Chapter 1 Lesson 1
Chapter 1 Lesson 1
Application Failures
Windows Failures
Miscellaneous Failures
Warnings
Information
Chkdsk
Disk Defragmenter:
Chapter 2 Lesson 1
IPConfig:
Ping
PathPing
A routing loop is when traffic crosses the same router more than once
Lists every router between you and the destination
Like tracert, but better
Routers handle ICMP requests at lower priority than other packets, so a high latency isnt always
indicative of a problem when pinging
Using the -d option prevents pathping from resolving names of each router
PortQry
Tests whether a specific network service is running on a computer and the state of the port
Basic syntax is as follows:
o Portqry n destination e portnumber
You can also use the telnet client to test a remote service on a TCP host
NSLookup
Some names resolve to multiple IP addresses, this is normal. Your browser is smart enough to connect to
a different IP address if the first address isnt working properly.
Chapter 2 Lesson 2
Name Resolution
IPconfig /displaydns
o The ttl is the time that the record will remain valid
IPconfig /flushdns deletes all entries from the DNS cache
To disable the DNS cache, stop the DNS client service form the Services app or run the following
command from an admin command prompt: net stop dnscache
o Stopping and restarting the dns client also clears the DNS cache
Chapter 2 Lesson 3
The WLAN Autoconfig service must be started for wireless networks to be available.
Turning off SSID broadcasting is actually dangerous, because the client is constantly sending out beacons looking
for the WAP. These beacons can be intercepted by malicious parties.
You should have Windows Server 2003 with SP1 or later installed on your domain controllers.
o You need to extend the AD DS schema for servers prior to Windows Server 2008 using the
802.11Schema.ldf file. To extend the schema, follow these steps:
Copy the 802.11Schema.ldf file to a folder on a DC.
Log on to the DC as a domain admin
Select the folder containing the 802.11Schema.ldf file, and run the following command:
ldifde -i -v -k -f 802.11Schema.ldf -c DC=X Dist_Name_of_AD_Domain
Restart the DC
You can configure a wireless network policy from Computer Configuration/Policies/Windows
Settings/Security Settings/802.11
Before you can connect to a wireless network using NETSH, you must have a profile saved for that network.
Chapter 3 Lesson 1
Chapter 4 Lesson 1
Credential Manager
Can roam stored user names and passwords between multiple Windows computers in an AD DS domain.
Windows stores these credentials in the users AD profile.
Windows automatically adds credentials used to connect to shared folders to the credential manager.
Credential Manager can be accessed from the User Accounts app in Control Panel. Select Manager Your
Credentials in the left pane.
The only web sites that Credential Manager can authenticate to automatically are those that use HTTP
authentication. This type of authentication is when a prompt pops up asking for credentials.
Use the Resultant Set of Policy tool (RSOP) to identify a computers effective Group Policy settings.
The details pane shows only policy settings that have been applied.
You can identify locked out accounts by examining logon audit failures in the domain controllers Security event log
with Event ID 4625.
When you are authentication to a network resource, authentication failures are always logged on the server, not
on the client.
Network authentication can be a problem if Group Policy settings are used to distribute certificates required for
network authentication because the client computer must first connect to the network to get the certificate. If this
is ever a problem, just connect the client to the wired network and update Group Policy.
You can configure a CA trust by using Group Policy, rather than importing the Root CAs certificate into the clients
store manually.
Domain Controllers automatically create and change passwords for domain computer accounts
When computer accounts become untrusted, the computers SID or password does not match those that
are stored in AD DS. This can occur when either of the following occurs:
o Multiple computers have the same SID. This can happen when a computer is deployed using an
image and SysPrep was not used on the image prior to deployment. The image contains the SID
of the computer it was captured from.
o The computer account is corrupt in AD DS.
You cannot reset the password on computer accounts. The easiest way to resolve this problem is to rejoin
the computer to the domain.
o Join the computer to a workgroup and then restart it; open ADUC and right click the computer
account, and then click Reset Account; then rejoin the computer to the domain. Finally, restart
the computer.
