Book description
The Windows 2000 Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows 2000 Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book, which is an update of Managing the Windows NT Registry, addresses four main areas:
What is the Registry? Where does it live on disk? How do system services access and use it? What do you do if it's damaged or corrupted? Every 2000 administrator faces questions like this, often in a desperate attempt to fix something that's broken.
What tools are available? Detailed descriptions of Regedit, RegEdt32, the System Policy Editor, Group Policy Editor and selected Resource Kit utilities explain how to edit and secure the Registry both on local and on remote computers.
How can I access the Registry from a program? Regularly monitoring the Registry's contents is one way to preclude unpleasant surprises. Using examples in C++, Visual Basic, and Perl, Managing the Windows 2000 Registry demonstrates how to create Registry-aware tools and scripts.
What's in the Registry? Not all Registry keys are adequately documented by Microsoft or by the other vendors who store configuration data in the Registry. Managing the Windows 2000 Registry offers a guided tour of some of these undocumented keys.
This book is a "must have" for every 2000 system manager or administrator.
Table of contents
-
Managing the Windows 2000 Registry
- Preface
- 1. A Gentle Introduction to the Registry
- 2. Registry Nuts and Bolts
- 3. In Case of Emergency
- 4. Using RegEdit
-
5. Using RegEdt32
- How RegEdt32 and RegEdit Differ
- Learning the RegEdt32 Interface
- Browsing with RegEdt32
- Remote Registry Editing
- Searching for Keys
- Saving and Loading Registry Keys
- Printing Registry Contents
- Editing Keys and Values
- Registry Security Fundamentals
- Securing Registry Keys in Windows 2000
- Securing Registry Keys in Windows NT
-
6. Using the System Policy Editor
- All About System Policies
- Introducing the System Policy Editor
- Managing Policies with POLEDIT
- Distributing Policies
- What’s in the Standard Policy Templates
- Picking the Right Policies
- 7. Using Group Policies
-
8. Programming with the Registry
-
The Registry API
- API Concepts and Conventions
- Opening and Closing Keys
- Creating Keys
- Getting Information About Keys
- Enumerating Keys and Values
- Getting Registry Data
- Adding and Modifying Values
- Deleting Keys and Values
- Using Registry Security Information
- Connecting to Remote Computers
- Moving Keys to and from Hives
- Getting Notification When Something Changes
- Flushing Registry Changes
- The Shell Utility API Routines
- Programming with C/C++
- Programming with Perl
- Programming with Visual Basic
-
The Registry API
-
9. Administering the Registry
- Setting Defaults for New User Accounts
- Using Initialization File Mapping
- Limiting Remote Registry Access
- Fixing Registry Security ACLs in Windows NT
- Adding Registry ACLs to Group Policy Objects
- Encrypting HKLM\SAM with SYSKEY
- Miscellaneous Good Stuff
- Using the Resource Kit Registry Utilities
- reg: The One-Size-Fits-All Registry Tool
- Spying on the Registry with RegMon
-
10. Registry Tweaks
-
User Interface Tweaks
- Add Your Own “Tip of the Day”
- Disable Window Animations
- Speed Up the Taskbar
- Enable Tab for Filename Completion
- Run a Different Screen Saver While Waiting for a Logon
- Enable X Window-Style “Auto Raise”
- Enable “Snap to Default Button”
- Suppress Error Messages During Boot and Logon
- Set NUMLOCK Key During Startup
- Display Version Number
- Filesystem Tweaks
-
Security Tweaks
- Clear the System Pagefile at Shutdown
- Prevent Caching of Logon Credentials
- Turn Off “Save Password” Option in Dial-Up Networking
- Prevent Users from Changing Network Drive Mappings
- Control Who Can See Performance Monitor Data
- Control Which Drives Are Visible Throughout the System
- Change When the Password Expiration Warning Appears
- Allow Members of the Printer Operators Group to Add Printers
- Set the Number of Authentication Retries for Dial-Up Connections
- Keep Users from Changing Video Resolutions
- Set the Authentication Timeout for Dial-Up Connections
- Keep Remote Users from Sharing a Mounted CD-ROM or Floppy
- Keep Users from Customizing “My Computer”
-
Performance Tweaks
- Automatically Delete Cached User Profiles
- Enable Automatic Reboot After a Crash
- Record Evidence of a Crash
- Enabling Automatic Logon After Boot
- Power Off at Shutdown
- Force Hung Tasks to End When Logging Off
- Set a Time Limit for Shutting Down Tasks
- Speed Up System Shutdowns
- Automatically Try to Detect Slow Network Connections
- Don’t Automatically Create 8.3 Names on NTFS Volumes
- Disable the Printer Browse Thread
- Forcibly Recover a Crashed PDC
- Hiding Servers from Network Computers
-
Network Tweaks
- Create a Shared Favorites Folder for All Network Users
- Automatically Use Dial-Up Networking to Log On
- Enable the WINS Proxy Agent
- Set the Number of Rings for Answering Incoming Dial-Up Networking Calls
- Turn On Logging for Dial-Up Networking
- Keep a Dial-Up Networking Connection up After You Log Out
- Set the Dial-Up Networking Automatic Disconnect Timer
- Printing Tweaks
-
User Interface Tweaks
-
11. The Registry Documented
- What’s Here and What’s Not
- HKLM\HARDWARE
- HKLM\SOFTWARE
- HKLM\SYSTEM
- HKU
- HKCR
- HKCU
- HKCC
- HKDD
- A. User Configuration Group Policy Objects
- B. Computer Configuration Group Policy Objects
- Index
- Colophon
Product information
- Title: Managing The Windows 2000 Registry
- Author(s):
- Release date: August 2000
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781565929432
You might also like
book
Automating Microsoft® Windows Server® 2008 R2 with Windows PowerShell® 2.0
Learn to automate the top server operating system, Windows Server 2008 R2 Windows PowerShell 2.0 allows …
book
Windows Server® 2012 Unleashed
This is the most comprehensive and realistic guide to Windows Server 2012 planning, design, prototyping, implementation, …
book
Windows 10 for Enterprise Administrators
Tag line About This Book Learn the art of configuring, deploying, managing and securing Windows 10 …
book
Microsoft® Windows® Registry Guide, 2nd Edition
Visit the catalog page for Microsoft® Windows® Registry Guide, 2nd EditionVisit the errata page for Microsoft® …