Out Troubleshoot Boot Configuration And Startup Pocket .

Transcription

The practical, portable guide forWindows administrators!Portable and precise, this pocket-sized guide deliversready answers for managing storage, security, andnetworking features in Windows 8.1. Zero in on coreprocedures and operations through quick-referencetables, instructions, and lists. You’ll get the focusedinformation you need to save time and get the jobdone—whether at your desk or in the field.Get fast facts to: Troubleshoot boot configuration and startupAdminister Group Policy settingsAbout the AuthorWilliam R. Stanek is a leadingtechnology expert with 20 years of experience in systemsmanagement and advancedprogramming. He is an awardwinning author of more than150 books, including MicrosoftExchange Server 2013 PocketConsultant and two new InsideOut titles for Windows Server2012 R2. He is the series editorfor the Pocket Consultant lineof books.Manage file systems and drivesConfigure and manage storageImplement file sharing and auditingManage data access and availabilityAlso Look ForAdminister BitLocker and TPM servicesConfigure and troubleshoot TCP/IP networkingEnable remote and mobile accessWindows 8.1 AdministrationEssentials & ConfigurationPocket ConsultantWilliam StanekISBN 9780735682658microsoft.com/mspressISBN: 978-0-7356-8261-0U.S.A. 39.99Canada 41.99[Recommended]Operating Systems/WindowsCelebrating 30 years!Windows 8.1 AdministrationPocket Consultant Storage,Security, & NetworkingWindows 8.1 AdministrationStorage, Security, & NetworkingPocket ConsultantStanekWindows 8.1AdministrationStorage, Security,& NetworkingWilliam R. StanekAuthor and Series EditorPocketConsultant

PUBLISHED BYMicrosoft PressA Division of Microsoft CorporationOne Microsoft WayRedmond, Washington 98052-6399Copyright 2014 by William R. StanekAll rights reserved. No part of the contents of this book may be reproduced or transmittedin any form or by any means without the written permission of the publisher.Library of Congress Control Number: 2013955480ISBN: 978-0-7356-8261-0Printed and bound in the United States of America.First PrintingMicrosoft Press books are available through booksellers and distributors world wide. If you need support related to this book, email Microsoft Press BookSupport at mspinput@microsoft.com. Please tell us what you think of this bookat soft and the trademarks listed at roperty/trademarks/en-us.aspx are trademarks of the Microsoft groupof companies. All other marks are property of their respective owners.The example companies, organizations, products, domain names, email addresses, logos,people, places, and events depicted herein are fictitious. No association with any realcompany, organization, product, domain name, email address, logo, person, place, orevent is intended or should be inferred.This book expresses the author’s views and opinions. The information contained in thisbook is provided without any express, statutory, or implied warranties. Neither the authors,Microsoft Corporation, nor its resellers, or distributors will be held liable for any damagescaused or alleged to be caused either directly or indirectly by this book.Acquisitions Editor: Anne HamiltonDevelopmental Editor: Karen SzallEditorial Production: Online Training Solutions, Inc. (OTSI)Project Editor: Rosemary CapertonTechnical Reviewer: Rozanne Whalen; Technical Review services provided byContent Master, a member of CM Group, Ltd.Copyeditor: Denise Bankaitis (OTSI)Indexer: Krista Wall (OTSI)Cover: Best & Company Design

ContentsAcknowledgmentsIntroductionChapter 1xixiii Managing firmware, boot configuration, andstartup1Navigating and understanding firmware options. . . . . . . . . . . . . . . 1Firmware interface types and boot data2Boot services, run-time services, and beyond3UEFI5Navigating startup and power states. . . . . . . . . . . . . . . . . . . . . . . . . . 8Working with firmware interfaces9Examining firmware interfaces10Power states and power management12Diagnosing and resolving startup problems. . . . . . . . . . . . . . . . . . . 15Troubleshooting startup phase 117Troubleshooting startup phase 218Troubleshooting startup phase 319Troubleshooting startup phase 420Troubleshooting startup phase 521Managing startup and boot configuration. . . . . . . . . . . . . . . . . . . . 22Setting startup and recovery options22Managing system boot configuration23Using the BCD Editor25Managing the BCD store. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27Viewing BCD entries28Creating and identifying the BCD store31Importing and exporting the BCD store31Creating and deleting BCD entries32What do you think of this book? We want to hear from you!Microsoft is interested in hearing your feedback so we can continually improve ourbooks and learning resources for you. To participate in a brief online survey, please visit:microsoft.com/learning/booksurveyiii

Chapter 2Setting BCD entry values33Changing Data Execution Prevention andPhysical Address Extension options38Changing the operating system display order39Changing the default operating system entry40Changing the default timeout40Changing the boot sequence temporarily41Using TPM and BitLocker Drive Encryption43Creating trusted platforms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43TPM: the essentials44TPM: management and policies45Enabling TPM48Initializing and preparing a TPM for first use50Turning an initialized TPM on or off53Clearing the TPM53Changing the TPM owner password55BitLocker Drive Encryption: the essentials. . . . . . . . . . . . . . . . . . . . . 56Understanding BitLocker Drive Encryption56Hardware encryption, secure boot, and network unlock59Deploying BitLocker Drive Encryption62Managing BitLocker Drive Encryption. . . . . . . . . . . . . . . . . . . . . . . . 66Preparing for BitLocker Drive EncryptionChapter 367Enabling BitLocker on nonsystem volumes70Enabling BitLocker on USB flash drives72Enabling BitLocker on system volumes74Managing and troubleshooting BitLocker78Managing disk drives and file systems81Disk management essentials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82Using the This PC console85Using Disk Management87Using FSUtil and DiskPart89Improving disk performance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90ivContentsUnderstanding and using Windows ReadyBoost90Enabling and configuring Windows ReadyBoost91Understanding and using Windows ReadyDrive93Understanding and using Windows SuperFetch93

