(English) Access Connections Profile Deployment guide
Page 9
... profile supports advanced security settings, default printer, and automatic application launch. v View location profile and connection status The Connection Status window allows you move your wireless activity. Chapter 1. The network connection can simply choose another location profile from a specific location, such...to reconfigure network settings manually. Portions © IBM Corp. 2005. 1 v Find wireless networks. If the © Lenovo 2008. Overview Access Connections is shown for the network connection and for high-speed wireless access to find wireless and network ...
... profile supports advanced security settings, default printer, and automatic application launch. v View location profile and connection status The Connection Status window allows you move your wireless activity. Chapter 1. The network connection can simply choose another location profile from a specific location, such...to reconfigure network settings manually. Portions © IBM Corp. 2005. 1 v Find wireless networks. If the © Lenovo 2008. Overview Access Connections is shown for the network connection and for high-speed wireless access to find wireless and network ...
(English) Access Connections Profile Deployment guide
Page 13
...the Vista operating system. Start Microsoft® Windows® 2000, Windows XP, or Windows Vista® and then log on page 31. To install silently with administrative privileges. 2. Start Windows 2000, Windows XP or Windows Vista, and then log on installation of ...interactively type, \setup.exe -0x9 anything b. Chapter 2. Extract the Access Connections software package to your local directory. © Lenovo 2008. To install interactively, type: \setup.exe b. Installing Access Connections without user interaction To install Access Connections without user interaction...
...the Vista operating system. Start Microsoft® Windows® 2000, Windows XP, or Windows Vista® and then log on page 31. To install silently with administrative privileges. 2. Start Windows 2000, Windows XP or Windows Vista, and then log on installation of ...interactively type, \setup.exe -0x9 anything b. Chapter 2. Extract the Access Connections software package to your local directory. © Lenovo 2008. To install interactively, type: \setup.exe b. Installing Access Connections without user interaction To install Access Connections without user interaction...
(English) Access Connections Profile Deployment guide
Page 15
... The Import/Export feature of Access Connections. Enabler for Administrator Profile Deployment Feature for Windows Vista © Lenovo 2008. Enabler for Administrator Profile Deployment Feature for Windows 2000 and XP Figure 2. Figure 1. Run AdmEnblr.exe that is used for deploying... Access Connections. 2. Chapter 3. To enable the Administrator feature, complete the following path: C:\Program Files\ThinkPad\...
... The Import/Export feature of Access Connections. Enabler for Administrator Profile Deployment Feature for Windows Vista © Lenovo 2008. Enabler for Administrator Profile Deployment Feature for Windows 2000 and XP Figure 2. Figure 1. Run AdmEnblr.exe that is used for deploying... Access Connections. 2. Chapter 3. To enable the Administrator feature, complete the following path: C:\Program Files\ThinkPad\...
(English) Access Connections Profile Deployment guide
Page 17
...IP settings, and wireless settings. The profile cannot be modified, deleted or copied. Create Distribution Package panel for Windows Vista 3. Chapter 3. Create Distribution Package panel for Windows 2000 and XP Figure 5. Select the User Access Policy from the drop down menu. v Deny network setting ...changes / Deny deletion: The network settings in place for Windows 2000 or XP, and Windows Vista: Figure 4. User access policies can be defined per profile and can have the following screen captures provide examples for...
...IP settings, and wireless settings. The profile cannot be modified, deleted or copied. Create Distribution Package panel for Windows Vista 3. Chapter 3. Create Distribution Package panel for Windows 2000 and XP Figure 5. Select the User Access Policy from the drop down menu. v Deny network setting ...changes / Deny deletion: The network settings in place for Windows 2000 or XP, and Windows Vista: Figure 4. User access policies can be defined per profile and can have the following screen captures provide examples for...
(English) Access Connections Profile Deployment guide
Page 18
...define the Distribution Control List based on client systems. The passphrase is also encrypted in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. This same passphrase will be required to import the deployment package silently. 7. On the Export Location Profiles dialog box,...If you do not set a policy, the applicable function will be greyed out for the user. Distribution Control List with this package (Windows 2000 and XP only)" on page 20 5. Defining policies for the user. v Allow all changes / Deny deletion: Users can delete...
