You are on page 1of 4

Windows XP Embedded Supplemental Toolkit

Table of Contents

I ACKNOWLEDGEMENTS........................................................................................................................3

II DEDICATION..............................................................................................................................................4

III SJJ EMBEDDED MICRO SOLUTIONS............................................................................................5

1 INTRODUCTION TO XPE SP2.............................................................................................................10


1.1 WHAT IS N EW IN XPE SP2...................................................................................................................10
1.2 SP1 VS. SP2 DATABASE .......................................................................................................................11
1.3 THINK ARCHITECTURE .........................................................................................................................11
1.4 DEPLOYMENT REVIEW .........................................................................................................................11
1.5 SOFTWARE REQUIREMENTS DEVELOPMENT ENVIRONMENT:............................................................13
1.6 HARDWARE REQUIREMENTS: ..............................................................................................................14
1.7 EXERCISE 101 – CREATE A PLATFORM MACRO COMPONENT ...........................................................14
1.8 NETWORK REQUIREMENTS ..................................................................................................................15
1.9 ABOUT THIS TOOLKIT AND THE TARGET AUDIENCE .........................................................................15
1.10 THE BOOK CD – XPES CD .................................................................................................................16
1.11 WEBSITE ...............................................................................................................................................16
2 USING VIRTUAL PC 2004 WITH XPE ...............................................................................................18
2.1 REQUIREMENTS ....................................................................................................................................18
2.2 EXERCISE 201 XPE AND VIRTUAL PC 2004 .......................................................................................18
2.3 ALTERNATIVE METHOD – NO D UAL BOOT ........................................................................................26
2.4 VIRTUAL PC RESOURCES AND CONCLUSION ......................................................................................27
3 SCRIPTING FOR EMBEDDED.............................................................................................................28
3.1 WINDOWS SCRIPT HOST AND VB SCRIPTING FOR EMBEDDED ..........................................................28
3.2 VB SCRIPTING BASICS .........................................................................................................................29
3.3 OBJECTS: P ROPERTIES AND METHODS ................................................................................................30
3.4 SCRIPTING COMPONENTS IN XPE ........................................................................................................31
3.5 EXERCISE 301 – VB SCRIPT WITH DUA .............................................................................................33
3.6 EXERCISE 302 – S TATIC TCP/IP..........................................................................................................38
3.7 EXERCISE 303 – REMOTE CONTROL AND MONITORING WITH WMI .................................................40
3.8 SCRIPTING RESOURCES ........................................................................................................................44
3.9 CONCLUSION ........................................................................................................................................44
4 ENHANCED WRITE FILTER (EWF) APIS .......................................................................................45
4.1 CONTROLLING EWF WITH THE EWF API S ET ...................................................................................45
4.2 EWF API ELEMENTS ...........................................................................................................................47
4.3 EXERCISE 401 EWF API EXAMPLE 1 – EWFCMD.EXE ..................................................................47
4.4 EXERCISE 402 EWF API EXAMPLE2 – EWFCTRL.EXE ..................................................................53
4.5 EXERCISE 403 CLONING AND EWF.....................................................................................................63
4.6 A EWF / .NET SOLUTION ....................................................................................................................67
4.7 EWF API APPLICATIONS AND S ECURITY ...........................................................................................71
4.8 EWF SUMMARY ...................................................................................................................................71
5 SHELL GAMES.........................................................................................................................................72
5.1 DIFFERENT S HELLS FOR DIFFERENT USERS ........................................................................................72
5.2 EXERCISE 501 TWO SHELLS & TWO LOCAL ACCOUNTS....................................................................73
5.3 LIMIT HOT KEY ACCESS ......................................................................................................................78
5.4 EXERCISE 502 TRAP HOT KEYS DEMO ...............................................................................................82
5.5 SUMMARY .............................................................................................................................................83

Copyright © 2005 SJJ Embedded Micro Solutions, LLC.


