Lenovo Secure Managed Client Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Matériel informatique Lenovo Secure Managed Client. Lenovo Secure Managed Client User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 72
  • Table des matières
  • DEPANNAGE
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 0
Secure Managed Client Version 2. 0
Deployment Guide
Date:February26,2010
Vue de la page 0
1 2 3 4 5 6 ... 71 72

Résumé du contenu

Page 1 - Deployment Guide

Secure Managed Client Version 2. 0Deployment GuideDate:February26,2010

Page 2

2 Secure Managed Client Version 2.0 Deployment Guide

Page 3

Chapter 2. General setupThe following are check lists to help you quickly set up your Secure ManagedClient environment. This is the suggested order in

Page 4

Table 1 provides a description of the different image types:Table 1. Image typesImage Type Features Additional informationStandard imagev One image pe

Page 5

Chapter 3. Networking considerationsThis chapter discusses requirements and other considerations when setting upSecure Managed Client.Included in this

Page 6

Diskless client architectureThe following is an overview of the Secure Managed Client boot sequence:v The physical hardware is connected to the storag

Page 7 - Contents

For more information on Active Directory, go to the following Web address:http://www.microsoft.com/windowsserver2003/technologies/directory/activedire

Page 8

If you notice MAC flapping or duplicate packet error message in your switch log,you can set up an Etherchannel across the 6 switch ports that you assi

Page 9 - Chapter 1. Overview

Chapter 4. Secure Managed Client specific installationThis chapter includes prerequisites and procedures for installing the SecureManaged Client solut

Page 10

Table 2. Storage array hard disk drive size (continued)Storage Array: Effective Secure Managed Client User HDD SizeNumber of UserImages 6 TB Storage A

Page 11 - Chapter 2. General setup

13. Press P to set the boot as primary.If the root path has been configured on the DHCP server, proceed to step 23.14. Press Enter to access the iSCSI

Page 13 - Infrastructure requirements

v Default Gatewayv Primary DNSv Secondary DNSv DNS suffix11. Press Enter. This operation will take a couple of minutes while the IPinformation is bein

Page 14 - Diskless client architecture

Chapter 5. LANDesk InformationLANDesk Management Suite provides a full range of system management toolsthat let you view, configure, manage, and prote

Page 15 - Link aggregation (Bonding)

1. Start the IIS manager by selecting Start −> Programs −> Administrator Tools−> Internet Information Services (IIS) Manager.2. In the left p

Page 16 - Network topology

7. Once the system reboots, double-click on Autorun.exe from the SMC 2.0installation directory again. The prerequisite checker should now pass.8. Clic

Page 17 - Prerequisites

Provisioning the storage arrayProvisioning is the process where you configure the storage array to work with theSecure Managed Client console.To provi

Page 18 - Number of User

5. Click OK in the floating Directory Manager window.6. Make sure there is an entry in the left pane of the Directory Manager windowin the form of “LD

Page 19 - SMCSetup.exe /v NODISKSTAT=1

e. Click Apply. The Update storage array license window opens. Follow thedirections in the window to finish updating.Off-core connection managerIn ord

Page 20

Creating a single image base image1. Right-click on the existing active base image.2. Select Create base single image.3. Enter the appropriate volume

Page 21

5. Fill out the appropriate user image information .6. Click Create.7. Click OK on the prompt to complete the local cache user creation.Deploying loca

Page 22 - Installing LANDesk

Pristine imageA pristine image is an image in which the settings always reset to the default duringa reboot. For example, let’s say that you created a

Page 23

Secure Managed Client Version 2. 0Deployment GuideDate:February26,2010

Page 24 - Populating a base image

22 Secure Managed Client Version 2.0 Deployment Guide

Page 25 - License upgrades

Chapter 6. Secure Managed Client image creation and tuningThis chapter discusses ways to enhance the performance of Secure Managed Client.Because Secu

Page 26 - Single image

9. Run the Sysprep.exe file. Check enable mini-setup in the dialog box andreseal it.10. The system will shut down once the Sysprep process completes.1

Page 27 - Local cache image

1. Configure your master system so it is ready to be cloned.2. Restart the machine to a second Windows operating system and capture theimage using an

Page 28 - Assigned seating

Preparing a Windows Vista preload on a Lenovo M57 withservice partition but no separate active system partition forSecure Managed Client1. Install the

Page 29 - Pristine image

12. Using ImageX, capture the image of the System Drive and assume the driveletter is C. Save it to your .wim file.Imagex /capture C: D:\myimg\Vista32

Page 30

Imagex /mountrw C:\wim_mount\tvtos\winpe.wim 1 C:\mype_mountv Assume your VNIF drivers are located in the E:\vnifdrivers directory.Peimg.exe /inf=E:\v

Page 31 - Preparing a Windows XP image

3. Delete any extra user accounts you created during the Windows Vistainstallation. You should only see the Administrator and Guest (which is off)acco

Page 32

v Locate your Secure Managed Client VNIF driver files and modify theprovided OfflineUnattend.xml file accordingly.v Mount the wim file you created in

Page 33

6. Copy the provided UNATTENDOEM.XML file to current the directory andrename it to UNATTEND.XML or use your own UNATTEND.XML file.Note: Lenovo provide

Page 34 - Secure Managed Client

First Edition (February 2010)© Copyright Lenovo 2009, 20010.LENOVO products, data, computer software, and services have been developed exclusively at

Page 35

Note: You do not need to inject the VNIF driver files if you plan to runSMCSetup.exe since this will install the VNIF drivers on Windows Vista foryou.

