Safety and Regulatory Information Desktops, Thin Clients, and Personal Workstations
Page 9
... herein. • Allow only HP Authorized Service technicians to EN 50332-1. WARNING! There are louder than other headphones, even if the volume control setting is in EN 50332-2. Compliance... Regulations The Center for products marketed in hazardous radiation exposure. Some headphones are no user-serviceable components inside. • Do not operate controls, make adjustments, or perform procedures... levels and for extended durations can damage one's hearing. Food and Drug Administration implemented regulations for deviations pursuant to the laser device other than those specified...
... herein. • Allow only HP Authorized Service technicians to EN 50332-1. WARNING! There are louder than other headphones, even if the volume control setting is in EN 50332-2. Compliance... Regulations The Center for products marketed in hazardous radiation exposure. Some headphones are no user-serviceable components inside. • Do not operate controls, make adjustments, or perform procedures... levels and for extended durations can damage one's hearing. Food and Drug Administration implemented regulations for deviations pursuant to the laser device other than those specified...
HP Virtual Desktop Infrastructure with Citrix XenDesktop Getting Started Guide
Page 10
...Desktop Delivery Controller server name. For more information, see the Getting Started with Citrix XenDesktop User Guide, located at the HP Virtual Desktop Infrastructure with Citrix XenDesktop website (http://www.hp.com/go/vdi/citrix) and then click Support & Documents. The version that is ... and must be loaded from HP and that you are using, and then select Next. Installing Microsoft®.NET Framework 3.5 Microsoft®.NET Framework 3.5 is included in Windows Update does not work. Ensure you are the Domain Administrator. Reference the "Setting up a Pilot Deployment" section...
...Desktop Delivery Controller server name. For more information, see the Getting Started with Citrix XenDesktop User Guide, located at the HP Virtual Desktop Infrastructure with Citrix XenDesktop website (http://www.hp.com/go/vdi/citrix) and then click Support & Documents. The version that is ... and must be loaded from HP and that you are using, and then select Next. Installing Microsoft®.NET Framework 3.5 Microsoft®.NET Framework 3.5 is included in Windows Update does not work. Ensure you are the Domain Administrator. Reference the "Setting up a Pilot Deployment" section...
HP Image Manager 5.0: Quick Setup Guide
Page 23
... semicolons. HP Image Manager Server Configuration Disk Storage Required on the Server The Image Manager server must have an impact on Windows, the entries are separated by setting the LM_LICENSE_FILE...be 2 GB for three-server redundancy. If the user is dependent on the mode of a hard disk image file plus a CVOL (Client Volume Overlay) write cache file that every sector will ... For detailed information on the server that the image size is 2 GB. The License Administration Guide - Set The License Search Path Using An Environment Variable You can utilize less than 2 GB. Alternatively...
... semicolons. HP Image Manager Server Configuration Disk Storage Required on the Server The Image Manager server must have an impact on Windows, the entries are separated by setting the LM_LICENSE_FILE...be 2 GB for three-server redundancy. If the user is dependent on the mode of a hard disk image file plus a CVOL (Client Volume Overlay) write cache file that every sector will ... For detailed information on the server that the image size is 2 GB. The License Administration Guide - Set The License Search Path Using An Environment Variable You can utilize less than 2 GB. Alternatively...
HP Image Manager 5.0: Quick Setup Guide
Page 24
...settings of the full Image Manager console, but there are preconditions for a user to administer the Image Manager on the fifth panel of the installer. then the Desktop Manager Console can be installed, but it is implemented as changing the image streamed to Thin Clients, rebooting Thin Clients, and viewing activity information about the Thin Clients...be used to provide the functions required in , IP address, computer name). Run the HP Image Manager Installer Wizard. 20 Chapter 3 Installing and Configuring Image Manager Desktop Management Web ...provide for their administration.
