Using ThinkVantage Technologies: Volume 2 Maintaining and Recovering Client Systems

Book description

ThinkVantage Technologies bring your PCs one step closer to being self-configured, self-optimizing, self-protecting, and self-healing, to help save you time and money throughout the life of your systems. In short, ThinkVantage Technologies let you focus your attention on your business, rather than on your computer.

This IBM Redbooks publication helps you maintain, recover, and secure the ThinkVantage Technologies on Lenovo, IBM, and third-party desktops, and mobile computers.

ThinkVantage Technologies covered in the book include:

  • Rescue and Recovery with Antidote Delivery Manager V3.0

  • System Information Center V1.2

  • Software Delivery Center V1.1

  • ThinkVantage Productivity Center V1.01

  • Client Security Software V5.4

  • Client Security Solution V6

  • Fingerprint reader V4.6

  • ThinkVantage System Update V1


This is Volume 2 of a two-volume set of ThinkVantage Technologies Redbooks. Be sure to look for the first volume: Using ThinkVantage Technologies Volume 1: Creating and Deploying Client Systems, SG24-7106.

Table of contents

  1. Notices
    1. Trademarks
  2. Preface
    1. The team that wrote this redbook
    2. Become a published author
    3. Comments welcome
  3. Chapter 1: Introduction
    1. ThinkVantage Technologies
    2. ThinkVantage Technologies process improvements
    3. Implementing a ThinkVantage Technologies solution
  4. Chapter 2: ThinkVantage Rescue and Recovery 3.0
    1. Introducing Rescue and Recovery
      1. Rescue and Recovery Windows functions
      2. Rescue and Recovery Predesktop Environment functions
    2. Rescue and Recovery backup methodology
      1. Managing backups
    3. Rescue and Recovery environment configurations
      1. Default installation
      2. Lenovo computers with a type 1C IBM_SERVICE partition
      3. Lenovo computers with Rescue and Recovery preinstalled in a type 12 partition
      4. External backup media
    4. Installing Rescue and Recovery
      1. Rescue and Recovery system requirements
      2. Preparing to install Rescue and Recovery
      3. Rescue and Recovery installation
    5. Client Security Solution V6
      1. Initial Client Security Solution configuration
    6. Command line installation options
      1. Performing an administrative install
      2. Customizing Rescue and Recovery for silent installation
      3. Silent installation and uninstallation of Rescue and Recovery
      4. Performing a base backup from the command prompt
      5. Setting up a Create Base Backup icon on the user’s desktop
    7. System backup
      1. Creating a backup
      2. Backup considerations and advanced features (1/4)
      3. Backup considerations and advanced features (2/4)
      4. Backup considerations and advanced features (3/4)
      5. Backup considerations and advanced features (4/4)
    8. Restoring your system in the Windows environment
      1. Restoring your system from Windows
      2. Rejuvenate a system (1/2)
      3. Rejuvenate a system (2/2)
      4. Restore Windows and applications from a backup
    9. Migration
      1. How migration works
      2. Using the migration tool based in Rescue and Recovery
    10. Restoring individual files and folders
      1. Restore individual files and folders
    11. Using the Rescue and Recovery predesktop environment
      1. Restrictions and limitations
      2. Accessing the Rescue and Recovery workspace
      3. Rescue and Recovery toolbar
      4. Rescue and Recovery menu options (1/2)
      5. Rescue and Recovery menu options (2/2)
    12. The predesktop environment
      1. Overview of the predesktop boot sequence
    13. Customizing the predesktop environment
      1. RRUtil
      2. Editing within the predesktop environment
      3. Predesktop customization cycle
      4. Customizing predesktop user interface
      5. Customizing Windows PE
      6. Deploying predesktop customizations
      7. Accessing the predesktop files
    14. Antidote Delivery Manager
      1. Installation and configuration of Antidote Delivery Manager (1/3)
      2. Installation and configuration of Antidote Delivery Manager (2/3)
      3. Installation and configuration of Antidote Delivery Manager (3/3)
    15. Active Update and Rescue and Recovery
    16. Security
      1. Protecting your Data
      2. Securing the Predesktop Environment
