Looking for:
Windows server 2012 standard rdp limit freeWindows 8 and Windows Server Privacy Statement - Windows Help.Windows Server 2003
Here you can also learn about the latest tools we provide to access and control your data and how to contact us if you have a privacy inquiry.
Uses of information. These highlights of the full Windows 8. They focus on online features and aren't intended to be an exhaustive description.
They don't apply to other online or offline Microsoft sites, products, or services. Statement , which is the full Windows 8. Features supplement , which describes the features that have privacy impact in Windows 8. Apps supplement , which describes the apps that have privacy impact in Windows 8. Server supplement , which describes the additional features that have privacy impact in Windows Server R2. For more information on how to help protect your PC, your personal information, and your family online, visit our Safety and Security Center.
Certain Windows features may ask you for permission to collect or use information from your PC, including personal information.
Windows uses this information as outlined in the full Windows 8. Windows requires activation to reduce software piracy and help ensure that our customers receive the software quality they expect. Activation sends some information about your PC to Microsoft. If you choose to sign in to Windows with a Microsoft account, Windows will sync your settings across devices and automatically sign you in to some apps and websites.
Windows does not require you to sign in with a Microsoft account to access third-party email or social network services, but if that third party offers an app through the Store, you must sign in to the Store with a Microsoft account to install the app.
Additional details. Windows offers you a variety of ways to control how Windows features transfer information over the Internet.
More information about how to control these features is in the Features Supplement , Apps Supplement and the Server Supplement. To help improve your experience, some features that use the Internet are turned on by default.
We use the information collected to enable the features you're using or provide the services you request. We also use it to improve our products and services.
In order to help provide our services, we occasionally provide information to other companies that work on our behalf. Only companies who have a business need to use the information are provided access to them. These companies are required to keep this information confidential and are prohibited from using it for any other purpose. For more information about our privacy practices, go to the full Windows 8. Or, you can write to us using our web form. Collection and use of your information. Collection and use of information about your computer.
Security of your information. Changes to this privacy statement. For more information. Internet Explorer Microsoft Error Reporting Service. Microsoft Online. Windows Media Center. Windows Media Player. Windows 7. Windows Server Essentials. This statement covers Windows 8. Certain Windows components have their own privacy statements, which are also listed on this page. Privacy statements for software and services related to Windows and for prior releases are also listed there.
For information about specific features, please refer to the Features supplement , the Apps supplement , and the Server supplement. This is a statement that focuses on features that communicate with the Internet and isn't intended to be an exhaustive list. The personal information we collect from you will be used by Microsoft and its controlled subsidiaries and affiliates to enable the features you use and provide the services or carry out the transactions you have requested or authorized.
The information may also be used to analyze and improve Microsoft products and services. Except as described in this statement, personal information you provide won't be transferred to third parties without your consent. We occasionally hire other companies to provide limited services on our behalf, such as for performing statistical analysis of our services.
We will only provide those companies the personal information they need to deliver the service, and they are prohibited from using that information for any other purpose. Microsoft may access or disclose information about you, including the content of your communications, in order to: a comply with the law or respond to lawful requests or legal process; b protect the rights or property of Microsoft or our customers, including the enforcement of our agreements or policies governing your use of the software; or c act on a good faith belief that such access or disclosure is necessary to protect the personal safety of Microsoft employees, customers, or the public.
Information collected by or sent to Microsoft by Windows 8. Microsoft abides by the safe harbor framework as set forth by the U. Department of Commerce regarding the collection, use, and retention of data from the European Union, the European Economic Area, and Switzerland. When you use software with Internet enabled features, information about your computer "standard computer information" is sent to the websites you visit and online services you use.
Standard computer information typically includes information such as your IP address, operating system version, browser version, and regional and language settings. In some cases, it may also include a hardware ID, which indicates the device manufacturer, device name, and version. If a particular feature or service sends information to Microsoft, standard computer information will be sent as well. The privacy details for each Windows feature in the Features Supplement, the Apps Supplement, and the Server Supplement, and the features listed elsewhere on this page, describe what additional information is collected and how it is used.
Administrators can use Group Policy to modify many of the settings for the features described here. For more information, see this white paper for administrators.
Microsoft is committed to helping protect the security of your information. We use a variety of security technologies and procedures to help protect your information from unauthorized access, use, or disclosure. For example, we store the information you provide on computer systems with limited access, which are located in controlled facilities. When we transmit highly confidential information such as a credit card number or password over the Internet, we protect it through the use of encryption, such as the Secure Socket Layer SSL protocol.
We will occasionally update this privacy statement to reflect changes in our products, services, and customer feedback. When we post changes, we will revise the "last updated" date at the top of this statement. If there are material changes to this statement or in how Microsoft will use your personal information, we will notify you either by posting a notice of such changes prior to implementing the change or by directly sending you a notification.
We encourage you to periodically review this statement to be informed of how Microsoft is protecting your information. Microsoft welcomes your comments regarding this privacy statement. If you have questions about this statement, or believe that we haven't adhered to it, you can write to us using our web form. BitLocker Drive Encryption. Device discovery and setup.
