Thư viện tri thức trực tuyến
Kho tài liệu với 50,000+ tài liệu học thuật
© 2023 Siêu thị PDF - Kho tài liệu học thuật hàng đầu Việt Nam

Tài liệu Microsoft Windows XP Registry Guide docx
Nội dung xem thử
Mô tả chi tiết
Microsoft Windows XP Registry Guide
Table of Contents
Microsoft Windows XP Registry Guide..........................................................................................1
Introduction........................................................................................................................................4
This Book Is Different—Really.................................................................................................4
Power Users First; Then IT Professionals...............................................................................5
Some Terminology...................................................................................................................6
Gotta Love Windows XP..........................................................................................................7
Final Note.................................................................................................................................7
Part I: Registry Overview..................................................................................................................9
Chapter List..............................................................................................................................9
Part Overview.....................................................................................................................9
Chapter 1: Learning the Basics......................................................................................................10
Overview................................................................................................................................10
Heart and Soul of Windows XP..............................................................................................10
For Power Users..............................................................................................................11
For IT Professionals.........................................................................................................12
Registry Warnings and Myths................................................................................................14
Must−Know Concepts............................................................................................................14
Security Identifiers............................................................................................................14
Globally Unique Identifiers...............................................................................................17
Hexadecimal Notation......................................................................................................17
Bits and Bit Masks............................................................................................................18
Little−Endian and Big−Endian..........................................................................................19
ANSI and Unicode Encoding............................................................................................20
Null and Empty Strings.....................................................................................................20
Structure of the Registry........................................................................................................20
Keys.................................................................................................................................22
Values..............................................................................................................................23
Types...............................................................................................................................24
Organization of the Registry..................................................................................................26
HKEY_USERS.................................................................................................................27
HKEY_CURRENT_USER................................................................................................28
HKEY_LOCAL_MACHINE...............................................................................................29
HKEY_CLASSES_ROOT................................................................................................29
HKEY_CURRENT_CONFIG............................................................................................30
Registry Management Tools..................................................................................................30
Registry Hive Files.................................................................................................................31
Hives in HKLM.................................................................................................................31
Hives in HKU....................................................................................................................32
Chapter 2: Using the Registry Editor.............................................................................................33
Overview................................................................................................................................33
Running Regedit....................................................................................................................33
Exploring Regedit...................................................................................................................34
Key Pane.........................................................................................................................35
Value Pane......................................................................................................................36
Searching for Data.................................................................................................................37
Searching Incrementally...................................................................................................38
i
Table of Contents
Chapter 2: Using the Registry Editor
Searching in Binary Values..............................................................................................38
Bookmarking Favorite Keys.............................................................................................39
Using Better Techniques..................................................................................................40
Editing the Registry................................................................................................................41
Changing Values..............................................................................................................41
Adding Keys or Values.....................................................................................................44
Deleting Keys or Values...................................................................................................45
Renaming Keys or Values................................................................................................45
Printing the Registry...............................................................................................................46
Exporting Settings to Files.....................................................................................................47
Registration Files.............................................................................................................48
Win9x/NT4 Registration Files...........................................................................................49
Hive Files.........................................................................................................................50
Text Files..........................................................................................................................51
Working with Hive Files..........................................................................................................51
Getting Beyond Basics...........................................................................................................52
Chapter 3: Backing up the Registry...............................................................................................53
Overview................................................................................................................................53
Editing the Registry Safely.....................................................................................................53
Copying Single Values.....................................................................................................54
Backing Up to REG Files.................................................................................................55
Backing Up to Hive Files..................................................................................................55
Fixing Corrupt Settings..........................................................................................................57
Allowing Windows XP to Fix Errors..................................................................................58
Repairing an Application's Settings..................................................................................59
Removing Programs from the Registry............................................................................61
Using Another Computer's Settings.................................................................................62
Using System Restore...........................................................................................................62
Taking Configuration Snapshots......................................................................................63
Peeking Under the Covers...............................................................................................64
Managing System Restore...............................................................................................66
Hacking System Restore..................................................................................................66
Scripting System Restore.................................................................................................67
Backing Up the Registry Regularly........................................................................................68
Planning a Backup Strategy.............................................................................................69
Backing Up System State Data........................................................................................70
Restoring System State Data...........................................................................................71
Backing Up User Settings......................................................................................................72
Recovering from Disasters.....................................................................................................73
Advanced Options Menu..................................................................................................73
Recovery Console............................................................................................................74
Automated System Recovery...........................................................................................76
Chapter 4: Hacking the Registry....................................................................................................78
