A+ CH.12
Domain Controller
A domain controller is a Windows server that holds a copy of the Active Directory database.A domain controller is a member of only one domain.A domain can contain multiple domain controllers. Each domain controller holds a copy of the Active Directory database.Any domain controller can make changes to the Active Directory database.Replication is the process of copying changes made to the Active Directory database between all of the domain controllers in the domain
Domain
A domain is an administratively-defined collection of network resources that share a common directory database and security policies. The domain is the basic administrative unit of an Active Directory structure.Database information is replicated (shared or copied) within a domain.Security settings are not shared between domains.Each domain maintains its own set of relationships with other domains.Domains are identified using DNS names.The common name is the domain name itself.The distinguished name includes the DNS context or additional portions of the name. Depending on the network structure and requirements, the entire network might be represented by a single domain with millions of objects, or the network might require multiple domains.
Screen Saver
A screen saver is designed to display constantly changing output on the screen after the system has been idle for a specified amount of time. To modify the screen saver:Select Start.Select Settings.Select Personalization.Select Lock Screen.Select Screen saver settings. The following can be configured: Which screen saver to use How long to wait before activating the screen saver Whether authentication is required after deactivating the screen saver
Services
A service is a program that processes requests from other applications or users. Services can start automatically and stay constantly running in the background, waiting for service requests. Use the Services snap-in to view and manage running services. The service startup behavior determines how the service is started.When set to Automatic, the service is started automatically by Windows when the system boots.When set to Manual, the service must be manually started.When Disabled, the service will not run.
Themes
A theme is used to customize the way the Windows desktop appears. Use the steps below to change a theme: Select Start. Select Settings. Select Personalization. Select Themes. A theme is composed of: One or more desktop backgrounds Window colors System sounds Photos When a theme is selected, all of these elements are changed at the same time. Windows installs several default themes during installation. Additional themes can be downloaded and installed from the Windows Store. On Windows 10, individual theme components can be customized as follows: Automatically pick an accent color from Background Show color on Start menu, taskbar, and Action Center Make Start menu, taskbar, and Action Center transparent
Administrative Templates
Administrative templates are registry-based settings that can be configured within a GPO to control the computer and the overall user experience, such as:Use of Windows features such as BitLocker, Offline files and Parental Controls.Customize the Start menu, taskbar, or desktop environment.Control notifications.Restrict access to Control Panel features.Configure Internet Explorer features and options.
Organizational Unit (OU)
An organizational unit is like a folder that subdivides and organizes network resources within a domain. An organizational unit:Is a container objectCan contain other OUs or any type of leaf object (e.g., users, computers, and printers)Can be used to logically organize network resourcesSimplifies security administration.
Appearance and Personalization
Appearance and Personalization is used to configure navigation properties, modify the behavior of input and display devices to accommodate users with special needs, specify single or double click options, show or hide hidden files, and add or remove fonts on the computer.
Windows 10 computers can be set up to sync files with a network server with Sync Center. With Sync Center, you are able to do the following
Check the results of your recent sync activity. Have access to copies of your network files even when your computer isn't connected to the network. Keep information in sync between your computer and files stored in folders on network servers, which are called Offline Files. Sync files between your PC and mobile devices that are compatible with Windows 10 Sync Center.
Colors
Choose colors that you want Windows 10 to use and where you want them used. You are able to do the following:Pick an accent color from a predefined palletCreate a custom color After picking colors, you will be given the option to choose accent colors for the Start menu, taskbar, Action Center, and title bars. You are able to adjust the transparency for Start menu, taskbar, and Action Center.
Clock, Language, and Region
Clock, Language, and Region contains settings to configure various items such as language preference, default currency symbols, and date and time notation.
Computer Management
Computer Management is a saved MMC console that includes common snap-ins used to manage your computer. Some common ways to start Computer Management include: Right-click Start and select Computer Management. Search for Computer Management.
