Deeper Win2000 Registry (11) Safety of Windows 2000

zhaozj2021-02-08  207

Windows 2000 security

Introduction Different from other versions of Wi N D O W S (such as Windows 3.x and 9x), Windows NT / 2000 has a complete security system, which is an indivisible part of the operating system and cannot be disabled. Windows 2000 security systems are responsible for verifying the user's identity when the user logs in to the system; control which resources, files, and applications that users can access; responsible for maintaining the security time generated during user activity to review tracking. All of these aspects of Windows 2000 secure, the registry plays a very important role.

Windows 2000 Safety Basic Windows 2000 security is divided into three main parts: the user's access token, the SAMRIT Yaccounts Manger, SAM registry entry information about each user access, and Records of security events that have a possible audit for system administrators. 1. Access token Access Token is a software object created by the Windows 2000 security system, which contains privilege information on the current workstation and other computers in the network. The information included by the access token is saved in the registry and can operate directly in the registry. The access token includes the following information: User Security ID (User Security ID, SID). Group Security ID (Group Security ID). User Privilege. Si D. of the owner's Si D. default Access Control List, ACL 2. SAM Registry Key For information on user security settings Save in the registry configuration unit HKEY _ LOCAL _ MACHINE in sub-items for Security Accounts Manager. S A m is a service that is responsible for verifying user login information validity from various system tool user interfaces while providing information included in each user access token. The information in the S a M registry key is usually not directly operated, but through various management tools, such as a system policy editor, operations. 3. Audit WINDOWS 2000 system is likely to generate safety events, these events are managed by 158 using Windows 2000 registry management.

Write a log file in turn to review it by the system administrator in the future. This log file is controlled by the event viewer, but its settings are in the registry and can be viewed when needed. Potential security events include: Create new user / group members change. Program execution / resource is accessed. Log in / logout. Security policy change. Privilege use. System events have affected security

The security feature of logging in to Windows 2000 will start working at the time of the user tried to log in to the Windows 2000 workstation. The information input to the login dialog is submitted to local security authorization (LSA), which is a SAM database (which can be either local or remote, we will introduce the login information in the next section) System security services for validity. If the process succeeds, you will create an access token for the user and activate it. This token creates a topic with one or more executable programs, then the topic begins to access the system. L s A uses a registry key to determine how this process is done (especially the user interface displayed during the login).

Netlogon Services Windows 2000 supports multiple workstations that connect to the network via N e t l o g o N service to use a secure database. N e T L O G O N requires services based on domain-based networks and primary domain controllers (P d c). In this case, the login dialog box displays an additional editing control that allows you to enter the domain name used to perform N e T L O G O N. Various features of N e T L O G O N can be controlled by direct operation registry. Shutdown security issues will also occur from a workstation to log out from a workstation and may occur when it is possible to shut down. Some users may only see a logout dialog, while others will see options in the dialog on the dialogwork or shut down power. The registry includes an entry that controls these features.

Positioning security event log file

Windows 2000 provides the ability to write a security event to the log file. The registry contains how to control this log file how to create and maintain. To view the location of this log file, you can follow the steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the System / CurrentControlSet / Services / EventLog / Security child. Click this subkey to select it, display its value in the right window. 4) Position the entry to the value f i l e. The value of f i l e contains the path and file name used to save the security event log file. Prompt the Windows 2000 Event View program can be used to change the setting of the value f i l e in the S E C U R I T Y child.

Determine the maximum size of the security event log file

Windows 2000 provides the ability to write a log file on security events. The registry contains how to control this log file how to create and maintain. To see the security event log file With the maximum size of the kilobyte, you can follow the steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the System / CurrentControlSet / Services / EventLog / Security child. Click this subkey to select it, display its value in the right window. 4) Position the entry to the value m a x s i z e. The value of M a x S i z E contains the maximum size of the kilobyte meter that can be achieved by the security event log file. Prompt the Windows 2000 Event View program can be used to change the setting of the value m a x s i z e in the S e c U R I T Y child. The default value of M A x S I z E is 5 1 2.

