INTRODUCTION

Not too many years ago, information technology professionals faced a serious

 

challenge in controlling the mounting costs of mainframe use. It seemed that

 

everyone— clerks, writers, developers, and systems administrators— all had

 

terminals and were using the system for everything from numbers crunching to

 

typing letters. Networks became bogged down, and IT professionals were given

 

the task of getting “nonessential operations”off the mainframe. Their decision

 

was to deploy personal computers in the enterprise— with emulation software for

 

mainframe access and local software for tasks where central processing or data

 

sharing were not required. Gradually, as PCs became more powerful, more and

 

more operations moved to the desktop. And as PC networking matured, many

 

businesses found that a PC-based network built on commodity hardware and

 

off-the-shelf software was their best business solution.

 

Lately, however, we’ve come full circle on this. It seems that the total cost of

 

ownership (or TCO)— the real cost of maintaining a distributed personal com-

 

puter network— is far from trivial. TCO includes the initial capital cost of

 

hardware and software, deployment and configuration expense, costs associ-

 

ated with deploying hardware and software updates, training and retraining,

 

day-to-day maintenance and administration, and telephone and on-site techni-

 

cal support. With these escalating costs in mind, Microsoft and others are

 

working together on several initiatives to lower the total cost of ownership of

 

personal computers.

 

TCO and the User

 

One of the major costs highlighted in recent reports on Total Cost of Owner-

 

ship (TCO), is lost productivity at the desktop caused by user error, such as

 

changing the system configuration and rendering the computer unworkable, or

 

system distractions and complexities, for example too many features or nones-

 

sential applications installed on the desktop. To solve these problems, system

 

administrators need a means to control a user’s access to key configuration

 

files and to features and applications that are not required to do that user’s

 

particular job. To be successful, this means of control must be flexible and

 

customizable— the system administrator must be able to control the computer

 

configurations of individuals and groups of users based on user job responsi-

 

bilities and computer literacy.

 

Profiles, Policies, and the Zero Administration Kit

 

The Zero Administration Kit (ZAK) for the Microsoft Windows NT® version 4.0

 

operating system is designed to help the corporate administrator address

 

some of the issues arising from user operations. ZAK is a set of methodologies

 

for deploying Microsoft Windows NT 4.0 that greatly reduces the burden of

 

individual desktop management for task-based workers. With ZAK, system

 

administrators can establish user profiles, system policies, and security to re-

 

duce some of the administrative costs associated with managing end-users in

 

an enterprise network.

 

ZAK’s methodologies are based on the underlying technologies and capa-

Microsoft Windows NT Server White Paper

1

Page 9
Image 9
Microsoft Windows NT 4.0 manual Introduction, TCO and the User, Profiles, Policies, and the Zero Administration Kit

Windows NT 4.0 specifications

Microsoft Windows NT 4.0, released on July 29, 1996, marked a significant milestone in the evolution of Microsoft's operating systems. As the successor to Windows NT 3.51, this version brought a range of enhancements and features that appealed to both enterprise users and consumers.

One of the standout characteristics of Windows NT 4.0 was its introduction of the Windows 95 user interface, which significantly improved user experience and accessibility. This graphical interface made it easier for users to navigate the operating system, transitioning from the more complex interfaces of previous NT versions. The integration of familiar elements such as the Start menu and taskbar helped bridge the gap between professional and personal computing environments.

Windows NT 4.0 was built on a robust and secure architecture. It utilized the NT kernel, which provided improved multitasking and stability compared to its predecessors. This operating system was designed to handle multiple user sessions simultaneously, making it suitable for servers as well as workstations. The inherent stability of NT 4.0 made it a favorite in enterprise environments, particularly for critical applications and systems.

Another defining feature of NT 4.0 was its support for a wide range of hardware, making it versatile across various machine configurations. It included compatibility with numerous devices and peripherals, which facilitated its adoption in diverse settings.

In addition to user interface enhancements and hardware compatibility, Windows NT 4.0 introduced powerful networking capabilities. The operating system supported TCP/IP natively, alongside NetBEUI and IPX/SPX protocols. This meant that it could seamlessly integrate into existing network environments, providing essential services for file and printer sharing, domain management, and remote access through features like Remote Access Service (RAS).

Security was another key focus area for Windows NT 4.0. Built around security principles, it employed a discretionary access control system, allowing administrators to define user permissions and manage access to resources effectively. This was particularly appealing to businesses that needed to enforce strict security policies.

Windows NT 4.0 also included improved support for backup and recovery, through the inclusion of the NT Backup utility. The operating system allowed for the creation of scheduled backups and simplified data recovery processes, enhancing data integrity and reliability.

As NT 4.0 entered its later years, it laid the groundwork for future Windows operating systems, influencing the design of later versions, particularly Windows 2000. It combined user-friendly features with enterprise-level robustness, ultimately shaping expectations for modern operating systems across various industries.