Overview................................................................................................................................78
Redirecting Special Folders...................................................................................................78
Customizing Shell Folders.....................................................................................................80
Renaming Desktop Icons.................................................................................................82
ii
Table of Contents
Chapter 4: Hacking the Registry
Using Custom Icon Images..............................................................................................83
Adding Desktop Icons......................................................................................................83
Hiding Desktop Icons.......................................................................................................85
Customizing File Associations...............................................................................................85
Running Programs from My Computer............................................................................86
Open Command Prompts at Folders...............................................................................88
Rooting Windows Explorer at a Folder.............................................................................89
Adding InfoTips to Program Classes................................................................................90
Adding File Templates...........................................................................................................92
Preventing Messenger from Running....................................................................................93
Personalizing the Start Menu.................................................................................................93
Configuring the Menu's Contents.....................................................................................94
Trimming the Frequently Used Programs List..................................................................96
Restoring the Sort Order..................................................................................................97
Customizing Internet Explorer................................................................................................98
Extending the Shortcut Menus.........................................................................................98
Changing the Toolbar Background..................................................................................99
Customizing Search URLs...............................................................................................99
Clearing History Lists...........................................................................................................102
Running Programs at Startup..............................................................................................102
Controlling Registry Editor...................................................................................................103
Default Action for REG Files..........................................................................................103
Storing Window Position and Size.................................................................................103
Logging On Automatically....................................................................................................104
Changing User Information..................................................................................................104
Looking for More Hacks.......................................................................................................105
Chapter 5: Mapping Tweak UI.......................................................................................................106
Overview..............................................................................................................................106
General................................................................................................................................106
Focus.............................................................................................................................108
Mouse..................................................................................................................................109
Hover..............................................................................................................................110
Wheel.............................................................................................................................110
X−Mouse........................................................................................................................110
Explorer................................................................................................................................111
Shortcut..........................................................................................................................112
Colors.............................................................................................................................113
Thumbnails.....................................................................................................................113
Command Keys..............................................................................................................114
Common Dialog Boxes........................................................................................................115
Taskbar................................................................................................................................116
Grouping........................................................................................................................116
XP Start Menu................................................................................................................117
Desktop................................................................................................................................118
First Icon........................................................................................................................119
My Computer.......................................................................................................................119
Drives.............................................................................................................................119
Special Folders..............................................................................................................120
iii
Table of Contents
Chapter 5: Mapping Tweak UI
AutoPlay.........................................................................................................................121
Control Panel.......................................................................................................................122
Templates............................................................................................................................122
Internet Explorer..................................................................................................................123
Search............................................................................................................................123
View Source...................................................................................................................124
Command Prompt................................................................................................................125
Logon...................................................................................................................................125
Autologon.......................................................................................................................125
Part II: Registry in Management...................................................................................................127
Chapter List..........................................................................................................................127
Part Overview.................................................................................................................127
Chapter 6: Using Registry−Based Policy....................................................................................128
Overview..............................................................................................................................128
Editing Local Policies...........................................................................................................128
Group Policy Extensions................................................................................................130
Registry−Based Policy...................................................................................................131
Group Policy Storage.....................................................................................................134
Extending Registry−Based Policy........................................................................................135
Comments......................................................................................................................137
Strings............................................................................................................................137
CLASS...........................................................................................................................138
CATEGORY...................................................................................................................139
KEYNAME......................................................................................................................140
POLICY..........................................................................................................................140
EXPLAIN........................................................................................................................142
VALUENAME.................................................................................................................142
VALUEON and VALUEOFF...........................................................................................142
ACTIONLIST..................................................................................................................142
PART..............................................................................................................................143
CHECKBOX...................................................................................................................145
COMBOBOX..................................................................................................................147
DROPDOWNLIST..........................................................................................................148
EDITTEXT......................................................................................................................150
LISTBOX........................................................................................................................151
NUMERIC......................................................................................................................152
TEXT..............................................................................................................................154
Deploying Registry−Based Policy........................................................................................155
Windows 2000 Server−Based Networks........................................................................155