Check the survival of events in security event logs

Windows 2000 provides the ability to write a security event to the log file. The registry contains how to control this log file how to create and maintain. To see if the event is overwritten before the event is overwritten, you can modify the registry following steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the System / CurrentControlSet / Services / EventLog / Security child. Click this subkey to select it, display its value in the right window. 4) The entries of the value R e t e n t I o n are positioned. The value of R e t e n t I o n specifies the number of seconds that the event is saved in the log file; any event in the log file is not overwritten than the "new" event, and "old" than this value will be overwritten. A log full incident occurs if an event cannot be added to the existing log file. Tip Windows 2000 Event View Programs can be used to change the setting of the value R e t e n t I o n. The default value of R e t e n t I o n is 604 800 seconds (7 days). Determine if a Windows 2000 service is log security event

Windows 2000 provides the ability to write a security event to the log file. The registry contains how to control this log file how to create and maintain. To determine if a Windows 2000 service records its event to a secure log file, you can follow the steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the System / CurrentControlSet / Services / EventLog / Security child. Click this subkey to select it, display its value in the right window. 4) The entry to the value S O U R C e s is positioned. The value of S O U R C E S contains all the names of all services, applications, and application groups currently recorded in the security event log. WARNING The value of S O U R C e s is dynamic, maintained by E V E N T L O G service.

Event description in positioning security event logs

Windows 2000 provides the ability to write a security event to the log file. The registry contains how to control this log file how to create and maintain. To decrypt a service or application written to the event identifier in the log, you can view the text files provided by the application. To find the location of the text file, you can follow the steps below: 1) Open the Start menu and select Run. Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to locate the System / CurrentControlset / Services / EventLog / Security / [A P P N a M e] sub-item, where [a p p n a m e] is the name of the application or service enclosed with quotation marks. Click this subkey to select it, display its value in the right window. 4) The entry to the value E V e n t m e s s a g e f i l e is positioned. E V e n t m e s S A g e f i L E The value contains the path and file name of the document, and the document includes an event description of the security event log file identifier. Category Description of Location Safety Event Log

Windows 2000 provides the ability to write a security event to the log file. The registry contains how to control this log file how to create and maintain. To decrypt a service or application written to the category identifier in the log, you can view the text file (or positioning to a D l L associated with the application). To find the location of the text file, you can modify the registry following the steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until you find Wi N D O W S Chain 11 Windows 2000 safe use with 161 2 0 0 0 0 0 0 (usually W i N n). Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to locate the System / CurrentControlset / Services / EventLog / Security / [A P P N a M e] sub-item, where [a p p n a m e] is the name of the application or service enclosed with quotation marks. Click this subkey to select it, display its value in the right window. 4) The entry to the value C A T e g o R y m e s s a g e f i l e is positioned. The value of C A t e g o R Y M e s S A g e f i l e contains the path and file name of the document, and the document includes a category description of the security event log file identifier. Prompt categories and event descriptions may be placed in the same file.

All security event categories supported by some service support for Windows 2000

Windows 2000 provides the ability to write a security event to the log file. The registry contains how to control this log file how to create and maintain. To see a service or application to write how many category identifiers to the log, you can follow the steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to locate the System / CurrentControlset / Services / EventLog / Security / [A P P N a M e] sub-item, where [a p p n a m e] is the name of the application or service enclosed with quotation marks. Click this subkey to select it, display its value in the right window. 4) The entries are positioned to the value C A T E G O R Y C O U N T. The value of C A T E G O R Y C O U N t contains the total number of categories described in the secure event log file identifier. Determine the security event type supported by the Windows 2000

Windows 2000 provides the ability to write a security event to the log file. The registry contains how to control this log file how to create and maintain. To see which event type of event or application can write to the log, you can complete the modification of the registry following the steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to locate the System / CurrentControlset / Services / EventLog / Security / [A P P N a M e] sub-item, where [a p p n a m e] is the name of the application or service enclosed with quotation marks. Click this subkey to select it, display its value in the right window. 4) Position the entry to the value TY P e s U P P P O R T E D. The value of TY P e s S u p p o R t e d contains the event type value used in the security event log file identifier.

