Administrator Guide

Table Of Contents
Creating and deploying advanced application policy to Wyse Software Thin Clients...............................154
Image policy...................................................................................................................................................................... 155
Adding Windows Embedded Standard operating system and ThinLinux images to repository..............155
Adding ThinOS firmware to repository.................................................................................................................155
Adding Teradici firmware to repository................................................................................................................156
Creating Windows Embedded Standard and ThinLinux image policies........................................................ 156
Managing file repository.................................................................................................................................................157
Chapter 7: Managing rules......................................................................................................... 159
Editing a registration rule...............................................................................................................................................159
Creating unmanaged device auto assignment rules .............................................................................................. 160
Editing unmanaged device auto assignment rule.....................................................................................................160
Disabling and deleting rule.............................................................................................................................................160
Saving the rule order...................................................................................................................................................... 160
Adding a rule for alert notification................................................................................................................................161
Editing an alert notification rule....................................................................................................................................161
Chapter 8: Managing Jobs......................................................................................................... 162
Sync BIOS admin password.......................................................................................................................................... 163
Searching a scheduled job by using filters.................................................................................................................163
Scheduling the image policy..........................................................................................................................................164
Scheduling an application policy.................................................................................................................................. 164
Scheduling the device command job.......................................................................................................................... 165
Chapter 9: Managing Events...................................................................................................... 166
Searching an event or alert by using filters.............................................................................................................. 166
Searching an event or alert by using filters.........................................................................................................167
Viewing a summary of events................................................................................................................................. 167
Viewing audit log........................................................................................................................................................168
Chapter 10: Managing users....................................................................................................... 169
Adding a new admin profile........................................................................................................................................... 170
Editing an admin profile...................................................................................................................................................171
Deactivating an admin profile........................................................................................................................................ 171
Deleting an admin profile................................................................................................................................................172
Editing a user profile....................................................................................................................................................... 172
Importing the CSV file.................................................................................................................................................... 172
Chapter 11: Portal administration............................................................................................... 174
Adding the Active Directory server information.......................................................................................................174
Configuring Active Directory Federation Services feature on public cloud.................................................175
Importing users to public cloud through active directory...................................................................................... 176
Alert classifications..........................................................................................................................................................176
Creating an Application Programming Interface-API accounts............................................................................ 177
Accessing file repository................................................................................................................................................ 177
Configuring other settings.............................................................................................................................................178
Managing Teradici configurations................................................................................................................................178
Enabling Two-Factor authentication...........................................................................................................................178
Generating reports.......................................................................................................................................................... 179
6
Contents