Contents xvii
Enabling Security Center for Use in Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Managing Access to Scheduled Tasks and Task Scheduler . . . . . . . . . . . . . . . . . . . . . 230
Managing File System, Drive, and Windows Explorer Access Options. . . . . . . . . . . . 231
Hiding Drives in Windows Explorer and Related Views . . . . . . . . . . . . . . . . . . 232
Preventing Access to Drives in Windows Explorer and Related Views. . . . . . 233
Removing CD-Burning and DVD-Burning Features in
Windows Explorer and Related Views. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
Removing the Security Tab in Windows Explorer and Related Views . . . . . . 235
Limiting the Maximum Size of the Recycle Bin . . . . . . . . . . . . . . . . . . . . . . . . . 235
Optimizing the Windows Installer Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
Controlling System Restore Checkpoints for Program Installations . . . . . . . . 237
Configuring Baseline File Cache Usage. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237
Controlling Rollback File Creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238
Elevating User Privileges for Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
Controlling Per-User Installation and Program Operation . . . . . . . . . . . . . . . 240
Preventing Installation from Floppy Disk, CD, DVD,
and Other Removable Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Configuring Windows Installer Logging. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
Optimizing Automatic Updates with Windows Update . . . . . . . . . . . . . . . . . . . . . . . . 243
Enabling and Configuring Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . 243
Controlling Auto Download and Notify for Install . . . . . . . . . . . . . . . . . . . . . . 246
Blocking Access to Automatic Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Designating an Update Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
7 Managing User Settings and Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
Understanding User Profiles and Group Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
Configuring Roaming Profiles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
Configuring the Network Share for Roaming Profiles . . . . . . . . . . . . . . . . . . . 258
Configuring User Accounts to Use Roaming Profiles . . . . . . . . . . . . . . . . . . . . 258
Optimizing User Profile Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260
Modifying the Way Local and Roaming Profiles Are Used . . . . . . . . . . . . . . . 260
Modifying the Way Profile Data Is Updated and Changed . . . . . . . . . . . . . . . 265
Modifying the Way Profile Data Can Be Accessed . . . . . . . . . . . . . . . . . . . . . . 266
Limiting Profile Size and Included Folders . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
Redirecting User Profile Folders and Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
Understanding Folder Redirection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 272
Configuring Folder Redirection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274