Forcing Windows 2000 systems crash when safety event logs

Windows 2000 provides the ability to write a security event to the log file. The registry contains how to control this log file how to create and maintain. To force the system to crash when the log file is full, you can modify the registry with the steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S Y S Y T E M / C U R R E N T C O N T R O L / L S A. Click this subkey to select it, display its value in the right window. 4) The entry of the value C R A S H O N A U D i T f A I L is positioned. Using the D WO R d editor to set the value of C R A S H O N A U D I T f A I L to 1, the forced system can crash when the security event log cannot be extended due to the maximum size or event entry surplus period setting. Tip If the value C R A S H O N A U D i T f A i l does not exist, use "Edit" | Add Value "to create it. WARNING Enable this value may result in a system that cannot be recovered. Set the size of the NetLogon service change log

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access the registry key that controls the size of the change in the bytes sheet, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the SYSTEM / CURRENTCONTROLSET / Services / Netlogon / Parameters sub-item. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value C H a ​​N g e l o g s i z e. Using the D WO R D Editor to set the value of CH a N g e l o g s ie to a variation of the change record file, in bytes. Tip: The setting of CH a N g E L O g s I Z E is 4 m b does not cause any damage. In fact, larger settings can improve efficiency. The value of the default (also the smallest) is 6 4 k (about 2 0 0 entries). WARNING: All backup domain controllers (B D c) should have the same C H A N g E L O g s I z E value.

Managing Netlogon Service Mailbox Messages

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access the control N ETLOGON service In the start of the mailbox message (each message consumes a non-page memory pool 1 5 0 0 bytes), you can modify the registry as follows: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S Y s y E m / c u R R E N T L O g O N / P A R A m e t E R s child item. Click this subkey to select it, display its value in the right window. 4) The entry of positioning the value m a x i m m m m a g e s. Use the D Wo R d editor to change the value of Maximum Mailslotm E S S A G E S to the number of messages that you want to participate in queuing. It is suggested that the range of M a X I m M m M M M M a g e s is from 1 to 0 x f f f F, the default value of 5 0 0. WARNING Sets the value of M a x I m M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M. Try the processing performance of the Netlogon service mailbox message

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access the control N ETLOGON service, you can follow the registry items of the number of seconds of the secondary number of secondary mailboxes (which prevent N ETLOGON to handle invalid messages in an overload environment), and follow the steps: 1 ) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the SYSTEM / CURRENTCONTROLSET / Services / Netlogon / Parameters sub-item. Click this subkey to select it, display its value in the right window. 4) The entry to the value m a x i m m m m m m m m m m m m m m m m m m m M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M M` Use the D WO R d editor to change the value of Maximum Mailslotti M E O U t to the mailbox message Wait for N E T L O G O N processing, in seconds.

Tip: M a x i m u m M a i l s l o t Ti m e o u t ranges from 5 to 0 x F F F F F F F seconds, default is 10. Warning: the M a x i m u m M a i l s l o t Ti m e o u t value is set too low may result in loss of mail letters. Prevent mailbox message blocked via a bridge / router

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access whether N ETLOGON is susceptible to a registry key that is sensitive to the mailbox message caused by the network bridge / router problem (usually the bridge / router unable to decrypt the destination of the packet before expiration ", you can modify the registration as follows. Table: 1) Open the "Start" menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the SYSTEM / CURRENTCONTROLSET / Services / Netlogon / Parameters sub-item. Click this subkey to select it, display its value in the right window. 4) The entry to the value M a I L S L O T D u P L I c a t e Ti M e O U t. Using the D WO R d editor to change the value of the MAILSLOT DUPLICATI M E O U T into 0, it is forbidden to ignore the N E T L O G O N Copy Mail Box Message (which will cause problems due to the message blockage caused by the bridge / router). The rating of M a I L S L O T D U P L I c a t e Ti M e O U t ranges from 0 to 5 seconds. Higher settings can avoid processing replication messages, but will block retry attempts from customers.

Set the frequency of the BDC pulse

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access the control, the registry key is collected at a change in P d c before the update to the B D C sending pulse indication, and can be operated as follows: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the SYSTEM / CURRENTCONTROLSET / Services / Netlogon / Parameters sub-item. Click this subkey to select it, display its value in the right window. 4) Position the entry to the value P U L S e. Use the D WO R d editor to change the value of P U L S E to the delay (in seconds) between the two sends update pulses. The hint value P U L S e ranges from 6 0 (1 minute) to 172 800 (2 days), the default value is 3 0 (5 minutes). Chapter 11 Windows 2000 safe use 165

Manage BDC pulse

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. You can use a registry to control how many B D C update notifications (pulses) emitted once (desired P d c can process remote procedure calls to update remote databases). To do this, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S Y s y E m / c u R R E N T L O g O N / P A R A m e t E R s child item. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value P U L S e c o n c u R R e n C Y. Using the D WO R D Editor to change the value of P U L S E C O N C U R R E N C Y to P D C to process concurrent B D C database update. You need to find a balance between the Load of the P D C server and will result in a failure of the expiration B D C database. The hint value P U L S E C O N C U R R E N C Y ranges from 1 to 5 0 0 concurrent pulses, the default value is 2 0. Controlling the PING operation of the BDC pulse

