1. Trang chủ
  2. » Công Nghệ Thông Tin

Microsoft windows xp professional exam 70 - 270 phần 8 pps

132 304 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Using Event Viewer
Trường học University of Technology Vietnam
Chuyên ngành Information Technology
Thể loại Giáo trình hướng dẫn sử dụng Windows XP Professional
Năm xuất bản Not specified
Thành phố Hà Nội
Định dạng
Số trang 132
Dung lượng 0,96 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Estimated lesson time: 30 minutes Overview of System Restore System Restore works by creating restore points that contain a snapshot of the Reg-istry which includes user account, applic

Trang 1

18 - 13

2 In the Control Panel window, click Performance And Maintenance.

3 In the Performance And Maintenance window, click Administrative Tools.

4 In the Administrative Tools window, double-click Event Viewer.

5 In the left pane, click the log you want to view.

Windows displays the events in the log file in the right window, as shown in ure 18-7

Fig-F18us07

Figure 18-7 Use Event Viewer to view information contained in Windows XP Professional logs.You will encounter five types of events in the logs you view in Event Viewer A uniqueicon identifies each event type so that you can easily distinguish between entries Thefive types of events you will encounter are as follows:

Error This type of entry, indicated by an icon with a red X, means that a significantproblem has occurred, such as a service that might not have started properly

Warning This type of entry, indicated by an icon with a yellow exclamation point,means that an event has occurred that is not currently detrimental to the systembut might indicate a possible future problem

Information This type of entry, indicated by an icon with a blue “i,” means that asuccessful operation has occurred For example, a service starting successfullymight trigger this type of event

Audit Success This type of entry, indicated by a key icon, means that an auditedsecurity access attempt—for example, a successful logon to the system—was suc-cessful

Audit Failure This type of entry, indicated by a lock icon, means that an auditedsecurity access attempt—for example, a failed attempt to open an audited file ordirectory—was not successful

Lesson 2 Using Event Viewer

Trang 2

How to View an Event

Double-click any event in the right pane of Event Viewer to open the Event Propertiesdialog box (see Figure 18-8), which shows a description of the event The up anddown arrow buttons let you move through the events in the log without having toclose the Event Properties dialog box and then reopen it for each event you want toview The Copy button (showing the Copy icon) copies the information about theevent to the Windows Clipboard

F18us08

Figure 18-8 Open an event’s Properties dialog box to see a description of the event.

The Event Properties dialog box contains the following information to help you tify an event:

iden-Date and Time The date and time that the event occurred

Type The type of event (Information, Warning, and so on)

User The user with which the event is associated Many events do not have an ciated user

asso-Computer The computer on which the event occurred

Source The service that experienced the event

Category The category associated with the event Most events, particularly in theSystem log, do not have categories Some application developers specify a cate-gory for events that concern the application, so you will see some events in theApplication log that have an associated category In the Security log, the categoryindicates the type of event that was audited

Trang 3

18 - 15

Event ID The Event ID number associated with the event Microsoft keeps track ofEvent IDs and often makes solutions to problems available in the MicrosoftKnowledge Base To find out more about an event, use the Event ID as a keywordsearch in the Knowledge Base

Description A description of the event The description often includes tion on other services affected by the event and a link for finding out moreinformation

informa-How to Locate Events In a Log

When you first start Event Viewer, it automatically displays all events that are recorded

in the selected log Because many events occur on a computer running Windows XPProfessional, the number of events displayed can make it difficult to find the eventsyou are looking for To change what appears in the log, you can locate selected events

by using the Filter command You can also search for specific events by using the Findcommand

To filter or find events, start Event Viewer, and then on the View menu, click Filter orclick Find The options provided by Filter and Find are almost identical Figure 18-9shows the options available on the Filter tab

F18us09

Figure 18-9 You can apply a filter to make it easier to locate certain types of events.

Table 18-2 describes the options for using the Filter tab to filter events and the Findcommand to find events

Lesson 2 Using Event Viewer

Trang 4

Logging Options

You can configure the properties of each individual log To configure the settings forlogs, right-click the log in Event Viewer, and then click Properties to display the Prop-erties dialog box for the log

Use the Properties dialog box for each type of audit log to control the following:

■ The maximum size of each log, which can be from 64 KB to 4,194,240 KB (4 GB).The default size is 512 KB

■ The action that Windows XP Professional takes when the log fills up To controlthis action, click one of the options described in Table 18-3

Table 18-2 Options for Filtering and Finding Events

Event Types The types of events to view

Event Source The software or component driver that logged the event

Category The type of event, such as a logon or logoff attempt or a system eventEvent ID An event number to identify the event This number helps product sup-

port representatives track events

User A user logon name

Computer A computer name

From And To The date ranges for which to view events (Filter dialog box only)

Restore Defaults Clears any changes in this tab and restores all defaults

Description The text that is in the description of the event (Find dialog box only)Search Direction The direction (up or down) in which to search the log (Find dialog box

only)Find Next Finds and displays the next occurrence defined by the Find Settings (Find

dialog box only)

Table 18-3 Options for Handling Full Audit Log Files

Overwrite Events As

Needed

You might lose information if the log becomes full before you archive

it However, this setting requires no maintenance

Overwrite Events Older

Than X Days

You might lose information if the log becomes full before you archive

it, but Windows XP Professional will lose only information that is at

least x days old Enter the number of days for this option The default

Trang 5

18 - 17

How to Save and Open Logs

Saving logs allows you to maintain a history of events Many companies have policies

on archiving logs for a specified period—especially auditing-related events in the rity log

Secu-To work with a log, right-click the log you want to configure in Event Viewer, and thenclick one of the options described in Table 18-4

Lesson Review

The following questions are intended to reinforce key information presented in thislesson If you are unable to answer a question, review the lesson materials and try thequestion again You can find answers to the questions in the “Questions and Answers”section at the end of this chapter

1 What are the three Windows XP Professional logs you can view with Event

Viewer, and what is the purpose of each log?

