Wyse Technology 90955101L manual

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84

Go to page of

A good user manual

The rules should oblige the seller to give the purchaser an operating instrucion of Wyse Technology 90955101L, along with an item. The lack of an instruction or false information given to customer shall constitute grounds to apply for a complaint because of nonconformity of goods with the contract. In accordance with the law, a customer can receive an instruction in non-paper form; lately graphic and electronic forms of the manuals, as well as instructional videos have been majorly used. A necessary precondition for this is the unmistakable, legible character of an instruction.

What is an instruction?

The term originates from the Latin word „instructio”, which means organizing. Therefore, in an instruction of Wyse Technology 90955101L one could find a process description. An instruction's purpose is to teach, to ease the start-up and an item's use or performance of certain activities. An instruction is a compilation of information about an item/a service, it is a clue.

Unfortunately, only a few customers devote their time to read an instruction of Wyse Technology 90955101L. A good user manual introduces us to a number of additional functionalities of the purchased item, and also helps us to avoid the formation of most of the defects.

What should a perfect user manual contain?

First and foremost, an user manual of Wyse Technology 90955101L should contain:
- informations concerning technical data of Wyse Technology 90955101L
- name of the manufacturer and a year of construction of the Wyse Technology 90955101L item
- rules of operation, control and maintenance of the Wyse Technology 90955101L item
- safety signs and mark certificates which confirm compatibility with appropriate standards

Why don't we read the manuals?

Usually it results from the lack of time and certainty about functionalities of purchased items. Unfortunately, networking and start-up of Wyse Technology 90955101L alone are not enough. An instruction contains a number of clues concerning respective functionalities, safety rules, maintenance methods (what means should be used), eventual defects of Wyse Technology 90955101L, and methods of problem resolution. Eventually, when one still can't find the answer to his problems, he will be directed to the Wyse Technology service. Lately animated manuals and instructional videos are quite popular among customers. These kinds of user manuals are effective; they assure that a customer will familiarize himself with the whole material, and won't skip complicated, technical information of Wyse Technology 90955101L.

Why one should read the manuals?

It is mostly in the manuals where we will find the details concerning construction and possibility of the Wyse Technology 90955101L item, and its use of respective accessory, as well as information concerning all the functions and facilities.

After a successful purchase of an item one should find a moment and get to know with every part of an instruction. Currently the manuals are carefully prearranged and translated, so they could be fully understood by its users. The manuals will serve as an informational aid.

Table of contents for the manual

  • Page 1

    Administrators Guide Wyse ® Enhanced Microsoft ® Windows ® Embedded Standard Products: C90LEW , R90LEW , R90L W , V90LE W , V90L W , X90CW , X90LeW , X90L W Issue: 120409 PN: 883920-01 Rev . C[...]

  • Page 2

    ii Copyright Notices © 2009, Wyse T echnology Inc. All rights reserved. This manual and the software and firmware described in it ar e copyrighted. Y ou may not reproduce, transmit, transcribe, store in a retrieval system, or tr anslate into any language or computer language, in any form or by any means, electronic, mechanical, magnet ic, optica l[...]

  • Page 3

    iii Regulatory Compliance for Wyse Pr oducts Basic EMC and Safety Requirements Wyse appliances are compliant with the regulatory requirements in the regio ns listed below . U.S.A.—FCC Part 15 (class B), cUL 60950 Canada—IC ICES-003, CAN/CSA-C22 No. 60950 Europe—EN 55022 (class B); EN 55024 Canadian DOC Notices Class A - This digital apparatus[...]

  • Page 4

    iv Model VX0 Thin Cli ent, Products V90L W , V90LEW For Use with External Power Supply Model P A-1051- 01, or certified equivalent model supp lied by the manufacturer , output rated 12Vdc, 4.16A or minimum 4.0A. Model Xn0L Mobile Thin Client, Produ cts X90L W , X90LeW For use with External Power Supply Model 0335A1965 or certified equivalent model [...]

  • Page 5

    Contents Summary of Revisions ix 1 Introduction 1 About this Guide 1 Organization of this Gui de 1 Finding the Info rm ation Y ou Need in this Guide 2 Wyse T echnical Support 2 Related Online Resources Available at Wyse 2 Wyse Online Community 2 2 Establishing a Server Environment 3 Setting-Up Access to the Enterprise Servers 3 Understand ing How t[...]