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. You can access the registry key to control the maximum number of intervals (P i N g) of the P D C to send a new pulse (P i N g), regardless of whether the database of B D C needs to be updated. To do this, you can modify the registry: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S Y s y E m / c u R R E N T L O g O N / P A R A m e t E R s child item. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value P U L S e m a x i m u m. Use the D WO R d editor to change the value of P U L S e m a x i m u M to the latency (in seconds) between P D C / B D C twice pulse P i N g operation. The value of P U L S e m a x i m u m is from 6 0 (1 minute) to 172 800 (2 days), and the default value is 72,000 (2 hours).

Prevent BDC pulse timeout

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access the control, the B D c must respond to the registry key of the P d C pulse within how to timeout, and you can follow the steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the SYSTEM / CURRENTCONTROLSET / Services / Netlogon / Parameters sub-item. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value P U L S e Ti M e O U T 1. Use the D WO R d editor to change the value of P U L S e Ti M e O U T 1 to network maintenance The effective B D C pulse response desired time (in seconds). The hint value P U L S e Ti M e O U T 1 ranges from 1 to 1 2 0, the default value is 5. Prevent BDC copy timeout

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access the control, B d c must complete the registry key of the partial database replication before being marked as timeout, you can follow the steps below: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the SYSTEM / CURRENTCONTROLSET / Services / Netlogon / Parameters sub-item. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value P U L S e Ti M e O U T 2. Use the D WO R d editor to change the value of P U L S e Ti M e O U T 2 to the network completion of the part B D C database to copy the desired time (in seconds). Note that this value is only used when the transmission of the B D C database is used when the size problem requires multiple remote procedure call, RPC. The value of P U L S e Ti M e O U T 2 was from 6 0 (1 minute) to 3 600 (1 hour), and the default value was 3 0 (5 minutes).

Prevent BDC pulse response communication blocking

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. You can use the registry to control B D c to call the initialization database replication with R P C to respond to the number of seconds before the P d C pulse (which prevents copying communication from being blocked because all B D C pulses are triggered simultaneously). To do this, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the SYSTEM / CURRENTCONTROLSET / Services / Netlogon / Parameters sub-item. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value R a N D O M I Z E. Use the D WO R d editor to change the value of R A N D O M I Z E to experience and network traffic demand. The hint value P U L S e Ti M e O U T 2 ranges from 0 to 1 2 0, the default value is 1. WARNING R A N D O M I Z E must be less than the setting of P U L S e Ti M e O U T. Configure BDC replication based on network conditions

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access control assignment to the percentage of system resources for updating B D C, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the SYSTEM / CURRENTCONTROLSET / Services / Netlogon / Parameters sub-item. Click this subkey to select it, display its value in the right window. 4) The entries of the value R e P L i C A T I O N g O V e r N O r are positioned. Use the D WO RD editor to change the value between 0 and 1 0 0, which means that the transmission buffer memory used by each replication call and the amount of time required for BDC completed unfinished replication requests. percentage. Be careful in changing this setting, because B D C replication may not be completed in an environment where communication load is heavy. WARNING Setting R E P L I C A T I O N G O V E R N O R is equal to 0 will turn off the B D C database replication.

Positioning the path to the login script

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access the path to the script for logging in, you can modify the registry as follows: 1. Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Windows 2000 is found (usually W I N n). Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the left window to locate the SYSTEM / CURRENTCONTROLSET / Services / Netlogon / Parameters sub-item. Click this subkey to select it, display its value in the right window. 4) Positioning the entry of the value S c R I P t s. Use the string editor to transform the value of S c R i P T S to the full path name of the folder containing the login script. It is suggested that the value of S c R I P S can also be changed using the Server Manger. Allow Netlogon full database synchronization at startup

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To access control N e t l o g o automatically implements a registry key synchronization with the B D C full database (F U L - D A T A B A S E) at startup, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S Y s y E m / c u R R E N T L O g O N / P A R A m e t E R s child item. Click this subkey to select it, display its value in the right window. 4) Position the entry to the value u p D A t e. Use the string editor to change the value of U P D A T E to YE S, forced to perform a complete B D C update at startup. It is suggested that the default value of u P D A T e is N o.