Chapter 4 Lesson 2
Configuring Add-ons:
Protected Mode:
One of the features of Windows 7 that enables Protected Mode is Mandatory Integrity Control (MIC). MIC
labels processes, folders, files, and registry keys using one of four integrity access levels (ILs). IE runs with
a low IL, which means it can access only other low IL resources without the users permission.
o IL Levels:
System: Unlimited access to the computer
High: Administrative
Medium: User
Low: Untrusted
Certificate Purposes:
o Encrypting Traffic
o Authenticating the server
o Authentication the client
Chapter 4 Lesson 3
Bitlocker:
Bitlocker encrypts entire volumes, including system files. EFS cannot encrypt system files or entire
volumes.
To allow you to initialize TPM chips manually and turn them on or off at the operating system level,
Windows 7 includes the TPM Management snap-in.
Bitlocker has 4 main modes on computers with TPM hardware:
o TPM Only
o TPM with External Key
o TPM with PIN
o TPM with Pin and External Key
In its default configuration, Bitlocker tells the TPM to measure the MBR, the active boot partition, the
boot sector, the Windows Boot Manager, and the Bitlocker storage root key. It hashes all of this
information and then compares it each time the computer boots.
If TPM hardware is not available, Bitlocker can store decryption keys on a USB flash drive.
If the computer does not have a TPM, you must select Allow Bitlocker without compatible a TPM within
Group Policy.
You can use manage-bde to manager Bitlocker on a remote computer
If the drive is locked, you can boot only to recovery mode, where the recovery key must be entered.
As a last resort, you can use the Bitlocker repair tool (repair-bde) to help recover data from an encrypted
volume. You can use this tool to decrypt a volume (if you have the recovery key), and then copy the files
to a different volume. You can also attempt to repair a volume without copying any data.
You can dual boot a computer after enabling Bitlocker
Chapter 5 Lesson 1
Types of malware:
Understanding UAC:
The UAC notification that normally appears for admins is called the consent prompt. And it appears on the
secure desktop.
Whenever standard users attempt to make changes to a system, a credential prompt appears on the
secure desktop.
Configuring UAC through the Control Panel
o Can be found under System and Security\Action Center\Change User Account Control Settings
o Notification Levels:
Always Notify will notify any time changes that require admin privileges are attempted
on the system. This is the default setting for standard users.
Notify me only when programs try to make changes to my computer Default for
admins and is not available for standard users. Administrators are not notified when
they make changes that require admin privileges. However, users are notified through a
consent prompt when a program tries to make a change.
Always Notify me (Do not dim desktop) Not available for administrators. Same as the
default level for standard users, except UAC does not prompt on the secure desktop.
Never Notify Disables UAC notifications.
Configuring UAC through Group Policy:
o Can be found at Computer Configuration\Policies\Windows Settings\Security Settings\Local
Policies\Security Options
Admin Approval Mode for the Built in administrator account Applies only to the built
in admin account. When this is enabled, the built in admin account sees UAC
notifications just as other admins do. When you disable this, the built in admin account
does not experience UAC.
Allow UIAccess Applications to prompt for elevation without using the secure desktop
Behavior of the elevation prompt for administrators in admin approval mode: - Controls
the behavior of the elevation prompt for administrators
Elevate without prompting admins never see elevation prompts
Prompt for credentials on the secure desktop admins see credential prompts
on a secure desktop
Prompt for consent on the secure desktop Admins see a consent prompt on
the secure desktop
Prompt for credentials
Prompt for consent
Prompt for consent for non-windows binaries causes a consent prompt to
appear any time an application requests elevation.
Behavior of the elevation prompt for standard users: - Controls the behavior of the
elevation prompt for standard users.
Automatically deny elevation requests
Prompt for credentials on the secure desktop
Prompt for credentials
Detect application installations and prompt for elevation This settings makes UAC
prompt for admin credentials when the user attempts to install an application that
makes changes to protected aspects of the system.