Ease of Access Center. Handwriting personalization—automatic learning. Internet connection sharing. Language preferences. Manage your credentials. Name and account picture. Notifications, lock screen apps, and tile updates. Prefetching and Prelaunching.
Program Compatibility Assistant. Remote Access connections. RemoteApp and Desktop Connections. Remote Desktop connection. Sign in with a Microsoft account. OneDrive cloud storage. Update Root Certificates. Virtual Private Networking. Windows Defender. Windows Error Reporting. Windows File Association. Windows Help. Remote Assistance. Windows Search. Windows Setup. Windows Share. Windows SmartScreen. Windows Speech Recognition. Windows Store.
Windows 8.1 and Windows Server 2012 R2 privacy statement.Windows server 2012 standard rdp limit free
If you already use that email address as a Microsoft account, you can use it and the password for the Microsoft account to sign in to Windows. When you are signed in to Windows with your Microsoft account or with a domain account connected to your Microsoft account:. Certain Windows settings will sync between the PCs that you sign in to with a Microsoft account. For more information about what settings are synced and how to control them, see the Sync your settings section.
Microsoft apps that use a Microsoft account for authentication like Mail, Calendar, Photos, People, Messaging, OneDrive, Microsoft Office, and other apps can automatically begin downloading your info for example, the Mail app will automatically download the messages sent to your Outlook. Web browsers can automatically sign you in to websites that you sign in to with your Microsoft account for example, if you visit OneDrive.
Windows will ask your permission before allowing third-party apps to use profile information or other personal information associated with your Microsoft account.
Because domain administrators are able to access any information on your PC, they will also be able to access any settings and info you have chosen to sync with other PCs through your Microsoft account.
This can include settings such as name, account picture, and browser history. When you create a new Microsoft account in Windows, we use the information you provide to create and help secure the account. To learn more about the privacy impact of having a Microsoft account, read the privacy statement displayed when you choose Sign up for a new email address.
When you sign in to Windows with a Microsoft account, some settings are synced automatically. To learn how to change which Windows settings are synced or to stop syncing, see the Sync your settings section.
To learn more about the data collected by Microsoft apps that use a Microsoft account for authentication, read their privacy statements. You can switch to a local account or Microsoft account at any time in Users in PC settings.
If you sign in to Windows with a domain account, you can connect or disconnect your Microsoft account at any time in Users in PC settings. When you sign in to Windows with a Microsoft account, Windows syncs some of your settings and info with Microsoft servers to make it easier to have personalized experiences across multiple PCs.
Settings you choose to sync will automatically update on Microsoft servers and your other PCs as you use them. If you choose to sign in to Windows with a Microsoft account, Windows syncs certain settings with Microsoft servers.
These settings include:. Personalization settings such as your account picture, lock screen image, background, and mouse settings. To help protect your privacy, all synced settings are sent encrypted via SSL. If you sign in to Windows with a domain account connected to a Microsoft account, settings and info you have chosen will sync to your domain account. Passwords that you save while signed into Windows with a domain account connected to a Microsoft account will never be synced.
Because domain administrators are able to access any information on your PC, they will also be able to access any settings and info, including your browsing history, that you have chosen to sync with other PCs through your Microsoft account.
Windows 8 uses these settings and info to provide the syncing service. Microsoft doesn't use your synced settings and info to identify, contact, or target advertising to you. When you sign in to Windows with a Microsoft account, Sync your settings will be turned on.
You can choose to sync your settings, and control what is synced, by going to Sync your settings in PC settings. If you sign in to Windows with a domain account and you choose to connect that account to a Microsoft account, Windows will ask which settings you want to sync before connecting your Microsoft account.
Teredo Technology Teredo allows PCs and networks to communicate over multiple networking protocols. If you use an app that requires Teredo to use IPv6 connectivity, or if you configure your firewall to always enable IPv6 connectivity, then Teredo will periodically contact the Microsoft Teredo service over the Internet.
The only information sent to Microsoft is standard PC information and the name of the service requested for example, teredo. Once the service is located, information is sent to maintain a connection with the IPv6 service. Using the netsh command line tool, you can change the query that the service sends over the Internet to use non-Microsoft servers instead, or you can turn it off. Limited authorization values are created to perform typical administrative actions and standard user actions and are managed by Windows.
The file also contains the PC name, operating system version, creation user, and creation date information to assist you in recognizing the file.
The private portion of the Endorsement Key is never exposed outside of the TPM, and once it has been created, it usually can't be reset.
Windows does provide an interface for third-party apps like antimalware software to use the Endorsement Key for certain TPM scenarios, such as Measured Boot with Attestation. For antimalware software the endorsement key and the endorsement key certificate are useful to confirm boot measurements are provided by a TPM from a specific manufacturer. By default, only administrators or apps with administrative rights can use the TPM endorsement key.
