Client Security Password Manager v1.3 - User's Guide (English)
Page 7
..., when available, from the http://www.pc.ibm.com/ww/security/secdownload.html IBM web site. Chapter 2, "Procedures" contains procedures for users of Client Security Software Version 4.0 or higher who want help keeping track of IBM Password Manager features and functions. Chapter 3, "Limitations"... limitations and problems you use this guide This guide is designed to help you might experience while using the instructions provided in this guide This guide is used to register and login to Web sites or applications. This guide and all their user IDs, passwords, and personal information ...
..., when available, from the http://www.pc.ibm.com/ww/security/secdownload.html IBM web site. Chapter 2, "Procedures" contains procedures for users of Client Security Software Version 4.0 or higher who want help keeping track of IBM Password Manager features and functions. Chapter 3, "Limitations"... limitations and problems you use this guide This guide is designed to help you might experience while using the instructions provided in this guide This guide is used to register and login to Web sites or applications. This guide and all their user IDs, passwords, and personal information ...
Client Security Password Manager v1.3 - User's Guide (English)
Page 10
...you need to add another application to Password Manager, such as when you are surfing the Web. See the Client Security Software User's Guide for more information on computers running the Windows NT operating system. v Access Password Manager from a Client Security archive to protect ... Manager does not support icon tray functionality on how to archive information. 2 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide Each Password Manager function can also be easily accessed by a simple keyboard shortcut. If you are using a Windows NT system, use the...
...you need to add another application to Password Manager, such as when you are surfing the Web. See the Client Security Software User's Guide for more information on computers running the Windows NT operating system. v Access Password Manager from a Client Security archive to protect ... Manager does not support icon tray functionality on how to archive information. 2 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide Each Password Manager function can also be easily accessed by a simple keyboard shortcut. If you are using a Windows NT system, use the...
Client Security Password Manager v1.3 - User's Guide (English)
Page 12
.... Manage window enables you would like to edit. 4 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide Notes: 1. Enter your user ID, password, and other information entered into Password Manager that you want to work with the keyboard shortcut Ctrl+Shift...To change your UVM passphrase, or complete the access requirements specified by the UVM user authentication policy. 4. Edit your UVM passphrase, or complete the access requirements specified by the UVM user authentication policy. 3. Select from the following options: v Entry information To edit ...
.... Manage window enables you would like to edit. 4 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide Notes: 1. Enter your user ID, password, and other information entered into Password Manager that you want to work with the keyboard shortcut Ctrl+Shift...To change your UVM passphrase, or complete the access requirements specified by the UVM user authentication policy. 4. Edit your UVM passphrase, or complete the access requirements specified by the UVM user authentication policy. 3. Select from the following options: v Entry information To edit ...
Client Security Password Manager v1.3 - User's Guide (English)
Page 14
..., you can also be printed or saved to close the export reader file. 6 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide If you designated and copy it to save your sensitive information in the Windows icon tray and click Manage. Set a passphrase for your UVM... passphrase, or complete the access requirements specified by the UVM user authentication policy. 3. Click OK to the computer hard drive. Enter your export file and click OK. Click Save to access the exported data...
..., you can also be printed or saved to close the export reader file. 6 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide If you designated and copy it to save your sensitive information in the Windows icon tray and click Manage. Set a passphrase for your UVM... passphrase, or complete the access requirements specified by the UVM user authentication policy. 3. Click OK to the computer hard drive. Enter your export file and click OK. Click Save to access the exported data...
Client Security Password Manager v1.3 - User's Guide (English)
Page 18
Tivoli is a trademark of others. 10 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in this document and all licensed material available for it are trademarks of the IBM ...
Tivoli is a trademark of others. 10 IBM® Client Security Solutions: Password Manager Version 1.3 User's Guide Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in this document and all licensed material available for it are trademarks of the IBM ...
(English) Access Connections Profile Deployment guide
Page 5
... provide instructions and solutions for working with your Lenovo™ authorized representative. iii Preface This guide is to this guide is intended for IT administrators, or those who are available for each target computer. The Access Connections application provides application help, which administrators and users can help you have suggestions or comments, communicate with...
... provide instructions and solutions for working with your Lenovo™ authorized representative. iii Preface This guide is to this guide is intended for IT administrators, or those who are available for each target computer. The Access Connections application provides application help, which administrators and users can help you have suggestions or comments, communicate with...
