SlideShare a Scribd company logo
Windows 7: Client Performance
Jeff Stokes, Premier Field Engineer
FY12
2
Microsoft Confidential
Jeff Stokes is a Premier Field Engineer (4 years) with Microsoft (5 years). 19 years industry
experience.
Blogs at http://blogs.technet.com/b/jeff_stokes/
LinkedIn @ http://www.linkedin.com/in/jeffstokes
About the Presenter
Table of Contents
Client Performance, why it matters
Tools
Task Manager
– Resource Monitor
Perfmon Data Collector Sets
Event Logs and Reliability
Monitor
Sysinternals Tools
Windows Performance Toolkit
Network Stack Tracing
Troubleshooting
4
Microsoft Confidential
Client Performance – Why it matters
Troubleshooting
Tips and Tricks and Tools
Task Manager and
Resource Monitor
Everything you need to know quickly gauge
System Performance
7
Microsoft Confidential
Task Manager and Resource Monitor
What are we looking at?
• Running Applications
• Running Processes
• System Performance
• Network Performance
• User Session Status
• Service States
8
Microsoft Confidential
Task Manager and Resource Monitor
Applications - New Option!
Create Dump File
Creates a dump file at:
C:Users%username%AppDataLocalTemp
Semi-disruptive dump creation
Leaves process intact
9
Microsoft Confidential
Task Manager and Resource Monitor
Processes - New Options!
Open File Location (where was this run from)
Debug (for Visual Studio JIT debugging)
UAC Virtualization (for app compat)
Create Dump File
Creates a dump file at:
C:Users%username%AppDataLocalTemp
Semi-disruptive dump creation
Leaves process intact
10
Microsoft Confidential
Task Manager and Resource Monitor
Processes - New Column Options!
Memory – Working Set
Memory – Peak Working Set
Handles
Threads
11
Microsoft Confidential
Task Manager and Resource Monitor
Performance Tab, a look back at the past
“PF Usage”…
NOTHING to do
With the page file
NOR Paging Rate
Commit Charge (K)
What does this
mean?
12
Microsoft Confidential
Task Manager and Resource Monitor
Performance Tab, a look at the now
Memory
Answers the immortal -
“How much memory am I using?”
13
Microsoft Confidential
Task Manager and Resource Monitor
Networking
Utilization by interface graph
Easy to view enumeration
14
Microsoft Confidential
Task Manager and Resource Monitor
Users
Answers the questions:
Who is logged in?
Where are they logged in from?
Lets us disconnect (or logoff) their sessions.
15
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Where? Accessible via the Task Manager Performance Tab
And then clicking the “Resource Monitor” button
Or
Start “Resource Monitor” and enter
16
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Overview
“System Dashboard”
Deep data available on each
tab following Overview
17
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – CPU
CPU Usage Total
CPU Frequency
CPU by Process
What Handles?
What Modules?
18
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Memory
“My system is slow, I need more MEMORY!”
How much each system is consuming in RAM, What does our Physical Memory Map look like?
19
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Disk
Disk Usage, By Process. Answers the question “What does my process experience with
regards to disk performance?”
20
Microsoft Confidential
Task Manager and Resource Monitor
Resource Monitor – Network
Network Usage
By Process!
What does the process
experience in Latency?
Does the Firewall Interfere
OR
Filter the traffic of my process?
Perfmon Data Collector Sets
System Reporting Built-In!
22
Microsoft Confidential
Performance Monitor – System Data Collector Sets
How do we get to them?
23
Microsoft Confidential
Performance Monitor – System Data Collector Sets
What do they do?
The System Diagnostics Data Collector Set is
an excellent triage method to find out what the
Operating System thinks is wrong with the
System.
It is comprised of an ETL trace of NT Kernel,
many registry key and WMI queries, and a
Performance Monitor collection.
The data collector runs for 60 seconds and then
generates a report in the reports section.
