packaging PowerPoint presentations, 7–34
packets, 8–16, 8–36
Page Border Art, 7–5
page faults, invalid, 5–43 to 5–44
pages, home, 5–10
panes, Outlook, 4–40 to 4–41
parallel ports, 12–4, 12–8
parent permissions, 9–12
partially displayed messages, 3–11
partitions, disk, 11–8 to 11–9
Password Must Meet Complexity Requirements option, 9–26
passwords
account policies, 9–25, 9–31
changing, next logon, 9–28
domains, 8–22
encryption, 9–27
Internet Explorer, 5–35
modems, 8–12
Office installations, 6–33
resetting, 9–28
past meeting reminders, Outlook, 7–46
patches, antivirus, 10–22
pathping command, 8–36, 8–38
PDAs (personal digital assistants), 12–10
peer–to–peer networks, 1–8
performance
e–mail
AutoArchive, 4–32
Deleted Items folder, 4–31
Mailbox Cleanup, 4–32 to 4–34
Fast User Switching, 11–4
maintenance tasks, 2–28 to 2–30
Microsoft Baseline Security Analyzer, 10–27 to 10–30
Office updates, 10–6
program compatibility modes, 6–6 to 6–9, 11–16 to 11–17
Windows XP updates, 10–2 to 10–8
peripheral devices. See devices
permanent file opening defaults, 3–34 to 3–35
permanently removing notification area items, 3–7
Permission Denied error, 6–19
permissions
combining, 9–21
granting, 11–14
group memberships, 9–21 to 9–23
Group Policy, 9–35 to 9–40
labs, 9–41, 9–48
large networks, 9–14
local settings, 9–24 to 9–34
multiboot computers, 11–13 to 11–15
overview, 9–3
program installations, 6–10, 11–14
permitting service traffic, 10–15 to 10–17
persistent cookies, 5–24
personal digital assistants (PDAs), 12–10
personal information
removing, 6–34
websites, sending to, 5–5
personal knowledge bases, 2–18
personal storage files, e–mail, 4–14
personalized help files, 2–10
personalizing applications, 15–5
personalizing bulleted or numbered lists, 7–8 to 7–9
personalizing Internet Explorer
accessibility, 5–2 to 5–4
Content Advisor, 5–12 to 5–13
Explorer bar options, 5–9
history, viewing, 5–7
home pages, 5–10
interface requests, 5–6 to 5–13
languages, 5–5 to 5–6
overview, 5–2
Profile Assistant, 5–5
related sites, 5–8 to 5–9
titles, 5–10 to 5–12
toolbar button icons, 5–4
toolbars, 5–10 to 5–12, 5–33
Web page readability, 5–2 to 5–4
personalizing Internet favorites, 5–34
personalizing Internet security settings, 5–41
personalizing Office installations
menus, 6–26 to 6–28
Options dialog boxes, 6–29 to 6–34
overview, 6–23
sample service calls, 6–27 to 6–28
toolbars, 6–23 to 6–29
personalizing operating systems, 15–21
personalizing Outlook Express, 15–16
personalizing programs for files, 3–34 to 3–35
personalizing Start menus
adding items, 3–14 to 3–16
All Programs list, 3–13
overview, 3–13
removing items, 3–14 to 3–16
personally identifiable information, cookies, 5–24
phone call centers, 1–16 to 1–17
phone lines
e–mail account settings, 4–7
problems, 8–3, 8–10 to 8–12
physical connectivity
check list, 8–3
checking connections, 8–3, 8–6
Device Manager, 8–4 to 8–6
hardware, 8–4 to 8–8
modems, 8–7
overview, 8–3
physical layouts vs. logical layouts, 1–10
Picture Editor option, 6–32
pictures, Web pages, 5–42
ping command
gateway addresses, 8–33
ICMP, 10–13
loopback addresses, 8–32
other addresses, 8–33
overview, 8–31
pinning Start menu items, 3–15
piracy prevention, 6–14
platforms. See operating systems
Pocket PCs, 12–10
POP3 (Post Office Protocol 3)
accounts, creating, 4–4
Exchange Server, 4–9
Outlook Express, 4–15
overview, 4–3
settings, 4–8
portable devices. See devices
ports
FireWire, 12–4
IrDA, 12–5
mail servers, 4–8
overview, 12–2
parallel, 12–4, 12–8