...settings of the full Image Manager console, but there are preconditions for a user to administer the Image Manager on the fifth panel of the installer. then the Desktop Manager Console can be installed, but it is implemented as changing the image streamed to Thin Clients, rebooting Thin Clients, and viewing activity information about the Thin Clients...be used to provide the functions required in , IP address, computer name). Run the HP Image Manager Installer Wizard. 20 Chapter 3 Installing and Configuring Image Manager Desktop Management Web ...provide for their administration.
HP Sygate Security Agent User Guide
Page 27
...as the time of day, type of both that you want to prevent unauthorized Internet users from specific applications, ports, and IP addresses during designated time periods. Would you ...Rules This chapter describes how to protect your screensaver is used to block all traffic from an administrator or third party. About Rules A firewall is hardware, software, or a combination of traffic...advanced rules or import them from a particular source? You can set up your system. Setting Up Advanced Rules When you set up an advanced security rule, first decide what effect you have ...
...as the time of day, type of both that you want to prevent unauthorized Internet users from specific applications, ports, and IP addresses during designated time periods. Would you ...Rules This chapter describes how to protect your screensaver is used to block all traffic from an administrator or third party. About Rules A firewall is hardware, software, or a combination of traffic...advanced rules or import them from a particular source? You can set up your system. Setting Up Advanced Rules When you set up an advanced security rule, first decide what effect you have ...
HP Sygate Security Agent User Guide
Page 64
...provides a generalized framework for each DLL is stored on the rule set, the protocol driver is only a proxy to allow the supplicant...If a protocol driver attempts to gain access to the network through a client running the Sygate Security Agent, depending on the Sygate Security Agent and...part of a network and share a common directory database. HP Sygate Security Agent User Guide DLL fingerprint: A 128-bit number that provides dynamic... users. DoS attack: See Denial of computers is generated by the EAP type. See also protocol driver blocking. DHCP lets a system administrator ...
...provides a generalized framework for each DLL is stored on the rule set, the protocol driver is only a proxy to allow the supplicant...If a protocol driver attempts to gain access to the network through a client running the Sygate Security Agent, depending on the Sygate Security Agent and...part of a network and share a common directory database. HP Sygate Security Agent User Guide DLL fingerprint: A 128-bit number that provides dynamic... users. DoS attack: See Denial of computers is generated by the EAP type. See also protocol driver blocking. DHCP lets a system administrator ...
HP Sygate Security Agent User Guide
Page 65
... similar security needs and settings. A group cannot be set up so that do not meet security criteria. GUID: Global Unique Identifier. See unique ID. The intruder begins acting like the user, executing commands, and sending information to it so only one administrator can gain access to... not a computer can make changes to the server. HP Sygate Security Agent: See Sygate Security Agent. H hijack: A type of attack where an intruder takes control of an existing communication session between a server and a legitimate user who has connected and authenticated with a Denial of sensitive...
... similar security needs and settings. A group cannot be set up so that do not meet security criteria. GUID: Global Unique Identifier. See unique ID. The intruder begins acting like the user, executing commands, and sending information to it so only one administrator can gain access to... not a computer can make changes to the server. HP Sygate Security Agent: See Sygate Security Agent. H hijack: A type of attack where an intruder takes control of an existing communication session between a server and a legitimate user who has connected and authenticated with a Denial of sensitive...
HP Sygate Security Agent User Guide
Page 66
... Icons shown on screens in TCP/IP messages and exchanging limited status and control information. See also outbound traffic. HP Sygate Security Agent User Guide icon: A small visual image displayed on a computer screen to represent an application, a command, an object...Sygate Management Server. inheritance: A way of users and computers. See also rule inheritance. Traits that is the initialization file for Agent installation settings and AutoLocation method) and SyLink.xml (specifying Agent administrative details such as client vs. Internet Control Message Protocol (ICMP): ...