Computer Configuration
Computer policies (also called machine policies) are enforced for the entire computer and are applied when the computer boots. Computer policies are in effect regardless of the user logging into the computer. Computer policies include:Software that should be installed on a specific computerScripts that should run at startup or shutdownPassword restrictions that must be met for all user accountsNetwork communication security settingsRegistry settings that apply to the computer (the HKEY_LOCAL_MACHINE subtree) Computer policies are initially applied as the computer boots and are enforced before any user logs on.
Local Policies/User Rights Assignment
Computer policies include a special category of policies called user rights. User rights identify system maintenance tasks and the users or groups who can perform these actions. Examples of user rights include:Access this computer from the network (the ability to access resources on the computer through a network connection)Load and unload device driversAllow logon locally (the ability to log on to the computer console)Allow logon through Terminal Services (the ability to log on using a Remote Desktop connection)Back up files and directories (does not include restoring files and directories)Shut down the systemRemove a computer from a docking station
Data SourcesYou use the ODBC (Open Database Connectivity)
Data Source Administrator to create and manage ODBC data sources. To open the ODBC Data Source Administrator in Windows 10, do the following:Select Start.Select Windows System.Select Control Panel.In Control Panel, select System and Security.Select Administrative Tools.In Administrative Tools, select Data Sources (ODBC).
Start Menu
Depending on your version of Windows 10 or the device, such as tablet or desktop, the Start button may vary in appearance. The Start menu, taskbar, and Action Center elements are grouped together for color selection so you can't modify only one. You can modify what happens once you select the Start button. Some modifications and customizations you can make include:Add or remove items to the apps listResize the Start MenuPin, unpin, resize tilesGroup Tiles into foldersChange how your apps are displayed in the Start Menu
Disk Defragmenter
Disk Defragmenter is a utility in Microsoft Windows designed to increase access speed by rearranging files stored on a disk to occupy contiguous storage locations. The process of doing this is called defragmentation.
DirectX Diagnostic Tool (DxDiag)
DxDiag is a tool that shows information related to DirectX operation. DirectX is a set of programming interfaces for multimedia (video and audio). DxDiag displays information such as:Operating system versionProcessor and memory informationDirectX versionSettings and drivers used by display devicesAudio driversInput devices (mouse, keyboard, USB)
Ease of Access
Ease of Access is used to optimize visual display, modify sound and visual cues, change mouse and keyboard settings, and set up speech recognition or a microphone.
Advanced Security
Everyday configuration tasks for the Windows Firewall are completed using the Windows Firewall applet in Control Panel. However, advanced firewall configuration tasks can be performed using an MMC snap-in called Windows Firewall with Advanced Security. Windows Firewall with Advanced Security supports a more granular firewall configuration than can be created using the Windows Firewall applet in Control Panel. For example, it can filter traffic based on parameters such as: Source IP address Destination IP address Port number ICMP protocol
Explorer
Explorer, or called File Explorer and formerly Windows Explorer, is a file manager application that comes with Microsoft Windows. File Explorer's main purpose is to let you view, open, copy, move, and otherwise manage your files and folders.
Hardware and Sound
Hardware and Sound is used to view and configure the current system sound settings, installed audio devices, sound cards, printer settings, and other hardware settings
Built-in Containers
Like OUs, generic built-in containers are used to organize Active Directory objects. However, built-in container objects have several differences:They are created by default.They cannot be created, moved, renamed, or deleted.They have very few editable properties.
Administrators
Members of the Administrators group have complete and unrestricted access to the computer, including every system right. The Administrator user account and any other account designated as a "computer administrator" is a member of this group.
Backup Operators
Members of the Backup Operators group can back up and restore files (regardless of permissions), log on locally, and shut down the system. Members of this group cannot change security settings.
Cryptographic Operators
Members of the Cryptographic Operators group are allowed to perform cryptographic operations.
Event Log Readers
Members of the Event Log Readers group are allowed to use Event Viewer to read the system's event logs.
Guests
Members of the Guests group have limited rights (similar to members of the Users group). Members can shut down the system.
Hyper-V Administrators
Members of the Hyper-V Administrators group are allowed to use Hyper-V on the system to create and manage virtual machines
Network Configuration Operators
Members of the Network Configuration Operators group have limited administrative privileges to allow them to manage the system's network configuration.