You can choose to clear the TPM and reset it to factory defaults. Clearing the TPM removes owner information, and with the exception of the endorsement key, all TPM-based keys or cryptographic information that apps might have created when the TPM was in use. Certificates are used primarily to verify the identity of a person or device, authenticate a service, or encrypt files.
Trusted root certification authorities are the organizations that issue certificates. Update Root Certificates contacts the online Windows Update service to see if Microsoft has added a certification authority to its list of trusted authorities, but only when an app is presented with a certificate issued by a certification authority that isn't directly trusted a certificate that isn't stored in a list of trusted certificates on your PC.
If the certification authority has been added to the Microsoft list of trusted authorities, its certificate will automatically be added to the list of trusted certificates on your PC. Update Root Certificates sends a request to the online Windows Update service that asks for the current list of root certification authorities in the Microsoft Root Certificate Program.
If the untrusted certificate is on the list, Update Root Certificates obtains that certificate from Windows Update and places it in the trusted certificate store on your PC. The information transferred includes the names and cryptographic hashes of root certificates.
The information is used by Microsoft to update the list of trusted certificates on your PC. Update Root Certificates is enabled by default. Windows Update is a service that provides you with software updates for Windows software and other supporting software, such as drivers supplied by device manufacturers. Microsoft Update is a service that provides you with software updates for Windows software, as well as other Microsoft software such as Microsoft Office.
If the software runs, it will remove the malware listed on the Microsoft Support website. During a Malware check, a report will be sent to Microsoft with specific information about malware detected, errors, and other information about your PC. To learn what other information Update Services collects, see the Update Services privacy statement.
This MSRT information is used to help improve our antimalware and other security products and services. No information in the MSRT reports will be used to identify or contact you.
To learn how Update Services uses other information, see the Update Services privacy statement. If you choose express settings while setting up Windows, you turn on the Update Services and set Windows Update to install updates automatically.
For more information, see the Update Services privacy statement. It can also collect information about performance and reliability problems that might occur. If you choose to participate in Windows CEIP, Windows will send this data to Microsoft, and will also periodically download a file to collect more relevant information about how you use Windows and apps. CEIP reports are sent to Microsoft to help improve the features our customers use most often, and to create solutions to common problems.
Configuration information. Performance and reliability information, including information such as how quickly an app responds when you click a button, how many problems you experience with an app or a device, and how quickly information is sent or received over a network connection.
App use information, including information about the features you use most often, such as how frequently you open apps, how often you use Windows Help and Support, which services you use to sign in to apps, and how many folders you typically create on your desktop. Since most users decide to participate in CEIP within several days of setting up Windows, Microsoft uses this information to analyze and improve the Windows setup experience.
This information is sent to Microsoft when you're connected to the Internet. Microsoft filters the information contained in CEIP reports to try to remove any individual identifiers that they might contain.
The pre-installed Microsoft apps licensed with Windows may create their own unique identifiers for use with CEIP, which could be based on information from your Microsoft account. CEIP will also periodically download a file to collect more relevant information about the way you useWindows and apps. This file helps Windows collect additional information to help Microsoft create solutions for common problems and better understand usage patterns of Windows and apps. Microsoft uses CEIP information to improve our products and services, as well as third-party software and hardware designed for use with these products and services.
We use the GUID to distinguish how widespread the feedback we receive is and how to prioritize it. For example, the GUID allows Microsoft to distinguish between one customer experiencing a problem one hundred times and one hundred customers experiencing the same problem once. If you choose to customize settings, you can control CEIP by selecting Participate in the Customer Experience Improvement Program to help improve Microsoft software and services under Send Microsoft info to help make Windows and apps better.
For more information, see the CEIP frequently asked questions online. Windows Defender looks for malware and other potentially unwanted software on your PC. Through MAPS, users can send information about malware and other potentially unwanted software to Microsoft in a report.
MAPS can help protect your PC by automatically downloading new signatures for newly-detected malware. MAPS reports include information about potential malware files, such as file names, cryptographic hash, software publisher, size, and date stamps.
These URLs might occasionally contain personal information such as search terms or data entered in forms. Reports might also include the actions you took when Windows Defender notified you that the potentially unwanted software was detected.
MAPS includes this information to help Microsoft gauge how effectively Windows Defender can detect and remove malware and potentially unwanted software, and to attempt to identify new malware.
Windows Defender detects changes to your PC by software that hasn't been analyzed for risks yet. Windows Defender takes action on malware upon detection as part of its automatic remediation.
Windows Defender completes a scheduled scan and automatically takes action on software that it detects based on your settings. You can join MAPS with a basic or an advanced membership. Basic membership reports contain the information described in this section. Advanced membership reports are more comprehensive and might occasionally contain personal information from, for example, file paths and partial memory dumps.
These reports, along with reports from other Windows Defender users who are participating in MAPS, help our researchers discover new threats more rapidly. Malware definitions are then created, and then these updated definitions are made available to all users through Windows Update. Microsoft might request a sample submission report. This report contains specific files from your PC that Microsoft suspects might be potentially unwanted software.
