![]() ![]() ![]() ![]() |
Troubleshooting and Configuring the Windows NT/95 Registry
|
Function | Chapter Number |
The Role of the Registry |
1 |
Registry Files |
2 |
Registry Problems |
3 |
Automatic Changes to the Registry |
8 |
Making Manual Changes to the Registry |
10 |
Using REGEDIT.EXE Remote Registry Editing |
11 |
How the Registry Controls Hardware |
12 |
Troubleshooting and Configuring Hardware Registry Settings |
15 |
Q&A for Hardware and the Registry |
16 |
How the Registry Controls Windows Networking |
17 |
Troubleshooting and Configuring Networking Registry Settings |
20 |
Q&A for Networking and the Registry |
21 |
How the Registry Controls Windows Users |
22 |
Troubleshooting and Configuring User Registry Settings |
26 |
Q&A for Users and the Registry |
27 |
System Policy Editor: Understanding |
28 |
Policy Files | |
System Policy Editor: Understanding Template Files |
29 |
Managing the Local Registry with System Policy Editor |
30 |
Creating Custom Policies |
34 |
Function | Chapter Number |
Protecting the NT Registry |
4 |
Recovering from an NT Registry Failure |
5 |
Making Manual Changes to the Registry with REGEDT32.EXE |
9 |
Windows NT and the HAL |
13 |
Windows NT Networking and the Registry |
18 |
Windows NT 4.0 Users and the Registry |
23 |
Windows NT 3.51 Users and the Registry |
24 |
Managing Domain Computers with System Policy Editor |
31 |
Managing Domain Users with System Policy Editor |
32 |
Cloning Windows NT |
35 |
Function |
Chapter Number |
Protecting the Windows 95 Registry |
6 |
Recovering from a Windows 95 Registry Failure |
7 |
Windows 95 and Plug and Play |
14 |
Windows 95 Networking and the Registry |
19 |
Windows 95 Users and the Registry |
25 |
Managing Windows 95 Users with System Policy Editor |
33 |
Cloning Windows 95 |
36 |
The book is separated into sections that group common functions together. As an alternative to learning all the Windows 95 functions, for example, you could focus your efforts on System Policy Editor, in Part VII, "Advanced Registry Management." Whichever way you choose, there is much to learn and use in your organization.
Part I, "Registry Basics," gives the necessary information to get you started in understanding the Registry. What the Registry does, how it is organized, where the data is stored, and the terminology is discussed in detail.
Part II, "Protecting the Registry," gives hints, techniques, and step-by-step instructions so you can protect the Registries of your systems in your organization. The Registry can be fragile, and can easily be corrupted. Use the information in this section to ensure your Registries are secure.
Part III, "Making Changes to the Registry," explains and illustrates how the Registry is changed. Control Panel functions and the Registry editors are discussed in detail, allowing you to make the necessary changes to keep your system up to date and working in the optimum way.
Part IV, "Hardware Control and the Registry," focuses on the settings required to effectively control the hardware in your systems. Specific emphasis is placed on problem solving and troubleshooting, so that you can fix the hardware configuration problems that you are having.
Part V, "Networking Control and the Registry," is designed so you can control and troubleshoot networking challenges with NT and 95. Again, specific emphasis is placed on problem solving and troubleshooting, with network connectivity and configuration as major areas of concentration.
Part VI, "User Control and the Registry," will help you solve interface and usage problems that your users are having. It will allow you to change the nature of the interface, giving you choices and opportunities to reduce operator error and increase productivity and user satisfaction.
Part VII, "Advanced Registry Management," will take you beyond the normal editing and troubleshooting functions into the realm of organization-wide system and user management and control. The System Policy Editor can effectively make changes for every user on the network, if that is your choice. Cloning systems is also in this section, allowing you to quickly and effectively deploy standardized systems throughout your organization.
Part VIII, "Using Shareware Registry Tools," will introduce you to several shareware tools that can radically change your approach to the Registry. Step-by-step instructions will lead you through the process, and give you abilities not available in the standard offerings from Microsoft.
Unless otherwise indicated, all of the information applies equally with Windows NT 4.0 and Windows 95. Rather than needing a separate volume that would have a significant overlap of information, they are all included together. When included information applies to both, Windows 95 and Windows NT 4.0 will be referred to as "Windows." Anytime Windows 3.x or Windows NT 3.5x are referred to, they will be named specifically, and unless named specifically, the term "Windows" will not include them.
NOTE: A Note box presents interesting pieces of information related to the surrounding discussion.
TIP: A Tip box offers advice or teaches an easier way to do something.
CAUTION: Caution boxes present warnings and describe the consequences of particular actions.
WARNING: A Warning box advises you about potential problems and helps steer you clear of disaster.
SOLUTIONS: A special feature of this book are the Solutions. These special sections demonstrate how to solve tough problems with creative answers in a question and answer format. An index of Solutions can be found on the inside front cover of the book.
Because the Registry is so critical to NT and 95, any damage to the Registry can make the system unusable. Make sure the Registry has a good backup (using the detailed information in Chapters 4 and 6), and use extreme caution. With a secure backup, you can recover from nearly any failure.
I hope you enjoy it. Good luck on your journey.
©Copyright, Macmillan Computer Publishing. All rights reserved.