Working with basic and dynamic disks . . . . . . . . . . . . . . . . . . . . . . . 95Preparing basic and dynamic disks. . . . . . . . . . . . . . . . . . . . . . . . . . . 99Understanding drive designations99Installing and initializing new physical disks100Changing a disk’s partition table style101Marking a partition as active101Converting a basic disk to a dynamic disk or vice versa103Working with disks, partitions, and volumes . . . . . . . . . . . . . . . . 104Partitioning disks and preparing them for use. . . . . . . . . . . . . . . 106Creating partitions, logical drives, and simple volumes106Creating spanned and striped volumes109Shrinking or extending volumes111Formatting partitions and volumes112Assigning, changing, or removing drive lettersand paths113Assigning, changing, or deleting a volume label114Deleting partitions, volumes, and logical drives115Converting a volume to NTFS116Recovering a failed simple, spanned, or striped volume118Regenerating a striped set with parity118Using disk mirroring. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119Creating mirrored volumes119Breaking a mirrored set120Removing a mirrored set120Moving a dynamic disk to a new system. . . . . . . . . . . . . . . . . . . . 121Using storage spaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122Getting started with storage spaces122Creating redundant data sets123Working with storage pools. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124Creating a storage pool and allocating storage124Adding drives to a storage space127Changing the storage configuration128Deleting a storage space128Deleting a storage pool129Troubleshooting storage spaces129Contentsv

Chapter 4Configuring and maintaining storage131Working with removable storage devices. . . . . . . . . . . . . . . . . . . . 131Working with data discs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Disc burning: the essentials133Mounting ISO images134Burning ISO images to disc134Burning mastered discs135Burning discs with live file systems136Changing the default burning options137Managing disk compression and file encryption. . . . . . . . . . . . . 137Compressing drives and data138Encrypting drives and data140Troubleshooting common disk problems. . . . . . . . . . . . . . . . . . . 144Chapter 5Repairing disk errors and inconsistencies150Checking for disk errors151Defragmenting disks154Resynchronizing and repairing a mirrored set156Repairing a mirrored system volume to enable boot157Configuring user and computer policies159Group Policy essentials. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159Accessing and using local group policies160Accessing and using site, domain, and OU policies163Configuring policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165Viewing policies and templates166Enabling, disabling, and configuring policies166Adding or removing templates167Working with file and data management policies. . . . . . . . . . . . 168Configuring disk quota policies168Configuring System Restore policies170Configuring Offline File policies171Configuring policy for Work Folders176Working with access and connectivity policies. . . . . . . . . . . . . . . . 177Configuring network policies177Configuring Remote Assistance policies178Working with computer and user script policies. . . . . . . . . . . . . 180Controlling script behavior through policyviContents180

Assigning computer startup and shutdown scripts182Assigning user logon and logoff scripts183Working with logon and startup policies . . . . . . . . . . . . . . . . . . . 184Chapter 6Setting policy-based startup programs185Disabling run lists through policy185Optimizing file security187File security and sharing options. . . . . . . . . . . . . . . . . . . . . . . . . . . 187Controlling access to files and folders with NTFSpermissions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192Understanding and using basic permissions193Assigning special permissions198Assigning claims-based permissions202File ownership and permission assignment205Applying permissions through inheritance. . . . . . . . . . . . . . . . . . 206Chapter 7Inheritance essentials206Viewing inherited permissions207Stopping inheritance208Restoring inherited permissions208Determining the effective permissions andtroubleshooting209Managing file sharing and auditing213Sharing files and folders over the network. . . . . . . . . . . . . . . . . . 213Controlling access to network shares214Creating a shared resource215Creating and managing shared folders in Group Policy219Using and accessing shared resources221Using and accessing shared folders for administration224Troubleshooting file sharing226Using and configuring public folder sharing. . . . . . . . . . . . . . . . . 227Using public folder sharing227Configuring public folder sharing228Implementing synced sharing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229Understanding work folders229Creating sync shares and enabling SMB access231Accessing Work Folders on clients234Contentsvii

Auditing file and folder access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235Chapter 8Enabling auditing for files and folders235Configuring and tracking auditing235Maintaining data access and availability241Configuring File Explorer options. . . . . . . . . . . . . . . . . . . . . . . . . . . 241Customizing File Explorer241Configuring advanced File Explorer options244Managing offline files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248Understanding offline files248Making files or folders available offline249Managing offline file synchronization252Configuring disk usage limits for offline files257Managing encryption for offline files258Making offline files unavailable258Configuring disk quotas . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259Using disk quotas259Enabling disk quotas on NTFS volumes260Viewing disk quota entries262Creating disk quota entries262Updating and customizing disk quota entries263Deleting disk quota entries263Exporting and importing disk quota settings264Disabling disk quotas265Using branch caching . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266Chapter 9Configuring and troubleshooting TCP/IPnetworking271Navigating Windows 8.1 networkin

Windows ISBN: 978-0-7356-8261-0 Windows 8.1 Administration Storage, Security, & Networking Pocket Consultant The practical, portable guide for Windows administrators! Portable and precise, this pocket-sized guide delivers ready answers for managing storage, security, and networking features in Windows 8.1. Zero in on core