| Windows NT 4.0 Workstation - Cramsession |
WINNT.EXE is used for the regular Windows NT setup, or an installation through DOS or Windows 95.
Upgrading from Windows 3.1x or a previous version of NT will keep all user, network and program settings.
There are no conversion options from Windows 95 to Windows NT that will allow you to maintain user settings. To dual boot between the two, install NT in a separate directory and reinstall all your applications.
Command modifiers for installation:
| /B | Put boot files on hard drive instead of using boot floppies (takes an extra 4-5MB of hard disk space). |
| /S | Specify source file location(s) - multiple locations will speed up installation. |
| /U | Specify answer file location for use with unattended installation - MUST be used with /s to specify source file location(s). |
| /T | Specifies location of temp directory created for install (/t:<path>). |
| /OX | Create the setup disks from CD-ROM or shared network folder. Used to replace damaged boot disks. |
| /F | Don't verify files. Can speed up installation. |
| /C | Don't check for free space when creating boot disks. |
| /I | Specify setup information (.inf) file. This file tells setup how to run. The default name is DOSNET.INF. |
To uninstall NT on a FAT partition, you will need to boot to DOS, run SYS.COM, and remove the WINNT directory and files.
16-bit Windows programs can be run in their own VDM. Click Start, Run. Choose the application you would like to run, then check the Run in Separate Memory Space box, and click OK. However, doing this requires more overhead - approximately 2MB per VDM.
A 16-bit Windows program that uses DDE (Dynamic Data Exchange) does not have to run in the default Win16VDM.
NT schedules threads to run by using application priorities. Application threads are assigned priorities, and run in order according to their priority level, from highest (31) to lowest (0).
Average base priority classes:| 24 | Realtime |
| 13 | High |
| 8 | Normal |
| 4 | Low |
Starting applications in realtime mode can adversely effect other system processes and may even slow down total system performance. Running in realtime requires administrator or power user rights and is not generally recommended.
You can change the priority of a running application by running Task Manager -> Processes, right clicking the process and selecting "Set Priority."
Foreground application boost over background applications can be changed with the Control Panel -> System -> Performance utility.
Subtrees:
| HKEY_LOCAL_MACHINE | Stores machine-specific information (hardware). |
| HKEY_USERS | Stores information for all users who have ever logged on. |
| HKEY_CURRENT_USER | Stores current user settings. |
| HKEY_CLASSES_ROOT | Stores OLE and file association, also tracks information regarding applications that have been installed. |
| HKEY_CURRENT_CONFIG | Stores information about the hardware profile used at startup. |
REGEDT32.EXE allows permissions to be set, but cannot search for values -just keys.
REGEDIT.EXE can search for keys and values but does not support all data types, security menu, or a read-only mode.
The paging file size can be in/decreased here, and even distributed across multiple drives to speed up access.
From here, the paging file size can be changed and distributed across multiple drives.
The most efficient paging file is distributed on several drives but not on the boot or system drive.
The recommended initial paging file size equals the amount of RAM in the system plus 12MB.
Paging file size can increase during operation, but will not shrink. Page file size will be reset when the computer is restarted.
Multiple Disk Sets
| Disk Striping | Divides data into 64k blocks and spreads it equally among all disks in the array. Needs a minimum of two hard disks. Does not provide fault tolerance. |
| Volume Set | Merges numerous partitions into one drive mapping. Drives are read one at a time. Does not provide fault tolerance. |
FAT
NTFS
Security
File-Level Security - Governs local user file and folder security on NTFS partitions only. Applied through the Security tab of the resource's properties.
Share Security Levels
| Full Control | |
| Change | |
| Read | |
| No Access | |
Permissions are cumulative, except for No Access, which overrides anything.
When a resource has both File-Level and Share-Level Securities enabled, you combine the highest two securities (assuming that there is not a "no access") and use the most restrictive of the two.
File permissions override the permissions of its parent folder.
Anytime a new file is created, the file will inherit permissions from the target folder.
| Copying within a partition | Creates a new file resembling the old file. Inherits the target folders permissions. |
| Moving within a partition | Does not create a new file. Simply updates directory pointers. File keeps its original permissions. |
| Moving across partitions | Creates a new file resembling the old file, and deletes the old file. Inherits the target folders permissions. |
To lock the workstation after a period of idle time, use a screensaver password.
