Wyse Technology 90955101L Bedienungsanleitung
- Schauen Sie die Anleitung online durch oderladen Sie diese herunter
- 84 Seiten
- 2.52 mb
Zur Seite of
Ähnliche Gebrauchsanleitungen
-
Computer Accessories
Wyse Technology Z50D
16 Seiten 0.35 mb -
Computer Drive
Wyse Technology X90LE
18 Seiten 1.72 mb -
Personal Computer
Wyse Technology 883681-08 Rev. E
62 Seiten 2.13 mb -
Computer Drive
Wyse Technology R10L
14 Seiten 0.69 mb -
Webcam
Wyse Technology R50L
14 Seiten 0.34 mb -
Computer Drive
Wyse Technology X90e
18 Seiten 2.01 mb -
Computer Accessories
Wyse Technology Z90D7B
16 Seiten 0.35 mb -
Computer Accessories
Wyse Technology Z90DW
16 Seiten 0.35 mb
Richtige Gebrauchsanleitung
Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Wyse Technology 90955101L an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Wyse Technology 90955101L, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.
Was ist eine Gebrauchsanleitung?
Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Wyse Technology 90955101L die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.
Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Wyse Technology 90955101L. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.
Was sollte also eine ideale Gebrauchsanleitung beinhalten?
Die Gebrauchsanleitung Wyse Technology 90955101L sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Wyse Technology 90955101L
- Den Namen des Produzenten und das Produktionsjahr des Geräts Wyse Technology 90955101L
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Wyse Technology 90955101L
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen
Warum lesen wir keine Gebrauchsanleitungen?
Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Wyse Technology 90955101L zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Wyse Technology 90955101L und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Wyse Technology finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Wyse Technology 90955101L zu überspringen, wie es bei der Papierform passiert.
Warum sollte man Gebrauchsanleitungen lesen?
In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Wyse Technology 90955101L, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.
Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Wyse Technology 90955101L widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.
Inhaltsverzeichnis der Gebrauchsanleitungen
-
Seite 1
Administrators Guide Wyse ® Enhanced Microsoft ® Windows ® Embedded Standard Products: C90LEW , R90LEW , R90L W , V90LE W , V90L W , X90CW , X90LeW , X90L W Issue: 120409 PN: 883920-01 Rev . C[...]
-
Seite 2
ii Copyright Notices © 2009, Wyse T echnology Inc. All rights reserved. This manual and the software and firmware described in it ar e copyrighted. Y ou may not reproduce, transmit, transcribe, store in a retrieval system, or tr anslate into any language or computer language, in any form or by any means, electronic, mechanical, magnet ic, optica l[...]
-
Seite 3
iii Regulatory Compliance for Wyse Pr oducts Basic EMC and Safety Requirements Wyse appliances are compliant with the regulatory requirements in the regio ns listed below . U.S.A.—FCC Part 15 (class B), cUL 60950 Canada—IC ICES-003, CAN/CSA-C22 No. 60950 Europe—EN 55022 (class B); EN 55024 Canadian DOC Notices Class A - This digital apparatus[...]
-
Seite 4
iv Model VX0 Thin Cli ent, Products V90L W , V90LEW For Use with External Power Supply Model P A-1051- 01, or certified equivalent model supp lied by the manufacturer , output rated 12Vdc, 4.16A or minimum 4.0A. Model Xn0L Mobile Thin Client, Produ cts X90L W , X90LeW For use with External Power Supply Model 0335A1965 or certified equivalent model [...]
-
Seite 5
Contents Summary of Revisions ix 1 Introduction 1 About this Guide 1 Organization of this Gui de 1 Finding the Info rm ation Y ou Need in this Guide 2 Wyse T echnical Support 2 Related Online Resources Available at Wyse 2 Wyse Online Community 2 2 Establishing a Server Environment 3 Setting-Up Access to the Enterprise Servers 3 Understand ing How t[...]
-
Seite 6
vi Contents Accessing the Administr ator Control Panel Extended Optio ns 23 Accessing and Using the Ad mini strative T ools 24 Configuring Component Services 24 Viewing Events 25 Managing Services 25 Managing Users 26 Configuring WinVNC Current User Proper ties 26 Configuring Bluetooth Wire less Connections 27 Setting Configuration Strings with Cus[...]