The sample report is used for further analysis. You'll be asked each time if you want to send this sample submission report to Microsoft. If Windows Update has not been able to obtain updated signatures for Windows Defender for a period of time, Windows Defender will attempt to use MAPS to download signatures from an alternate download location. The reports might also be used for statistical, testing, or analytical purposes, and for generating definitions.
The History feature provides a list of all apps on your PC that Windows Defender detects and the actions that were taken when the apps were detected. You can also view apps that Windows Defender prevents from running until you choose to remove them or allow them to run again these are called quarantined items. The list of software that Windows Defender detects, the actions that you and other users take, and the actions that Windows Defender takes automatically are stored on your PC.
All users can view the history in Windows Defender to see malware and other potentially unwanted software that has attempted to install itself or run on the PC, or that has been allowed to run by another user. For example, if you learn about a new malware threat, you can check the History to see if Windows Defender has prevented it from infecting your PC. Windows Error Reporting helps Microsoft and Microsoft partners diagnose problems in the software you use and provide solutions.
To help prevent problems and make software more reliable, some solutions are also included in service packs and future versions of the software. Many software products are designed to work with Windows Error Reporting. If a problem occurs in one of these products, you might be asked if you want to report it. Windows Error Reporting collects information that is useful for diagnosing and solving a problem that has occurred, such as where the problem happened in the software or hardware, the type or severity of the problem, files that help describe the problem, basic software and hardware information, or possible software performance and compatibility problems.
If you use Windows to host virtual machines, error reports sent to Microsoft might include information about virtual machines. Windows Error Reporting also collects information about apps, drivers, and devices to help Microsoft understand and improve app and device compatibility. Information about the company that published an app or driver might be collected. If you choose to enable automatic reporting while setting up Windows, the reporting service will automatically send basic information about where problems occur.
Some error reports might unintentionally contain personal information. For example, a report that contains a snapshot of PC memory might include your name, part of a document you were working on, or data that you recently submitted to a website. Reports including files and data might be stored on your PC until after they have been sent or deleted.
After you send a report, the reporting service might ask you for more information about the problem that occurred. If you choose to provide your phone number or email address in this information, your error report will be personally identifiable.
Microsoft might contact you to request additional information to help solve the problem you reported. Windows Error Reporting randomly generates a number called a globally unique identifier GUID that is sent to Microsoft with every error report. Microsoft uses information about errors and problems reported by Windows users to improve Microsoft products and services, as well as third-party software and hardware designed for use with these products and services.
We use the GUID to determine how widespread the feedback we receive is and how to prioritize it. However, if you choose to provide contact information as described above, we may use this information to contact you. If you choose express settings while setting up Windows, Windows Error Reporting will automatically send basic reports to check for solutions to problems online.
If you choose to customize settings, you can control Windows Error Reporting by selecting Use Windows Error Reporting to check for solutions to problems under Check online for solutions to problems.
For more information, see the Microsoft Error Reporting Service privacy statement. Windows File Association helps users associate file types with specific apps.
Apps that are typically associated with the file name extension are displayed. If you choose to use Windows File Association, the file name extension for example, docx or pdf and your PC display language are sent to Microsoft. When a file association is made with a particular app, a unique identifier for the app is sent to identify the default app for each file type.
When you submit a file name extension, the service returns a list of the apps that Microsoft is aware of that can open files of that extension. Unless you choose to download and install an app, no file type associations will change. When you try to open a file type without an associated app, you can choose whether to use Windows File Association.
No file association information is sent to Microsoft unless you decide to use the service. Windows Online Help and Support, when turned on, allows you to get the most up-to-date help and support content available when you're connected to the Internet.
When you use Windows Online Help and Support, your help search queries are sent to Microsoft, as well as your requests for help content when a link is clicked.
Windows Online Help and Support also uses standard web technologies like cookies. Microsoft uses the information to return help topics in response to your search queries, to return the most relevant results, to develop new content, and to improve existing content.
We use cookies and other web technologies to make it easier to navigate help content and to help us better understand how users use Windows Online Help. Online Help and Support is turned on by default. To change this setting, tap or click the Settings icon at the top of the Help and Support window, and then select or clear Get online Help.
To clear the cookies used by Windows Help, open Internet Options in Control Panel, click or tap the Delete button under Browsing history , select Cookies and website data , and click or tap Delete. The Help Experience Improvement Program helps Microsoft identify trends in the way our customers use Windows Online Help and Support so that we can improve our search results and the relevancy of our content. HEIP sends Microsoft information about the version of Windows that your PC is running and about how you use Windows Help and Support, including queries you enter when you search Windows Help and Support and any ratings or feedback on the Help topics presented to you.
When you search, browse, or provide any ratings or feedback on the Help topics presented to you, this information will be sent to Microsoft. The GUID lets us determine which data is sent from a particular machine over time. The data collected is used to identify trends and usage patterns so that Microsoft can improve the quality of content we provide and the relevance of our search results.
