This online document contains important information that is not included in the online Help for the Microsoft® Windows® 2000 Resource Kit, including information not available from other sources about setting up the Windows 2000 Resource Kit tools. Also included are very important corrections and new information related to the Windows 2000 Resource Kit books.
Setup for the Resource Kit Software
Installing from the Command Prompt
Con2Prt.exe (Connect to Printer)
Appsec.exe (Application Security)
Counters.chm (Windows 2000 Performance Counters)
The Windows 2000 Resource Kit is located in a series of folders on the Windows 2000 Resource Kit companion CD. The root of the CD contains a Windows Installer file (w2000rk.msi), which installs all of the Resource Kit tools and utilities onto your computer's hard drive.
Important These tools have not been localized: they are written and tested in English only. Using these tools with a different language version of Microsoft® Windows® 2000 might produce unpredictable results.
The Windows 2000 Resource Kit can only be installed on a computer running the Windows 2000 operating system. It cannot be used to upgrade a Microsoft® Windows NT® Resource Kit installed on Microsoft® Windows NT®.
Installing the Windows 2000 Resource Kit
Important It is highly recommended that you remove all previous versions of the Resource Kit, including Beta versions of the Windows 2000 Resource Kit, before running the Resource Kit installation program.
Note
If you perform a Custom installation, for example to install individual component(s), then decide you want to install the full kit:
The Setup program installs Windows 2000 Resource Kit files onto your hard disk. A typical install requires 65 megabytes (MB) of free space. There are additional applications on the CD-ROM that you can install using the Additional Components option, and that require additional hard drive space.
Setup creates a Program Files/Resource Kit item on the Start menu with a shortcut to the Windows 2000 Resource Kit. From there you can access the tools and online documentation.
Setup also adds the \Program Files\Resource Kit directory (or the directory name you choose for installing the tools) to your computer's PATH statement.
Some Windows 2000 Resource Kit tools require separate or additional setup besides the steps described earlier. For more information about each of these tools and others with additional requirements, as well as a complete list of the tools, see the Windows 2000 Resource Kit Tools Help (W2rktool.chm) online Help file.
Note On the Windows 2000 Resource Kit companion CD, most tools are compressed into cabinet (.cab) files by category. You cannot run executable files, call other binaries, or open documentation directly from .cab files. If you want to run a tool that you have not installed with the Resource Kit Setup, you must first
extract all executable files and dependencies for a tool from the .cab files on the companion CD to your hard drive before running them.
Be aware also that for some tools, the Resource Kit Setup or the tool's own Setup program performs other installation procedures such as making changes in the registry. You might not be able to run these tools even if you extract all their files from the .cab; first install them with the Resource Kit Setup or the tool's own Setup program.
You can install the Windows 2000 Resource Kit tools from the command prompt. For example, you can use the /q option to install or uninstall in silent mode, which requires no further interaction from the user.
The following table lists the command-line options for installing from the command prompt.
| Option | Parameters | Meaning |
|---|---|---|
| /i | w2000rk.msi | Installs or configures. |
| /f | [ReinstallModes] w2000rk.msi | Repairs a previous installation. |
| /a | w2000rk.msi | Admin Installation. Installs on the network. |
| /x | w2000rk.msi | Uninstalls. |
| /l | [i|w|e|f|a|r|u|c|m|p|+]Logfile | Specifies path to log file. The flags indicate what information to log.
i – Status messages. w – Non-fatal warnings. e – All error messages. f – List of replaced files. a – Start up of actions. r – Action-specific records. u – User requests. c – Initial UI parameters. m – Out-of-memory. p – Terminal properties. + – Append to existing file. |
| /? | Displays online Help. |
For example, to install the Resource Kit in the current directory, insert the Windows 2000 Resource Kit companion CD in your CD-ROM drive and type the following at the command prompt:
msiexec /i cd_drive_letter:\w2000rk.msi
where:
cd_drive_letter: is the letter indicating the CD-ROM drive (for example, d:).
msiexec cd_drive_letter:\w2000rk.msi /QB
This tool is not covered in w2rktool.chm.
