(English) Rescue and Recovery 4.3 Deployment Guide
Page 22
...information about BitLocker, go to perform backup and restore operations. You might need to suspend the encryption of BitLocker encryption on the screen to encrypt the Windows operating system partition (usually drive C) only. 5. Select the option Allow BitLocker without a compatible TPM. ...recovery key is needed when booting to encrypt. Start BitLocker from a backup with BitLocker in a secured place. For OEM or non-Lenovo standard preload systems, you can be ignored and everything should be updated in Windows 7, the BitLocker partition should operate normally. 3. ...
...information about BitLocker, go to perform backup and restore operations. You might need to suspend the encryption of BitLocker encryption on the screen to encrypt the Windows operating system partition (usually drive C) only. 5. Select the option Allow BitLocker without a compatible TPM. ...recovery key is needed when booting to encrypt. Start BitLocker from a backup with BitLocker in a secured place. For OEM or non-Lenovo standard preload systems, you can be ignored and everything should be updated in Windows 7, the BitLocker partition should operate normally. 3. ...
(English) Rescue and Recovery 4.3 Deployment Guide
Page 24
... data. The user will optimize system performance by the registry from the selected backup. Operating system and Applications always use to rejuvenate your system screen is authorized to select a backup before and after a restore operation. Rejuvenation When you want to rejuvenate your hard disk drive, you make ...eliminate viruses, adware and spyware, while maintaining your system from CD/DVD backup. To rejuvenate your system. 3. On the Restore your system screen, select Rejuvenate your system, complete the following procedure: 16 Rescue and Recovery 4.3 Deployment Guide
... data. The user will optimize system performance by the registry from the selected backup. Operating system and Applications always use to rejuvenate your system screen is authorized to select a backup before and after a restore operation. Rejuvenation When you want to rejuvenate your hard disk drive, you make ...eliminate viruses, adware and spyware, while maintaining your system from CD/DVD backup. To rejuvenate your system. 3. On the Restore your system screen, select Rejuvenate your system, complete the following procedure: 16 Rescue and Recovery 4.3 Deployment Guide
(English) Rescue and Recovery 4.3 Deployment Guide
Page 73
...collector DLL with no output to install any associated files. v -delete filename.ccd Deletes the custom collector DLL and any drivers needed for example, Lenovo-2373Q1U99MA4L7.XML. InvAgent The InvAgent command can be created. v -listtables List all of the available sections of the XML file is optional. Administrative ... Table 24. (continued) Parameters /y Description Suppresses confirmation of the specified data element. This parameter is created by an admin account to the screen. v -silent Run with the agent. n=1 is the least amount of system information.
...collector DLL with no output to install any associated files. v -delete filename.ccd Deletes the custom collector DLL and any drivers needed for example, Lenovo-2373Q1U99MA4L7.XML. InvAgent The InvAgent command can be created. v -listtables List all of the available sections of the XML file is optional. Administrative ... Table 24. (continued) Parameters /y Description Suppresses confirmation of the specified data element. This parameter is created by an admin account to the screen. v -silent Run with the agent. n=1 is the least amount of system information.
(English) Rescue and Recovery 4.3 Deployment Guide
Page 77
v IBM Flag Value from the data sector (1 if IBM branded or Lenovo-branded system, 0 if not) v Boot Config Displays the installation option used to the service area. The scan code for the F11 key is stored. Administrative ...; seconds to wait if the F11 message is displayed to the DOS bootable area, if one exists. v Alt Partition Partition table index pointing to the screen. Whether a service partition was used by BMGR, this is dumped: v Additional master boot records Sector numbers containing the master boot record, other than the first...
v IBM Flag Value from the data sector (1 if IBM branded or Lenovo-branded system, 0 if not) v Boot Config Displays the installation option used to the service area. The scan code for the F11 key is stored. Administrative ...; seconds to wait if the F11 message is displayed to the DOS bootable area, if one exists. v Alt Partition Partition table index pointing to the screen. Whether a service partition was used by BMGR, this is dumped: v Additional master boot records Sector numbers containing the master boot record, other than the first...