6 NEW FLASH SOLUTIONS.....................................................................................................................84
6.1 ANOTHER CF/EWF SOLUTION ............................................................................................................84
6.2 OTHER WRITE REDUCING TECHNIQUES..............................................................................................85
6.3 EWF PARTITION SIZES ........................................................................................................................86
6.4 EXERCISE 601 CF AND EWF NEW TECHNIQUE ..................................................................................87
6.5 EXERCISE 602 CF/EWF AND CLONING ...............................................................................................88
6.6 USB FLASH BOOT WITH M-S YSTEM’ S UDOC....................................................................................89
6.7 EXERCISE 603 BOOTING FROM M-SYSTEM’ S UDOC .........................................................................90
6.8 THE FUTURE OF FLASH – USB 2.0 FLASH, FINALLY! ........................................................................94
7 A LITTLE MORE FBA............................................................................................................................95
7.1 WHAT IS FBA, AGAIN? ........................................................................................................................95
7.2 WHAT IS GOING ON?.............................................................................................................................95
7.3 FBALOG.TXT AND THE FBA PHASES...............................................................................................98
7.4 EXERCISE 701 FBALOG.TXT ..........................................................................................................102
7.5 FBA DIRECTIVES ...............................................................................................................................102
7.6 SHUTDOWN AND REBOOT COMMANDS .............................................................................................103
7.7 COMMON ERRORS ..............................................................................................................................103
7.8 SUMMARY ...........................................................................................................................................105
8 SYSTEM MANAGEMENT SERVER ADVANCED CLIENT FOR XP EMBEDDED..............106
8.1 INTRODUCTION TO SMS FOR XPE .....................................................................................................106
8.2 SMS-XPEAC COMPONENTS .............................................................................................................107
8.3 EXERCISE 801 IMPLEMENTING THE SMS-XPEAC...........................................................................108
8.4 SMS VS. SUS VS. DUA .....................................................................................................................114
8.5 SUMMARY ...........................................................................................................................................115
9 SECURITY ...............................................................................................................................................116
9.1 RECOMMENDED XP E SECURITY TASKS ............................................................................................117
9.2 LOCAL P OLICIES .................................................................................................................................118
9.3 EXERCISE 901 ENABLE LOCAL POLICIES AND THE NSA GUIDE......................................................118
9.4 WINDOWS FIREWALL .........................................................................................................................122
9.5 EXERCISE 902 WORKING WITH THE WINDOWS FIREWALL ..............................................................123
9.6 INTERNET EXPLORER .........................................................................................................................125
9.7 EXERCISE 903 SET IE ZONES WITH REGISTRY KEYS .......................................................................130
9.8 VIRUS PROTECTION ............................................................................................................................132
9.9 DATA EXECUTION P REVENTION (DEP) ............................................................................................132
9.10 EWF API APPLICATIONS AND S ECURITY .........................................................................................132
9.11 SUMMARY ...........................................................................................................................................133
10 HIBERNATE ONCE, RESUME MANY.........................................................................................134
10.1 GENERALLY SPEAKING ......................................................................................................................134
10.2 HIBERNATION RESUME OVER AND OVER .........................................................................................134
10.3 EXERCISE 10.1 IMPLEMENTING HIBERNATE O NCE RESUME MANY ................................................135
10.4 SUMMARY ...........................................................................................................................................140
11 WIRELESS CONNECTIVITY.........................................................................................................141
11.1 802.11.................................................................................................................................................141
11.2 BLUETOOTH ........................................................................................................................................143
11.3 EXERCISE 1101 – EXPLORING 802.11 AND BLUETOOTH ..............................................................145
11.4 SUMMARY ...........................................................................................................................................152
12 SYSTEM UPDATE SERVICE..........................................................................................................153
12.1 SUS SUPPORT FOR XPE ......................................................................................................................153
12.2 EXERCISE 1201 IMPLEMENTING SUS FOR XP E ................................................................................156
12.3 SMS VS. SUS VS. DUA .....................................................................................................................167
12.4 LOOKING AHEAD................................................................................................................................167
13 EXTRA IDEAS ....................................................................................................................................169

Copyright © 2005 SJJ Embedded Micro Solutions, LLC.