serial, 12–3, 12–8
troubleshooting, 12–6 to 12–7, 12–12
USB, 12–4
positions
Internet Explorer toolbars, 5–32 to 5–33
Office menu commands, 6–28
Office toolbars, 6–25
Outlook panes, 4–40
taskbars, 3–8, 3–10 to 3–11
Word toolbars, 7–4
Power Users group, 9–15
PowerPoint
lost files, 7–35
overview, 7–34
sharing presentations, 7–34 to 7–35
PowerPoint Viewer, 7–34
predefined firewall service traffic, 10–17
preferences, user
customizing, 15–1
Explorer bar options, 5–9
home pages, 5–10
Internet Explorer button icons, 5–4
network connectivity, 16–1
personal information, sending, 5–5
program status, 3–6
related sites, 5–8 to 5–9
security, 17–1
toolbars, 5–10 to 5–12
usability, 14–1
Web page languages, 5–5 to 5–6
Web page readability, 5–2 to 5–4
website content restrictions, 5–12 to 5–13
presentations, PowerPoint, 7–34 to 7–37
previewing e–mail messages, 4–40
previews, document, 6–39
primary partitions, 11–9
printers. See also name resolution
Office options, 6–32
ports, 12–4 to 12–5
wireless access points, 12–5
private folders, 9–5, 9–17
problem isolation
questions to ask, 2–2 to 2–6
reproducing, 2–4
solutions
implementing, 2–16 to 2–18
overview, 2–7
researching, 2–9 to 2–16
troubleshooting procedures, 2–7 to 2–8
user education, 2–24 to 2–32
problem reproduction, 2–4
problem solving skills, DSTs, 1–6
processors, Office requirements, 6–5
product activations, Office, 6–14, 6–19
product announcements
Knowledge Base, 2–12
TechNet, 2–14
product ID requirements, Office, 6–5, 6–19
product support call resolutions
overview, 2–1
questions to ask, 2–2 to 2–6
reproducing problems, 2–4
solutions
implementing, 2–16 to 2–18
overview, 2–7
researching, 2–9 to 2–16
troubleshooting procedures, 2–7 to 2–8
user education, 2–24 to 2–32
product support roles
corporate environments
domains, 1–9 to 1–11
entry–level jobs, 1–12
network types, 1–8 to 1–11
overview, 1–8
tier structure, 1–11
workgroups, 1–8
desktop support technicians
expert users, leveraging, 1–4
overview, 1–3
skills, 1–5
user experience levels, 1–3
user past experiences, 1–5
noncorporate environments, 1–16 to 1–19
overview, 1–1 to 1–2
Profile Assistant, 5–5
program compatibility, e–mail attachments, 7–39
program compatibility modes
changing, 6–7
multiple boot computers, 11–16 to 11–17
overview, 6–6
testing programs, 6–8 to 6–9
when not to use, 6–6
Program Compatibility Wizard, 6–8 to 6–9
programs. See also Office installations
adding, 3–13
All Programs list, 3–13
closing, 3–6 to 3–7
configuring, 13–5
customizing, 15–5
default, opening files, 3–34 to 3–35
Disk Cleanup, 2–28
file types listed, 3–33 to 3–34
files, opening, 3–28
frequently used programs area, 3–14
locating installations, 11–16
multiboot computers, 11–15 to 11–17
multiuser computers, 11–5
program compatibility modes, 6–6 to 6–9, 11–16 to 11–17
removing, 3–14
restarting, 7–14
security, 17–1, 17–10
unknown files, 3–36 to 3–37
proofing tools
AutoCorrect, 6–41
AutoFormat, 6–42
AutoSummarize, 6–39 to 6–40
AutoText, 6–43
common problems, 6–44
dictionaries, 6–43
grammar, 6–41 to 6–45
languages, 6–37 to 6–39
overview, 6–37
spelling, 6–41 to 6–45
templates, 6–40 to 6–41
protected system files
folder options, 3–29 to 3–30
missing, determining if, 3–45
protecting system. See computer security; security
protocols. See also connectivity
e–mails, 4–3 to 4–4, 4–8 to 4–9, 4–15, 4–19
Internet Control Message Protocol, 10–13 to 10–15, 10–19
TCP/IP, 8–34
Provide Feedback With Animation and Provide Feedback With Sound option, 6–32
proxy settings, 5–44
.pst files, 4–14