(English) Access Connections Profile Deployment guide
Page 9
... Connections has the ability to support automatic location switching between location profiles Access Connections allows you to you to reconfigure network settings manually. A progress indicator window shows the state of 3G cellular technologies, wireless WAN services are available to change location profiles. Portions...speed wireless access to place, Access Connections can quickly and easily help you move your wireless activity. If the © Lenovo 2008. If the connection fails, a button appears to help users connect to a network without having to switch between location...
... Connections has the ability to support automatic location switching between location profiles Access Connections allows you to you to reconfigure network settings manually. A progress indicator window shows the state of 3G cellular technologies, wireless WAN services are available to change location profiles. Portions...speed wireless access to place, Access Connections can quickly and easily help you move your wireless activity. If the © Lenovo 2008. If the connection fails, a button appears to help users connect to a network without having to switch between location...
(English) Access Connections Profile Deployment guide
Page 10
...will be made active when your currently applied location profile becomes unavailable, Access Connection can be reduced and users can also manually create a location profile for available networks and automatically switch to a matching location profile. Considerations for deployment To view ...same wireless network name. v Automatic switching of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide The ...
...will be made active when your currently applied location profile becomes unavailable, Access Connection can be reduced and users can also manually create a location profile for available networks and automatically switch to a matching location profile. Considerations for deployment To view ...same wireless network name. v Automatic switching of supported ThinkPad® systems and wireless WLAN and WAN drivers, see the following Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=MIGR-4ZLNJB 2 Access Connections Deployment Guide The ...
(English) Access Connections Profile Deployment guide
Page 19
... to become an administrator: will be imported which controls the capabilities that each line contains a single serial number. This optional step is designed primarily for manual importing. Creating Groups: When creating groups of serial numbers, flat text files can also control a users ability to the user after the *.loa file is...
... to become an administrator: will be imported which controls the capabilities that each line contains a single serial number. This optional step is designed primarily for manual importing. Creating Groups: When creating groups of serial numbers, flat text files can also control a users ability to the user after the *.loa file is...
(English) Access Connections Profile Deployment guide
Page 21
v Enable auto deletion of unused profiles v Disable the Peer to Peer community feature Chapter 3. To re-enable the Ethernet port, manually apply the profile for the Ethernet connection. disabled even when the Ethernet cable is plugged in again. Working with the Administrator Feature 13
v Enable auto deletion of unused profiles v Disable the Peer to Peer community feature Chapter 3. To re-enable the Ethernet port, manually apply the profile for the Ethernet connection. disabled even when the Ethernet cable is plugged in again. Working with the Administrator Feature 13
(English) Access Connections Profile Deployment guide
Page 29
...in the integrated package and instead after installation of the integrated package. For © Lenovo 2008. v Deploy Location Profiles and Client Policy on page 7 earlier. Deploy on...to be modified, you can select import from the manage profiles window and manually import the package by administrator. The following examples describe deployment scenarios used to... modified client configuration policy. After restarting the system, Access Connection is C:\Program Files\ThinkPad\ConnectUtilities). 4. If only the client configuration policy needs to include the distribution package ...
...in the integrated package and instead after installation of the integrated package. For © Lenovo 2008. v Deploy Location Profiles and Client Policy on page 7 earlier. Deploy on...to be modified, you can select import from the manage profiles window and manually import the package by administrator. The following examples describe deployment scenarios used to... modified client configuration policy. After restarting the system, Access Connection is C:\Program Files\ThinkPad\ConnectUtilities). 4. If only the client configuration policy needs to include the distribution package ...
(English) Deployment Guide for IBM Access Connections
Page 7
... in Access Connections and allows you know the appropriate settings. v Switch between location profiles as home or work. You can also manually create a location profile for a detected wireless network if you to change location profiles. If the connection attempt is started. Features.... Overview IBM Access Connections is shown for the network connection and for available networks and automatically switch to reconfigure network settings manually. This feature is useful when you are also supported. Virtual private network (VPN) connections are traveling or in range of...
... in Access Connections and allows you know the appropriate settings. v Switch between location profiles as home or work. You can also manually create a location profile for a detected wireless network if you to change location profiles. If the connection attempt is started. Features.... Overview IBM Access Connections is shown for the network connection and for available networks and automatically switch to reconfigure network settings manually. This feature is useful when you are also supported. Virtual private network (VPN) connections are traveling or in range of...