Solve Windows 2000 replication failure due to no safety permit

As part of a domain-based Windows 2000 network, a workstation can be logged in with a remote database, which is called N E T L O G O n. There are many registry entries to control the operation of N e T L O G O N. To modify the registry key, generate an annoying bug in NT 4 and Windows 2000 (named Repluser Key Bug, see the number of MSDN's number Q 7 5 6 4 3), you can follow the steps: 1 ) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to locate the System / CurrentControlSet / Control / SecurePipeServers / WinReg child. Click this subkey to select it, display its value in the right window. Chapter 11 Safe use of Windows 2000 Use 169 4) In the Safety (S E C U R I T Y) menu, select "License" (P E R M M I S I O N) menu item, and then agree to the read permissions of R e P L u s e r. The reason why you need to make such a modification is because the machine must be read in the Dragonfly Machine in N T 4 and Windows 2000. Establish C2 security for CD-ROM drives

There are many important registry items to affect how Windows 2000 moves during login. To access user access to the CD -ROM drive and its removable medium can only be logged in (this is the security of the Ministry of Defense C 2 security, C 2 security is the second level of IS 4 system security) The registry key, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry of the value A l O c a t e c D R O m s is positioned. Change A L O C A T E C D R O MS to 1 using a string editor. Tip If a L O c a t e c D R O m s features never enabled in the Windows 2000 computer, you need to create this value using the Edit | Add Value.

Establish C2 security for disk drive

There are many important registry items to affect how Windows 2000 moves during login. To access users who use to determine if the disk drive and its removable medium can only be logged in (this is the security of the Ministry of Defense C2 security, C 2 security is the second level of IS 4 system security) Entries, you can follow these steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry to the value A L O c a t e f L O P P i e s. The A L L O C A T E F L O P P i E E S was changed to 1 using a string editor. Tip If the A L O c a t e f L O P P i e s features Never enabled in the Windows 2000 computer, then "Edit" | Add Value "needs to create this value. Automatically log in when the system is started

There are many important registry items to affect how Windows 2000 moves during login. You can configure the registry to automatically log in with the name of the specified user at startup without displaying the login user interface. To do this, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value A U T O A D M I N L O G O N. Use the string editor to change the A L O c a t e f L o P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P P I E - log in automatically; change to 0 indicates that you need to use the user login interface to log in. Tip If the A u t o a d m i N L O g O n features Never enabled in the Windows 2000 computer, you need to create this value using "Edit" | Add Value. WARNING If the value of A u t O A D m i N L O g O n is set to 1, the entry in which value D e f A U L T u s e R n M e and D e f A U L T u s E R P A S W O R D must also be valid, since Windows 2000 will automatically register using these values ​​during startup.

If the current Windows 2000 Shell crash, you need to restart.

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key that Windows 2000 restarts when the current S H E L L crashes, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) Position the entry to the value A u T O R e S t a R T S H E L L. Use the string editor to change the A u t O R e S t a R T A R T A R T A R T a R T A R T A R T A R T A R T A R Trum-procedure is allowed to automatically restart during S H E L L; change to 0, forced manual logging and restart. Determine the domain used by the last logged in user

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key of the domain name used to determine successfully logging in to the current system, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value D e f A U L T D O M A I N a M e. D e f A U L T D O M A I N A m E contains the domain name used by the last successful login.

Set the default user password

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key used to determine the password used by the user (or automatically log in), you can modify the registry with the following steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry of the value D e f A U L T P a S W O R D is positioned. If you want to use automatic login when starting, use the string editor to change D e f A U L T P A S W O R to the password used by the user in D e f A U L T u s e R n M e. It is suggested that the value of D e ​​f A U L T P a S W W O R D can also be changed using the system policy editor. If D e ​​f A U L T P A S S W O R d features Never enabled in a Windows 2000 computer, you need to create this value using "Edit" | Add Value. Set the default username

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key used to determine the username (or user name used to log in) (or automatically log in), you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value D e f A U L T u s e r n a m e. Use the string editor to change D e f A U L T u s e r n a m e, specify the user you want to use during automatic login. Tip: The value of D e ​​f A U L T u s e R n M e can also be changed using the system policy editor.

