Administrator Guide

Table Of Contents
Creating and deploying advanced application policy to Wyse Software Thin Clients.............................. 155
Image policy...................................................................................................................................................................... 156
Adding Windows Embedded Standard operating system and ThinLinux images to repository..............156
Adding ThinOS firmware to repository.................................................................................................................156
Adding Teradici firmware to repository................................................................................................................ 157
Creating Windows Embedded Standard and ThinLinux image policies.........................................................157
Managing file repository.................................................................................................................................................158
Chapter 7: Managing rules......................................................................................................... 160
Editing a registration rule...............................................................................................................................................160
Creating unmanaged device auto assignment rules ............................................................................................... 161
Editing unmanaged device auto assignment rule......................................................................................................161
Disabling and deleting rule..............................................................................................................................................161
Saving the rule order....................................................................................................................................................... 161
Adding a rule for alert notification...............................................................................................................................162
Editing an alert notification rule................................................................................................................................... 162
Chapter 8: Managing Jobs......................................................................................................... 163
Sync BIOS admin password.......................................................................................................................................... 164
Searching a scheduled job by using filters.................................................................................................................164
Scheduling the image policy..........................................................................................................................................165
Scheduling an application policy.................................................................................................................................. 165
Scheduling the device command job.......................................................................................................................... 166
Chapter 9: Managing Events...................................................................................................... 167
Searching an event or alert by using filters...............................................................................................................167
Searching an event or alert by using filters.........................................................................................................168
Viewing a summary of events.................................................................................................................................168
Viewing audit log........................................................................................................................................................169
Chapter 10: Managing users....................................................................................................... 170
Adding a new admin profile............................................................................................................................................ 171
Editing an admin profile.................................................................................................................................................. 172
Deactivating an admin profile........................................................................................................................................172
Deleting an admin profile................................................................................................................................................173
Editing a user profile....................................................................................................................................................... 173
Importing the CSV file.................................................................................................................................................... 173
Chapter 11: Portal administration............................................................................................... 175
Adding the Active Directory server information.......................................................................................................175
Configuring Active Directory Federation Services feature on public cloud................................................. 177
Importing users to public cloud through active directory...................................................................................... 177
Alert classifications..........................................................................................................................................................178
Creating an Application Programming Interface-API accounts............................................................................178
Accessing file repository................................................................................................................................................ 178
Configuring other settings.............................................................................................................................................179
Thin clients........................................................................................................................................................................ 179
Managing Teradici configurations................................................................................................................................179
Enabling Two-Factor authentication.......................................................................................................................... 180
6
Contents