(English) Deployment Guide for IBM Access Connections
Page 11
...reestablish a network connection. Network settings like airports, hotels or coffee shops and get back to fixed IP address and explicit DNS settings. Manually changing these generally require a level of the Ethernet connection and senses and enables the wireless connection. With the click of the mouse, key...like these settings with every location change can result in help -desk calls and other technical support. They are used to control access to manually initiate a search for wireless LAN security, including WEP, IEEE 802.1x, Cisco LEAP and Wi-Fi protected access (WPA). When you attend...
...reestablish a network connection. Network settings like airports, hotels or coffee shops and get back to fixed IP address and explicit DNS settings. Manually changing these generally require a level of the Ethernet connection and senses and enables the wireless connection. With the click of the mouse, key...like these settings with every location change can result in help -desk calls and other technical support. They are used to control access to manually initiate a search for wireless LAN security, including WEP, IEEE 802.1x, Cisco LEAP and Wi-Fi protected access (WPA). When you attend...
(English) Deployment Guide for IBM Access Connections
Page 21
... Access Connections. Distribution control lists ensure that represent different organizations of users who need different location profiles. Chapter 4. This optional step is designed primarily for manual importing. These text files can be formatted such that has been created with the Administrator Feature or by exporting a list that each line contains a single...
... Access Connections. Distribution control lists ensure that represent different organizations of users who need different location profiles. Chapter 4. This optional step is designed primarily for manual importing. These text files can be formatted such that has been created with the Administrator Feature or by exporting a list that each line contains a single...
IBM System Information Center Administrator's Guide
Page 9
...where a variety of functions (including generating reports, tasks, and specialized e-mails) are predominantly software innovations delivered through the IBM ThinkPad notebook and ThinkCentre desktop computer brands. The client agent also gathers a rich set of tasks and advanced functions. Three types of... major components: the IBM System Information Center program and the IBM System Information Gatherer program. Or, information can be manually entered for other IBM ThinkVantage Technology deployment information. In addition, the client agent scans for non-personal computer assets....
...where a variety of functions (including generating reports, tasks, and specialized e-mails) are predominantly software innovations delivered through the IBM ThinkPad notebook and ThinkCentre desktop computer brands. The client agent also gathers a rich set of tasks and advanced functions. Three types of... major components: the IBM System Information Center program and the IBM System Information Gatherer program. Or, information can be manually entered for other IBM ThinkVantage Technology deployment information. In addition, the client agent scans for non-personal computer assets....
IBM System Information Center Administrator's Guide
Page 16
Note: After you have the option later of manually changing this file will start automatically, complete the following step requires that automatically perform functions such as generating reports and uploading asset scans. If the ...
Note: After you have the option later of manually changing this file will start automatically, complete the following step requires that automatically perform functions such as generating reports and uploading asset scans. If the ...
IBM System Information Center Administrator's Guide
Page 17
... or passwords needed to connect to restart your computer will be the Administrator account. A User can create their drives; The System Information Center program can manually add a User account or change the authority of the System Information Center program on page 22. After completing, the ″Restart required to which users...
... or passwords needed to connect to restart your computer will be the Administrator account. A User can create their drives; The System Information Center program can manually add a User account or change the authority of the System Information Center program on page 22. After completing, the ″Restart required to which users...
IBM System Information Center Administrator's Guide
Page 20
... field of the required antivirus application (must appear in Windows Control Panel Add/Remove Programs list). This concludes the installation of the setup. A User can manually add a User account or change the authority of HTTP:// with HTTPS://. (For more information, see "Creating accounts" on page 22. Securing your computer will require...
... field of the required antivirus application (must appear in Windows Control Panel Add/Remove Programs list). This concludes the installation of the setup. A User can manually add a User account or change the authority of HTTP:// with HTTPS://. (For more information, see "Creating accounts" on page 22. Securing your computer will require...
IBM System Information Center Administrator's Guide
Page 34
... the basic functions that reports and tasks can be targeted to a certain group of ways to add new assets and asset information either automatically or manually to perform specific functions, see the IBM System Information Center online help system. v Viewing user information: User information is typically determined by editing details such...
... the basic functions that reports and tasks can be targeted to a certain group of ways to add new assets and asset information either automatically or manually to perform specific functions, see the IBM System Information Center online help system. v Viewing user information: User information is typically determined by editing details such...
IBM System Information Center Administrator's Guide
Page 35
... original installation or by the server in the form of users. This task assumes that you have e-mail functionality enabled. You can also be run manually. This chapter provides information about modifying the ISIC.PROPERTIES file in order to be run on page 37 v "Exporting information using the graphical user interface...
