Module 2: Resolve Software Configuration Issues

    Lesson 7: Problem Steps Recorder

    Creating TutorialsConfiguration Options

    Some configuration problems are resolved remotely with the help of the end-user who will describe the problem to atechnician over the phone. Sometimes the description given by the user is not very good because they do notremember the details of the problem or are unable to provide a good description. The Problem Steps Recorder is anew Windows 7 tool that is ideal for such situations. Its main use is to reduce the length and complexity of help deskcalls, but it can help in other situations where technicians and end-users interact remotely.

    Using this tool, a user is able to record screen shots of what happened during the problem. It also documents mouseclicks and key strokes made by the user. The recording is saved in a zipped MHTML format that can be easilytransferred over the network for analysis. The file also contains error messages and any comments added by theuser for those errors. A detailed log with information recorded by the operating system about the errors is alsoincluded.

  • 7/30/2019 50331B-EnU StudentGuide M02

    33/42

    Module 2: Resolve Software Configuration Issues 2-31

    Creating Tutorials

    Record Screen ShotsMHTML Formatting

    Remote Diagnostics

    The nature of this tool opens it up for many situations where the help of an IT Professional is needed. Besides itsprimary purpose of helping technicians remotely diagnose user problems, it may also be used to record problemswith software being tested before general deployment. It can also be used to easily pass on information about aproblem between different levels of IT support in an organization. Short tutorials can also be quickly created bytechnicians who want to give end-users specific directions about how to perform a certain operation.

    To walk a user through using this tool, have them execute the psr.exe file. From the Problem Steps Recorder, theycan click the Start Record button when they are ready to duplicate the steps that caused the problem. As they walkthrough the steps that caused the problem, they might want to add their own comments about what they are doing.They can do this by clicking the Add Comment button and then typing a statement. Once all the steps arecompleted, they can click the Stop Record button. They will be given the option of saving a zipped MHTML file ontheir system. Once the technician gets a copy of the file, individual screen shots can be viewed or it may be run as aslide show.

  • 7/30/2019 50331B-EnU StudentGuide M02

    34/42

    2-32 Module 2: Resolve Software Configuration Issues

    Configuration Options

    The Problem Steps Recorder has a number of configurable options. The default location where files are stored canbe changed. The ability to capture screen shots can also be disabled. The technician would still be able to duplicatethe problem from the mouse click and key stroke details that were recorded. The default number of screen shots in arecording session can also be modified. The default is 25, which means that if 40 screen shots are taken, the first 15will not be a part of the file. Increasing the default setting in this case would solve the problem.

  • 7/30/2019 50331B-EnU StudentGuide M02

    35/42

  • 7/30/2019 50331B-EnU StudentGuide M02

    36/42

    2-34 Module 2: Resolve Software Configuration Issues

    Some intranet web-sites will not display information properly in Internet Explorer 8. How can this problem besolved from the desktop?Configure Internet Explorer 8 to use the Compatibility View. This allows web-sites to be viewed as they would lookfrom Internet Explorer 7.

    Users are complaining about the number of UAC notifications they get when doing some operations on thedesktop. How can you maintain the security of the system and accommodate these users? A new feature of Windows 7 is the ability to change the UAC notification level to reduce the number of prompts theusers will receive.

    You have an old Windows XP application that will not run properly on Windows 7, even in compatibilitymode. What other option is available?Windows 7 Professional, Enterprise and Ultimate editions have a Virtual PC image with a fully licensed version of Windows XP on it. Applications written for Windows XP will most likely run without problems on these images. ATerminal Services deployment of the application might also be tested.

    Many software deployment shares on your network contain the same software product. How can updates tothese shares be maintained and kept consistent?

    Configure a DFS server and use the replication features to keep information in shares consistent.

    The Problem Steps Recorder Tool is not recording all the screens for some of its recordings. What can youdo to make sure that it keeps all of them?Change the default setting for the number of screen shots. The default is 25 but a higher number should be usedwhen necessary.

    A Group Policy deployed application is not being installed automatically on all computers as you expected.It is instead showing up as an option in Add/Remove Programs. How can you fix this?Change the GPO to have the application deployed on the computer side of the policy as an assigned softwareproduct.

    You need to modify the home page on all browsers to point to a web-site on the intranet. How can this be

    done and enforced on all desktops?By using the Group Policy settings for Internet Explorer Maintenance.

