Windows Vista Service Pack 1 Test Focus Document 1
Abstract 1
Contents 3
Windows Vista Service Pack 1 Test Focus Document 15
Scope of this document 15
Changes to Setup 16
Key Scenarios 16
Scenario 1 – Test the Windows Vista SP1 installation on different kinds of hardware 16
Goal of the scenario: 16
Prerequisites or specific configuration for the scenario: 16
Step-by-step scenario description: 16
Scenario 2 – Test the Windows Vista SP1 installation and uninstall 17
Goal of the scenario: 17
Prerequisites or specific configuration for the scenario: 17
Step-by-step scenario description: 17
Scenario 3 – Test the Windows Vista System Restore functionality after installing Windows Vista SP1 17
Goal of the scenario: 17
Prerequisites or specific configuration for the scenario: 17
Step-by-step scenario description: 17
Desktop Shell 18
Quality improvements in Desktop Shell 18
Key Scenarios 18
Scenario 1 – Multiple users viewing the same pictures on a network share: 18
Prerequisites or specific configuration for the scenario: 18
Step-by-step scenario description: 18
Known Issues for scenarios 19
Copy Engine Performance Improvements 19
Scenario 1 - Extract a Large File From a Zip Folder: 19
Goal: 19
Prerequisites or specific configuration for the scenario: 19
Step-by-step scenario description: 19
Expected results: 19
Exceptions: 19
Scenario 2 - Move a large number of files/folders on the same volume: 19
Goal: 19
Prerequisites or specific configuration for the scenario: 19
Step-by-step scenario description: 19
Expected results: 20
Exceptions: 20
Scenario 3 - Copy a large file over the network: 20
Goal: 20
Prerequisites or specific configuration for the scenario: 20
Step-by-step scenario description: 20
Expected results: 20
Exceptions: 20
Scenario 4 - Copy a small set of local files on the same machine: 20
Goal: 20
Prerequisites or specific configuration for the scenario: 20
Step-by-step scenario description: 20
Expected results: 20
Exceptions: 21
Known Issues for scenarios 21
What’s New in Compressed Folders? 21
Who Should Use Compressed Folder feature enhancements? 21
Key Scenarios 21
Scenario 1 – Extract a large single file from a compressed folder 21
Goal of the scenario 21
Specific hardware requirements 21
Pre-requisites or specific configuration for the scenario 21
Expected results 21
Exceptions 22
Scenario 2 – Extract several small files from a compressed folder: 22
Goal of the scenario 22
Specific hardware requirements 22
Pre-requisites or specific configuration for the scenario 22
Step-by-step scenario description 22
Expected results 22
Exceptions 22
Known Issues for scenarios 22
File Systems 22
What’s New in File Systems 22
What is exFAT? 23
Who Should Use exFAT? 23
Benefits of exFAT 23
Key Scenarios 23
Scenario 1 – Format storage greater than 32GB in capacity: 23
Goal of the scenario: 23
Specific hardware requirement: 23
Prerequisites or specific configuration for the scenario: 23
Step-by-step scenario description: 23
Expected results: 23
Exceptions: 24
Scenario 2 – Use files greater than 4 GB in size: 24
Goal of the scenario: 24
Specific hardware requirement: 24
Prerequisites or specific configuration for the scenario: 24
Step-by-step scenario description: 24
Expected results: 24
Exceptions: 24
What’s New in NTFS? 24
Who Should Use NTFS feature enhancements? 24
Benefits of new features in NTFS 25
Key Scenarios 25
Scenario1: Check if saved data gets saved to disk 25
Scenario2: Check if saved data gets saved to disk on surprise removal 25
Scenario3: Verify that an Eject of removable media does not cause data loss 26
Scenario4: Verify that an Eject of removable media does not cause data loss 26
Scenario5: Verify that an Eject of removable media does not cause data loss unless user forces the issue 26
Known Issues for scenarios 27
Storage and Volume Management 27
What’s New in File Backup 27
Who should use File Backup feature enhancements? 27
Benefits of new features in Windows file backup 27
Key Scenarios 28
Scenario 1 – User with Administrator privilege creates full backup and restores all files to original location: 28
Goal of the scenario: 28
Specific hardware requirement: 28
Prerequisites or specific configuration for the scenario: 28
Step-by-step scenario description: 28