-
Seite 7
Contents vii Using Windows Server Update Serv ices (WSUS) on a Thin Client 61 Configuring the Thin Client for WSUS 61 Automatic Software Updates on Wyse Thin Clients Using WSUS 62 Using WSUS on the Wyse Th in Client in Standalone Mode 62 T roubleshootin g WSUS in Standalone Mode 63 Windows Update Log File Examples 64 Configuring WSUS for Automati c[...]
-
Seite 8
viii Contents This page intentionally blank.[...]
-
Seite 9
Summary of Revisions Wyse T echnology Inc. 883920 -01 Rev . C The following changes were made to this document since revision B: Wyse T echnology Inc. 883920 -01 Rev . B The following changes were made to this document since revision A: Reference Description Basic EMC and Safety Requirements New requirements added to "Wirele ss Usage and Requi[...]
-
Seite 10
x Summary of Revisions Ericom PowerT erm Session Manager and PowerT erm Emulation New PowerT erm Session Manager and PowerT erm Emulatio n information fo r Ericom Powe rT erm T erm inal Emulatio n added in "Managing Connections with Er icom PowerT erm T erminal Emulation." VMware View Client Addition of new VMware View Clie nt connection [...]
-
Seite 11
1 Introduction Wyse ® thin clients running Microsoft ® Windows ® Embedded Standard provide access to applications, files, and network resources made available on machin es hosting Citrix™ ICA and Microsoft™ RDP session services. The th in clients contain a full featured Internet Explorer browser and th in client emulation software, Ericom ?[...]
-
Seite 12
2 Chapter 1 Chapter 4, "Getting to Know the Extended WES Features," contains infor mation on the extended features of Wyse thin clients ru nnin g Microsoft Windows Embedded Standard that are not found in stand ard Windows Embedded Standa rd. Chapter 5, "Administrative Utilit ies and Settings," provides general informati on about[...]
-
Seite 13
2 Establishing a Server Environment This chapte r contains info rmation on the network architectu re and enter prise server environment needed to provide networ k and session services for Wyse thin clients running Microsoft Wind ows Embedded Standard. It also includes info rma tion to help yo u address important considerations whe n conf iguring ac[...]
-
Seite 14
4 Chapter 2 • Dial-up Modem - A dial-up modem can be u sed with th e thin client to access a dial- up server . The dial-up server must be a Microsoft Remote Access Server or ano ther server that su pports indust ry-standard pr otocols. The d ial-up server ca n provide eithe r of the following methods of access to the enterprise intranet: • Dire[...]
-
Seite 15
Establishing a Server Environment 5 T able 1 DHCP Options Option Description Notes 1 Subnet Mask Required. 3 Router Optional but recom m e nd ed . It is not requir ed unless the thin client must interact with serv ers on a different su bnet. 6 Domain Name Server (DNS) Optional bu t re com m e nd ed . 12 Hostname Optional. 15 Domain Name Optiona l b[...]
-
Seite 16
6 Chapter 2 Using FTP File Servers Windows Embedded St andard includes an FT P Upgrade utility that can be used to upgrade the Windo ws Embedded Standard th in cl ient with Addons which are in Microsoft .msi form. This utility allows you to automatically or manually upgrade a thin client by downloading MSI packages from a spe cified FTP server . Th[...]
-
Seite 17
Establishing a Server Environment 7 Using Domain Name System (DNS) Thin clients accept valid DNS names regist ered on a DNS server available to the enterprise intranet. The th in client will quer y a DNS server on the networ k for name to IP resolution. In most cases DNS is not requir ed but may b e used to allow hosts to be accessed by their regis[...]
-
Seite 18
8 Chapter 2 Configuring ICA Session Services Before you use the inform a tio n in th is sect ion to c onfigure your ICA session services, be sure you have read "Understanding Session Services." ICA session service s can be made availab le on the network using e ither Windows 2000 or 2003 Server with T erminal Services and one of the follo[...]
-
Seite 19
Establishing a Server Environment 9 Using VMware V iew Manager Services VMware ® View Manager is a desktop man agement solution that enable s system administrators to provision desktops and control user ac cess. Client softw are securely connects us ers to cent ralized virtual desktops, ba ck-end phys ical systems, o r terminal servers. Note Infor[...]