Only Elevate executables that are signed and validated When this is enabled, Windows
7 refuses to run any executables that arent signed with a trusted certificate.
Only elevate UIAccess applications that are installed in secure locations This policy
only allows user interface access programs that are installed in Program Files and
subfolders to run.
Run all administrators in admin approval mode Causes all admin accounts except for
the built in admin account to see consent prompts
Switch to the secure desktop when prompting for elevation This policy controls
whether or not the secure desktop appears with UAC prompts.
Virtualize File and Registry write failures to per-user locations Improves compatibility
for applications not developed by UAC by redirecting requests for protected resources.
Windows Defender:
Configured by default to download new definitions and then do a quick scan at 2 am daily.
3 types of scans:
o Quick scan
o Full scan
o Custom scan
4 options for detected malware:
o Ignore
o Quarantine
o Remove
o Always allow
Configuring Windows Defender with Group Policy
o Can be found at Computer Configuration\Policies\Administrative Templates\Windows
Components\Windows Defender
o Turn on definition updates through both WSUS and Windows Update
o Turn on definition updates through both wsus and the Microsoft Malware Protection Center
o Check for new signatures before scheduled scans
o Turn off Windows Defender
o Turn off Real Time Monitoring
o Turn Off Routinely Taking Action
o Configure Microsoft Spynet Reporting
Chapter 6 Lesson 1
Direct Access is built exclusively on IPv6 and has not fallback to IPv4
2 Types of VPNs: Site to Site and Remote Access
VPN tunneling protocols can validate data in 2 ways
o Data Integrity checking
o Data Origin Authentication
Requirements for A VPN infrastructure
o VPN client
o VPN server running RRAS
o DNS Server
Typically a VPN infrastructure also includes a DC, certificate server, and a DCHP server. A NPS server might
also be used.
VPN clients can be any of the following types:
o Windows 7 VPN client
o Connection Manager Client (CM)
o Third part client
The Connection Manager Administration Toolkit (CMAK) can be used to create client connection profiles
and then distributed to clients as CM clients. This is very scalable compared to creating
For authentication, RRAS can be configured to forward request to a RADIUS (NPS) server or use Windows
authentication. When configured to use Windows authentication, the RRAS server passes requests to an
available DC.
Remote access authentication precedes domain logon authentication.
VPN clients that connect to a network must be configured with the address of a DNS server on that
network, so that it can resolve names on that network.
NPS is the Microsoft implementation of a RADIUS server and proxy.
Windows 7 supports 4 tunneling protocols.
o IKEv2
New in Windows 7 and Server 2008 R2
Uses IPSec for encryption
Only protocol that supports VPN reconnect (also called mobility)
Clients do not need to provide authentication through a machine certificate or a
preshared key. The same goes for SSTP and PPTP.
IKEv2 VPNs require a PKI. The server must present a server authentication certificate to
the client, and the client needs to be able to validate the certificate. To perform this
validation, the root certificate for the CA that issued the server authentication
certificate must be in the Trusted Root Certification store on the client computer.
o SSTP
Can be used by clients running Vista SP1 or later
Based on HTTPS (uses only port 443 for communication, most firewalls leave this port
open)
Does not require client computer authentication by default, though this can be
configured.
The SSTP VPN server must present a computer certificate to the connecting client at the
beginning of the connection process. The client must validate this certificate. The issuing
root CA of the certificate must be in the Trusted Root Certificate Authorities store on
the client.
User authentication via PPP
o L2TP
Security provided by IPsec
Besides requiring user authentication as all VPN protocols do, L2TP requires client
computer authentication also. Because of this, all VPN client computers from which a
user might connect must be configured either with a computer certificate or a
preshared key specific to the vpn server. Therefore, L2TP prevents a user from
establishing a connection from a public computer or from any computer not specially
configured for the VPN.
