I guess those guys at TechARP really must have some good sources: less than one week after they shared leaked information about release dates and content for Windows Vista SP2, Microsoft has announced its Customer Preview Program (CPP) for a single SP2 that will cover both Windows Vista and Windows Server 2008. This leads me to several interesting observations:
- There must be much more to the common code base that purportedly exists between Vista and Server 2008 than many had previously thought–including me–because a single set of executables (32-bit and 64-bit binaries, in the usual variations) will address both OSes.
- The Notable Changes document mentions a change to the Windows Update Agent/Windows Update Service stack as a pre-req to installing this service pack.
- The Windows Update versions will be between 302 and 390 MB in size for standalone packages, and from 41 to 47 MB for Windows Update downloads (32-bit packages). For x64 64-bit packages, these numbers vary between 508 and 622 MB for standalone, and 60 and 90 MB for Windows Update versions.
- The new features list matches what I reported from TechARP exactly, except for the omission of updates to the RSS feeds sidebar gadget to improve performance and responsiveness.
- Numerous enterprise (full addition of Hyper-V into 2008, improved power management policies, and improved backward compatibility for Terminal Server license keys) and setup and deployment (single installer for both Vista and 2008, driver incompatibility checks during install, better error handling and reporting, improved installation logging and security, and another clean-up tool to rid the drive of files that SP2 will supersede) features will debut in this service pack.
- There’s also mention of running the clean-up tool offline while creating slipstream install images to reduce overall image size. I’m curious to see how this will play out in day-to-day use.
As I write this blog, the SP2 download is available only to TechNet and MSDN subscribers (drat! I gave up my TechNet subscription as of 1/1/2008, and this is the first time I’ve missed it since then). On Thursday, 12/4/08, it became available on its own Beta CPP page [added 12/5/08].
Of course this information begs a very important question for enterprise Vista admins to ponder: why would they care about this beta? Instead of thinking of it as another distraction from important tasks and activities, think of it as an early opportunity to look for potential install, deployment, and compatibility issues. Although the full-blown release won’t go live until April09 at the earliest, it’s never too soon to start weeding out the potential gotchas from the work that a full-blown rollout will inevitably bring. That’s why you’ll probably want to download and work with this beta, albeit in the context of a safe and isolated test lab setup.
Adrian Wong’s TechARP Web site (here ARP stands for “Adrian’s Rojak Pot” not “Address Resolution Protocol” BTW) has been a reliable source of advance information about upcoming Windows Service packs for some time now. Just before Thanksgiving he disclosed some information about the next Vista Service Pack (Vista SP2, that is) which is probably of great interest to IT professionals who feed and care for Vista installed bases of any size. Apparently SP2 for Windows Server 2008 will also ship on this same schedule (but that’s outside my bailiwick so I won’t say more about it here, though you can find details in the pointers at the end of this blog).
Here’s the scoop on projected dates:
- Windows Vista SP2 release candidate should hit some time in February, 2009
- Windows Vista SP2 RTM (release to manufacturing) should follow a couple of months later, in April, 2009
- Dates for release online and through Windows Update have yet to be determined, but will occur in several waves, by language. As with Vista SP1 and XP SP3, English, German, Japanese, French and Spanish will probably come first, followed by Chinese, Korean, and Brazilian Portugese next, with other languages later still. If those recent releases are any indicator, the first wave will follow about three weeks after RTM, and the second six more weeks after that. Thus, we’re looking into May for the first wave and June or July for the second one.
The major updates in SP2 are said to include the following items:
- Windows Search 4.0, to deliver speedier, more accurate searches on the desktop
- Bluetooth 2.1 Feature Pack, to deliver support for the more recent Bluetooth Technology spec, especially beneficial for battery life when wireless human interface devices–namely, mice and keyboards–are in use
- native Vista support for burning to Blu-ray disks
- updates to Windows Connect Now (WCN) to offer improved, simplified Wi-Fi Configuration
- adds UCT timestamp support to exFAT file system used on Flash drives, and permits proper time synchronization across time zones
Of course, there will also be the usual roll-up of patches, fixes, and security updates since SP1 became available on 3/4/2008 (RTM, we actually didn’t see it online until about three weeks later in the month). But it looks like there will actually be some useful functionality upgrades, especially for Blu-ray burners, Bluetooth, Wi-Fi, and Flash drive file systems. Likewise, any slippage that occurs will also be interesting to follow (dates may slip out further and are much less likely to slide in closer).
