Windows Vista Service Pack 1 Test Focus Document




Download 0,7 Mb.
bet3/14
Sana26.12.2019
Hajmi0,7 Mb.
#5325
1   2   3   4   5   6   7   8   9   ...   14

Contents


Windows Vista Service Pack 1 Test Focus Document 1

Abstract 1

Contents 3

Windows Vista Service Pack 1 Test Focus Document 15

Scope of this document 15

Changes to Setup 16

Key Scenarios 16

Scenario 1 – Test the Windows Vista SP1 installation on different kinds of hardware 16

Goal of the scenario: 16

Prerequisites or specific configuration for the scenario: 16

Step-by-step scenario description: 16

Scenario 2 – Test the Windows Vista SP1 installation and uninstall 17

Goal of the scenario: 17

Prerequisites or specific configuration for the scenario: 17

Step-by-step scenario description: 17

Scenario 3 – Test the Windows Vista System Restore functionality after installing Windows Vista SP1 17

Goal of the scenario: 17

Prerequisites or specific configuration for the scenario: 17

Step-by-step scenario description: 17

Desktop Shell 18

Quality improvements in Desktop Shell 18

Key Scenarios 18

Scenario 1 – Multiple users viewing the same pictures on a network share: 18

Prerequisites or specific configuration for the scenario: 18

Step-by-step scenario description: 18

Known Issues for scenarios 19

Copy Engine Performance Improvements 19

Scenario 1 - Extract a Large File From a Zip Folder: 19

Goal: 19

Prerequisites or specific configuration for the scenario: 19

Step-by-step scenario description: 19

Expected results: 19

Exceptions: 19

Scenario 2 - Move a large number of files/folders on the same volume: 19

Goal: 19

Prerequisites or specific configuration for the scenario: 19

Step-by-step scenario description: 19

Expected results: 20

Exceptions: 20

Scenario 3 - Copy a large file over the network: 20

Goal: 20

Prerequisites or specific configuration for the scenario: 20

Step-by-step scenario description: 20

Expected results: 20

Exceptions: 20

Scenario 4 - Copy a small set of local files on the same machine: 20

Goal: 20

Prerequisites or specific configuration for the scenario: 20

Step-by-step scenario description: 20

Expected results: 20

Exceptions: 21

Known Issues for scenarios 21

What’s New in Compressed Folders? 21

Who Should Use Compressed Folder feature enhancements? 21

Key Scenarios 21

Scenario 1 – Extract a large single file from a compressed folder 21

Goal of the scenario 21

Specific hardware requirements 21

Pre-requisites or specific configuration for the scenario 21

Expected results 21

Exceptions 22

Scenario 2 – Extract several small files from a compressed folder: 22

Goal of the scenario 22

Specific hardware requirements 22

Pre-requisites or specific configuration for the scenario 22

Step-by-step scenario description 22

Expected results 22

Exceptions 22

Known Issues for scenarios 22

File Systems 22

What’s New in File Systems 22

What is exFAT? 23

Who Should Use exFAT? 23

Benefits of exFAT 23

Key Scenarios 23

Scenario 1 – Format storage greater than 32GB in capacity: 23

Goal of the scenario: 23

Specific hardware requirement: 23

Prerequisites or specific configuration for the scenario: 23

Step-by-step scenario description: 23

Expected results: 23

Exceptions: 24

Scenario 2 – Use files greater than 4 GB in size: 24

Goal of the scenario: 24

Specific hardware requirement: 24

Prerequisites or specific configuration for the scenario: 24

Step-by-step scenario description: 24

Expected results: 24

Exceptions: 24

What’s New in NTFS? 24

Who Should Use NTFS feature enhancements? 24

Benefits of new features in NTFS 25

Key Scenarios 25

Scenario1: Check if saved data gets saved to disk 25

Scenario2: Check if saved data gets saved to disk on surprise removal 25

Scenario3: Verify that an Eject of removable media does not cause data loss 26

Scenario4: Verify that an Eject of removable media does not cause data loss 26

Scenario5: Verify that an Eject of removable media does not cause data loss unless user forces the issue 26

Known Issues for scenarios 27

Storage and Volume Management 27

What’s New in File Backup 27

Who should use File Backup feature enhancements? 27

Benefits of new features in Windows file backup 27

Key Scenarios 28

Scenario 1 – User with Administrator privilege creates full backup and restores all files to original location: 28

Goal of the scenario: 28

Specific hardware requirement: 28

Prerequisites or specific configuration for the scenario: 28

Step-by-step scenario description: 28

Expected results: 28

Exceptions: 28

Scenario 2 - User with Administrator privilege creates full and incremental backup then restores all files to original location: 28