  • 7/30/2019 50331B-EnU StudentGuide M02

    37/42

    Module 2: Resolve Software Configuration Issues 2-35

    Review Module 2: Resolve Software Configuration Issues

    Examine the review questions as a class

    R EVIEW

    1. What feature of WIM files allow them to reduce the drive space needed to store multiple images?

    2. What command-line tool can be used to create new partitions?

    3. What is the ImageX command-line utility used for?

    4. What new feature of UAC can be used to reduce the number of elevation prompts?

    5. True or False. Compatibility Mode options can be automatically applied to all users on a system.

    6. What versions of Windows 7 support Windows XP Mode?

    7. What happens if the NTFS & share permissions are not the same for users connecting over the network?

    8. What DFS feature can be used to prevent uses from viewing folders or files they do not have access to?

    9. How are Windows Updates different from Microsoft Updates?

  • 7/30/2019 50331B-EnU StudentGuide M02

    38/42

    2-36 Module 2: Resolve Software Configuration Issues

    10. Why might an administrator disable automatic updates for some computers?

    11. What tool can be used to test drivers installed on a system?

    12. What tool allows you to revert to an older version of a device driver?

    13. What permissions must a user have on a GPO for its settings to be applied to him?

    14. What is a WSUS server used for?

    15. What is GPO filtering?

    16. What format are Problem Step Recorder files stored in?

    17. True or False. The ability to store screen shots in a Problem Steps Recorder file can be disabled.

  • 7/30/2019 50331B-EnU StudentGuide M02

    39/42

    Module 2: Resolve Software Configuration Issues 2-37

    Labs Module 2: Resolve Software Configuration Issues

    Exercise 1: Install Windows Automated InstallationKit

    Exercise 2: Use WAIK to create Windows PE Image

    Exercise 3: Create a VHD disk using Disk Management

    Exercise 4: Copy Windows 7 Install files to VHD

    Exercise 5: Add a Boot menu option for the VHD file

    Exercise 6: Use the Problem Steps Recorder

    Overview: Install Windows 7 deployment tools. Create and work with a Virtual Hard Drive (VHD).Unless stated otherwise, use the Windows 7 image for this lab and login as Admin1 with apassword of Pa$$w0rd. All ISO images will be on the local C: drive in the Labfiles folder.

    Estimated time to complete this lab is 105 minutes

    Exercise 1: Install Windows Automated Installation Kit (WAIK)

    1. Capture the ISO image for the WAIK. (KB3AIK_EN.ISO)2. Run the setup program for WAIK (StartCD.exe) ad an administrator.3. In the Welcome to Windows Automated Installation Kit window, click Windows AIK Setup. 4. Accept the licensing agreement and all the default settings to install the WAIK.

    Exercise 2: Use WAIK to create a Windows PE bootable image

    1. Click Start > All Programs > Microsoft Windows AIK.

    2. Right click Deployment Tools Command Prompt and run as an administrator. 3. Note: Use the Deployment Tools Command Prompt for all future executions of WAIK commands. 4. Use the CD command to navigate to the amd64. (Your instructor will inform you if a different architecture is

    being used).5. Run the command: copype E:\WINPE ( represents the architecture type e.g. amd64)6. Run the command: xcopy c: \program files\windows aik\tools\\ imagex.exe E:\WINPE\ISO (

    represents the architecture type)7. Create the Windows PE image named E:\WINPE\WINPE.ISO by running the command: oscdimg n

    BE:\WINPE\ETFSBOOT.COM E:\WINPE\ISO E:\WINPE\WINPE.ISO

  • 7/30/2019 50331B-EnU StudentGuide M02

    40/42

    2-38 Module 2: Resolve Software Configuration Issues

    8. This image can now be burned to a CD or USB flash drive for use on any system of the right architecture.Third party software must be used for this step.

    Exercise 3: Create a VHD disk using Disk Management

    1. Create a folder on the E: drive named VHD7.2. Open the Computer Management console 3. Double click on Disk Management to view the available drives on the computer 4. Right click Disk Management and choose Create VHD 5. For the location type E:\VHD7\WINDOWS7.VHD6. Change the VHD size to 20000 MB and use a dynamic virtual disk. Click OK.7. Right click the new disk and choose the option to initialize it.8. In the Initialize Disk window, choose the MBR partition style and click OK. 9. Right click on the new drive and choose the option to create a New Simple Volume.10. Accept all the default settings in the New Simple Volume Wizard. 11. Once the drive is formatted, change the drive letter to V: and exit Computer Management.