Table 18-4 Options to Archive, Clear, or View a Log File

Save the log Click Save Log File As, and then type a filename

Clear the log Click Clear All Events to clear the log Windows XP Professional creates

a security log entry, stating that the log was cleared

Open a saved log Click Open Log File

Open a new log

view

Click New Log View to create a second view of the selected log By default, this view is named the same as the original view with a copy number appended in parentheses For example, if you create a new view of the System log, the default name for the new view is System (2) Right-click the new view and click Rename to change the name You can use different views to look at log files filtered different ways

or to open saved logs

Lesson 2 Using Event Viewer

Trang 6

2 The two ways that Event Viewer provides for locating specific events are the

_ command and the _ command What does each ofthe commands allow you to do?

3 The size of each log can be from KB to GB, and the default size is

■ You use Event Viewer to view the contents of the Windows XP Professional logs

■ Viewing the Event Properties dialog box shows you the date and time the eventoccurred, the user and service associated with the event, an Event ID that you canuse to find more information about the event, and a detailed description of theevent

■ You can use the Filter and Find commands in Event Viewer to easily locate specificevents or types of events

■ For each log in Windows XP Professional, you can control the maximum size thelog is allowed to reach and the action that Windows XP Professional takes whenthe log fills up

■ You can archive the Windows XP logs so that you keep an historical record ofevents and track trends over time

Trang 7

18 - 19

Lesson 3: Using Scheduled Tasks

Use Scheduled Tasks to identify programs and batch files you want to run once, at

regular intervals, or at specific times You can schedule any script, program, or ment to start at a specified time and interval, or when certain operating system eventsoccur This feature can complete many administrative tasks for you

docu-After this lesson, you will be able to

■ Identify tasks that you can schedule.

■ Schedule a task.

■ Configure advanced options for a scheduled task.

■ Troubleshoot scheduled tasks.

Estimated lesson time: 25 minutes

Overview of Scheduled Tasks

Windows XP Professional saves scheduled tasks in the Scheduled Tasks folder (see ure 18-10), which you can access through the Control Panel under Performance AndMaintenance In addition, you can access Scheduled Tasks on another computer bybrowsing that computer’s resources using My Network Places, which allows you tomove tasks from one computer to another For example, you can create task files formaintenance, and then add them to a user’s computer as needed

Fig-F18us10

Figure 18-10 Schedule a task to run when you need it to.

Use Scheduled Tasks to perform the following tasks:

Lesson 3 Using Scheduled Tasks

Trang 8

■ Run maintenance programs at specific intervals.

■ Run programs at a time when there is less demand for computer resources

How to Schedule a Task

Use the Scheduled Task Wizard to schedule tasks You access the wizard in the uled Tasks folder by double-clicking Add Scheduled Task Table 18-5 describes theoptions that you can configure in the Scheduled Task Wizard

Sched-How to Configure Advanced Options for a Scheduled Task

In addition to the options that are available in the Scheduled Task Wizard, you can setseveral additional options for tasks You can change options that you set with theScheduled Task Wizard or set additional advanced options by configuring advancedproperties for the task

Table 18-5 Scheduled Task Wizard Options

Application The applications to schedule Select from a list of applications that are

registered with Windows XP Professional, or click Browse to specify any program or batch file

Name A descriptive name for the task

Perform This Task How often Windows XP Professional will perform the task You can

select Daily, Weekly, Monthly, One Time Only, When My Computer Starts, or When I Log On

Start Time The start time for the task to occur

Start Date The start date for the task

User Name And

Password

A user name and password You can enter your user name and word or another user name and password to have the application run under the security settings for that user account If the user account that you used to log on does not have the rights required by the scheduled task, you can use another user account that does have the required rights For example, you can run a scheduled backup by using a user account that has the required rights to back up data but does not have other administrative privileges

pass-Advanced Properties Select this check box if you want the wizard to display the Advanced

Properties dialog box so that you can configure additional properties after you click Finish Advanced Properties are covered in the next sec-tion

Trang 9

18 - 21Table 18-6 describes the tabs in the Advanced Properties dialog box for the scheduledtask.

How to Troubleshoot Scheduled Tasks

In general, troubleshooting the Scheduled Tasks involves checking the parameters thatyou have set up In the Scheduled Tasks window, switch the view to Details view Twocolumns, Status and Last Result, are useful in determining whether a task was success-ful or not

The Advanced menu provides a few options to help you with troubleshooting Whenyou open Scheduled Tasks and click Advanced, the first option on the Advanced menuallows you to stop and start the Task Scheduler Service, and the selection is either StopUsing Task Scheduler or Start Using Task Scheduler If your scheduled tasks are notstarting, you can check this option to be sure that the Task Scheduler Service is run-ning; if it is not, you can start it The second option is similar to the first, only it pausesand continues the service If the service is paused, scheduled tasks do not start

The third option on the Advanced menu, Notify Me Of Missed Tasks, causes the system

to send you a message when a scheduled task does not occur The next option on theAdvanced menu is the AT Service Account, which allows you to change the accountbeing used from the System account The next option, View Log, allows you to view alog of when the Task Scheduler Service started, stopped, paused, and continued It alsologs the name of each scheduled task, the application or task that started, and the timeand date the task was started The final option, View Hidden Tasks, allows you to viewtasks created by Windows and applications that hide the tasks by default

Table 18-6 Scheduled Task Wizard Advanced Options

Tab Description

Task Change the scheduled task or change the user account that is used to run the task

You can also turn the task on and off

Schedule Set and display multiple schedules for the same task You can set the date, time,

and number of repeat occurrences for the task For example, you can set up a task

to run every Friday at 10:00 p.m

Settings Set options that affect when a task starts or stops, such as how long a backup can

take, if the computer can be in use, or if the computer can be running on batteries when it runs the task

Security Change the list of users and groups that have permission to perform the task, or

change the permissions for a specific user or group This tab is available only if you have simple file sharing disabled

Lesson 3 Using Scheduled Tasks

Trang 10

Practice: Using Task Scheduler

In this practice, you schedule Address Book to start at a predetermined time You canuse this as a reminder to review address information You also configure Task Sched-uler options