(English) Access Connections Profile Deployment guide
Page 10
...the current list of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide By capturing working configurations ...in profiles which wireless location profile will be reduced and users can automatically switch between profiles. ...
...the current list of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide By capturing working configurations ...in profiles which wireless location profile will be reduced and users can automatically switch between profiles. ...
(English) Access Connections Profile Deployment guide
Page 16
...to create location profiles, or how to use Access Connections, see the Access Connections User's Guide located at the following steps to ensure sensitive data is configured for users by Access Connections. If the location profile being deployed is not exposed. Click Exit...packages. Deploy the distribution package to client systems. Creating a distribution package Complete the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2. Click Enable Administrator Feature. 5. When deploying location profiles that is ...
...to create location profiles, or how to use Access Connections, see the Access Connections User's Guide located at the following steps to ensure sensitive data is configured for users by Access Connections. If the location profile being deployed is not exposed. Click Exit...packages. Deploy the distribution package to client systems. Creating a distribution package Complete the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-63042 2. Click Enable Administrator Feature. 5. When deploying location profiles that is ...
(English) Access Connections Profile Deployment guide
Page 18
... for the following settings control the Access Connections policies for deployment are saved in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. If you do not set a policy, the applicable function will be greyed out for Access Connections The following ...Windows 2000 and XP only)" on computer serial numbers. however, users can not modify or copy the profile; Define Distribution Control list 10 Access Connections Deployment Guide v Allow all changes / Allow deletion: Users can modify the profile; On the Export Location Profiles dialog ...
... for the following settings control the Access Connections policies for deployment are saved in the Access Connections install directory - (C:\PROGRAM FILES\THINKPAD\ CONNECTUTILITIES). 8. If you do not set a policy, the applicable function will be greyed out for Access Connections The following ...Windows 2000 and XP only)" on computer serial numbers. however, users can not modify or copy the profile; Define Distribution Control list 10 Access Connections Deployment Guide v Allow all changes / Allow deletion: Users can modify the profile; On the Export Location Profiles dialog ...
(English) Access Connections Profile Deployment guide
Page 20
... wireless LAN radio control v Allow selection of the Client Configuration Policy: Figure 8. v Checking for Windows users without administrator privileges to create and apply location profiles v Allow wireless connection at Windows logon v Close all wireless network connections when... disabled when the Ethernet cable is enabled, the Ethernet port will remain 12 Access Connections Deployment Guide You can set the following policies: v Allow Windows users without administrator privileges. Global settings: On the Network panel of Access Connections. Client Configuration Policy ...
... wireless LAN radio control v Allow selection of the Client Configuration Policy: Figure 8. v Checking for Windows users without administrator privileges to create and apply location profiles v Allow wireless connection at Windows logon v Close all wireless network connections when... disabled when the Ethernet cable is enabled, the Ethernet port will remain 12 Access Connections Deployment Guide You can set the following policies: v Allow Windows users without administrator privileges. Global settings: On the Network panel of Access Connections. Client Configuration Policy ...
(English) Access Connections Profile Deployment guide
Page 24
... Set default printer v Use VPN connection v Override TCP/IP and DNS defaults Figure 12. Define Location Profiles Additional Settings for the end users is selected, all the new Wired/Wireless profiles will not be added to an unencrypted network v Do not show the Services menu Roaming Options... v Do not automatically include the new Wired/Wireless profile in the roaming list 16 Access Connections Deployment Guide v Do not allow clients to change automatic location switching settings Note: If this option is greyed out. v Do not automatically include ...
... Set default printer v Use VPN connection v Override TCP/IP and DNS defaults Figure 12. Define Location Profiles Additional Settings for the end users is selected, all the new Wired/Wireless profiles will not be added to an unencrypted network v Do not show the Services menu Roaming Options... v Do not automatically include the new Wired/Wireless profile in the roaming list 16 Access Connections Deployment Guide v Do not allow clients to change automatic location switching settings Note: If this option is greyed out. v Do not automatically include ...