Con2Prt.exe is a command-line tool that provides scriptable functionality to the Add Printer wizard, so that you can simply write a script to add printers on client computers. Con2Prt lets the user disconnect all existing connections to Windows 2000 printers and connect to newly specified Windows 2000 printers. Here is an example of the syntax:
CON2PRT [ /? | /h | /f | [/c \\printserver\share | /cd \\printserver\share]+]
where:Any number of /c and /cd parameters can be specified. However, only the first /cd sets the specified printer as the default.
Use Net View \\printserver to determine available print shares.
This tool is not covered in w2rktool.chm.
Runapp is a tool originally included with the Microsoft® Windows® Zero Administration Kit (Zak) for Microsoft® Windows NT® version 4.0. You can use RunApp in TaskStation mode to instantiate the user interface application and automatically restart it in cases where it is accidentally closed.
RunApp takes a single parameter:
The name of the executable file to automatically restart.
Caution
This tool has no command-line help. Typing Runapp /? runs the tool, causing a forced restart of your system. This tool is designed for use with the Zero Administration Kit only.
This server-only tool is not covered in w2rktool.chm.
Ntfrsutl is a command-line tool that dumps the internal tables, thread and memory information for the ntfrs service. It runs against local as well as remote servers. For syntax information, type: ntfrsutl /?
To access the internal information, the logged-on user needs the required access on the following registry keys on the target server.
HKLM\System\CCS\Services\Ntfrs\Parameters\Access Checks\
Get Internal Information : Full control
Get Ds Polling Interval : Read
Set Ds Polling Interval : Full Control
Installing POSIX source code
After you download the source code files to a folder of your choosing on your hard drive, type the following at the command prompt:
xcopy driveletter:\download\posix c:\posix /s /e /i
c:
cd \posix
longname
Note that the partition to which you copy the source code must be formatted with the NTFS file system. Also, before compiling any of the utilities, you must run the LONGNAME.BAT file from the directory to which you copied the source code. This batch file renames many of the files to their correct name, which is often longer than the standard 8.3 file name. If you do not run this batch file, the utilities will not compile correctly.
The following copyright notice applies to the binary POSIX utilities on the companion CD and to the source code.
Copyright (c) 1988, 1989, 1990 The Regents of the University of California. All rights reserved.
This code is derived from software contributed to Berkeley by Adam de Boor.
This software and documentation is based in part on BSD Networking Software licensed from the Regents of the University of California, Berkeley. We acknowledge the role of the Computer Systems Research Group and the Electrical Engineering and Computer Sciences Department of the University of California, Berkeley, and the Other Contributors in its development.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
The following table describes major online documents available with the Windows 2000 Resource Kit.
| Document | Description |
|---|---|
| W2rkbooks.chm | Contains online versions of printed Windows 2000 Resource Kit books in HTML Help. |
| Rscripts.chm | Documentation for Windows 2000 Resource Kit VBS scripts. |
| W2rktool.chm | Documentation for Windows 2000 Resource Kit Tools, describing the required files, syntax, and other usage issues, along with examples for using these tools. |
| W2000msgs.chm | Windows 2000 Messages. This HTML Help file replaces the Windows NT Messages Access database file included in versions of the Windows NT Resource Kit. |
| Counters.hlp | The Windows 2000 Performance Counters Reference describes all performance objects and counters provided for use with tools in the Performance snap-in of Windows 2000. |
| Iistool.chm | Secondary HTML Help documentation for the Windows 2000 Resource Kit Internet Information Services tools, describing the required files, syntax, and other usage issues, along with examples for using these tools. |
| Ntevntlg.mdb | An Access database file containing the Windows 2000 Event Log messages. | Os2api.txt | A text file listing compatible APIs in the OS/2 subsystem. |
The SOFTWARE supplied in the Windows 2000 Resource Kit is not supported under any Microsoft standard support program or service. Customers can, however, report Windows 2000 Resource Kit issues and bugs by sending e-mail to rkinput@microsoft.com. Microsoft will, at its sole discretion, address issues and bugs reported in this manner, and responses are not guaranteed. This e-mail address is only for Windows 2000 Resource Kit-related issues.