To start one, right click and select “Run”
24
Microsoft Confidential
Performance Monitor – System Data Collector Sets
What do they report?
They analyze the system for issues.
CPU Load, Memory, Disk, Network.
Is the Hard Drive failing SMART?
What version of BIOS?
Failed Drivers?
Event Logs and Reliability Monitor
History and Patterns
26
Microsoft Confidential
Event Logs and Reliability Monitor
What’s new?
What’s new in 7 for Event Logs?
A lot.
We now log the 100 series of events.
In these events, we clock boot time.
And 200 series events clock shut
down time.
27
Microsoft Confidential
Event Logs and Reliability Monitor
What’s new?
Group Policy now has an
Operational Event Log.
Each GPO processed logs an
Event. No more guessing on cost
of Group Policy Processing!
28
Microsoft Confidential
Event Logs and Reliability Monitor
What’s new?
• Stricter Guidelines for Event Log information
• More meaningful to you
• Log Files now use the Event Viewer
• Previously, many log files in many formats
• XML Format
• Customizable Views
• Easier to organize
• Advanced Filtering
• Get to the relevant data more quickly
• No More Log Size Restrictions
• Limited only by disk space
• Admins can now subscribe to events on remote systems
29
Microsoft Confidential
Event Logs and Reliability Monitor
What’s new?
Scope Pane
Action Pane
View Pane
Sysinternals Tools
What to use when
31
Microsoft Confidential
Sysinternals Tools
What to use when
32
Microsoft Confidential
Sysinternals Tools
What to use when
33
Microsoft Confidential
Sysinternals Tools
What to use when
34
Microsoft Confidential
Sysinternals Tools
What to use when
35
Microsoft Confidential
Sysinternals Tools
What to use when
Windows Performance Toolkit
Xperf and its uses
37
Microsoft Confidential
Windows Performance Toolkit
Xperf
Xperf is a general reference to the collection of tools that make up the
Windows Performance Analysis toolset (WPA). These tools are disturbed
publicly as part of the Windows Performance Toolkit (WPT). The 3 main
components of the “Xperf kit” are:
XPERF.EXE Command line tracing tool
XPERFVIEW.EXE Visual trace analysis tool
XBOOTMGR.EXE Boot trace capture tool
We’ll take each tool for a test drive in a moment, but let’s explore the past and
what’s under the hood.
38
Microsoft Confidential
Windows Performance Toolkit
Xperf
By leveraging the power of the ETW model, we can capture metrics previously
unavailable outside of a debugger/instrumented code environment.
With this level of granularity, we can capture metrics like….
• All processes and threads in user mode and kernel mode
• Deferred procedure calls (DPCs) and interrupt service requests (ISRs)
• Scheduling
• Disk and file I/O
• Memory
• Network
It also helps analyze what the customer experiences:
• Catch the problem as it happens
• Capture anywhere, decode anywhere
• Integration with symbols
39
Microsoft Confidential
Windows Performance Toolkit
Xperf
So what does that all mean? Well… it means we can use a single tool to
tackle many of the most common problems for customers:
• Troubleshooting application behavior – High CPU, Handles, Etc.
• Gathers both usermode and kernel events at the same time
• Benchmark disk performance (or lack there of)
• Get a deep view into the entire boot/shutdown lifecycle
XPERF is incredibly powerful and can be leveraged for a wide range of
issues customers and engineers face daily.
42
Microsoft Confidential
Windows Performance Toolkit
BootVis (Xperf Predecessor)
43
Microsoft Confidential
Windows Performance Toolkit
Xperf
44
Microsoft Confidential
Windows Performance Toolkit
Xperf
45
Microsoft Confidential
Windows Performance Toolkit
Xperf
46
Microsoft Confidential
Windows Performance Toolkit
Xperf
Prefetch is functional
But
ReadyBoot is not
47
Microsoft Confidential
Windows Performance Toolkit
Xperf
Are we fragmented? A bit, the map above is a view of the disk head ‘hits’ over time
Red lines are the disk flushes
48
Microsoft Confidential
Windows Performance Toolkit
Xperf – Internet Explorer
49
Microsoft Confidential
Windows Performance Toolkit
Xperf - Demos
jDemo 1. Slower than expected logon for an engineering workstation.
