My Account Log in

2 options

Using ThinkVantage technologies. Volume 2, Maintaining and recovering client systems / Syed Irfan et al.

Ebook Central Academic Complete Available online

View online

Ebook Central College Complete Available online

View online
Format:
Book
Author/Creator:
Fosshaug, Haakon., Author.
Irfan, Syed., Author.
Miller, Dudley., Author.
Braswell, Byron., Author.
Contributor:
International Business Machines Corporation. International Technical Support Organization.
Series:
IBM redbooks.
Redbooks
Language:
English
Subjects (All):
Client/server computing.
IBM software.
Physical Description:
xx, 652 p. : ill.
Place of Publication:
Research Triangle Park, N.C. : IBM Corp., International Technical Support Organization, c2005.
Contents:
Front cover
Contents
Notices
Trademarks
Preface
The team that wrote this redbook
Become a published author
Comments welcome
Summary of changes
January 2005, Fourth Edition
Chapter 1. Introduction
1.1 ThinkVantage Technologies
1.2 ThinkVantage Technologies process improvements
1.3 Implementing a ThinkVantage Technologies solution
Chapter 2. Rescue and Recovery
2.1 Introducing Rescue and Recovery
2.1.1 Rescue and Recovery environment and functions
2.1.2 Rescue and Recovery functions
2.1.3 Rescue and Recovery components
2.1.4 Rescue and Recovery backup methodology
2.1.5 Managing backups
2.1.6 Rescue and Recovery system requirements
2.2 Installing Rescue and Recovery
2.2.1 Preparing to install Rescue and Recovery
2.2.2 Rescue and Recovery environment configurations
2.2.3 Rescue and Recovery installation
2.2.4 Silent installation
2.2.5 Setting up a Create Base Backup icon on the user's desktop
2.2.6 Creating rescue media
2.2.7 Uninstall Rescue and Recovery
2.3 System backup
2.3.1 Backup considerations
2.3.2 Setting backup preferences
2.3.3 Backing up your system
2.3.4 Archiving backups
2.3.5 Scheduling backups
2.3.6 Disabling scheduled backups
2.3.7 Backing up encrypted files
2.4 Restoring your system
2.4.1 Using the Rescue and Recovery environment
2.4.2 Rescue and Recovery toolbar
2.4.3 Rescue and Recovery menu options
2.4.4 Restoring your system from Windows
2.4.5 Restore considerations
2.5 Troubleshooting
2.5.1 Installation troubleshooting
2.5.2 Backup and Restore troubleshooting information
2.5.3 Encryption troubleshooting
2.5.4 General troubleshooting and tips
2.5.5 Frequently asked questions
Chapter 3. IBM System Information Center
3.1 Introduction to System Information Center.
3.1.1 System Information Center features
3.1.2 System Information Center components
3.1.3 System Information Center requirements
3.1.4 System Information Center overview
3.2 System Information Center server installation
3.2.1 Server operating system installation
3.2.2 Apache Tomcat Web server installation
3.2.3 System Information Center installation
3.2.4 Testing the installation
3.2.5 Modifying the System Information Center installation
3.3 Logging on to System Information Center
3.3.1 System Information Center user accounts
3.3.2 The logon process
3.4 System Information Center main menu
3.5 Assets
3.5.1 Upload Asset Scan
3.5.2 Register Asset
3.5.3 Manually Add Asset
3.5.4 My Assets
3.5.5 All Assets
3.5.6 Filter
3.5.7 Information
3.5.8 Users
3.5.9 Change Owner
3.5.10 Compare Revisions
3.5.11 Compare Selected
3.5.12 Delete
3.5.13 Download XML file
3.5.14 Edit
3.5.15 Reprocess
3.5.16 Retire
3.5.17 Return
3.5.18 Surplus
3.5.19 Download Agent Installer
3.6 User Management
3.6.1 Creating a new user
3.6.2 My Details
3.6.3 All Users
3.6.4 User Details
3.6.5 User History
3.6.6 Delete
3.6.7 Edit
3.7 Group management
3.7.1 New Group
3.7.2 My Groups
3.7.3 All Groups
3.7.4 Groups
3.7.5 Add Users
3.7.6 Delete Group
3.7.7 Edit Group
3.7.8 Remove All Group Members
3.8 Reports
3.8.1 All Assets
3.8.2 Data Maintenance
3.8.3 Groups
3.8.4 Logs
3.8.5 My Assets
3.8.6 Software
3.8.7 Statistics
3.8.8 Tasks
3.8.9 ThinkVantage Reports
3.8.10 Users
3.8.11 Workstation Security
3.8.12 All Reports
3.8.13 Rearrange report display output
3.9 Tasks
3.10 Admin
3.10.1 View Properties File
3.10.2 View Application Log
3.10.3 Send Application Log
3.10.4 Upload File to Server.
3.10.5 View Current Server Status
3.10.6 Stop and Requeue Background Tasks
3.10.7 Interrupt Current Background Tasks
3.11 Options
3.11.1 Set Current Query as Default
3.11.2 Refresh Result
3.11.3 Add Query Column
3.11.4 Add Query Table
3.11.5 Page Options
3.12 Output
3.13 IBM System Information Gatherer
3.13.1 Temporarily installed client agent
3.13.2 Permanently installed client agent
3.13.3 Installation from product CD
3.13.4 Installation from the Web (IBM computers only)
3.14 Customization and advanced usage
3.14.1 Enterprise environment considerations
3.14.2 Deployment scenarios