Expected results: 28
Exceptions: 28
Scenario 2 - User with Administrator privilege creates full and incremental backup then restores all files to original location: 28
Goal of the scenario: 28
Specific hardware requirement: 29
Prerequisites or specific configuration for the scenario: 29
Step-by-step scenario description: 29
Expected results: 29
Exceptions: 29
Scenario 3 – User #1 (Administrator) creates full backup and restores all files to alternate encrypted location encrypted by User #2 (Administrator) 29
Goal of the scenario: 29
Specific hardware requirement: 29
Prerequisites or specific configuration for the scenario: 29
Step-by-step scenario description: 29
Expected results: 30
Exceptions: 30
Scenario 4 – Decrypt the Dataset after backing it up, then create an incremental backup 30
Goal of the scenario: 30
Specific hardware requirement: 30
Prerequisites or specific configuration for the scenario: 30
Step-by-step scenario description: 30
Expected results: 30
Exceptions: 31
Scenario 5 – Admin user creates full and incremental backup, decrypts the data then restores all files to original location 31
Goal of the scenario: 31
Specific hardware requirement: 31
Prerequisites or specific configuration for the scenario: 31
Step-by-step scenario description: 31
Expected results: 31
Exceptions: 31
Clarifications: 31
What’s New in Disk Defragmenter? 33
Who should use Defrag feature enhancements? 33
Benefits of new features in Disk Defragmenter 33
Key Scenarios 34
Scenario 1 : Selective defragmentation of one or more volumes 34
Goal of the scenario: 34
Specific hardware requirement: 34
Prerequisites or specific configuration for the scenario: 34
Step-by-step scenario description: 34
Expected results: 34
Exceptions: 35
Scenario 2 : Cyclic Defragmentation of Volumes 35
Goal of the scenario: 35
Specific hardware requirement: 35
Prerequisites or specific configuration for the scenario: 35
Step-by-step scenario description: 35
Expected results: 35
Exceptions: 35
What Is MountMgr 35
What’s New in MountMgr 36
Who Should Use MountMgr feature enhancements? 36
Benefits of new features in MountMgr 36
Key Scenarios 37
Scenario 1 : Simple USB Volume removal/arrival 37
Scenario 2: Single Volume Map Network Share 37
Scenario 3: Multi-User Volume Map Network Share 37
Scenario 4: Multiple Volume Map Multiple Network Share 37
Microsoft Data Access Component (MDAC) 38
What’s New in MDAC 38
Who should use MDAC feature enhancements? 38
Benefits of new features in MDAC 38
Key Scenarios 38
Scenario 1 – ADO application migration from x86 to x64 38
User Profiles 38
What’s New in User Profiles 38
User Profile WMI Provider 38
Details of the User Profile WMI Provider 39
Who Should Use User Profile WMI Provider feature enhancements? 40
Benefits of new features in User Profile WMI Provider 40
Key Scenarios 40
Scenario 1 – List all User Profiles in a remote machine: 40
Goal of the scenario: 40
Prerequisites or specific configuration for the scenario 40
Step-by-step scenario description 41
Expected results 42
Scenario 2 – Delete a User Profile: 46
Goal of the scenario: 46
Prerequisites or specific configuration for the scenario 46
Step-by-step scenario description 46
Expected results 46
Scenario 3 - Change Roaming User Profile preference: 46
Goal of the scenario: 46
Prerequisites or specific configuration for the scenario 47
Step-by-step scenario description 47
To verify this change: 47
Expected results 48
Scenario 4 - Change User Profile Ownership: 48
Goal of the scenario: 48
Prerequisites or specific configuration for the scenario 48
Step-by-step scenario description 48
To verify this change: 48
Expected results 49
Additional Information – How to obtain a user’s SID 49
Optical Storage 49
What is IMAPI 2.0 49
What’s New in IMAPI 2.0 49
Who Should Use IMAPI2FS Multiboot Feature Enhancements? 50
Benefits of the new features in IMAPI 2.0 50
Key Scenarios 50
Scenario 1 – Create a single startup disk using the IMAPIv2 APIs 50
Goal of the scenario: 50
Specific hardware requirement: 50
Prerequisites or specific configuration for the scenario: 50
Step-by-step scenario description: 50
Expected results: 50
Exceptions: 51
Scenario 2 – Create a Multiboot Disk using the IMAPIv2 APIs 51