  • Page 6

    vi Contents Accessing the Administr ator Control Panel Extended Optio ns 23 Accessing and Using the Ad mini strative T ools 24 Configuring Component Services 24 Viewing Events 25 Managing Services 25 Managing Users 26 Configuring WinVNC Current User Proper ties 26 Configuring Bluetooth Wire less Connections 27 Setting Configuration Strings with Cus[...]

  • Page 7

    Contents vii Using Windows Server Update Serv ices (WSUS) on a Thin Client 61 Configuring the Thin Client for WSUS 61 Automatic Software Updates on Wyse Thin Clients Using WSUS 62 Using WSUS on the Wyse Th in Client in Standalone Mode 62 T roubleshootin g WSUS in Standalone Mode 63 Windows Update Log File Examples 64 Configuring WSUS for Automati c[...]

  • Page 8

    viii Contents This page intentionally blank.[...]

  • Page 9

    Summary of Revisions Wyse T echnology Inc. 883920 -01 Rev . C The following changes were made to this document since revision B: Wyse T echnology Inc. 883920 -01 Rev . B The following changes were made to this document since revision A: Reference Description Basic EMC and Safety Requirements New requirements added to "Wirele ss Usage and Requi[...]

  • Page 10

    x Summary of Revisions Ericom PowerT erm Session Manager and PowerT erm Emulation New PowerT erm Session Manager and PowerT erm Emulatio n information fo r Ericom Powe rT erm T erm inal Emulatio n added in "Managing Connections with Er icom PowerT erm T erminal Emulation." VMware View Client Addition of new VMware View Clie nt connection [...]

  • Page 11

    1 Introduction Wyse ® thin clients running Microsoft ® Windows ® Embedded Standard provide access to applications, files, and network resources made available on machin es hosting Citrix™ ICA and Microsoft™ RDP session services. The th in clients contain a full featured Internet Explorer browser and th in client emulation software, Ericom ?[...]

  • Page 12

    2 Chapter 1 Chapter 4, "Getting to Know the Extended WES Features," contains infor mation on the extended features of Wyse thin clients ru nnin g Microsoft Windows Embedded Standard that are not found in stand ard Windows Embedded Standa rd. Chapter 5, "Administrative Utilit ies and Settings," provides general informati on about[...]

  • Page 13

    2 Establishing a Server Environment This chapte r contains info rmation on the network architectu re and enter prise server environment needed to provide networ k and session services for Wyse thin clients running Microsoft Wind ows Embedded Standard. It also includes info rma tion to help yo u address important considerations whe n conf iguring ac[...]

  • Page 14

    4 Chapter 2 • Dial-up Modem - A dial-up modem can be u sed with th e thin client to access a dial- up server . The dial-up server must be a Microsoft Remote Access Server or ano ther server that su pports indust ry-standard pr otocols. The d ial-up server ca n provide eithe r of the following methods of access to the enterprise intranet: • Dire[...]

  • Page 15

    Establishing a Server Environment 5 T able 1 DHCP Options Option Description Notes 1 Subnet Mask Required. 3 Router Optional but recom m e nd ed . It is not requir ed unless the thin client must interact with serv ers on a different su bnet. 6 Domain Name Server (DNS) Optional bu t re com m e nd ed . 12 Hostname Optional. 15 Domain Name Optiona l b[...]

  • Page 16

    6 Chapter 2 Using FTP File Servers Windows Embedded St andard includes an FT P Upgrade utility that can be used to upgrade the Windo ws Embedded Standard th in cl ient with Addons which are in Microsoft .msi form. This utility allows you to automatically or manually upgrade a thin client by downloading MSI packages from a spe cified FTP server . Th[...]

  • Page 17

    Establishing a Server Environment 7 Using Domain Name System (DNS) Thin clients accept valid DNS names regist ered on a DNS server available to the enterprise intranet. The th in client will quer y a DNS server on the networ k for name to IP resolution. In most cases DNS is not requir ed but may b e used to allow hosts to be accessed by their regis[...]

  • Page 18

    8 Chapter 2 Configuring ICA Session Services Before you use the inform a tio n in th is sect ion to c onfigure your ICA session services, be sure you have read "Understanding Session Services." ICA session service s can be made availab le on the network using e ither Windows 2000 or 2003 Server with T erminal Services and one of the follo[...]

