
ThinManage 3.1 Administration Manual
Shadowing....................................................................................................................................................27
How to Shadow a Terminal..............................................................................................................................................................27
Notes about Shadowing....................................................................................................................................................................27
An Overview of ThinManage Cloning............................................................................................................28
Cloning Connections.....................................................................................................................................29
How to Clone Connections..............................................................................................................................................................29
Applying Connections to a Terminal ...............................................................................................................................................30
Note About VDM Client Connections..............................................................................................................................................30
Cloning Thin Client Settings..........................................................................................................................31
How to Clone Thin Client Settings...................................................................................................................................................31
Applying Thin Client Settings to a Terminal ...................................................................................................................................32
Profiles..........................................................................................................................................................33
How to Create a Profile...................................................................................................................................................................33
Applying a Profile............................................................................................................................................................................34
Disk Image Cloning.......................................................................................................................................35
How to Clone the Entire Disk Image...............................................................................................................................................35
Applying a Disk Image to a Terminal..............................................................................................................................................36
Devon IT Supplied Disk Images....................................................................................................................37
Where to Download Devon IT Disk Images.....................................................................................................................................37
How to Add a Disk Image................................................................................................................................................................37
4.0 Hosted Server-Desktop Management.............................................40
Connection Brokering Methods.....................................................................................................................40
Determining the Connection Method...............................................................................................................................................41
Free Seating with Enhanced Authentication....................................................................................................................................41
Setting up Active Directory under the Server Configuration Settings Page ...................................................................................42
How to Rename Devices with the Web Administration Tool............................................................................................................43
User Based Pooling.......................................................................................................................................44
What is Pooling?..............................................................................................................................................................................44
User Based Pooling Features..........................................................................................................................................................44
About Microsoft Active Directory....................................................................................................................................................45
Creating Pools in ThinManage........................................................................................................................................................45
An Example of ThinManage Pooling ..............................................................................................................................................46
Rules for Selection...........................................................................................................................................................................47
How to Add a Pool...........................................................................................................................................................................48
Power Management and USB Controls.........................................................................................................49
Power Management.........................................................................................................................................................................49
How To Apply Power Management Polices to Hosts.......................................................................................................................49
USB Controls................................................................................................................................................50
How To Apply USB Permissions on a Host.....................................................................................................................................50
A Note About Policy Application and Enforcement.........................................................................................................................50
High Availability.............................................................................................................................................51
What is High Availability?...............................................................................................................................................................51
Requirements....................................................................................................................................................................................51
Architectures....................................................................................................................................................................................51
The Basic Architecture – Simple and Lightweight...........................................................................................................................52
4
Komentarze do niniejszej Instrukcji