    Exercise 4: Use WAIK to copy Windows 7 install files to the VHD partition.

    1. Use the Media option on the Virtual Machine Connection window to insert the Windows 7 ISO.2. Click Start > All Programs > Microsoft Windows AIK.3. Right click Deployment Tools Command Prompt and run as an administrator. 4. Run the command : imagex /info G:\sources\install.wim > info.txt .

    (This will create a text file that contains the index IDs for the different editions in the install.wim file.)5. Open the info.txt file by running the command: notepad info.txt.6. Use the menu bar in notepad to open the Find window by clicking Edit > Find.7. Search for t he phrase IMAGE INDEX and make a note of the number associated with it (e.g. IMAGE

    INDEX=1). If there are multiple occurrences of IMAGE INDEX, use the number associated with theWindows 7 Enterprise image. Close notepad.

    8. Run the command: imagex /apply G:\sources\install.wim V:. (Note: represents the IMAGEINDEX number from the previous step. This command will apply the installation image to the VHD.)

    9. Use Windows Explorer or the Command Prompt to verify that the install files are on the V: drive.

    Exercise 5: Add a Boot Menu option for the VHD file.

    1. From the Command Prompt run: bcdedit.exe /copy {current} /d Windows 7 VHD (Note: This command will create a new GUID in the boot loader. {current} automatically references the bootentry for the operating system currently running.)

    2. Use the GUID from the command in the previous step to replace in the following commands:bcdedit /set device vhd=[E:]\vhd7\windows7.vhdbcdedit /set osdevice vhd=[E:]\vhd7\windows7.vhdbcdedit /set detecthal on

    3. Run bcdedit /v to verify the new entry in the boot menu4. Restart the system and choose Windows 7 VHD from the Windows Boot Manager. 5. When the system reboots, make sure to choose Windows 7 VHD from the Boot Manager again. 6. Verify the keyboard and other settings when presented and click Next.7. When prompted, type a user account named Admin1 and a computer name of Virtual1.8. When prompted assign a password of Pa$$w0rd and a hint of Lab Password. Click Next. 9. Leave the Product Key blank and unche ck the option to Automatically activate Windows when online .10. Click Next.11. Read and accept the license agreement. Click Next.

  • 7/30/2019 50331B-EnU StudentGuide M02

    41/42

    Module 2: Resolve Software Configuration Issues 2-39

    12. On the Help protect your computer and improve Windows automatically screen, choose Ask me later. 13. Assign appropriate Time Zone and date settings. Click Next.14. On the Select your computers current location window, choose Work network. 15. Use Disk Management to examine the disk and drive letter assignments.16. Reboot the computer and login to the original Windows 7 installation.

    Exercise 6: Use Problem Steps Recorder to record the steps involved in installing a program

    1. Click Start and in the Search programs and files box, type Problem Steps Recorder. 2. Click on Record steps to reproduce a problem. 3. In the Problem Steps Recorder window, press Alt + G and then open the Settings window.4. Change the output location to E:\TEMP\PPVIEWER.ZIP and the number of screen captures to 50. Make

    sure the Enable screen capture option is set to Yes. Click OK.5. In the Problem Steps Recorder window, press Alt + G and then open the Settings window. Choose the

    option to run the recorder as an administrator.6. In the Problem Steps Recorder window, click Start Record and minimize the recorder.

    From the Command Prompt (as administrator), run the command: \\NYC-DC1\CLASSFILES\TOOLS\PPVIEWER.EXE

    8. In the Power Point Viewer setup, accept the default options to install the application.9. In the Problem Steps Recorder, click Stop Record and close the Problem Steps Recorder.10. Use Windows Explorer to open the file E:\TEMP\PPVIEWER.ZIP11. Double click on the mht file to open it in Internet Explorer. Examine the information recorded.

    http://server01/CLASSFILES/TOOLS/PPVIEWER.EXE%0dhttp://server01/CLASSFILES/TOOLS/PPVIEWER.EXE%0dhttp://server01/CLASSFILES/TOOLS/PPVIEWER.EXE%0dhttp://server01/CLASSFILES/TOOLS/PPVIEWER.EXE%0d
  • 7/30/2019 50331B-EnU StudentGuide M02

    42/42

    2-40 Module 2: Resolve Software Configuration Issues