1 Click Start, and then click Control Panel.

2 In the Control Panel window, click Performance And Maintenance.

3 In the Performance And Maintenance window, click Scheduled Tasks.

Windows XP Professional opens the Scheduled Tasks folder

4 Double-click Add Scheduled Task.

The Scheduled Task Wizard appears

Windows XP Professional displays the Select Program To Schedule dialog box

7 Double-click Program Files, and then double-click Windows NT.

8 Double-click Accessories, and then double-click WordPad.

9 Type Launch WordPad in the Type A Name For This Task text box.

The Type A Name For This Task text box allows you to enter a description that ismore intuitive than the program name Windows XP Professional displays thisname in the Scheduled Tasks folder when you finish the wizard

10 Click One Time Only, and then click Next.

11 In the Start Time box, set the time to 4 minutes after the current system time and

make a note of this time

To confirm the current system time, look at the Windows taskbar Do not changethe entry in the Start Date text box

12 Click Next.

The wizard requires you to enter the name and password of a user account WhenTask Scheduler runs the scheduled task, the program receives all the rights andpermissions of the user account that you enter here The program is also bound byany restrictions on the user account Notice that the user name you are currentlyusing is already filled in as the default You must type the correct password for theuser account in both password boxes before you can continue

Trang 11

18 - 23You will schedule the console to run with your administrative privileges.

13 In both the Enter The Password text box and the Confirm Password text box, type

Notice that the wizard added the task to the list of scheduled tasks

Note The account that will run the task must have the Log On As A Batch Job user right in order to run a scheduled task This right is normally added automatically when you create a scheduled task If it is not, you should add the right to that account See Chapter 16 for more information on user rights.

16 To confirm that you scheduled the task successfully, wait for the time that you

configured in Step 11, and WordPad will start

17 Close WordPad.

Lesson Review

The following questions are intended to reinforce key information presented in thislesson If you are unable to answer a question, review the lesson materials and try thequestion again You can find answers to the questions in the “Questions and Answers”section at the end of this chapter

1 How can Scheduled Tasks help you monitor, manage, and maintain network

resources?

2 Which of the following are valid choices for the frequency with which Scheduled

Tasks schedules programs to run? (Choose all that apply.)

a Daily

b One time only

c When the computer shuts down

d When a user logs off

Trang 12

3 Why do you have to assign a user account and password for each task that you

schedule using the Scheduled Task Wizard?

4 If none of your scheduled tasks is starting, what is one thing that you need to

Trang 13

com-18 - 25

Lesson 4: Using System Restore

System Restore is a feature that monitors changes to certain system and applicationfiles System Restore functions like an “undo” feature for Windows XP Professionalconfiguration changes, allowing you to recover from problems caused by incorrect sys-tem settings, faulty drivers, and incompatible applications Windows XP Professionalcreates restore points automatically, and you can also create a restore point manually

After this lesson, you will be able to

■ Explain System Restore.

■ Enable or disable System Restore.

■ Create a restore point.

■ Restore a restore point.

Estimated lesson time: 30 minutes

Overview of System Restore

System Restore works by creating restore points that contain a snapshot of the

Reg-istry (which includes user account, application, and hardware configuration) and acopy of certain system files that Windows XP Professional requires for startup, includ-ing those in the %systemroot% directory and boot files on the system partition You canrestore your computer to a particular restore point at any time

By default, System Restore creates restore points when the following events occur:

■ Every 24 hours if the computer is turned on or if it has been 24 hours since thecomputer was last turned on

■ When you install an unsigned device driver

■ When System Restore–compliant applications are installed

■ When updates are installed through Automatic Updates or Windows Update

■ When you restore data from backup media using Windows Backup

■ When you restore a restore point

■ When certain system or application files are changed

■ When you create a restore point manually

System Restore also monitors file operations for a core set of system and applicationfiles These files are specified in %systemroot%\System32\Restore\Filelist.xml SystemRestore records changes to these file and sometimes copies them to a hidden archivebefore allowing the files to be overwritten, deleted, or changed

Lesson 4 Using System Restore

Trang 14

System Restore does not monitor the following files and folders:

■ The virtual memory paging file

■ Personal user data, such as files in My Documents, Favorites, Recycle Bin, rary Internet Files, History, and Temp folders

Tempo-■ Image and graphics files, such as those with bmp, jpg, and eps extensions

■ Application data files with extensions not listed in systemroot\System32\Restore\Filelist.xml, such as doc, xls, mdb, and pst

Restore point information is saved to a hidden folder on the volume in which a tored file is located The archive collects multiple restore points, each representingindividual system states The files, Registry snapshots, and logs associated with olderrestore points are purged on a first in, first out (FIFO) basis, optimizing System Restoredisk space and making room for new restore points

Windows Registry

In most situations, the default System Restore operation is satisfactory However,there might be situations in which you need to change how System Restore func-tions There are four settings that you can change in the Windows Registry thataffect the intervals System Restore uses when creating automatic restore pointsand the disk space it uses

Each of these settings is located in the WARE\Microsoft\Windows NT\CurrentVersion\SystemRestore subkey These set-tings include the following:

HKEY_LOCAL_MACHINE\SOFT-■ RPSessionInterval This setting specifies the intervals, in seconds,between scheduled restore-point creations during an active user session Thedefault value is 0 seconds (disabled)

RPGlobalInterval This setting specifies the time interval, in seconds, atwhich scheduled restore points are created (regardless of whether or notthere is an active user session) The default value is 86,400 seconds (24hours)

RPLifeInterval This setting specifies the time interval, in seconds, forwhich restore points are kept System Restore deletes restore points olderthan the specified value The default value is 7,776,000 seconds (90 days)

DiskPercent This setting specifies the maximum amount of disk space oneach drive that System Restore can use This value is specified as a percent-age of the total drive space The default value is 12 percent

Trang 15

18 - 27

Exam Tip Restoring to a restore point affects the Windows Registry and certain system and application files The restoration does not affect user-created documents and data Restoring to a restore point provides a safe means to reset the Windows configuration to an earlier time.