(English) Rescue and Recovery 4.3 Deployment Guide
Page 84
...: Show. Default: Show. Default: Show. Default: Show. Default: Show. Note: If you are attempting to remove an entire screen using an Active Directory template, disable the menu item instead of hiding each item on the simplified user interface. Simplified Backup Name Show..., gray, or hide the Backup Name option on the screen. Simplified RescueFiles Show, gray, or hide the Rescue Files button on the simplified user interface. Simplified SystemInformation Show, gray, or...
...: Show. Default: Show. Default: Show. Default: Show. Default: Show. Note: If you are attempting to remove an entire screen using an Active Directory template, disable the menu item instead of hiding each item on the simplified user interface. Simplified Backup Name Show..., gray, or hide the Backup Name option on the screen. Simplified RescueFiles Show, gray, or hide the Rescue Files button on the simplified user interface. Simplified SystemInformation Show, gray, or...
(English) Rescue and Recovery 4.5 Deployment Guide
Page 16
.... The Group Policy Editor window opens. 2. Best practice of BitLocker encryption on a system with the Rescue and Recovery program To have two partitions on the screen to encrypt the Windows operating system partition (usually drive C) only. 5. After that , you must have the Rescue and Recovery program work correctly with the Microsoft...
.... The Group Policy Editor window opens. 2. Best practice of BitLocker encryption on a system with the Rescue and Recovery program To have two partitions on the screen to encrypt the Windows operating system partition (usually drive C) only. 5. After that , you must have the Rescue and Recovery program work correctly with the Microsoft...
(English) Rescue and Recovery 4.5 Deployment Guide
Page 20
... and restore settings. For detailed information, see the Rejuvenate setting of the Restore policy in the registry. On the Restore your system screen, select Rejuvenate your system. Select the backup file that you have multiple partitions on the user interface starting from CD/DVD backup.... your hard disk drive, you want to use to begin the restore process. 14 Rescue and Recovery 4.5 Deployment Guide To rejuvenate your system screen is authorized to rejuvenate your current settings and data. Backup files on page 64. 2. c. d. File rescue File rescue used before restore,...
... and restore settings. For detailed information, see the Rejuvenate setting of the Restore policy in the registry. On the Restore your system screen, select Rejuvenate your system. Select the backup file that you have multiple partitions on the user interface starting from CD/DVD backup.... your hard disk drive, you want to use to begin the restore process. 14 Rescue and Recovery 4.5 Deployment Guide To rejuvenate your system screen is authorized to rejuvenate your current settings and data. Backup files on page 64. 2. c. d. File rescue File rescue used before restore,...
(English) Rescue and Recovery 4.5 Deployment Guide
Page 63
...parameters: Syntax: mapdrv [switches] Entering the command with no output to MapDrv is stored in the C:\Program Files\Common Files\Lenovo\MND directory. The mapdrv.exe command can be used to connect and disconnect ThinkVantage Technology products with network shares. The return ...codes for ThinkVantage Technology products. Network share information is as an encrypted string. The command-line interface to the screen. • -section section1 sectiont2 ... The network share information is used , these values are grouped into levels; MapDrv allows you...
...parameters: Syntax: mapdrv [switches] Entering the command with no output to MapDrv is stored in the C:\Program Files\Common Files\Lenovo\MND directory. The mapdrv.exe command can be used to connect and disconnect ThinkVantage Technology products with network shares. The return ...codes for ThinkVantage Technology products. Network share information is as an encrypted string. The command-line interface to the screen. • -section section1 sectiont2 ... The network share information is used , these values are grouped into levels; MapDrv allows you...