The SOFTWARE (including instructions for its use and all printed and online documentation) is provided "AS IS" without warranty of any kind. Microsoft further disclaims all implied warranties including, without limitation, any implied warranties of merchantability or of fitness for a particular purpose. The entire risk arising out of the use or performance of the SOFTWARE and documentation remains with you.
In no event shall Microsoft, its authors, or anyone else involved in the creation, production, or delivery of the SOFTWARE be liable for any damages whatsoever (including, without limitation, damages for loss of business profits, business interruption, loss of business information, or other pecuniary loss) arising out of the use of or inability to use the SOFTWARE or documentation, even if Microsoft has been advised of the possibility of such damages.
For more information about Windows 2000 and the Windows 2000 Resource Kits, visit the Windows 2000 Resource Kits Web site.
The following section describes errata or other late-breaking information from the print versions of the Windows 2000 Resource Kit books. In most cases, these items have been corrected in the online versions.
Chapter 1: Introducing Windows 2000 Deployment Planning, page 28
Table 1.9 Information Publishing and Sharing contains an error.
| Description | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| In Table 1.9 Information Publishing and Sharing, Removable Storage is incorrectly listed as a feature. This table currently reads:
Table 1.9 Information Publishing and Sharing
| |||||||||||||||
| Resolution |
Corrected Table 1.9:
|
Chapter 7: TCP/IP and Windows Internet Name Service, page 196
The following entry in Chapter 7, TCP/IP and Windows Internet Name Service, WINS Design Considerations is not correct.| Description |
|---|
If NetBIOS name resolution is required, each site within a domain needs to have at least one WINS server. |
| Resolution |
[Print only. Corrected in the online book.] If NetBIOS name resolution is required, you will need to determine the number of WINS servers that you need. Take into consideration the location of routers on your network and the distribution of clients in each subnet. On a smaller network, a single WINS server can adequately service up to 10,000 clients for NetBIOS name resolution requests; larger networks will require more depending on the number of client connections per server. |
Chapter 7: Determining Network Connectivity Strategies, page 227
In Chapter 7, in the Quality of Service section, the reference to DHCP is incorrect.| Description |
|---|
| The sentence, "For more information about DCHP..." should read, "For more information about QoS..." |
| Resolution |
The sentence should read:
For more information about QoS, see Windows 2000 Help and "Quality of Service" in the Windows 2000 Server Resource Kit TCP/IP Core Networking Guide. |
Chapter 9: Designing the Active Directory Structure, page 286
A fully qualified Active Directory DNS domain name is limited to a maximum length of 64 bytes.| Description |
|---|
| In Chapter 9, "Designing the Active Directory Structure", in the section "Domain Naming Recommendations", the statement, "Length should not be a significant deciding factor when choosing names", is incorrect. The maximum length of a fully qualified Active Directory DNS domain name is 64 bytes. A single ASCII character equals one UTF-8 byte. Non-ASCII characters are encoded in multiple UTF-8 bytes. The exact number of characters allowed depends on the characters used. |
| Resolution | Replace the incorrect sentence with the correct sentence as follows, "A fully qualified Active Directory DNS domain name is limited to a maximum length of 64 bytes." |
Chapter 13: "Automating Server Installation and Upgrade", page 469, and Chapter 25: Automating Client Installation and Upgrade, page 921
SMS cannot be used for clean installation.
| Description | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Tables 13.2 and 25.2, Automated Installation Methods, are not correct. These tables currently read:
Tables 13.2 and 25.2 Automated Installation Methods
| ||||||||||||||||||||||||
| Resolution |
Here is the new table for Tables 13.2 and 25.2:
Tables 13.2 and 25.2 Automated Installation Methods
|
Chapter 13: Automating Server Installation and Upgrade, page 492; and Chapter 25: Automating Client Installation and Upgrade, page 947
Important Page File Setting information for servers with large amounts of RAM.| Description |
|---|
| If you have a system with 2 gigabytes (GB) or more RAM, create a .reg file to set the CrashDumpEnabled setting to do a Kernel Dump. |
| Resolution |
Add the following text to the section entitled, "Automated Installation Methods":
If you have a system with 2 gigabytes (GB) or more RAM, create a .reg file to set the CrashDumpEnabled setting to do a Kernel Dump.