Performance Log Users
Members of the Performance Log Users group are allowed to schedule logging of performance counters, enable trace providers, and collect event traces on the system.
Performance Monitor Users
Members of the Performance Monitor Users group can access performance counter data on the system.
Remote Desktop Users
Members of the Remote Desktop Users group are allowed to access the system remotely using the Remote Desktop Client.
Users
Members of the Users group can use the computer but cannot perform system administration tasks and might not be able to run some legacy applications.Members cannot share folders.Members cannot install printers if the driver isn't already installed on the system.Members cannot view or modify system files.Any user created with Local Users and Groups is automatically a member of this group.User accounts designated as "standard" or "limited use" accounts are members of this group.A user account created as a "computer administrator" is made a member of this group (in addition to being a member of the Administrators group).
Microsoft Register Server (Regsvr32.exe)
Microsoft Register Server is a command-line tool that registers .dll files as command components in the registry.
Microsoft Registry Editor (Regedit.exe)
Microsoft Registry Editor is a tool for modifying entries in the Windows registry. The registry is a database that holds hardware, software, and user configuration settings.Whenever a change is made to preferences, software, hardware, and user-settings, those changes are stored and reflected in the registry.The preferred method of modifying the registry is to use the applications or management tools that write to the registry. For example, many Control Panel applets make changes to registry settings.There will be some advanced settings that can be made only by directly editing the registry.
Power Users
Modern versions of Windows no longer use the Power Users group, although it still exists for backwards compatibility. This group was originally used in Windows XP and earlier. Its members can:Create user accountsModify or delete accounts they createdCreate local groupsModify group membership for groups they createdModify group membership for the Power Users, Users, and Guests groupsChange the system date and timeInstall applicationsPower Users were not allowed to:Change membership of the Administrators or Backup Operators groupsTake ownership of filesBack up or restore filesLoad or unload device driversManage security and auditing logsIn modern versions of Windows, you should avoid assigning users to be members of the Power Users group unless an application or service specifically requires it.
Mouse
Mouse properties can be set by following these steps:Select Start.Select Settings.Select Personalization.Select Themes.Select Mouse cursor. The mouse properties are configured using the following tabs: Buttons: Configures the button configuration, double-click speed, and select Lock settings. Pointers: Configures the pointer scheme. Pointer Options: Configures the pointer speed, snap-to, and visibility settings. Wheel: Configures vertical and horizontal scrolling settings.
Trees and Forests
Multiple domains are grouped together in the following relationship:A tree is a group of related domains that share the same contiguous DNS namespace.A forest is a collection of related domain trees. The forest establishes the relationship between trees that have different DNS name spaces.
Network and Internet
Network and Sharing Center is used to view network status, connect to a network, and to view network computers and devices.Internet Options in Network & Internet contain the following tabs and they are used to:General tab to modify your browser home page, startup window, tabs, history, and appearance.Security tab to determine your security zone and security level.Privacy tab to manage website privacy and enable and disable pop-ups and InPrivate Browsing.Content tab to view certificate, AutoComplete, and Feeds and Web Slices settings.Connections tab to set up an Internet connection.Programs tab to manage your default browser, add-ons, and other internet programs and file associations.Advanced tab to set and reset advanced browser settings.
Network Utilization
Network utilization identifies the amount of traffic sent and received by a network connection.Utilization is listed as a percentage of the total available theoretical bandwidth (such as 100 Mbps for a Fast Ethernet connection).Poor performance that has low CPU, disk, and memory statistics but high network utilization could indicate a bottleneck at the network adapter.
Notepad
Notepad is a simple text editor for Microsoft Windows and a basic text-editing program which enables computer users to create documents. Notepad can be launched from the Start button, Windows Accessories, and selecting Notepad.
Performance Monitor
Performance Monitor displays statistics that tell you about the operation of your computer.A counter identifies a specific statistic, such as % Processor Time or % Disk Free Space.You can add or remove counters to customize the statistics you can see.Real-time data are displayed in a graph.Performance Monitor by itself does not save any data. To save statistics over time, use a data collector set.