Windows NT−Based and Other Networks.....................................................................156
Customizing Windows XP....................................................................................................157
Using the Group Policy Tools..............................................................................................159
Gpresult..........................................................................................................................159
Gpupdate.......................................................................................................................160
Help and Support Center...............................................................................................161
Resultant Set of Policy...................................................................................................162
Finding More Resources......................................................................................................163
iv
Table of Contents
Chapter 7: Managing Registry Security.......................................................................................164
Overview..............................................................................................................................164
Setting Keys' Permissions....................................................................................................164
Adding Users to ACLs....................................................................................................166
Removing Users from ACLs...........................................................................................166
Assigning Special Permissions......................................................................................167
Mapping Default Permissions..............................................................................................168
Taking Ownership of Keys...................................................................................................172
Auditing Registry Access.....................................................................................................173
Preventing Local Registry Access.......................................................................................174
Restricting Remote Registry Access....................................................................................175
Deploying Security Templates.............................................................................................175
Creating a Security Management Console....................................................................176
Choosing a Predefined Security Template.....................................................................177
Building a Custom Security Template............................................................................178
Analyzing a Computer's Configuration...........................................................................179
Modifying a Computer's Configuration...........................................................................180
Deploying Security Templates on the Network..............................................................181
Chapter 8: Finding Registry Settings..........................................................................................182
Comparing REG Files..........................................................................................................182
Using WinDiff.................................................................................................................184
Using Word 2002...........................................................................................................185
Comparing with Reg.exe......................................................................................................186
Auditing the Registry............................................................................................................187
Setting Audit Policy........................................................................................................188
Auditing Registry Keys...................................................................................................188
Analyzing the Results.....................................................................................................189
Monitoring the Registry........................................................................................................189
Using Winternals Regmon.............................................................................................189
Filtering for Better Results..............................................................................................191
Part III: Registry in Deployment...................................................................................................192
Chapter List..........................................................................................................................192
Part Overview.................................................................................................................192
Chapter 9: Scripting Registry Changes.......................................................................................193
Overview..............................................................................................................................193
Choosing a Technique.........................................................................................................193
Installing INF Files...............................................................................................................194
Starting with a Template................................................................................................195
Linking Sections Together..............................................................................................197
Adding Keys and Values................................................................................................198
Deleting Keys and Values..............................................................................................200
Setting and Clearing Bits................................................................................................200
Using Strings in INF Files...............................................................................................202
Setting Values with REG Files.............................................................................................203
Exporting Settings to REG Files.....................................................................................204
Creating REG Files Manually.........................................................................................205
Encoding Special Characters.........................................................................................206
v
Table of Contents
Chapter 9: Scripting Registry Changes
Deleting Keys Using a REG File....................................................................................207
Editing from the Command Prompt......................................................................................207
Adding Keys and Values................................................................................................208
Querying Values.............................................................................................................209
Deleting Keys and Values..............................................................................................209
Comparing Keys and Values..........................................................................................210
Copying Keys and Values..............................................................................................211
Exporting Keys to REG Files..........................................................................................211
Importing REG Files.......................................................................................................212
Saving Keys to Hive Files..............................................................................................212
Restoring Hive Files to Keys..........................................................................................212
Loading Hive Files..........................................................................................................212
Unloading Hive Files......................................................................................................213
Scripting Using Windows Script Host...................................................................................213
Creating Script Files.......................................................................................................214
Running Script Files.......................................................................................................215
Formatting Key and Value Names.................................................................................217
Adding and Updating Values..........................................................................................218
Removing Keys and Values...........................................................................................218
Querying Registry Values..............................................................................................219
Creating Windows Installer Packages.................................................................................219
Chapter 10: Deploying User Profiles...........................................................................................221
Overview..............................................................................................................................221
Exploring User Profiles........................................................................................................221
Profile Hives...................................................................................................................224
Profile Folders................................................................................................................224
Special Profiles..............................................................................................................227
Getting User Profiles............................................................................................................228
Local Profiles..................................................................................................................228
Roaming Profiles............................................................................................................229
Using Roaming User Profiles...............................................................................................230
Managing Roaming User Profiles..................................................................................232
Understanding Fast Network Logon...............................................................................233
Understanding the New Merge......................................................................................234
Deploying Default User Profiles...........................................................................................235
Customizing User Settings.............................................................................................236
Cleaning User Profiles...................................................................................................237
Creating Default User Folders........................................................................................239
Deploying Default User Folders.....................................................................................240