  • Page 19

    Establishing a Server Environment 9 Using VMware V iew Manager Services VMware ® View Manager is a desktop man agement solution that enable s system administrators to provision desktops and control user ac cess. Client softw are securely connects us ers to cent ralized virtual desktops, ba ck-end phys ical systems, o r terminal servers. Note Infor[...]

  • Page 20

    10 Chapter 2 This page intentionally blank.[...]

  • Page 21

    3 Getting Started This chapter provides informatio n to help you quickly get started using your thin client. It describes basic thin client function s and provid es instructions on sett ing up the thin client for you and your users. What Happens When Y ou T urn on Y our Thin Client What you see, initially , when you turn on or rebo ot a thin client[...]

  • Page 22

    12 Chapter 3 Automatic Logon Automatic logon to a User d esktop is enabled on the thin client by default. If you want to log on as a dif f erent user while Auto Logon is enabled, log of f the current desktop while holding down the SHIFT key to display the Log On to W indows dialog box a nd use your credentials to logon. An administrator can log on [...]

  • Page 23

    Getting Started 13 2. After logging on to the thin client, disable th e File Based W rite Filter by double-clicking the FBWF Disable icon on the desktop (this will di sable the filter and reboot the system). 3. If automatic logon to a User desktop is enabl ed on the thin client, you mu st log off the User desktop and lo g on as an admin istrator (l[...]

  • Page 24

    14 Chapter 3 Understanding th e User Desktop The default User desktop icons include Citrix Pro gram Neighborhood, an d Remo te Desktop Connection (standard and Span ). The Start menu includes Internet Explorer , Control Panel, and Prin te r an d Faxes. The All Programs menu includes Citrix Program Neighborhood, Client Information, Internet Explorer[...]

  • Page 25

    Getting Started 15 Understanding the Ad ministrator Desktop The default Administrator de sktop icons in clude Citrix Prog ram Neighborhoo d, Remote Desktop Connection (standard a nd Span), File Base d W rite Filter Disa ble, and File Based Write Filter Enable.The Star t menu in cludes Internet Explorer , My Computer , My Network Places, Control Pan[...]

  • Page 26

    16 Chapter 3 Logging Off, Shutting Down, and Restarting Use the Shut Down menu to log of f, shut down, restart, or place the thin client in stand by (all options are available to use by clicking Start | Shut Down ). Y ou can also log of f or shut down the thin client using the W indows Secur ity window (ope ned by using CTRL+AL T+DEL key combinatio[...]

  • Page 27

    4 Getting to Know the Extended WES Features This chapter contains info rmation on th e extended features of Wyse thin clients ru nning Microsoft Windows Embedded Standard that are no t found in standard Windows Embedded Standar d. Configuring and Using Peripherals Depending on the ports availabl e on the thin c lient, the thin client can provide se[...]

  • Page 28

    18 Chapter 4 Managing Connections with Citrix Program Neighborhood Cirtix Program Neighb or hood is available to Users and Administr ators. Use the Cirtix Program Neighborhood application (available by clicking Citrix Program Neighborhood in the All Programs menu or doub le-clicking the Citrix Progra m Neighborhood desktop icon) to manage connectio[...]

  • Page 29

    Getting to Know the Extended WES Features 19 Browsing the Internet with Internet Explorer Microsoft Internet Explorer 7 is availabl e to Users and Adminis trators. Th e browser (available by clicking Internet Explo rer in the All Programs menu) ha s Int er ne t op tio n settings that have been preselected at the fact ory to limit writing to flash m[...]

  • Page 30

    20 Chapter 4 Using the Odyssey Client Manager If purchased and installed, the Odyssey Clie nt Manager is available to Users and Administrators. Clicking Start | All Programs | Funk Softwa re | Odyssey Client | Odyssey Client M anager (or doub le-clicking the Odyssey Client Manager icon in the Control Panel or system tray of the Administrator taskba[...]

  • Page 31

    Getting to Know the Extended WES Features 21 Figure 8 Ericom – PowerT erm® TEC and Connect Synchronizing Thin Client Time with Neutron Neutron tim e synchronizat ion is availab le to Users and Administrators . Use the Neutron dialog box (available by clicking Start up | Neutro n in the All Prog ra ms menu—click >> to open the extended me[...]