-
Seite 20
10 Chapter 2 This page intentionally blank.[...]
-
Seite 21
3 Getting Started This chapter provides informatio n to help you quickly get started using your thin client. It describes basic thin client function s and provid es instructions on sett ing up the thin client for you and your users. What Happens When Y ou T urn on Y our Thin Client What you see, initially , when you turn on or rebo ot a thin client[...]
-
Seite 22
12 Chapter 3 Automatic Logon Automatic logon to a User d esktop is enabled on the thin client by default. If you want to log on as a dif f erent user while Auto Logon is enabled, log of f the current desktop while holding down the SHIFT key to display the Log On to W indows dialog box a nd use your credentials to logon. An administrator can log on [...]
-
Seite 23
Getting Started 13 2. After logging on to the thin client, disable th e File Based W rite Filter by double-clicking the FBWF Disable icon on the desktop (this will di sable the filter and reboot the system). 3. If automatic logon to a User desktop is enabl ed on the thin client, you mu st log off the User desktop and lo g on as an admin istrator (l[...]
-
Seite 24
14 Chapter 3 Understanding th e User Desktop The default User desktop icons include Citrix Pro gram Neighborhood, an d Remo te Desktop Connection (standard and Span ). The Start menu includes Internet Explorer , Control Panel, and Prin te r an d Faxes. The All Programs menu includes Citrix Program Neighborhood, Client Information, Internet Explorer[...]
-
Seite 25
Getting Started 15 Understanding the Ad ministrator Desktop The default Administrator de sktop icons in clude Citrix Prog ram Neighborhoo d, Remote Desktop Connection (standard a nd Span), File Base d W rite Filter Disa ble, and File Based Write Filter Enable.The Star t menu in cludes Internet Explorer , My Computer , My Network Places, Control Pan[...]
-
Seite 26
16 Chapter 3 Logging Off, Shutting Down, and Restarting Use the Shut Down menu to log of f, shut down, restart, or place the thin client in stand by (all options are available to use by clicking Start | Shut Down ). Y ou can also log of f or shut down the thin client using the W indows Secur ity window (ope ned by using CTRL+AL T+DEL key combinatio[...]
-
Seite 27
4 Getting to Know the Extended WES Features This chapter contains info rmation on th e extended features of Wyse thin clients ru nning Microsoft Windows Embedded Standard that are no t found in standard Windows Embedded Standar d. Configuring and Using Peripherals Depending on the ports availabl e on the thin c lient, the thin client can provide se[...]
-
Seite 28
18 Chapter 4 Managing Connections with Citrix Program Neighborhood Cirtix Program Neighb or hood is available to Users and Administr ators. Use the Cirtix Program Neighborhood application (available by clicking Citrix Program Neighborhood in the All Programs menu or doub le-clicking the Citrix Progra m Neighborhood desktop icon) to manage connectio[...]
-
Seite 29
Getting to Know the Extended WES Features 19 Browsing the Internet with Internet Explorer Microsoft Internet Explorer 7 is availabl e to Users and Adminis trators. Th e browser (available by clicking Internet Explo rer in the All Programs menu) ha s Int er ne t op tio n settings that have been preselected at the fact ory to limit writing to flash m[...]
-
Seite 30
20 Chapter 4 Using the Odyssey Client Manager If purchased and installed, the Odyssey Clie nt Manager is available to Users and Administrators. Clicking Start | All Programs | Funk Softwa re | Odyssey Client | Odyssey Client M anager (or doub le-clicking the Odyssey Client Manager icon in the Control Panel or system tray of the Administrator taskba[...]
-
Seite 31
Getting to Know the Extended WES Features 21 Figure 8 Ericom – PowerT erm® TEC and Connect Synchronizing Thin Client Time with Neutron Neutron tim e synchronizat ion is availab le to Users and Administrators . Use the Neutron dialog box (available by clicking Start up | Neutro n in the All Prog ra ms menu—click >> to open the extended me[...]