The original source for this information comes from two TechARP editorials:
1. ED#107: Latest Details on Windows Vista Service Pack 2
2. ED#106: Windows Vista Service Pack 2′s Latest Release Schedule
On 11/25/2008 Microsoft pushed a slew of updates out the door For Windows Vista, as follows:
- KB957321 – An update to add support to the XMP specification for complex data types in the Windows Imaging Component
- KB959108 – An update is available that disables the collection and transfer of Software Quality Metrics data by the Windows Portable Device (WPD) API
- KB959130 – When you run the “Connect to the Internet” Wizard and select the “Browse the Internet now” option, Internet Explorer starts instead of the default Web browser that you set in Windows Vista or in Windows Server 2008
- KB957241 – Updates for Microsoft Office Access 2007 Help (dated 11/12/2008 in the KB article, but didn’t actually get out until 11/25).
- KB949104 – More enhancements/changes to the Windows Update Agent (WUA) that interacts with Windows Update to search for and download updates from a remote server. Permits further auto-updating of WUA itself.
Except for the WUA item (KB949104), which is marked “Important,” the rest of these items are marked “Recommended.” The whole release, with the possible exception of that WUA item, leaves me scratching my head a little, wondering why MS felt compelled to push these updates out of cycle, rather than waiting for next Patch Tuesday (12/9/2008) to come around. In poking around on various Microsoft Vista and Windows Update newsgroups I don’t see much cause for urgency or alarm in any of these updates, though a few MS Office users do report problems with various applications after applying the help updates (including those posted on 11/12/2008 for most other major Office components).
What is interesting in this batch is the version number associated with the WUA update (7.2.6001.788). Unless my eyes deceive me, and my wits have deserted me, this is the first appearance of a Windows 7 component in the public eye, for general consumption. Most Vista SP1 version numbers take the form 6.0.6001.18000 or something similar, where the 6 stands for “Windows 6″ (Vista) and the 6001 indicates the SP1 build number; this version number combines a Windows 7 reference and the 6001 build number in a single item. I can’t help but wonder what it portends.
Those Vista admins whose charges use MS Office will probably want to push the Access Help update out, and their need for WUA updates will depend on how they handle Windows Updates internally within their organizations (I suspect most will not need it, because they use their own tools to push updates to user machines). The items may require some compatibility testing to determine whether or not they should be pushed out. On the face of what they cover, however, I see no compelling reasons not to wait and handle this other stuff when the next Patch Tuesday strikes on 12/9/2008.
I’ve been working in some depth around Windows security topics since 1997, when I began teaching Windows hardening classes at Interop with my colleague and co-author James Michael Stewart. In 2003, I started researching malware topics and tools, a quest that eventually led to my 2005 book “Fighting Spyware, Viruses, and Malware” for PC Magazine Press. Along that path, I became familiar with Swedish infosec firm Secunia, whose many threat and vulnerability warnings, proof of concept exploits, and timely malware information always proved accurate and reliable.
Yesterday, Secunia released a final version (22.214.171.124) of its Personal Security Inspector, a free, single-shot vulnerability scanner that examines Windows PCs running Windows 2000, Windows XP, Windows Server 2003, and Windows Vista to make sure that Windows Updates are current and correct, and that checks installed applications to make sure they are also patched and up-to-date. The tool flags unpatched code, and end-of-life programs that are no longer being updated, to help individuals update or replace potential sources of vulnerability on their desktops.
For enterprise use, Secunia also makes a Network Software Inspector (NSI, currently at version 2.0) available to companies and organizations that want to perform similar scans on the PCs on their networks. At 20 Euros per machine per year (about $25.68 at today’s exchange rates), it’s not too different from what the Microsoft Baseline Security Analyzer (MBSA) can do for Windows and MS apps. But when you add its substantial (over 7,000 programs) database of applications with security status, and its built-in, easy-to-use, and intelligible remediation advice, NSI comes out way ahead at a very reasonable per-user cost (contact Secunia sales for purchases of over 50 seats, where discounts begin to kick in).