To set CrashDumpEnabled in a .reg file:
Note If you are automating an installation on a computer for which you want the Crash Dump Mode set to Kernel Dump, include the following in the [GuiRunOnce] section of the answer file: Regedit /s path\CrshDump.regWhere, path is the path to the CrshDump.reg file location on the local hard disk. Regedit /s path\CrshDump.regWhere path is the path to the CrshDump.reg file location on the computer's hard disk. You can also use an .inf to set the Crash Dump option. |
Chapter 25: Automating Client Installation and Upgrade, pages 937 and 938
The Winnt and Winn32 setup command parameters are not complete.
| Description |
|---|
In the section, "Reviewing the Windows 2000 Setup Commands":
|
| Resolution |
Correct Winnt.exe syntax: winnt [/S[:sourcepath]][/T[:tempdrive]]/U[:answer_file]] [/udf:id[,UDF_file]][/R[x]:folder] [/E:command]
Here is the correct Winnt32.exe syntax: winnt32 [/s:sourcepath] [/tempdrive:drive_letter] [/unattend[num][:answer_file]] [/copydir:folder_name] [/copysource:folder_name] [/cmd:command_line] [/debug[level][:filename]] [/udf:id[,UDB_file]] [/syspart:drive_letter] [/noreboot] [/makelocalsource] [/checkupgradeonly][/cmdcons] [/m:folder_name] |
Chapter 21: Testing Applications for Compatibility with Windows 2000, page 790
The reference to System File Protection does not reflect change in terminology.
| Description |
|---|
| In "Common Compatibility Issues," two references to System File Protection are incorrect. The correct terminology is "Windows File Protection." |
| Resolution | Change all references to System File Protection to Windows File Protection. |
Chapter 23: Defining Client Administration and Configuration Standards, page 844
Group Policy loopback processing does not work in Windows NT 4.0 domains.
| Description |
|---|
| To use loopback Group Policy processing, both the computer account and the user account must be in Windows 2000 domains. If one of the accounts is in a Windows NT 4.0 domain, loopback is disabled and policy processing occurs without it. |
| Resolution | Use loopback processing only when both the computer account and the user account are in Windows 2000 domains. |
Chapter 24: Applying Change and Configuration Management, pages 903, 904
The syntax for folder redirection is incorrect.
| Description |
|---|
| In Chapter 24, in the section, "Enabling Roaming User Profiles", the syntax, \\networkShare\Profiles\MaryK is incorrect. Also, in section, Redirecting Folders, the syntax, \\networkShare\Profiles\Username is incorrect. |
| Resolution |
The correct syntax is:
\\networkShare\Profiles\%MaryK% \\networkShare\Profiles\%Username% |
Chapter 25: Automating Client Installation and Upgrade, page 952
Example Sysprep.inf file requires correction.
| Description |
|---|
The example file currently reads:
[GuiUnattended] ; Specify a non-null administrative password. ;Any password supplied here will only take effect if the original source ;for the image (master computer) specified a non-null password. AdminPassword = "" |
| Resolution |
It should read instead:
[GuiUnattended] ;Recommended: Specify a non-null administrative password. ;Any password supplied in the Sysprep.inf or during the Mini-Setup will only take effect if the ;original source for the image (master computer) had a non-null password. AdminPassword = * |
Chapter 25, Automating Client installation and Upgrade, page 952
Sysprep blanks existing TAPI settings.
| Description |
|---|
| When TAPI settings are not included in the Sysprep.inf file, Sysprep clears the existing TAPI settings. |
| Resolution |
Add the following note to the section, Sysprep.inf:
If the customer includes TAPI information in the master computer and runs Sysprep, and the Sysdprep.inf that is used does not include TAPI settings, the TAPI values set on the master computer will be erased. The user will not be prompted for TAPI settings if a Sysprep.inf is used. |
Chapter 25: Automating Client installation and Upgrade, page 950, Sysprep files
Additional functionality allows you to reduce the number of master images used for deploying Windows 2000 with Sysprep.
| Description | |||||||
|---|---|---|---|---|---|---|---|
| By using Sysprep you can minimize the number of images you need to use for deploying Windows 2000 to both multi-processor (MP) to uni-processor (UP) computers or UP to MP computers. However, this will only work for APIC or Advanced Configuration and Power Interface (ACPI) APIC computers with the compatible HALs.
