Buy used:
$8.16
$18.23 delivery October 21 - November 13. Details
Used: Good | Details
Condition: Used: Good
Comment: Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less
Access codes and supplements are not guaranteed with used items.
Added to

Sorry, there was a problem.

There was an error retrieving your Wish Lists. Please try again.

Sorry, there was a problem.

List unavailable.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Managing The Windows 2000 Registry: Help for Windows 2000 System Administrators 1st Edition

4.3 4.3 out of 5 stars 3 ratings

The Windows 2000 Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows 2000 Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book, which is an update of Managing the Windows NT Registry, addresses four main areas:
  • What is the Registry? Where does it live on disk? How do system services access and use it? What do you do if it's damaged or corrupted? Every 2000 administrator faces questions like this, often in a desperate attempt to fix something that's broken.
  • What tools are available? Detailed descriptions of Regedit, RegEdt32, the System Policy Editor, Group Policy Editor and selected Resource Kit utilities explain how to edit and secure the Registry both on local and on remote computers.
  • How can I access the Registry from a program? Regularly monitoring the Registry's contents is one way to preclude unpleasant surprises. Using examples in C++, Visual Basic, and Perl, Managing the Windows 2000 Registry demonstrates how to create Registry-aware tools and scripts.
  • What's in the Registry? Not all Registry keys are adequately documented by Microsoft or by the other vendors who store configuration data in the Registry. Managing the Windows 2000 Registry offers a guided tour of some of these undocumented keys.
This book is a "must have" for every 2000 system manager or administrator.

Editorial Reviews

About the Author

Paul Robichaux is an experienced software deveoper and author. He's worked on UNIX, Macintosh, and Win32 development projects over the past six years, including a stint on Intergraph's OLE team. He is the author of the Windows NT Server 4 Administrator's Guide.

Excerpt. © Reprinted by permission. All rights reserved.

Chapter 7

Using Group Policies

One of the most powerful capabilities included with Windows 2000 is the Group Policy mechanism. Active Directory provides a comprehensive way for administrators to manage network resources. When you use Active Directory, Group Policy allows you to apply policies to users and computers over the entire hierarchy of your network, from entire domains right down to individual computers.

As you learned in the preceding chapter, the Windows NT 4.0 System Policy Editor is used to configure membership-based permissions for users, groups, and computers in a domain. System policies, such as desktop appearance and program control, can be distributed and applied to whole domains. For Windows 2000 network clients, policies are no longer Registry-based; they're replaced by Group Policy. By associating policies with actual objects in Active Directory, each site, domain, and organizational unit can distribute its own set of policy demands. You manage this capability with the Group Policy snap-in for the Microsoft Management Console (MMC). Group Policy, sometimes referred to as the Group Policy Editor, uses policy files to interface to a system's Registry.

What Are Group Policies? In a general sense, policies define what a user can and can't do. Under Windows 2000, system administrators use Group Policy to manage the policies that apply to computers and users within a site or domain. These policies define certain aspects of the user's desktop environment. They specify system behavior, and they restrict what users are allowed to do. In short, a policy is simply a group of related settings an administrator can set.

Many of these policy settings are applied to keys in the Registry. The specific keys and values written into the Registry depend on the policies you're trying to enforce. In the Windows NT world, policy changes are persistent because they're applied throughout the Registry, and no mechanism exists to sweep away the changes once they're made (though one policy's changes can be overwritten by another set of changes that occurs later).

Under Windows 2000, Group Policy settings that modify the Registry are always applied in one of four Registry subtrees. Microsoft recommends that Windows 2000-savvy applications should look for policy information in HKLM\Software\Policies and HKCU\Software\Policies. If they don't find their settings there, they can look in HKLM\Software\Microsoft\CurrentVersion\Policies and HKCU\Software\Microsoft\Windows\CurrentVersion\Policies. If the application still hasn't found the settings it needs, it can look elsewhere in HKCU or HKLM, or even in INI files (though that's strongly discouraged). None of these subtrees may be modified by nonadministrators.

Elements of a Group Policy Much the same way that the Registry is arranged in a hierarchical structure, policies are categorized into sections and subsections. The sections and subsections that build the hierarchy of Group Policy are called categories. Think of categories like folders: a group policy contains one or more categories, and each category may contain subordinate categories. The subordinate categories may contain their own subcategories, and so on. In addition to containing subcategories, categories contain the specific policies an administrator can configure.

Each policy controls the behavior of one aspect of a user's environment. For example, a simple desktop policy specifies whether to hide all icons on the desktop. There are more elaborate policies that define the default quota limit and warning level for an individual filesystem.

Remember that these specific policies are applied to keys in the Registry. The number of Registry keys affected depends on the complexity of the actual policy. A single policy can consist of multiple settings, or parts. A part represents a single value that is stored in the Registry. Each policy is made up of zero or more parts. The policy for hiding icons on the desktop does not contain any parts; it's simply enabled or disabled. The quota limit and warning level policy, however, contains a number of parts, one for each value that needs to be stored: the default quota limit value, the measurement units for the quota limit, and so on. Since policies require values of various data types, parts differ as to their permissible values. Some parts require strings, some require numeric values, and some parts' values are restricted to a set of predefined values.

