Cover image for Using ThinkVantage Technologies, Volume 2 : Maintaining and Recovering Client Systems.
Using ThinkVantage Technologies, Volume 2 : Maintaining and Recovering Client Systems.
Title:
Using ThinkVantage Technologies, Volume 2 : Maintaining and Recovering Client Systems.
Author:
Redbooks, IBM.
Personal Author:
Physical Description:
1 online resource (678 pages)
Contents:
Front cover -- Contents -- Notices -- Trademarks -- Preface -- The team that wrote this redbook -- Become a published author -- Comments welcome -- Summary of changes -- January 2005, Fourth Edition -- Chapter 1. Introduction -- 1.1 ThinkVantage Technologies -- 1.2 ThinkVantage Technologies process improvements -- 1.3 Implementing a ThinkVantage Technologies solution -- Chapter 2. Rescue and Recovery -- 2.1 Introducing Rescue and Recovery -- 2.1.1 Rescue and Recovery environment and functions -- 2.1.2 Rescue and Recovery functions -- 2.1.3 Rescue and Recovery components -- 2.1.4 Rescue and Recovery backup methodology -- 2.1.5 Managing backups -- 2.1.6 Rescue and Recovery system requirements -- 2.2 Installing Rescue and Recovery -- 2.2.1 Preparing to install Rescue and Recovery -- 2.2.2 Rescue and Recovery environment configurations -- 2.2.3 Rescue and Recovery installation -- 2.2.4 Silent installation -- 2.2.5 Setting up a Create Base Backup icon on the user's desktop -- 2.2.6 Creating rescue media -- 2.2.7 Uninstall Rescue and Recovery -- 2.3 System backup -- 2.3.1 Backup considerations -- 2.3.2 Setting backup preferences -- 2.3.3 Backing up your system -- 2.3.4 Archiving backups -- 2.3.5 Scheduling backups -- 2.3.6 Disabling scheduled backups -- 2.3.7 Backing up encrypted files -- 2.4 Restoring your system -- 2.4.1 Using the Rescue and Recovery environment -- 2.4.2 Rescue and Recovery toolbar -- 2.4.3 Rescue and Recovery menu options -- 2.4.4 Restoring your system from Windows -- 2.4.5 Restore considerations -- 2.5 Troubleshooting -- 2.5.1 Installation troubleshooting -- 2.5.2 Backup and Restore troubleshooting information -- 2.5.3 Encryption troubleshooting -- 2.5.4 General troubleshooting and tips -- 2.5.5 Frequently asked questions -- Chapter 3. IBM System Information Center -- 3.1 Introduction to System Information Center.

3.1.1 System Information Center features -- 3.1.2 System Information Center components -- 3.1.3 System Information Center requirements -- 3.1.4 System Information Center overview -- 3.2 System Information Center server installation -- 3.2.1 Server operating system installation -- 3.2.2 Apache Tomcat Web server installation -- 3.2.3 System Information Center installation -- 3.2.4 Testing the installation -- 3.2.5 Modifying the System Information Center installation -- 3.3 Logging on to System Information Center -- 3.3.1 System Information Center user accounts -- 3.3.2 The logon process -- 3.4 System Information Center main menu -- 3.5 Assets -- 3.5.1 Upload Asset Scan -- 3.5.2 Register Asset -- 3.5.3 Manually Add Asset -- 3.5.4 My Assets -- 3.5.5 All Assets -- 3.5.6 Filter -- 3.5.7 Information -- 3.5.8 Users -- 3.5.9 Change Owner -- 3.5.10 Compare Revisions -- 3.5.11 Compare Selected -- 3.5.12 Delete -- 3.5.13 Download XML file -- 3.5.14 Edit -- 3.5.15 Reprocess -- 3.5.16 Retire -- 3.5.17 Return -- 3.5.18 Surplus -- 3.5.19 Download Agent Installer -- 3.6 User Management -- 3.6.1 Creating a new user -- 3.6.2 My Details -- 3.6.3 All Users -- 3.6.4 User Details -- 3.6.5 User History -- 3.6.6 Delete -- 3.6.7 Edit -- 3.7 Group management -- 3.7.1 New Group -- 3.7.2 My Groups -- 3.7.3 All Groups -- 3.7.4 Groups -- 3.7.5 Add Users -- 3.7.6 Delete Group -- 3.7.7 Edit Group -- 3.7.8 Remove All Group Members -- 3.8 Reports -- 3.8.1 All Assets -- 3.8.2 Data Maintenance -- 3.8.3 Groups -- 3.8.4 Logs -- 3.8.5 My Assets -- 3.8.6 Software -- 3.8.7 Statistics -- 3.8.8 Tasks -- 3.8.9 ThinkVantage Reports -- 3.8.10 Users -- 3.8.11 Workstation Security -- 3.8.12 All Reports -- 3.8.13 Rearrange report display output -- 3.9 Tasks -- 3.10 Admin -- 3.10.1 View Properties File -- 3.10.2 View Application Log -- 3.10.3 Send Application Log -- 3.10.4 Upload File to Server.

