Presentation is loading. Please wait.

Presentation is loading. Please wait.

CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+

Similar presentations


Presentation on theme: "CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+"— Presentation transcript:

1 CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+

2 Agenda Chapter 9: Dealing with Software Issues Quiz Exercise

3 Software Program A sequence of instructions written to perform a specified task for a computer Execute an executable file;.exe or.msi, to install the program

4 Managing Programs Use the Control Panel’s Programs and Features to ▫Uninstall programs ▫Change a program’s configuration by adding or removing certain options ▫Some program allows you to repair  To change the program, click Change or Repair ▫Administrator privilege is required sometime ▫See Figure 9-1 on Page 174

5 Program Compatibility Program Compatibility Troubleshooter ▫A wizard that simplifies the process of selecting compatibility mode settings for an executable file Change compatibility settings manually ▫Right-click the program icon -> Properties -> Compatibility tab ▫See Figure 9-2 on Page 176 To suppress application compatibility warnings ▫Computer Configuration\Administrative Templates\System\Troubleshooting and Diagnostics\Application Compatibility Diagnostics

6 Application Compatibility Toolkit (ACT) To be used to determine before software deployment whether the software is compatible with Windows 7 The tools included in the kit are as follows: ▫Application Compatibility Manager ▫Compatibility Administrator ▫Internet Explorer Compatibility Test Tool ▫Setup Analysis Tool ▫Standard User Analyzer

7 Application Compatibility Manager Designed for large-scale Windows 7 deployments Collect ▫To collect information from other computers on the network, you create data collection packages (DCPs) Analyze ▫The analysis of the collected data begins with organization, which can include categorization, prioritization, application assessment, and assignment of deployment status Test and Mitigate ▫Test applications and create mitigation strategies, using the Compatibility Administrator application

8 Compatibility Administrator A main area for solutions to known compatibility problems for hundreds of commercial Windows 7 applications

9 Software Shim A compatibility fix that consists of a small library that transparently intercepts certain application calls and changes the parameters passed, handles the operation itself, or redirects the operation elsewhere so that the application will operate properly It is usually used for older applications that rely on older functionality that may have been altered for Windows 7

10 Internet Explorer Compatibility Test Tool Examines the compatibility of the web sites and web-based applications in real time with Windows Internet Explorer 7 and 8

11 Setup Analysis Tool Logging tool to analyze application setup programs for compatibility issues ▫Installation of 16-bit components ▫Installation of Graphical Identification and Authentication DLLs ▫Changes to files or registry keys that exist under Windows Resource Protection

12 Standard User Analyzer Examines applications for compatibility issues caused by the User Account Control (UAC) feature of Windows 7 The stand-alone version of SAT can monitor any Windows and third-party installers The Virtual SAT tool can only monitor Windows and third-party installers that run unattended

13 Windows XP Mode Creates a virtual machine running Windows XP on your Windows 7 system ▫Require Windows 7 Professional, Enterprise, or Ultimate editions Used for applications that will not run any other way Has extensive hardware requirements

14 Configuring Application Restrictions Restricting the applications that users can run on their computers Two mechanisms for restricting application ▫Group Policy settings: software restriction policies  Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies  Right-click the Software Restriction Polices object -> Create Software Restriction Policies  See Figure 9-3 on Page 182 ▫AppLocker

15 Using Software Restriction Policies Certificate rules ▫Based on the inclusion of a certificate signed by the software publisher Hash rules ▫Based on a digital fingerprint that remains valid even when the name or location of the executable file changes Network zone rules ▫Identify Windows Installer (.msi) packages downloaded with Internet Explorer based on the security zone of the site from which they are downloaded Path rules ▫Identify applications by specifying a file or folder name or a registry key Default rule ▫Applies when an application does not match any of the other rules

16 Configuring Rule Settings The three possible settings ▫Disallow ▫Basic User ▫Unrestricted Resolving Conflicts ▫The more specific rule takes precedence over the less specific.  Hash rules  Certificate rules  Path rules  Zone rules

17 Using AppLocker Application Control Policies New feature in Windows 7 Enterprise and Ultimate Creation of rules is easier than Group Policy ▫Wizard-based Only applies to Windows 7 and Windows Server 2008 R2

18 Understanding Rule Types Rule Types ▫Executable rules  Contains rules that apply to files with.exe and.com extensions ▫Windows Installer rules  Contains rules that apply to Windows Installer packages with.msi and.msp extensions ▫Script rules  Contains rules that apply to script files with.ps1,.bat,.cmd,.vbs, and.js extensions Criteria for resource access: ▫Publisher ▫Path ▫File Hash

19 Troubleshooting Applications As with any problem, you should first identify the problem and determine its scope ▫Does the problem occur on one computer only or does it involve multiple computers ▫Determine if it is a local application, a network application or a local application that requires network access to fulfill its task ▫If the application worked before, you then need to ask if anything has changed ▫Check the Event Viewer ▫Verify the configuration of the software. ▫Try to research the problem on the Internet or with the vendor

20 Assignment Submit these before class over on Thursday ▫Fill in the blank ▫Multiple Choice ▫True / False Submit these before class start on Monday ▫Lab 9 ▫Case Scenario 9-1


Download ppt "CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+"

Similar presentations


Ads by Google