Administrator Guide

Table Of Contents
Pulling Windows Embedded Standard or ThinLinux image.....................................................................................119
Pulling log file.....................................................................................................................................................................121
Renaming thin client........................................................................................................................................................122
Configuring remote shadow connection.................................................................................................................... 122
Chapter 7: Apps and data........................................................................................................... 124
Configuring app inventory............................................................................................................................................. 125
Mobile app inventory.................................................................................................................................................125
Configuring thin client and Wyse Software thin client app inventory.......................................................... 125
Deploying applications to thin clients......................................................................................................................... 126
Creating and deploying advanced application policy to thin clients.............................................................. 126
Adding Windows Embedded Standard operating system and ThinLinux images to inventory..................... 128
Managing ThinOS firmware inventory........................................................................................................................ 128
Managing Windows Embedded Standard and ThinLinux image policies............................................................ 129
Managing file repository .......................................................................................................................................... 129
Changing wallpaper for all devices belonging to marketing group...................................................................... 130
Chapter 8: Managing rules..........................................................................................................131
Registering unmanaged devices................................................................................................................................... 131
Creating unmanaged device auto assignment rules ..................................................................................... 132
Alert Notification..............................................................................................................................................................133
Chapter 9: Managing Jobs......................................................................................................... 135
Sync BIOS admin password.......................................................................................................................................... 136
Scheduling the image policy..........................................................................................................................................136
Scheduling the application policy.................................................................................................................................136
Scheduling the device command job...........................................................................................................................137
Chapter 10: Events.....................................................................................................................138
Viewing a summary of events.......................................................................................................................................138
Viewing audit log..............................................................................................................................................................139
Chapter 11: Managing users........................................................................................................140
Adding new admin user................................................................................................................................................... 141
Editing admin user............................................................................................................................................................ 141
Deactivating admin account..........................................................................................................................................142
Deleting admin.................................................................................................................................................................. 142
Chapter 12: Portal administration...............................................................................................143
Configuring console settings.........................................................................................................................................143
Active Directory......................................................................................................................................................... 143
Alert classifications....................................................................................................................................................145
External application services...................................................................................................................................145
File repository............................................................................................................................................................. 145
Other settings.............................................................................................................................................................146
Thin clients.................................................................................................................................................................. 146
Two-Factor authentication......................................................................................................................................146
Generating reports.....................................................................................................................................................147
Multi Tenant................................................................................................................................................................ 148
Contents
5