3.10.5 View Current Server Status -- 3.10.6 Stop and Requeue Background Tasks -- 3.10.7 Interrupt Current Background Tasks -- 3.11 Options -- 3.11.1 Set Current Query as Default -- 3.11.2 Refresh Result -- 3.11.3 Add Query Column -- 3.11.4 Add Query Table -- 3.11.5 Page Options -- 3.12 Output -- 3.13 IBM System Information Gatherer -- 3.13.1 Temporarily installed client agent -- 3.13.2 Permanently installed client agent -- 3.13.3 Installation from product CD -- 3.13.4 Installation from the Web (IBM computers only) -- 3.14 Customization and advanced usage -- 3.14.1 Enterprise environment considerations -- 3.14.2 Deployment scenarios -- 3.14.3 Secure access -- Chapter 4. IBM Software Delivery Center -- 4.1 Introduction -- 4.1.1 Software Delivery Center benefits and features -- 4.1.2 Software Delivery Center components -- 4.2 Architecture considerations -- 4.2.1 Architecture considerations -- 4.2.2 Customization considerations -- 4.2.3 Hardware specifications and recommendations -- 4.3 Software Delivery Center server installation details -- 4.3.1 Installing a Windows operating system on the server -- 4.3.2 Installing Software Delivery Center -- 4.3.3 Testing the IBM Software Delivery Center server -- 4.3.4 Providing security for the packages on the file server -- 4.4 Installing the Software Delivery Center client -- 4.4.1 Prerequisite software -- 4.4.2 Supported types of installations -- 4.4.3 Testing the Software Delivery Center client -- 4.5 Building your software library -- 4.5.1 Creating a folder structure for your library -- 4.5.2 Creating a software package -- 4.5.3 Creating a software bundle -- 4.5.4 Creating a portable catalog -- 4.5.5 Using a portable catalog -- 4.5.6 Importing files from another server -- 4.5.7 Command prompt Export/Import interface -- 4.6 Setting up Software Delivery Center infrastructure.

4.6.1 Setting up a pull infrastructure -- 4.6.2 Setting up a push infrastructure -- 4.6.3 Software Delivery Center package directory replication tips -- 4.7 Using the Software Delivery Center administrator's console -- 4.7.1 Accessing Software Delivery Center administrator's console -- 4.7.2 Managing groups -- 4.7.3 Managing users -- 4.7.4 Managing software packages and bundles -- 4.7.5 Creating a digital signature for a secure package -- 4.7.6 Exporting and importing software packages and bundles -- 4.7.7 Exporting a portable catalog -- 4.7.8 Managing distributions -- 4.7.9 Managing machines -- 4.7.10 Managing schedules -- 4.7.11 Using the IBM Software Delivery Center logs -- 4.7.12 Finding help -- 4.7.13 Logging out of the administrator's console -- 4.8 Using the Software Delivery Center software catalog -- 4.8.1 Software Delivery Center client applet -- 4.8.2 Accessing the Software Delivery Center server -- 4.8.3 Launching the Software Delivery Center client applet -- 4.8.4 Installing an application -- 4.8.5 Installing a bundle -- 4.9 Troubleshooting -- 4.10 Getting help and support -- Chapter 5. Access IBM -- 5.1 Overview -- 5.2 Access IBM -- 5.2.1 Access IBM user interface -- 5.2.2 Customizing Access IBM and Access Help -- 5.2.3 Customizing Access IBM -- 5.2.4 Access IBM Customization Tool -- 5.3 Access Help -- 5.3.1 Customizing Access Help -- 5.4 Rescue and Recovery -- 5.5 Access IBM Message Center -- 5.5.1 Local messages versus Web messages -- 5.5.2 What a message file contains -- 5.5.3 Delivering messages of your own -- 5.6 Update Connector -- 5.6.1 Overview -- 5.6.2 Usage Scenarios -- 5.6.3 The network connection -- 5.6.4 Self-managed Mode -- 5.6.5 SMB LAN Mode -- Chapter 6. Embedded Security Subsystem -- 6.1 Overview -- 6.1.1 IBM Embedded Security Chip -- 6.1.2 Features -- 6.1.3 Client Security Password Manager.

6.1.4 File and Folder Encryption (FFE) Utility -- 6.2 Installation considerations -- 6.2.1 IBM Client Security Software -- 6.2.2 File and Folder Encryption considerations -- 6.2.3 Client Security Password Manager -- 6.3 Prerequisites -- 6.3.1 Before installing the software -- 6.3.2 Setting up a supervisor password on a ThinkPad -- 6.3.3 Setting up an administrator password for a ThinkCentre -- 6.3.4 Clearing the IBM Embedded Security Chip on a ThinkPad -- 6.3.5 Clearing the IBM Embedded Security Chip on a ThinkCentre -- 6.4 Installation instructions -- 6.4.1 Preparation -- 6.4.2 Installing prerequisite device drivers -- 6.4.3 Installing IBM Client Security Software -- 6.4.4 Configuring the IBM Client Security Software for the first time -- 6.4.5 Targus DEFCON Fingerprint Reader -- 6.4.6 Performing an unattended installation -- 6.4.7 Upgrading your version of IBM Client Security Software -- 6.5 Supplemental applications -- 6.5.1 Client Security Password Manager -- 6.5.2 File and Folder Encryption (FFE) -- 6.6 Administrator Utility -- 6.6.1 Starting the Administrator Utility -- 6.6.2 User enrollment -- 6.6.3 Edit user settings -- 6.6.4 Application and policy setup -- 6.6.5 Chip and key settings -- 6.7 Registering fingerprints -- 6.8 Using User Verification Manager protection for Lotus Notes -- 6.9 User Configuration Utility -- 6.9.1 Modify Your Security Settings -- 6.10 Administrator Console -- 6.10.1 UVM passphrase bypass -- 6.10.2 Display/Change fingerprint/smart card override password -- 6.10.3 Create administrator configuration file -- 6.10.4 Encrypt/Decrypt Setup Configuration File -- 6.10.5 Configure Credential Roaming -- 6.11 Roaming profiles -- 6.11.1 Prerequisites -- 6.11.2 Setup -- 6.11.3 Utilization of roaming clients -- 6.11.4 Adding users to a roaming profiles system -- 6.11.5 Unattended install with roaming profiles.

6.12 Using Adobe Acrobat 6.0 Professional.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic Access:
Click to View
Holds: Copies: