Lenovo ThinkPad Z60m Series Panduan Penyebaran - Halaman 11

Jelajahi secara online atau unduh pdf Panduan Penyebaran untuk Desktop Lenovo ThinkPad Z60m Series. Lenovo ThinkPad Z60m Series 44 halaman. (bulgarian) setup guide for thinkpad z60m (part 2 of 2)
Juga untuk Lenovo ThinkPad Z60m Series: Instal Manual (2 halaman), Manual (12 halaman), Manual (16 halaman), (Petunjuk Pemasangan) (1 halaman), (Bahasa Prancis) Petunjuk Penggunaan (2 halaman), (Korean) Setup Manual (1 halaman), (Korean) Setup Manual (1 halaman), Petunjuk Pemasangan (Bahasa Portugis) (2 halaman), Petunjuk Pemasangan (Bahasa Inggris) (2 halaman), (Petunjuk Pemasangan Awal) (1 halaman), Panduan pemasangan (Bahasa Norwegia) (2 halaman), (Bahasa Rusia) (2 halaman), Panduan Pengaturan (Bahasa Yunani) (2 halaman), Petunjuk konfigurasi (Bahasa Polandia) (2 halaman), (Bahasa Inggris) Memasang Memori Lebih Banyak (1 halaman), (Hungarian) Manual (2 halaman), (Kroasia) Menetapkan Memorandum Opsi (1 halaman), Manual (Slowakia) (1 halaman), (Slovakia) Instalacia Volitel'nej Pamate (1 halaman), Setup Manual (2 halaman), (1 halaman)

Lenovo ThinkPad Z60m Series Panduan Penyebaran

Access Connections deployment features

The Access Connections Administrator Profile Deployment feature is required to
deploy location profiles that you create for client users. The Administrator Profile
Deployment feature is available to IT professionals only at:
http://www.lenovo.com/pc/support/site.wss/document.do?sitestyle=
lenovo&lndocid=ACON-DEPLOY
For more information about the Administrator Profile Deployment feature, see:
Chapter 3, "Working with the Administrator Feature," on page 7.
The following list of features help IT administrators deploy and manage Access
Connections:
v Administrators can create location profiles and distribute them as part of a
v Control policies can be set for each profile.
v Distribution control lists can be created to limit who can import various
v A client configuration policy can be set to configure the operation of Access
v Deployment packages are encrypted and password protected to be sure that
preload image or install them after the client systems have been deployed.
deployment packages.
Connections on the client computer.
only authorized individuals can import the location profiles that may contain
wireless security information such as WEP or static password, for example.
3
Chapter 1. Overview