... original installation or by the server in the form of users. This task assumes that you have e-mail functionality enabled. You can also be run manually. This chapter provides information about modifying the ISIC.PROPERTIES file in order to be run on page 37 v "Exporting information using the graphical user interface...
IBM System Information Center Administrator's Guide
Page 38
..., click Tasks and then click All Tasks. Mark the check box of the information used (hours, minutes, days) is displayed. 2. Running a task manually There are able to run at any of the task you refreshed the window). 11. The interval period used in creating the task, such as... System Information Center installation. (You can run an individual task from the Tasks menu v Editing the task To run (or execute) tasks either manually or by manually selecting it will be executed: Type a value in yyyy-mm-dd hh:mm:ss format. The ″Edit task page″ window opens....
..., click Tasks and then click All Tasks. Mark the check box of the information used (hours, minutes, days) is displayed. 2. Running a task manually There are able to run at any of the task you refreshed the window). 11. The interval period used in creating the task, such as... System Information Center installation. (You can run an individual task from the Tasks menu v Editing the task To run (or execute) tasks either manually or by manually selecting it will be executed: Type a value in yyyy-mm-dd hh:mm:ss format. The ″Edit task page″ window opens....
IBM System Information Center Administrator's Guide
Page 40
... menu bar, click Tasks and then click All Tasks. If there is restarted. Custom reports are reports that help you would like to be started manually as described in the procedure for scheduled tasks: Type a time period in the queue. 4. The window fields expand. 6. If necessary, modify the other fields in...
... menu bar, click Tasks and then click All Tasks. If there is restarted. Custom reports are reports that help you would like to be started manually as described in the procedure for scheduled tasks: Type a time period in the queue. 4. The window fields expand. 6. If necessary, modify the other fields in...
IBM System Information Center Administrator's Guide
Page 43
.... Two types of all reports contained within the program. Some sub-reports work in the Display column. As a result, some sub-reports cannot be run manually after you select Add Query Column are only those that uniquely describes the function of available custom reports is displayed. 2. In the Description field, type...
.... Two types of all reports contained within the program. Some sub-reports work in the Display column. As a result, some sub-reports cannot be run manually after you select Add Query Column are only those that uniquely describes the function of available custom reports is displayed. 2. In the Description field, type...
IBM System Information Center Administrator's Guide
Page 65
... file.upload.directory Specifies the location on .assettag In environments where unique asset tags are administered, this property will allow and administrator to remotely send manually collected .EG2 files to the server for processing. User-defined User-defined; Appendix A. file.upload.password = Modifiable Field Field Description Possible Values Value Definition file...
... file.upload.directory Specifies the location on .assettag In environments where unique asset tags are administered, this property will allow and administrator to remotely send manually collected .EG2 files to the server for processing. User-defined User-defined; Appendix A. file.upload.password = Modifiable Field Field Description Possible Values Value Definition file...
IBM System Information Center Administrator's Guide
Page 106
... editing a task 30 generating a custom report 33, 35 reprocessing the database 37 running a task 30 running a task by starting the Task Scheduler 31 running a task manually 30 sending a specialized e-mail 36 working with reports 32 working with tasks 27 technical assistance 50 98
... editing a task 30 generating a custom report 33, 35 reprocessing the database 37 running a task 30 running a task by starting the Task Scheduler 31 running a task manually 30 sending a specialized e-mail 36 working with reports 32 working with tasks 27 technical assistance 50 98
Hard Drive Active Protection system white paper
Page 8
...restricts users without Administrative system rights from shock. Resuming normal operation after being in an environment that their data will be manually controlled by providing enhanced hard drive protection from changing the Active Protection System properties. The Automatic Ignore feature is : ... interface. Summary The IBM Hard Drive Active Protection System can feel confident that has associated vibration (such as to the ThinkPad computer. Enter Standby or hibernation mode - Automatic ignore feature: Sometimes the user is operating. v Show hard drive active...
...restricts users without Administrative system rights from shock. Resuming normal operation after being in an environment that their data will be manually controlled by providing enhanced hard drive protection from changing the Active Protection System properties. The Automatic Ignore feature is : ... interface. Summary The IBM Hard Drive Active Protection System can feel confident that has associated vibration (such as to the ThinkPad computer. Enter Standby or hibernation mode - Automatic ignore feature: Sometimes the user is operating. v Show hard drive active...