  • Page 32

    22 Chapter 4 Using VMware V iew Client to Connect to a Virtual Desktop VMware View Client is avai lable to Users and Administrators. Use the VMware View Client dialog box (availa b le by clicking VMware | VMware Vi ew Client in the All Programs menu—click >> to open the extend ed menu of the dialog box) to connect to a virtual desktop. Figu[...]

  • Page 33

    Getting to Know the Extended WES Features 23 Accessing the Admini strator Control Panel Extended Options This section provides an overview of the ex tended features found in the Administrator Control Panel (options are available to use by clicking Start | Control Panel ). This section includes information on: • "Accessing and Using th e Adm [...]

  • Page 34

    24 Chapter 4 Accessing and Using th e Administrative T ools Double-clicking the Administrative T ools icon in the Contro l Panel opens the Administrative T ools window . Figure 12 Administrat ive T ools Administrative T ools are available for: • "Configuring Component Se rvices" • "Viewing Events" • "Managing Servic e[...]

  • Page 35

    Getting to Know the Extended WES Features 25 Viewing Events Double-clicking the Event Viewer icon opens the Event Viewer window . This tool displays monitoring and troubleshooting messages from Windo ws and other programs. Figure 14 Event Viewer Managing Services Double-clicking the Services icon open s the Services window . This window lists the s[...]

  • Page 36

    26 Chapter 4 Managing Users Double-clicking the User Manager icon opens the Local Users and Groups window . This tool allows administrators to manage users and groups. For de tailed information on the User Manager , refer to "Managing Users and Groups with User Manager ." Figure 16 Local Users and Gro ups Configuring WinVNC Current User P[...]

  • Page 37

    Getting to Know the Extended WES Features 27 troubleshooting purposes. Fo r information on VNC user settings, refer to "Using WinVNC to Shadow a Thin Client." Note Hovering the mouse poin ter over the V NC icon on th e taskbar sho ws the current IP address of the thin client. Configuring Bluetooth Wireless Connections If the thin client h[...]

  • Page 38

    28 Chapter 4 2. Follow the instructions to tu rn on the Bluetooth-enabled device an d ensure the device is discoverable (refer to the device documentation ), select the My device is set up and ready to be found check box, and then click Next . 3. When the Bluetooth-ena bled devic e is discovered by the thin client, select the de vice and click Next[...]

  • Page 39

    Getting to Know the Extended WES Features 29 Setting Configuration Stri ngs with Custom Fields Double-clicking the Custo m Fi el ds icon in the Control Panel opens the Custo m Fi elds dialog box. Use th is dialog box to e nter co nfiguration strings for use by WDM software. The configuration strings can con tain information about the location, user[...]

  • Page 40

    30 Chapter 4 Configuring Dual Monitor Display ( For Dual-Monitor Capable Thin Clients Only ) Y ou can use the Settings tab of the Display Properties dialog bo x (double-click the Display icon in the Control Panel , and then click the Settings tab) to configure the dual monitor settings as described in the Microsoft documentat io n at : http://ww w [...]

  • Page 41

    Getting to Know the Extended WES Features 31 Configuring T ouchscreens If the ELO T ouchscreen op tion is installed on the thin client, double-clicking the ELO T ouchscreen icon in the User or Administrato r Control Panel allows you to calibrate and customize the settings for a touchscr een monito r that is connected to (or integrated with) a thin [...]

  • Page 42

    32 Chapter 4 Setting Ramdisk Size Ramdisk is volatile m emory space used for temporary da ta storage. It is the Z drive shown in the My Computer window . It can also be used for temporary storage of ot her data according to adm inist rator discretio n (see "Savin g File s an d Usin g Loca l Drive s") . The following items ar e stored on R[...]

  • Page 43

    Getting to Know the Extended WES Features 33 Selecting Regional and Language Options Double-clicking the Regional and Language Options icon in the Control Pa nel opens the Regional and Language Opt ions dialog box. Use this dialog b ox to select your keyboard language. The following keyb oard languages a re supported: Note A language appropriate ke[...]

  • Page 44

    34 Chapter 4 Configuring WDM Properties Double-clicking the WDM icon in the Control Pa nel opens the WDM Pr operties d ialog box. Use this dialog box to configure th e WDM settings. Figure 25 WDM Properti es Use the following guidelines: 1. Enter the IP address or hostname of the WDM Server . 2. Enter the port to use. 3. Click OK . For informat ion[...]

  • Page 45

    Getting to Know the Extended WES Features 35 Configuring Wireless Local Area Network (LAN) Settings If Wyse USB 802.1 1b hardware is insta lled on the thin client, do uble-clicking the Wireless LAN Settings icon in the Co ntrol Panel allows you to configure wireless LAN settings (such as the wireless network ID, and so on). Note The Wireless LAN Se[...]

  • Page 46

    36 Chapter 4 3. Right-click Wireless Network Connection an d select Properties to open the Wireless Net work Connection Propert ies dialog box. Figure 28 Wireless Net work Connection Properties 4. Select the Wire les s N etw or k tab an d then sele ct the Use Windows to configure my wireless network s ettings check box 5. Click OK and continue with[...]

  • Page 47

    Getting to Know the Extended WES Features 37 5. Select the WP A2 option f or Network Authentication. 6. Select the AES option for Data encryption. 7. Click the Authentication ta b. 8. Select the Enable IEEE 802.1x authenti cation for this network check box. 9. Select the Smart Card or other Certifica te option for EAP ty pe. 10. Click Properties to[...]

  • Page 48

    38 Chapter 4 3. Select the connection you cr eated in step 4 (the Ne twork name (SSID)), and then click Connect . A wireless connection shou ld now be esta blished. Configuring Wireless Thin Cl ients for PEAP-MS-CHAP v2 1. Right-click Wireless Network Connection an d select Properties to open the Wireless Net work Connection Propert ies dialog box.[...]

  • Page 49

    Getting to Know the Extended WES Features 39 11 . Clear the V alidate server certificate che ck box. 12. Select the Enable Fast Recon nec t check box. 13. Click Configure to open the EAP MSCHAPv2 Properties dialog box. Figure 34 EAP MSCHAPv2 Properties - PEAP-MS-CHAP v2 14. Clear the Automatically use my windows logon name and password ( and domain[...]

  • Page 50

    40 Chapter 4 Preserving Wireless Connections Windows Embedded Standard includ es a tool called Regpersistence.exe which is designed to configure wireless access in W rite Filter Enable mode. When you configure wireless access with this utility , the authenti cation credentials persist across reboots, eliminating the need to re -authenticate each ti[...]

  • Page 51

    Getting to Know the Extended WES Features 41 Using PEAP Fast Reconnect When clients connect to an 802.1 1 wireless network, the authenticated session has an expiration inte rv al con fig u re d by the ne two r k adm in istr at or to limit the du ra tio n of authenticated sessio ns. T o avoid the requirement for au thenticated clients to periodica l[...]

  • Page 52

    42 Chapter 4 This page inte ntionally blank.[...]

  • Page 53

    5 Administrative Utilities and Settings This chapter provides general informatio n about the utilities and settings available for administr ativ e us e. It discusses: • “Using the File Based Write Filter (FBWF) ” • "Understanding the NetXClean Utility" • "Saving Files and Us ing Local Drives" • "Mapping Netw ork[...]

  • Page 54

    44 Chapter 5 Caution Contents of the File Based Write Filter cache should never be flushed if it is eighty-perc ent or more full. The Admin i strator should periodically check the status of the cache and restar t the thin c lient if the cache is more than eighty percent full. Note A T erminal Services Client Access License (TSCAL) is always preserv[...]

  • Page 55

    Administrative Ut ilities and Settings 45 Disabling the machine acc ount password change on the thin client T o disable the machin e account pa ssword chan ge on the th in client: 1. Start the Registry Editor by clicking Start | Run , entering regedit in the Open text box, and then clicking OK . 2. Locate and click the following registry subkey: HK[...]

  • Page 56

    46 Chapter 5 Running File Based Write Fi lter Command Line Options There are several co mmand lines you can use to control the File Ba sed Write Filter (command line argumen ts cannot be combined). Caution Administrators should use NT file security to prevent undesired usag e of these comma nd s. Use the following guidelines fo r the command line o[...]