We use the GUID to determine how widespread the issues we receive are and how to prioritize them. For example, the GUID allows Microsoft to distinguish between one customer experiencing an issue one hundred times and one hundred customers experiencing the same issue once.
The Help Experience Improvement Program does not intentionally collect any information that could be used to personally identify you. If you choose express settings while setting up Windows, you join the Help Experience Improvement Program.
If you choose to customize settings, you can control Help Experience Improvement Program settings by selecting Help improve Windows Help content by sending info to the Help Experience Improvement Program under Send Microsoft info to help make Windows and apps better. After setting up Windows, you can change this setting in Windows Help and Support.
You can use Remote Assistance to invite someone to connect to your PC and help you with a PC problem, even if that person isn't nearby. After connecting, the other person can view your PC.
With your permission, the other person can use his or her mouse and keyboard to control your PC and show you how to fix a problem. Remote Assistance creates an encrypted connection between the two PCs over the Internet or the local network. When someone uses Remote Assistance to connect to your PC, that person can see your desktop and any open documents, including any visible private information.
In addition, if you allow the other person to control your PC with his or her mouse and keyboard, that person can do things like delete files or change settings. After a connection is made, Remote Assistance will exchange contact information including user name, PC name, and account picture. A session log file maintains a record of all Remote Assistance connections. The information is used to establish an encrypted connection and to provide the other person access to your desktop.
Before you allow someone to connect to your PC, close any open apps or documents that you don't want the other person to see. If at any time you feel uncomfortable about what that person is seeing or doing on your PC, press the Esc key to end the session. You can disable session logging and contact information exchange by clearing these options in Remote Assistance settings. Windows Search provides you with a quick and consistent entry point to search for apps, settings, files, or content within apps.
When you use Windows Search, the characters you type in the search field as you type them and the final search query you submit are only supplied to Windows and any app you're searching in, so Windows or the app can provide search suggestions and show search results.
Windows stores search queries and data about how often you search in the apps. Windows uses the stored previous searches to provide search suggestions in the Search pane. The information stored about how often you search in apps is used to sort the list of searchable apps in the Search pane in order of frequency. If you search within a third-party app, use of the information collected will be subject to the third party's privacy practices. If you search within a Microsoft app, the app's privacy practices will be explained in its privacy statement.
Windows stores this information by default. You can disable the storage of this information or delete all of your stored previous searches in Search in PC settings. Windows Share lets you share content between Windows Store apps that support sharing. It also lets you share content with your friends. When sharing, the source app passes content to the target app only after you select the target in the Share pane. So that you can access them more easily, target apps and people that you frequently share content with will appear in a list in the Share pane.
The information stored about how often you share with target apps and people that you frequently share content with is used to sort the list in the Share pane in order of frequency.
If you share information with a third-party app, use of the information collected will be subject to the third party's privacy policy. If you share with a Microsoft app, the app's privacy practices will be explained in its privacy statement. By default, Windows stores information about your use of Windows Share. You can disable the storage of this information or delete all of the stored targets in Share in PC settings.
Windows SmartScreen helps keep your PC safe by checking files and apps with Microsoft before you open or run them to help protect you from potentially unsafe files and apps.
Windows will ask you what you want to do if a file or app is unknown or potentially unsafe before it is opened. If you choose to use this feature, information about some of the apps you use and some of the files you download from the Internet will be sent to Microsoft. To help protect your privacy, the information sent to Microsoft is encrypted via SSL.
Microsoft uses the information described above to provide warnings to you about potentially unsafe files and apps. We also use the information to analyze performance of the feature and to improve the quality of our products and services.
If you choose express settings while setting up Windows, you turn on Windows SmartScreen. Windows Speech Recognition provides speech recognition within Windows and for any apps that choose to use it. Windows Speech Recognition increases its accuracy by learning how you use language, including the sounds and words you like to use. Windows Speech Recognition stores a list of words and their pronunciations on your PC.
Words and pronunciations are added to this list using the Speech Dictionary, and by using Windows Speech Recognition to dictate and correct words. When the Windows Speech Recognition document review feature is enabled, text from Microsoft Office Word documents with doc or docx file name extensions and email from email folders other than Deleted Items or Junk Mail on your PC and on any connected file shares included in your Windows search index locations is collected and stored in one-, two-, or three-word fragments.
One-word fragments include only words you have added to custom dictionaries, and two- or three-word fragments include only words found in standard dictionaries. All collected information is stored in your personal speech profile on your PC. However, administrators can access any profile on your PC. You can review the data before it is sent. If you choose to send this information, acoustic adaptation data that was used to adapt to your audio characteristics is also sent.
If you complete a speech training session, Windows Speech Recognition will ask you whether you wish to send your speech profile information to Microsoft. This information might include recordings of your voice while you completed the training session and the other information from your personal speech profile.