Common components to examine in order to improve performance are...
Processor (CPU) Hard disk Memory Network
% Processor Time (Processor Utilization)
Processor utilization is the amount (percentage) of time the processor spends doing non-idle tasks.Processor utilization should be relatively low, up to 40% on average.Processor utilization will spike (85 - 90% or higher) when a major task is launched or a significant task is performed.Utilization is reported for each processor in a multi-processor or multi-core system. A CPU that supports Hyper-Threading will show two utilization graphs for each processor.If the processor utilization is consistently high (over 90%), then the CPU is likely the bottleneck.Check the running processes to see the CPU use of each process. If possible, delay or pause non-critical processes or run them during off hours.A process that has hung could show 100% CPU use. If the process does not complete after a period of time and does not respond, end the process to return CPU use to normal.A computer with a virus might show an unknown process consuming most of the processor time. Use the internet to identify the function of unknown processes.Configure the processor affinity to specify that a specific process use a certain processor in a multi-processor system.Upgrade to a faster CPU or add more cores to the system.
Programs
Programs is used to uninstall programs, turn Windows features on or off, view installed updates, run programs from previous versions of Windows, get additional programs, and change default settings for media and devices.
Reliability Monitor
Reliability Monitor maintains historical data that describe the operating system's stability.Overall system stability is given a stability index that ranges from 1 to 10 (10 being the most stable). The stability rating is affected by application, hardware, Windows, and other failures.Reliability Monitor shows an historical chart that identifies when software installs/uninstalls and failures have occurred. By clicking on a day, you can view the changes to the system that have affected its stability.
Local Policies/Security Options
Security Options allow you to apply or disable rights for all users the Group Policy applies to. Examples of Security Options policies include:Computer shutdown when the Security event log reaches capacityUnsigned driver installationCtrl+Alt+Del required for log on
System and Security
Security and Maintenance is used to review recent error messages and options for resolving issues.Windows Defender Firewall is used to check firewall status and allow apps through the Windows Firewall.System allows you to view RAM and processor speed, remote access, remote assistance, or to see the computer name.Power Options is used to change battery settings, change what the power buttons do, or change when the computer sleeps.File History is used to save backup copies of your files and to restore your files.Backup and Restore (Windows 7) is used to backup and restore with the legacy Windows 7 backup utility and to restore files using the legacy Windows 7 backup utility.BitLocker Drive Encryption is used to manage BitLocker settings and protect your files and folders from unauthorized access.Storage Spaces is used to save files to two or more drives to help protect you from drive failure.Work Folders is used to make your work files available on all devices you use, even when offline.Administrative Tools is used to clean up hard disk space, run defragmenter, optimize drives, format disks, view event logs, and schedule tasks.
Once the online account has been created, you can associate a local user account with an online user account by following these steps:
Select Start. Select Settings. Select Accounts. Select Your Account. Select Sign in with a Microsoft account instead.
To use Sync Center you need to enable the offline files. This is done from the Control Panel. To configure Sync Center, do the following:
Select Start. Select Windows System. Select Control Panel. In the upper right corner search field, enter Sync Center and press Enter. Select Manage offline files. In the Offline Files dialog box, select the General tab if not selected Select Enable offline files.
System Restore
System Restore is a recovery tool for Microsoft Windows that allows you to reverse certain changes made to the operating system. System Restore is used to return important Windows files and settings which might include drivers, registry keys, system files, and installed programs back to previous settings and versions.
Sounds
System sounds can be set by following this steps:Select Start.Select Settings.Select Personalization.Select Themes.Select Sounds. The Sound properties are configured using the following tabs: Playback: adjust speakers and headphones Recording: additional recording settings Sounds: pick a sound theme to apply to Windows and applications Communication: adjustments for volume controls Be aware that you can disable system sound settings for some but not all desktop applications. If an application continues playing sound effects even after you disable them in the Sounds control panel, you'll need to disable sound effects in that application's settings window.