  • Page 57

    Administrative Ut ilities and Settings 47 Enabling and Disabling the File Based Write Filter Using the Desktop Icons For convenience, the File Based Write Filter Ena ble and Disable icons are present o n the Administrator desktop. Use these icons to enab le or disable the File Based Write Filter . • File Based Write Filter Enable Icon - Double-cl[...]

  • Page 58

    48 Chapter 5 • Amount of RAM used for FBWF Cache - Shows (in MB) the a mount of RAM (in MB) that is used as File Based Write Filter cache fo r the cur rent session. • Cache Setting - Shows the cache setting for t he current session. • W arning #1 (%) - Sho ws the FBWF cache percenta ge value at which a Low Memory warning message will be displ[...]

  • Page 59

    Administrative Ut ilities and Settings 49 Understanding the NetXClean Utility NetXClean keeps extraneous information fro m being stored in flash memory . NetXClean is a service that runs in the background. Ne tXClean c lean-up is tr iggered by eit her a service start up or a us er log-off. It perfor m s the clean-up invisibly and no user inp ut is [...]

  • Page 60

    50 Chapter 5 Saving Files and Using Local Drives Administrators need to know the following info rmation about local drives and saving files. Saving Files Thin clients use an embedded ope rating system with a fixed a mount of flash memory . It is recommended that you save files you want to k eep on a ser ver r ather than on a thin client. Caution Be[...]

  • Page 61

    Administrative Ut ilities and Settings 51 Mapping Network Drives Users and administrators can map network drives . However , to retain the mappings after the thin client is restarted, you must complete the following: • Select the Reconnect a t logon check box. • Flush the files of the File Based Write Filter cache dur ing the current system ses[...]

  • Page 62

    52 Chapter 5 Using Roaming Profiles Y ou can participate in domains by writing roaming profiles to the C drive. The pro files must be limited in size and will not be retained when the thin client is restarted. Note For success ful downloadin g and prope r functioning, there must be sufficient flash space available for roamin g pr ofiles . In some c[...]

  • Page 63

    Administrative Ut ilities and Settings 53 Managing Users and Grou ps with User Manager The User Manager allows administrators to create new user accounts and configure user profiles. It also allows administrators to create new groups and determine group membership. By default, a new user is only a member of the Users group and is not locked down. A[...]

  • Page 64

    54 Chapter 5 Configuring User Profiles Only administrators can select the profile settings for a user . Caution Because of the limited size of th e fl ash memory , it is strongly recomme nded that other applications av ailable to ne w and existing users be co nfigured to prevent writing to the local file syst em. For the same re ason, it is also re[...]

  • Page 65

    Administrative Ut ilities and Settings 55 Determining Group Membership Use the followin g guidelines (e xample of ad ding a user to the Administ rator group) : Caution Be sure to flush the files of the File Based W rite Filter cache during the current system sessio n in which an account is modified. 1. Log-in as an administra tor and open the User [...]

  • Page 66

    56 Chapter 5 This page intentionally blank.[...]

  • Page 67

    6 System Administration This chapter contains local and remote system administration information to help you perform the routine tasks needed to maintain your Wyse thin client environment. It includes: • "Using Wyse Device Manager Soft ware for Re mote Administra tion" • "Accessing Thin Clie nt BIOS Settings" • "Insta[...]

  • Page 68

    58 Chapter 6 Installing and Upgrading Addons T o install or upgrade Addons, it is recommend ed that you use WDM (the thin clie nt has a built-in WDM Ag ent for us e as descri bed in "Configuring WDM Properties"). Note For more informatio n on Wyse Device Manager software refer to the W yse Web site at: http://www .wyse.com/produ cts/s oft[...]

  • Page 69

    System Administration 59 2. Depending on whether you select Manu al FTP Information or Use DHC P Server ’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the pa th to the MSI package that installs the Addo n (the MSI package on the FTP serve r must be ac [...]

  • Page 70

    60 Chapter 6 2. Depending on whether you select Manu al FTP Information or Use DHC P Server ’ s FTP Options complete one of the following : • If you selected Manual FTP Information , enter the IP address of the FTP server along with the pa th to the MSI package that installs the Addo n (the MSI package on the FTP serve r must be ac companied by[...]

  • Page 71

    System Administration 61 Uninstalling Addons Using the FTP Addon Installer Y ou can use the FTP Addon Ins taller dialog box to uninstall th e thin client Ad dons that have been installed with the FTP Addons utility . Use the following guidelines: 1. Log-in as an administra tor and open the FTP Addon In staller dialog box ( Start | Control Panel | F[...]

