Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues



Similar documents
Domain 1: Configuring Domain Name System (DNS) for Active Directory

Configuring Additional Active Directory Server Roles

BaanERP. BaanERP Windows Client Installation Guide

(VCP-310)

Baan Service Master Data Management

Domain 1: Designing a SQL Server Instance and a Database Solution

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

ODBC. Getting Started With Sage Timberline Office ODBC

Engineering Data Management

HP Asset Manager. Software version: Service Asset and Configuration Management

E-Plex Enterprise Access Control System

Desktop Management. Desktop Management Tools

Exchange Server 2010 Configuration (70-662) LearnSmart Exam Manual Copyright 2011 by PrepLogic, LLC. Product ID: Production Date: July 13, 2011

Serial ATA PCI Host Adapter AEC-6290/6295

SQL Server 2008 Implementation and Maintenance (70-432) LearnSmart Exam Manual

Domain 1 Components of the Cisco Unified Communications Architecture

Symantec AntiVirus for Network Attached Storage Integration Guide

Did you know that houses with CCTV are 90% less likely to be burgled? Yale now offer a range of Easy Fit CCTV systems

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot

Skytron Asset Manager

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy

RELEASE GUIDE. VirusScan Enterprise VERSION 7.0

e-trader user guide Introduction

InventoryControl. The Complete Inventory Tracking Solution for Small Businesses

BEA elink Adapter for Kenan Arbor/BP. User Guide

Ethernet Option Board

Radio Dispatch Systems

HP Asset Manager SAM Best Practice package

Equalizer Installation and Administration Guide

Supply Chain Manager User s Manual

CCH Accountants Starter Pack

3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions

Ideate, Inc. Training Solutions to Give you the Leading Edge

TruStore: The storage. system that grows with you. Machine Tools / Power Tools Laser Technology / Electronics Medical Technology

FIRE PROTECTION SYSTEM INSPECTION, TESTING AND MAINTENANCE PROGRAMS

Confidence Intervals for One Mean

Security Functions and Purposes of Network Devices and Technologies (SY0-301) Firewalls. Audiobooks

Neolane Reporting. Neolane v6.1

Conversion Instructions:

Creating And Designing A Successful Portfolio Item Model By Owner

Bio-Plex Manager Software

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INSTALLATION GUIDE. Desktop Firewall VERSION 7.5

Saudi Aramco Suppliers Safety Management System

BAAN IVc4. BAAN IV Installation Manual for Oracle7 and Oracle8 on Windows NT

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

IT Support n n support@premierchoiceinternet.com. 30 Day FREE Trial. IT Support from 8p/user

L5352 Ethernet Communications Interface

Flood Emergency Response Plan

June 3, Voice over IP

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1

FortiGuard Fortinet s Global Security Research and Protection

Hypergeometric Distributions

Anti-Money Laundering

Advanced Protection for Web Services

Mobile Application Testing

Patentability of Computer Software and Business Methods

Neolane Leads. Neolane v6.1

ContactPro Desktop for Multi-Media Contact Center

iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor

MainStay Funds IRA/SEP/Roth IRA Distribution Form

Capacitor banks, range. Capacitor banks, STD range. Three-phase measurement

How to set up your GMC Online account

I apply to subscribe for a Stocks & Shares ISA for the tax year 20 /20 and each subsequent year until further notice.

User s Guide. OMEGAMON Alert Manager for HP OpenView NNM. Version 200 GC April 2002

Baan Finance Accounts Payable

Biometrics for Patient Identification A US Case Study

Incremental calculation of weighted mean and variance

Professional Networking

PRICE BAILEY CHARITIES & NOT FOR PROFIT THE RIGHT ADVICE FOR LIFE

Securing your business

AGC s SUPERVISORY TRAINING PROGRAM

client communication

Domain 1 - Describe Cisco VoIP Implementations

CCH CRM Books Online Software Fee Protection Consultancy Advice Lines CPD Books Online Software Fee Protection Consultancy Advice Lines CPD

INVESTMENT PERFORMANCE COUNCIL (IPC)

Amendments to employer debt Regulations

Volume, Corporate, and Educational Sales

>7011AUPS UNINTERRUPTIBLE P O W E R SUPPLIES

Now here is the important step

How To Get A Kukandruk Studetfiace

Best of security and convenience

How to use what you OWN to reduce what you OWE

How To Find FINANCING For Your Business

Safety Requirements engineering and Proof of implementation

Microsoft Virtualization. Master Microsoft Server, Desktop, Application, and Presentation Virtualization