Microsoft Accounts
Take advantage of many of the newest Windows 10 features. To set up a Microsoft account, you must use a valid e-mail address. A Microsoft account provides the following features: Allows you to log in to a computer on which you haven't previously set up a local user account. Provides access to Office 365, Windows Phone accounts, and OneDrive. Allows you to download apps from the Windows Store. Syncs your settings across multiple computers.
Disk Time (Highest Active Time)
The % Disk Time statistic identifies the percentage of time that the disk subsystem is busy reading from and writing to disk. If this value is consistently over 90%, check the following other statistics to identify the source of the high disk activity:Average Disk Queue LengthMemory statistics
Built-in Administrator Account
The Administrator account has all rights and permissions on the computer. This account is hidden from normal view. It doesn't show up on the usual login screen.
Boot (msconfig)
The Boot tab will show you the operating system that is installed on the computer. The tab contains some of the following options:Boot Options allow the user to select options such as Safe boot along with some additional optionsTimeout specifies the amount of seconds that Windows will wait in the Boot menu before loading the operating system, with the default being 30 seconds
General (msconfig)
The General tab is displayed by default when the System Configuration Utility is opened. There are three options under the General tab:Normal Startup is used to load all device drivers and services when Windows starts upDiagnostic Startup will load only the basic devices and services and is similar to starting Windows in safe modeSelective Startup allows the user to choose in more detail what should start with Windows
MMC (Microsoft Management Console)
The Microsoft Management Console (MMC) is a framework that provides a common user interface for performing system administration tasks. Management of a set of related features is done by adding snap-ins to the console. The MMC provides the shell for running these snap-ins, while the snap-ins provide the details for performing specific management tasks. Microsoft provides snap-ins for managing: Local Users and Groups Device Manager Disk Management Print Management Component Services Windows Firewall with Advanced Security To open a blank console, type mmc in the Run box (Press Windows+R). You can then add snap-ins to work with the configuration of your system. The console consists of three panes: The tree pane (on the left) organizes objects in a hierarchy. The results pane (in the middle) shows objects and configuration options. The actions pane (on the right) lists the actions you can take on objects. You can save a console that includes the snap-ins you use most (saved consoles have the .msc extension). Microsoft provides a number of preconfigured consoles that include snap-ins for common tasks.
MSTSC
The Microsoft Terminal Services Client is a remote management service. Mstsc.exe is the executable file that opens the Microsoft Terminal Services Client. The Microsoft Terminal Services Client, which is Remote Desktop Services, is a component of Microsoft Windows that allows users to take control of remote computers over a network connection. The three Windows components that use RDS are Windows Remote Assistance, Remote Desktop Connection, and Fast User Switching.
Services (msconfig)
The Services tab displays all the Services configured to start up, when the operating system boots up. Uncheck services that you do not want Windows to start.
Tools (msconfig)
The Tools tab will show you various utilities and tools that you can launch directly from the System Configuration Utility to the various tools available in Windows.
Windows Memory Diagnostics
The Windows Memory Diagnostic tests the Random Access Memory (RAM) on your computer for errors. This utility is not included with Windows and must be downloaded from Microsoft's Online Crash Analysis website.
Average Disk Queue Length
The disk queue holds read and write requests that are waiting to be processed by the disk controller. The average disk queue length tells you the number of read and write requests that are typically waiting to be processed.A high number indicates that the system has requested data from the hard disk, or has tried to save data to the hard disk, but that request could not be fulfilled immediately (i.e. it has to wait).This number should be below 2 times the number of disk spindles. Most physical hard disks have a single spindle (although some newer drives have 2 or 3). RAID arrays will have at least one spindle per physical disk.If this statistic shows consistently waiting read/write requests, you might need to upgrade your disks.Choose a faster disk (higher RPM and faster access time).Use a RAID-0 configuration to improve disk access.
Guest Account
The has very limited capabilities, usually restricted to logging on, viewing files, and running some programs. As a security measure, Windows XP and later automatically disable the Guest account in order to prevent unauthorized logon to the system.
Lock Screen
The lock screen is the screen that displays when the system requires authenticate by entering your user name and password. By default, the lock screen background is set to Windows Spotlight, which downloads and displays a set of rotating backgrounds from Microsoft.The lock screen background can be a picture or a slideshow of pictures on your computer. Choose the option you want from the Background drop-down menu.