  • Page 72

    62 Chapter 6 Automatic Software Updates on Wyse Thin Clients Using WSUS This section de scribes thre e ways to auto matically deploy software up dates on thin clients using WSUS: • "Using WSUS o n the Wyse Thin Clien t in Standalone M ode" • "Configuring WSUS for Automatic Software Updates Using SMS" • "Using WSUS wit[...]

  • Page 73

    System Administration 63 T roubleshooting WSUS in Standalone Mode WSUS provides a log for trouble shooting issues related to so ftware updates. This log is located on the thin clie nt, in the directory: C:windowswindowsupdate log . This log displays all commun ications between th e client and the server . Y ou can use PERFMON to monitor memory al[...]

  • Page 74

    64 Chapter 6 Windows Update Log File Examples The examples below illustrate the lo g files for selected activities. Service Startup 2005-06-01 18:30:03 992 810 Service ************* 2005-06-01 18:30:03 992 810 Service ** START ** Service: Service startup 2005-06-01 18:30:03 992 810 Service ********* The Windows Updat e agent searches for available [...]

  • Page 75

    System Administration 65 Configuring WSUS for Automati c Software Updates Using SMS Y ou can config ure WSUS to use t he SMS server to perform auto matic software updates in either a W orkgroup environment or using Active Director y . Prerequisite s - Before any software updates c an be dep loyed via WSUS, you must: • Install SMS 2003 or SMS 2007[...]

  • Page 76

    66 Chapter 6 Using WSUS with WDM Y ou can use WDM to deploy the script that di sables the Wr ite Filter , and then configure the thin client to contact the WS US server for software update s. Prerequisite s - Before any software updates c an be dep loyed via WSUS, you must: • Install and configure WDM on the server • Install WSUS Se rver v . 2.[...]

  • Page 77

    System Administration 67 T roubleshooting WSUS with WDM Y ou can use the steps described in the “T roubleshooting WSUS in Stand alone Mode” section to troubleshoot the issues related to the software u pdate on clients and on the WDM server by a nalyzing the relevant logs present on both the client an d the server: • WindowsUpd ate.log file ?[...]

  • Page 78

    68 Chapter 6 Before a remote machine (o n which VNC Vi ewer is installed) can access a thin client: • The IP address (or valid DNS name) of the thin client that is to be operated/mon itored must be known by the r emote administrator/use r . This IP addre ss can be obtain ed from the Details area ( Local Area Conne ction ) of the Network Connect i[...]

  • Page 79

    System Administration 69 Figure 44 VNC Connection Options Note The VNC Connection Options dialo g box varies for dif ferent VNC software releases. Configure using the follo wing general guidelines: • Preferred encodi ng options - Normally the VNC Vi ewer requests CopyRect, Hextile, CoRRE and RRE in that order . Th e selection alte rs this behavio[...]

  • Page 80

    70 Chapter 6 3. In the VNC Server box of the Connection Details dialog box, enter the IP address or valid DNS name of the thin client that is to be operated/monitored followe d by a colon and 0. For example: snoopy:0 or 132.237.16.238:0 4. Click OK to open the VNC Authentica tion dialog box. Figure 45 VNC Authentication 5. Enter the Session passwor[...]

  • Page 81

    Figures 1 User deskto p - example 14 2 Administrator desktop - example 15 3 Citrix Program Ne ighborhood 18 4 Internet Explorer 19 5 Remote Desktop Connection - expanded view exa mple 19 6 Odyssey Client Manager 20 7 Ericom – PowerTer m® Session Manager 20 8 Ericom – PowerTer m® TEC and Connect 21 9 Neutron - exte nded view 21 10 VMware View [...]

  • Page 82

    72[...]

  • Page 83

    73 Ta b l e s 1 DHCP Options 5 2 WSUS Log Format 63 3 WSUS Components 63[...]

  • Page 84

    Administrators Guide Wys e ® Enhanced Microsoft ® Windows ® Embedded Standa rd Issue: 1204 0 9 Written and publishe d by: Wyse T echnology Inc., December 2009 Created using Fra m eM a ke r ® and Acrobat ®[...]