1 / 63

Desktop Configuration and Cloning

Desktop Configuration and Cloning. Instructor: Chuck O’Shea coshea@infopeople.org An Infopeople Workshop Fall-Winter 2006.

gefen
Download Presentation

Desktop Configuration and Cloning

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Desktop Configuration and Cloning Instructor: Chuck O’Shea coshea@infopeople.org An Infopeople Workshop Fall-Winter 2006

  2. Infopeople is a federally-funded grant project supported by the California State Library. It provides a wide variety of training to California libraries. Infopeople workshops are offered around the state and are open registration on a first-come, first-served basis. For a complete list of workshops, and for other information about the project, go to the Infopeople website at infopeople.org. This Workshop is Brought to You by the Infopeople Project

  3. Introductions • Name • Library • Position • What is your experience with adding software, configuring administration functions?

  4. Packet • Agenda • PowerPoint • Exercises • Handouts • CD

  5. Class Assumptions • You are comfortable with basic computer skills • You have installed and configured software • You are are the person at your library who will be configuring your Public Access Computers • You will be using Windows XP

  6. What kinds of computer issues arise when offering computers to the public?

  7. How do you handle these problems currently?

  8. Workshop Goals • Help you understand the issues in making computers accessible to the public • Share a solution • create a hard drive image set up for public access computing • clone it

  9. If Working with a Used Computer • Need to clean up the hard drive • don’t know how it’s been used • registry could be hiding things • get rid of personal files/programs • Restore depends on manufacturer • Want to do more than just reinstall OS

  10. To Create a Secure Public Access Computer • Install Updates • Install Apps • Tighten System • Customize Profile • Use Shared Computer Toolkit • Change BIOS • Create Image • Clone We are assuming you have a new computer with a clean install of Windows XP or have restored the hard drive of a used computer.

  11. Step #1 - Install Updates • Download and run Service Packs and updates so you are running the most current version of the OS • less vulnerable to security risks • bug fixes • take advantage of new technology

  12. Step #2 - Install Applications • For example • Microsoft Office • Virus & Spyware Protection • Printer Drivers • Public Browser • Media Players

  13. Public Browser • Features: • easy configuration • URL tracking • popup restriction • auto clearing of cache and cookies • Installation • Configuration

  14. Public Browser Configuration

  15. Public Browser Overrides • What are they? • What do they do? • Shift/Alt/Control/Insert

  16. Exercise #1 Install & Configure Public Browser

  17. Step #3 - Tighten System for Public Access • Remove unnecessary programs • Remove unnecessary features • Disable unnecessary services

  18. Removing Unnecessary Windows Components for Public Access • Fax • MSN Explorer • Outlook Express • Networking Services • Windows Messenger What about games?

  19. Exercise #2 Removing Unnecessary Windows Components for Public Access

  20. Remove Unnecessary Features for Public Access • Remote desktop • System restore • Fast user switching • Offline files • Hibernation

  21. Exercise #3 Removing Unwanted Features for Public Access

  22. Disable Unnecessary Services for Public Access • Distributed link transaction • Secondary logon • Task scheduler • Terminal services • Telephony • Wireless zero configuration

  23. Exercise #4 Disable Unnecessary Services for Public Access Computers

  24. Step #4 User Profile • A user profile defines customized desktop environments, such as individual display and network and printer connections settings. • With profiles, the system administrator can set access for different users: • Desktop shortcuts • Windows preferences • Printers • First-time settings

  25. For PAC You Need Two Profiles • Administrator • install and uninstall software • configure settings • create and delete users • Limited • run programs • access the Internet • create files and folders • Public • Adults • Children

  26. Create Public Account • Creating a Public account for shared access with limited access • Account will be shared by all public users • Account will be a Limited Account that will not allow user to perform administrative functions

  27. Configure the Public User Profile • Log on as local user • Run all programs installed for the first time • Examples • configure Office programs • Windows Media Player • Adobe Reader • Configure settings