Securing the Virtualized Data Center with Next-Generation Firewalls

NBX Business Telephone Guide

Transcription:

Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio will help admiistrators: Troubleshoot software istallatio failures Verify istallatio requiremets Uderstad how AppLocker: Provides improvemets over previous versio Software Restrictio Policies (SRP). Facilitates digital sigig. Ca block software istallatios. You ca ecouter software errors ad failures durig or after istallatio: Errors that appear durig istallatio ca result from policy/permissio costraits, availability issues, or istallatio settigs. Errors displayed immediately after istallatio ca be associated with policy restrictios or compatibility problems. Errors displayed log after istallatio commoly result from chages i cofiguratio. To successfully istall software o Widows 7, you should uderstad cocepts such as: Admiistrator privileges Istallatio code ad data Applicatio compatibility ad depedecies AppLocker SRP Geerally, there are two meas of istallig software o systems ruig Widows 7: Maually istall a program. Software deploymet techology such as: Group Policy you may be required to use Group Policy to verify trusted sites, cofigure Applicatio Cotrol Policies (AppLocker), or to facilitate obtaiig a certificate from a third-party software publisher store. Microsoft System Ceter Cofiguratio Maager System Ceter Cofiguratio Maager, formerly Systems Maagemet Server (SMS), is a system maagemet software product by Microsoft for maagig large groups of Widows -based computer systems. Cofiguratio Maager provides remote cotrol, patch maagemet, software distributio, operatig system deploymet, etwork access protectio, ad hardware ad software ivetory. The most frequetly used feature is ivetory maagemet, which provides both hardware ad software ivetory across a busiess eterprise.) LearSmart Cloud Classroom: Video Traiig s Mauals

Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Widows Automated Istallatio Kit (Widows AIK or WAIK) a collectio of tools ad techologies produced by Microsoft desiged to assist i the deploymet of Widows. It was first itroduced with Widows Visa. Widows AIK Versio 2.0 was released with Widows 7 beta. Sigificatly, a sigle ew tool, DISM, took over the fuctios of several earlier tools icludig PEImg ad ItlCfg, which were deprecated. The ew WiPE 3.0 has AeroSaps - a feature itroduced for Widows 7. The User State Migratio Tool (USMT) was added to this WAIK. Microsoft Deploymet Toolkit 2010 Kit 2010 Suite (formerly Busiess Desktop Deploymet) a piece of server software that permits etwork deploymet of Microsoft Widows. It ca curretly distribute Widows XP, Widows Vista, Widows 7, Widows Server 2003, Widows Server 2008, ad Widows Server 2008 R2. Hardware drivers, Widows updates, ad software ca be icluded with the istallatio. The followig topics explai some causes of software errors/failures, ad provide suggestios for how to resolve them. Media Locatio before istallig a applicatio, esure that all required files are saved i the right locatios. Logo Testig Widows 7 logo testig is a feature that examies software beig istalled ad checks for: Compliace with specific ati-spyware guidelies Isolatio from protected resources i Widows Reversible istallatio Digital sigature o all files If you receive a warig that a applicatio has ot passed Widows 7 logo testig, you should avoid istallig it. Verifyig Exteral Coectios determie if the software istallatio requires data (such as product key) from a exteral source. For example: Database Maiframe Web site Licese server Applicatio server Verifyig Applicatio Depedecies if applicable, determie if the software requires ay of the followig to be pre-istalled: Updates Features Service packs Other applicatios LearSmart Cloud Classroom: Video Traiig s Mauals

Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Local Admiistrator Requiremets To successfully istall software, the user accout ormally must at least have local domai admiistrator privileges, ad the accout should have local admiistrator privileges o the computer uploadig the software. Additioally, the accout should be a member of the Admiistrators group o the computer to have rights to istall software o the system. If you get hug up o the User Accout Cotrol prompt while tryig to istall software o a computer, you should verify that the accout used for istallatio is grated local admiistrator privileges o the computer. Normally havig domai admiistrator privileges is sufficiet because by default, domai admiistrators are members of the local Admiistrators group o every computer that is a member of the same domai. But, you may eed to verify your access rights eve if you are already a domai admiistrator; the Domai Admiistrators group may have bee removed from the local Admiistrators group. To determie whether you are a member of the local Admiistrators group o a particular computer, you ca use the Local Users ad Groups cosole. To ope the cosole i Widows 7, click Start, type edit local users ad groups, ad press Eter. The, i the cosole tree of the Local Users ad Groups cosole, select Groups, ad double-click the Admiistrators group i the details pae. The Admiistrators Properties dialog box appears (as displayed below) listig all local admiistrators for that computer. Figure 1: Local Users ad Groups, Admiistrators Properties LearSmart Cloud Classroom: Video Traiig s Mauals

Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 O the Local Admiistrators dialog box, local admiistrators ca press the Add butto to add ew admiistrators. I a eterprise etwork, it is preferable to cotrol local group membership by usig the Restricted Groups feature i Group Policy. Local Group Policy is the oly local GPO that allows both computer cofiguratio ad user cofiguratio settigs to be applied to all users o a computer. Use the followig path to access ad maage local GPO: 1. Click Start, type MMC, ad press Eter 2. I Microsoft Maagemet Cosole, click File Add/Remove Sap-i 3. I the Add or Remove Sap-is dialog box, click Group Policy Object Editor Add 4. The Select Group Policy Object dialog box appears After verifyig that you are listed as a admiistrator, ad you get a message while istallig the program that admiistrator rights are required, the choose the optio to ru the istaller program as a admiistrator. Right-click Istallatio ad click Ru as Admiistrator (as show below). If a User Accout Cotrol coset or credetial prompt appears, eter the required cofirmatio or admiistrator credetials. Figure 2: Ruig a Program as Admiistrator Licesig Restrictios You may ot be able to istall a applicatio if it requires a licese or product key; or the applicatio may require that the computer is coected to a licese server before allowig the istallatio. LearSmart Cloud Classroom: Video Traiig s Mauals

Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Applicatio Cotrol Policies ad Digital Sigig vs. Software Restrictio Policies (SRP) Widows XP ad Vista supported SRP, a meas by which admiistrators created rules to restrict what programs particular users or groups could ru, by specifyig that what programs could ru. Busiesses that use SRP usually develop blacklists: Group Policy Objects (GPOs) that block kow malware based upo source etwork zoe, path ame, hash or siged certificate. Specifically, SRP rules override a defied default security level by removig restrictios or addig restrictios. However, because robust SRP rules are hard to defie, most busiesses default to urestricted, givig ay program ot explicitly disallowed a free pass. Microsoft s replacemet for SRP, AppLocker, is available i Widows Server 2008 R2 ad Widows 7 Eterprise ad Ultimate editios. For backwards compatibility, GPOs ca iclude both SRP ad AppLocker rules. I such cases, AppLocker rules are oly applied to PCs ruig Widows 7, while SRP rules are oly applied to older PCs. Like SRP, AppLocker ca allow or dey a program to lauch. However, AppLocker imposes a default disallow stace. After you start the Applicatio Idetity (AppID) service ad apply a AppLocker rule, a program ot ecompassed by AppLocker rules will fail to lauch, displayig the message: The program is blocked by group policy. I this way, AppLocker ecourages busiesses to defie whitelists rather tha blacklists. Although AppLocker whitelists still require maiteace, they make it easier to idetify all of the programs with permissio to ru, istead of listig all the ukow ad potetially harmful programs that wat to block. Rules Like SRP, AppLocker lets you create rules defiig what programs are allowed to ru, ad assig them to security groups or idividual users (but ot to idividual computers). You ca make three differet types of rules: Path Rules (allow you to restrict users to lauchig apps oly from specified folders) Hash Rules (idetify allowed programs based o a cryptographic hash) Publisher Rules (idetify allowed programs by the digital sigature) Publisher Rules i AppLocker replace the Certificate Rules i SRP. Publisher Rules work with a wider variety of applicatios ad are more flexible. You ca restrict applicatios based o the followig iformatio cotaied i rules: Publisher (software compay) Program ame File versio This iformatio is i stored i the digital sigature. You ca apply ay of the rules to the followig: Executable files Scripts Istallatio files (such as.msi packages ad.dll or.ocx libraries) You cofigure AppLocker rules through Group Policy (either domai policies or local security policies). I the local security policy i Widows 7, you ll fid AppLocker uder the Applicatio Cotrol Policies ode. LearSmart Cloud Classroom: Video Traiig s Mauals