    17. LANDesk Management Suite for ThinkVantage Technologies
    18. Rescue and Recovery and Utimaco SafeGuard Easy
      1. What is SafeGuard Easy?
      2. Advantages of SafeGuard Easy with Rescue and Recovery
      3. Integrating Rescue and Recovery and SafeGuard Easy
      4. Using Rescue and Recovery with SafeGuard Easy
    19. Installation scenarios for SafeGuard Easy and Rescue and Recovery
      1. Installing SafeGuard Easy
      2. Installing Rescue and Recovery
      3. Upgrading Rescue and Recovery
      4. Upgrading SafeGuard Easy
    20. Tools
      1. Creating rescue media
      2. RRUtil
      3. Unhiding and rehiding the service partition
      4. CFGMOD
      5. RRCMD command line interface
      6. CleanMBR
    21. Troubleshooting
      1. General troubleshooting and tips
      2. Frequently asked questions
    22. Capturing the image
    23. Installation and configuration scenarios
      1. With CSS through a command line with no user intervention
      2. With CSS not installed
      3. With the CSS Wizard not running when new user is created
      4. With exclusion on what items are backed up
      5. Sysprep base backup and with a master password
      6. Changing the items that are captured during a migration
      7. Antidote Delivery Manager: Deploying a new update (1/2)
      8. Antidote Delivery Manager: Deploying a new update (2/2)
      9. Change already deployed Rescue and Recovery settings
      10. Capture one partition with the backup stored on a network share
    24. Predesktop customization scenario
      1. Title bar customization
      2. Left menu customization
      3. Browser customization
  5. Chapter 3: IBM System Information Center
    1. Introduction to System Information Center
      1. System Information Center features
      2. System Information Center components
      3. System Information Center requirements
      4. System Information Center overview
    2. System Information Center server installation
      1. Server operating system installation
      2. Apache Tomcat Web server installation
      3. System Information Center installation
      4. Testing the installation (1/2)
      5. Testing the installation (2/2)
      6. Modifying the System Information Center installation
    3. Logging on to System Information Center
      1. System Information Center user accounts
      2. The logon process
    4. System Information Center main menu
    5. Assets
      1. Upload Asset Scan (1/2)
      2. Upload Asset Scan (2/2)
      3. Register Asset
      4. Manually Add Asset
      5. My Assets
      6. All Assets
      7. Download Agent Installer
      8. Filter
      9. Information
      10. Users
      11. Change Owner
      12. Compare Revisions
      13. Compare Selected
      14. Delete
      15. Download XML file
      16. Edit
      17. Reprocess
      18. Retire
      19. Return
      20. Show detail as HTML
      21. Show detail as TEXT
      22. Surplus
    6. User Management
      1. Creating a new user
      2. My Details
      3. All Users
      4. User Details
      5. User History
      6. Delete
      7. Edit
    7. Group management
      1. New Group
      2. My Groups
      3. All Groups
      4. Groups
      5. Add Users
      6. Delete Group
      7. Edit Group
      8. Remove All Group Members
    8. Reports
      1. All Assets
      2. Data Maintenance
      3. Groups
      4. Logs
      5. My Assets
      6. Software
      7. Statistics
      8. Tasks
      9. ThinkVantage Reports
      10. Users
      11. Workstation Security
      12. All Reports
      13. Rearrange report display output
    9. Tasks
    10. Admin
      1. View Properties File
      2. View Application Log
      3. Send Application Log
      4. Upload File to Server
      5. View Current Server Status
      6. View Current Queue Status
      7. Stop and Requeue Background Tasks
      8. Interrupt Current Background Tasks
      9. Reset Application
    11. Options
      1. Set Current Query as Default
      2. Refresh Result
      3. Add Query Column
      4. Add Query Table
      5. Page Options
    12. Output
    13. IBM System Information Gatherer
      1. Temporarily installed client agent
      2. Permanently installed client agent
      3. Installation from product CD
      4. Installation from the Web (IBM computers only)
    14. Customization and advanced usage
      1. Enterprise environment considerations
      2. Deployment scenarios
      3. Secure access