Note
| |||||||
| Resolution |
There are two methods for creating images that you can use between MP and UP systems. Each method has advantages and disadvantages associated with it, as outline in the following sections. Choose the method that works best for you and your environment. The following table illustrates the compatibility of computers based on their HAL type. One image is required for each compatibility group.The following table illustrates the compatibility of computers based on their HAL type. One image is required for each compatibility group.
|
MP to UP
For this process, the image is created on an MP master computer. This image can be used on other MP computers or on UP computers.
Important
This image can only be used in one of the following configurations depending on the HAL type you are using:
To create an MP to UP image
Copy all six files from the Windows 2000 operating system CD under cd-rom:\i386\Uniproc to the \Sysprep\i386 folder of your distribution folders, for example, \$OEM$\$1\Sysprep\i386\Uniproc. These files include: Mp2up.inf, Mp2up.cat, Kernel32.dl_, Ntdll.dll, Win32k.sy_, and Winsrv.dl_. You do not need to expand the unexpanded files since the detection will do this automatically when needed.Important
If a Service Pack becomes available that updates the files in the \i386\Uniproc folder, be sure to update the files on both the master image in the C:\Sysprep\i386\Uniproc folder and on your distribution folders under the \$OEM$\$1\Sysprep\i386\Uniproc folder.
Chapter 25: Automating Client Installation and Upgrade, page 950
Sysprep resets custom connectoid names.| Description |
|---|
| If Sysprep is run with a connectoid that is given a nondefault name, the name is reset to "Local Area Connection." |
| Resolution | Use connectoids with default names while running Sysprep. |
Appendix C: Sample Answer Files for Unattended Setup, pages 1041, 1043, 1046, 1049, 1051, 1055
InstallDefaultComponents key is removed from Unattended Setup.
| Description |
|---|
| In the Sample Answer Files for Unattended Setup section, InstallDefaultComponents has been removed from Unattended Setup. |
| Resolution | In all references to InstallDefaultComponents in the sample answer files, InstallDefaultComponents=No has no value. The removal of InstallDefaultComponents has no impact on the networking header. |
New appendix: Windows 2000 Server and Professional System Requirements
Windows 2000 Server System RequirementsChapter 6: Windows 2000 DNS, page 341
DNS name length limit should be applied to the Active Directory DNS domain names instead of Domain Controllers domain controller DNS names.
| Description |
|---|
Table 6.2 in this chapter contains the following statement:
"domain controllers are limited to 155 bytes for an FQDN." |
| Resolution | That statement should be replaced with the following one:
"The Active Directory DNS domain name is limited by 64 bytes." This change affects large organizations, which have multilevel Active Directory tree structures and therefore longer DNS domain names. It also affects organizations that use UTF-8 character encoding (which can use up to three bytes per character) in the names of the Active Directory domains. The Active Directory Installation wizard will prevent you from creating Active Directory DNS domain names longer than 64 bytes. |
Chapter 3: Unicast IP Routing, page 132
Missing description for TCP [established] filter.| Description |
|---|
| In the "Protocol" section at the top of the page, the TCP [established] filter description is missing. |
| Resolution | The following is the description for TCP [established] filter:
TCP [Established]: Select this option when you want to define TCP traffic for TCP connections established with the router. |
Chapter 9: Virtual Private Networking, page 442
Technical error in L2TP authentication description.| Description |
|---|
The first sentence of the last paragraph mistakenly reads:
The user attempting the PPTP connection is authenticated using PPP-based user authentication protocols such as EAP, MS-CHAP, CHAP, SPAP, and PAP. |
| Resolution | This sentence needs to be:
The user attempting the L2TP connection is authenticated using PPP-based user authentication protocols such as EAP, MS-CHAP, CHAP, SPAP, and PAP. |
Chapter 15: Telephony Integration and Conferencing, TAPI Architecture section, page 799
Tapisrv.exe listed instead of Tapi.dll.| Description |
|---|
| Tapisrv.exe does not exist, and needs to be replaced by Tapi.dll wherever it appears. |
| Resolution | Corrected text reads as follows:
Existing 32-bit applications link to Tapi32.dll. In Microsoft® Windows® 95, Tapi32.dll is a thunk layer to TAPI. With TAPI 2.0 and later, Tapi32.dll is a thin marshaling layer, that transfers function requests to Tapisrv.dll and, when needed, loads and invokes service provider user interface DLLs in the application's process. Tapisrv.dll is the core of TAPI. It runs as a separate service process, in which all Telephony Service Providers execute. Service providers can create threads in the TAPISRV context as needed to do their work. |
Chapter 5: Overview of Performance Monitoring, "Performance Logs and Alerts"
Trace log tools not mentioned in the book are available on the Windows 2000 Resource Kit companion CD.| Description |
|---|
| Trace log tools not mentioned in the book are available. |
| Resolution |
|
Chapter 5: Overview of Performance Monitoring, "Performance Logs and Alerts"
Incorrect log file size limit listed.