(English) Access Connections Profile Deployment guide
Page 26
... use an existing PAC if available with this package: 18 Access Connections Deployment Guide The .loa package imports and exports the PAC AID Groups to use the existing PAC. Additional Settings for the user, then the client system requests a new PAC. Enable Windows firewall - If...package, mark the check box Include PAC AID Groups with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (AID). Disable file and printer sharing v Start applications automatically v Set default printer v ...
... use an existing PAC if available with this package: 18 Access Connections Deployment Guide The .loa package imports and exports the PAC AID Groups to use the existing PAC. Additional Settings for the user, then the client system requests a new PAC. Enable Windows firewall - If...package, mark the check box Include PAC AID Groups with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (AID). Disable file and printer sharing v Start applications automatically v Set default printer v ...
(English) Access Connections Profile Deployment guide
Page 32
...roaming selection for Access Connections that they can be modified using the ADM file template. network 24 Access Connections Deployment Guide Computer Configuration > Administrative Templates > ThinkVantage > Access Connections Policy setting Description Block admin feature Do not allow clients ...Disable the Find Wireless Network function. Default roaming Newly created wired or wireless profile will not be disconnected logoff when user logs off. Table 1. Disable auto switching Disable the automatic location profile switching feature. This setting is not available...
...roaming selection for Access Connections that they can be modified using the ADM file template. network 24 Access Connections Deployment Guide Computer Configuration > Administrative Templates > ThinkVantage > Access Connections Policy setting Description Block admin feature Do not allow clients ...Disable the Find Wireless Network function. Default roaming Newly created wired or wireless profile will not be disconnected logoff when user logs off. Table 1. Disable auto switching Disable the automatic location profile switching feature. This setting is not available...
(English) Access Connections Profile Deployment guide
Page 34
...thinkpad\connectutilities4" cd c:\program files\thinkpad\connectutilities4 qctray /importsilently Echo Silent Import was performed > "c:\program files\ thinkpad\connectutilities4\Silent.txt" Echo Silent Import was performed goto SilentImportDone :SilentImportDoneBefore Echo Silent Import was done before :SilentImportDone 26 Access Connections Deployment Guide..., click Add to give rights to the following example to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. Deploying .LOA and .SIG files through Active Directory with logon scripts The...
...thinkpad\connectutilities4" cd c:\program files\thinkpad\connectutilities4 qctray /importsilently Echo Silent Import was performed > "c:\program files\ thinkpad\connectutilities4\Silent.txt" Echo Silent Import was performed goto SilentImportDone :SilentImportDoneBefore Echo Silent Import was done before :SilentImportDone 26 Access Connections Deployment Guide..., click Add to give rights to the following example to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. Deploying .LOA and .SIG files through Active Directory with logon scripts The...
(English) Access Connections Profile Deployment guide
Page 42
Trademarks significantly. Microsoft and Windows 2000, Windows XP and Windows Vista are trademarks of Lenovo in the United States, other countries, or both: Access Connections Lenovo ThinkVantage ThinkPad IBM is a trademark of International Business Machines Corporation in the United States, other...may vary. The following terms are trademarks of others. 34 Access Connections Deployment Guide Intel is a trademark of Intel Corporation in the United States, other countries, or both . Users of this document should verify the applicable data for their specific environment.
Trademarks significantly. Microsoft and Windows 2000, Windows XP and Windows Vista are trademarks of Lenovo in the United States, other countries, or both: Access Connections Lenovo ThinkVantage ThinkPad IBM is a trademark of International Business Machines Corporation in the United States, other...may vary. The following terms are trademarks of others. 34 Access Connections Deployment Guide Intel is a trademark of Intel Corporation in the United States, other countries, or both . Users of this document should verify the applicable data for their specific environment.
(English) Deployment Guide for IBM Access Connections
Page 3
...IBM Access Connections on computers in mind. IBM ThinkVantage™ Technologies and the deployment guides that accompany them are developed with your IBM authorized representative. Preface This guide is intended to this guide, visit this Web site: http://www.pc.ibm.com/us/think/thinkvantagetech.html ©...with IT professionals and the unique challenges that licenses for the software are available for each target computer. The guide is intended for IT administrators, or those who are responsible for information about the technologies that can help , which administrators and...
