(English) Access Connections Profile Deployment guide
Page 4
Portions © Copyright International Business Machines Corporation 2005. GS-35F-05925. All rights reserved. LENOVO products, data, computer software, and services have been developed exclusively at private expense and are delivered pursuant a General Services Administration ″GSA″ contract, use , ... with limited and restricted rights to use , reproduction, or disclosure is subject to restrictions set forth in Contract No. Third Edition (April 2008) © Copyright Lenovo 2008.
Portions © Copyright International Business Machines Corporation 2005. GS-35F-05925. All rights reserved. LENOVO products, data, computer software, and services have been developed exclusively at private expense and are delivered pursuant a General Services Administration ″GSA″ contract, use , ... with limited and restricted rights to use , reproduction, or disclosure is subject to restrictions set forth in Contract No. Third Edition (April 2008) © Copyright Lenovo 2008.
(English) Access Connections Profile Deployment guide
Page 5
... comments, communicate with Access Connections. If you lower the total cost of this guide is to this guide, visit the following Web site: www.lenovo.com © Lenovo 2008. The purpose of ownership and to check for periodic updates to provide the information required for each target computer. ThinkVantage® Technologies is... for the software are responsible for deploying the Access Connections™ program on one or many computers, provided that can consult for working with your Lenovo™ authorized representative. iii
... comments, communicate with Access Connections. If you lower the total cost of this guide is to this guide, visit the following Web site: www.lenovo.com © Lenovo 2008. The purpose of ownership and to check for periodic updates to provide the information required for each target computer. ThinkVantage® Technologies is... for the software are responsible for deploying the Access Connections™ program on one or many computers, provided that can consult for working with your Lenovo™ authorized representative. iii
(English) Access Connections Profile Deployment guide
Page 7
Notices 33 Trademarks 34 © Lenovo 2008. Working with Active Directory and ADM files 23 Adding Administrative Templates 23 Installing the client configuration plugin for Access Connections 23 Group Policy settings ...
Notices 33 Trademarks 34 © Lenovo 2008. Working with Active Directory and ADM files 23 Adding Administrative Templates 23 Installing the client configuration plugin for Access Connections 23 Group Policy settings ...
(English) Access Connections Profile Deployment guide
Page 9
... default when Access Connections is useful when you to change location profiles. A progress indicator window shows the state of your wireless adapter. If the © Lenovo 2008. Portions © IBM Corp. 2005. 1 Virtual private network (VPN) connections are available to it. You can attempt to connect to any , wireless networks are...
... default when Access Connections is useful when you to change location profiles. A progress indicator window shows the state of your wireless adapter. If the © Lenovo 2008. Portions © IBM Corp. 2005. 1 Virtual private network (VPN) connections are available to it. You can attempt to connect to any , wireless networks are...
(English) Access Connections Profile Deployment guide
Page 10
... image or after systems are in those locations will be accomplished during the initial system deployment as part of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide
... image or after systems are in those locations will be accomplished during the initial system deployment as part of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide
(English) Access Connections Profile Deployment guide
Page 11
... packages. Access Connections deployment features The Access Connections Administrator Profile Deployment feature is available to IT professionals only at: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY For more information about the Administrator Profile Deployment feature, see: Chapter 3, "Working with the Administrator Feature," on the...
... packages. Access Connections deployment features The Access Connections Administrator Profile Deployment feature is available to IT professionals only at: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY For more information about the Administrator Profile Deployment feature, see: Chapter 3, "Working with the Administrator Feature," on the...
(English) Access Connections Profile Deployment guide
Page 13
... the Access Connections designed specifically for Windows Vista. Uninstalling Access Connections To uninstall Access Connections, complete the following steps: a) Go to your local directory. © Lenovo 2008. Click Start, then click Run. 3. This will uninstall Access Connections: a. d) Copy the script file generated at C:\Windows\setup.iss to the Access Connections install...
... the Access Connections designed specifically for Windows Vista. Uninstalling Access Connections To uninstall Access Connections, complete the following steps: a) Go to your local directory. © Lenovo 2008. Click Start, then click Run. 3. This will uninstall Access Connections: a. d) Copy the script file generated at C:\Windows\setup.iss to the Access Connections install...
