Administrator Guide

Rename the thin client........................................................................................................................................................ 47
Configure remote shadow connection..............................................................................................................................47
Shutting down devices....................................................................................................................................................... 47
Tag a device......................................................................................................................................................................... 48
Device compliance status...................................................................................................................................................48
Pulling Windows Embedded Standard or ThinLinux image............................................................................................ 48
Request a log file................................................................................................................................................................. 49
Troubleshooting your device..............................................................................................................................................49
Chapter 8: Apps and data............................................................................................................... 51
Application policy..................................................................................................................................................................51
Configure thin client application inventory.................................................................................................................52
Configure Wyse Software thin client application inventory.....................................................................................52
Create and deploy standard application policy to thin clients..................................................................................53
Create and deploy standard application policy to thin clients..................................................................................53
Enable single sign-on for Citrix StoreFront using standard application policy.......................................................54
Create and deploy advanced application policy to thin clients................................................................................ 55
Create and deploy advanced application policy to Wyse Software Thin Clients.................................................. 56
Image policy..........................................................................................................................................................................57
Add Windows Embedded Standard operating system and ThinLinux images to repository................................57
Add ThinOS firmware to repository............................................................................................................................ 57
Add ThinOS BIOS file to repository.............................................................................................................................58
Add ThinOS package file to repository....................................................................................................................... 58
Add ThinOS 9.x firmware to repository......................................................................................................................58
Add ThinOS 9.x package file to repository.................................................................................................................58
Create Windows Embedded Standard and ThinLinux image policies.....................................................................59
Manage file repository........................................................................................................................................................ 59
Chapter 9: Managing rules............................................................................................................. 61
Edit a registration rule..........................................................................................................................................................61
Create auto assignment rules for unmanaged devices.................................................................................................. 62
Edit an unmanaged device auto assignment rule............................................................................................................ 62
Disable and delete rule for the unmanaged device auto assignment............................................................................62
Save the rule order..............................................................................................................................................................63
Add a rule for alert notification.......................................................................................................................................... 63
Edit an alert notification rule.............................................................................................................................................. 63
Chapter 10: Managing Jobs............................................................................................................64
Sync BIOS admin password...............................................................................................................................................65
Search a scheduled job by using filters.............................................................................................................................66
Schedule a device command job....................................................................................................................................... 66
Schedule the image policy.................................................................................................................................................. 67
Schedule an application policy........................................................................................................................................... 67
Chapter 11: Managing Events......................................................................................................... 68
Search an event or alert using filters................................................................................................................................ 68
View the summary of events............................................................................................................................................. 69
View the audit log................................................................................................................................................................69
Contents
5