Windows Speech Recognition uses words from the speech profile to convert your speech to text. Microsoft uses personal speech profile information to improve our products and services. You can choose whether to run Windows Speech Recognition. If you run Windows Speech Recognition, the document review feature is on by default. You can choose to change your document review settings the first time you run Windows Speech recognition. You can change your document review settings or delete personal speech profiles and most document review information by going to Speech Recognition in Control Panel and clicking Advanced speech options.
You can control the locations that document review will collect word fragments from by modifying the locations included in your Windows search index.
For music files, it might show the artist, album title, and the length of the song. The same information is also shown horizontally on the status bar.
The "Folders" button on the Windows Explorer toolbar toggles between the traditional navigation pane containing the tree view of folders, and the task pane. Users can also close the navigation pane by clicking the Close button in its right corner as well as turn off the task pane from Folder Options. The navigation pane has been enhanced in Windows XP to support "simple folder view" which when turned on hides the dotted lines that connect folders and subfolders and makes folders browsable with single click while still keeping double clicking on in the right pane.
Single clicking in simple folder view auto expands the folder and clicking another folder automatically expands that folder and collapses the previous one. Windows XP introduced a large number of metadata properties [7] which are shown as columns in the "Details" view of Explorer, in the new Tiles view in Explorer, on the Summary tab in a file's properties, in a file's tooltip and on the Explorer status bar when a single file is selected.
Users also gain the ability to sort by any property which is turned on in "Details" view. Developers can write column handler shell extensions to further define their own properties by which files can be sorted.
The column by which items are sorted is highlighted. Sorting files and folders can be in Ascending order or Descending order in all views, not just Details view. To reverse the order, the user simply can perform the sort by the same property again. The sort order has also been made more intuitive compared to the one in Windows For file names containing numbers Windows Explorer now tries to sort based on numerical value rather than just comparing each number digit by digit for every character position in the file name.
The right pane of Windows Explorer has a "Show in Groups" feature which allows Explorer to separate its contents by headings based on any field which is used to sort the items. Items can thus be grouped by any detail which is turned on. Microsoft introduced animated "Search Companions" in an attempt to make searching more engaging and friendly; the default character is a puppy named Rover, with three other characters Merlin the magician, Earl the surfer, and Courtney also available.
These search companions powered by Microsoft Agent technology, bear a great deal of similarity to Microsoft Office 's Office Assistants , even incorporating "tricks" and sound effects. If the user wishes, they can also turn off the animated character entirely.
The search capability itself is fairly similar to Windows Me and Windows , with some important additions. Search can also be instructed to search only files that are categorically "Documents" or "Pictures, music and video" searching by perceived type ; this feature is noteworthy largely because of how Windows determines what types of files can be classified under these categories.
Using Tweak UI , the search user interface can be restored to the one used by Windows Windows XP improves image preview by offering a Filmstrip view which shows images in a single horizontal row and a large preview of the currently selected image above it.
Filmstrip view like any other view can be turned on per folder. This view will be available if the new "Common Tasks" folder view is selected, not with "Windows Classic" folder view. Aside from the Filmstrip view mode, there is a 'Thumbnails' view, which displays thumbnail -sized images in the folder and also displays images a subfolder may be containing 4 by default overlaid on a large folder icon.
A folder's thumbnail view can be customized from the Customize tab accessible from its Properties, where users can also change the folder's icon and specify a template type pictures, music, videos, documents for that folder and optionally all its subfolders. The size and quality of thumbnails in "Thumbnails" view can be adjusted using Tweak UI or the registry.
Windows XP optionally caches the thumbnails in a " Thumbs. Thumbnails can be forced to regenerate by right-clicking the image in Thumbnail or Filmstrip views and selecting "Refresh thumbnail". AutoPlay examines newly discovered removable media and devices and, based on content such as pictures, music or video files, launches an appropriate application to play or display the content.
AutoPlay can be enhanced by AutoPlay-compatible software and hardware. It can be configured by the user to associate favourite applications with AutoPlay events and actions. These actions are called AutoPlay Handlers and there are sets of Handlers associated with various types of content. New AutoPlay handlers can get added to the system when additional software is installed.
AutoPlay settings can be configured per-device in Windows XP from the device's properties. When a user inserts an optical disc into a drive or attaches a USB camera, Windows detects the arrival and starts a process of examining the device or searching the medium.
It is looking for properties of the device or content on the medium so that AutoPlay can present a set of meaningful options to the user. When the user makes a particular choice, they also have the option to make that selection automatic the next time Windows sees that content or device.
It supersedes part of the functions of Imaging for Windows in previous versions of Windows. The Windows Picture and Fax Viewer is integrated with Windows Explorer for functions like slideshow, email, printing etc.
It supports full file management from within the viewer itself, that is, right clicking the image shows the same context menu as the one shown when an image is right clicked in Windows Explorer. Images can be set as the desktop wallpaper from the context menu. It supports successive viewing of all images in current folder and looping through images, [17] that is, after viewing the last image in a directory, it again shows the first image and vice versa.
