Defense Logistics Agency. Virtual Desktop: User Guide
|
|
- Crystal Short
- 8 years ago
- Views:
Transcription
1 Defense Logistics Agency Virtual Desktop: Effective 04
2 TABLE OF CONTENTS Introduction... 3 Section 1: Virtual Desktop Overview Virtual Desktop Background... 4 Section 2: Device Type - Thin Client Purpose Thin Client Usage Overview Thin Client Hardware Overview Thin Client Software Overview Thin Client Login Instructions Thin Client Log Off Instructions Section 3: Device Type Repurposed Laptop/Desktop, Government Furnished Equipment (GFE) Purpose Repurposed Laptop/Desktop Usage Overview Repurposed Laptop/Desktop Hardware Overview Repurposed Laptop/Desktop Software Overview Repurposed Laptop/Desktop Login Instructions Repurposed Laptop/Desktop Log Off Instructions Section 4: Device Type Traditional Laptop/Desktop, Government Furnished Equipment (GFE) Purpose Traditional Laptop/Desktop Usage Overview Traditional Laptop/Desktop Hardware Overview Traditional Laptop/Desktop Software Overview Traditional Laptop/Desktop Login Instructions Laptop/Desktop (GFE) Log Off Instructions Section 5: Device Type Laptop/Desktop Contractor Furnished Equipment (CFE)/Personal Equipment (PE) Purpose Laptop/Desktop (CFE/PE) Usage Overview Laptop/Desktop (CFE/PE) User Hardware Overview Laptop/Desktop (CFE/PE) User Software Recommendations Laptop/Desktop (CFE/PE) Login Instructions Laptop/Desktop (CFE/PE) Log Off Instructions Home Use Printing Appendix Support Virtual Desktop 2
3 Introduction This user guide is intended to provide all DLA Virtual Desktop users with Virtual Desktop background information, instructions for accessing the Virtual Desktop, and usage information for the specific devices that will access the Virtual Desktop. Readers of this user guide are assumed to have a basic knowledge of operating a personal computer and have received all required certificates (i.e. CAC credentials and PIN) to access DLA s secured network. The Virtual Desktop can be accessed from any computing device that has an internet connection. Accessing the Virtual Desktop allows the user to view their workstation desktop virtually via a terminal machine rather than a local device (i.e. traditional desktop/laptop). This user guide will outline the procedures for accessing the Virtual Desktop from the following devices: Thin Client Repurposed Laptop/Desktop (Government Furnished Equipment) Traditional Laptop/Desktop (Government Furnished Equipment) Contractor Furnished Equipment (CFE) / Personal Equipment (PE) DLA Administrators will identify the device type each user will use (i.e. one of the four machines listed above). Note: Active sessions within the Virtual Desktop can be transferred between the above devices. For example, a user can log into the Virtual Desktop on one device, disconnect, and log in with a different device, and see the same active applications left running on the previous device. Device Usage Policy: Please note the following usage policies for the endpoints that will access the Virtual Desktop: Device HP mt41 Mobile Thin Client HP t620 Thin Client Traditional Laptop Traditional Desktop Repurposed Laptop* Repurposed Desktop* Contractor Equipment Personal Equipment Policy Approved for DLA office usage with wired/wi-fi connection, approved for telework usage Approved for DLA office usage with wired/wi-fi connection, not approved for telework usage Approved for DLA office usage with wired/wi-fi connection, approved for telework usage Approved for DLA office usage with wired connection, not approved for telework usage Approved for DLA office usage with wired/wi-fi connection, approved for telework usage Approved for DLA office usage with wired connection, not approved for telework usage Approved for DLA office usage with Wi-Fi Connection, approved for telework usage Not approved for DLA office usage, approved for telework usage *User can identify that their traditional laptop / desktop is repurposed by powering on device and looking for the Windows ThinPC logo on bottom of the Login page (i.e. Ctrl+Alt+Delete prompt page) Virtual Desktop 3
4 Section 1: Virtual Desktop Overview 1.1 Virtual Desktop Background Virtual Desktop is a capability that moves computer processing and storage away from local devices (laptop/desktops) and into the data center. The benefits of implementing Virtual Desktops into the DLA landscape include improved end user agility (i.e. access to desktop anytime from anywhere), operational efficiencies (i.e. capital and operational costs), and improved security (i.e. no data at rest on lost devices). The below diagram depicts the infrastructure of a Virtual Desktop: Users Data Center User s Data Citrix XenApp/XenDesktop Screen Images Keystrokes Warehouse Workers System Administrators Office Workers (Stationary) Office Workers (Can Telework) Virtual Desktop 4
5 Section 2: Device Type - Thin Client 2.1 Purpose Provide an overview of the hardware, software, and steps to access the Virtual Desktop from a thin client. 2.2 Thin Client Usage Overview The following are two types of Thin Client endpoints that are used to access the Virtual Desktop: HP mt41 Mobile Thin Client Laptop can be used in the office with wired DLA network and Wi-Fi connection. The Mobile Thin Client is approved for telework usage. HP t620 Flexible Thin Client can be used in the office with wired DLA network and Wi-Fi connection. The HP t620 Flexible Thin Client is not approved for telework usage. 2.3 Thin Client Hardware Overview The thin client serves as an access point to the Virtual Desktop (i.e. takes a user s log in request and connects to the desktop virtually) that contains the user s workstation desktop. The thin client has a streamlined and configurable operating system and has limited storage. It can support wired or Wi-Fi connections depending on the model. Specifically, the HP mt41 Mobile Thin Client will support both wired and Wi-Fi connections, and the HP t620 Flexible Thin Client will support only wired connections. The following sections will outline all accessories and additional hardware required to use a thin client and the steps required to access the Virtual Desktop: As of August 2015, DLA is using the HP mt41 Mobile Thin Client and the HP t620 Flexible Thin Client, and repurposed desktop endpoints. Virtual Desktop 5