...define the Distribution Control List based on client systems. The passphrase is also encrypted in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. This same passphrase will be required to import the deployment package silently. 7. On the Export Location Profiles dialog box,...If you do not set a policy, the applicable function will be greyed out for the user. Distribution Control List with this package (Windows 2000 and XP only)" on page 20 5. Defining policies for the user. v Allow all changes / Deny deletion: Users can delete...
(English) Access Connections Profile Deployment guide
Page 19
... Policy This setting defines the Client Configuration Policy, which controls the capabilities that will prevent users from creating and distributing network access profiles. v Checking for Windows users without administrator privileges. Creating Groups: When creating groups of serial numbers. The Distribution Control List helps reduce unauthorized network access. Figure 7. This method of...
... Policy This setting defines the Client Configuration Policy, which controls the capabilities that will prevent users from creating and distributing network access profiles. v Checking for Windows users without administrator privileges. Creating Groups: When creating groups of serial numbers. The Distribution Control List helps reduce unauthorized network access. Figure 7. This method of...
(English) Access Connections Profile Deployment guide
Page 20
...Global settings: On the Network panel of Global Settings, you want to create and apply location profiles v Allow wireless connection at Windows logon v Close all wireless network connections when a user logs off v Disable Adhoc connection type option in large enterprise environments when... Connections. Client Configuration Policy Marking the box beside Do not allow clients to complete the following policies: v Allow Windows users without administrator privileges. v Change global settings, see "Global settings." This setting is unplugged from creating and distributing network access...
...Global settings: On the Network panel of Global Settings, you want to create and apply location profiles v Allow wireless connection at Windows logon v Close all wireless network connections when a user logs off v Disable Adhoc connection type option in large enterprise environments when... Connections. Client Configuration Policy Marking the box beside Do not allow clients to complete the following policies: v Allow Windows users without administrator privileges. v Change global settings, see "Global settings." This setting is unplugged from creating and distributing network access...
(English) Access Connections Profile Deployment guide
Page 22
...task tray v Show the wireless status icon in the task tray v Display the progress indicator window when a profile is being applied 14 Access Connections Deployment Guide Network Global Settings panel for Windows Vista On the Notification panel of Global settings, you can set the following screen captures provide... examples for the Global Settings panel for Access Connections when installed on the Windows 2000 or XP operating system, and for Windows 2000 and XP Figure 10. Network Global Settings for Access Connections when installed on the...
...task tray v Show the wireless status icon in the task tray v Display the progress indicator window when a profile is being applied 14 Access Connections Deployment Guide Network Global Settings panel for Windows Vista On the Notification panel of Global settings, you can set the following screen captures provide... examples for the Global Settings panel for Access Connections when installed on the Windows 2000 or XP operating system, and for Windows 2000 and XP Figure 10. Network Global Settings for Access Connections when installed on the...
(English) Access Connections Profile Deployment guide
Page 24
... not automatically include wireless profiles without security in the new roaming list Note: If this option is selected, the automatic location switching settings for Windows XP: Using the Windows XP operating system, you can set the following policies on the Additional Settings tab for Access Connections: General Options v Do not show warning...
... not automatically include wireless profiles without security in the new roaming list Note: If this option is selected, the automatic location switching settings for Windows XP: Using the Windows XP operating system, you can set the following policies on the Additional Settings tab for Access Connections: General Options v Do not show warning...
(English) Access Connections Profile Deployment guide
Page 25
... page v Override Proxy Configurations Figure 13. Disable internet connection sharing Chapter 3. Default Options for Additional Settings v Network Security - Additional Settings for Windows XP Additional Settings for Vista: Using the Windows Vista operating system, you can set the following policies on the Additional Settings tab for Access Connections: General Options v Do not show... this option is selected, none encryption profile will not be added to change automatic location switching settings Default Options for Additional Settings v Network Security - Enable Windows firewall -
... page v Override Proxy Configurations Figure 13. Disable internet connection sharing Chapter 3. Default Options for Additional Settings v Network Security - Additional Settings for Windows XP Additional Settings for Vista: Using the Windows Vista operating system, you can set the following policies on the Additional Settings tab for Access Connections: General Options v Do not show... this option is selected, none encryption profile will not be added to change automatic location switching settings Default Options for Additional Settings v Network Security - Enable Windows firewall -
(English) Access Connections Profile Deployment guide
Page 26
...in the location profile being applied, to see if the authenticating AID belongs to use an existing PAC if available with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (AID). If not... PAC. All EAP-FAST authenticators are exchanged with this package: 18 Access Connections Deployment Guide If a matching PAC does not exist for Windows Vista PAC AID Groups with the Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. The .loa ...