To configure the client to use a certificate or a preshared key, open the properties box
of the connection, click the security tab, and then click advanced settings.
o PPTP
Easiest protocol to implement, but also least secure
Does not require any certificates or preshared keys on either the client or server.
Can be used with older Operating Systems
Does not ensure data integrity or data origin authentication
User authentication via PPP
Remote Access Connectivity Process:
o VPN client contacts the VPN server
Client must be configured with proper IP address of VPN server. VPN server needs to be
publicly available.
o VPN tunnel is negotiated
Client requests a tunnel type in the following order: Ikev2, SSTP, L2TP, PPTP
Authentication protocol is also negotiated. For IKEv2, the EAP-MSCHAPv2 protocol is
used. For other VPNs, MSCHAPv2 is preferred. Otherwise Chap is requested.
Encryption is also negotiated during this phase.
o VPN tunnel is created
If the tunnel type, authentication type, and encryption type can be agreed upon, the
tunnel Is created. After this point, all exchanges are encrypted.
o Remote Access Authentication is Performed
User account properties are check to make sure the user is authorized for remote access
List of network policies on the VPN server or NPS server is checked.
o The VPN connected is established
Domain logon occurs.
Always on connectivity
Seamless connectivity
Bidirectional access
Enhanced security
PKI, Domain controllers, IPv6 transition technologies, and DNS servers, Direct access clients, Direct Access
servers, and a network location server, CRL Distribution Points
Direct Access server
o Must be Windows Server 2008 R2 and joined to the domain
o Sits on perimeter of network and also acts as a IPv6 relay and IPsec gateway
o Accepts connections from Direct Access clients
o Needs 2 physical network adapters
o Also needs 2 consecutive publicly addressable IPv4 addresses
Direct Access client
o Must be domain joined and running Windows 7 Enterprise or Ultimate
o Add the to a group, and then specify this group when you run the DA setup wizard on the DA
server
o The Name Resolution Policy Table (NRPT) allows clients to separate internet traffic from intranet
traffic. This can be applied to clients through Group Policy. Located at Computer
Configuration\Policies\Windows Settings\name Resolution Policy
Network Location Server
o A web server accessed by DA clients to determine whether or not they are on the local intranet
or the internet.
IPv6 capable network
o The order of connection methods attempted by DA clients is as follows:
Native IPv6
6to4
Teredo
IP-HTTPS
o For remote client computers to reach computers on the internal network, internal computers
must be fully IPv6 compatible.
IPsec
o Provides end-to-end security for remote client computers accessing resources on the internal
network. Used for authentication and encryption of all DA connections.
PKI
o Required to issue computer certificates for client and server authentication and also for issuing
health certificates when NAP has been implemented.
CRL Distribution Points (CDPs)
o Servers that provide access to the CRL published by the CA issuing certificates for DA.
Perimeter Firewall Exceptions
o The following ports must be open:
UDP port 3544 to enable inbound teredo traffic
IPv4 protocol 41 to enable inbound 6to4 traffic
TCP port 443 to enable inbound IP-HTTPS traffic
Client configuration
Clients are normally configured when you run the DA setup wizard, however you can do it manually.
o
The DA connection process
Troubleshooting DA
Methods of updating
o Windows Update
o WSUS
o SCCM
To deploy updates to Windows 7 using you must have WSUS 3.0 SP2 or later
Types of updates:
o Critical Updates:
o Service Packs
o Optional Updates
Windows Update GP settings
o Located at Computer Configuration\Policies\Administrative Templates\Windows
Components\Windows Update
o Configure Automatic Updates Specifies whether client computers will receive security updates
and other important downloads through the Windows Update service.
o Specify Intranet Microsoft Update Service Location
o Automatic Updates detection Frequency.