If you’re interested in trying out this outstanding tool, you can download a 30-day evaluation copy at no charge. It’s definitely worth digging into further for those companies or organizations seeking to deploy a good vulnerability scanner, or those interested in replacing their current scanner with something better and more capable.
On a personal note, let me wish all my readers and their families a happy holiday, with plenty of quality leisure time and good eats. I’m off shortly to pick up a brined Kosher turkey, and expect wonderful results when it emerges from the oven tomorrow afternoon.
I’ve grappled with this problem on various Vista systems for over a year now. A user will be tooling along merrily in Vista on his or her desktop when all of a sudden BAM! Explorer.exe crashes, and automatically restarts itself. A look into the Event Log on the affected desktop usually produces an Event 1000 Error, with the following General log entry:
Faulting application Explorer.EXE, version 6.0.6001.18000, time stamp 0x47918e5d, faulting module unknown, version 0.0.0.0, time stamp 0×00000000, exception code 0xc0000096, fault offset 0x027262f3, process id 0xc44, application start time 0x01c94d7badff6da6.
The two keys to unraveling this problem are the identification of Explorer.exe (which your users will tell you about anyway) and the privileged exception error code 0xC0000096. If you research this history of this code along with explorer.exe, you won’t find much about it on Vista per se, but there are plenty of postings on this topic related to XP. Further digging reveals that file associations active inside Explorer, especially those that invoke non-Microsoft viewers (as when, for example, you designate WinZIP as the default tool for opening .ZIP files, or Paintshop Pro as the default for .jpg, .gif, and .png files) can sometimes cause delays in getting Explorer to open drive icons (it’s chasing viewers down to populate listings with thumbnails in case you wonder why this happens), and can also cause occasional, apparently random crashes as various activities you undertake cause Explorer to refresh views of a drive or folder.
There’s a nifty little freeware program available from Nirsoft called ShellExView that will show you all of the Shell Extensions installed on Windows Vista (and thus also, part of Windows Explorer). By carefully disabling third-party (non-Microsoft, that is) shell extensions inside Explorer–especially those your users never touch, and therefore don’t need anyway–you can usually stop these problems dead in their tracks. When you see how many file extensions appear on a typical desktop (the one shown has 341 shell extensions installed, of which just over 30 come from third parties, and the rest from Microsoft) you’ll develop a profound appreciate of how the occasional tangle here could easily cause problems.
The accepted technique for troubleshooting such issues is to start by disabling all non-MS shell extensions, then re-enable third-party entries in vendor-specific groups to isolate the offending party or parties. My experience has been that you can disable those that aren’t used without any difficulty, then concentrate on those that are used. I’ve been able to identify the culprits in most cases by doing away with unused shell extensions, and have never had to spend more than 15 minutes running down other culprits.
Try it: you’ll find ShellExView to be a very useful tool.
At last, a Vista exam title that you can get out of your mouth out loud without having to stop halfway through to draw breath! That said, this Technology Specialist exam is not without some interesting twists and turns, and includes coverage of Windows Home Server as well as numerous aspects of Windows Vista. Candidates typically come from the ranks of retail support operations who can recommend, implement, and (most important) troubleshoot connected solutions based on Windows Vista. Some experience in installing Vista, managing Vista security, and troubleshooting Vista networking issues is also required, with a minimum of six to twelve months in harness as a retail support technician.
The only preparation tools available for this exam come from a handful of e-learning offerings:
- Collection 7038: Microsoft Consumer Technology Solutions Sales and Technical Training
- Course 7040: Designing and Building a Consumer Technology Network
- Course 7041: Setting up Windows Vista for a Consumer Technology Solution
- Course 7043: Configuring and Troubleshooting Networking in a Consumer Technology Solution
- Course 7044: Setting Up Windows Home Server for a Consumer Technology Solution
To follow one list with another, here’s a rundown on the skills measured table from the Exam Page:
- Installing or upgrading Windows Vista:
prepare a system for clean install or upgrade, deploy Vista from upgrade or clean install, perform post-install tasks, and troubleshoot deployment issues.
- Configuring connected solutions:
Configure Windows Media Connect and Media Sharing, Configure MS Xbox 360 and Media Center Extender v1 for Media Sharing, and Configure Media Center Extender v2.