3.14.3 Secure access
Chapter 4. IBM Software Delivery Center
4.1 Introduction
4.1.1 Software Delivery Center benefits and features
4.1.2 Software Delivery Center components
4.2 Architecture considerations
4.2.1 Architecture considerations
4.2.2 Customization considerations
4.2.3 Hardware specifications and recommendations
4.3 Software Delivery Center server installation details
4.3.1 Installing a Windows operating system on the server
4.3.2 Installing Software Delivery Center
4.3.3 Testing the IBM Software Delivery Center server
4.3.4 Providing security for the packages on the file server
4.4 Installing the Software Delivery Center client
4.4.1 Prerequisite software
4.4.2 Supported types of installations
4.4.3 Testing the Software Delivery Center client
4.5 Building your software library
4.5.1 Creating a folder structure for your library
4.5.2 Creating a software package
4.5.3 Creating a software bundle
4.5.4 Creating a portable catalog
4.5.5 Using a portable catalog
4.5.6 Importing files from another server
4.5.7 Command prompt Export/Import interface
4.6 Setting up Software Delivery Center infrastructure.
4.6.1 Setting up a pull infrastructure
4.6.2 Setting up a push infrastructure
4.6.3 Software Delivery Center package directory replication tips
4.7 Using the Software Delivery Center administrator's console
4.7.1 Accessing Software Delivery Center administrator's console
4.7.2 Managing groups
4.7.3 Managing users
4.7.4 Managing software packages and bundles
4.7.5 Creating a digital signature for a secure package
4.7.6 Exporting and importing software packages and bundles
4.7.7 Exporting a portable catalog
4.7.8 Managing distributions
4.7.9 Managing machines
4.7.10 Managing schedules
4.7.11 Using the IBM Software Delivery Center logs
4.7.12 Finding help
4.7.13 Logging out of the administrator's console
4.8 Using the Software Delivery Center software catalog
4.8.1 Software Delivery Center client applet
4.8.2 Accessing the Software Delivery Center server
4.8.3 Launching the Software Delivery Center client applet
4.8.4 Installing an application
4.8.5 Installing a bundle
4.9 Troubleshooting
4.10 Getting help and support
Chapter 5. Access IBM
5.1 Overview
5.2 Access IBM
5.2.1 Access IBM user interface
5.2.2 Customizing Access IBM and Access Help
5.2.3 Customizing Access IBM
5.2.4 Access IBM Customization Tool
5.3 Access Help
5.3.1 Customizing Access Help
5.4 Rescue and Recovery
5.5 Access IBM Message Center
5.5.1 Local messages versus Web messages
5.5.2 What a message file contains
5.5.3 Delivering messages of your own
5.6 Update Connector
5.6.1 Overview
5.6.2 Usage Scenarios
5.6.3 The network connection
5.6.4 Self-managed Mode
5.6.5 SMB LAN Mode
Chapter 6. Embedded Security Subsystem
6.1 Overview
6.1.1 IBM Embedded Security Chip
6.1.2 Features
6.1.3 Client Security Password Manager.
6.1.4 File and Folder Encryption (FFE) Utility
6.2 Installation considerations
6.2.1 IBM Client Security Software
6.2.2 File and Folder Encryption considerations
6.2.3 Client Security Password Manager
6.3 Prerequisites
6.3.1 Before installing the software
6.3.2 Setting up a supervisor password on a ThinkPad
6.3.3 Setting up an administrator password for a ThinkCentre
6.3.4 Clearing the IBM Embedded Security Chip on a ThinkPad
6.3.5 Clearing the IBM Embedded Security Chip on a ThinkCentre
6.4 Installation instructions
6.4.1 Preparation
6.4.2 Installing prerequisite device drivers
6.4.3 Installing IBM Client Security Software
6.4.4 Configuring the IBM Client Security Software for the first time
6.4.5 Targus DEFCON Fingerprint Reader
6.4.6 Performing an unattended installation
6.4.7 Upgrading your version of IBM Client Security Software
6.5 Supplemental applications
6.5.1 Client Security Password Manager
6.5.2 File and Folder Encryption (FFE)
6.6 Administrator Utility
6.6.1 Starting the Administrator Utility
6.6.2 User enrollment
6.6.3 Edit user settings
6.6.4 Application and policy setup
6.6.5 Chip and key settings
6.7 Registering fingerprints
6.8 Using User Verification Manager protection for Lotus Notes
6.9 User Configuration Utility
6.9.1 Modify Your Security Settings
6.10 Administrator Console
6.10.1 UVM passphrase bypass
6.10.2 Display/Change fingerprint/smart card override password
6.10.3 Create administrator configuration file
6.10.4 Encrypt/Decrypt Setup Configuration File
6.10.5 Configure Credential Roaming
6.11 Roaming profiles
6.11.1 Prerequisites
6.11.2 Setup
6.11.3 Utilization of roaming clients
6.11.4 Adding users to a roaming profiles system
6.11.5 Unattended install with roaming profiles.
6.12 Using Adobe Acrobat 6.0 Professional.
Notes:
Includes bibliographical references and index.
OCLC:
560076431

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account