o All non-administrators to receive update notifications
o Allow Automatic updates immediate installation
o Turn on recommended updates via automatic updates
o No auto restart with logged on users for scheduled automatic updates installations
o Reprompt for restart with scheduled installations
o Delay restart for scheduled installations
o Enable client-side targeting specifies which group the computer is a member of
o Enabling windows update power management to automatically wake up the system to install
scheduled upates
Additional GP settings found under User Configuration but not Computer Configuration
o Do not display install updates and shut down option in Shutdown Windows dialog box
o Do not adjust default option to install updates and shut down in shut down windows dialog box
o Remove access to all windows update features
How to script updates
o Updates are opened with the WUSA and have the .msu extension.
o WUSA
/uninstall
/quiet
/norestart
/warnrestart
/promptrestart
/forcerestart
You can use the MBSA to check computers for missing updates
Troubleshooting update installation problems
o Check the Windows update log at %Windir%\WIndowsUpdate.log
o If using WSUS, verify that the client can connect to the WSUS server by opening up a web
browser and going to http://<WSUSSERVERNAME>/iuident.cab. If all is working properly, you will
be prompted to download a file.
o If using GP to update clients, use the RSOP to verify the configuration.
o If changes the Windows Update configuration, restart the Windows Update service (wuauserv)
Troubleshooting Restart Manager
o Restart Manager is a feature of Windows Installer that strives to reduce the requirement by
closing and restarting programs and services that have files in use.
o To diagnose a problem with Restart Manager, open Event Viewer and go to Windows
Logs\Application and Applications and Services
logs\Microsoft\Windows\RestartManager\Operationl
You can remove updates from the Programs and Features applet
You can also use WUSA to uninstall updates
Chapter 8 lesson 1
Event Forwarding
o Uses HTTP or HTTPS to send events from a forwarding computer to a collecting computer.
o Even though HTTP is unencrypted, event forwarding sends events encrypted with Microsoft
Negotiate Security Support Provider in workgroup environment or Kerberos in Domain
environments.
o HTTPS uses an SSL certificate which you will have to generate to provide an additional layer of
encryption.
o Configuring forwarding in domains:
Both the forwarding and collecting computers must have 2 services running:
Windows Event Collector
Windows Remote Management
In addition, the forwarding computer must have a firewall exception for HTTP.
To configure a computer to forward events, follow these steps:
Open an admin cmd prompt and type in winrm quickconfig
o WInrm configures the computer to accept WS-Management requests
from other computers
o Starts the Windows Remote Management service (WS-Management)
to Automatic (Delayed Start)
o Configures a Windows Remote Management HTTP listener.
o Creates a Windows Firewall exception to allow incoming connections
to the Windows Remote Management service using HTTP.
Next you add the computer account of the collecting computer to the Event
Log Readers group on the forwarding computer.
To configure a computer to collect events:
Windows 7 supports 2 types of event collection:
o Collector-initiated
o Source-computer initiated
Source initiated are the only type available in workgroups
o Windows 7 will prompt you to configure the collecting computer when
you create a subscription.
o Type in the following command at an admin cmd prompt:
Wecutil qc
o If you plan to use source computer initiated subscriptions, you need to
also run winrm quickconfig on the collecting computer.
After setting up the computer, you create a subscription from the Event Viewer console
3 types of subscriptions:
Normal Ensures delivery of events and does not attempt to conserve
bandwidth
Minimize Bandwidth Uses push delivery mode, where the forwarding
computer contacts the collecting computer.
Minimize Latency Ensures events are delivered with minimal delay. Uses push
delivery mode.
o By default, normal subscriptions check for events every 15 minutes
To adjust the event subscription delay, run these commands:
Wecutil ss <subscription name> /cm:custom
Wecutil ss <subscription name> /hi:<milliseconds delay>
If you need to check the interval, run the following command:
Wecutil gs <subscription name>
o Configure Event Forwarding to use HTTPS
You must perform these addition tasks on the forwarding computer
Configure the computer with a computer certificate.
Create a firewall exception for port 443.
Run the following command at an elevated command prompt:
o Winrm quickconfig transport:https
On the collecting computer, you must modify the subscription properties to use https.