... Icons shown on screens in TCP/IP messages and exchanging limited status and control information. See also outbound traffic. HP Sygate Security Agent User Guide icon: A small visual image displayed on a computer screen to represent an application, a command, an object...Sygate Management Server. inheritance: A way of users and computers. See also rule inheritance. Traits that is the initialization file for Agent installation settings and AutoLocation method) and SyLink.xml (specifying Agent administrative details such as client vs. Internet Control Message Protocol (ICMP): ...
HP Sygate Security Agent User Guide
Page 68
...than one destination on UDP ports 88, 137, and 138 and TCP ports 135, 139, 445, and 1026. network settings: Settings that determine the Location of another computer to send an ARP (Address Resolution Protocol) response packet to the victim even though... connects a computer to security policies, network traffic, client connections, and administrator activities. network interface card (NIC): A device that is used for AutoLocation switching. They are used to communicate with other network devices. HP Sygate Security Agent User Guide logs: Files that store information generated by MAC...
...than one destination on UDP ports 88, 137, and 138 and TCP ports 135, 139, 445, and 1026. network settings: Settings that determine the Location of another computer to send an ARP (Address Resolution Protocol) response packet to the victim even though... connects a computer to security policies, network traffic, client connections, and administrator activities. network interface card (NIC): A device that is used for AutoLocation switching. They are used to communicate with other network devices. HP Sygate Security Agent User Guide logs: Files that store information generated by MAC...
HP Sygate Security Agent User Guide
Page 70
... system administrator can ...or an ICMP type. Sygate's Intrusion Detection System identifies known attacks by pattern-matching against the client computer. a list of the Agent to verify that indicates how critical an event is being... port: A port on the Help|About menu of all the security rules and settings that are currently accessing (or attempting to access) an Agent's network connection. signature...security policy changes. The status of the computer to which information is . HP Sygate Security Agent User Guide Profile Serial Number: A number that defines how to identify an ...
... system administrator can ...or an ICMP type. Sygate's Intrusion Detection System identifies known attacks by pattern-matching against the client computer. a list of the Agent to verify that indicates how critical an event is being... port: A port on the Help|About menu of all the security rules and settings that are currently accessing (or attempting to access) an Agent's network connection. signature...security policy changes. The status of the computer to which information is . HP Sygate Security Agent User Guide Profile Serial Number: A number that defines how to identify an ...
HP Sygate Security Agent User Guide
Page 71
...allow for five seconds to hide the Sygate Security Agent user interface from a selected network. This option blocks all network traffic regardless of actively capturing ...15 is done by the normal security rule set of simple rules could be kept up-to define priorities, severities, triggers, and events. See also IP address. Administrators can be a rule that allows trusted applications...Smart DHCP: Allows a Dynamic Host Configuration Protocol (DHCP) client to receive an IP address from a DHCP server while protecting the client against DNS attacks from the Sygate Technologies web site to ...
...allow for five seconds to hide the Sygate Security Agent user interface from a selected network. This option blocks all network traffic regardless of actively capturing ...15 is done by the normal security rule set of simple rules could be kept up-to define priorities, severities, triggers, and events. See also IP address. Administrators can be a rule that allows trusted applications...Smart DHCP: Allows a Dynamic Host Configuration Protocol (DHCP) client to receive an IP address from a DHCP server while protecting the client against DNS attacks from the Sygate Technologies web site to ...
HP Sygate Security Agent User Guide
Page 72
HP Sygate Security Agent User Guide spoofing: A technique used to as 255.255.255.0. Stealth Mode Browsing...such as 192.168.1 in Sygate documentation. See also logs. The Agent can specify how often to alert users and system administrators of numbers (such as the browser name and version, the operating system, and the reference web page. Port...intruders to gain unauthorized network access to -date with the directory server. subnet mask: A value that violates a defined set of a TCP/IP network used by an intruder to gain unauthorized network access to a computer system or network by...