-
Seite 32
22 Chapter 4 Using VMware V iew Client to Connect to a Virtual Desktop VMware View Client is avai lable to Users and Administrators. Use the VMware View Client dialog box (availa b le by clicking VMware | VMware Vi ew Client in the All Programs menu—click >> to open the extend ed menu of the dialog box) to connect to a virtual desktop. Figu[...]
-
Seite 33
Getting to Know the Extended WES Features 23 Accessing the Admini strator Control Panel Extended Options This section provides an overview of the ex tended features found in the Administrator Control Panel (options are available to use by clicking Start | Control Panel ). This section includes information on: • "Accessing and Using th e Adm [...]
-
Seite 34
24 Chapter 4 Accessing and Using th e Administrative T ools Double-clicking the Administrative T ools icon in the Contro l Panel opens the Administrative T ools window . Figure 12 Administrat ive T ools Administrative T ools are available for: • "Configuring Component Se rvices" • "Viewing Events" • "Managing Servic e[...]
-
Seite 35
Getting to Know the Extended WES Features 25 Viewing Events Double-clicking the Event Viewer icon opens the Event Viewer window . This tool displays monitoring and troubleshooting messages from Windo ws and other programs. Figure 14 Event Viewer Managing Services Double-clicking the Services icon open s the Services window . This window lists the s[...]
-
Seite 36
26 Chapter 4 Managing Users Double-clicking the User Manager icon opens the Local Users and Groups window . This tool allows administrators to manage users and groups. For de tailed information on the User Manager , refer to "Managing Users and Groups with User Manager ." Figure 16 Local Users and Gro ups Configuring WinVNC Current User P[...]
-
Seite 37
Getting to Know the Extended WES Features 27 troubleshooting purposes. Fo r information on VNC user settings, refer to "Using WinVNC to Shadow a Thin Client." Note Hovering the mouse poin ter over the V NC icon on th e taskbar sho ws the current IP address of the thin client. Configuring Bluetooth Wireless Connections If the thin client h[...]
-
Seite 38
28 Chapter 4 2. Follow the instructions to tu rn on the Bluetooth-enabled device an d ensure the device is discoverable (refer to the device documentation ), select the My device is set up and ready to be found check box, and then click Next . 3. When the Bluetooth-ena bled devic e is discovered by the thin client, select the de vice and click Next[...]
-
Seite 39
Getting to Know the Extended WES Features 29 Setting Configuration Stri ngs with Custom Fields Double-clicking the Custo m Fi el ds icon in the Control Panel opens the Custo m Fi elds dialog box. Use th is dialog box to e nter co nfiguration strings for use by WDM software. The configuration strings can con tain information about the location, user[...]
-
Seite 40
30 Chapter 4 Configuring Dual Monitor Display ( For Dual-Monitor Capable Thin Clients Only ) Y ou can use the Settings tab of the Display Properties dialog bo x (double-click the Display icon in the Control Panel , and then click the Settings tab) to configure the dual monitor settings as described in the Microsoft documentat io n at : http://ww w [...]
-
Seite 41
Getting to Know the Extended WES Features 31 Configuring T ouchscreens If the ELO T ouchscreen op tion is installed on the thin client, double-clicking the ELO T ouchscreen icon in the User or Administrato r Control Panel allows you to calibrate and customize the settings for a touchscr een monito r that is connected to (or integrated with) a thin [...]
-
Seite 42
32 Chapter 4 Setting Ramdisk Size Ramdisk is volatile m emory space used for temporary da ta storage. It is the Z drive shown in the My Computer window . It can also be used for temporary storage of ot her data according to adm inist rator discretio n (see "Savin g File s an d Usin g Loca l Drive s") . The following items ar e stored on R[...]
-
Seite 43
Getting to Know the Extended WES Features 33 Selecting Regional and Language Options Double-clicking the Regional and Language Options icon in the Control Pa nel opens the Regional and Language Opt ions dialog box. Use this dialog b ox to select your keyboard language. The following keyb oard languages a re supported: Note A language appropriate ke[...]
-
Seite 44
34 Chapter 4 Configuring WDM Properties Double-clicking the WDM icon in the Control Pa nel opens the WDM Pr operties d ialog box. Use this dialog box to configure th e WDM settings. Figure 25 WDM Properti es Use the following guidelines: 1. Enter the IP address or hostname of the WDM Server . 2. Enter the port to use. 3. Click OK . For informat ion[...]