In addition, the collecting computer must trust the CA that issues the computer
certificate for the forwarding computer.
o Configuring forwarding in workgroups
The process is very similar to creating a subscription in a domain, with the following
exceptions:
You must add a Windows Firewall exception for Remote Event Log
Management on each forwarding computer
You must add an account with admin privileged to the Event Log Readers local
group on each forwarding computer.
On each collecting computer, run the following command to allow the
forwarding computers to use NTLM authentication: winrm set
winrm/config/client@{TrustedHosts=<forwarding_comptuer>}
Chapter 8 Lesson 2
Task Manager
o Task Manager has 6 tabs
Applications
Processes
Services
Performance
Networking
Users
o Processes run within threads.
o A Processor can only run 1 thread at a time
Performance Monitor
o Graphically displays real time data
o Change the interval to show a more smooth and less jagged graph
This can be done by clicking action > properties > General tab. Then change the graph
elements section.
o You can select from the following chart types:
Line
Histogram
Report
o Data Collector Sets and Reports
Will log performance counter data, allowing you to view it later
Event Trace Data shows detailed debugging information
Built in Data Collector Sets
System Performance
o Logs Processor, disk, memory, and network performance counters and
kernel tracing.
System Diagnostics
o Logs all information included in the System Performance data collector
set, plus more detailed info.
To use a data collector set, right click it and then click start. The system performance
DCS stop automatically after a minute. The system diagnostics DCS stops after10
minutes. You can also manually stop it by right clicking and then clicking stop.
After running a DCS, you can view a summary of the data gathered in the reports node.
Creating a DCS from a Standard Template
Basic
System Diagnostic
System Performance
Troubleshooting Disk Performance Problems
o To reduce fragmentation, increase the amount of free disc space
o Use disk cleanup to cleanup the hard drive
o Disk defragmenter
o Virtual Memory
Maximize performance by storing virtual memory on a different physical disk from
other files.
Configuring Power settings
o Advanced power settings
Turn off hard disk after
Wireless adapter settings
Sleep
USB settings
Power Buttons and Lid
PCI Express
Processor Power Management
Multimedia Settings
Battery
System Configuration
o MSConfig
Chapter 9 Lesson 1
Appendix A
Appendix B
Appendix C
Appendix D
Appendix E
Arp
o Useful for diagnosing communications on a LAN when it doesnt travel through a router
Event Viewer
o Administrators can use Wireless Diagnostics Tracing to capture and analyze diagnostic
information by using graphical tools.
o You can find network diagnostic information in 2 logs within Event Viewer
Windows Logs\System
Applications and Services Logs\Microsoft\Windows\Diagnostics-
Networking\Operational
IPConfig
NBLookup
o Used for diagnosing WINS name resolution problems
Nbtstat
o Used for troubleshooting NetBIOS name resolution problems.
Net
o Net can be used to change network configuration settings, start and stop services, and view
shared resources.
o Use the net share command to view shared resources on a local computer
o Use the net view <computer name> to view shared resources on a remote computer. You can
identify the computer by using the name or IP address. If you receive an access is denied error
while trying to view remote shares, establish a NetBIOS connection to the remote computer by
doing the following:
Run the net use \\PC1 /user:<username>
You should then be able to run the net view command
NetStat
o Can be used to view network services and the ports they listen on.
o You can also view the process ID that an open connection is related to, and then view this
process within task manager. This would be helpful in troubleshooting malware infections.
Network Monitor
o Only available if download
o Sniffer
NSLookup
PathPing
o Can identify routing loops
o Can also be used to identify network performance problems (RTT and packet count lost/received)
Performance Monitor
o Can be used to view thousands of real time counters related to networking
o Can be used on a local or remote computer
Data Collector Sets
Resource Monitor
Ping
PortQry
Route
Task Manager
TCPView
Telnet Client
Test TCP (ttcp.exe)
Troubleshooting network Problems
o Troubleshooting Performance Problems and Intermittent Connectivity Issues
Network utilization on wired networks should not exceed 60-70%, on wireless 50%. This
can be checked in Task Manager from on the networking tab.
o How to troubleshoot joining or logging on to a domain
Always view error information when troubleshooting domain logon or join problems
If the error does not reveal the problem, view the %windir%\debug\netsetup.log file.
