accessibility, 115–125. See also tablet PCs
Filter Keys, 120
High Contrast, 120
Magnifier, 116–118
Narrator, 119
On-Screen Keyboard, 118
Quick Access, 116
recommendation wizard, 116
speech recognition software, 120–125
Sticky Keys, 119
activating Windows Vista, 7
Active Directory Administrative Templates, 239
Active Directory Group Policy Objects (GPOs) classes, 239
activity reports, 146–148
computer usage details, 146
general system details, 147
instant messaging details, 146–147
turning on for standard users, 147
viewing, 147–148
Add-Ons restrictions (Internet Explorer 7), 51–52
Address bar (Internet Explorer 7), 49–50
integrated search feature, 50
Address bar (Windows Explorer)
base locations
Computer, 38
Control Panel, 38
Current user, 38
Desktop, 38
Network, 39
Public, 39
Recycle Bin, 39
navigating, 36–39
ADM files vs. ADMX files, 239
Admin Approval mode
disabling, 137
modifying, 137–139
administrative tasks, performing at the command line, 152
Administrative Templates, 239
Administrative Tools menu displaying, 238
administrator accounts, 11
vs. standard user accounts, 131–132
administrator privileges, reducing need with User Account Control, 130
All Programs menu
All Programs, Accessories, Ease Of Access folder, 28
All Programs, Accessories folder, 28
All Programs, Accessories, System Tools folder, 28
All Programs, Games folder, 28
All Programs, Maintenance folder, 28
All Programs, Startup folder, 28
Contacts program, 27
Media Center program, 27
Program Defaults program, 27
Windows Calendar program, 27
Windows Collaboration program, 27
Windows Defender program, 28
Windows Fax and Scan program, 28
Windows Mail program, 28
Windows Media Player program, 28
Windows Movie Maker program, 28
Windows Photo Gallery, 28
allowed software programs, viewing or changing, 232–233
anonymous access to named pipes and shares, restricting, 167
Application Logs, 254
Application Manifests (UAC), 135
Application Restrictions, configuring for parental controls, 145–146
applications
changing elevation prompt, 138
disabling credential prompting for installation, 138
running with elevated credentials, 136
Audit Policy
accessing, 158–159
comparing default configuration table, Windows Vista vs. Windows XP, 159
overview, 158–159
authentication, 802.1X, 201
authentication rules
Authentication Rule, 224
configuring properties, 225
Custom, 224
disabling, 225
enabling, 225
Isolation, 224
Server To Server, 224
Tunnel, 224
AutoComplete (tablet PCs), 107
Automatic Black Hole Router Detection, 188
Automatic Dead Gateway Retry, 188
Automatic Updating security feature, 207
AutoPlay options, 84–85