      4. Modifying the Schema
  6. Chapter 4: IBM Software Delivery Center
    1. Introduction to IBM Software Delivery Center
      1. Software Delivery Center benefits and features
      2. Software Delivery Center components
    2. Architecture considerations
      1. Architecture considerations
      2. Customization considerations
      3. Hardware specifications and recommendations
    3. Software Delivery Center server installation details
      1. Installing a Windows operating system on the server
      2. Installing Software Delivery Center (1/3)
      3. Installing Software Delivery Center (2/3)
      4. Installing Software Delivery Center (3/3)
      5. Testing the IBM Software Delivery Center server
      6. Providing security for the packages on the file server (1/2)
      7. Providing security for the packages on the file server (2/2)
    4. Installing the Software Delivery Center client
      1. Prerequisite software
      2. Supported installation types (1/3)
      3. Supported installation types (2/3)
      4. Supported installation types (3/3)
      5. Testing the Software Delivery Center client
    5. Building your software library
      1. Creating a folder structure for your library
      2. Creating a software package
      3. Creating a software bundle
      4. Creating a portable catalog
      5. Using a portable catalog
      6. Importing files from another server
      7. Command prompt Export/Import interface
    6. Setting up Software Delivery Center infrastructure
      1. Setting up a pull infrastructure
      2. Setting up a push infrastructure
      3. Software Delivery Center package directory replication tips
    7. Using the Software Delivery Center administrator’s console
      1. Accessing Software Delivery Center administrator’s console
      2. Managing groups (1/2)
      3. Managing groups (2/2)
      4. Managing users (1/2)
      5. Managing users (2/2)
      6. Managing software packages and bundles (1/5)
      7. Managing software packages and bundles (2/5)
      8. Managing software packages and bundles (3/5)
      9. Managing software packages and bundles (4/5)
      10. Managing software packages and bundles (5/5)
      11. Creating a digital signature for a secure package
      12. Exporting and importing software packages and bundles
      13. Exporting a portable catalog
      14. Managing distributions (1/2)
      15. Managing distributions (2/2)
      16. Managing machines
      17. Managing schedules (1/2)
      18. Managing schedules (2/2)
      19. Using the IBM Software Delivery Center logs (1/2)
      20. Using the IBM Software Delivery Center logs (2/2)
      21. Finding help
      22. Logging out of the administrator’s console
    8. Using the Software Delivery Center software catalog
      1. Software Delivery Center client applet
      2. Accessing the Software Delivery Center server
      3. Launching the Software Delivery Center client applet (1/2)
      4. Launching the Software Delivery Center client applet (2/2)
      5. Installing an application
      6. Installing a bundle
    9. Troubleshooting
    10. Getting help and support
  7. Chapter 5: ThinkVantage Productivity Center
    1. Overview
    2. Components
      1. Productivity Center
      2. Away Manager
      3. Help Center
      4. Access Help
      5. Message Center
    3. Productivity Center main menu
      1. Quick Links
      2. Resource Center (1/2)
      3. Resource Center (2/2)
      4. Message Center
    4. Customizing the main menu
      1. Quick Links
      2. Resource Center
    5. Productivity Center installation
      1. Productivity Center
      2. Away Manager
      3. Help Center
      4. Access Help
      5. Message Center
    6. Access Help
      1. Customizing Access Help
    7. Message Center
      1. Local messages versus Web messages
      2. What a message file contains
      3. Delivering messages of your own
  8. Chapter 6: Client Security Software 5.4
    1. Overview
      1. ThinkVantage Embedded Security Chip
      2. Features
      3. Client Security Password Manager
      4. File and Folder Encryption (FFE) Utility
      5. Utimaco SafeGuard PrivateDisk and SafeGuard Easy
    2. Installation considerations
      1. ThinkVantage Client Security Software
      2. File and Folder Encryption considerations
      3. Client Security Password Manager
    3. Prerequisites
      1. Before installing the software
      2. Setting up a supervisor password on a ThinkPad