- Managing and maintaining Windows Vista systems:
Configure an troubleshoot security for IE7, troubleshoot Windows Firewall and Defender issues, apply software updates, set up user accounts and parental controls, and troubleshoot issues using Reliability and Performance Monitor.
- Configuring Windows Home Server (WHS):
Set up WHS, add users and media to WHS, set up PC backup within a WHS network, restore PCs within a WHS network, and troubleshoot issues with WHS or networking.
It’s interesting to note that the total count for those who’ve taken this exam and earned the TS: Windows Home Integrator credential stands at a relatively miniscule 235 as of 10/27/2008. The exam went live in August, so that shows less than 100 people passing this test per month, on average. Interesting exam but perhaps not as commercially viable a focus as Microsoft might like it to be? Only time will tell, and it will be equally interesting to see if the run rate climbs, holds steady, or falls in the months ahead. I’m not sure if there are enough people working at the intersection of Windows Vista and Windows Media technologies to make this credential truly popular, but we’ll be finding out!
Exam 70-624 TS: Deploying and Maintaining Windows Vista Client and 2007 Microsoft Office System Desktops
Another doozy of a title, this exam is likely to appeal to IT professionals who work with Vista in all situations (SOHO, SMB, tech support, enterprise, and so forth) and of all stripes (help desk, tech support, IT administration, and so on). As with other exams in the 70-620 through 70-625 Vista sequence, this one’s Preparation Guide follows the old-style format. In short, anybody who deploys or maintains Windows Vista desktops is likely to benefit from studying for and taking this exam, even though its official target audience is candidates with “a minimum of one year of experience managing day-to-day issues with desktop deployments.”
There’s one more incredibly useful nugget inside this prep guide. It reads: “This exam is the Windows Vista version of Exam 74-134: Pre-Installing Microsoft Products and Technologies, [and is] focused on the OEM Pre-Installation Kit (OPK).” Why so? Because you’ll find some great links to study materials for the other exam on its prep page (linked at the head of this paragraph) that don’t appear on the 70-624 exam page.
The prep tools and resources that appear on the 70-624 page include the following:
- Classroom training: Course 5105: Deploying Windows Vista Business Desktops and Course 5058: Deploying Microsoft Office 2007 Professional.
- e-learning offerings: Collection 5058: Deploying 2007 Microsoft Office System Client Products.
The lack of books and complete e-learning coverage explains nicely why the 74-134 page is referenced, and also why it’s a good idea to dig up its study material citations to help you get ready for this exam as well.
Skills measured on the 70-624 exam break down as follows:
- Deploying 2007 MS Office System:
Configure MS Office settings & components, install 2007 MS Office system, and migrate from earlier MS Office versions.
- Configuring Windows Vista Automated Installation Settings:
Configure Vista automated install settings, manage Windows Vista catalogs, add device drivers to Vista installs, manage Windows components, and configure and manipulate Windows Imaging Format (WIM) images.
- Deploying Windows Vista:
Deploy Vista using Lite Touch Installation (LTI) and Zero Touch Installation (ZTI), customize Windows Preinstallation Environment (PE), and troubleshoot deployment issues.
- Using Business Desktop Deployment (BDD) Workbench:
Install BDD, configure distribution point in BDD 2007 Workbench, create a reference computer image, manage XML files in BDD Workbench, automate 2007 MS Office system installation, and customize and maintain Windows PE in BDD Workbench.
- Application Compatibility Toolkit (ACT):
Install and configure ACT 5, deploy ACT 5 agents, report application compatibility, and fix compatibility issues.
- Managing User State Migration:
Upgrade user state from XP to Vista, automate user state migration, manage Vista deployments using SMS 2003, determine Operating System Deployment (OSD) prerequisites, install and configure SMS 2003 OSD Feature Pack, and troubleshoot and plan for user state migrations.
There’s a lot more to this exam than the title conveys, especially where automation, deployment, and user state migration are concerned. This one’s going to take some work and experience to get through, so be prepared to invest substantial time and effort in preparing, unless you work with these tools and technologies on a daily basis. My guess is that those conditions hold only in enterprises or outside services companies big or specialized enough to have their own Vista deployment teams. How many of those can there be? The total count for MCTS: Business Desktop Deployment certified professionals as of 10/27/08 is 4,868, so the answer could be: “More than you think!”