...in the location profile being applied, to see if the authenticating AID belongs to use an existing PAC if available with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (AID). If not... PAC. All EAP-FAST authenticators are exchanged with this package: 18 Access Connections Deployment Guide If a matching PAC does not exist for Windows Vista PAC AID Groups with the Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. The .loa ...
(English) Access Connections Profile Deployment guide
Page 29
... Connections: v Deploy Access Connections and Location Profiles on page 31. 5. You can select import from the manage profiles window and manually import the package by administrator. If only the client configuration policy needs to be modified, you can create ... client computers To deploy Access Connections location profiles on page 7. After restarting the system, Access Connection is C:\Program Files\ThinkPad\ConnectUtilities). 4. For © Lenovo 2008. v Upgrade existing Access Connections and migrate Location Profiles on page 7 earlier. Portions © IBM Corp. 2005...
... Connections: v Deploy Access Connections and Location Profiles on page 31. 5. You can select import from the manage profiles window and manually import the package by administrator. If only the client configuration policy needs to be modified, you can create ... client computers To deploy Access Connections location profiles on page 7. After restarting the system, Access Connection is C:\Program Files\ThinkPad\ConnectUtilities). 4. For © Lenovo 2008. v Upgrade existing Access Connections and migrate Location Profiles on page 7 earlier. Portions © IBM Corp. 2005...
(English) Access Connections Profile Deployment guide
Page 32
...off. This setting is enabled by default. Disable find wireless Disable the Find Wireless Network function. Default ICF Enable Windows firewall button is enabled by default. Default override homepage Override home page button is enabled by default. Default roaming Newly...File and printer sharing button is enabled by default. Default start applications Start applications automatically button is not available in Windows Vista. This setting is enabled by default. Default override proxy config Override proxy configuration button is enabled by default. ...
...off. This setting is enabled by default. Disable find wireless Disable the Find Wireless Network function. Default ICF Enable Windows firewall button is enabled by default. Default override homepage Override home page button is enabled by default. Default roaming Newly...File and printer sharing button is enabled by default. Default start applications Start applications automatically button is not available in Windows Vista. This setting is enabled by default. Default override proxy config Override proxy configuration button is enabled by default. ...
(English) Access Connections Profile Deployment guide
Page 33
... task tray icon notification area. The wireless authentication can not be turned off automatically whenever it is not available in Windows Vista. Hide start application Do not allow clients to create new location profiles with any existing location profiles provided Access... Connections administrator enables this option, system restart is not available in Windows Vista. Disable peer to peer The Peer to view or edit Override TCP/IP and DNS settings. Computer Configuration > Administrative ...
... task tray icon notification area. The wireless authentication can not be turned off automatically whenever it is not available in Windows Vista. Hide start application Do not allow clients to create new location profiles with any existing location profiles provided Access... Connections administrator enables this option, system restart is not available in Windows Vista. Disable peer to peer The Peer to view or edit Override TCP/IP and DNS settings. Computer Configuration > Administrative ...
(English) Access Connections Profile Deployment guide
Page 34
...logon scripts into Group policy The following example to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. Creating the Acloa.bat file You can use the following steps provide instruction on your script...thinkpad\connectutilities4\Silent.txt" Echo Silent Import was performed goto SilentImportDone :SilentImportDoneBefore Echo Silent Import was done before :SilentImportDone 26 Access Connections Deployment Guide On the ADS Test panel under the Security Filtering section, click Add to give rights to the following: User Configuration->Windows...
...logon scripts into Group policy The following example to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. Creating the Acloa.bat file You can use the following steps provide instruction on your script...thinkpad\connectutilities4\Silent.txt" Echo Silent Import was performed goto SilentImportDone :SilentImportDoneBefore Echo Silent Import was done before :SilentImportDone 26 Access Connections Deployment Guide On the ADS Test panel under the Security Filtering section, click Add to give rights to the following: User Configuration->Windows...