      3. Setting up an administrator password for a ThinkCentre
      4. Clearing the Embedded Security Chip on a ThinkPad
      5. Clearing the Embedded Security Chip on a ThinkCentre
    4. Client Security Software installation instructions
      1. Preparation
      2. Installing ThinkVantage Client Security Software
      3. Configuring the Client Security Software for the first time
      4. Advanced installation of Client Security Software (1/3)
      5. Advanced installation of Client Security Software (2/3)
      6. Advanced installation of Client Security Software (3/3)
      7. Targus DEFCON Fingerprint Reader
      8. Performing an unattended installation
      9. Configure Credential Roaming
    5. Roaming profiles
      1. Prerequisites
      2. Setup (1/4)
      3. Setup (2/4)
      4. Setup (3/4)
      5. Setup (4/4)
      6. Using roaming clients
      7. Adding users to a roaming profiles system
      8. Unattended installation with roaming profiles (1/2)
      9. Unattended installation with roaming profiles (2/2)
    6. Upgrading your version of Client Security Software
      1. Upgrading with new security data
      2. Upgrading using existing security data
      3. Upgrading from Release 5.x using existing security data
    7. Supplemental applications
      1. Client Security Password Manager
      2. File and Folder Encryption (FFE)
    8. Security Subsystem Administrator Utility
      1. Starting the Administrator Utility
      2. User enrollment
      3. Edit user settings
      4. Application and policy setup (1/2)
      5. Application and policy setup (2/2)
      6. Chip and key settings (1/2)
      7. Chip and key settings (2/2)
    9. Administrator Console
      1. UVM passphrase bypass
      2. Display/change fingerprint/smart card override password
      3. Create administrator configuration file
      4. Encrypt/Decrypt setup configuration file
    10. Registering fingerprints
      1. Registering a fingerprint as an administrator
      2. Registering a fingerprint as a user
    11. Using User Verification Manager protection for Lotus Notes
    12. User Configuration Utility
      1. Modify Your Security Settings
    13. Utimaco SafeGuard Easy and TPM
      1. Introduction
      2. What is SafeGuard Easy?
      3. Utimaco SafeGuard Easy and the Trusted Platform Module
      4. Installation and configuration of SafeGuard Easy (1/2)
      5. Installation and configuration of SafeGuard Easy (2/2)
      6. Configuring Machine Binding
      7. Machine Binding failure and recovery
      8. How to use Utimaco SafeGuard Easy
      9. Hints and tips
    14. Utimaco SafeGuard PrivateDisk and TPM
      1. Introduction
      2. Installation and configuration of SafeGuard PrivateDisk
      3. How to use Utimaco SafeGuard PrivateDisk
      4. Hints and tips
    15. Using Adobe Reader 7.0 with ESS
      1. Introduction
      2. Prerequisites
      3. Installation and configuration
      4. Hints and tips
    16. Usage scenarios
      1. Windows 2000 and Windows XP clients and Outlook Express
      2. Windows 2000 clients using Lotus Notes
      3. Windows 2000 clients managed by Tivoli Access Manager
      4. Installing CSS when SafeGuard Easy is already installed
      5. Upgrading CSS when SafeGuard Easy is installed
      6. Upgrading CSS when SafeGuard PrivateDisk is installed
      7. Uninstalling CSS when PrivateDisk is installed
    17. Uninstalling
    18. Troubleshooting
      1. Error messages
      2. Fail counts on TCPA and non-TCPA systems
      3. File and Folder Encryption utility known issues
      4. BSOD when installing Norton Antin-Virus 2003
      5. Installation troubleshooting information
      6. Administrator Utility troubleshooting information
      7. User Configuration Utility troubleshooting information
      8. ThinkPad-specific troubleshooting information
      9. Microsoft troubleshooting information
      10. Netscape application troubleshooting information
      11. Digital certificate troubleshooting information
      12. Tivoli Access Manager troubleshooting information
      13. Lotus Notes troubleshooting information
      14. Encryption troubleshooting information
      15. UVM-aware device troubleshooting information
  9. Chapter 7: Client Security Solution V6
    1. Introduction to CSS V6
    2. Installation details
      1. Preparation
      2. Obtaining the required software
      3. Installing Client Security Solution V6.0