How to Enable or Disable System Restore

System Restore is enabled by default in Windows XP Professional to monitor all drives

on the computer You can disable System Restore entirely or you can disable it on anyparticular drive The one exception to this is that you cannot disable System Restore onthe system drive without disabling it on all drives

To turn off System Restore for all drives, use these steps:

1 Click Start, and then click Control Panel.

2 In the Control Panel window, click Performance And Maintenance.

3 In the Performance And Maintenance window, click System.

4 In the System Properties dialog box, on the System Restore tab (see Figure 18-11),

select the Turn Off System Restore On All Drives check box

F18us11

Figure 18-11 Turn off System Restore for all drives.

To turn off System Restore for a particular drive or to change the disk space that SystemRestore uses for a drive, use these steps:

1 In the System Properties dialog box, on the System Restore tab, in the Available

Drives list, click the drive you want to configure, and then click Settings

!

Lesson 4 Using System Restore

Trang 16

2 In the Settings dialog box for the drive, check the Turn Off System Restore On

This Drive check box to disable file monitoring for that drive

3 Use the Disk Space To Use slider to control how much disk space System Restore

uses to save restore points on the drive

4 Click OK.

How to Create a Restore Point

System Restore creates restore points automatically based on criteria you learned aboutearlier in this lesson However, you should create a restore point manually if you areabout to perform any major action, such as installing or removing an application,installing a new hardware device, or troubleshooting a problem

To create a restore point, use these steps:

1 Click Start, point to All Programs, point to Accessories, point to System Tools, and

then click System Restore

Windows displays the System Restore window, as shown in Figure 8-12

2 Click Create A Restore Point, and then click Next.

3 In the Restore Point Description text box, type a name that describes the restore

point, and then click Create

4 Click Close.

F18us12

Figure 18-12 Create a restore point before making any major changes.

Trang 17

18 - 29

How to Restore a Restore Point

If you experience a problem in Windows, you can often solve that problem by ing to an earlier restore point You can also restore to a restore point to undo configu-ration changes that a user might not remember the details of For example, if a userinstalls incompatible software that causes problems or makes changes to the Windowsconfiguration, you can restore to a restore point created before the problem occurred

restor-To restore a restore point, use these steps:

1 Click Start, point to All Programs, point to Accessories, point to System Tools, and

then click System Restore

2 Click Restore My Computer To An Earlier Time, and then click Next.

Windows displays the Select A Restore Point page (see Figure 8-13), which sents a simple, calendar-based way to browse available restore points Dates inbold represent days when a restore point was created

pre-3 Click any date that is listed in bold, and then click a restore point on that day.

F18us13

Figure 18-13 Browse available restore points by date.

4 Click Next to continue.

Windows displays the Confirm Restore Point Selection page, which warns you thatthe computer will be shut down during the restoration process

Lesson 4 Using System Restore

Trang 18

1 When does System Restore create restore points automatically?

2 Will System Restore recover a document that you accidentally delete from the My

Documents folder?

3 How can you prevent System Restore from monitoring particular drives?

Trang 19

18 - 31

Lesson Summary

■ System Restore works by creating restore points that contain a snapshot of theRegistry (which includes user account, application, and hardware configuration)and a copy of certain system files that Windows XP Professional requires for star-tup System Restore creates restore points automatically when certain eventsoccur, and you can also create restore points manually

■ System Restore is enabled by default in Windows XP Professional to monitor alldrives on the computer You can disable System Restore entirely or you can dis-able it on any particular drive You cannot disable System Restore on the systemdrive without disabling it on all drives

■ You should create a restore point manually if you are about to perform any majoraction, such as installing or removing an application, installing a new hardwaredevice, or troubleshooting a problem

■ Windows provides access to restore points in a convenient date-based display.When you restore to a restore point, Windows must restart so that it can applyconfiguration changes

Lesson 4 Using System Restore

Trang 20

Lesson 5: Using Remote Desktop and Remote Assistance

Remote Assistance and Remote Desktop are both Windows XP Professional featuresthat allow remote access to a computer Remote Desktop provides a user with a way tocontrol a computer running Windows XP Professional from a remote location RemoteAssistance allows a user to invite an expert user in a remote location to assist withproblems

After this lesson, you will be able to

■ Configure and use Remote Desktop.

■ Configure and use Remote Assistance.

Estimated lesson time: 30 minutes

How to Configure and Use Remote Desktop

Remote Desktop is designed to allow users to remotely gain access to a Windows XPProfessional desktop from another computer on the network After connecting to theremote desktop, a user sees the remote desktop in a window and can access files, fold-ers, and applications on the remote computer After a connection is established, thelocal desktop is locked for security reasons, preventing anyone from viewing the tasksthat are being performed remotely

Remote Desktop is designed to allow a user to have full control over a Windows XPProfessional desktop from another computer on the network or even from the Internet.This is useful when a user is working from home, another office, or another site andrequires access to information or programs on a primary office computer While a user

is remotely accessing a computer, local access by another user is not permitted Anexception to this is an administrator; administrators are permitted to log on locallywhile another user is connected remotely, but the remote session is then terminated

When you are connected to a computer via Remote Desktop, many of the resources onthe host computer are available on the client computer These resources include thefollowing:

File System While you are connected to the remote host, the file system on the clientcomputer can be made available If you open My Computer on the host computer,you will see the hard drives for the client computer This feature allows you tocopy information between the host and client computer

Audio Audio generated on the host computer plays through the client computer’ssound system

Trang 21

18 - 33

Port The applications running within the session can have access to the ports on theclient computer, which allows them to access and manipulate printers, scanners,and other peripheral devices

Printer The default local or network printer for the client computer becomes thedefault printing device for the Remote Desktop session You print a document onthe host computer to the printer connected to the client

Clipboard The Remote Desktop host and the client computer share a Clipboard,which allows data to be copied between applications running on the remote com-puter and applications running on the client computer

Remote Desktop Requirements

Remote Desktop requires the following:

■ A remote computer that is running Windows XP Professional and that is connected

to a local area network (LAN) or the Internet This is the computer to which youwant to gain access remotely