Coexisting with Earlier Versions of Windows.......................................................................240
Migrating User Settings to Windows XP..............................................................................241
Files And Settings Transfer Wizard................................................................................241
User State Migration Tool..............................................................................................242
Chapter 11: Mapping Windows Installer......................................................................................243
Overview..............................................................................................................................243
Repairing Registry Settings.................................................................................................243
Managing Windows Installer with Policies...........................................................................244
vi
Table of Contents
Chapter 11: Mapping Windows Installer
Installing with Elevated Privileges..................................................................................246
Caching Transforms in Secure Location........................................................................247
Locking Down Windows Installer...................................................................................247
Removing Windows Installer Data.......................................................................................248
Msizap.exe.....................................................................................................................248
Msicuu.exe.....................................................................................................................249
Inventorying Applications.....................................................................................................250
Chapter 12: Deploying with Answer Files...................................................................................253
Overview..............................................................................................................................253
Creating Distribution Folders...............................................................................................253
Customizing Answer Files....................................................................................................255
Setup Manager...............................................................................................................258
Notepad and Other Text Editors....................................................................................260
Adding Settings to Unattend.txt...........................................................................................262
[GuiRunOnce]................................................................................................................262
Cmdlines.txt...................................................................................................................263
Logging On Automatically After Installation.........................................................................264
Chapter 13: Cloning Disks with Sysprep.....................................................................................266
Overview..............................................................................................................................266
Cloning Windows XP...........................................................................................................266
Windows XP Tools.........................................................................................................268
Sysprep Limitations........................................................................................................268
Building a Disk Image..........................................................................................................269
Customizing Mini−Setup................................................................................................270
Preparing for Duplication................................................................................................272
Cloning the Disk Image..................................................................................................272
Reducing Image Count........................................................................................................275
Filling SysprepMassStorage Manually...........................................................................275
Filling SysprepMassStorage Automatically....................................................................276
Cleaning Up After Sysprep.............................................................................................276
Mapping Sysprep Settings...................................................................................................277
Keeping Perspective............................................................................................................278
Chapter 14: Microsoft Office XP User Settings...........................................................................280
Overview..............................................................................................................................280
Profile Wizard.......................................................................................................................280
Customizing the Wizard.................................................................................................281
Capturing Settings..........................................................................................................288
Deploying Settings.........................................................................................................289
Custom Installation Wizard..................................................................................................290
Add/Remove Registry Entries........................................................................................291
Customize Default Application Settings.........................................................................292
Change Office User Settings..........................................................................................293
Add Installations and Run Programs..............................................................................294
Custom Maintenance Wizard...............................................................................................295
Group and System Policy....................................................................................................295
vii
Table of Contents
Chapter 15: Working Around IT Problems..................................................................................298
Controlling Just−in−Time Setup...........................................................................................298
Outlook Express.............................................................................................................299
Windows Media Player...................................................................................................300
Desktop Themes............................................................................................................300
Other Shortcuts..............................................................................................................301
Removing Components.......................................................................................................302
Answer File [Components] Section................................................................................302
Extending Windows Components Wizard......................................................................304
Removing Components After Installation.......................................................................305
Hiding Non−Removable Components............................................................................306
Removing Policy Tattoos.....................................................................................................307
Elevating Processes' Privileges...........................................................................................309
Group Policy...................................................................................................................309
Secondary Logon...........................................................................................................310
Scheduled Tasks............................................................................................................310
AutoLogon......................................................................................................................311
Severing File Associations...................................................................................................313
Deploying Office XP Trusted Sources.................................................................................314
Enabling Remote Desktop Remotely...................................................................................314
Customizing the Windows XP Logon...................................................................................315
Part IV: Appendices.......................................................................................................................316
Appendix List.......................................................................................................................316
Part Overview.................................................................................................................316
Appendix A: File Associations.....................................................................................................317
Overview..............................................................................................................................317
Merge Algorithm...................................................................................................................317
File Extension Keys.............................................................................................................317
OpenWithList..................................................................................................................318
PerceivedType...............................................................................................................319
ShellNew........................................................................................................................319
Program Class Keys............................................................................................................319
DefaultIcon.....................................................................................................................321
EditFlags........................................................................................................................321
Shell...............................................................................................................................322
Specialized Keys..................................................................................................................323
Applications....................................................................................................................324
SystemFileAssociations.................................................................................................324
Unknown........................................................................................................................324