Goal of the scenario: 28

Specific hardware requirement: 29

Prerequisites or specific configuration for the scenario: 29

Step-by-step scenario description: 29

Expected results: 29

Exceptions: 29

Scenario 3 – User #1 (Administrator) creates full backup and restores all files to alternate encrypted location encrypted by User #2 (Administrator) 29

Goal of the scenario: 29

Specific hardware requirement: 29

Prerequisites or specific configuration for the scenario: 29

Step-by-step scenario description: 29

Expected results: 30

Exceptions: 30

Scenario 4 – Decrypt the Dataset after backing it up, then create an incremental backup 30

Goal of the scenario: 30

Specific hardware requirement: 30

Prerequisites or specific configuration for the scenario: 30

Step-by-step scenario description: 30

Expected results: 30

Exceptions: 31

Scenario 5 – Admin user creates full and incremental backup, decrypts the data then restores all files to original location 31

Goal of the scenario: 31

Specific hardware requirement: 31

Prerequisites or specific configuration for the scenario: 31

Step-by-step scenario description: 31

Expected results: 31

Exceptions: 31

Clarifications: 31

What’s New in Disk Defragmenter? 33

Who should use Defrag feature enhancements? 33

Benefits of new features in Disk Defragmenter 33

Key Scenarios 34

Scenario 1 : Selective defragmentation of one or more volumes 34

Goal of the scenario: 34

Specific hardware requirement: 34

Prerequisites or specific configuration for the scenario: 34

Step-by-step scenario description: 34

Expected results: 34

Exceptions: 35

Scenario 2 : Cyclic Defragmentation of Volumes 35

Goal of the scenario: 35

Specific hardware requirement: 35

Prerequisites or specific configuration for the scenario: 35

Step-by-step scenario description: 35

Expected results: 35

Exceptions: 35

What Is MountMgr 35

What’s New in MountMgr 36

Who Should Use MountMgr feature enhancements? 36

Benefits of new features in MountMgr 36

Key Scenarios 37

Scenario 1 : Simple USB Volume removal/arrival 37

Scenario 2: Single Volume Map Network Share 37

Scenario 3: Multi-User Volume Map Network Share 37

Scenario 4: Multiple Volume Map Multiple Network Share 37

Microsoft Data Access Component (MDAC) 38

What’s New in MDAC 38

Who should use MDAC feature enhancements? 38

Benefits of new features in MDAC 38

Key Scenarios 38

Scenario 1 – ADO application migration from x86 to x64 38

User Profiles 38

What’s New in User Profiles 38

User Profile WMI Provider 38

Details of the User Profile WMI Provider 39

Who Should Use User Profile WMI Provider feature enhancements? 40

Benefits of new features in User Profile WMI Provider 40

Key Scenarios 40

Scenario 1 – List all User Profiles in a remote machine: 40

Goal of the scenario: 40

Prerequisites or specific configuration for the scenario 40

Step-by-step scenario description 41

Expected results 42

Scenario 2 – Delete a User Profile: 46

Goal of the scenario: 46

Prerequisites or specific configuration for the scenario 46

Step-by-step scenario description 46

Expected results 46

Scenario 3 - Change Roaming User Profile preference: 46

Goal of the scenario: 46

Prerequisites or specific configuration for the scenario 47

Step-by-step scenario description 47

To verify this change: 47

Expected results 48

Scenario 4 - Change User Profile Ownership: 48

Goal of the scenario: 48

Prerequisites or specific configuration for the scenario 48

Step-by-step scenario description 48

To verify this change: 48

Expected results 49

Additional Information – How to obtain a user’s SID 49

Optical Storage 49

What is IMAPI 2.0 49

What’s New in IMAPI 2.0 49

Who Should Use IMAPI2FS Multiboot Feature Enhancements? 50

Benefits of the new features in IMAPI 2.0 50

