Administrator Guide
1 はじめに.......................................................................................................................................6
テクニカルサポート.............................................................................................................................................................6
本書について........................................................................................................................................................................ 6
サポートされる Thin Client................................................................................................................................................. 6
2 操作を始める................................................................................................................................ 7
自動および手動ログイン....................................................................................................................................................7
シンクライアントを設定する前に...................................................................................................................................8
デスクトップの使用............................................................................................................................................................8
スタート メニューの使用.............................................................................................................................................. 8
検索ボックスの使用...................................................................................................................................................... 8
アプリケーションをデスクトップにグループ化......................................................................................................8
アクションセンターの使用.......................................................................................................................................... 8
プリンタや外付けデバイスへの接続.........................................................................................................................9
モニターへの接続...........................................................................................................................................................9
電源ステータス............................................................................................................................................................... 9
3 アクセス可能なアプリケーション...................................................................................................10
Internet Explorer を使用したインターネットの閲覧....................................................................................................10
Dell シンクライアントアプリケーションの使用.........................................................................................................10
Citrix Receiver セッションサービスの設定.....................................................................................................................11
リモートデスクトップ接続セッションサービスの設定.............................................................................................. 11
VMware Horizon Client を使用した仮想デスクトップへの接続............................................................................... 12
Ericom Connect および WebConnect クライアントの使用........................................................................................13
Ericom PowerTerm Terminal Emulation の使用.............................................................................................................. 14
Windows Media Player........................................................................................................................................................ 14
Wyse Easy Setup..................................................................................................................................................................14
Overlay Optimizer.................................................................................................................................................................14
Dell Secure Client................................................................................................................................................................. 15
Dell Secure Client の主な機能..................................................................................................................................... 15
Dell Secure Client へのアクセス................................................................................................................................. 15
Dell Secure Client の設定..............................................................................................................................................15
設定の導入..................................................................................................................................................................... 19
コマンドラインオプション........................................................................................................................................ 19
ログファイルの生成と表示........................................................................................................................................ 21
ヒントとベストプラクティス....................................................................................................................................21
エラーコード...................................................................................................................................................................21
4 管理機能.................................................................................................................................... 23
管理ツールの使用...............................................................................................................................................................23
コンポーネントサービスの設定.................................................................................................................................23
イベントの表示............................................................................................................................................................ 23
サービスの管理............................................................................................................................................................. 24
TPM と BitLocker の使用..................................................................................................................................................24
目次
目次 3