  28. Exercise #5 Create a User Account and Configure the “Public Profile”

  29. Customize All Users Start menu • Changes made to All Users Start Menu affect everyone that uses that computer. • Most programs install Start menu shortcuts in the All Users profile • To customize “All Users” Start Menu • Login as administrator • Remove unwanted Icons • Add programs to Start Menu

  30. Step #5 - Use Shared Computer Toolkit • Free from Microsoft • download the latest version • get product support • view demos http://www.microsoft.com/windowsxp/sharedaccess/default.mspx

  31. Microsoft Shared Computer Toolkit • Only works on Windows XP • protects windows partition (drive c:) • allows you to restrict users • easy access to computer settings • profile manager • easy access • more options • easily change Accessibility options

  32. Hive Cleanup Service • Prompted to get when you install Shared Computer Toolkit • Eliminates log off problems • Must be installed and running to work

  33. SCT Step 1 – Prepare Disk • Prepare the disk for Windows disk protection • requires unallocated space • we will use Symantec’s Partition Magic 8.0 to create an unallocated partition • minimum of 1GB up to 10% of disk space • space used for temporary files

  34. Partition Magic • Allows you to: • merge partitions • create new partitions • resize partitions • Run it from the CD • does not need to be installed

  35. Exercise #6 Download and Install Shared Computer Toolkit, Install Hive Cleanup Service, and Run Partition Magic

  36. SCT Step 2 – Set Security Settings • Prevent account names from being saved • Force passwords to be secure • Prevent Windows for caching credentials with profile • Prevent creation of files and folders on Windows Drive* • Prevent logon to locked profiles • Remove cached copies of locked profiles • Remove Shut Down and Turn Off Computer options • Prevent MS Office document from opening in IE • Use Welcome screen* • Remove administrator from Welcome screen* * Recommended

  37. SCT Step 3 – Create Public Account • We’ve already done

  38. SCT Step 4 - Configure the Public User Profile • We’ve already done

  39. SCT Step 5 - Restrict Local User Profile • Set and lock to prevent permanent changes by user • change general settings • recommended restrictions • optional restrictions • lock profile • Once changed and locked, must be unlocked to alter settings

  40. General Settings • IE Homepage • Proxy • Proxy Exceptions • Session Times • Restrict Drives • Lock Profile • Restart at Logoff

  41. Locking a Profile • The following are items that are not kept between logons when a profile is locked: • Internet history and cookies • Favorites • Files stored on the desktop • Desktop wallpaper • Changes to program settings • Accessibility changes • Start menu changes

  42. Recommend User Restrictions for Public Access Computers • Start Menu restrictions • General Windows restrictions • IE restrictions • MS Office restrictions • Software restrictions

  43. Optional User Restrictions Include Additional… • Start Menu restrictions • General Windows XP restrictions • Internet Explorer restrictions • Software restrictions

  44. Exercise #7 Setting User Restrictions

  45. SCT Step 6 - Testing the Public User Profile • Check • Desktop • Screen saver • Programs availability • Check Accessibility Tools • Visuals • Sound • High contrast • Keyboard and mouse • Check Menus

  46. SCT Step 7 - Windows Disk Protection • Protects the Windows operating system and program files from being permanently changed on a Windows partition. • User changes will stay until the next restart • Admin can make permanent changes • add new programs • modify registry • add user account

  47. Options for setting Windows Disk Protection • Clear Changes • clears all changes with each restart • One Restart • retain changes for one restart • Indefinitely • keeps files through multiple restarts • Save Changes • write changes to C:

  48. Windows Disk Protection Settings • Set schedule for critical updates • Set schedule for antivirus updates

  49. Exercise #8 Turn on Disk Protection

  50. What’s the BIOS? • Acronym for basic input/output system, the built-in software that determines what a computer can do without accessing programs from a disk • On PCs, the BIOS contains all the code required to control the keyboard, display screen, disk drives, boot order, date and time, and a number of miscellaneous functions

More Related