Occasionally, admins need to break the rules that Vista applies–sometimes quite severely–to its users. Case in point: Vista absolutely refuses to permit any account to delete files from the %windir%\System32 and %SystemDrive%\Program Files directories. You can try all kinds of contortions: changing permissions, forced delete utilities, command line install repair console, and so forth, to get rid of such things without success.
On the other hand, there is sometimes virtue in booting a Vista machine with a different operating system when the time comes to violate such rules and restrictions. Belgian developer Tom Kerremans (who goes by the nomme de wire “Harakiri”) has created a bootable ISO image called the Trinity Rescue Kit (TRK) that can help savvy admins to sidestep such restrictions, when they have Vista problems that they know how to fix, but simply can’t fix inside Vista itself.
For the issue described (deleting files in restricted Vista directories) you can copy the ISO image to a USB Flash drive (assuming your Vista PC’s BIOS will let you boot from such a device) or burn a bootable CD from that image (Alex Feinman’s ISO Recorder PowerToy makes this quite easy to do). When you boot from the TRK image, it does a very good job of recognizing Windows system hardware and loading the correct drivers to create a workable Linux command line environment (bash for those who appreciate the various shell possibilities this might mean).
After that, you can use Kerreman’s mountallfs -g shell script to mount all of your NTFS drives for access inside TRK. As it happens, the -g switch is absolutely essential, because the default NTFS driver loaded when this parameter is missing preserves Vista’s NTFS restrictions, and won’t let you delete or alter protected files, either! With the right mountpoints loaded, you can use the ls, cd, rm, and rmdir commands to navigate to the drive you want to manage, jump into the target directories, and delete what you like. In my case, I used this facility to delete the %windir% and %SystemDrive%\Program Files directories from an old former system/boot drive I had converted to a data drive in the wake of the crash of the other drive in a mirrored pair. In a more typical case, admins might use this capability to remove pesky malware-related .exe or .dll files from either or both of these directories.
Other useful TRK facilities include NTFS boot sector repairs (relocntfs), a mass clone (mclone) utility to clone Vista images over the network to multiple machines using multicast IP, a Windows install locator (winpass), remote access support (TRSP), various drive rescue tools (ddrescue and dd_rescue, memtest86+ version 2.01, and a whole bunch more. For a more in-depth look at TRK (a couple of versions back: the package is currently at 3.3 and the review is 3.1) check out Mayank Sharma’s review at Linux.com.
Exam 70-623 Pro: Supporting and Troubleshooting Applications on a Vista Client for Consumer Support Technicians
Another gargantuan title not only heads up this exam, but also helps to tell would-be candidates if this represents their particular cup or tea or not. Like 70-622, 70-623 features another old-fashioned exam page. Along with exam 70-620, passing this exam qualifies individuals for the MCITP Customer Support Technician credential. Although this is not strictly an enterprise-focused Vista certification is remains pretty germane to such operations, especially those that operate their own help desks or tech support operations, or who want to establish sufficiently high bars for their vendors to jump to make sure outsourced service or support meets their needs.
The target position for this credential is somebody who works as a consumer, customer, or user support technician. To succeed with this exam, candidates should be experienced across a range of desktop OSes, applications, and mobile devices. They should also have some experience (more is better) in handling network, malware, and hardware support issues from reporting through research and investigation into reporting and resolution phases. Likewise, candidates need experience in implementing, managing, and troubleshooting desktop OSes in stand-alone or SOHO network situations.
Here’s the drill on the preparation tools and resources available for this exam:
- Classroom training: Course 5118: Maintaining and Troubleshooting Windows Vista Computers, and Course 5119 Supporting the Windows Vista Operating System and Applications.
- e-Learning offerings: Collection 5366: Maintaining and Troubleshooting Computers Running Windows Vista, Collection 5372: Deploying Windows Vista Desktop Images and Applications, and Collection 4379: Supporting Windows Vista for the Consumer Support Technician. Those who already hold an MCDST can also dig into Collection 5104: Upgrade Skills to Support Windows Vista Consumers.
- MS Press book: There’s a Self-Paced Training Kit available for Exam 70-623 as well.