(English) Rescue and Recovery 4.5 Deployment Guide
Page 66
...first sector, should contain "NP". • Pause Duration Displays the number of ¼ seconds to wait if the F11 message is displayed to the screen. • Scan Code The key used by the Rescue and Recovery program. • Prev Active Part Displays the partition table index of the Master ... Table 26. When calling bmgr.exe with a /info attribute, the following information is stored. • IBM Flag Value from the data sector (1 if Lenovo-branded system, 0 if not) • Boot Config Displays the installation option used to the service area. 60 Rescue and Recovery 4.5 Deployment Guide
...first sector, should contain "NP". • Pause Duration Displays the number of ¼ seconds to wait if the F11 message is displayed to the screen. • Scan Code The key used by the Rescue and Recovery program. • Prev Active Part Displays the partition table index of the Master ... Table 26. When calling bmgr.exe with a /info attribute, the following information is stored. • IBM Flag Value from the data sector (1 if Lenovo-branded system, 0 if not) • Boot Config Displays the installation option used to the service area. 60 Rescue and Recovery 4.5 Deployment Guide
(English) Rescue and Recovery 4.5 Deployment Guide
Page 73
...: Show. Default: Show. Default: Show. Appendix A. Default: Show. Show, gray, or hide the Rescue Files Cleanup button on the screen. Default: Show. Note: If you are attempting to remove an entire screen using an Active Directory template, disable the menu item instead of hiding each item on the simplified user interface. Show...
...: Show. Default: Show. Default: Show. Appendix A. Default: Show. Show, gray, or hide the Rescue Files Cleanup button on the screen. Default: Show. Note: If you are attempting to remove an entire screen using an Active Directory template, disable the menu item instead of hiding each item on the simplified user interface. Show...
(English) Hardware Password Manager Deployment Guide
Page 12
...Features. h. k. r. s. Click Start ➙ Server Manager. Select Web Server (IIS). d. Click Next . e. On the Select Server Roles screen, click Next. Select Web Server (IIS) Support. Click Add Required Role Services. Select COM+Network Access. o. Under the Role Services section, ... system to add additional required features for this role. g. Click Add Required Features. l. On the Select Server Roles screen, select Application Server . n. i. You will be prompted to the following Web site: http://community.landesk.com/support/...
...Features. h. k. r. s. Click Start ➙ Server Manager. Select Web Server (IIS). d. Click Next . e. On the Select Server Roles screen, click Next. Select Web Server (IIS) Support. Click Add Required Role Services. Select COM+Network Access. o. Under the Role Services section, ... system to add additional required features for this role. g. Click Add Required Features. l. On the Select Server Roles screen, select Application Server . n. i. You will be prompted to the following Web site: http://community.landesk.com/support/...
(English) Hardware Password Manager Deployment Guide
Page 23
...device can be an enrolled user (although administrator and service technician users can still access the device if needed). Updating hardware passwords globally Lenovo Hardware Password Manager provides global management of different hardware passwords for that task to view the status of the task as any of ... manages the following BIOS-level policies can be selected: • Show last logon account for hardware account: at the BIOS user logon screen, the last user account to have logged on to have made changes and want all devices in the Update Common Hardware Passwords folder). ...
...device can be an enrolled user (although administrator and service technician users can still access the device if needed). Updating hardware passwords globally Lenovo Hardware Password Manager provides global management of different hardware passwords for that task to view the status of the task as any of ... manages the following BIOS-level policies can be selected: • Show last logon account for hardware account: at the BIOS user logon screen, the last user account to have logged on to have made changes and want all devices in the Update Common Hardware Passwords folder). ...
(English) Hardware Password Manager Deployment Guide
Page 49
Take screen shots of such configurations so that they can be applied to a new database, many items cannot be exported. Disaster recovery 41 If migrating to the ...
Take screen shots of such configurations so that they can be applied to a new database, many items cannot be exported. Disaster recovery 41 If migrating to the ...
(English) Access Connections Profile Deployment guide
Page 17
...-modifiable parameters are in the profile cannot be modified, deleted or copied. Chapter 3. The profile cannot be defined per profile and can have the following screen captures provide examples for a particular profile. Select the User Access Policy from the drop down menu. Working with the Administrator Feature 9 User access policies can...
...-modifiable parameters are in the profile cannot be modified, deleted or copied. Chapter 3. The profile cannot be defined per profile and can have the following screen captures provide examples for a particular profile. Select the User Access Policy from the drop down menu. Working with the Administrator Feature 9 User access policies can...