COM Class Keys..................................................................................................................324
Appendix B: Per−User Settings...................................................................................................327
Overview..............................................................................................................................327
AppEvents............................................................................................................................327
Console................................................................................................................................328
Control Panel.......................................................................................................................329
Desktop..........................................................................................................................330
Desktop\Window Metrics................................................................................................333
viii
Table of Contents
Appendix B: Per−User Settings
Mouse............................................................................................................................335
Environment.........................................................................................................................336
Keyboard Layout..................................................................................................................336
Network................................................................................................................................337
Printers.................................................................................................................................337
SessionInformation..............................................................................................................337
Software...............................................................................................................................337
Classes..........................................................................................................................338
Microsoft\Command Processor......................................................................................338
Microsoft\Internet Connection Wizard............................................................................339
Microsoft\Internet Explorer.............................................................................................339
Microsoft\Internet Explorer\MenuExt..............................................................................340
Microsoft\Internet Explorer\SearchURL.........................................................................341
Microsoft\MessengerService..........................................................................................342
Microsoft\Office..............................................................................................................343
Microsoft\Search Assistant.............................................................................................344
Microsoft\VBA\Trusted...................................................................................................344
Policies...........................................................................................................................345
Software\Microsoft\Windows\CurrentVersion.....................................................................346
Explorer\Advanced.........................................................................................................346
Explorer\AutoComplete..................................................................................................350
Explorer\ComDlg32........................................................................................................350
Explorer\HideDesktopIcons............................................................................................350
Explorer\HideMyComputerIcons....................................................................................350
Explorer\MenuOrder.......................................................................................................350
Explorer\RecentDocs.....................................................................................................351
Explorer\RunMRU..........................................................................................................351
Explorer\User Shell Folders...........................................................................................351
Appendix C: Per−Computer Settings..........................................................................................353
Overview..............................................................................................................................353
HARDWARE........................................................................................................................353
DESCRIPTION...............................................................................................................354
DEVICEMAP..................................................................................................................354
SAM.....................................................................................................................................355
SECURITY...........................................................................................................................355
SOFTWARE.........................................................................................................................356
Classes..........................................................................................................................356
Clients............................................................................................................................356
Microsoft\Active Setup...................................................................................................357
Microsoft\Command Processor......................................................................................358
Microsoft\Driver Signing.................................................................................................359
Microsoft\InternetExplorer..............................................................................................360
Microsoft\Sysprep..........................................................................................................360
Microsoft\Windows NT\CurrentVersion..........................................................................360
Policies...........................................................................................................................361
SOFTWARE\Microsoft\Windows\CurrentVersion...............................................................361
App Paths......................................................................................................................362
Applets...........................................................................................................................362
ix
Table of Contents
Appendix C: Per−Computer Settings
Explorer..........................................................................................................................362
Explorer\AutoplayHandlers............................................................................................363
Explorer\Desktop\NameSpace.......................................................................................363
Explorer\FindExtensions................................................................................................363
Explorer\HideDesktopIcons............................................................................................364
Explorer\HideMyComputerIcons....................................................................................364
Explorer\MyComputer....................................................................................................364
Explorer\NetworkNeighborhood\NameSpace................................................................364
Explorer\RemoteComputer\NameSpace........................................................................365
Explorer\StartMenu........................................................................................................365
Explorer\User Shell Folders...........................................................................................365
Explorer\VisualEffects....................................................................................................365
Policies...........................................................................................................................366
Run................................................................................................................................366
RunOnce........................................................................................................................366
Uninstall.........................................................................................................................366
SYSTEM..............................................................................................................................366
CurrentControlSet\Control..............................................................................................367
CurrentControlSet\Enum................................................................................................368
CurrentControlSet\Hardware Profiles.............................................................................368
CurrentControlSet\Services...........................................................................................368
Appendix D: Group Policies.........................................................................................................370
Conf.adm.............................................................................................................................370
Inetcorp.adm........................................................................................................................372
Inetres.adm..........................................................................................................................372
Inetset.adm..........................................................................................................................381
System.adm.........................................................................................................................382
Wmplayer.adm.....................................................................................................................417
List of Figures................................................................................................................................418
List of Tables..................................................................................................................................423
List of Listings...............................................................................................................................426
List of Sidebars..............................................................................................................................428
x
Microsoft Windows XP Registry Guide
Jerry Honeycutt
Microsoft Press
A Division of Microsoft Corporation One Microsoft Way Redmond , Washington 98052−6399
Copyright © 2003 by Jerry Honeycutt
All rights reserved. No part of the contents of this book may be reproduced or transmitted in any
form or by any means without the written permission of the publisher.