Memory Pages per Second
The operating system allocates memory to processes in 4,096 byte blocks called pages.Instead of assigning physical memory addresses, the operating system assigns virtual memoryaddresses to shield the process from the details of the physical memory storage system.The paging supervisor is a process that maintains a table that correlates virtual memory addresses with the actual physical memory locations. When physical memory is low, data in RAM that is currently not being used by the CPU can be moved to the hard disk in order to free up memory for other processes. The area on the hard disk used for storing the contents of RAM is called the page file. When the CPU needs to access data in RAM, a page fault (also called a hard fault) occurs when that data does not exist in RAM but is instead in the page file. Paging is the process of moving data from RAM to disk and back. Before the CPU can work with data required by a process, that data must be placed into RAM. The memory pages per second statistic identifies the number of hard faults that occur each second. A high number for this statistic accompanied by high disk activity (% Disk Time or the disk activity light constantly flashing) could indicate a condition known as thrashing.With thrashing, the demand for memory and the low amount of physical RAM means that the system must be constantly moving data from RAM, to disk, and back.The negative effects associated with paging increases as the amount of memory increases past the amount of physical RAM. While some paging is normal, as the demands on memory increase, the amount of paging will at some point reach a point where thrashing occurs and the effect on performance is noticeable--even to the point of making the system unusable.As a temporary solution, you can quit some running programs in order to decrease the demand for RAM. The only long-term solution is to add more physical RAM.Increasing the page file size will have no effect unless you are also experiencing out of memory errors. The problem is not that there isn't sufficient combined memory, but that the amount of physical memory is insufficient.
Page File Usage
The page file usage identifies the amount or percentage of the page file that is being used.A common recommendation is for the page file to be 1.5 to 2 times larger than the physical memory. In most cases, you will let the system manage the page file size.It is normal for the page file to show some use, even when the system has sufficient physical memory.When the page file use percentage is near 100%, you can increase the page file size as a temporary measure. Adding more memory is the best permanent solution.
Standard Account
This account is hidden from normal view. It doesn't show up on the usual login screen
Account Policies
Use Account Policies to control the following:Password settingsAccount lockout settingsKerberos settingsAccount policies are in effect only when configured in a GPO linked to a domain.
Local Policies/Audit Policy
Use Audit Policy settings to configure auditing for events such as log on, account management, or privilege use.
Event Viewer
Use Event Viewer to view logs about programs, system events, and security. Each entry is listed as a warning, error, or information event. Events are added to the following logs:The Application log contains a list of all application-related events such as application installations, un-installations, and application errors.The System log contains a list of all system-related events such as system modifications, malfunctions, and errors.The Security log contains a list of all security-related events such as security modifications and user login events.Additional logs might be added by applications or services.
File System
Use File System policies to configure file and folder permissions that apply to multiple computers. For example, you can limit access to specific files that appear on all client computers
System Information (Msinfo32.exe)
Use System Information to view hardware and configuration information for your computer. While much of this information is available through other tools, System Information provides a single location for viewing information such as:Operating system versionComputer manufacturer, processor type, available memoryInstalled devices and drivers usedRunning tasksApplications that run at system startupYou can only view, not modify, configuration settings in System Information.
Region and Language Settings
Use Time & Language in Settings to manage time and language capabilities for the system. Time & Language can be set by following this steps: Select Start. Select Settings. Select Time & Language. Date & time settings control how times, dates, numbers, and currency are formatted and displayed. For example, dates are displayed differently in different parts of the world and for different languages:Canada (French) displays dates in the format: yyyy-MM-dd (2018-11-02)Canada (English) displays dates in the format: dd/MM/yyyy (02/11/2018)United States (English) displays dates in the format: M/d/yyyy (11/2/2018)Australia (English) displays dates in the format: d/MM/yyyy (2/11/2018) The Region & Language setting identifies the area of the world where the computer is connected. An input language identifies the language, font, and keyboard layouts that can be used on the system. When you add an input language, the language toolbar is made available. Using the language toolbar, you can quickly change the current input language within an application. The Speech setting identifies the language you speak with your device. Here you can set voice settings and configure the microphone for speech recognition.