To disable access to the workstation, but allow programs to continue running, use the Lock Workstation option (from the CTRL-ALT-DEL dialog box).
To disable access to the workstation, and not allow programs to continue running, use the Logoff option (from the CTRL-ALT-DEL dialog box).
Auditing can be enabled in the User Manager. The Event Viewer is used to view audited events.
When using Event Viewer, only local administrators can see the security log, but anyone (by default) can view other logs.
Groups and Account Managment
Duplicating an account requires three pieces of information: username, password and full name.
Disabling an account is typically used when someone else will take the users place or when the user might return.
Delete an account only when absolutely necessary for space or organization purposes.
When copying a user account, the new user will stay in the same groups that the old user was a member of. The user will keep all group rights that were granted through groups, but lose all individual rights that were granted specifically for that user.
NT Default Accounts
| Backup Operators | Group designated for members to backup and restore computers from tape. Backup Operators can only backup and restore from tape when logged in locally to the computer. This group is found on all NT Servers. |
| Account Operators | Group designated for members to manage user and group accounts. This group is found only on Domain Controllers. |
| Server Operators | Group designated for members to manage resources, but cannot manage user accounts. Can backup and restore from tape. This group is found only on Domain Controllers. |
| Replicator | Group designated for NT computers to perform directory replication. This group is found on all NT Servers. |
RAS (Remote Access Services)
RAS supports call back security to either the calling number or to a specified, non-changing number.
RAS for NT 4.0 supports multilink (the use of more than one modem to achieve higher transmission speeds). Multilink cannot be used with callback security unless there are two (or more) ISDN modems configured on the same phone number.
RAS uses NetBEUI as the default network protocol, but can also use TCP/IP and IPX/SPX. TCP/IP will need to be used if you are using programs that utilize the Windows Sockets (Winsock) interface over the RAS services.
To speed up NetBIOS resolution on RAS clients, put an LMHOSTS file on each client locally.
RAS encryption settings
| Allow any authentication including clear text | This will allow RAS to use a number of password authentication protocols including the Password Authentication Protocol (PAP) which uses a plain-text password authentication. This option is useful if you have a number of different types of RAS clients, or to support third-party RAS clients. |
| Require encrypted authentication | This option will support any authentication used by RAS except PAP. |
| Require Microsoft encrypted authentication | This option will only make use of Microsoft's CHAP (Challenge Handshake Authentication Protocol). All Microsoft operating systems use MS-CHAP by default. |
| Require data encryption | This option will enable the encryption of all data sent to and from the RAS server. |
RAS will write to a log file which can be used for troubleshooting RAS services. In order to enable RAS to write to the log, you have to enable it in the Registry.
Netware
NWLink is all that you need to run in order to allow and NT system to run applications off of a NetWare server.
To allow file and print sharing between NT and a NetWare server, CSNW (Client Services for NetWare) must be installed on the NT system.
CSNW print options
| Print Banner | A banner, which states your login ID, the date and time, will be printed out prior to the job that has been sent to the printer. |
| Print Form Feed | Feeds a blank piece of paper through the printer after the print job has printed, in order to separate one user's printed paper from another user's printed paper. |
| Notify When Printed | After a job has been sent to the printer and has finished printing, a message will come up on the screen notifying the user that the print job has completed successfully. |
Gateway Services for Netware can be implemented on your NT Server to provide a MS client system to access your Netware server by using the NT Server as a gateway.
Frame types for the NWLink protocol must match the computer that the NT system is trying to connect with. Unmatching frame types will cause connectivity problems between the two systems.
When NWLink is set to autodetect the frame type, it will only detect one type and will go in this order: 802.2, 802.3, ETHERNET_II and 802.5 (Token Ring).
Netware 3 servers uses Bindery emulation (Preferred Server in CSNW). Netware 4 servers use NDS (Default Tree and Context.)
There are two ways to change a password on a netware server - SETPASS.EXE and the Change Password option (from the CTRL-ALT-DEL dialog box). The Change Password option is only available to Netware 4.x servers using NDS.
Networking
TCP/IP is an internet protocol currently used for most networking situations. Each computer using TCP/IP will contain a unique address in a x.x.x.x format (where each x equals a number between 0 and 255) and a subnet mask.
Subnet mask - A value that is used to distinguish the network ID portion of the IP address from the host ID.