Library of Congress Cataloging−in−Publication Data
Honeycutt, Jerry.
Microsoft Windows XP Registry Guide / Jerry Honeycutt.
p. cm.
Includes index.
ISBN 0735617880
1. Microsoft Windows (Computer file) 2. Operating systems (Computers) I. Title.
QA76.76.O63 H6636 2002
005.4'4769−−dc21 2002075317
Printed and bound in the United States of America.
1 2 3 4 5 6 7 8 9 QWT 7 6 5 4 3 2
Distributed in Canada by H.B. Fenn and Company Ltd.
A CIP catalogue record for this book is available from the British Library.
Microsoft Press books are available through booksellers and distributors worldwide. For further
information about international editions, contact your local Microsoft Corporation office or contact
Microsoft Press International directly at fax (425) 936−7329. Visit our Web site at
www.microsoft.com/mspress. Send comments to <[email protected].>
Active Desktop, Active Directory, ActiveX, DirectSound, DirectX, FrontPage, Hotmail, IntelliMirror,
JScript, Links, Microsoft, Microsoft Press, MSDN, MS−DOS, MSN, NetMeeting, NetShow, Outlook,
PhotoDraw, PowerPoint, VGA, Visual Basic, Visual InterDev, Windows, Windows Media, Windows
NT, and Win32 are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries. Other product and company names mentioned herein may be
the trademarks of their respective owners.
1
The example companies, organizations, products, domain names, e−mail addresses, logos, people,
places, and events depicted herein are fictitious. No association with any real company,
organization, product, domain name, e−mail address, logo, person, place, or event is intended or
should be inferred.
For Microsoft Press:
Acquisitions Editor: Alex Blanton
Project Editors: Jenny Moss Benson and Kristen Weatherby
For Online Training Solutions, Inc.:
Project Managers: Joyce Cox, Nancy Depper, and Joan Preppernau
Technical Editor: Keith Bednarczuk
Copy Editor: Nancy Depper
Compositors: RJ Cadranell and Liz Clark
Proofreader: Lisa Van Every
Body Part No. X08−81847
For Carlo and Kay
Acknowledgments
Never let authors tell you that they wrote their books all by themselves. Creating a book out of an
author's gibberish takes a lot of work from a lot of people with a lot of different skills. Some crack the
whip and others are artisans. They all deserve credit.
First I'd like to thank my acquisitions editor, Alex Blanton. Alex holds up well under pressure,
pushing me to get things done without breaking my will to do things right. The result is the right mix
of quality and timeliness. The folks who I had the most contact with were Jenny Benson and Kristen
Weatherby, though. They were this book's project editors with the responsibility of managing the
overall process. Kristen worked on the early stages of this book, getting the whole project moving
forward, and Jenny had the unenviable job of getting it finished. I bow to both of them and chant,
"I'm not worthy."
A number of other people have my admiration as well. Nancy Depper was this book's copy editor,
correcting my brutal use of the language. Lisa Van Every proofed the book's contents, and Keith
Bednarczuk was the book's technical editor. I think this book's layout looks great, and the credit
goes to RJ Cadranell and Liz Clark. Finally, Joyce Cox and Joan Preppernau provide their project
management skills. Thank you one and all.
Jerry Honeycutt empowers people to work and play better by helping them use popular
technologies, including the Microsoft Windows product family, IP−based networking, and the
Internet. He reaches out through his frequent writings and talks but prefers to get his hands dirty by
helping companies deploy and manage their desktop computers.
