Transcript Chapter 09
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+ Agenda • Chapter 9: Dealing with Software Issues • Quiz • Exercise Software Program • A sequence of instructions written to perform a specified task for a computer • Execute an executable file; .exe or .msi, to install the program Managing Programs • Use the Control Panel’s Programs and Features to ▫ Uninstall programs ▫ Change a program’s configuration by adding or removing certain options ▫ Some program allows you to repair To change the program, click Change or Repair ▫ Administrator privilege is required sometime ▫ See Figure 9-1 on Page 174 Program Compatibility • Program Compatibility Troubleshooter ▫ A wizard that simplifies the process of selecting compatibility mode settings for an executable file • Change compatibility settings manually ▫ Right-click the program icon -> Properties -> Compatibility tab ▫ See Figure 9-2 on Page 176 • To suppress application compatibility warnings ▫ Computer Configuration\Administrative Templates\System\Troubleshooting and Diagnostics\Application Compatibility Diagnostics Application Compatibility Toolkit (ACT) • To be used to determine before software deployment whether the software is compatible with Windows 7 • The tools included in the kit are as follows: ▫ ▫ ▫ ▫ ▫ Application Compatibility Manager Compatibility Administrator Internet Explorer Compatibility Test Tool Setup Analysis Tool Standard User Analyzer Application Compatibility Manager • Designed for large-scale Windows 7 deployments • Collect ▫ To collect information from other computers on the network, you create data collection packages (DCPs) • Analyze ▫ The analysis of the collected data begins with organization, which can include categorization, prioritization, application assessment, and assignment of deployment status • Test and Mitigate ▫ Test applications and create mitigation strategies, using the Compatibility Administrator application Compatibility Administrator • A main area for solutions to known compatibility problems for hundreds of commercial Windows 7 applications Software Shim • A compatibility fix that consists of a small library that transparently intercepts certain application calls and changes the parameters passed, handles the operation itself, or redirects the operation elsewhere so that the application will operate properly • It is usually used for older applications that rely on older functionality that may have been altered for Windows 7 Internet Explorer Compatibility Test Tool • Examines the compatibility of the web sites and web-based applications in real time with Windows Internet Explorer 7 and 8 Setup Analysis Tool • Logging tool to analyze application setup programs for compatibility issues ▫ Installation of 16-bit components ▫ Installation of Graphical Identification and Authentication DLLs ▫ Changes to files or registry keys that exist under Windows Resource Protection Standard User Analyzer • Examines applications for compatibility issues caused by the User Account Control (UAC) feature of Windows 7 • The stand-alone version of SAT can monitor any Windows and third-party installers • The Virtual SAT tool can only monitor Windows and third-party installers that run unattended Windows XP Mode • Creates a virtual machine running Windows XP on your Windows 7 system ▫ Require Windows 7 Professional, Enterprise, or Ultimate editions • Used for applications that will not run any other way • Has extensive hardware requirements Configuring Application Restrictions • Restricting the applications that users can run on their computers • Two mechanisms for restricting application ▫ Group Policy settings: software restriction policies Computer Configuration\Windows Settings\Security Settings\Software Restriction Policies Right-click the Software Restriction Polices object -> Create Software Restriction Policies See Figure 9-3 on Page 182 ▫ AppLocker Using Software Restriction Policies • Certificate rules ▫ Based on the inclusion of a certificate signed by the software publisher • Hash rules ▫ Based on a digital fingerprint that remains valid even when the name or location of the executable file changes • Network zone rules ▫ Identify Windows Installer (.msi) packages downloaded with Internet Explorer based on the security zone of the site from which they are downloaded • Path rules ▫ Identify applications by specifying a file or folder name or a registry key • Default rule ▫ Applies when an application does not match any of the other rules Configuring Rule Settings • The three possible settings ▫ Disallow ▫ Basic User ▫ Unrestricted • Resolving Conflicts ▫ The more specific rule takes precedence over the less specific. Hash rules Certificate rules Path rules Zone rules Using AppLocker • Application Control Policies • New feature in Windows 7 Enterprise and Ultimate • Creation of rules is easier than Group Policy ▫ Wizard-based • Only applies to Windows 7 and Windows Server 2008 R2 Understanding Rule Types • Rule Types ▫ Executable rules Contains rules that apply to files with .exe and .com extensions ▫ Windows Installer rules Contains rules that apply to Windows Installer packages with .msi and .msp extensions ▫ Script rules Contains rules that apply to script files with .ps1, .bat, .cmd, .vbs, and .js extensions • Criteria for resource access: ▫ Publisher ▫ Path ▫ File Hash Troubleshooting Applications • As with any problem, you should first identify the problem and determine its scope ▫ Does the problem occur on one computer only or does it involve multiple computers ▫ Determine if it is a local application, a network application or a local application that requires network access to fulfill its task ▫ If the application worked before, you then need to ask if anything has changed ▫ Check the Event Viewer ▫ Verify the configuration of the software. ▫ Try to research the problem on the Internet or with the vendor Assignment • Submit these before class over on Thursday ▫ Fill in the blank ▫ Multiple Choice ▫ True / False • Submit these before class start on Monday ▫ Lab 9 ▫ Case Scenario 9-1