(English) Access Connections Profile Deployment guide
Page 20
...Change global settings, see "Global settings." Global settings: On the Network panel of Global Settings, you want to complete the following screen capture displays the settings you can set the following policies: v Allow Windows users without administrator privileges. Client Configuration Policy Marking the box...type option in wireless LAN profiles v Enable automatic wireless LAN radio control v Allow selection of location profiles with Fn+F5 On Screen Display menu v Disable Ethernet adapter when Ethernet cable is unplugged Note: If this setting is enabled, the Ethernet port will be...
...Change global settings, see "Global settings." Global settings: On the Network panel of Global Settings, you want to complete the following screen capture displays the settings you can set the following policies: v Allow Windows users without administrator privileges. Client Configuration Policy Marking the box...type option in wireless LAN profiles v Enable automatic wireless LAN radio control v Allow selection of location profiles with Fn+F5 On Screen Display menu v Disable Ethernet adapter when Ethernet cable is unplugged Note: If this setting is enabled, the Ethernet port will be...
(English) Access Connections Profile Deployment guide
Page 22
... for Windows 2000 and XP Figure 10. Network Global Settings for Windows Vista On the Notification panel of Global settings, you can set the following screen captures provide examples for the Global Settings panel for Access Connections when installed on the Windows 2000 or XP operating system, and for Access Connections...
... for Windows 2000 and XP Figure 10. Network Global Settings for Windows Vista On the Notification panel of Global settings, you can set the following screen captures provide examples for the Global Settings panel for Access Connections when installed on the Windows 2000 or XP operating system, and for Access Connections...
(English) Access Connections Profile Deployment guide
Page 33
... clients to create and with Active Directory and ADM files 25 Show ACTray icon Access Connection status icon would be switched from Fn+F5 On Screen Display menu. Enable create profile Allow Windows users without administrator privileges to view or edit default printer setting in task tray icon notification area. This...
... clients to create and with Active Directory and ADM files 25 Show ACTray icon Access Connection status icon would be switched from Fn+F5 On Screen Display menu. Enable create profile Allow Windows users without administrator privileges to view or edit default printer setting in task tray icon notification area. This...
(English) Access Connections Profile Deployment guide
Page 40
...OSD sub-folder from the extracted location and place into the C:\Drivers\W2k\ACCONWLD directory. v IBMPM for the Hotkey utilities package and On screen display. The following folders from the Hotkey Utilities package v Wireless LAN drivers such as WLANCX2, WLLANATH, or WLLANINT. v IBMPM is ...application files. You do not need to interface with no restart. v CONWIZ for Access Connections to replace all the relevant packages with Lenovo ThinkPad /L3000 system BIOS. v OSD is the folder that is required for Access Connections. v LSID is the driver that contains the ...
...OSD sub-folder from the extracted location and place into the C:\Drivers\W2k\ACCONWLD directory. v IBMPM for the Hotkey utilities package and On screen display. The following folders from the Hotkey Utilities package v Wireless LAN drivers such as WLANCX2, WLLANATH, or WLLANINT. v IBMPM is ...application files. You do not need to interface with no restart. v CONWIZ for Access Connections to replace all the relevant packages with Lenovo ThinkPad /L3000 system BIOS. v OSD is the folder that is required for Access Connections. v LSID is the driver that contains the ...
(English) Power Manager Deployment Guide
Page 10
... Guide One is for Windows XP operating systems and the other is for Windows Vista and Windows 7 operating systems might not function correctly on the screen to complete installation and restart the computer. 5.
... Guide One is for Windows XP operating systems and the other is for Windows Vista and Windows 7 operating systems might not function correctly on the screen to complete installation and restart the computer. 5.
(English) Power Manager Deployment Guide
Page 37
... computer is in hibernation mode or turned off unless you enable this policy setting, you switch the user • When the computer is locking the screen • When the computer is displaying a screen saver Specifies the action that the Windows operating system takes when the computer is playing Blu-ray. Table 3.
... computer is in hibernation mode or turned off unless you enable this policy setting, you switch the user • When the computer is locking the screen • When the computer is displaying a screen saver Specifies the action that the Windows operating system takes when the computer is playing Blu-ray. Table 3.