■ A client computer with access to the host computer through a LAN, dial-up, or tual private network (VPN) connection that has the Remote Desktop Connectionprogram or the Terminal Services Client installed A version of the Remote Desk-top Connection program is available for most versions of Windows Just insert theWindows XP Professional installation CD-ROM on the client computer and selectthe option to install the Remote Desktop Connection software

vir-■ A user account with appropriate permissions The user must be an administrator

or a member of the Remote Users group, and have a password

How to Configure a Computer to Accept Remote Desktop Connections

Remote Desktop configuration is a two-part process First, you must configure the hostcomputer to allow Remote Desktop connections Then, you must configure the clientcomputer with the Remote Desktop Connection client software

To configure a computer running Windows XP Professional to allow Remote Desktopconnections, follow these steps:

1 From the Start menu (or from the desktop or in Windows Explorer), right-click My

Computer and select Properties

2 On the Remote tab, in the Remote Desktop section, select Allow Users To Connect

Remotely To This Computer, as shown in Figure 18-14

Lesson 5 Using Remote Desktop and Remote Assistance

Trang 22

Figure 18-14 Enable Remote Desktop on a computer running Windows XP Professional.

3 If the user account to be used to connect remotely is not a member of the

Admin-istrators group, click Select Remote Users, add the appropriate user account, andthen click OK

con-change the listening port for Remote Desktop,” available at http://support.microsoft.com/

kb/306759.

How to Connect to a Remote Computer

After a computer running Windows XP Professional is configured to allow RemoteDesktop connections, you can connect to that computer by using the Remote DesktopConnection client software on another computer From the Start menu, select All Pro-grams, then Accessories, then Communications, and then Remote Desktop Connection

In the Remote Desktop Connection dialog box, click the Options button to display

Trang 23

18 - 35configurable options, as shown in Figure 18-15 The only information that you mustenter to establish a connection is the name or IP address of the computer Other con-figurable options include the following:

■ General options, including the user name, password, and domain name used forauthentication and the ability to save connection settings

■ Display options, including the configuration of the size of the remote connectiondisplay (all the way up to full screen) and color settings

■ Local Resources options, including sound and keyboard configuration, and whichlocal devices to connect to when logged on the remote computer

■ Programs options, which provide the ability to automatically launch a programwhen a connection is established

■ Experience options, which allow the configuration of the connection speed tooptimize performance, and provide the ability to control the display of the desk-top background, themes, menu and windows animation, and other items that canaffect performance

F18us15

Figure 18-15 Configure options for connecting to a remote computer.

To use the Remote Desktop Connections client, use these steps:

1 From the Start menu, select All Programs, then Accessories, then Communications,

and then Remote Desktop Connection

2 In the Remote Desktop Connection dialog box, depicted in Figure 18-16, enter the

name or IP address of the remote computer and click Connect

Lesson 5 Using Remote Desktop and Remote Assistance

Trang 24

Figure 18-16 Establish a Remote Desktop session.

3 When prompted, enter the appropriate user account and password, and then click

OK

4 If another user is currently logged on to the remote system, a Logon Message

dia-log box appears, indicating that in order to continue, that user must be dia-logged offand any unsaved data will be lost If this occurs, click Yes to continue

5 The Remote Desktop session is established Figure 18-17 displays a remote

Trang 25

com-18 - 37you can use on the client computer to simulate special key combinations on the hostcomputer Table 18-7 describes the key combinations in a Remote Desktop Session.

How to End a Remote Session

There are two ways to end a remote session:

■ Log off from the remote computer normally, which closes all programs, logs theuser off, and then closes the Remote Desktop connection

■ Disconnect by either closing the Remote Desktop window or selecting Disconnectfrom the Start menu Disconnecting leaves the user logged on at the remote com-puter, and all programs continue processing The user will be reconnected to thesame session the next time the user connects

How to Configure and Use Remote Assistance

The Remote Assistance feature allows a user to request help from an expert user.

Unlike with Remote Desktop, in Remote Assistance, the user needing help must issue

an invitation to the other user and the other user must accept the invitation After theconnection is established, the expert user can take shared control of the user’s desktop,chat with the user, and send and receive files Taking shared control of the desktoprequires the user’s permission Remote Assistance can minimize or eliminate the need

to physically visit a remote computer to solve a problem

Table 18-7 Key Combinations in Remote Desktop

Windows Key

Combination

Equivalent Key Combination In Remote

ALT+ESC ALT+INSERT Cycles through the programs in the order

they were started

CTRL+ESC ALT+HOME Displays the Windows menu

ALT+PRTSCN CTRL+ALT+MINUS (–) symbol

on the numeric keypad

Places a snapshot of the active window in the Remote Desktop session on the Clip-board

PRTSCN CTRL+ALT+PLUS (+) symbol

on the numeric keypad

Places a snapshot of the entire Remote Desktop session window on the Clipboard

CTRL+ALT+DEL CTRL+ALT+END Displays the Task Manager or Windows

Security dialog box

Lesson 5 Using Remote Desktop and Remote Assistance

Trang 26

How to Establish a Remote Assistance Session

A Remote Assistance session requires that both the user needing help and the expert

user actively participate in establishing the connection The session is established in thefollowing phases:

1 The user that needs help sends a Remote Assistance invitation to the expert user.

2 The expert user responds to the invitation.

3 The user accepts the expert user’s assistance.

To send a Remote Assistance invitation, use these steps:

1 From the Start menu, select Help And Support.

2 In the Help And Support Center, under Ask For Assistance, select Invite A Friend

To Connect To Your Computer With Remote Assistance, and then select InviteSomeone To Help You

3 Select the method that you want to use to create the invitation, as shown in Figure

18-18 You can send invitations directly by using Windows Messenger, by using ane-mail attachment, or by saving an invitation file and transmitting it to the helperuser (for example, you could save the file to a shared folder on the network)

F18us18

Figure 18-18 Choose the method to create an invitation.

4 When prompted, enter the requested information, including your name, a

mes-sage, when the invitation should expire, and (optionally) a password to be used toestablish the connection

5 Click Send Invitation.

Trang 27

18 - 39

Note When an invitation is sent through an e-mail attachment or saved as a file, the file has a MsRcIndicent extension.

