Lenovo ThinkPad R400 Panduan Penyebaran - Halaman 11

Jelajahi secara online atau unduh pdf Panduan Penyebaran untuk Desktop Lenovo ThinkPad R400. Lenovo ThinkPad R400 44 halaman. (bulgarian) setup guide
Juga untuk Lenovo ThinkPad R400: Pengaturan Awal (2 halaman), Setup Manual (2 halaman), Brosur (4 halaman), Spesifikasi (4 halaman), Brosur (4 halaman), Pemberitahuan (24 halaman), Pemberitahuan (1 halaman), Panduan Penyebaran (40 halaman), Panduan Penyebaran (36 halaman), Panduan Pengguna (28 halaman), Poster Pengaturan (Spanyol) (2 halaman), Poster Pengaturan (Bahasa Portugis) (2 halaman), Poster Pengaturan (Bahasa Portugis) (2 halaman), (Italian) Setup Poster (2 halaman), (German) Setup Poster (2 halaman), Poster Pengaturan (Belanda) (2 halaman), Poster Pengaturan (Finlandia) (2 halaman), Poster Pengaturan (Denmark) (2 halaman), Poster Pengaturan (Denmark) (2 halaman), Poster Pengaturan (Rusia) (2 halaman), (Romanian) Setup Poster (2 halaman), Poster Pengaturan (2 halaman), Poster Pengaturan (2 halaman), Poster Pengaturan (2 halaman), Poster Pengaturan (2 halaman), Poster Pengaturan (2 halaman)

Lenovo ThinkPad R400 Panduan Penyebaran

Access Connections deployment features

The Access Connections Administrator Profile Deployment feature is required to
deploy location profiles that you create for client users. The Administrator Profile
Deployment feature is available to IT professionals only at:
http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle=
lenovo&lndocid=ACON-DEPLOY
For more information about the Administrator Profile Deployment feature, see:
Chapter 3, "Working with the Administrator Feature," on page 7.
The following list of features help IT administrators deploy and manage Access
Connections:
v Administrators can create location profiles and distribute them as part of a
v Control policies can be set for each profile.
v Distribution control lists can be created to limit who can import various
v A client configuration policy can be set to configure the operation of Access
v Deployment packages are encrypted and password protected to be sure that
preload image or install them after the client systems have been deployed.
deployment packages.
Connections on the client computer.
only authorized individuals can import the location profiles that may contain
wireless security information such as WEP or static password, for example.
3
Chapter 1. Overview