Software Restriction Policies
Use software restrictions policies to define the software permitted to run on any computer in the domain. These policies can be applied to specific users or all users. You can use software restrictions to:Identify allowed or blocked software.Allow users to run only the files you specify on multi-user computers.Determine who can add trusted publishers.Apply restrictions to specific users or all users.
Command Prompt
Use the Command Prompt to execute command-line commands. To open a command prompt,On the taskbar, type CMD into the Search box.From the Start menu, go to Windows System and select Command Prompt. Some commands launched from the command line require elevated privileges to run. If this is the case, run Command Prompt as Administrator.
User Accounts
User Accounts is used to view and modify user accounts, give users access to the computer, change account types, manage web credentials, and manage windows credentials.
User Accounts with Administrative Privileges
User accounts with administrative privileges. This is the account that most users typical use when they think of an Administrator account.
User Configuration
User policies are enforced for specific users. User policy settings include:Software that should be installed for a specific userScripts that should run at logon or logoffInternet Explorer user settings (such as favorites and security settings)Registry settings that apply to the current user (the HKEY_CURRENT_USER subtree) User policies are initially applied as the user logs on and often customize Windows-based user preferences.
Memory Committed Bytes (Commit Charge)
When a process runs, the operating system assigns memory to the process. The amount of committed memory identifies how much memory has been assigned to running processes. Be aware of the following conditions indicated by this statistic:If the value exceeds the amount of physical RAM, then the page file is being used instead of physical RAM. At some point, this will start to cause a bottleneck.To temporarily make more memory available, quit running programs or increase the page file size. However, the only permanent solution is to add more physical memory.
Taskbar
Windows 10 offers multiple ways to customize the taskbar. Some of the things you can adjust include:Pin apps to the taskbarPin files and folders to the taskbar jump listsConfigure or remove CortanaRemove the Task View buttonHide system icons in the notification areaHide applications in the notification areaMove the taskbar to a different edge of the computer screenChange the size of the taskbarResize the icons to fit betterEnable the Peek featureConfigure taskbar for multiple displays
Windows Update
Windows Update is a Microsoft service for Windows. It automates downloading and installing software updates over a network or the internet.
Indexing
Windows includes a quick search tool. The search tool is used in the Start menu, File Explorer, and Control Panel.Searches execute quickly because the search tool does not search the entire hard drive. Instead, it searches through a pre-built database.By default, Windows indexes selected file types on local hard disks as well as offline files.Use the Indexing Options in Control Panel to customize what information is included in the index. You can:Modify the list of locations to include or exclude specific drives, folders, or other locations.Modify the list of file types to include or exclude files from being indexed based on the file extension.Index files based on filename, properties, or file contents.In File Explorer, use the Search settings in Folder Options to customize how searches are executed.
Startup (MSCONFIG)
With Windows 10, the Startup tab in System Configuration Utility displays a shortcut to the Startup tab in Task Manager.
Objects
Within Active Directory, each resource is identified as an object. Common objects include:UsersGroupsComputers You should know the following about objects: Each object contains attributes (i.e., information about the object, such as a user's name, phone number, and email address) which are used for locating and securing resources. Active Directory uses DNS for locating and naming objects. Container objects hold other objects, either other containers or leaf objects.
Background
You can choose a wallpaper with a picture or color. From the drop-down button, choose Solid Color to choose a solid color background for the desktop or choose Picture to view pictures from your own pictures folder or from another folder on the computer. The Slideshow option lets you choose a folder containing photos from which Windows will periodically choose a different photo to display. You can pick the time interval at which the photo changes. Use the options to display the pictures on the desktop the way you prefer.
