(English) Access Connections Profile Deployment guide
Page 9
... WLAN hot spot. Chapter 1. Access Connections has the ability to it. v View location profile and connection status The Connection Status window allows you move your computer from the list and connect to support automatic location switching between location profiles. v Find wireless networks....v Create new location profiles Access Connections provides a wizard that helps you fix the connection. If the © Lenovo 2008. The Connection Status window is opened by default when Access Connections is shown for the network connection and for the components used by the ...
... WLAN hot spot. Chapter 1. Access Connections has the ability to it. v View location profile and connection status The Connection Status window allows you move your computer from the list and connect to support automatic location switching between location profiles. v Find wireless networks....v Create new location profiles Access Connections provides a wizard that helps you fix the connection. If the © Lenovo 2008. The Connection Status window is opened by default when Access Connections is shown for the network connection and for the components used by the ...
(English) Access Connections Profile Deployment guide
Page 13
.... 2. a. d. Other versions of Access Connections. c) Click No to your local directory. © Lenovo 2008. d) Copy the script file generated at C:\Windows\setup.iss to restart the system later. The following instructions provide installation procedures for the standalone version of Access... Connections may not function properly with default path for Windows Vista. Start Windows 2000, Windows XP or Windows Vista, and then log on page 31. The following steps: a) Go to the Access Connections install...
.... 2. a. d. Other versions of Access Connections. c) Click No to your local directory. © Lenovo 2008. d) Copy the script file generated at C:\Windows\setup.iss to restart the system later. The following instructions provide installation procedures for the standalone version of Access... Connections may not function properly with default path for Windows Vista. Start Windows 2000, Windows XP or Windows Vista, and then log on page 31. The following steps: a) Go to the Access Connections install...
(English) Access Connections Profile Deployment guide
Page 15
... from the following path: C:\Program Files\ThinkPad\ConnectUtilities 3. Do not use the administrator features of Access Connections is installed in the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY Note: The Import/Export... application panel. To deploy Access Connections on to enable and use the Import/Export feature for Windows Vista © Lenovo 2008. Run AdmEnblr.exe that is used for Windows 2000 and XP Figure 2. Figure 1. Chapter 3. Enabler for Administrator Profile Deployment Feature for migrating...
... from the following path: C:\Program Files\ThinkPad\ConnectUtilities 3. Do not use the administrator features of Access Connections is installed in the following Lenovo Web site: http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle= lenovo&lndocid=ACON-DEPLOY Note: The Import/Export... application panel. To deploy Access Connections on to enable and use the Import/Export feature for Windows Vista © Lenovo 2008. Run AdmEnblr.exe that is used for Windows 2000 and XP Figure 2. Figure 1. Chapter 3. Enabler for Administrator Profile Deployment Feature for migrating...
(English) Access Connections Profile Deployment guide
Page 17
...5. Select the User Access Policy from the drop down menu. Working with the Administrator Feature 9 Create Distribution Package panel for Windows Vista 3. The non-modifiable parameters are in the profile cannot be modified, deleted or copied. The profile cannot be defined ...Advanced TCP/IP settings, and wireless settings. Chapter 3. v Deny network setting changes / Deny deletion: The network settings in place for Windows 2000 or XP, and Windows Vista: Figure 4. The following values: v Deny all changes / Deny Deletion: Users cannot perform operations such as modify, copy, or...
...5. Select the User Access Policy from the drop down menu. Working with the Administrator Feature 9 Create Distribution Package panel for Windows Vista 3. The non-modifiable parameters are in the profile cannot be modified, deleted or copied. The profile cannot be defined ...Advanced TCP/IP settings, and wireless settings. Chapter 3. v Deny network setting changes / Deny deletion: The network settings in place for Windows 2000 or XP, and Windows Vista: Figure 4. The following values: v Deny all changes / Deny Deletion: Users cannot perform operations such as modify, copy, or...
(English) Access Connections Profile Deployment guide
Page 18
...List based on page 18 v "Allow silent import of the Create Distribution Package panel. 6. Distribution Control List with this package (Windows 2000 and XP only)" on computer serial numbers. however, users can modify the profile; v Allow all changes / Allow deletion...Distribution Control list 10 Access Connections Deployment Guide Attention: For image deployment, the *.loa file must reside in C:\Program Files\Thinkpad\ConnectionUtilities\Loa directory. Define the Access Connections policy settings for the following settings control the Access Connections policies for the user...