-
Seite 45
Getting to Know the Extended WES Features 35 Configuring Wireless Local Area Network (LAN) Settings If Wyse USB 802.1 1b hardware is insta lled on the thin client, do uble-clicking the Wireless LAN Settings icon in the Co ntrol Panel allows you to configure wireless LAN settings (such as the wireless network ID, and so on). Note The Wireless LAN Se[...]
-
Seite 46
36 Chapter 4 3. Right-click Wireless Network Connection an d select Properties to open the Wireless Net work Connection Propert ies dialog box. Figure 28 Wireless Net work Connection Properties 4. Select the Wire les s N etw or k tab an d then sele ct the Use Windows to configure my wireless network s ettings check box 5. Click OK and continue with[...]
-
Seite 47
Getting to Know the Extended WES Features 37 5. Select the WP A2 option f or Network Authentication. 6. Select the AES option for Data encryption. 7. Click the Authentication ta b. 8. Select the Enable IEEE 802.1x authenti cation for this network check box. 9. Select the Smart Card or other Certifica te option for EAP ty pe. 10. Click Properties to[...]
-
Seite 48
38 Chapter 4 3. Select the connection you cr eated in step 4 (the Ne twork name (SSID)), and then click Connect . A wireless connection shou ld now be esta blished. Configuring Wireless Thin Cl ients for PEAP-MS-CHAP v2 1. Right-click Wireless Network Connection an d select Properties to open the Wireless Net work Connection Propert ies dialog box.[...]
-
Seite 49
Getting to Know the Extended WES Features 39 11 . Clear the V alidate server certificate che ck box. 12. Select the Enable Fast Recon nec t check box. 13. Click Configure to open the EAP MSCHAPv2 Properties dialog box. Figure 34 EAP MSCHAPv2 Properties - PEAP-MS-CHAP v2 14. Clear the Automatically use my windows logon name and password ( and domain[...]
-
Seite 50
40 Chapter 4 Preserving Wireless Connections Windows Embedded Standard includ es a tool called Regpersistence.exe which is designed to configure wireless access in W rite Filter Enable mode. When you configure wireless access with this utility , the authenti cation credentials persist across reboots, eliminating the need to re -authenticate each ti[...]
-
Seite 51
Getting to Know the Extended WES Features 41 Using PEAP Fast Reconnect When clients connect to an 802.1 1 wireless network, the authenticated session has an expiration inte rv al con fig u re d by the ne two r k adm in istr at or to limit the du ra tio n of authenticated sessio ns. T o avoid the requirement for au thenticated clients to periodica l[...]
-
Seite 52
42 Chapter 4 This page inte ntionally blank.[...]
-
Seite 53
5 Administrative Utilities and Settings This chapter provides general informatio n about the utilities and settings available for administr ativ e us e. It discusses: • “Using the File Based Write Filter (FBWF) ” • "Understanding the NetXClean Utility" • "Saving Files and Us ing Local Drives" • "Mapping Netw ork[...]
-
Seite 54
44 Chapter 5 Caution Contents of the File Based Write Filter cache should never be flushed if it is eighty-perc ent or more full. The Admin i strator should periodically check the status of the cache and restar t the thin c lient if the cache is more than eighty percent full. Note A T erminal Services Client Access License (TSCAL) is always preserv[...]
-
Seite 55
Administrative Ut ilities and Settings 45 Disabling the machine acc ount password change on the thin client T o disable the machin e account pa ssword chan ge on the th in client: 1. Start the Registry Editor by clicking Start | Run , entering regedit in the Open text box, and then clicking OK . 2. Locate and click the following registry subkey: HK[...]
-
Seite 56
46 Chapter 5 Running File Based Write Fi lter Command Line Options There are several co mmand lines you can use to control the File Ba sed Write Filter (command line argumen ts cannot be combined). Caution Administrators should use NT file security to prevent undesired usag e of these comma nd s. Use the following guidelines fo r the command line o[...]
-
Seite 57
Administrative Ut ilities and Settings 47 Enabling and Disabling the File Based Write Filter Using the Desktop Icons For convenience, the File Based Write Filter Ena ble and Disable icons are present o n the Administrator desktop. Use these icons to enab le or disable the File Based Write Filter . • File Based Write Filter Enable Icon - Double-cl[...]