Demo 2. Slower than expected boot times.
Demo 3. Slower than expected boot and logon times.
Demo 4. Slow boot on an SSD.
Demo 5. Slow boot and logon and post logon.
Network Stack Tracing
Netmon…sort of
51
Microsoft Confidential
Network Stack Tracing
Netsh
52
Microsoft Confidential
Network Stack Tracing
Netsh
53
Microsoft Confidential
Troubleshooting
Tools, Tips and Tricks new to 7
55
Microsoft Confidential
Troubleshooting
Action Center
• The Action Center combines alerts from these Windows 7
features:
• Windows Update
• User Account Control (UAC)
• Security Center
• Backup and Restore
• Problem Reports and Solutions
• Windows Defender
• Diagnostics
• Network Access Protection (NAP)
• Recovery
56
Microsoft Confidential
Troubleshooting
Action Center - Alerts
• May not appear
• May appear with just white flag
• Red X means important issues
57
Microsoft Confidential
Troubleshooting
Action Center - Settings
58
Microsoft Confidential
Troubleshooting
Action Center
59
Microsoft Confidential
Troubleshooting
Security
• The Security section of the Action Center Contains:
• Various configuration tasks for:
• Common tasks
• Most Important security configuration settings of the Windows 7
installation
60
Microsoft Confidential
Troubleshooting
Maintenance
• Action items and message for:
• Unreported Items
• Backup
• Windows Updates
• Troubleshooting and System Maintenance
61
Microsoft Confidential
Troubleshooting
Windows Troubleshooting Platform
• Reduce number of support calls
• Reduce MPI (minutes per incident)
• Make support calls more efficient
• Increase customer satisfaction
• Use well-known methods
• Address configuration issues
• Fix problems when we are certain
• Collect data when we are not
62
Microsoft Confidential
Troubleshooting
Windows Troubleshooting Wizard
63
Microsoft Confidential
Troubleshooting
Platform Components
• Windows Troubleshooting Packs
• Windows Troubleshooting Engine
• Windows Troubleshooting Wizard
• Many built into everyday processes:
(Examples: flush cache, reset NIC, renew IP)
64
Microsoft Confidential
• Troubleshooting
• Resolution
• Verification
Troubleshooting
Process
65
Microsoft Confidential
Troubleshooting
Built-in Troubleshooting Packs
• Desktop Experience
• Device
• Media Player
• Network
• Performance
• Power
*Based on top support call
categories
• Printing
• Programs
• Sound
• System
• Web Browser
• Windows
66
Microsoft Confidential
Click Start and type Trouble in the Search Box:
Troubleshooting
Built-in Troubleshooting Packs
Click View All:
67
Microsoft Confidential
Troubleshooting
List of Troubleshooters
68
Microsoft Confidential
Troubleshooting
Open a Troubleshooter
69
Microsoft Confidential
Troubleshooting
Problem Steps Recorder, Why?
