Client Security Password Manager v1.3 - User's Guide (English)
Page 7
...of all other documentation for users of Client Security Software Version 4.0 or higher who want help you might experience while using the IBM Client Security Password Manager program to help keeping track of IBM Password Manager features and functions. Preface This guide contains information on using ... the Windows NT, Windows 2000, and Windows XP operating systems. How to simplify your login process and password management. This guide and all their user IDs, passwords, and personal information that is used to register and login to Web sites or applications. Who should read this...
...of all other documentation for users of Client Security Software Version 4.0 or higher who want help you might experience while using the IBM Client Security Password Manager program to help keeping track of IBM Password Manager features and functions. Preface This guide contains information on using ... the Windows NT, Windows 2000, and Windows XP operating systems. How to simplify your login process and password management. This guide and all their user IDs, passwords, and personal information that is used to register and login to Web sites or applications. Who should read this...
Client Security Password Manager v1.3 - User's Guide (English)
Page 10
...Password Manager does not support icon tray functionality on how to archive information. 2 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide v Access Password Manager from a Client Security archive to protect against a hard drive or system failure. Each Password Manager function can ...also be easily accessed by a simple keyboard shortcut. See the Client Security Software User's Guide for more information on computers running the Windows NT operating system. If you are using a Windows NT system, use the keyboard...
...Password Manager does not support icon tray functionality on how to archive information. 2 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide v Access Password Manager from a Client Security archive to protect against a hard drive or system failure. Each Password Manager function can ...also be easily accessed by a simple keyboard shortcut. See the Client Security Software User's Guide for more information on computers running the Windows NT operating system. If you are using a Windows NT system, use the keyboard...
Client Security Password Manager v1.3 - User's Guide (English)
Page 12
... Right-click the entry you want to recall. 2. To change your UVM passphrase, or complete the access requirements specified by the UVM user authentication policy. 4. Select from the following options: v Entry information To edit entry information, complete the following procedure: 1. Password Manager ... other information entered into Password Manager that you want to edit. 4 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide If the Add ″Enter″ to create a new entry. To recall information stored in the Password Manager. Create New...
... Right-click the entry you want to recall. 2. To change your UVM passphrase, or complete the access requirements specified by the UVM user authentication policy. 4. Select from the following options: v Entry information To edit entry information, complete the following procedure: 1. Password Manager ... other information entered into Password Manager that you want to edit. 4 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide If the Add ″Enter″ to create a new entry. To recall information stored in the Password Manager. Create New...
Client Security Password Manager v1.3 - User's Guide (English)
Page 14
... the created export file from the location that you to establish a passphrase for your UVM passphrase, or complete the access requirements specified by the UVM user authentication policy. 3. This information cannot be required to a removable medium. Right-click the Password Manager icon in a secure reader. The Save As window is displayed... OK to accept the specified location and file name. Click Save to close the export reader file. 6 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide 1. Notes: 1.
... the created export file from the location that you to establish a passphrase for your UVM passphrase, or complete the access requirements specified by the UVM user authentication policy. 3. This information cannot be required to a removable medium. Right-click the Password Manager icon in a secure reader. The Save As window is displayed... OK to accept the specified location and file name. Click Save to close the export reader file. 6 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide 1. Notes: 1.
Client Security Password Manager v1.3 - User's Guide (English)
Page 18
... document and all licensed material available for it are provided by IBM under terms of others. 10 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide Other company, product, and service names may be trademarks or service marks of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent...
... document and all licensed material available for it are provided by IBM under terms of others. 10 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide Other company, product, and service names may be trademarks or service marks of the IBM Customer Agreement, IBM International Program License Agreement or any equivalent...
(English) Access Connections Profile Deployment guide
Page 5
...2005. To learn more about using the application itself. If you lower the total cost of this guide is to this guide, visit the following Web site: www.lenovo.com © Lenovo 2008. The purpose of ownership and to check for periodic updates to provide the information required for... installing Access Connections on one or many computers, provided that can help , which administrators and users can consult...