Goal of the scenario: 51
Specific hardware requirement: 51
Prerequisites or specific configuration for the scenario: 51
Step-by-step scenario description: 51
Expected results: 51
Limitations: 51
Networking 52
What Is Wireless management support for 802.11n? 52
What’s New in Wireless management support for 802.11n? 52
Radio type support in ‘Connect to a network’ dialog 52
Radio type support in netsh commands 52
Accurate 802.11n channel number 52
Who Should Use Wireless management support for 802.11n feature enhancements? 53
Benefits of new features in Wireless management support for 802.11n 53
Wireless Management support for 802.11n 53
Key Scenarios 53
Scenario 1 – Connecting to 802.11n network 53
Scenario 2 – Query supported radio type 53
Scenario 3 – Query Channel number 53
Known Issues for scenarios 53
What Is Network Diagnostics Framework? 54
What’s New in NDF 54
Who Should Use NDF enhancements? 54
Benefits of new features in NDF 54
Key Scenarios 54
Scenario 1 – Not Existing Server 54
Goal of the scenario: 54
Specific hardware requirement: 54
Prerequisites or specific configuration for the scenario: 54
Step-by-step scenario description 55
Expected results 55
Exceptions: 55
Scenario 2 – Existing Server but not existing share: 55
Goal of the scenario: 55
Specific hardware requirement: 55
Prerequisites or specific configuration for the scenario: 55
Step-by-step scenario description 55
Expected results 55
Exceptions: 55
Scenario 3 – Almost Right Share 55
Goal of the scenario: 55
Specific hardware requirement: 56
Prerequisites or specific configuration for the scenario: 56
Step-by-step scenario description 56
Expected results 56
What Is DNS suffix search list through DHCPv6? 56
What’s New in DNS suffix search list through DHCPv6 56
Who Should Use DNS suffix search list through DHCPv6 feature enhancements? 56
Benefits of new features in DNS suffix search list through DHCPv6 56
Key Scenarios 57
Scenario 1 – Only one domain suffix configured for option 24 57
Goal of the scenario 57
Prerequisites or specific configuration for the scenario 57
Step-by-step scenario description 57
Expected results 57
Scenario 2 – Multiple domain suffixes configured for option 24 58
Goal of the scenario 58
Prerequisites or specific configuration for the scenario 58
Step-by-step scenario description 58
Expected results 58
Exceptions 58
What Is Single Sign On for Wired Networks? 59
What’s New in Wired SSO? 59
Who Should Use Wired SSO feature enhancements? 59
Benefits of new features in Wired SSO 60
Key Scenarios 60
Scenario 1 – SSO over Wired: 60
Step-by-step scenario description 60
Scenario 2 - Change Password over SSO 60
Step-by-step scenario description 61
Scenario 3 - The ability to correct a wrong password entered for SSO 61
Step-by-step scenario description 61
Known Issues for scenarios 61
A-1: Wired SSO Profile 61
A-2 : Wireless SSO Profile 62
Secure Socket Tunneling Protocol (SSTP) and Secure Remote Access (SRA) 64
What is SSTP 64
What’s New in SSTP 64
Who Should Use SSTP? 65
Benefits of new features in SSTP 65
Key Scenarios 66
PERSONAS 66
Remote Access User 67
CorpNet VPN Access Scenario 67
Inside Corp (single user, managed computer, secured environment) 67
Outside Corp – at home (single-user, managed computer, unsecured environment) 67
Outside Corp – at home (multi-user, unmanaged computer, unsecured environment) 68
Known Issues for scenarios 68
Network Access Protection 68
What Is NAP Client 68
What’s New in NAP Client 69
Who Should Use NAP feature enhancements? 69
Benefits of new features in NAP Client 69
Key Scenarios 69
Scenario 1 - HRA discovery 69
Goal of the scenario 69
Specific hardware requirement 69
Prerequisites for the scenario 69
Specific configuration 70
Step-by-step scenario description 70
Expected results 70
Known Issues for scenarios 70
IPv4-IPv6-Coexistence-Migration 70
What is IPv4-IPv6-Coexistence-Migration? 70
What’s New in IPv4-IPv6-Coexistence-Migration 71
Who should use IPv4-IPv6-Coexistence-Migration feature enhancements? 71
Benefits of new features in IPv4-IPv6-Coexistence-Migration 71
Key scenarios for Port Preservation for Teredo 71
Scenario 1 – Port Preserving Symmetric NAT to Port Preserving Symmetric NAT: 71
Goal 71
Hardware requirements 71
Configuration 71