An expert user must respond to an invitation to continue the process If the invitation

is by using Windows Messenger, you must accept the invitation that is presented in theMessenger pop-up window If the invitation is sent by e-mail, you must open theattached invitation If the invitation file is transmitted in some other fashion, you mustaccess and open it If a password is required, you must enter the password in theRemote Assistance dialog box

Tip Using Windows Messenger to establish a Remote Assistance connection is the est method because the Windows Messenger connection can usually be established

easi-regardless of whether there are firewalls on either the user’s or the expert helper’s network

If you use another method of establishing a Remote Assistance session, you must ure a firewall to allow the connection Like Remote Desktop, Remote Assistance uses TCP port 3389 by default.

config-Windows then notifies the user requiring assistance that the request has been accepted.The user must click Yes in the Remote Assistance dialog box as a final indication ofacceptance, and Remote Assistance then establishes the connection

Remote Assistance Console

After the Remote Assistance connection is established, the user needing help sees aUser Console, and the expert user sees a Helper Console The User Console has the fol-lowing functionality:

Chat History and Message Entry windows Used for online chatting

Connection Status window Displays the helper who has connected and the nection’s capabilities (Screen View Only or In Control),

con-Stop Control (ESC) Permits the user to regain control if the expert user has takencontrol (this can also be accomplished by pressing the ESC key)

Send A File Sends a file from the user’s computer or a network share to the helper’scomputer

Start Talking Enables voice communication on computers with voice capabilities

Settings Enables the user to adjust sound quality

Disconnect Ends the Remote Assistance connection

Help Provides access to Remote Assistance help features

Lesson 5 Using Remote Desktop and Remote Assistance

Trang 28

The Helper Console also provides Chat History and Message Entry windows for onlinechatting The user’s desktop is displayed on the right side of the display The controls forthe Helper Console are found across the top of the screen and include the following:

Take Control/Release Control Sends a request to the user to take shared control ofthe user’s desktop The user must accept the request and can cancel it at any time

by clicking Disconnect on the User Console or by pressing ESC

Send A File Sends a file from the helper’s computer or a network share to the user’scomputer

Start Talking Enables voice communication on computers with voice capabilities

Settings Enables the user to adjust sound quality and console size

Disconnect Ends the Remote Assistance connection

Help Provides access to Remote Assistance help features

How to Take Shared Control of the User’s Computer

To take shared control, the expert user sends a request to the user by clicking TakeControl The user must accept the request and can cancel it at any time by clicking Dis-connect on the User Console or by pressing ESC

When the expert user establishes shared control of the user’s system, the expert usercan fully manipulate the computer, including loading and unloading drivers, startingapplications, and viewing event logs However, the expert user cannot copy files fromthe user’s hard disk The only way for the expert user to get a file from the user’s com-puter is for the user to send it

When shared control is established, both users can manipulate the mouse and board simultaneously, so consider using the chat or voice communication functions tocoordinate input device usage and minimize overlap Also, the expert user must becareful not to do anything that might affect the network connection, or else the RemoteAssistance connection might be disconnected

key-Lesson Review

The following questions are intended to reinforce key information presented in thislesson If you are unable to answer a question, review the lesson materials and try thequestion again You can find answers to the questions in the “Questions and Answers”section at the end of this chapter

1 What are the requirements for running Remote Desktop?

Trang 29

18 - 41

2 How can you install the Remote Desktop Connection software on computers that

are not running Windows XP Professional?

3 What is the difference between Remote Desktop and Remote Assistance?

Lesson Summary

■ Remote Desktop allows users that are members of the Administrators or RemoteUsers groups to remotely gain access to a computer running Windows XP Profes-sional After a connection is established, the local desktop is locked for securityreasons, preventing anyone from viewing the tasks that are being performedremotely

■ In Remote Assistance, the user needing help must issue an invitation to the otheruser, and the other user must accept the invitation After the connection is estab-lished, the expert user can take shared control of the user’s desktop, chat with theuser, and send and receive files

Case Scenario Exercise

In this exercise, you will read a scenario about using Windows XP tools, and thenanswer the questions that follow If you have difficulty completing this work, reviewthe material in this chapter before beginning the next chapter You can find answers tothese questions in the “Questions and Answers” section at the end of this chapter

Scenario

You are working as an administrator for a company named Alpine Ski House, whichowns a series of ski resorts in the Midwest You work in the company headquarters inBoulder, Colorado You are working with Ken, a supervising manager of a resort in

Case Scenario Exercise

Trang 30

Jackson Hole, Wyoming Ken has recently installed a non-Microsoft backup program

on his computer running Windows XP Professional and is having some problems Hesays that during the installation of the program, he was asked whether he wanted toinstall the backup program as a service or as a command-line utility Not knowing what

to choose, he installed the program as a service Now, whenever he starts his puter, he gets an error message stating that one or more services failed to start When

com-he tries to run tcom-he new backup program, com-he receives an error message, and tcom-he gram does not start Ken wants to use the backup program because it is supposed toback up files to backup media in their original folder and file format, instead of back-ing up to a single proprietary-format file This makes it easier for Ken to locate files inthe backup location and restore them

pro-Questions

1 Ken is not an expert user and he wants you to help him solve his problem He

would also like to watch while you help him What feature could you use to helpKen remotely while he watches?

2 After connecting to Ken’s computer, you want to determine what service or

ser-vices are failing to start How would you do this?

3 You have determined that only one service is failing to start, and that service is

related to Ken’s backup program You decide to use the Add/Remove Programsutility to remove the backup program from Ken’s computer After removing theprogram, Windows displays a message stating that some parts of the programcould not be installed because they are running and that it needs to you restart thecomputer to finish the removal When the computer restarts, you still see the errormessage stating that a service has failed to load, and the program is still listed inthe Add/Remove Programs dialog box as being installed What should you do?

4 After taking care of the service, you use Add/Remove Programs again to try to

uninstall the program However, the Add/Remove Programs utility tells you thatthe uninstallation file could not be found and that the removal process cannotcontinue You suspect that during the previous removal attempt, the uninstallation

Trang 31

18 - 43file was deleted You decide that you need to restore Ken’s computer to a config-uration from before he installed the program How can you do this?