...2005. To learn more about using the application itself. If you lower the total cost of this guide is to this guide, visit the following Web site: www.lenovo.com © Lenovo 2008. The purpose of ownership and to check for periodic updates to provide the information required for... installing Access Connections on one or many computers, provided that can help , which administrators and users can consult...
(English) Access Connections Profile Deployment guide
Page 10
... configurations in range of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide Access Connections provides an icon...wireless location profiles, and Ethernet location profiles. Considerations for deploying Access Connections Collecting information about the various places where users might attempt to a matching location profile. The deployment of profiles and settings can be accomplished during the initial ...
... configurations in range of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide Access Connections provides an icon...wireless location profiles, and Ethernet location profiles. Considerations for deploying Access Connections Collecting information about the various places where users might attempt to a matching location profile. The deployment of profiles and settings can be accomplished during the initial ...
(English) Access Connections Profile Deployment guide
Page 16
...authentication, the adapters on how to create location profiles, or how to use Access Connections, see the Access Connections User's Guide located at the following scenarios as you will be prompted to re-enter the wireless settings data to ensure sensitive data ...and recipient must support LEAP authentication. 8 Access Connections Deployment Guide If the location profile being deployed is not exposed. Consider the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2. Create Distribution Package 2. Select the ...
...authentication, the adapters on how to create location profiles, or how to use Access Connections, see the Access Connections User's Guide located at the following scenarios as you will be prompted to re-enter the wireless settings data to ensure sensitive data ...and recipient must support LEAP authentication. 8 Access Connections Deployment Guide If the location profile being deployed is not exposed. Consider the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2. Create Distribution Package 2. Select the ...
(English) Access Connections Profile Deployment guide
Page 18
...page 20 5. v Allow all changes / Allow deletion: Users can delete the profile. and type the name for the user. however, users can modify, copy and delete the profile. 4. Define ... in a *.sig file which are saved in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. Click Save. If you do not set a policy, the applicable function will ...import of the Create Distribution Package panel. 6. Define Distribution Control list 10 Access Connections Deployment Guide By default, the .loa and .sig files which is used to your .loa file. ...
...page 20 5. v Allow all changes / Allow deletion: Users can delete the profile. and type the name for the user. however, users can modify, copy and delete the profile. 4. Define ... in a *.sig file which are saved in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. Click Save. If you do not set a policy, the applicable function will ...import of the Create Distribution Package panel. 6. Define Distribution Control list 10 Access Connections Deployment Guide By default, the .loa and .sig files which is used to your .loa file. ...
(English) Access Connections Profile Deployment guide
Page 20
...option in large enterprise environments when you want to prevent others from creating and distributing network access profiles. The Ethernet port will prevent users from the system. v Change global settings, see "Global settings." This setting is unplugged from enabling the Administrator Feature on their installation... Policy Marking the box beside Do not allow clients to become an administrator: will remain 12 Access Connections Deployment Guide The following screen capture displays the settings you can also control a users ability to complete the following policies: v Allow Windows...
...option in large enterprise environments when you want to prevent others from creating and distributing network access profiles. The Ethernet port will prevent users from the system. v Change global settings, see "Global settings." This setting is unplugged from enabling the Administrator Feature on their installation... Policy Marking the box beside Do not allow clients to become an administrator: will remain 12 Access Connections Deployment Guide The following screen capture displays the settings you can also control a users ability to complete the following policies: v Allow Windows...
(English) Access Connections Profile Deployment guide
Page 24
... v Do not show the Services menu Roaming Options v Do not automatically include the new Wired/Wireless profile in the roaming list 16 Access Connections Deployment Guide Location Profiles: Set the following Internet Explorer policies: v Set browser home page v Set proxy settings For the Optional Settings, you can set the following policies... Additional Settings for Windows XP: Using the Windows XP operating system, you can set the following policies on the Additional Settings tab for the end users is greyed out.
... v Do not show the Services menu Roaming Options v Do not automatically include the new Wired/Wireless profile in the roaming list 16 Access Connections Deployment Guide Location Profiles: Set the following Internet Explorer policies: v Set browser home page v Set proxy settings For the Optional Settings, you can set the following policies... Additional Settings for Windows XP: Using the Windows XP operating system, you can set the following policies on the Additional Settings tab for the end users is greyed out.