User Versus Machine Policies There are two types of group polices: polices that apply to the computer and policies that pertain to users. Computer configuration policies apply to all users on a computer and are active whenever a machine is running. They're stored in the HKLM section of the machine's Registry and include policies that define security settings, desktop appearance, and startup and shutdown scripts. They're applied when the machine boots. This is different from System Policy Editor machine policies, which are applied when a user logs on.

User configuration settings, on the other hand, are active for each user on a computer. They're stored in the Registry under HKCU and define user-specific settings such as assigned programs, program settings, and desktop appearance. Unlike computer settings, which remain in effect until the computer is shut down, user configuration settings are reloaded for each new user. In this way, user policies can be downloaded for a user, regardless of what machine she logs into. You can specify user policies that can be applied to all users of a specific machine, or you can apply policies that apply only to specific users no matter where they log on. TIP:

For detailed information about these templates and the policies, Registry keys, and values that they cover, refer to Appendix A, User Configuration Group Policy Objects, and Appendix B, Computer Configuration Group Policy Objects.

--------------------------------------------------------------------------------

1. You sometimes see reference to the local machine policy; that's just another name for the LGPO.

2. A second, but much more ambitious, way to extend the functionality of Group Policy is to write a software extension for the Group Policy snap-in. Software development, unfortunately, is beyond the scope of this book.

Product details

  • ASIN ‏ : ‎ 1565929438
  • Publisher ‏ : ‎ O'Reilly Media; 1st edition (October 3, 2000)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 556 pages
  • ISBN-10 ‏ : ‎ 9781565929432
  • ISBN-13 ‏ : ‎ 978-1565929432
  • Item Weight ‏ : ‎ 1.99 pounds
  • Dimensions ‏ : ‎ 7 x 1.08 x 9.19 inches
  • Customer Reviews:
    4.3 4.3 out of 5 stars 3 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Paul Robichaux
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Hi, and welcome to my Author Central page! I've been writing professionally since 1995 or so, but I got my start as a professional programmer at age 10 when I was hired by a local oilfield company to modify some code in their BASIC accounting package to change its output format. Since then, I've worked on medical, industrial, consumer, educational, and security software; my code has flown in space, been used by the Director of Central Intelligence, shipped as part of specialty CAD products, and been downloaded and used tens of thousands of times in the Apple App Store.

Since 1998, I've also spent a lot of time working with, writing about, and consulting on Microsoft Exchange. My newest book, "Exchange Server 2013 Inside Out: Clients, Connectivity, and UM" focuses on Exchange. Despite that focus I maintain a healthy interest in lots of other computing topics, including privacy, security, unified communications, and cloud-based deployments.

I currently work as a global principal consultant for Dell (now the world's largest startup after our private-equity buyout).

My hobbies include photography, aviation, and cooking. I live in Huntsville, Alabama with my sons.

Customer reviews

4.3 out of 5 stars
3 global ratings

Top reviews from the United States

Reviewed in the United States on January 31, 2014
I no longer run winY2K on even a monthly basis. and more than likely not a lot of other people do nowadays either. USB is not well supported for one thing (although I still have this OS on one of my systems).
Reviewed in the United States on February 15, 2002
Regardless of your experience with the registry, this book can be of value to you. Despite the title, there are references in almost every section of the book on the Windows NT 4 registry, which can be helpful if you are working in a mixed environment or are coming from the NT 4 side of things.
The author starts the book by assuming you have no previous experience with the registry, and takes you on a 5 chapter tour, covering topics such as the history of the registry, how to navigate, what each part does, how to back it up and restore it, the different editors you can use, etc. From there, the book progresses for a couple of chapters on configuring policies - using the Policy Editor and GPO/OU policies within Windows 2000.
The author does include a surprising chapter in the middle entitled "Programming with the Registry" (Chapter 8) in which he covers many of the API calls for the registry and the Shell Utility, and then gives demos in C/C++, Perl and Visual Basic. My personal opinion is that that chapter is a little advanced for the book as a whole, but if you're not into it, it can be skipped without much loss to you.
The book also spends 2 chapters covering administration and tweaks (plus a great index section on the Group Policy Objects), and the final chapter documents what each hive in the registry does.
All in all, it's worth a read.
16 people found this helpful
Report
Reviewed in the United States on March 8, 2001
Really I would give it 4.5 stars if I could.
It's a good book, but it should be titled 'NT and 2000 registry'. It discusses both. This might be a bonus to some (who would like info on both) and a disadvantage to others (who already own stuff about NT registry). There are a few errors and some things I would change, and I wouldn't say it's as good as some other Oreilly books I've read.
There are sections just about policy settings which is good and a nice set of appendicies.
11 people found this helpful
Report