...List based on page 18 v "Allow silent import of the Create Distribution Package panel. 6. Distribution Control List with this package (Windows 2000 and XP only)" on computer serial numbers. however, users can modify the profile; v Allow all changes / Allow deletion...Distribution Control list 10 Access Connections Deployment Guide Attention: For image deployment, the *.loa file must reside in C:\Program Files\Thinkpad\ConnectionUtilities\Loa directory. Define the Access Connections policy settings for the following settings control the Access Connections policies for the user...
(English) Access Connections Profile Deployment guide
Page 19
... contains a single serial number. Figure 7. This method of distribution enables you want to prevent others from enabling the Administrator Feature on page 12. v Checking for Windows users without administrator privileges. v Create and apply WLAN location profiles using the Find Wireless Network function for updates. Create Group The file must be created...
... contains a single serial number. Figure 7. This method of distribution enables you want to prevent others from enabling the Administrator Feature on page 12. v Checking for Windows users without administrator privileges. v Create and apply WLAN location profiles using the Find Wireless Network function for updates. Create Group The file must be created...
(English) Access Connections Profile Deployment guide
Page 20
... selection of Global Settings, you can set the following policies: v Allow Windows users without administrator privileges. You can configure for the Client tab of Access Connections. v Checking for Windows users without administrator privileges to create and apply location profiles v Allow wireless ...connection at Windows logon v Close all wireless network connections when a user logs off v Disable ...
... selection of Global Settings, you can set the following policies: v Allow Windows users without administrator privileges. You can configure for the Client tab of Access Connections. v Checking for Windows users without administrator privileges to create and apply location profiles v Allow wireless ...connection at Windows logon v Close all wireless network connections when a user logs off v Disable ...
(English) Access Connections Profile Deployment guide
Page 22
...v Show the wireless status icon in the task tray v Display the progress indicator window when a profile is being applied 14 Access Connections Deployment Guide Network Global Settings panel for Windows Vista On the Notification panel of Global settings, you can set the following screen ...captures provide examples for the Global Settings panel for Access Connections when installed on the Windows Vista operating system: Figure 9. Network Global...
...v Show the wireless status icon in the task tray v Display the progress indicator window when a profile is being applied 14 Access Connections Deployment Guide Network Global Settings panel for Windows Vista On the Notification panel of Global settings, you can set the following screen ...captures provide examples for the Global Settings panel for Access Connections when installed on the Windows Vista operating system: Figure 9. Network Global...
(English) Access Connections Profile Deployment guide
Page 24
... not automatically include wireless profiles without security in the new roaming list Note: If this option is selected, the automatic location switching settings for Windows XP: Using the Windows XP operating system, you can set the following policies: v Security settings v Start applications automatically v Set default printer v Use VPN connection v Override TCP/IP...
... not automatically include wireless profiles without security in the new roaming list Note: If this option is selected, the automatic location switching settings for Windows XP: Using the Windows XP operating system, you can set the following policies: v Security settings v Start applications automatically v Set default printer v Use VPN connection v Override TCP/IP...
(English) Access Connections Profile Deployment guide
Page 25
... printer v Override TCP/IP and DNS defaults v Enable VPN connection v Override Home page v Override Proxy Configurations Figure 13. Enable Windows firewall - Additional Settings for Windows XP Additional Settings for Vista: Using the Windows Vista operating system, you can set the following policies on the Additional Settings tab for Additional Settings v Network Security - Default...
... printer v Override TCP/IP and DNS defaults v Enable VPN connection v Override Home page v Override Proxy Configurations Figure 13. Enable Windows firewall - Additional Settings for Windows XP Additional Settings for Vista: Using the Windows Vista operating system, you can set the following policies on the Additional Settings tab for Additional Settings v Network Security - Default...
(English) Access Connections Profile Deployment guide
Page 26
... an existing PAC if available with the Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. Enable Windows firewall - If not, then a confirmatory message is shown to the user to use the existing PAC. Additional Settings for the user...Include PAC AID Groups with this package: 18 Access Connections Deployment Guide If a matching PAC does not exist for Windows Vista PAC AID Groups with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (...