Here are some highlights of what this exam covers (for all the gory details, check out the “Skills Measured” table on the exam page; as with other exams, configuration and troubleshooting element recur repeatedly throughout this entire list):
- Install and Upgrade Windows Vista:
Evaluate potential upgrade enviornments, prepare to install Vista, troubleshoot and resolve installation issues, likewise for post-install issues.
- Post-Installation: Customize and Configure Settings:
Configure Sidebar, Aero, user accounts, and evaluate user requirements to recommend, set up, and configure desktop apps, then recommend appropriate settings by evaluating user systems to optimize performance.
- Configure Vista Security:
Work with Windows Security Center, firewalls, Windows Update, Defender, parental controls, IE 7, UAC, and data protection settings and configuration.
- Configure, troubleshoot, and repair networking:
Work with network protocols, network services (client side), Network and Sharing Center, wireless networking, file and print sharing, and Media Center settings, configuration, and troubleshooting.
- Install, Configure, and Troubleshoot Devices:
Connect peripherals; install, configure, and troubleshoot: mobile devices, digital cameras and camcorders, media devices, and printers, fax machines, and copy devices.
- Troubleshoot and repair Windows Vista:
Diagnose specific issues, repair a corrupted OS, and remove malware from a client system.
Where over 7,000 of the MCITP Enterprise Support Technician credentials have been granted as of October 2008, only 987 hardy souls had completed the MCITP Consumer Support Technician credential by that same date. What does this say about the relative importance or popularity of these two credentials? Perhaps that enterprises understand the need for certification (as do their employees) more than do independent or in-store support or help desk operations. This exam is probably not as important for enterprise types, unless they run their own support or help desk operations that include in-home support for mobile, telecommuting, temporary, contract, or other off-site workers. In such situations, however, it should be absolutely invaluable.
Exam 70-622 Pro: Supporting and Troubleshooting Applications on a Windows Vista Client for Enterprise Support Technicians
Wow! What an exam title, eh? Interestingly, 70-622 also still sports an old-fashioned exam page, too. Along with 70-622, this MCITP exam qualifies those who pass it to earn the MCITP Enterprise Support Technicican credential, however. Together those two exams sum up the requirements for that particular certification.
Microsoft lists the following items under its “Preparation tools and resources” heading:
- Classroom courses: 5118 Maintaining and Troubleshooting Windows Vista Computers, and 5119 Supporting the Windows Vista Operating Sytem and Applications.
- E-learning offerings: Collection 5366: Maintaining and Troubleshooting Computers Running Windows Vista, and Collection 5372: Deploying Windows Vista Desktop Images and Applications.
- MS Press books: MCITP Self-Paced Training Kit (Exam 70-622) Supporting and Troubleshooting… (you know the rest: book title matches exam title).
- Deploying Windows Vista:
Analyze environment and select appropriate deployment method; prepare system for installation (clean or upgrade install); and deploy Vista from a custom image.
- Managing Vista Security:
Manage IE 7 security; apply security updates; work with UAC; manage resource access and security issues.
- Managing and maintaining Vista Systems:
Working with policy settings, Task Scheduler, Event Forwarding, Windows Update, and performance and reliability issues.
Network protocols, networks services at the client level, remote access, wireless networking, network security, and network resource access.
- Supporting and maintaining desktop applications:
support deployed applications, software restrictions, and maintain desktop applications.
Here are some highlights of what this exam covers (for all the details see the “Skills Measured” table on the exam page; configuration and troubleshooting topics are covered throughout):
So far, just over 7,000 of these certifications have been granted, which makes it neither the most nor the least popular of the MCITP designations. That may reflect its deep and broad coverage of Vista application deployment tools and technologies. Veteran Microsoft cert guy Andy Barkl took the beta version of this exam in September 2007, and wrote up a nice overview for MCP Magazine at that time. He also provides good pointers to other Microsoft materials available online through TechNet that proved useful for his exam preparations; you’ll probably find it useful, too.
This is one of the most important exams for those who work with Vista in an enterprise setting. Though you’ll want to take enough time to prepare for it properly (and neither the foregoing summary of exam objectives nor the information on the MS exam page really do its coverage complete justice, owing to the wealth of details and information these items cover), you will also learn a lot as you get ready to take this exam. Highly recommended.