5 You have managed to restore Ken’s computer to a previous configuration You no

longer receive error messages about services not starting and are satisfied that theprogram has been removed from the computer However, Ken still wants to use thebackup program After researching the program, you find that Ken was right aboutbeing able to install it as a command-line utility When you perform this type ofinstallation, no service is installed You install Ken’s program in this fashion Ken isnot familiar with using the command prompt, though, and wants to have the pro-gram back up his computer automatically each night How can you set this up?

Troubleshooting Lab

In this troubleshooting lab, you will read a scenario and answer questions If you havedifficulty completing this work, review the material in this chapter before beginningthe next chapter You can find answers to these questions in the “Questions andAnswers” section at the end of this chapter

Scenario

You are working as an administrator for Contoso, Ltd., a manufacturer of laboratoryequipment Rebecca, an administrative assistant in the Production department, is hav-ing trouble with her computer running Windows XP Professional When her computerstarts, she sees the following message: At Least One Service Or Driver Failed DuringSystem Startup Use Event Viewer To Examine The Event Log For Details

Rebecca tells you that the last time the error message happened was at around 5:00p.m Central Time (US & Canada) on November 16, 2004 You walk Rebecca through

the steps of opening Event Viewer and saving her System log as a file named caSystem.evt You then ask her to e-mail you the saved log file When you receive the

Rebec-file, you save it to your desktop

Troubleshooting Lab

Trang 32

On the CD In the Labs folder of the CD-ROM accompanying this book, you will find a file named RebeccaSystem.evt Copy this file to your desktop.

Using what you have learned in this chapter, perform the following actions:

1 In Event Viewer, create a new log view based on the System log.

2 Open the saved log named RebeccaSystem.evt in the new log view.

Questions

1 Given the date and time of the last error message that Rebecca saw, look through

Rebecca’s System log and use the following table to list the error events by theirsource name, time, and error ID List only error events that occurred within 5 min-utes of 5:00 p.m Central Time, and sort the list from oldest to newest If you arenot in the Central Time (US & Canada) time zone, change your computer’s timezone to (GMT-06:00) Central Time (US & Canada)

2 Examine the details of each of the error events Using the following table of

Sources and Event IDs, provide a brief description of each error and what (if any)service did not start as a result of the error

Trang 33

18 - 45

3 Looking through these events, what do you suspect is the problem? How would

you correct it?

Chapter Summary

■ Services are programs or processes that start with Windows XP Professional andrun in the background, providing necessary functions to other programs and oper-ating system components The Services console allows you to perform basic com-

Trang 34

mands on services such as stopping, starting, pausing, resuming, and restartingservices You can also use the Services console to configure options for servicessuch as the startup type, the user account under which the service logs on, andrecovery options You can also use the System Configuration Utility to enable anddisable services.

■ You use Event Viewer to view the contents of Windows XP Professional log files

By default, Windows keeps three log files: Application, which records events erated by programs; Security, which records audit events; and System, whichrecords events generated by Windows services

gen-■ You can use Scheduled Tasks to schedule programs and batch files to run once, atregular intervals, at specific times, or when certain operating system events occur.Windows XP Professional saves scheduled tasks in the Scheduled Tasks folder,which can be accessed through Performance and Maintenance in Control Panel

■ System Restore works by creating restore points that contain a snapshot of theRegistry (which includes user account, application, and hardware configuration)and a copy of certain system files that Windows XP Professional requires for star-tup System Restore creates restore points automatically when certain eventsoccur, and you can also create restore points manually

■ Remote Desktop allows users that are members of the Administrators or RemoteUsers groups to remotely gain access to a computer running Windows XP Profes-sional Remote Assistance allows a user who needs help to invite an expert user toconnect to the user’s computer After the connection is established, the expert usercan take shared control of the user’s desktop, chat with the user, and send andreceive files

Exam Highlights

Before taking the exam, review the key points and terms that are presented in thischapter You need to know this information

Key Points

■ When a service is disabled, you cannot start the service manually, and applications

or other services cannot start the service programmatically If you want a servicenot to run automatically when Windows starts, but need the service to be able to

be started, set the service’s startup type to Manual

■ When a service fails, you can have Windows take the following actions: Take NoAction, Restart The Service, Run A Program, and Restart The Computer Typically,you should have Windows attempt to restart the service on the first or second fail-ure You should have Windows attempt to restart the computer only when a ser-vice fails that is vital to the computer’s role

Trang 35

18 - 47

■ Windows XP Professional records events in three logs by default: Application,which records events generated by programs; Security, which records auditevents; and System, which records events generated by Windows services

■ Restoring to a restore point affects the Windows Registry and certain system andapplication files The restoration does not affect user-created documents and data.This provides a safe means to reset the Windows configuration to an earlier time

pro-service A program or process that runs in the background on a computer to performparticular system functions for other programs

service dependency The other services that must be running for a service to start, aswell as the services that cannot start until the service in question starts

System Restore A utility that monitors changes to certain system and applicationfiles and creates automatic restore points that contain a snapshot of the Registryand a copy of certain system files that Windows XP Professional requires for star-tup You can also create restore points manually and restore the computer to anyrestore point

Exam Highlights

Trang 36

Questions and Answers

Lesson 1 Practice: Exercise 1

Page

18-9

6 What is the description provided for the Error Reporting Service?

Allows Error Reporting For Services And Applications Running In Non-Standard Environments.

8 What do you see in the Status column for the Error Reporting Service?

The Status column is blank, indicating that the service is not started.

Lesson 1 Practice: Exercise 2

Page

18-10

1 In the Services window, is the service enabled or disabled? Is the service stopped

or started?

The service is disabled but is still started.

Lesson 1 Practice: Exercise 3

By default, Windows takes no action when a service fails However, any services that depend

on that service will also fail to start You can use the Recovery tab of a service’s Properties log box to change the action that Windows takes when a service fails the first time, the second time, and on subsequent failures.

dia-3 What two tools does Windows XP Professional provide for enabling and disabling

1 What are the three Windows XP Professional logs you can view with Event

Viewer, and what is the purpose of each log?