Key Scenarios 50

Scenario 1 – Create a single startup disk using the IMAPIv2 APIs 50

Goal of the scenario: 50

Specific hardware requirement: 50

Prerequisites or specific configuration for the scenario: 50

Step-by-step scenario description: 50

Expected results: 50

Exceptions: 51

Scenario 2 – Create a Multiboot Disk using the IMAPIv2 APIs 51

Goal of the scenario: 51

Specific hardware requirement: 51

Prerequisites or specific configuration for the scenario: 51

Step-by-step scenario description: 51

Expected results: 51

Limitations: 51

Networking 52

What Is Wireless management support for 802.11n? 52

What’s New in Wireless management support for 802.11n? 52

Radio type support in ‘Connect to a network’ dialog 52

Radio type support in netsh commands 52

Accurate 802.11n channel number 52

Who Should Use Wireless management support for 802.11n feature enhancements? 53

Benefits of new features in Wireless management support for 802.11n 53

Wireless Management support for 802.11n 53

Key Scenarios 53

Scenario 1 – Connecting to 802.11n network 53

Scenario 2 – Query supported radio type 53

Scenario 3 – Query Channel number 53

Known Issues for scenarios 53

What Is Network Diagnostics Framework? 54

What’s New in NDF 54

Who Should Use NDF enhancements? 54

Benefits of new features in NDF 54

Key Scenarios 54

Scenario 1 – Not Existing Server 54

Goal of the scenario: 54

Specific hardware requirement: 54

Prerequisites or specific configuration for the scenario: 54

Step-by-step scenario description 55

Expected results 55

Exceptions: 55

Scenario 2 – Existing Server but not existing share: 55

Goal of the scenario: 55

Specific hardware requirement: 55

Prerequisites or specific configuration for the scenario: 55

Step-by-step scenario description 55

Expected results 55

Exceptions: 55

Scenario 3 – Almost Right Share 55

Goal of the scenario: 55

Specific hardware requirement: 56

Prerequisites or specific configuration for the scenario: 56

Step-by-step scenario description 56

Expected results 56

What Is DNS suffix search list through DHCPv6? 56

What’s New in DNS suffix search list through DHCPv6 56

Who Should Use DNS suffix search list through DHCPv6 feature enhancements? 56

Benefits of new features in DNS suffix search list through DHCPv6 56

Key Scenarios 57

Scenario 1 – Only one domain suffix configured for option 24 57

Goal of the scenario 57

Prerequisites or specific configuration for the scenario 57

Step-by-step scenario description 57

Expected results 57

Scenario 2 – Multiple domain suffixes configured for option 24 58

Goal of the scenario 58

Prerequisites or specific configuration for the scenario 58

Step-by-step scenario description 58

Expected results 58

Exceptions 58

What Is Single Sign On for Wired Networks? 59

What’s New in Wired SSO? 59

Who Should Use Wired SSO feature enhancements? 59

Benefits of new features in Wired SSO 60

Key Scenarios 60

Scenario 1 – SSO over Wired: 60

Step-by-step scenario description 60

Scenario 2 - Change Password over SSO 60

Step-by-step scenario description 61

Scenario 3 - The ability to correct a wrong password entered for SSO 61

Step-by-step scenario description 61

Known Issues for scenarios 61

A-1: Wired SSO Profile 61

A-2 : Wireless SSO Profile 62

Secure Socket Tunneling Protocol (SSTP) and Secure Remote Access (SRA) 64

What is SSTP 64

What’s New in SSTP 64

Who Should Use SSTP? 65

Benefits of new features in SSTP 65

Key Scenarios 66

PERSONAS 66

Remote Access User 67

CorpNet VPN Access Scenario 67

Inside Corp (single user, managed computer, secured environment) 67

Outside Corp – at home (single-user, managed computer, unsecured environment) 67

Outside Corp – at home (multi-user, unmanaged computer, unsecured environment) 68