-
Seite 58
48 Chapter 5 • Amount of RAM used for FBWF Cache - Shows (in MB) the a mount of RAM (in MB) that is used as File Based Write Filter cache fo r the cur rent session. • Cache Setting - Shows the cache setting for t he current session. • W arning #1 (%) - Sho ws the FBWF cache percenta ge value at which a Low Memory warning message will be displ[...]
-
Seite 59
Administrative Ut ilities and Settings 49 Understanding the NetXClean Utility NetXClean keeps extraneous information fro m being stored in flash memory . NetXClean is a service that runs in the background. Ne tXClean c lean-up is tr iggered by eit her a service start up or a us er log-off. It perfor m s the clean-up invisibly and no user inp ut is [...]
-
Seite 60
50 Chapter 5 Saving Files and Using Local Drives Administrators need to know the following info rmation about local drives and saving files. Saving Files Thin clients use an embedded ope rating system with a fixed a mount of flash memory . It is recommended that you save files you want to k eep on a ser ver r ather than on a thin client. Caution Be[...]
-
Seite 61
Administrative Ut ilities and Settings 51 Mapping Network Drives Users and administrators can map network drives . However , to retain the mappings after the thin client is restarted, you must complete the following: • Select the Reconnect a t logon check box. • Flush the files of the File Based Write Filter cache dur ing the current system ses[...]
-
Seite 62
52 Chapter 5 Using Roaming Profiles Y ou can participate in domains by writing roaming profiles to the C drive. The pro files must be limited in size and will not be retained when the thin client is restarted. Note For success ful downloadin g and prope r functioning, there must be sufficient flash space available for roamin g pr ofiles . In some c[...]
-
Seite 63
Administrative Ut ilities and Settings 53 Managing Users and Grou ps with User Manager The User Manager allows administrators to create new user accounts and configure user profiles. It also allows administrators to create new groups and determine group membership. By default, a new user is only a member of the Users group and is not locked down. A[...]
-
Seite 64
54 Chapter 5 Configuring User Profiles Only administrators can select the profile settings for a user . Caution Because of the limited size of th e fl ash memory , it is strongly recomme nded that other applications av ailable to ne w and existing users be co nfigured to prevent writing to the local file syst em. For the same re ason, it is also re[...]
-
Seite 65
Administrative Ut ilities and Settings 55 Determining Group Membership Use the followin g guidelines (e xample of ad ding a user to the Administ rator group) : Caution Be sure to flush the files of the File Based W rite Filter cache during the current system sessio n in which an account is modified. 1. Log-in as an administra tor and open the User [...]
-
Seite 66
56 Chapter 5 This page intentionally blank.[...]
-
Seite 67
6 System Administration This chapter contains local and remote system administration information to help you perform the routine tasks needed to maintain your Wyse thin client environment. It includes: • "Using Wyse Device Manager Soft ware for Re mote Administra tion" • "Accessing Thin Clie nt BIOS Settings" • "Insta[...]
-
Seite 68
58 Chapter 6 Installing and Upgrading Addons T o install or upgrade Addons, it is recommend ed that you use WDM (the thin clie nt has a built-in WDM Ag ent for us e as descri bed in "Configuring WDM Properties"). Note For more informatio n on Wyse Device Manager software refer to the W yse Web site at: http://www .wyse.com/produ cts/s oft[...]
-
Seite 69
System Administration 59 2. Depending on whether you select Manu al FTP Information or Use DHC P Server ’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the pa th to the MSI package that installs the Addo n (the MSI package on the FTP serve r must be ac [...]
-
Seite 70
60 Chapter 6 2. Depending on whether you select Manu al FTP Information or Use DHC P Server ’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the pa th to the MSI package that installs the Addo n (the MSI package on the FTP serve r must be ac companied by[...]
-
Seite 71
System Administration 61 Uninstalling Addons Using the FTP Addon Installer Y ou can use the FTP Addon Ins taller dialog box to uninstall th e thin client Ad dons that have been installed with the FTP Addons utility . Use the following guidelines: 1. Log-in as an administra tor and open the FTP Addon In staller dialog box ( Start | Control Panel | F[...]