Keep disk space to support roaming users

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key that is used to determine if it deletes it after the logging of the log is saved (in order to keep disk space), you can follow the steps: 1) Open the Start menu and select "Run" . Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value D e t e R O a m i n g c a c h e. Use the D WO R d editor to change the value of D e ​​l e t e R O A m i n g c a c H E to 1, allowing the display of the roaming user to be output; changed to 0, and the information is retained on the local hard disk. It is suggested that the default value of D E L E T E R O A m i N g C A C HE is 0. The username used when logging in is banned from the login information dialog box.

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key that is used to determine if the last successful login user name is displayed in the login user interface, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Windows 2000 is found (usually W I N n). Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entries of the value D O N T D i S P L a y L a S T u s e r n a m e are positioned. Using the string editor to change the value of D O N T D I S P L A Y L A St U S E R N A M E to 1, disabled display of a username last successful login; change to 0 to recover the characteristic. It is suggested that the default value of D O N T D I S P L a Y L A S T u s E R N A M E is 0, and the username last successful login can be displayed. The value of DONTDISPLAY LASTUSERNAME can also be changed using the System Policy Editor. If D O N T D I S P L A YL A S T U S E R N A M E features Never enabled in a Windows 2000 computer, you need to create this value using "Edit" | Add Value.

Allow users to remain RAS after logging out

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key for all RAS connections created during a user session using 173 Windows 2000, you can follow the steps: 1) Opening the "Start" menu and select " run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entries of the value K E E P R A S C O N E C T I O N s are positioned. The value of K E E P R A S C O N E C T I O N S is changed to 1 using a string editor, and the existing R A S is maintained after the user is logged out; it is changed to 0 terminate the R A S. Tip If the KeeprasConnections feature is never enabled in the Windows 2000 computer, you need to use the Edit | Add Value to create this value. If this entry is not added, the system assumes that the value is 0. Set the text of the Windows 2000 login Warning Notification dialog box

There are many important registry items to affect how Windows 2000 moves during login. To access whether to determine if the warning dialog box appears before the login dialog box (before allowing access to the login dialog, the user must turn off the custom dialog box) registry key, you can modify the registry: 1) Open "as follows: 1) Open" Start the menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) Entries to the value L E g a l n o t i c e TE X T. Use the string editor to change the value of LE G A L N O T I c e TE X T to the message to be displayed in the custom dialog. Tip If the value of LE G A L N O T I c e TEXT is empty (empty string, this is the default setting), then the custom dialog is not displayed until the login dialog user interface appears. The value of LE g A L N o T I c e TE X T can also be changed using the system policy editor.

Set Windows 2000 Login Warning Notification dialog

There are many important registry items to affect how Windows 2000 moves during login. To access the title of the custom warning dialog box that is specified before the login dialog (before allowing access to the login dialog, the user must turn off the custom dialog box) registry key, follow these steps: 1) Open " Start the menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) Entries for positioning the value L E g A L N O T I c E C A P T I O N. Use the string editor to change the value of L E G A L N O T I C E C A P T I O N to the custom dialog box to be displayed before the login dialog user interface. The suggestion is only used in the case where the value of L E G A L N o T I C e TE X T is not empty, and L E G A L N o T I c E C A P T I O N is used. Set custom messages for Windows 2000 login information dialog

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key used to determine if the additional message is displayed in a standard login dialog user interface, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry to the value L O g o N p R O M P T is positioned. Use the string editor to change the value of L O G O N P R O M P T to you want to display the value required to prompt text in the login dialog user interface. Tip If the LogonPrompt feature is never enabled in the Windows 2000 computer, you need to use the Edit | Add Value to create this value.

Set the Windows 2000 login password expired warning

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key that is used to determine whether the user logs in and the user's password has expired, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Tree control using the left window is positioned to S O F T Wa R E / M I C R o S O f T / Wi N D O W S N / C UR RE VET VE R S I O N / Chapter 11 Windows 2000 Safe for the 175 Wi N L O G O N child. Click this subkey to select it, display its value in the right window. 4) The entries of the value P a S W W O R D e x P i R y Wa R n i n g are positioned. Use the D WO R D Editor to display the value of the P a S S W O R D e x P I R Y Wa R N I N g to display the value required to display the Warning dialog when the user is logged in using an expiration password. Tip If the LogonPrompt feature is never enabled in the Windows 2000 computer, you need to use the Edit | Add Value to create this value. Enable "Shutdown / Turn Power" option in the Close Computer dialog