    3. Unattended installation and configuration
    4. Configuring the Client Security Solution
      1. Configuring the Client Security Solution for the first time
      2. Configuring the Security Advisor
      3. Changing the Security Advisor
    5. Using the Client Security Solution management tool
      1. Starting the Client Security Solution application
      2. Change passphrase
      3. Configure password recovery
      4. Manage logon passwords
      5. Use fingerprint software
      6. Protect data
      7. Advanced settings
    6. Utimaco SafeGuard PrivateDisk
      1. Creating a virtual disk volume using PrivateDisk
      2. Passwords and certificates for PrivateDisk
      3. Options for PrivateDisk
    7. Password Manager
      1. Limitations
      2. Installation
      3. Storing information in Password Manager
      4. Recalling password manager entries
    8. Managing Password Manager
      1. Launch Web page
      2. Obscure/Show Text
      3. Save Changes
      4. Cancel Changes
      5. Edit entry name information
      6. Add enter to an entry
      7. Delete an entry
      8. Edit entry field information
      9. Advanced Settings (1/2)
      10. Advanced Settings (2/2)
  10. Chapter 8: Fingerprint reader
    1. Introduction to Fingerprint reader
      1. Authorization = Identification + Authentication
      2. Authentication factors
    2. How biometrics work
      1. Preventing biometric spoofing
    3. Different ways to use the fingerprint reader
    4. Latest features and enhancements
    5. Requirements
    6. Installing the software
      1. Manual installation
      2. Automated installation
    7. Uninstalling the software
      1. Manual uninstallation
      2. Automated uninstallation
    8. Using the fingerprint reader and its software
      1. Passports
      2. First time use
    9. Logon with the fingerprint reader
    10. Control Center
      1. Fingerprints
      2. Settings
    11. Enrollment Wizard
    12. Fingerprint tutorial
    13. Fingerprint reader management console
      1. Getting started
      2. User-specific commands
      3. Global settings commands
      4. Hints and tips for the management console
  11. Chapter 9: ThinkVantage System Update
    1. Introduction to ThinkVantage System Update
      1. Customer benefits
    2. Prerequisites
    3. Installing ThinkVantage System Update
      1. Downloading ThinkVantage System Update
      2. Determining if JRE is installed on your system
      3. Installing ThinkVantage System Update
      4. Silent installation of ThinkVantage System Update
      5. Uninstalling ThinkVantage System Update
    4. Using ThinkVantage System Update
      1. Updating your system with ThinkVantage System Update
      2. Enabling automatic updates
    5. ThinkVantage Technologies integration
  12. Appendix A: Rescue and Recovery additional information
    1. Values and settings of TVT.TXT (1/2)
    2. Values and settings of TVT.TXT (2/2)
    3. Rescue and Recovery Boot Manager control (BMGR32)
  13. Appendix B: Alternate SQL database for System Information Center
    1. How to use IBM DB2 with System Information Center (1/2)
    2. How to use IBM DB2 with System Information Center (2/2)
      1. Testing System Information Center with DB2
      2. Remove Cloudscape database
    3. Using SQL Server 2000 with System Information Center
      1. Test ISIC with Microsoft SQL 2000
      2. Remove Cloudscape database
  14. Appendix C: Software Delivery Center and System Information Center coexistence
    1. Installing both programs on the same machine
  15. Appendix D: System Information Gatherer scan uploads
    1. Problem description
    2. Solution
  16. Abbreviations and acronyms
  17. Related publications
    1. IBM Redbooks
    2. Other publications
    3. Online resources and education
    4. How to get IBM Redbooks
    5. Help from IBM
  18. Index (1/5)
  19. Index (2/5)
  20. Index (3/5)
  21. Index (4/5)
  22. Index (5/5)
  23. Back cover

Product information

  • Title: Using ThinkVantage Technologies: Volume 2 Maintaining and Recovering Client Systems
  • Author(s): Byron Braswell, Lucas Biggers, James Cowles, Håkon Fosshaug, Johan Freidlitz, Keith Gedrose, Chris Holland, David Kohler, Jamel Lynch, Yossi Soberano, Goran Wibran, Eleanor Howard, Syed Irfan, Ive Mattheessens, Dudley Miller, Guy Varendonck, John Zywicki
  • Release date: February 2006
  • Publisher(s): IBM Redbooks
  • ISBN: None