-
Seite 72
62 Chapter 6 Automatic Software Updates on Wyse Thin Clients Using WSUS This section de scribes thre e ways to auto matically deploy software up dates on thin clients using WSUS: • "Using WSUS o n the Wyse Thin Clien t in Standalone M ode" • "Configuring WSUS for Automatic Software Updates Using SMS" • "Using WSUS wit[...]
-
Seite 73
System Administration 63 T roubleshooting WSUS in Standalone Mode WSUS provides a log for trouble shooting issues related to so ftware updates. This log is located on the thin clie nt, in the directory: C:windowswindowsupdate log . This log displays all commun ications between th e client and the server . Y ou can use PERFMON to monitor memory al[...]
-
Seite 74
64 Chapter 6 Windows Update Log File Examples The examples below illustrate the lo g files for selected activities. Service Startup 2005-06-01 18:30:03 992 810 Service ************* 2005-06-01 18:30:03 992 810 Service ** START ** Service: Service startup 2005-06-01 18:30:03 992 810 Service ********* The Windows Updat e agent searches for available [...]
-
Seite 75
System Administration 65 Configuring WSUS for Automati c Software Updates Using SMS Y ou can config ure WSUS to use t he SMS server to perform auto matic software updates in either a W orkgroup environment or using Active Director y . Prerequisite s - Before any software updates c an be dep loyed via WSUS, you must: • Install SMS 2003 or SMS 2007[...]
-
Seite 76
66 Chapter 6 Using WSUS with WDM Y ou can use WDM to deploy the script that di sables the Wr ite Filter , and then configure the thin client to contact the WS US server for software update s. Prerequisite s - Before any software updates c an be dep loyed via WSUS, you must: • Install and configure WDM on the server • Install WSUS Se rver v . 2.[...]
-
Seite 77
System Administration 67 T roubleshooting WSUS with WDM Y ou can use the steps described in the “T roubleshooting WSUS in Stand alone Mode” section to troubleshoot the issues related to the software u pdate on clients and on the WDM server by a nalyzing the relevant logs present on both the client an d the server: • WindowsUpd ate.log file ?[...]
-
Seite 78
68 Chapter 6 Before a remote machine (o n which VNC Vi ewer is installed) can access a thin client: • The IP address (or valid DNS name) of the thin client that is to be operated/mon itored must be known by the r emote administrator/use r . This IP addre ss can be obtain ed from the Details area ( Local Area Conne ction ) of the Network Connect i[...]
-
Seite 79
System Administration 69 Figure 44 VNC Connection Options Note The VNC Connection Options dialo g box varies for dif ferent VNC software releases. Configure using the follo wing general guidelines: • Preferred encodi ng options - Normally the VNC Vi ewer requests CopyRect, Hextile, CoRRE and RRE in that order . Th e selection alte rs this behavio[...]
-
Seite 80
70 Chapter 6 3. In the VNC Server box of the Connection Details dialog box, enter the IP address or valid DNS name of the thin client that is to be operated/monitored followe d by a colon and 0. For example: snoopy:0 or 132.237.16.238:0 4. Click OK to open the VNC Authentica tion dialog box. Figure 45 VNC Authentication 5. Enter the Session passwor[...]
-
Seite 81
Figures 1 User deskto p - example 14 2 Administrator desktop - example 15 3 Citrix Program Ne ighborhood 18 4 Internet Explorer 19 5 Remote Desktop Connection - expanded view exa mple 19 6 Odyssey Client Manager 20 7 Ericom – PowerTer m® Session Manager 20 8 Ericom – PowerTer m® TEC and Connect 21 9 Neutron - exte nded view 21 10 VMware View [...]
-
Seite 82
72[...]
-
Seite 83
73 Ta b l e s 1 DHCP Options 5 2 WSUS Log Format 63 3 WSUS Components 63[...]
-
Seite 84
Administrators Guide Wys e ® Enhanced Microsoft ® Windows ® Embedded Standa rd Issue: 1204 0 9 Written and publishe d by: Wyse T echnology Inc., December 2009 Created using Fra m eM a ke r ® and Acrobat ®[...]