There are many important registry items to affect how Windows 2000 moves during login. To access the option to determine if a shutdown computer and a shutdown power appear in the "shutdown computer" dialog box, you can modify the registry as follows: 1) Open the "Start" menu and select " run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry to the value P O W E R D O W N A f T E R S H U T D O W N is positioned. Use the string editor to change the value of P O W E R D O W N A f T E RS H U T D O W N to 1, allowing to select off the power; change to 0, disable this feature. Tip In the Windows 2000 server, the value of P O W E R D O W N A f T E R S H U T D O W N is 1, and is 0 in Wi N D O W S2 0 0 0 0. Warning is not all computers support software-based shutdown power function. Enabling software-based shutdown power settings can result in inconsistency results in a machine that does not support this feature.

Prevent user profiles from selecting dialog hours

There are many important registry items to affect how Windows 2000 moves during login. To access the connection remote server has a delay, determine how much time can the user determine the registry key that uses a local configuration file or the server configuration file, you can follow the steps: 1) Open the "Start" menu and select " run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry to the value P R O f i l E d L g Ti M e O U t. Using the D WO R D Editor Turn the value of P R O F I L E D L G TI M E O U T When connecting the remote server to experience the delay, the number of seconds that can be taken when deciding to use the local configuration file or the server configuration file. Tips Only when the value S L O W L i n k D e t e c t e N A B L E D is set to 1, P R O F I L E D L g Ti M e O U T can be used. Automatically select RAS when configuring startup

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key that determines if the Logon Using Dialup Networking check box is selected when the system is started, you can modify the registry: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value R A S F O R C E. Use the string editor to change the value of R A S f O R C E to 1, enable this feature; change to 0, disable this feature. Tip If the R A S F O R C E features have never been enabled in the Windows 2000 computer, use the Edit | Add Value to create it. R a S f O r C E features can only be used when the dial network connection is installed and the workstation becomes a domain.

Enable custom startup authentication program

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key that determines if the system administrator can install the custom startup verification (Custom Boot Verification), you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) Locate the entry of value R e P O R Tr T B O O T O K. Use a string editor to change the value of R e P O R Ti T O K to 0, allowing a custom boot authentication program to be used. Tip: The real custom startup verification program is installed by B O o T Ve R I f I c a T I O N P R O G R A M or B O O T VE R I f I C A T I O N items. Use the login script synchronization program manager

There are many important registry items to affect how Windows 2000 moves during login. To access the determination program manager Wait until the registry key of the login script, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value R u N L O g O N S C R I P T S Y N C. Using the D WO R D Editor to change the value of R u N L O N S C R I P S Y N C to 1, require the program manager to perform all the login scripts in execution; change to 0, allow the program manager to be executed simultaneously with the login script. It is suggested that the default value of R u N L O G O N S C R I P T S Y N c is 0, which will prohibit synchronization.

Configuring custom Windows 2000 Shell

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key of the name and path specified as the program executed by Windows 2000 Default S H E L1, you can refer to the following steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) Position the entry of the value S H E L L. Use the string editor to change the value of S H E L1 to customized S h E L L you want to use. Tip If the Wi N L O G O N cannot use U S E R i N i t to start the project in S H E L1, Wi N L O G O N will perform them directly. Allow shutdown in the login information dialog

There are many important registry items to affect how Windows 2000 moves during login. To access to determine if the user can use the login information dialog to use the login information dialog in the case where the login information dialog is used to use the registry key entry, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) Entries for positioning the value S H U T D O W N Wi T H O U T L O G O N. Use the string editor to change the value of S H U T D O Wi T H O U T L O G O N to 1, enable the "Close Computer" button in the login dialog; change to 0, disable the button. Tip For Windows 2000 servers, the default value of S H U T L O W N Wi T H O U T L O G O N is zero; for Windows 2000 workstations, its default is 1. This value can also be modified by the System Policy Editor.

Enable slow link detection

There are many important registry items to affect how Windows 2000 moves during login. You can use the registry to determine if the system wants to see a remote computer that connects to the user configuration file takes longer. The purpose of this is to provide users with the selection of local configuration files or remote configuration files. To do this, you can follow these steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry of positioning the value S L O W L i n k D e t e c t e n a b l e d. Use the D WO R D editor to turn the value of S L O W L I n k D e TE E N A B L E D to 1, allowing to detect a slow configuration file link; change to zero, the characteristic is prohibited. It is suggested that the value of S L O W L i Nk Ti M O U T and P R O F I l E D L g Ti M O U T is set to set S L O W L I n k D e t e c t e n a b L e d. You can also change the value of S L O W L i n k D e t e c t e n a b L e t e c t e n.