Steps: 72
Expected results 72
Scenario 2 – Port Preserving Symmetric NAT to Port Restricted NAT: 72
Known issues for scenarios 72
Multihoming 72
What Is Multihoming? 72
What’s New in Multihoming 72
Scenario: 72
Known Issues for scenarios 73
BitLocker Data Volume Support 73
What Is BitLocker Data Volume Support? 73
What’s New in BitLocker Data Volume Support? 73
Who Should Use BitLocker Data Volume Support feature enhancements? 74
Benefits of new features in BitLocker Data Volume Support 74
Key Scenarios 74
Scenario 1 – Protect all data volumes 74
Goal 74
Specific hardware requirement 74
Prerequisites or specific configuration for the scenario 75
Step-by-step scenario description 75
Expected results 75
Scenario 2 – Protect one particular data volume 75
Goal 75
Specific hardware requirement 75
Prerequisites or specific configuration for the scenario 75
Step-by-step scenario description 75
Expected results 75
Scenario 3 – Data volume is automatically unlocked 76
Goal 76
Specific hardware requirement 76
Prerequisites or specific configuration for the scenario 76
Step-by-step scenario description 76
Expected results 76
Known Issues for scenarios 76
BitLocker TPM+USB+Pin authentication 76
What Is BitLocker TPM+USB+Pin Authentication? 76
What’s New in BitLocker TPM+USB+Pin Authentication? 77
Who Should Use BitLocker TPM+USB+Pin Authentication feature enhancements? 77
Benefits of new features in BitLocker TPM+USB+Pin Authentication 77
Key Scenarios 78
Scenario 1 – Protect the machine using 3-factor authentication: 78
Goal 78
Specific hardware requirement 78
Prerequisites or specific configuration for the scenario 78
Step-by-step scenario description 78
Expected results 78
Known Issues for scenarios 78
CAPI2 Revocation 78
What Is CAPI2 Revocation? 78
What’s New in CAPI2 Revocation? 79
Who Should Use CAPI2 Revocation feature enhancements? 79
Benefits of new features in CAPI2 Revocation 79
Key Scenarios 79
Scenario 1 – Specify OCSP download locations 80
Goal of the scenario: 80
Specific hardware requirement: 80
Prerequisites or specific configuration for the scenario: 80
Step-by-step scenario description: 80
Expected results: 81
Exceptions 81
Scenario 2 – Use internal OCSP responder when firewall policies prevent network retrieval for revocation checking: 81
Goal of the scenario: 81
Specific hardware requirement: 81
Prerequisites or specific configuration for the scenario: 81
Step-by-step scenario description 81
Expected results: 82
Exceptions 82
Scenario 3 - Check revocation using OCSP when OCSP signer certificate chains up to a different root than the root for the end entity certificate 82
Goal of the scenario: 82
Prerequisites or specific configuration for the scenario: 83
Step-by-step scenario description: 83
Expected results 83
Exceptions 83
Known Issues for scenarios 83
Print - Remote Install and Cluster support for Web Services on Devices (WSD) Printers 83
What is WSD Remote Install and Cluster Support? 83
Key Scenarios 84
Scenario 1 – Add a WSD printer on a remote standalone server 84
Goal 84
Prerequisites or specific configuration for the scenario 84
Step-by-step scenario description 85
Expected results 85
Known Issues for scenarios 85
Scenario 2 – Add a WSD printer on a Cluster print server 85
Goal 85
Prerequisites or specific configuration for the scenario 85
Step-by-step scenario description 85
Expected results 86
Known Issues for scenarios 86
Terminal Server 86
What Is Remote Desktop Protocol (RDP) File Signing? 86
What’s New in RDP File Signing? 86
Who Should Use RDP File Signing feature? 87
Benefits of new features in RDP File Signing 87
Prerequisites or specific configuration for the scenario 87
Key Scenarios 87
Scenario 1 – Allow Trusted Files Only: 88
Goal: 88
Step-by-step scenario description: 88
Expected results: 88
Exceptions: 88
Scenario 2 – Allow Signed Files Only 89
Goal: 89
Step-by-step scenario description: 89
Expected results: 89
Exceptions: 89
Scenario 3 – Allow Unsigned Files if policy permits: 89
Goal: 89
Step-by-step scenario description: 89
Expected results: 90
Exceptions: 90
Scenario 4 – Disallow Blocked Files: 90
Goal: 90
Step-by-step scenario description: 90
Expected results: 90
Exceptions: 90
Known Issues for scenarios 90
Notes: 90