Windows 7 RTM review

Windows 7 is ready for the PC manufacturers, but is RTM ready for business?

In control

Microsoft's PowerShell 2.0 systems management scripting language is built into Windows 7; use it to build management scripts that work with your user's PCs, taking advantage of the scripting editor and test environment, and a selection of Windows 7-specific cmdlets (pronounced "command-let" ) including tools for getting and installing hotfixes. PowerShell 2.0 enables remote management of several PCs, so system managers can build and test their PowerShell scripts on their desktops before deploying and running them on all their managed Windows 7 PCs, delivering the results to their own PCs as well.

Windows 7's troubleshooting tools use PowerShell scripts to handle common issues. There's a gallery of common troubleshooting packs in the Control Panel, and the Action Center can launch them automatically if there is one available to help solve problems Windows has detected, which should reduce helpdesk calls.

Microsoft will make new troubleshooting packs available online, and you can use the downloadable Trouble Shooting Pack Builder to edit your own troubleshooting scripts for applications running on your network and bundle them up for distribution to your users. Users get a Problem Steps Reporter to describe problems troubleshooters can't help with; you can use it for documenting processes for training too.

Business PCs aren't places where just any pieces of software should be installed. As business tools they need to be controlled but by policy, not by locking down every machine. Windows 7's AppLocker builds on Microsoft's existing Software Restriction policies to control who can install what and where. You can lock software down by executable and by installer. Once an application has been approved, you can restrict to a specific version number or a base version, so users can upgrade when newer releases or updates arrive. Rules are easy to build, using GPEDIT on a Windows 7 PC, with sliders controlling the level of control from publisher, to product name, to file name to version.

Featured Resources

Consumer choice and the payment experience

A software provider's guide to getting, growing, and keeping customers

Download now

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security

Download now

Business in the new economy landscape

How we coped with 2020 and looking ahead to a brighter 2021

Download now

How to increase cyber resilience within your organisation

Cyber resilience for dummies

Download now

Recommended

Splunk debuts a new suite of cloud security solutions
Security

Splunk debuts a new suite of cloud security solutions

22 Jun 2021
Nvidia Jetson chips make IoT devices vulnerable to attack
vulnerability

Nvidia Jetson chips make IoT devices vulnerable to attack

22 Jun 2021
Cryptocurrency crimes have increased 12-fold since 2016
cryptocurrencies

Cryptocurrency crimes have increased 12-fold since 2016

22 Jun 2021
University Medical Center Mainz taps IBM to secure health care data
cloud security

University Medical Center Mainz taps IBM to secure health care data

21 Jun 2021

Most Popular

How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

16 Jun 2021
What is HTTP error 400 and how do you fix it?
Network & Internet

What is HTTP error 400 and how do you fix it?

16 Jun 2021
Ten-year-old iOS 4 recreated as an iPhone app
iOS

Ten-year-old iOS 4 recreated as an iPhone app

10 Jun 2021