...IBM Access Connections on computers in mind. IBM ThinkVantage™ Technologies and the deployment guides that accompany them are developed with your IBM authorized representative. Preface This guide is intended to this guide, visit this Web site: http://www.pc.ibm.com/us/think/thinkvantagetech.html ©...with IT professionals and the unique challenges that licenses for the software are available for each target computer. The guide is intended for IT administrators, or those who are responsible for information about the technologies that can help , which administrators and...
(English) Deployment Guide for IBM Access Connections
Page 10
... utilities in a location. They can also be set to simplify deployment. Profiles can be inaccessible. 4 IBM Access Connections Deployment Guide Version 3.3.0 IBM Access Connections software is available. Utilities such as Ethernet-connected broadband (DSL, cable, ISDN). All WLAN configuration utilities... Access Connections lets you need to take significantly more extensive collection of every new IBM ThinkPad® notebook system. Profiles can be found at home, the user must also turn on the highest available compatible connection speed. Plus, Access Connections helps ...
... utilities in a location. They can also be set to simplify deployment. Profiles can be inaccessible. 4 IBM Access Connections Deployment Guide Version 3.3.0 IBM Access Connections software is available. Utilities such as Ethernet-connected broadband (DSL, cable, ISDN). All WLAN configuration utilities... Access Connections lets you need to take significantly more extensive collection of every new IBM ThinkPad® notebook system. Profiles can be found at home, the user must also turn on the highest available compatible connection speed. Plus, Access Connections helps ...
(English) Deployment Guide for IBM Access Connections
Page 12
...your IP connection using the IP config feature. Turning off the Bluetooth radio and to -use . A troubleshooting guide is accessible from the main user interface. Helping your clients stay connected Access Connections software provides your clients with an easy-to set the Bluetooth ...often available where WLAN connectivity is an open (not secure) WLAN such as connecting at home. Access Connections software changes your ThinkPad notebook. v Can prioritize the adapters used in airports, hotels and coffee shops enabling travelers to easily and wirelessly connect to ...
...your IP connection using the IP config feature. Turning off the Bluetooth radio and to -use . A troubleshooting guide is accessible from the main user interface. Helping your clients stay connected Access Connections software provides your clients with an easy-to set the Bluetooth ...often available where WLAN connectivity is an open (not secure) WLAN such as connecting at home. Access Connections software changes your ThinkPad notebook. v Can prioritize the adapters used in airports, hotels and coffee shops enabling travelers to easily and wirelessly connect to ...
(English) Deployment Guide for IBM Access Connections
Page 14
Access Connections also offers an automatic repair button to make network connections. Diagnosing network connectivity problems IBM Access Connections supports a new feature of network diagnostics when users are unable to recover the network connection in streamlined management of failure and recommended actions. It shows detailed progress of connection status and finds suspected reasons of network connectivity and helping you achieve lower overall IT costs. up profiles individually at each client-resulting in some cases. 8 IBM Access Connections Deployment Guide Version 3.3.0
Access Connections also offers an automatic repair button to make network connections. Diagnosing network connectivity problems IBM Access Connections supports a new feature of network diagnostics when users are unable to recover the network connection in streamlined management of failure and recommended actions. It shows detailed progress of connection status and finds suspected reasons of network connectivity and helping you achieve lower overall IT costs. up profiles individually at each client-resulting in some cases. 8 IBM Access Connections Deployment Guide Version 3.3.0
(English) Deployment Guide for IBM Access Connections
Page 17
...site.wss/document.do the following command: SETUP.EXE /S You can import the location profiles that page, click Software download and User's Guide to the hard disk drive. 3. Start Windows 2000 or Windows XP, and then log on the client computer. v Deployment packages... or revised location profiles to client computers. Installing the integrated IBM Access Connections package To install IBM Access Connections 3.0 or later without user interaction, do ?lndocid=ACON-DEPLOY. Type the following : 1. Chapter 4. The Enabler is required to deploy location profiles that includes ...
...site.wss/document.do the following command: SETUP.EXE /S You can import the location profiles that page, click Software download and User's Guide to the hard disk drive. 3. Start Windows 2000 or Windows XP, and then log on the client computer. v Deployment packages... or revised location profiles to client computers. Installing the integrated IBM Access Connections package To install IBM Access Connections 3.0 or later without user interaction, do ?lndocid=ACON-DEPLOY. Type the following : 1. Chapter 4. The Enabler is required to deploy location profiles that includes ...