By default, images smaller than the user's display resolution are shown at their actual size. If an image is larger than the display resolution, it is scaled to fit the screen Best Fit.
When this is done, scroll bars allow for viewing of all areas of the image. The wizard shows a preview of what the printed page will look like with the currently specified options.
Using Tweak UI , the time between images during a slideshow can be adjusted. GIF files are shown with full animation, even when zoomed.
Areas of the image can be selected and concealed. Windows Picture and Fax Viewer saves and remembers its window position and size and supports keyboard shortcuts for all of its operations. Raw image formats , which are the preferred formats in professional photography are not supported, however, Microsoft released a later update called RAW Image Thumbnailer and Viewer for Windows XP for viewing certain raw image files.
The Text Services Framework is designed to offer advanced language and word processing features to applications. It supports features such as multilingual support, keyboard drivers, handwriting recognition , speech recognition , as well as spell checking and other text and natural language processing functions.
It is also downloadable for older Windows operating systems. The language bar enables text services to add UI elements to the toolbar and enables these elements when an application has focus. From the Language Bar, users can select the input language, and control keyboard input, handwriting recognition and speech recognition.
The language bar also provides a direct means to switch between installed languages, even when a non-TSF-enabled application has focus. Although an upgrade of the Windows kernel, there are major scalability, stability and performance improvements, albeit transparent to the end user.
Windows XP includes simultaneous multithreading hyperthreading support. Simultaneous multithreading is a processor's ability to process more than one data thread at a time. Windows XP supports a larger system virtual address space —— 1. The Windows XP Memory Manager is redesigned to consume less paged pool, allowing for more caching and greater availability of paged pool for any component that needs it.
The total size of memory-mapped files in Windows was limited because the memory manager allocated the Prototype Page Table entries PPTEs for the entire file, even if an application created mapped views to only parts of the file.
A benefit of this, for example, is in case of making backups of large files on low memory systems. The paged pool limit of MB has been lifted from the Memory Manager in Windows XP, with unmapped views dynamically reusable by the memory manager depending on pool usage.
Memory pages in working sets are trimmed more efficiently for multiprocessor systems depending on how recently they were accessed. The dispatcher lock contention has been reduced and the Page Frame Number PFN lock has been optimized for increased parallelism and granularity.
Windows XP uses push locks on the event synchronization object if there is no contention as they support shared and exclusive acquisition. Push locks protect handle table entries in the Executive , and in the Object Manager to protect data structures and security descriptors and Memory Manager to protect AWE -related locks.
The kernel page write protection limit in Windows XP is enabled on systems up to MB of RAM beyond which large pages are enabled for increased address translation performance. Windows XP introduces the CreateMemoryResourceNotification function which can notify user mode processes of high or low memory availability so applications can allocate more memory or free up memory as necessary. In Windows XP, the registry is reimplemented outside of the paged pool; the registry hives are memory mapped by the Cache Manager into the system cache, eliminating the registry size limit.
The registry size is now limited only by the available disk space. The System hive still has a maximum size, but it has been raised from 12 MB to MB, eliminating the issue previous Windows versions faced [37] of being unable to boot because of a large or fragmented System hive. The Configuration Manager has been updated to minimize the registry's memory footprint and lock contention , reduce fragmentation and thus page faults when accessing the registry, and improved algorithms to speed up registry query processing.
An in-memory security cache eliminates redundant security descriptors. Windows XP supports cross user session debugging, attaching the debugger to a non-crashing user-mode program, dumping the process memory space using the dump command, and then detaching the debugger without terminating it.
Debugging can be done over a FireWire port and on a local system. The debug heap can be disabled and the standard heap be used when debugging. Heap leak detection can be enabled when processes exit and a debugger extension can be used to investigate leaks. Also introduced is a new heap performance-monitoring counter. Windows XP introduces a new low fragmentation heap policy disabled by default which allocates memory in distinct sizes for blocks less than 16KB to reduce heap fragmentation.
In low memory conditions, "must succeed" calls are denied, causing a slowdown but preventing a bug check. NTFS 3. There are new APIs to preserve original short file names, to retrieve a list of mount points drive letters and mounted folder paths for the specified volume, and to enable applications to create very large files quickly by setting the valid data length on files without force-writing data with zeroes up to the VDL SetFileValidData function.
For instance, this function can be used to quickly create a fixed size virtual machine hard disk. Upon system boot or the launch of an application, any data and code in the trace that is not already in memory is prefetched from the disk.
The previous prefetching results determine which scenario benefited more and what should be prefetched at the next boot or launch. The prefetcher also uses the same algorithms to reduce application startup times. To reduce disk seeking even further, the Disk Defragmenter is called in at idle time to optimize the layout of these specific files and metadata in a contiguous area.
Boot and resume operations can be traced and analyzed using Bootvis. Windows XP includes a Fast Logon Optimization feature that performs logon asynchronously without waiting for the network to be fully initialized if roaming user profiles are not set up.