(English) Access Connections Profile Deployment guide
Page 37
Access Connections does not need to be running before these commands interactively within a command prompt window, or you can create batch files for use by other Access Connections processes except for wireless cards (regardless of all profiles. \...command will be routed through AcPrfMgrSvc. \qctray.exe/startac v Find Wireless networks. \qctray.exe /findwInw v Display QCTRAY help information. \qctray.exe /help © Lenovo 2008. Appendix A. Do not turn off the Wireless Radio \qctray.exe/disconnectwl v Close AcMainFUI, Ac Tray, AcWIIcon modules. \qctray.exe/exit v Enter a special ...
Access Connections does not need to be running before these commands interactively within a command prompt window, or you can create batch files for use by other Access Connections processes except for wireless cards (regardless of all profiles. \...command will be routed through AcPrfMgrSvc. \qctray.exe/startac v Find Wireless networks. \qctray.exe /findwInw v Display QCTRAY help information. \qctray.exe /help © Lenovo 2008. Appendix A. Do not turn off the Wireless Radio \qctray.exe/disconnectwl v Close AcMainFUI, Ac Tray, AcWIIcon modules. \qctray.exe/exit v Enter a special ...
(English) Access Connections Profile Deployment guide
Page 42
... Business Machines Corporation in the United States, other countries, or both . Microsoft and Windows 2000, Windows XP and Windows Vista are trademarks of Lenovo in the United States, other countries, or both . Other company, product, or ...service names may be the same on development-level systems, and there is a trademark of Microsoft Corporation in the United States, other countries, or both : Access Connections Lenovo ThinkVantage ThinkPad...
... Business Machines Corporation in the United States, other countries, or both . Microsoft and Windows 2000, Windows XP and Windows Vista are trademarks of Lenovo in the United States, other countries, or both . Other company, product, or ...service names may be the same on development-level systems, and there is a trademark of Microsoft Corporation in the United States, other countries, or both : Access Connections Lenovo ThinkVantage ThinkPad...
Microsoft Windows XP Conversion Kit
Page 3
...who have a DVD drive to use the Rescue and Recovery disc to the Microsoft Windows XP operating system. You use the Microsoft Windows XP Conversion Kit. The Microsoft Windows XP Conversion Kit enables Lenovo customers to convert their computers. After you convert your computer model, one bootable (... DVD drive, you can use the tools on their computers from the Product Recovery discs. © Lenovo 2005, 2008. Portions © IBM Corp. 2005. 1 Using the Microsoft Windows XP Conversion Kit This conversion kit is bootable. Notes: v You must have a specific need to ...
...who have a DVD drive to use the Rescue and Recovery disc to the Microsoft Windows XP operating system. You use the Microsoft Windows XP Conversion Kit. The Microsoft Windows XP Conversion Kit enables Lenovo customers to convert their computers. After you convert your computer model, one bootable (... DVD drive, you can use the tools on their computers from the Product Recovery discs. © Lenovo 2005, 2008. Portions © IBM Corp. 2005. 1 Using the Microsoft Windows XP Conversion Kit This conversion kit is bootable. Notes: v You must have a specific need to ...
Microsoft Windows XP Conversion Kit
Page 4
... click All Programs, click ThinkVantage or Lenovo Care, and then click either Create Recovery Media or Create Product Recovery Discs. 3. v During the conversion process, all data on all partitions of Recovery discs is enclosed with your computer, you label your Windows Vista Product Recovery discs when instructed to...is a good idea to create a set of the hard disk drive will be aware of the following methods: Note: If a set of Windows Vista Product Recovery discs using the tools provided on your computer in a safe place after you begin the conversion process You need to be ...
... click All Programs, click ThinkVantage or Lenovo Care, and then click either Create Recovery Media or Create Product Recovery Discs. 3. v During the conversion process, all data on all partitions of Recovery discs is enclosed with your computer, you label your Windows Vista Product Recovery discs when instructed to...is a good idea to create a set of the hard disk drive will be aware of the following methods: Note: If a set of Windows Vista Product Recovery discs using the tools provided on your computer in a safe place after you begin the conversion process You need to be ...