Known Issues for scenarios 68

Network Access Protection 68

What Is NAP Client 68

What’s New in NAP Client 69

Who Should Use NAP feature enhancements? 69

Benefits of new features in NAP Client 69

Key Scenarios 69

Scenario 1 - HRA discovery 69

Goal of the scenario 69

Specific hardware requirement 69

Prerequisites for the scenario 69

Specific configuration 70

Step-by-step scenario description 70

Expected results 70

Known Issues for scenarios 70

IPv4-IPv6-Coexistence-Migration 70

What is IPv4-IPv6-Coexistence-Migration? 70

What’s New in IPv4-IPv6-Coexistence-Migration 71

Who should use IPv4-IPv6-Coexistence-Migration feature enhancements? 71

Benefits of new features in IPv4-IPv6-Coexistence-Migration 71

Key scenarios for Port Preservation for Teredo 71

Scenario 1 – Port Preserving Symmetric NAT to Port Preserving Symmetric NAT: 71

Goal 71

Hardware requirements 71



Configuration 71

Steps: 72

Expected results 72

Scenario 2 – Port Preserving Symmetric NAT to Port Restricted NAT: 72

Known issues for scenarios 72

Multihoming 72

What Is Multihoming? 72

What’s New in Multihoming 72

Scenario: 72

Known Issues for scenarios 73

BitLocker Data Volume Support 73

What Is BitLocker Data Volume Support? 73

What’s New in BitLocker Data Volume Support? 73

Who Should Use BitLocker Data Volume Support feature enhancements? 74

Benefits of new features in BitLocker Data Volume Support 74

Key Scenarios 74

Scenario 1 – Protect all data volumes 74

Goal 74


Specific hardware requirement 74

Prerequisites or specific configuration for the scenario 75

Step-by-step scenario description 75

Expected results 75

Scenario 2 – Protect one particular data volume 75

Goal 75


Specific hardware requirement 75

Prerequisites or specific configuration for the scenario 75

Step-by-step scenario description 75

Expected results 75

Scenario 3 – Data volume is automatically unlocked 76

Goal 76


Specific hardware requirement 76

Prerequisites or specific configuration for the scenario 76

Step-by-step scenario description 76

Expected results 76

Known Issues for scenarios 76

BitLocker TPM+USB+Pin authentication 76

What Is BitLocker TPM+USB+Pin Authentication? 76

What’s New in BitLocker TPM+USB+Pin Authentication? 77

Who Should Use BitLocker TPM+USB+Pin Authentication feature enhancements? 77

Benefits of new features in BitLocker TPM+USB+Pin Authentication 77

Key Scenarios 78

Scenario 1 – Protect the machine using 3-factor authentication: 78

Goal 78

Specific hardware requirement 78



Prerequisites or specific configuration for the scenario 78

Step-by-step scenario description 78

Expected results 78

Known Issues for scenarios 78

CAPI2 Revocation 78

What Is CAPI2 Revocation? 78

What’s New in CAPI2 Revocation? 79

Who Should Use CAPI2 Revocation feature enhancements? 79

Benefits of new features in CAPI2 Revocation 79

Key Scenarios 79

Scenario 1 – Specify OCSP download locations 80

Goal of the scenario: 80

Specific hardware requirement: 80

Prerequisites or specific configuration for the scenario: 80

Step-by-step scenario description: 80

Expected results: 81

Exceptions 81

Scenario 2 – Use internal OCSP responder when firewall policies prevent network retrieval for revocation checking: 81

Goal of the scenario: 81

Specific hardware requirement: 81

Prerequisites or specific configuration for the scenario: 81

Step-by-step scenario description 81

Expected results: 82

Exceptions 82

Scenario 3 - Check revocation using OCSP when OCSP signer certificate chains up to a different root than the root for the end entity certificate 82

Goal of the scenario: 82

Prerequisites or specific configuration for the scenario: 83

Step-by-step scenario description: 83

Expected results 83

Exceptions 83

Known Issues for scenarios 83

Print - Remote Install and Cluster support for Web Services on Devices (WSD) Printers 83

What is WSD Remote Install and Cluster Support? 83

Key Scenarios 84

Scenario 1 – Add a WSD printer on a remote standalone server 84

Goal 84


Prerequisites or specific configuration for the scenario 84

Step-by-step scenario description 85

Expected results 85

Known Issues for scenarios 85

Scenario 2 – Add a WSD printer on a Cluster print server 85

Goal 85


Prerequisites or specific configuration for the scenario 85

Step-by-step scenario description 85

Expected results 86

Known Issues for scenarios 86

Terminal Server 86

What Is Remote Desktop Protocol (RDP) File Signing? 86

What’s New in RDP File Signing? 86

Who Should Use RDP File Signing feature? 87

Benefits of new features in RDP File Signing 87

Prerequisites or specific configuration for the scenario 87

Key Scenarios 87

Scenario 1 – Allow Trusted Files Only: 88

Goal: 88

Step-by-step scenario description: 88

Expected results: 88

Exceptions: 88

Scenario 2 – Allow Signed Files Only 89

Goal: 89


Step-by-step scenario description: 89

Expected results: 89

Exceptions: 89

Scenario 3 – Allow Unsigned Files if policy permits: 89

Goal: 89

Step-by-step scenario description: 89

Expected results: 90

Exceptions: 90

Scenario 4 – Disallow Blocked Files: 90

Goal: 90


Step-by-step scenario description: 90

Expected results: 90

Exceptions: 90

Known Issues for scenarios 90

Notes: 90




Download 0,7 Mb.
1   2   3   4   5   6   7   8   9   ...   14




Download 0,7 Mb.

Bosh sahifa
Aloqalar

    Bosh sahifa



Windows Vista Service Pack 1 Test Focus Document

Download 0,7 Mb.