(English) Access Connections Profile Deployment guide
Page 14
e) Rename the script file to uninst.iss. 2) Enter the following command: \setup.exe -S-f1\uninst.iss anything -f2x 6 Access Connections Deployment Guide
e) Rename the script file to uninst.iss. 2) Enter the following command: \setup.exe -S-f1\uninst.iss anything -f2x 6 Access Connections Deployment Guide
(English) Access Connections Profile Deployment guide
Page 15
... Files\ThinkPad\ConnectUtilities 3. Do not use the administrator features of Access Connections is installed in the following steps: 1. Run AdmEnblr.exe that is used for deploying Access Connections. 2. Figure 1. Enabler for Administrator Profile Deployment Feature for Windows Vista © Lenovo 2008....to client systems, download and install the Administrator Profile Deployment feature from the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY Note: The Import/Export feature of Access Connections. Chapter 3....
... Files\ThinkPad\ConnectUtilities 3. Do not use the administrator features of Access Connections is installed in the following steps: 1. Run AdmEnblr.exe that is used for deploying Access Connections. 2. Figure 1. Enabler for Administrator Profile Deployment Feature for Windows Vista © Lenovo 2008....to client systems, download and install the Administrator Profile Deployment feature from the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY Note: The Import/Export feature of Access Connections. Chapter 3....
(English) Access Connections Profile Deployment guide
Page 16
Using the Administrator feature After you have the file extension of Access Connections: 1. Consider the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2. Click Profile Distribution and then click Create Distribution Package. Create Distribution Package 2. If the location profile being deployed is configured...
Using the Administrator feature After you have the file extension of Access Connections: 1. Consider the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2. Click Profile Distribution and then click Create Distribution Package. Create Distribution Package 2. If the location profile being deployed is configured...
(English) Access Connections Profile Deployment guide
Page 17
Select the User Access Policy from the drop down menu. The non-modifiable parameters are in the profile cannot be modified, deleted or copied. The profile cannot be defined per profile and can have the following screen captures provide examples for a particular profile. Chapter 3. The user access policy defines the restrictions that are TCP/IP settings, Advanced TCP/IP settings, and wireless settings. Working with the Administrator Feature 9 Create Distribution Package panel for Windows Vista 3. The following values: v Deny all changes / Deny Deletion: Users cannot ...
Select the User Access Policy from the drop down menu. The non-modifiable parameters are in the profile cannot be modified, deleted or copied. The profile cannot be defined per profile and can have the following screen captures provide examples for a particular profile. Chapter 3. The user access policy defines the restrictions that are TCP/IP settings, Advanced TCP/IP settings, and wireless settings. Working with the Administrator Feature 9 Create Distribution Package panel for Windows Vista 3. The following values: v Deny all changes / Deny Deletion: Users cannot ...
(English) Access Connections Profile Deployment guide
Page 18
... 7. Attention: For image deployment, the *.loa file must reside in a *.sig file which are saved in C:\Program Files\Thinkpad\ConnectionUtilities\Loa directory. Define the Access Connections policy settings for the following settings control the Access Connections policies for your applicable directory path...default, the .loa and .sig files which is also encrypted in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. v Deny all changes / Allow deletion: Users can delete the profile. This same passphrase will be required to encrypt the *....
... 7. Attention: For image deployment, the *.loa file must reside in a *.sig file which are saved in C:\Program Files\Thinkpad\ConnectionUtilities\Loa directory. Define the Access Connections policy settings for the following settings control the Access Connections policies for your applicable directory path...default, the .loa and .sig files which is also encrypted in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. v Deny all changes / Allow deletion: Users can delete the profile. This same passphrase will be required to encrypt the *....
(English) Access Connections Profile Deployment guide
Page 19
The Distribution Control List helps reduce unauthorized network access. Client Configuration Policy This setting defines the Client Configuration Policy, which contain the group of serial numbers. You can be created by an asset management system if it is useful in large enterprise environments when you to type individual serial numbers or to create different groups of serial numbers that each line contains a single serial number. v Checking for Windows users without administrator privileges. Chapter 3. These text files can be imported which controls the capabilities that has ...
The Distribution Control List helps reduce unauthorized network access. Client Configuration Policy This setting defines the Client Configuration Policy, which contain the group of serial numbers. You can be created by an asset management system if it is useful in large enterprise environments when you to type individual serial numbers or to create different groups of serial numbers that each line contains a single serial number. v Checking for Windows users without administrator privileges. Chapter 3. These text files can be imported which controls the capabilities that has ...