| Description |
|---|
| Change to the log file size limit. |
| Resolution | The file size limit for binary and circular counter logs changed from 2 GB to 1 GB. The reference occurs in bullet list in the "Getting the Most from Performance Logs and Alerts" section. |
Chapter 5: Overview of Performance Monitoring, "Monitoring Processes"
Additional information about using Performance Logs and Alerts.
| Description |
|---|
| More information available. |
| Resolution | Sequential counter or trace log files can grow to a size larger than the maximum file size specified by the user. This can occur for different reasons, depending on what type of log is configured. For counter logs, the log service postpones checking the log's file size until after it has collected the last data sample, at which point the file size might already have exceeded the defined limit. For trace logs, the log service writes additional buffers to the log when the log service stops, which might cause the final log file size to be slightly larger than the defined limit. |
Chapter 5: Overview of Performance Monitoring, "Monitoring Processes"
Incorrect sentence.
| Description |
|---|
Incorrect text in the following:
When you compare System Monitor and Task Manager values, multiply System Monitor values by 1,024. |
| Resolution | Text should read as follows:
When you compare System Monitor and Task Manager values, multiply Task Manager values by 1,024. |
Chapter 6: Evaluating Memory and Cache Usage, "Optimizing Your Memory Configuration"
Workaround now available for Balancing Paged Pool and System Pages for Terminal Service.
| Description |
|---|
| A workaround is now available for a documented problem. |
| Resolution |
When supporting a large number of sessions, servers with Terminal Services enabled for Application Server Mode might run out of paged pool before the CPU resource is at its limit. The extent to which this happens largely depends on the available amount of CPU resources (2-way, 4-way, or 8-way) as well as the resource requirements of each user session. The SystemPages registry entry can be used to optimize the memory configuration to support additional user sessions. For information about tuning this setting, see Microsoft Knowledge Base. |
Chapter 5: Overview of Performance Monitoring, "Working with System Monitor"
More information available about using the Add Counters dialog box to select duplicate instances.| Description |
|---|
| More information available on using the Add Counters dialog box to select duplicate instances. |
| Resolution | New information: You need to select duplicate instances individually in the Add Counters dialog box in order to collect data from those instances. If you select All instances while adding counters to a counter log or a System Monitor view, duplicate instances are not added to the log settings or to the view legend. This is true even when the Allow duplicate counter instances option is selected in General properties for System Monitor. |
Chapter 5: Overview of Performance Monitoring, "Monitoring the System"
Incorrect table reference.
| Description |
|---|
| Table 5.6, called "Comparison of System Data Provided by Task Manager and System Monitor," contains an incorrect reference to the Task Manager UI. See column 1, row 9: Physical Memory: File Cache. |
| Resolution | This should now say Physical Memory: System Cache. |
Chapter 12: Backup, pages 515-516
Additional backup information for users familiar with running Windows NT backups.| Description |
|---|
| New information is available for the "Using Backup" section. |
| Resolution | The following is new information for this section:
|
© Copyright 1985–2000 Microsoft Corporation. All rights reserved.