(English) Access Connections Profile Deployment guide
Page 26
... confirmatory message. If a matching PAC does not exist for Windows Vista PAC AID Groups with this package: 18 Access Connections Deployment Guide The .loa package imports and exports the PAC AID Groups to use the existing PAC. The local authenticator sends its AID to... PAC if available with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (AID). Additional Settings for the user, then the client system requests a new PAC. Disable file and printer sharing v Start applications automatically...
... confirmatory message. If a matching PAC does not exist for Windows Vista PAC AID Groups with this package: 18 Access Connections Deployment Guide The .loa package imports and exports the PAC AID Groups to use the existing PAC. The local authenticator sends its AID to... PAC if available with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (AID). Additional Settings for the user, then the client system requests a new PAC. Disable file and printer sharing v Start applications automatically...
(English) Access Connections Profile Deployment guide
Page 32
...the roaming list. Disable adhoc Adhoc connection type will not be automatically included in Windows Vista. network 24 Access Connections Deployment Guide Block export Do not allow clients to export location profiles. Default ICF Enable Windows firewall button is enabled by default. ... be available when creating wireless LAN profiles. Close connection at To enhance security, wireless connection would be disconnected logoff when user logs off. This setting is plugged out. Group Policy settings This table provides policies settings for Access Connections that they ...
...the roaming list. Disable adhoc Adhoc connection type will not be automatically included in Windows Vista. network 24 Access Connections Deployment Guide Block export Do not allow clients to export location profiles. Default ICF Enable Windows firewall button is enabled by default. ... be available when creating wireless LAN profiles. Close connection at To enhance security, wireless connection would be disconnected logoff when user logs off. This setting is plugged out. Group Policy settings This table provides policies settings for Access Connections that they ...
(English) Access Connections Profile Deployment guide
Page 34
... 26 Access Connections Deployment Guide From the Logon Properties panel, select the Acloa.bat file and then click Add. 7. On the ADS Test panel under the Security Filtering section, click Add to give rights to the following example to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. Click...
... 26 Access Connections Deployment Guide From the Logon Properties panel, select the Acloa.bat file and then click Add. 7. On the ADS Test panel under the Security Filtering section, click Add to give rights to the following example to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. Click...
(English) Access Connections Profile Deployment guide
Page 42
Microsoft and Windows 2000, Windows XP and Windows Vista are trademarks of Lenovo in the United States, other countries, or both: Access Connections Lenovo ThinkVantage ThinkPad IBM is a trademark of International Business Machines Corporation in the United States, other countries, ... Corporation in the United States, other countries, or both . Some measurements may vary. Trademarks significantly. Users of others. 34 Access Connections Deployment Guide Intel is no guarantee that these measurements will be trademarks or service marks of this document should verify the...
Microsoft and Windows 2000, Windows XP and Windows Vista are trademarks of Lenovo in the United States, other countries, or both: Access Connections Lenovo ThinkVantage ThinkPad IBM is a trademark of International Business Machines Corporation in the United States, other countries, ... Corporation in the United States, other countries, or both . Some measurements may vary. Trademarks significantly. Users of others. 34 Access Connections Deployment Guide Intel is no guarantee that these measurements will be trademarks or service marks of this document should verify the...
(English) Deployment Guide for IBM Access Connections
Page 3
To learn more about using the application itself. Preface This guide is intended to this guide, visit this Web site: http://www.pc.ibm.com/us/think/thinkvantagetech.html © Copyright IBM Corp. 2004 iii If you lower ... The IBM Access Connections application provides application help, which administrators and users can consult for installing IBM Access Connections on computers in mind. IBM ThinkVantage™ Technologies and the deployment guides that licenses for each target computer. The guide is intended for IT administrators, or those who are responsible for ...