... an existing PAC if available with the Extensible Authentication Protocol-Flexible Authentication via Secure Tunneling (EAP-FAST) and a PAC key. Enable Windows firewall - If not, then a confirmatory message is shown to the user to use the existing PAC. Additional Settings for the user...Include PAC AID Groups with this package: 18 Access Connections Deployment Guide If a matching PAC does not exist for Windows Vista PAC AID Groups with this package (Windows 2000 and XP only) Protected Access Credentials (PAC) protects user credentials that are identified by an authority identity (...
(English) Access Connections Profile Deployment guide
Page 29
...policy needs to be modified, you can select import from the manage profiles window and manually import the package by providing the same passphrase at the prompt that... , complete the following examples describe deployment scenarios used to client computers. For © Lenovo 2008. Portions © IBM Corp. 2005. 21 Deploy on new computers To deploy ... migrate Location Profiles on page 31. 5. After restarting the system, Access Connection is C:\Program Files\ThinkPad\ConnectUtilities). 4. If the silent import option was used in Chapter 3, "Working with Access Connections,...
...policy needs to be modified, you can select import from the manage profiles window and manually import the package by providing the same passphrase at the prompt that... , complete the following examples describe deployment scenarios used to client computers. For © Lenovo 2008. Portions © IBM Corp. 2005. 21 Deploy on new computers To deploy ... migrate Location Profiles on page 31. 5. After restarting the system, Access Connection is C:\Program Files\ThinkPad\ConnectUtilities). 4. If the silent import option was used in Chapter 3, "Working with Access Connections,...
(English) Access Connections Profile Deployment guide
Page 32
...created wireless profile with no security will not be automatically included in a distribution package. This setting is not available in Windows Vista. Disable auto switching Disable the automatic location profile switching feature. Disable check update Disable the check for updates feature....profiles. Close connection at To enhance security, wireless connection would be available when creating wireless LAN profiles. Default ICF Enable Windows firewall button is enabled by default. Default override homepage Override home page button is enabled by default. Default printer share...
...created wireless profile with no security will not be automatically included in a distribution package. This setting is not available in Windows Vista. Disable auto switching Disable the automatic location profile switching feature. Disable check update Disable the check for updates feature....profiles. Close connection at To enhance security, wireless connection would be available when creating wireless LAN profiles. Default ICF Enable Windows firewall button is enabled by default. Default override homepage Override home page button is enabled by default. Default printer share...
(English) Access Connections Profile Deployment guide
Page 33
...Do not allow clients to an unencrypted network. The wireless authentication can be changed by clients. This setting is not available in Windows Vista. Computer Configuration > Administrative Templates > ThinkVantage > Access Connections (continued) Policy setting Description Disable location switching feature changes Automatic ...displayed. Hide services menu Do not show services menu. Chapter 5. Disable peer to peer The Peer to use the Windows logon credentials. Show wireless tray Wireless LAN and WAN status icon would be displayed when connecting to view or edit start...
...Do not allow clients to an unencrypted network. The wireless authentication can be changed by clients. This setting is not available in Windows Vista. Computer Configuration > Administrative Templates > ThinkVantage > Access Connections (continued) Policy setting Description Disable location switching feature changes Automatic ...displayed. Hide services menu Do not show services menu. Chapter 5. Disable peer to peer The Peer to use the Windows logon credentials. Show wireless tray Wireless LAN and WAN status icon would be displayed when connecting to view or edit start...
(English) Access Connections Profile Deployment guide
Page 34
...ADS Test panel under the Security Filtering section, click Add to give rights to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. When deploying the .loa and .sig files through Active Directory with logon scripts The .loa file and .sig file ...click Add. 7. Copy the Acloa.bat file your Group Policy Object (GPO). 4. Adding logon scripts into Group policy The following : User Configuration->Windows Settings->Scripts (Logon/Logoff)->Logon 6. Right click on page 7. From the Group Policy Object Editor panel, navigate to create the Acloa.bat file: ...
...ADS Test panel under the Security Filtering section, click Add to give rights to setup logon scripts for the user or computer in c:\programfiles\thinkpad\ connectutilities\LOA. When deploying the .loa and .sig files through Active Directory with logon scripts The .loa file and .sig file ...click Add. 7. Copy the Acloa.bat file your Group Policy Object (GPO). 4. Adding logon scripts into Group policy The following : User Configuration->Windows Settings->Scripts (Logon/Logoff)->Logon 6. Right click on page 7. From the Group Policy Object Editor panel, navigate to create the Acloa.bat file: ...
