Administrator Guide
Table Of Contents
- Dell Wyse ThinOS Version 8.5 Administrator’s Guide
- Introduction
- Getting started
- Configuring ThinOS using the First Boot Wizard
- Connecting to a remote server
- Using your desktop
- Configuring thin client settings and connection settings
- Connecting to a printer
- Connecting to a monitor
- Locking the thin client
- Signing off and shutting down
- Additional getting started details
- Classic desktop features
- Login dialog box features
- Accessing system information
- Global Connection settings
- Configuring the connectivity
- Configuring the network settings
- Configuring the remote connections
- Configuring the central configurations
- Configuring the VPN Manager
- Configuring the connection brokers
- Configuring Citrix
- Configuring the Citrix broker connection
- Citrix HDX RealTime Multimedia Engine or RealTime Optimization Pack
- Citrix icon refresh
- Using multiple audio in Citrix session
- Using Citrix NetScaler with CensorNet MFA authentication
- Configuring ICA connections
- ICA Self Service Password Reset
- QUMU or ICA Multimedia URL Redirection
- HTML5 Video Redirection
- ICA SuperCodec
- Anonymous logon
- Configuring the Citrix UPD printer
- Introduction to Flash Redirection
- Configuring VMware
- Configuring Microsoft Remote Desktop
- Configuring Dell vWorkspace
- Configuring Amazon Web Services or WorkSpaces
- Configuring Citrix
- Configuring thin client settings
- Introduction to TCX Flash Redirection
- Performing diagnostics
- BIOS management on ThinOS
- Security
- Automating updates and settings using central configuration
- Examples of common printing configurations
- Important notes
- Troubleshooting
- Firmware upgrade
- Frequently asked questions
e. Encryption Level—Allows you to select the security level of communications between the thin client and the ICA
server.
Basic (the default option) is the lowest level of security. Basic allows faster communication between the device and the
ICA server because it requires less processing than the higher levels of encryption.
NOTE: The encryption selection applies to the security of communications between the thin client and the ICA
server only. It is independent of the security settings of individual applications on the ICA server. For example, most
web financial transactions require the thin client to use 128-bit encryption. However, transaction information could
be exposed to a lower level of security if the thin client encryption is not also set to 128–bits.
f. Use HTTP for browsing—When selected, the thin client, by default, uses HTTP when browsing.
g. Alternate address via firewall—When selected, the thin client uses an alternate IP address returned from the ICA
master browser to get through firewalls. Used for the Windows log on when the connection is activated.
h. Display Resolution—Select the display resolution for this connection.
If you select the Published Application option, the Connection Display allows you to select the Seamless Display
Resolution option.
Colors — Select the color depth of the ICA session. If High Colors (16 bits) or True Colors is selected and the ICA
server does not support this color depth, the thin client renegotiates the color depth to the lower value, for example, 256
Colors [8–bits].
i. Window mode and Full screen mode—Select the initial view of the application and desktop in a windowed screen or
full screen.
j. Auto-connect on start-up—When selected, automatically connects the session on start-up.
k. Reconnect after disconnect—When selected, causes the thin client to automatically reconnect to a session after a
non operator-initiated disconnect. If selected, the wait interval is that set in the Delay before reconnecting box (enter
the number of seconds 1–3600) or the user profile for yes (20 seconds) or seconds. The default is 20 seconds, if there is
no INI file description of this connection, or is a Stand-alone user, or simply omitted.
5. Click logon tab, and use the following guidelines:
Figure 4. Default ICA—Logon
a. Logging on area—Enter Login User name, Password, Domain name, and Logon Mode.
72
Configuring the connection brokers