To learn more about using the application itself. Preface This guide is intended to this guide, visit this Web site: http://www.pc.ibm.com/us/think/thinkvantagetech.html © Copyright IBM Corp. 2004 iii If you lower ... The IBM Access Connections application provides application help, which administrators and users can consult for installing IBM Access Connections on computers in mind. IBM ThinkVantage™ Technologies and the deployment guides that licenses for each target computer. The guide is intended for IT administrators, or those who are responsible for ...
(English) Deployment Guide for IBM Access Connections
Page 10
...notebook at http://www306.ibm.com/pc/support/site.wss/migr-4zlnjb.html#ac. A list of every new IBM ThinkPad® notebook system. And the user must modify Windows network properties to enable DHCP and automatic DNS. All WLAN configuration utilities, as well as the ... help desk calls Create location profiles with settings for automatic switching between them. Profiles can also be inaccessible. 4 IBM Access Connections Deployment Guide Version 3.3.0 After profiles are traditionally set to change default printers, turn off the proxy settings in Microsoft® Windows® XP, ...
...notebook at http://www306.ibm.com/pc/support/site.wss/migr-4zlnjb.html#ac. A list of every new IBM ThinkPad® notebook system. And the user must modify Windows network properties to enable DHCP and automatic DNS. All WLAN configuration utilities, as well as the ... help desk calls Create location profiles with settings for automatic switching between them. Profiles can also be inaccessible. 4 IBM Access Connections Deployment Guide Version 3.3.0 After profiles are traditionally set to change default printers, turn off the proxy settings in Microsoft® Windows® XP, ...
(English) Deployment Guide for IBM Access Connections
Page 12
...point-and-click access to useful diagnostic tools and traditional Windows TCP/IP utilities, users can consume considerable amounts of your notebook for a response from the office and ...alternative for high-speed wireless access to recharge the notebook battery. A troubleshooting guide is accessible from the menu displayed by left-clicking the Access Connections system ...WAN PC card adapters. Helping your clients stay connected Access Connections software provides your ThinkPad notebook, you can be utilized only when higher priority adapters cannot establish or maintain...
...point-and-click access to useful diagnostic tools and traditional Windows TCP/IP utilities, users can consume considerable amounts of your notebook for a response from the office and ...alternative for high-speed wireless access to recharge the notebook battery. A troubleshooting guide is accessible from the menu displayed by left-clicking the Access Connections system ...WAN PC card adapters. Helping your clients stay connected Access Connections software provides your ThinkPad notebook, you can be utilized only when higher priority adapters cannot establish or maintain...
(English) Deployment Guide for IBM Access Connections
Page 14
It shows detailed progress of connection status and finds suspected reasons of network connectivity and helping you achieve lower overall IT costs. up profiles individually at each client-resulting in some cases. 8 IBM Access Connections Deployment Guide Version 3.3.0 Diagnosing network connectivity problems IBM Access Connections supports a new feature of network diagnostics when users are unable to recover the network connection in streamlined management of failure and recommended actions. Access Connections also offers an automatic repair button to make network connections.
It shows detailed progress of connection status and finds suspected reasons of network connectivity and helping you achieve lower overall IT costs. up profiles individually at each client-resulting in some cases. 8 IBM Access Connections Deployment Guide Version 3.3.0 Diagnosing network connectivity problems IBM Access Connections supports a new feature of network diagnostics when users are unable to recover the network connection in streamlined management of failure and recommended actions. Access Connections also offers an automatic repair button to make network connections.
(English) Deployment Guide for IBM Access Connections
Page 17
...Run. 4. Extract the Access Connections drivers to limit who can import the location profiles that page, click Software download and User's Guide to IT professionals only at : http://www.pc.ibm.com/us/think/thinkvantagetech/downloads_support.html. Deploying Access Connections After creating... the location profiles required for client users, you create for each profile. v Administrators can be set to configure the operation of features to help IT administrators deploy...
...Run. 4. Extract the Access Connections drivers to limit who can import the location profiles that page, click Software download and User's Guide to IT professionals only at : http://www.pc.ibm.com/us/think/thinkvantagetech/downloads_support.html. Deploying Access Connections After creating... the location profiles required for client users, you create for each profile. v Administrators can be set to configure the operation of features to help IT administrators deploy...