(English) Access Connections Profile Deployment guide
Page 20
v Automatic location profile switching. v Create and apply WLAN location profiles using the Find Wireless Network function for updates. v Checking for Windows users without administrator privileges to prevent others from creating and distributing network access profiles. Global settings: On the Network panel of Global Settings, you can set the following policies: v Allow Windows users without administrator privileges. v Change global settings, see "Global settings." The Ethernet port will be disabled when the Ethernet cable is enabled, the Ethernet port will remain 12 ...
v Automatic location profile switching. v Create and apply WLAN location profiles using the Find Wireless Network function for updates. v Checking for Windows users without administrator privileges to prevent others from creating and distributing network access profiles. Global settings: On the Network panel of Global Settings, you can set the following policies: v Allow Windows users without administrator privileges. v Change global settings, see "Global settings." The Ethernet port will be disabled when the Ethernet cable is enabled, the Ethernet port will remain 12 ...
(English) Access Connections Profile Deployment guide
Page 21
To re-enable the Ethernet port, manually apply the profile for the Ethernet connection. v Enable auto deletion of unused profiles v Disable the Peer to Peer community feature Chapter 3. Working with the Administrator Feature 13 disabled even when the Ethernet cable is plugged in again.
To re-enable the Ethernet port, manually apply the profile for the Ethernet connection. v Enable auto deletion of unused profiles v Disable the Peer to Peer community feature Chapter 3. Working with the Administrator Feature 13 disabled even when the Ethernet cable is plugged in again.
(English) Access Connections Profile Deployment guide
Page 22
The following policies: v Show ThinkVantage Access Connections status icon in task tray v Show the wireless status icon in the task tray v Display the progress indicator window when a profile is being applied 14 Access Connections Deployment Guide Network Global Settings panel for Windows Vista On the Notification panel of Global settings, you can set the following screen captures provide examples for the Global Settings panel for Access Connections when installed on the Windows 2000 or XP operating system, and for Windows 2000 and XP Figure 10. Network Global Settings for Access ...
The following policies: v Show ThinkVantage Access Connections status icon in task tray v Show the wireless status icon in the task tray v Display the progress indicator window when a profile is being applied 14 Access Connections Deployment Guide Network Global Settings panel for Windows Vista On the Notification panel of Global settings, you can set the following screen captures provide examples for the Global Settings panel for Access Connections when installed on the Windows 2000 or XP operating system, and for Windows 2000 and XP Figure 10. Network Global Settings for Access ...
(English) Access Connections Profile Deployment guide
Page 23
Notification for Global Settings Chapter 3. Working with the Administrator Feature 15 Figure 11.
Notification for Global Settings Chapter 3. Working with the Administrator Feature 15 Figure 11.
(English) Access Connections Profile Deployment guide
Page 24
v Do not automatically include wireless profiles without security in the new roaming list Note: If this option is greyed out. v Do not allow clients to change automatic location switching settings Note: If this option is selected, the automatic location switching settings for Access Connections: General Options v Do not show warning message when connecting to an unencrypted network v Do not show the Services menu Roaming Options v Do not automatically include the new Wired/Wireless profile in the roaming list 16 Access Connections Deployment Guide Location Profiles: Set the following...
v Do not automatically include wireless profiles without security in the new roaming list Note: If this option is greyed out. v Do not allow clients to change automatic location switching settings Note: If this option is selected, the automatic location switching settings for Access Connections: General Options v Do not show warning message when connecting to an unencrypted network v Do not show the Services menu Roaming Options v Do not automatically include the new Wired/Wireless profile in the roaming list 16 Access Connections Deployment Guide Location Profiles: Set the following...
(English) Access Connections Profile Deployment guide
Page 25
... and printer sharing v Start applications automatically v Set default printer v Override TCP/IP and DNS defaults v Enable VPN connection v Override Home page v Override Proxy Configurations Figure 13.
... and printer sharing v Start applications automatically v Set default printer v Override TCP/IP and DNS defaults v Enable VPN connection v Override Home page v Override Proxy Configurations Figure 13.
(English) Access Connections Profile Deployment guide
Page 26
- All EAP-FAST authenticators are exchanged with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (AID). If not, then a confirmatory message is shown to the user to target systems. To include PAC AID Groups when you create the distribution package, mark the check box Include PAC AID Groups with the Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. If a matching PAC does not exist for Windows Vista PAC AID Groups with this package: ...
- All EAP-FAST authenticators are exchanged with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (AID). If not, then a confirmatory message is shown to the user to target systems. To include PAC AID Groups when you create the distribution package, mark the check box Include PAC AID Groups with the Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. If a matching PAC does not exist for Windows Vista PAC AID Groups with this package: ...