13.1 EDITING THE REGISTRY HIVES FOR THE IMAGE BEFORE AND AFTER FBA....................................169
13.2 EXERCISE 1301 – EDITING THE REGISTRY ........................................................................................169
13.3 RAM DRIVER .....................................................................................................................................171
13.4 EXERCISE 1302 RAM DISK IMPLEMENTATION ................................................................................171
13.5 PORT TALK .........................................................................................................................................173
13.6 BOOT SCREENS ...................................................................................................................................173
13.7 DEFRAG SOLUTIONS ...........................................................................................................................173
13.8 ENVIRONMENT VARIABLES AND P ATHS ...........................................................................................173
13.9 BOOT.INI OPTIONS ..............................................................................................................................174
13.10 XPE P OWER MANAGEMENT API AND .NET.................................................................................177
13.11 GENERIC DEVICE DRIVER SUPPORT ..............................................................................................178
13.12 DUA SCRIPT ENGINE - DUASCRIPTGEN......................................................................................178
14 TIPS-N-TRICKS #2 ............................................................................................................................180
14.1 CONFIGURATION ISSUES ....................................................................................................................180
14.2 DEVICE UPDATE AGENT ....................................................................................................................182
14.3 EMBEDDED ENABLING FEATURES (EEF)..........................................................................................184
14.4 MISCELLANEOUS ................................................................................................................................185
14.5 MUI ....................................................................................................................................................189
15 COMPONENT TRACKER ...............................................................................................................190
15.1 WHAT COMPONENT TRACKER PROVIDES .........................................................................................190
15.2 HOW COMPONENT TRACKER WORKS ...............................................................................................190
15.3 COMPONENT TRACKER EXAMPLE .....................................................................................................190
15.4 SUMMARY ...........................................................................................................................................191
16 CONFIGURATION (SLX) TOOLS.................................................................................................193
16.1 SLXTOTXT........................................................................................................................................193
16.2 SLXD IFF.............................................................................................................................................194
16.3 THE XSL F ILE ....................................................................................................................................195
16.4 SUMMARY ...........................................................................................................................................195
17 COMPONENT HELPER...................................................................................................................196
17.1 THE THEORY BEHIND COMPONENT HELPER ....................................................................................196
17.2 A WORD ABOUT CREATING COMPONENTS .......................................................................................197
17.3 COMPONENT HELPER OPERATION .....................................................................................................197
17.4 WEEDING OUT THE RESULTS AND FINISHING THE COMPONENT .....................................................201
17.5 NOTES ABOUT THE REGISTRY ...........................................................................................................201
17.6 NOTES ON COMPONENT HELPER .......................................................................................................202
17.7 SUMMARY ...........................................................................................................................................202
A FULL XPPRO SP2 ..................................................................................................................................204
A.1 CONCEPT.............................................................................................................................................204
A.2 ARCHITECTURE ..................................................................................................................................204
A.3 IMPLEMENTATION ..............................................................................................................................206
B WINDOWS SERVER 2003 AND SMS SITE SERVER SETUP .....................................................207
B.1 DOMAIN CONTROLLER AND SMS SETUP GUIDE ..............................................................................207
C SECURITY FEATURES AND COMPONENTS...............................................................................236
C.1 AUTHENTICATION S UPPORT ..............................................................................................................236
C.2 AUTHORIZATION S UPPORT ................................................................................................................237
C.3 API SUPPORT ......................................................................................................................................238
C.4 FILE S YSTEM AND LOCAL ACCESS S ECURITY COMPONENTS ..........................................................238
C.5 NETWORK SECURITY COMPONENTS..................................................................................................240
C.6 WIRELESS SECURITY SUPPORT ..........................................................................................................240
C.7 SECURITY MANAGEMENT S UPPORT ..................................................................................................242
C.8 WINDOWS FIREWALL .........................................................................................................................243
C.9 USER ACCOUNTS ................................................................................................................................244

Copyright © 2005 SJJ Embedded Micro Solutions, LLC.


D BIBLIOGRAPHY....................................................................................................................................246
D.1 BOOKS ................................................................................................................................................246
D.2 MICROSOFT RESOURCES ....................................................................................................................246
D.3 ARTICLES ............................................................................................................................................247
E INDEX .......................................................................................................................................................248

Copyright © 2005 SJJ Embedded Micro Solutions, LLC.

You might also like