Group Policy is applied in the background, and startup or logon scripts execute asynchronously by default. Windows XP reconciles local and roaming user profiles using a copy of the contents of the registry. The user is no longer made to wait as in Windows until the profile is unloaded. Windows XP saves locked registry hives with open keys after 60 seconds so that roaming profile changes can be saved back to the server. The problem left is that the computer cannot recover the memory the profile uses until it can be unloaded.
To make sure the user profiles are completely reconciled correctly during logoff, Microsoft has released the User Profile Hive Cleanup service for Windows XP, which they later included in Windows Vista. Windows XP offers enhancements for usability, resilience against corruption and performance of roaming user profiles.
To accommodate the scenario where an older profile would overwrite a newer server profile due to Windows XP's Fast Logon feature, Windows XP ensures in such a situation that the user registry hive is copied from the server to the local profile.
Deletion of profiles marked for deletion at the next logoff does not fail for locked profiles. For workgroup computers, Windows XP no longer deletes the profiles of users belonging to the Guests group. Windows XP includes some changes to the behavior of Offline Files. Shared folders from DFS namespaces can be made available offline.
Beginning with Windows XP, folders redirected to the network are automatically made available offline using Offline Files , although this can optionally be disabled through Group Policy. For older Windows NT 4. In Windows XP, System Restore is configurable per volume and the data stores are also stored per volume. A Disk Cleanup handler allows deleting all but the most recent Restore Point.
Archived from the original on November 2, March 28, Retrieved April 1, System requirements. Archived from the original on October 31, Retrieved June 10, Archived from the original on November 9, Retrieved July 5, Archived from the original on December 7, Retrieved December 8, Archived PDF from the original on December 2, Archived from the original PDF on July 22, Archived from the original on November 5, Retrieved November 4, Archived from the original on January 28, Retrieved January 19, The Register.
Situation Publishing. Archived from the original on December 26, Archived from the original on January 15, PC Pro. Dennis Publishing. Archived from the original on January 6, Archived from the original on October 8, Microsoft Docs.
August 27, Archived from the original on January 14, Retrieved January 13, August 14, Archived from the original on April 1, Retrieved February 10, Archived from the original on September 6, Retrieved November 14, Veeam Software. Archived from the original on April 5, Retrieved September 3, Archived from the original on July 29, Retrieved July 28, Archived from the original on July 28, February 3, Archived from the original on January 26, Wikiversity has learning resources about Windows Server.
Microsoft Windows. Components History Timeline Criticism. Windows 1. Windows 95 Windows 98 Windows Me. Embedded Compact CE 5. Phone 7 Phone 8 Phone 8. Cairo Nashville Neptune Odyssey. List of versions Comparison Category.
Authority control: National libraries France data Germany. Categories : Windows Server X operating systems software. Namespaces Article Talk. Views Read Edit View history. Help Learn to edit Community portal Recent changes Upload file. Download as PDF Printable version. Wikimedia Commons.
For domain member machines, this policy will only log events for local user accounts. The university requires the following event log settings instead of those recommended by the CIS Benchmark:. The recommended retention method for all logs is: Retain events for at least 14 days.
These are minimum requirements. The most important log here is the security log. The further your logs go back, the easier it will be to respond in the event of a breach. In rare cases, a breach may go on for months before detection. You may increase the number of days that you keep, or you may set the log files to not overwrite events. Note that if the event log reaches its maximum size and no events older than the number of days you specified exist to be deleted, or if you have disabled overwriting of events, no new events will be logged.
This may happen deliberately as an attempt by an attacker to cover his tracks. For critical services working with Confidential or other sensitive data, use Syslog, Splunk , Intrust, or a similar service to ship logs to another device. Splunk licenses are available through ITS at no charge.
ITS also maintains a centrally-managed Splunk service that may be leveraged. If using Splunk: Ensure all key systems and services are logging to Splunk and that verbosity is appropriately set. Some remote administration tools, such as Microsoft Systems Management Server, require remote registry access to managed devices.
Disabling remote registry access may cause such services to fail. If remote registry access is not required, it is recommended that the remote registry service be stopped and disabled. If remote registry access is required, the remotely accessible registry paths should still be configured to be as restrictive as possible. The group policy object below controls which registry paths are available remotely:.
Further restrictions on the registry paths and subpaths that are remotely accessible can be configured with the group policy object:. Anti-spyware software is only required to be installed if the server is used to browse Web sites not specifically related to the administration of the server, which is not recommended.
ITS provides anti-spyware software for no additional charge. At a minimum, SpyBot Search and Destroy should be installed. An additional measure that can be taken is to install Firefox with the NoScript and uBlock add-ons. Spyware Blaster - Enabling auto-update functionality requires the purchase of an additional subscription. SpyBot Search and Destroy - Automatic update tasks can be created inside the program itself and are scheduled using the Windows Task Scheduler.
In the Scheduled Task window that pops up, enter the following In the Run field:. Windows provides the Encrypting File System as a built-in mechanism to allow the encryption of individual users' files and folders.
No comments:
Post a Comment