Active registry items that prevent slow link timeout can affect how Windows 2000 is active when logging in. You can use the registry to determine how long it takes to communicate between remote servers that contain roaming user profiles before trying to provide a local configuration file. For example, if the link to the remote machine containing the roaming user profile is disconnected, the user will never log in unless this option is provided. To prevent this slow link timeout, you can modify the registry with the following steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry of the value S L O W L i n k Ti M e O U t is positioned. Use the D WO R D Editor to turn the value of S L O W L i N k Ti M E O U t to a higher setting to prevent the configuration file link timeout. It is suggested that the value of S L O W L i N k Ti M e O U T is between 0 and 1 2 0 0 0 0 0 milliseconds, and the default value is 2,0 0 (2 seconds). This value requires the setting of S L O W L i N k D e T E C T E N A B L E D and P R O F I l E D L g Ti M e O U T. You can also change S L O W L i n k Ti M e O U t using the System Policy Editor. Run the executable when the system is started

There are many important registry items to affect how Windows 2000 moves during login. To access determine which executable registry items run during the system initialization, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value s y s t e m. Add the executor you want to run during initialization using a string editor.

Configuring Custom Windows 2000 Task Manager

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key that determines whether to use the Custom Task Manager program, you can modify the registry with the following steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Wi N D O W S2 0 0 0 (usually W I N N T) is found. Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 180 Using Windows 2000 Registry Management 4) The entry is located to the value TA S K M A N. Use the string editor to change the value of TA S k m a n to the name of the Custom Task Manager (if needed, the path should also be included). Tip If there is no content in value TA S K m a n or TA S K M A N does not exist (default), the Windows 2000 Task Manager will be used. If Ta S k m a n features have never been enabled in a Windows 2000 computer, you need to use "Edit" | Add Value "to create it.

Run the executable when you log in

There are many important registry items to affect how Windows 2000 moves during login. To access to determine if the registry key of the executable can be run after the user successfully logs in (in the user context), you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Windows 2000 is found (usually W I N n). Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value u s e r i n i t. Add the executor you want to run after the user logged in with a string editor. It is suggested that the default value of U s e R I N I t contains U S E R I N I T (Run S H E L) and an optional N D DE A G N T. E X E (Run N e T D D e).

Set the additional title of custom login information dialog

There are many important registry items to affect how Windows 2000 moves during login. To access the registry key that determines the title of the title in all login dialogs (except for standard headings), you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Windows 2000 is found (usually W I N n). Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Wi N L O g O N. Click this subkey to select it, display its value in the right window. 4) The entry is positioned to the value of We l C O M e. Add the text of the additional title to display using a string editor. Tip: If WE L C O M E features have never been enabled in a Windows 2000 computer, you need to use "Edit" | Add Value to create it. Configure the display of the logout dialog

When the user is ready to log out from Windows 2000, there are several registry entries to determine the options displayed in the Logout dialog. To access the registry key that specifies which options displayed in the Logout dialog box, you can follow the steps: 1) Open the Start menu and select "Run". Click the "Browse" button to start navigation until the root directory of Windows 2000 is found (usually W I N n). Go to the S Y S t e m directory and find R E G E D T 3 2. E X E, select it to the dialog and click the "OK" button. The Registry Editor is launched, and all configuration units are displayed in different laminate windows, respectively. 2) Select "Window" menu item H k e y _ L O c a l _ m a c h i n e, its sub-window display. Maximize this window for use. 3) Use the tree control of the left window to position to S O f T Wa R E / M I C R o S O f T / Wi N D O W S VE R S I O N / Child. Click this subkey to select it, display its value in the right window. 4) If the S h u t D O W n child does not exist, use "Edit" | Add Value "to add it. 5) The entry to the value L O G O FF S e t t I n g is positioned. Use the D WO R d editor to change the value of L O G O FF S e t t I n g to the value displayed in Table 11 - 1. Table 11-1 Sets the behavior of the Direction Value Dialoller of the Logout Dialog Direction 0 Logout Dialog 1 Shutdown dialog 2 shut down and restart 3 shutdown and turn off the power (if supported)

Configure the display of the shutdown dialog

转载请注明原文地址:https://www.9cbs.com/read-3336.html

New Post(0)