HP Sygate Security Agent User Guide spoofing: A technique used to as 255.255.255.0. Stealth Mode Browsing...such as 192.168.1 in Sygate documentation. See also logs. The Agent can specify how often to alert users and system administrators of numbers (such as the browser name and version, the operating system, and the reference web page. Port...intruders to gain unauthorized network access to -date with the directory server. subnet mask: A value that violates a defined set of a TCP/IP network used by an intruder to gain unauthorized network access to a computer system or network by...
Quick Reference Guide: Microsoft Windows XPe-based Thin Clients - t5000 Series
Page 4
... Explorer 25 Windows Messenger 25 Windows Media Player 9 25 Utilities and settings 25 Enhanced Write Filter Manager 26 Enhanced Write Filter Manager command line control 27 Enhanced Write Filter user interface 28 Enhanced Write Filter status tool 29 Local drives 30 Drive ...network drives 31 Roaming profiles 31 User log accounts 32 Creating a new user account 32 User profiles 32 Remote Administration and firmware upgrades 34 Altiris Deployment Solution software 34 Add-on modules 34 Firmware upgrades 34 HP Compaq Thin Client Imaging Tool 35 iv www.hp.com Quick Reference Guide
... Explorer 25 Windows Messenger 25 Windows Media Player 9 25 Utilities and settings 25 Enhanced Write Filter Manager 26 Enhanced Write Filter Manager command line control 27 Enhanced Write Filter user interface 28 Enhanced Write Filter status tool 29 Local drives 30 Drive ...network drives 31 Roaming profiles 31 User log accounts 32 Creating a new user account 32 User profiles 32 Remote Administration and firmware upgrades 34 Altiris Deployment Solution software 34 Add-on modules 34 Firmware upgrades 34 HP Compaq Thin Client Imaging Tool 35 iv www.hp.com Quick Reference Guide
Quick Reference Guide: Microsoft Windows XPe-based Thin Clients - t5000 Series
Page 11
.... Remote Desktop Connection The Microsoft Remote Desktop Connection allows an administrator to access a Windows XPe-based thin client (disabled by clicking Start > Control Panel, provides access to a limited set of system resources. These selections are the only icons present. Quick Reference Guide www.hp.com 7 User desktop The desktop that the Citrix Program Neighborhood, Remote Desktop...
.... Remote Desktop Connection The Microsoft Remote Desktop Connection allows an administrator to access a Windows XPe-based thin client (disabled by clicking Start > Control Panel, provides access to a limited set of system resources. These selections are the only icons present. Quick Reference Guide www.hp.com 7 User desktop The desktop that the Citrix Program Neighborhood, Remote Desktop...
Quick Reference Guide: Microsoft Windows XPe-based Thin Clients - t5000 Series
Page 13
... when the thin client is a local or remote administrator function. Enable the write filter when you no longer want to save changes to system configuration settings, you log off (without shutting down using the Windows Security dialog box. You may also log off or shut down ) the thin client immediately logs on again (as a different user, see...
... when the thin client is a local or remote administrator function. Enable the write filter when you no longer want to save changes to system configuration settings, you log off (without shutting down using the Windows Security dialog box. You may also log off or shut down ) the thin client immediately logs on again (as a different user, see...
Quick Reference Guide: Microsoft Windows XPe-based Thin Clients - t5000 Series
Page 16
...hp.com Quick Reference Guide Administrative Tools Click the Administrative Tools icon in the Control Panel. From this program you can select the type of the RAM disk, you are preset at the administrator's discretion (see "User profiles" on the thin client.... If you change , the keyboard language selection is 64 MB. To permanently save the change, make a change the size of keyboard you will be prompted to restart for temporary storage of other data (such as the layout/IME settings. User Manager User...
...hp.com Quick Reference Guide Administrative Tools Click the Administrative Tools icon in the Control Panel. From this program you can select the type of the RAM disk, you are preset at the administrator's discretion (see "User profiles" on the thin client.... If you change , the keyboard language selection is 64 MB. To permanently save the change, make a change the size of keyboard you will be prompted to restart for temporary storage of other data (such as the layout/IME settings. User Manager User...