(English) Access Connections Profile Deployment guide
Page 37
...can input these commands are executed. Access Connections does not need to be running before these commands interactively within a command prompt window, or you can accept command line input to switch between location profiles and to close all other users. Appendix A. Considering this... AcPrfMgrSvc. \qctray.exe/startac v Find Wireless networks. \qctray.exe /findwInw v Display QCTRAY help information. \qctray.exe /help © Lenovo 2008. Portions © IBM Corp. 2005. 29 Also when the third party application that has called this requires administrative privileges, the command ...
...can input these commands are executed. Access Connections does not need to be running before these commands interactively within a command prompt window, or you can accept command line input to switch between location profiles and to close all other users. Appendix A. Considering this... AcPrfMgrSvc. \qctray.exe/startac v Find Wireless networks. \qctray.exe /findwInw v Display QCTRAY help information. \qctray.exe /help © Lenovo 2008. Portions © IBM Corp. 2005. 29 Also when the third party application that has called this requires administrative privileges, the command ...
(English) Access Connections Profile Deployment guide
Page 42
Users of Microsoft Corporation in the United States, other countries, or both. Microsoft and Windows 2000, Windows XP and Windows Vista are trademarks of Lenovo in the United States, other countries, or both: Access Connections Lenovo ThinkVantage ThinkPad IBM is a trademark of International Business Machines Corporation in the United States, other countries, or both . Intel is no...
Users of Microsoft Corporation in the United States, other countries, or both. Microsoft and Windows 2000, Windows XP and Windows Vista are trademarks of Lenovo in the United States, other countries, or both: Access Connections Lenovo ThinkVantage ThinkPad IBM is a trademark of International Business Machines Corporation in the United States, other countries, or both . Intel is no...
Hardware Maintenance Manual
Page 30
...; If the computer you are servicing is available only on models preinstalled with the Windows® 7 operating system. Checkout guide Use the following : 24 Hardware Maintenance Manual Note: The Lenovo Solution Center program is not installed with the ThinkPad notebook computer. For additional information about this program, see the help information system. It...
...; If the computer you are servicing is available only on models preinstalled with the Windows® 7 operating system. Checkout guide Use the following : 24 Hardware Maintenance Manual Note: The Lenovo Solution Center program is not installed with the ThinkPad notebook computer. For additional information about this program, see the help information system. It...
Hardware Maintenance Manual
Page 31
...servicing is detected, information messages will be tested. 6. When the Boot Menu window opens, release the F12 key. 3. Use the arrow keys to troubleshoot the problem. The options on the computer. Click Lenovo Bootable Diagnostics. 3. When a problem is not installed with the UEFI diagnostic ... is preinstalled on the screen to create a bootable diagnostic medium on a USB device or CD. General checkout 25 When the ThinkPad logo is displayed, go to test computer memory and internal storage devices, view system information, and check and recover the internal storage...
...servicing is detected, information messages will be tested. 6. When the Boot Menu window opens, release the F12 key. 3. Use the arrow keys to troubleshoot the problem. The options on the computer. Click Lenovo Bootable Diagnostics. 3. When a problem is not installed with the UEFI diagnostic ... is preinstalled on the screen to create a bootable diagnostic medium on a USB device or CD. General checkout 25 When the ThinkPad logo is displayed, go to test computer memory and internal storage devices, view system information, and check and recover the internal storage...
Hardware Maintenance Manual
Page 32
...program. • If you suspect a power problem, see the appropriate one of the ac adapter cable. Remove the battery pack. 3. When the Boot Menu window opens, release the F12 key. 4. Follow the instructions on the screen to use the diagnostic program. If an error code is used. • If the...Turn on page 26, and check the power sources. If the computer cannot be launched automatically. 5. When the ThinkPad logo is supplied when you turn on the computer. When the Boot Menu window opens, release the F12 key. 5. Use the arrow keys to select USB HDD and then press Enter. The ...
...program. • If you suspect a power problem, see the appropriate one of the ac adapter cable. Remove the battery pack. 3. When the Boot Menu window opens, release the F12 key. 4. Follow the instructions on the screen to use the diagnostic program. If an error code is used. • If the...Turn on page 26, and check the power sources. If the computer cannot be launched automatically. 5. When the ThinkPad logo is supplied when you turn on the computer. When the Boot Menu window opens, release the F12 key. 5. Use the arrow keys to select USB HDD and then press Enter. The ...