2
As a best−selling author, Jerry has written over 25 books. His most recent include Windows 2000
Professional (New Riders, 2000), Microsoft Windows 2000 Registry Handbook (Macmillan, 2000),
and Introducing Microsoft Windows 2000 Professional (Microsoft Press, 1999). He has written six
other books about the registry. Most of his books are sold internationally and are available in a
variety of languages.
Jerry is also a columnist for Microsoft Expert Zone, a Web site for Windows XP enthusiasts, and
makes frequent contributions to a variety of content areas on Microsoft's Web site: Office XP,
TechNet, and so on. He also contributes to various trade publications including Smart Business and
CNET. Jerry is also a frequent speaker at assorted public events, including COMDEX, Developer
Days, Microsoft Exchange Conference, and Microsoft Global Briefing, and occasionally hosts chats
on Microsoft's TechNet Web site.
In addition to writing and speaking, Jerry has a long history of using his skills for more practical
purposes: providing technical leadership to business. He specializes in desktop deployment and
management, particularly using the Windows product family. Companies like Capital One,
Travelers, IBM, Nielsen North America, IRM, Howard Systems International, and NCR have all
leveraged his expertise. He continues writing, training, and consulting to serve the business
community.
Jerry graduated from University of Texas at Dallas in 1992 with a Bachelor of Science in Computer
Science. He also studied at Texas Tech University in Lubbock, TX. In his spare time, Jerry plays
golf, dabbles with photography, and travels. He is an avid collector of rare books and casino chips.
Jerry lives in the Dallas suburb of Frisco, TX.
See Jerry's Web site at www.honeycutt.com or send mail to <[email protected]>.
3
Introduction
The registry is the heart and soul of Microsoft Windows XP. In my other registry books, I said the
same thing about the registry in every version of Windows since Microsoft Windows 95, and by the
time you're finished reading this book, I hope you'll agree. The registry contains the configuration
data that makes the operating system work. The registry enables developers to organize
configuration data in ways that are impossible with other mechanisms, such as INI files. It's behind
just about every feature in Windows XP that you think is cool. More importantly, it enables you to
customize Windows XP in ways you can't through the user interface.
Windows XP and every application that runs on Microsoft's latest desktop operating system do
absolutely nothing without consulting the registry first. When you double−click a file, Windows XP
consults the registry to figure out what to do with it. When you install a device, Windows XP assigns
resources to the device based on information in the registry and then stores the device's
configuration in the registry. When you run an application such as Microsoft Word 2002, the
application looks up your preferences in the registry. If you were to monitor the registry during a
normal session, you'd see the registry serves up thousands of values within minutes.
In this book, you will learn how to customize the registry, but you must also learn how to take care
of the registry. You must learn how to back up the registry so you can restore it if things go awry.
You must also learn the best practices for editing the registry safely.
The registry isn't just a hacker's dream, though. The registry is an invaluable tool for the IT
professional deploying, managing, and supporting Windows XP. Did you know that most policies in
Group Policy and system policies are really settings in the registry? Does that give you any ideas?
Did you know that scripting registry edits is one of the best ways to deploy settings to users? This
book teaches you about policies, scripting, and much more. For example, you will learn how to
deploy registry settings during Windows XP and Microsoft Office XP installations. Some deployment
problems can be solved only by using the registry, so I describe the most common IT workarounds,
too. For example, I'll show you how to prevent Windows XP from creating the Microsoft Outlook
Express icon on the desktop when a user logs on to the computer for the first time.
This Book Is Different—Really
This book contains information that you're not going to find in any other book about the Windows XP
registry. You'll learn how to track down where Windows XP and other programs store settings in the
registry. You'll learn how to write scripts to edit the registry. You'll discover registry hacks that are
both unique and useful. And you'll read about my personal experiences with the registry and what I
consider my best practices. For example, in Chapter 2, "Using the Registry Editor," you'll learn how I
quickly document my changes to the registry—right in the registry itself.
That's all stuff for power users, but more than half of this book is for IT professionals. Whether
you're a desktop engineer, deployment engineer, or a support technician, you'll learn techniques
that will make your job easier. A lot of the book focuses on how the registry affects Windows XP and
Office XP deployment. You'll learn about creating and deploying effective default user profiles. You'll
learn how to deploy settings with Windows XP and Office XP. You'll even learn how to build your
own Windows Installer package files expressly for managing settings in the registry. The best part is
that just about every tool I suggest in this book is either free or very inexpensive.
4