Text of the audio portion of this movie |
---|
For this demonstration we will check Enable IBM Client Security Password Manager Support. This will require downloading the Password Manager application from the Client Security software site which can be found under Utilities. Click Next to continue.
In Step 4 we need to Authorize Users. Users need to be authorized before they can access the computer. Step 1 under Authorize a User is to specify the user’s passphrase. When you highlight a user name and select Authorize User the program will ask you to enter the user’s passphrase. Note the Passphrase Requirements button. This will explain the proper method to setup a Passphrase. We will again enter the term passw0rd then enter it again in the Confirm box. Click Next to continue.
Step 2 allows you to change characteristics of how the password will be used. If an administrator is setting up the machine it would be wise to check the box to force the user to change the password when they log in to the system. You can also set an expiration period or Never Expires whichever suits the needs of the organization. Remember that these settings are done under administrator control and will be locked from user changes. Click Finish to continue. At this point you can authorize more users or click on Next to continue.
The final step is to set the System Security Level. Here you would elect to use a fingerprint reader or Smart Card reader if installed. Then set the Level of Security using the slider to indicate either Low which sets the requirement at log on only Medium which is logon as well as the first time a protected application is used and High which is log on and anytime a protected application is used. Note the statement that a Custom security policy can be set using the Administrator Utility at a later time.
Select Next to complete the setup of IBM Client Security. This screen will allow you to Review the settings prior to completing the setup. Also note that you can save these settings in a file without configuring the security subsystem. This would be used in unattended or mass deployment situations. Click Finish to allow the program to set up the Security Subsystem. This may take a few minutes because it is processing the information and enabling Client Security.
When complete you will be presented with a Thank-You screen. Click OK to close Setup.
This concludes the demonstration of IBM Client Security.
https://webdoc.lenovo.com.cn/lenovowsi/cskb/data/2006-07-24/20052/Introduction to Client Security Software movie part 1 of 2 - ThinkVantage Technologies.swf
- 1操作演示 网络自适应软件设置无线上网二 (tvt_Access Connections setting up a wireless WAN profile movie part 2 of 2 - ThinkVantage Technologies)2操作演示 网络自适应软件诊断工具二 (tvt_Access Connections diagnostic tools movie part 2 of 2 - ThinkVantage Technologies)3操作演示 网络自适应软件诊断工具一 (tvt_Access Connections diagnostic tools movie part 1 of 2 ThinkVantage Technologies)4操作演示 硬盘保护系统二 (tvt_Active Protection System movie part 2 of 2 - ThinkVantage Technologies)