Available, Used, and Free Physical Memory
You can use Task Manager to quickly identify the use of physical memory in your system.The total installed memory value reflects the amount of memory available to the operating system. On a 32-bit system, this value will be less than 4 GB, even if you have 4 GB of memory installed. This value could also be slightly less than the amount of installed physical RAM if the video adapter shares the system memory. The amount of memory used for this purpose is displayed under hardware reserved.The cached value identifies memory that is being used for a disk cache to improve read/write operations from the hard disk.The available value identifies how much memory is unassigned.If the amount of memory in use is close to the amount of RAM installed, you might need to add RAM or quit some running programs to free up memory.
Registry
You can use registry policies to:Configure specific registry keys and values.Specify if a user can view and/or change a registry value, view sub-keys, or modify key permissions.
The gpresult command
displays Group Policy settings and Resultant Set of Policy (RSOP) for a user or a computer. /s computer specifies the name or IP address of a remote computer. (Do not use backslashes.) The default is the local computer. /u domain \ user runs the command with the account permissions of the user that is specified by user or domain\user. The default is the permissions of the current logged-on user on the computer that issues the command. /p password specifies the password of the user account that is specified in the /u parameter. /user target_user name specifies the user name of the user whose RSOP data is to be displayed. /scope { user | computer } displays either user or computer results. Valid values for the /scope parameter are user or computer. If you omit the /scope parameter, gpresult displays both user and computer settings. /v specifies that the output display verbose policy information. /z specifies that the output display all available information about Group Policy. Because this parameter produces more information than the /v parameter, redirect output to a text file when you use this parameter (for example, gpresult /z >policy.txt). /? displays help at the command prompt.
The tasklist command
displays a list of the processes that are currently running on the system. The output of the tasklist command includes a process ID (PID) that can be used to end the process.
The exit command
ends the current command prompt session and closes the Command Prompt window.
To run the gpresult command, use the following syntax:
gpresult [/s computer [/u domain\user /p password]] [/user target_user name] [/scope {user|computer}] [/v] [/z]
To run the gpupdate command, use the following syntax:
gpupdate [/target:{computer|user}] [/force] [/wait:value] [/logoff] [/boot]
The taskkill command
is used to end running processes. taskkill /im [image_name] kills the specified process by using its image name (e.g., mspaint.exe). taskkill /PID [pid_number] kills the specified process by using its PID (e.g., 3572). Sometimes a process will not respond the taskkill command. If this is the case, use the /f option with the command, which forces the process to close.
The mstsc command
is used to establish a remote desktop session with another computer. To run the mstsc command, use the following syntax: mstsc /v:[server_ip]
The expand command
is used to expand compressed .cab files. expand -d [source_file] displays the contents of the specified .cab file. expand [source_file] [destination] expands all the files in the specified .cab file to the chosen destination. expand [source_file] f:[filename] [destination] extracts a single file from the specified .cab file to the chosen destination.
The shutdown command
is used to shutdown local and remote systems. The following options can be used with the shutdown command:/i opens the Remote Shutdown Dialog graphical interface window./l logs off the current user from the local system./r shuts down and restarts the local computer./h causes the computer to hibernate./t [xx] sets a delay time (in seconds) before the computer shuts down.
bottleneck
occurs when a component is unable to keep up with demand and subsequently slows down other processes or functions. When a system seems to respond slowly, it's important to be able to accurately identify the component(s) that are causing the problem so you can take the proper actions to improve performance.
The gpupdate command
refreshes local and Active Directory-based Group Policy settings, including security settings. /target: { computer | user } processes only the computer settings or the current user settings. By default, both the computer settings and the user settings are processed. /force ignores all processing optimizations and reapplies all settings. /wait: value identifies the number of seconds that policy processing waits to finish. The default is 600 seconds. 0 means "no wait"; -1 means "wait indefinitely." /logoff logs off after the refresh has completed. This is required for those Group Policy client-side extensions that do not process on a background refresh cycle but that do process when the user logs on, such as user software installation and folder redirection. This option has no effect if there are no extensions called that require the user to log off. /boot restarts the computer after the refresh has completed. This is required for those Group Policy client-side extensions that do not process on a background refresh cycle but that do process when the computer starts up, such as computer software installation. This option has no effect if there are no extensions called that require the computer to be restarted. /? displays help at the command prompt.