Page 36

18. Connect to the storage array and mount the destination LUN. Since this willcompletely wipe out all contents, make sure you back up any important d

Page 37 - \UNATTEND.XML

Cloning an existing Windows Vista imageYou have a version of Windows Vista that has been running for awhile that has allof your applications and perso

Page 38 - Managed Client environment

Indexing and search utilitiesFor increased performance, uninstall any disk indexing utilities or services such asWindows Search, Windows Desktop Searc

Page 39 - Sysprep.exe /generalize /oobe

the base image on the hard drive and requires that they be read from the user’scopy on the storage array, thus reducing the benefits of local cache.Ru

Page 40

Descriptions of user-supplied variables in this command are as follows:v ??? - boot, hibernate, standby, shutdownv X - number of runs to be completedv

Page 41

RecommendationsEvaluate what services are essential to the operation of the environment. Disablethe following services and utilize LANDesk for adminis

Page 42 - Scheduled tasks

The sample entry for the .xml file is shown below:<settings pass="generalize"><component name="Microsoft-Windows-PnpSysprep&qu

Page 43 - Defragmentation

v How to create a roaming user profilev How to configure a user account to create a roaming user profilev Creating a share folder to store a roaming u

Page 44 - Image protection

Chapter 7. Populating a base imageAll new user images must be created from a base image. If the base image containsa valid Sysprep image, deploying a

Page 45 - Operating system services

PrefaceThis guide is intended for IT administrators, or those who are responsible fordeploying the Secure Managed Client®(SMC) program on computers in

Page 46 - Recommendations

7. Deploy the base image. If you are using the SMCWinPE CD, use the GUI tocopy the contents to the physical drive to the storage array, or open acomma

Page 47 - Improving Vista performance

c. select disk 1 – (where 1 (or appropriate) is the appropriate disk you areconnected to based on steps above. The xize of the disk is a goodparameter

Page 48

9. Type diskpart. This will start the diskpart command line application10. Type list volumes. This will list all the volumes that diskpart sees.You sh

Page 49 - Using bootable CD/DVD media

6. Click Boot.7. After several seconds, the client will restart and boot from the CD. WindowsPE will load and a wizard will start. This allows the cli

Page 50 - SMCWinPE.iso

7. Log on to the iSCSI target. The initiator should create a new disk on yoursystem.8. Follow the steps to deploy the base image to a disk.9. Log off

Page 51

v A log file that logs the results of the SMCWinPE.iso installation is stored on thedestination location in smccopy.log.v The SMCWinPE.iso CD is not m

Page 52 - Version 2.0

48 Secure Managed Client Version 2.0 Deployment Guide

Page 53

Chapter 8. Setting up network sharesThe storage array can be configured as a Network Attached Storage (NAS) device. Toconfigure, do the following:1. C

Page 54 - Hints and tips

50 Secure Managed Client Version 2.0 Deployment Guide

Page 55 - If not using a Lenovo CD

Chapter 9. Configuring synchronous and asynchronousreplicationThis chapter shows you how to create synchronous and asynchronous replicationand promote

Page 56

iv Secure Managed Client Version 2.0 Deployment Guide

Page 57

Creating asynchronous replicationTo create asynchronous replication do the following:1. Right-click on the primary storage array and click Configure r

Page 58

Chapter 10. TroubleshootingThis chapter contains information on troubleshooting, network failure points, andlimitations you may encounter when configu

Page 59

4. When the authentication is verified, browse to tcm\dist\\SMCBoot-<version>.img and select Update.It will take a few minutes to load, but all

Page 60 - Manual failover

Table 5. Network failure points (continued)Symptom Possible reason ImpactClients report data loss Windows corruptionSwitch failureStorage array failur

Page 61 - Chapter 10. Troubleshooting

Note: Some users may need to press the Alt key to display this menu.7. In the Connections box, move the Local Area Connection entry that has an IPaddr

Page 62 - Unique network failure points

These two NICs can cause problems with Remote Assistance and the IP addresslisted in the invitation. Disable the second LAN while creating the RemoteA

Page 63

58 Secure Managed Client Version 2.0 Deployment Guide

Page 64 - Limitations

Appendix. NoticesLenovo may not offer the products, services, or features discussed in thisdocument in all countries. Consult your local Lenovo repres

Page 65

Any performance data contained herein was determined in a controlledenvironment. Therefore, the result in other operating environments may varysignifi

Page 66

GlossaryAdvanced Host Controller Interface (AHCI). Anapplication programming interface defined by Intelwhich defines the operation of Serial ATA host

Page 67 - Appendix. Notices

ContentsPreface ...iiiChapter 1. Overview ...1Chapter 2. General setup ...3Networking...3Installing and configuring

Page 68 - Trademarks

62 Secure Managed Client Version 2.0 Deployment Guide

Page 70

Printed in USA

Page 71

vi Secure Managed Client Version 2.0 Deployment Guide

Page 72 - Printed in USA

Chapter 1. OverviewThe Lenovo Secure Managed Client solution is a storage-based alternative clientcomputing solution, designed to help businesses redu

Commentaires sur ces manuels

Pas de commentaire