Challenges
• Reproducing problems
• Inability to diagnose problems and root causes
Solution
• Users can record steps taken when an issue occurs, giving help desk screen
shots and comments
• Enables Help Desks to easily and more efficiently diagnose problems
70
Microsoft Confidential
Troubleshooting
PSR, Have your user click start and type “problem steps”
Or Just
“PSR”
Only 3 functions for
simplicity
71
Microsoft Confidential
Troubleshooting
Problem Steps Recorder
• Takes a screenshot each time a mouse is clicked
• Or when a new function happens inside an application
• Mouse clicks generate a small red spot over the pointer
• Optionally users can add comments after each step:
• When finished a zip file is created – user can send this to the helpdesk
72
Microsoft Confidential
Troubleshooting
Problem Steps Recorder
73
Microsoft Confidential
Troubleshooting
Problem Steps Recorder
74
Microsoft Confidential
Troubleshooting
Problem Steps Recorder - Additional Details Pane
75
Microsoft Confidential
• Based on Windows PE
• Command line tool useful in troubleshooting
• Installed automatically by Windows 7
• Launched directly from Hard Drive or Windows 7 Setup Disc
• Benefits include:
• Reduced support through auto repair of common root causes
• Automatically launches if Windows fails to boot
– This may be a call you would get
• Startup Repair Tool: Automatically corrects common unbootable
Windows scenarios
Troubleshooting
Windows Recovery Environment (WinRE)
76
Microsoft Confidential
System Recovery Options provide access to the following tools:
Startup Repair
System Restore
System Image Recovery
Windows Memory Diagnostics
Command Prompt
Troubleshooting
Windows Recovery Environment (WinRE)
77
Microsoft Confidential
Accessing from install media
Troubleshooting
Windows Recovery Environment (WinRE)
78
Microsoft Confidential
Accessing from F8
Troubleshooting
Windows Recovery Environment (WinRE)
79
Microsoft Confidential
Troubleshooting
System Recovery Options
80
Microsoft Confidential
Troubleshooting
Startup Repair attempts to repair
• Registry corruption
• Missing or damaged system and driver files
• Disk metadata corruption (MBR, partition table, and boot sector)
• File system metadata corruption
• Installation of problematic or incompatible drivers
• Installation of incompatible Windows service packs and patches
• Corrupt boot configuration data
• Bad memory and hard disk hardware (detection only)
81
Microsoft Confidential
Troubleshooting
Startup Repair attempts to repair
• Malfunctioning firmware and other hardware components
• Problems with clean Windows installations or Windows upgrades (for
example, from Windows XP to Windows Vista)
• Windows logon errors
• Viruses and malicious software
• LOGS: %WINDIR%System32LogFilesSrtSrtTrail.txt
82
Microsoft Confidential
Troubleshooting
System Restore
• Return Windows to an earlier
configuration.
• Windows 7 automatically captures
system states prior to new drivers
or applications are installed
• Startup Repair will also use this tool automatically so it may not be
necessary to ever click this link
• Great for malware infections:
• Removes startup calls – not the EXE’s directly
83
Microsoft Confidential
Troubleshooting
Tools (in WinRE) you’re less likely to use
• System Image Recovery would be valid if you weren’t using a
standardized image
• Windows Memory Diagnostic:
usually the hardware vendor has
their own tools
• Command Prompt:
This may be helpful from time
to time – it just gives you
access to the system from a
CLI
84
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Start -> msconfig (in search)
85
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Change the next boot-up options
• Great if the user is having trouble with the F8 key
86
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Disable all non-Microsoft services
• Good troubleshooting tool to baseline, then re-enable 1 at a time
87
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Disable all startup items
• These are non-service automatic start-up programs
88
Microsoft Confidential
Troubleshooting
Msconfig (System Configuration)
• Great one-stop-shop for many helpful tools
89
Microsoft Confidential
Troubleshooting
Run-As is Back!
• Hold down the shift key
• Then right-click a program icon
• Select Run as different user
• Notice I use msconfig in the
example:
• Any programs launched within
the program will be under these
credentials
• All msconfig tools would
automatically be elevated
• Works great with CMD also
90
Microsoft Confidential
Troubleshooting
Boot.ini is gone
• Still managed from startup
and recovery
• Replaced with BCD (Boot
Configuration Database)
• Supports EFI (Extensible
Firmware Interface) and
Legacy BIOS
*This does not mean NTLDR & MBR
are retired, still can be used on
PC/AT BIOS. Adds Bootmgr, Winload,
& Winresume – beyond the scope of
this class
http://msdn.microsoft.com/en-us/windows/hardware/gg463059.aspx
91
Microsoft Confidential
Troubleshooting
Msinfo32 – System Information
92
Microsoft Confidential
Troubleshooting
Whoami – hostname – set us
• Quickly identify who/what you are working with
93
Microsoft Confidential
Troubleshooting
How many clicks does it take… to get to the NICs?
1.
2.
3.
OR:
Just type
NCPA.CPL
(Network Control
Panel Applet)
94
Microsoft Confidential
Troubleshooting
Accessing your users’ desktops
• Communicator/LiveMeeting | Windows Remote Assistance
95
Microsoft Confidential
Troubleshooting
Accessing your users’ desktops
96
Microsoft Confidential
Troubleshooting
Windows Remote Assistance
97
Microsoft Confidential
Troubleshooting
Windows Remote Assistance
Helpdesk
End User
98
Microsoft Confidential
Troubleshooting
Windows Remote Assistance
Helpdesk
End User
99
Microsoft Confidential
Troubleshooting
Windows Remote Assistance
100
Microsoft Confidential
Troubleshooting
Broken Internet Explorer
Accessible even if IE is not
101
Microsoft Confidential
Troubleshooting
Broken Internet Explorer
102
Microsoft Confidential
Troubleshooting
Broken Internet Explorer
103
Microsoft Confidential
Troubleshooting
Network - PathPing
• Troubleshoot routing issues (similar to tracert)
104
Microsoft Confidential
Troubleshooting
Network - PathPing
• Does individual analysis of each “hop” in the route
105
Microsoft Confidential
Troubleshooting
Driver Problems
106
Microsoft Confidential
Troubleshooting
Driver Problems
When using Device Driver Roll Back, be aware of the following
limitations:
• You cannot roll back beyond one driver version. For example, you
cannot revert to the second-to-the-last version of a driver.
• You cannot roll back printer drivers.
• You cannot roll back drivers for all functions of a multifunction
device simultaneously. You must roll back each driver separately.
For example, if you have a multifunction device that provides
audio and modem functionality, you must roll back the modem
driver and the audio driver separately.
• You cannot uninstall a driver by using Device Driver Roll Back.
(You must use the Uninstall feature in Device Manager to do
this.)
107
Microsoft Confidential
Troubleshooting
System File Checker
• SFC /scannow
• Useful if you are able to log into the computer
• Boot into Windows Recovery Environment (WinRE)
• Select command prompt
• Type the following command:
• sfc /scannow /offbootdir=c: /offwindir=c:windows
• (assumes C is the drive where Windows files are located)
• Performs an offline SFC operation
108
Microsoft Confidential
Troubleshooting
Last Known Good
109
Microsoft Confidential
Troubleshooting
Last Known Good
• Troubleshooting which policy a user is/is not being affected by –
available by typing RSOP from an elevated CMD
110
Microsoft Confidential
Troubleshooting
RSOP
• Lists “final outcome” of all policies (remember LSD-OU)
111
Microsoft Confidential
Troubleshooting
System Control (SC)
• Helpful if you can’t get to the services.msc (malware, etc)
• Usage (query, start, stop, pause, or end services)
• Examples:
• sc query | more
• Lists services, halts per page, ctrl+c to stop when you find the
service you’re looking for
• sc stop audiosrv
• Stops the “Windows Audio” service
• sc start audiosrv
• Starts the “Windows Audio” service
112
Microsoft Confidential
Windows checks to see if the name is cached (TTL)
Use “ipconfig /flushdns” to flush out existing cache
Windows checks the hosts file for entries
Windows checks with the DNS server for entries
Windows tries NetBIOS name resolution
The target computer may not have registered their IP in DNS, may need to use “ipconfig
/registerdns”
Troubleshooting
Name Resolution

More Related Content

PPTX
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
PPTX
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
PPTX
Keynote talk on Windows 8 - Jeff Stokes
PPTX
Advanced vdi configuration - Jeff Stokes
PPTX
Windows 8 and the Windows Assessment Services overview- Jeff Stokes
PPTX
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
PPTX
GeekOn with Ron #4: Tuning and Optimizing Your Gold Image
PDF
KACE Endpoint Systems Management Appliances - What’s New for 2017
Optimizing windows 8 for virtual desktops - teched 2013 Jeff Stokes
Achieving maximum performance in microsoft vdi environments - Jeff Stokes
Keynote talk on Windows 8 - Jeff Stokes
Advanced vdi configuration - Jeff Stokes
Windows 8 and the Windows Assessment Services overview- Jeff Stokes
Tips and tricks for optimizing windows virtual desktops final - Jeff Stokes
GeekOn with Ron #4: Tuning and Optimizing Your Gold Image
KACE Endpoint Systems Management Appliances - What’s New for 2017

What's hot (19)

PPTX
Virtualization auditing & security deck v1.0
PPTX
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
PPT
Virtualization today
PPTX
Deployment day session 4 deployment using sccm
PDF
Virtual deep dive-xendesktop_stephanpfister
PDF
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
PPTX
Vmware thin app architecture
PDF
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
PPTX
Horizon view technical deep dive
PPTX
PDF
VMware ThinApp 4.5
PPTX
Security best practices for hyper v and server virtualisation [svr307]
PDF
Presentation citrix desktop virtualization
PDF
Citrix Day 2014: XenApp / XenDesktop 7.6
PPTX
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
PPTX
Microsoft Server Virtualization and Private Cloud
PDF
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
PPTX
APP-V 5.0 Service Pack 3, виртуализация Microsoft Office
PPTX
Sna lab prj (1)
Virtualization auditing & security deck v1.0
VDI Mission Accomplished: U.S. Federal Agency Improves Client Computing Secur...
Virtualization today
Deployment day session 4 deployment using sccm
Virtual deep dive-xendesktop_stephanpfister
VMware@night - Was ist neu in VMware Horizon View 5.3 und Mirage 4.3
Vmware thin app architecture
VMworld 2013: VMware Horizon View Troubleshooting: Looking under the Hood
Horizon view technical deep dive
VMware ThinApp 4.5
Security best practices for hyper v and server virtualisation [svr307]
Presentation citrix desktop virtualization
Citrix Day 2014: XenApp / XenDesktop 7.6
SURFacademy: Windows 10 deployment met Microsoft Deployment Toolkit en Setup ...
Microsoft Server Virtualization and Private Cloud
What's new in Citrix XenApp 7.5 und XenDesktop 7.5?
APP-V 5.0 Service Pack 3, виртуализация Microsoft Office
Sna lab prj (1)
Ad

Similar to Windows 7 client performance talk - Jeff Stokes (20)

PDF
Honorable Squires
PPT
Lesson 7 - Maintaining, Updating, and Protecting
PPTX
Windows 7 – Application Compatibility Toolkit 5.5 Overview
PDF
Defects mining in exchanges - medvedev, klimakov, yamkovi
PPT
Operating System & Utility Programme
PPTX
Computer systems servicing lesson 7 part 1
PPTX
Performance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorks
PPTX
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
PPT
Os rtos.ppt
PPTX
Compyter system softwere
PDF
Application Of A Server Hardening Essay
PDF
The Pc And Its Operating Systems
PPTX
Securing with Sophos - Sophos Day Belux 2014
PDF
Adventures in Observability - Clickhouse and Instana
PDF
Adventures in Observability: How in-house ClickHouse deployment enabled Inst...