Quick Reference Guide: Microsoft Windows XPe-based Thin Clients - t5000 Series
Page 35
...if you log on your thin client. To keep the mappings after the thin client is rebooted. ✎ For roaming profiles to work and be downloaded, there must write to a local drive, change the application settings to the C drive. Quick Reference Guide www.hp.com 31 Disable the ...settings as either Administrator or User. You can retain the mappings by other means known to the C drive on the local system). Be careful of flash memory. Roaming profiles Write roaming profiles to use the Z drive. The profiles need to be limited in size and will not be retained when the thin client...
...if you log on your thin client. To keep the mappings after the thin client is rebooted. ✎ For roaming profiles to work and be downloaded, there must write to a local drive, change the application settings to the C drive. Quick Reference Guide www.hp.com 31 Disable the ...settings as either Administrator or User. You can retain the mappings by other means known to the C drive on the local system). Be careful of flash memory. Roaming profiles Write roaming profiles to use the Z drive. The profiles need to be limited in size and will not be retained when the thin client...
Quick Reference Guide: Microsoft Windows XPe-based Thin Clients - t5000 Series
Page 36
.... For the same reason, HP also recommends that you should keep the number of additional users to create a new user account and user profile. To access this utility, click Control Panel > Performance and Maintenance > Administrative Tools. If the default user or administrator profile settings are changed settings are still limited while the user is in the user group, and add the...
.... For the same reason, HP also recommends that you should keep the number of additional users to create a new user account and user profile. To access this utility, click Control Panel > Performance and Maintenance > Administrative Tools. If the default user or administrator profile settings are changed settings are still limited while the user is in the user group, and add the...
Safety and Regulatory Guide: HP Compaq t5000 Series
Page 9
...user-serviceable components inside. ■ Do not operate controls, make adjustments, or perform procedures to the laser device other than those specified herein. ■ Allow only authorized HP service providers to laser products manufactured from August 1, 1976. Agency Notices German Ergonomics Notice HP Compaq... t5000 Series products products, when combined with HP...and Drug Administration implemented regulations for Devices and Radiological Health (...
...user-serviceable components inside. ■ Do not operate controls, make adjustments, or perform procedures to the laser device other than those specified herein. ■ Allow only authorized HP service providers to laser products manufactured from August 1, 1976. Agency Notices German Ergonomics Notice HP Compaq... t5000 Series products products, when combined with HP...and Drug Administration implemented regulations for Devices and Radiological Health (...
Troubleshooting Guide - HP Compaq t5000 Series Thin Client, 8th Edition
Page 25
... seconds, it may be accessed only by turning the computer on or restarting the system. Task Headings: Load Factory Defaults, Set Administrative Password, Set User Password, Save & Exit Setup, and Exit without Saving. When the F10 Post Screen display is displayed, you are using Microsoft..., Advanced BIOS Features, Integrated Peripherals, and Power Management Setup. To access the Setup Utility menu, complete the following steps: 1. Troubleshooting Guide www.hp.com 3-1 Turn on or restart the computer. ❏ If you are using Microsoft Windows XP Embedded, click Start > Shut Down > Restart ...
... seconds, it may be accessed only by turning the computer on or restarting the system. Task Headings: Load Factory Defaults, Set Administrative Password, Set User Password, Save & Exit Setup, and Exit without Saving. When the F10 Post Screen display is displayed, you are using Microsoft..., Advanced BIOS Features, Integrated Peripherals, and Power Management Setup. To access the Setup Utility menu, complete the following steps: 1. Troubleshooting Guide www.hp.com 3-1 Turn on or restart the computer. ❏ If you are using Microsoft Windows XP Embedded, click Start > Shut Down > Restart ...