This log details the process of joining a domain as well as the details of any problems
encountered.
To reproduce the problem, or check to see if it is resolved, run the following command:
Net use \\servername\ipc$ /u:<account> <password>
Requirements for joining a domain:
The client computer must be able to resolve the ip address for a DC
The client computer must be able to exchange traffic with the DC on several
different TCP and UDP ports:
o TCP port 135 for RPC traffic
o TCP Port 389 and UDP port 389 for LDAP traffic
o TCP port 636 for LDAP over SSL traffic
o TCP port 3268 for LDAP Global Catalog traffic
o TCP port 3269 for LDAP GC SSL traffic
o TCP port 53 and UDP port 53 for DNS traffic
o TCP port 88 and UDP port 88 for Kerberos traffic
o TCP port 445 for SMB
The administrator must have privileges to add a computer to a domain
o Must have the Add Workstations to Domain user right
The computer must be running Windows 7 Pro, Ultimate, or Enterprise.
o How to troubleshoot Network Discovery
Network Discovery turned off by default on Public network types
On a domain, Network Discovery is controlled with GP, but is disabled by default
To troubleshoot Network Discovery:
Verify that the Function Discovery Provider Host service is running
Very that Windows Firewall has exceptions for Network Discovery
Change the type of network from Public to Private.
o How to troubleshoot file and printer sharing
Appendix F
Identify the following information about the stop error to begin troubleshooting
o Stop Error Number -
o Stop Error Parameters
o Driver Information
Memory Dump Files
o Windows writes the information to the pagefile on the %SystemRoot% drive by default.
o Types of dump files:
Small Dump file
Also known as minidumps, contain the least amount of info possible.
These are stored in the %SystemRoot%\MiniDump director, rather than at the
root of the drive.
A small dump file is always created, even if a Kernel or Complete Dump file are
created. These can be used for WER or Debuggers
A small Memory Dump file includes the following:
o Stop Error information error number and additional parameters
o A list of running drivers identifies the modules in memory when the
stop error occurred.
o Processor context info for the process that has stopped includes the
proc and hardware state, performance counters, multiprocessor
packet information, deferred procedure call information, and
interrupts.
o Kernel context information for the process that has stopped include
offset of the directory table and the page frame number database,
which describes the state of every physical page in memory.
o Kernel context information for the thread that has stopped identifies
registers and IRQLs and includes pointers to OS data structures.
o Kernel mode call stack info for the thread that stopped Consists of a
series of memory locations and includes a pointer to the initial
location. Developers might be able to use this information to track the
source of the error.
A small dump file requires a paging file of at least 2 MB on the boot volume.
Kernel Dump File
Record the contents of kernel memory
These are the type of dump file created by default.
Records only kernel memory and can occupy several megabytes of disk space.
Contains more information than a small memory dump file
Complete Dump file
Record the complete contents of physical memory. The size of this file will be
slightly larger than the amount of physical RAM installed.
Sometimes referred to as a full dump file
o Using dump files to analyze stop errors
You can use WER to upload dump files to Microsoft, or you can view them using the
Microsoft Kernel Debugger (kd.exe), or Microsoft WinDbg Debugger (WinDbg.exe)
You can also view information about the stop error in the System Log of Event Viewer.
o Using Windows Error Reporting
After a stop error occurs, Windows displays the Windows has recovered from an
unexpected shutdown dialog box. To view the stop error code, operating system
information, and dump file locations, click View Problem Details.
You can also select Check for Solution to submit the dump file to Microsoft.
Being prepared for stop errors
o Prevent System restarts after a stop error
Can be done from the Advanced System Settings
o Record and Save stop message information
o Check Software Disk Space Requirements
o Install a Kernel Debugger and Symbol Files
Miscellaneous