PDF
Computer system and it class 1
PPTX
Windows 7 Optimized Desktop
PPTX
Operating system and utility program LECTURE 8.pptx
PDF
2018 FRecure CISSP Mentor Program- Session 4
PDF
Intro to open source telemetry linux con 2016
Honorable Squires
Lesson 7 - Maintaining, Updating, and Protecting
Windows 7 – Application Compatibility Toolkit 5.5 Overview
Defects mining in exchanges - medvedev, klimakov, yamkovi
Operating System & Utility Programme
Computer systems servicing lesson 7 part 1
Performance monitoring - Adoniram Mishra, Rupesh Dubey, ThoughtWorks
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Os rtos.ppt
Compyter system softwere
Application Of A Server Hardening Essay
The Pc And Its Operating Systems
Securing with Sophos - Sophos Day Belux 2014
Adventures in Observability - Clickhouse and Instana
Adventures in Observability: How in-house ClickHouse deployment enabled Inst...
Computer system and it class 1
Windows 7 Optimized Desktop
Operating system and utility program LECTURE 8.pptx
2018 FRecure CISSP Mentor Program- Session 4
Intro to open source telemetry linux con 2016
Ad

More from Jeff Stokes (6)

PPTX
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
PPTX
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
PPTX
Break down the tech mentality of it vs user - Jeff Stokes
PPTX
Sustainability in Infrastructure Design - Jeff Stokes
PPTX
Walking deck
PPTX
Crouching Admin, Hidden User
Tmw05 real time_monitoring_of_user_experience_in_vdi - Jeff Stokes
Tmh02 vdi image_optimization_and_troubleshooting - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
Sustainability in Infrastructure Design - Jeff Stokes
Walking deck
Crouching Admin, Hidden User

Recently uploaded (20)

PDF
Electronic commerce courselecture one. Pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
PPTX
A Presentation on Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Electronic commerce courselecture one. Pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
A Presentation on Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Network Security Unit 5.pdf for BCA BBA.
Advanced methodologies resolving dimensionality complications for autism neur...
Review of recent advances in non-invasive hemoglobin estimation
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Windows 7 client performance talk - Jeff Stokes

Editor's Notes

  • #3: I’m a guy
  • #4: Here is what I will be reviewing in this presentation.
  • #5: The Windows Client for end users IS the entire environment. The end user does not typically perceive bandwidth limitations, slow performance of a server, third party add-ins or tools, or problems in the image itself. Every performance issue in the environment therefore comes down to a client performance (or build) critique. Because of this end user experience focus (and the consumerization of IT) the client system tends to become the focus of vast and complex troubleshooting efforts. In some environments, the adoption of new technology is completely halted due to perceived performance issues experienced by key end users. New technology brings with it expectations of performance gains, ease of use, etc. Upgrading the client and leaving old technology in the back end can bring forward performance problems from the old build to the new. Giving the end user the impression that nothing has changed with their new shiny machine.
  • #10: Debug - http://msdn.microsoft.com/en-us/library/ms455354.aspx UAC Virtualization - http://blogs.msdn.com/b/uac/archive/2006/02/22/537129.aspx
  • #11: Memory – Working Set: Working Set is the current size, in bytes, of the Working Set of this process. The Working Set is the set of memory pages touched recently by the threads in the process. If free memory in the computer is above a threshold, pages are left in the Working Set of a process even if they are not in use. When free memory falls below a threshold, pages are trimmed from Working Sets. If they are needed they will then be soft-faulted back into the Working Set before leaving main memory. Memory – Peak Working Set: Working Set Peak is the maximum size, in bytes, of the Working Set of this process at any point in time. The Working Set is the set of memory pages touched recently by the threads in the process. If free memory in the computer is above a threshold, pages are left in the Working Set of a process even if they are not in use. When free memory falls below a threshold, pages are trimmed from Working Sets. If they are needed they will then be soft-faulted back into the Working Set before they leave main memory. Handles: The total number of handles currently open by this process. This number is equal to the sum of the handles currently open by each thread in this process. Threads: The number of threads currently active in this process. An instruction is the basic unit of execution in a processor, and a thread is the object that executes instructions. Every running process has at least one thread.
  • #19: This system has 20179 MB in “Standby Memory”. Adding additional RAM to the system will not provide a most positive performance experience at this time…