Trang 37

18 - 49 The application log contains errors, warnings, or information that programs such as database programs or e-mail programs generate The program developer presets which events to record The security log contains information about the success or failure of audited events The events that Windows XP Professional records are a result of your audit policy The system log contains errors, warnings, and information that Windows XP Professional generates Windows

XP Professional presets which events to record.

2 The two ways that Event Viewer provides for locating specific events are the

_ command and the _ command What does each ofthe commands allow you to do?

Scheduled Tasks can be used to automatically launch any script, program, or document to start

at a specified time and interval, or when certain operating system events occur You can use Scheduled Tasks to complete many administrative tasks for you, run maintenance programs at specific intervals on the local or remote computers, and run programs when there is less demand for computer resources.

2 Which of the following are valid choices for the frequency with which Scheduled

Tasks schedules programs to run? (Choose all that apply.)

a Daily

b One time only

c When the computer shuts down

d When a user logs off

The correct answers are A and B C and D are not correct because you cannot configure a scheduled task to run when the computer shuts down or when a user logs off.

Questions and Answers

Trang 38

3 Why do you have to assign a user account and password for each task that you

schedule using the Scheduled Task Wizard?

You enter a user name and password to have the task run under the security settings for that user account For example, you can run a scheduled backup by using a user account that has the required rights to back up data but does not have other administrative privileges The default is to use the user name of the person scheduling the task.

4 If none of your scheduled tasks is starting, what is one thing that you need to

check?

If none of your scheduled tasks is starting, open the Task Scheduler and click Advanced to make sure that the Task Scheduler Service is running If it is not running, you can use the Advanced menu to start it.

Lesson 4 Review

Page

18-30

1 When does System Restore create restore points automatically?

Every 24 hours (or if it has been 24 hours since the computer was last turned on), when you install an unsigned device driver, when System Restore-compliant applications are installed, when updates are installed through Automatic Updates or Windows Update, when you restore data from backup media using Windows Backup, when it detects changes to certain files, and when you restore a restore point.

2 Will System Restore recover a document that you accidentally delete from the My

Documents folder?

No System Restore does not monitor personal user data, such as files in My Documents, Favorites, Recycle Bin, Temporary Internet Files, History, and Temp folders.

3 How can you prevent System Restore from monitoring particular drives?

To turn off System Restore for a particular drive, in the System Properties dialog box, on the System Restore tab, in the Available Drives list, click the drive you want to configure, and then click Settings Note that you cannot disable System Restore on the system drive without dis- abling it on all drives.

Lesson 5 Review

Page

18-32

1 What are the requirements for running Remote Desktop?

The remote computer must be running Windows XP Professional After enabling Remote top on this computer, you must make sure that the user who will connect remotely is a member

Desk-of either the Administrators or Remote Users group.

2 How can you install the Remote Desktop Connection software on computers that

are not running Windows XP Professional?

You can install the Remote Desktop Connection software by inserting the Windows XP sional installation CD-ROM on the client computer There is a version of the Remote Desktop Connection software for most Windows versions.

Trang 39

Profes-18 - 51

3 What is the difference between Remote Desktop and Remote Assistance?

Remote Desktop is designed to allow a user to have full control over a Windows XP Professional desktop from another computer on the network Remote Desktop requires that a user be a member of the Administrators or Remote Users group on the host computer Remote Assis- tance is designed to let a user request help from another user To establish a Remote Assis- tance session, a user must send an invitation When using Remote Assistance, both users can see the host computer’s display.

Case Scenario Exercise

Page

18-41

1 Ken is not an expert user and he wants you to help him solve his problem He

would also like to watch while you help him What feature could you use to helpKen remotely while he watches?

You could use Remote Assistance to help Ken While you are connected to Ken’s computer, you can take control of his desktop while he watches.

2 After connecting to Ken’s computer, you want to determine what service or

ser-vices are failing to start How would you do this?

You should open Event Viewer and view the System log Events marking services that fail to start are marked with a red icon that has an X.

3 You have determined that only one service is failing to start, and that service is

related to Ken’s backup program You decide to use the Add/Remove Programsutility to remove the backup program from Ken’s computer After removing theprogram, Windows displays a message stating that some parts of the programcould not be installed because they are running and that it needs to you restart thecomputer to finish the removal When the computer restarts, you still see the errormessage stating that a service has failed to load, and the program is still listed inthe Add/Remove Programs dialog box as being installed What should you do?You should stop the service and disable it You can do this by using the Services console Stop- ping the service should allow you to remove the program Disabling the service will prevent it from running at startup in case the program needs to restart to finish the installation.

4 After taking care of the service, you use Add/Remove Programs again to try to

uninstall the program However, the Add/Remove Programs utility tells you thatthe uninstallation file could not be found and that the removal process cannotcontinue You suspect that during the previous removal attempt, the uninstallationfile was deleted You decide that you need to restore Ken’s computer to a config-uration from before he installed the program How can you do this?

You should use System Restore Most likely, Ken did not create a manual restore point, and it

is also unlikely that the setup program for the backup utility created one You should find the most recent automatic restore point and restore the computer to that point.

Questions and Answers

Trang 40

5 You have managed to restore Ken’s computer to a previous configuration You no

longer receive error messages about services not starting and are satisfied that theprogram has been removed from the computer However, Ken still wants to usethe backup program After researching the program, you find that Ken was rightabout being able to install it as a command-line utility When you perform thistype of installation, no service is installed You install Ken’s program in this fash-ion Ken is not familiar with using the command prompt, though, and wants tohave the program back up his computer automatically each night How can youset this up?

You should create a scheduled task that runs the executable command at the desired time each night After creating the task, you can use the Properties dialog box for the task to specify the necessary command-line options for running the program.

Troubleshooting Lab

Page

18-43

1 Given the date and time of the last error message that Rebecca saw, look through

Rebecca’s System log and use the following table to list the error events by theirsource name, time, and error ID List only error events that occurred within 5 min-utes of 5:00 p.m Central Time, and sort the list from oldest to newest If you arenot in the Central Time (US & Canada) time zone, change your computer’s timezone to (GMT-06:00) Central Time (US & Canada)

Ngày đăng: 09/08/2014, 09:21

TỪ KHÓA LIÊN QUAN