Default gateway - A TCP/IP address for the host (typically a router) which you would send packets to, to be sent elsewhere on the network.
Common TCP/IP problems are caused by incorrect subnet masks and default gateways.
UNIX computers use the TCP/IP protocol.
NetBEUI is a non-routable protocol that is used solely by Microsoft O/S's.
Universal Naming Convention (UNC) - Universal network pathname which is integrated into Microsoft systems. Named as \\computername\sharename, where computername = the NetBIOS name of the computer, and sharename = the share name of the folder.
Trap messages are sent using SNMP (Simple Network Management Protocol).
Profiles
NTUser.dat and *.dat files are the typical, user-configurable profiles used.
NTUser.man and *.man files are read-only. If the user attempts to configure their desktop, the *.man file will not be updated. When the user logs in again, it will restore the original profile.
You may copy profiles using the User Profiles menu located under Control Panel -> System Properties.
Policies
Individual policies take precendence over group policies.
Machine policies take precedence over all policies.
Printing
NT 4.0 has the option to maintain drivers for different operating systems on the server. Each operating system uses different drivers. For example, NT 4.0, NT 3.51 and Win95 systems cannot use the same print drivers. By installing the drivers for each of these types of system on the print server, each of these tpyes of clients can automatically download the driver they need without manual installation.
NT clients (3.51 and 4.0) automatically download updated drivers from the server. Win95 machines will initially download print drivers but will not automatically update to a newer version of the driver. Win 3.1x and DOS clients must have the drivers installed on each client manually.
You can select Restart in the printer's menu to reprint a document. This is useful when a document is printing and the printer jams. Resume can be selected to start printing where you left off.
You can change the directory containing the print spooler in the advanced server properties for the printer.
To remedy a stalled spooler, you will need to stop and restart the spooler services in the Services applet in Control Panel.
Printing to a TCP/IP printer requires you to know the IP address and printer name.
The DLC protocol needs to be installed in order to connect to a HP print server.
The AppleTalk protocol needs to be installed to communicate with Apple printers.
| System Partition Files NTLDR BOOT.INI NTDETECT.COM BOOTSECT.DOS NTBOOTDD.SYS (Used only if system partition is on SCSI drive with BIOS disabled). | Boot Partition NTOSKRNL.EXE HAL.DLL SYSTEM |
To create an Emergency Repair diskette, you can choose to do so either during the installation of NT, or you can run RDISK.EXE. When RDISK.EXE is run with the /S option, the utility backs up user accounts and file security.
To use the Emergency Repair diskette, you will need to boot the server with the NT installation boot diskettes, and choose to repair NT with the Emergency Repair disk that was created.
The Emergency Repair Process can a) inspect the registry files and return them to the state on the repair disk, b) inspect the startup environment, c) verify the system files and d) inspect the boot sector.
To troubleshoot bootup problems, you can edit the Boot.Ini file and add the /SOS switch to the end of the Windows NT entries in the [Operating Systems] section of the Boot.Ini file to display driver names while they are being loaded. The VGA startup option has /SOS added by default.
Use the Last Known Good option on bootup to restore the system to a bootable state if problems arise from switching video drivers or changing registry settings.
Common error codes:
ARC Naming Convention
| multi(x) | Specifies SCSI controller with the BIOS enabled, or non-SCSI controller. x=ordinal number of controller. |
| scsi(x) | Defines SCSI controller with the BIOS disabled. x=ordinal number of controller. |
| disk(x) | Defines SCSI disk which the OS resides on. When multi is used, x=0. When scsi is used, x= the SCSI ID number of the disk with the OS. |
| rdisk(x) | Defines disk which the OS resides on. Used when OS does not reside on a SCSI disk. x=0-1 if on primary controller. x=2-3 if on multi-channel EIDE controller. |
| partition(x) | Specifies partition number which the OS resides on. x=cardinal number of partition, and the lowest possible value is 1. |
multi(0)disk(0)rdisk(0)partition(1). These are the lowest numbers that an ARC path can have.
Performance Monitor
Must run DISKPERF -Y to enable disk performance counters.
Alert view allows alerts to be made when the counters surpass the threshold you set.
Log view allows the tracked objects to be written to a log file. Used to create a baseline for future reference.
Report view gives the ability to present a consice report of current statistics.
| Special thanks to Joshua Colglazier for writing the original Cramsession for this exam, and Joe Seeley for updates to the material. |