6 HP mt41 Mobile Thin Client I. At a Glance Left Side View Front View Right Side View Power Adapter Port 2 USB Ports CAC Ethernet Reader Power Button 2 USB Ports Headphone Display Port VGA Port Lockdown port II. Accessories The following accessories are included with the HP mt41 Mobile Thin Client: Image Description Power Cord Docking Station Virtual Desktop 6
7 HP 90W Docking Station I. At a Glance Power Button Front View Laptop Eject Button Docking Station Cable Lock Slot Monitor Stand Port Back View DVI Port Parallel Port Power Adapter Port Security Cable Slot 3 USB Ports II. Accessories Security Cable Slot Audio Serial Port VGA Port In/Out Mouse Connector / Keyboard Connector Display Port 2 USB Ports Ethernet The following accessories are included with the HP 90W Docking Station: Image Description Power Cord Virtual Desktop 7
8 HP t620 Flexible Thin Client I. At a Glance Side View Front View Back View Power Button 2 USB 2.0 Ports 2 USB 3.0 Ports Microphone Headphone 2 USB 2.0 Ports 2 Display Ports VGA Port Power Adapter Port Ethernet Keyboard 2 PS/2 / Ports Mouse Inputs Audio In/Out Lockdown port II. Accessories The following accessories are included with the HP t620 Flexible Thin Client: Image Description Power Cord Display Port to DVI Adapter Virtual Desktop 8
9 III. Additional Hardware Required The following hardware is required for end users to use the HP t620 Flexible Thin Client to complete daily tasks: Image Description Monitor Keyboard with built-in CAC Reader Mouse 2.4 Thin Client Software Overview All software required for the Thin Client is DLA-managed. End user will not need to install any software. The equipment will come configured with all proper installs. Virtual Desktop 9
10 2.5 Thin Client Login Instructions The following steps outline the Virtual Desktop login process using either the HP mt41 Mobile Thin Client and HP t620 Flexible Thin Client: Note: There are two separate login instructions documented for users that will connect via DLA network (Internal) or Wireless network (External) DLA Network (Internal) a. Press the keystroke Ctrl+Alt+Delete SCREEN: Screen displays the ThinPC login image b. Select OK SCREEN: Screen displays the US Department of Defense Warning Statement Virtual Desktop 10
11 c. Insert CAC into the SmartCard Reader SCREEN: Screen displays the ThinPC Smart Card Input Screen d. Enter PIN SCREEN: Screen displays the ThinPC PIN Input Virtual Desktop 11
12 e. Select VDI Launcher Internal SCREEN: Screen displays the Virtual Desktop Internal/External Login methods f. Select DLA Standard Desktop Note: The DLA Standard Desktop will auto-launch for most users SCREEN: Screen displays the Citrix Receiver Desktop Options Virtual Desktop 12
13 g. Choose the DOD certificate and Select OK SCREEN: Screen displays the DOD Certificate options h. Select OK SCREEN: Screen displays the DOD Warning Statement Virtual Desktop 13
14 Note: The Virtual Desktop is available to use, just as a user would navigate a traditional desktop SCREEN: Screen displays the Virtual Desktop Wireless Network (External) a. Press the keystroke Ctrl+Alt+Delete SCREEN: Screen displays the ThinPC login image Virtual Desktop 14
15 b. Select OK SCREEN: Screen displays the US Department of Defense Warning Statement c. Insert CAC into the SmartCard Reader SCREEN: Screen displays the ThinPC Smart Card Input Screen Virtual Desktop 15
16 d. Enter PIN SCREEN: Screen displays the ThinPC PIN Input e. Select the Network Options Icon in the lower righthand corner of the screen SCREEN: Screen displays the Virtual Desktop Internal/External Login methods Virtual Desktop 16
17 f. Select Wireless Network and choose Connect Note: list is dependent on wireless options available SCREEN: Screen displays the Virtual Desktop Internal/External Login methods g. Enter Wireless Network Password and choose OK SCREEN: Screen displays the Virtual Desktop Internal/External Login methods Virtual Desktop 17
18 h. Select Appropriate Location SCREEN: Screen displays the Virtual Desktop Internal/External Login methods a i. Select Connect Note: User will not receive a Splash Page if connecting to Wi-Fi at home SCREEN: Screen displays an example of a splash page that a user may encounter when launching the Virtual Desktop from a public place (i.e. hotel, airport, etc.) Virtual Desktop 18
19 j. Select VDI Launcher External SCREEN: Screen displays the Virtual Desktop Internal/External Login methods k. Select the I Agree With The Statements Above button SCREEN: Screen displays the DLA Enterprise Remote Access Webpage requesting user to accept the use of a U.S Government (USG) Information System (IS) Virtual Desktop 19
20 l. Select the VDI LOGIN button SCREEN: Screen displays the DLA Enterprise Remote Access Webpage requesting user to Login m. Select DLA Standard Desktop Note: The DLA Standard Desktop will auto-launch for most users SCREEN: Screen displays the Citrix Receiver Desktop Options Virtual Desktop 20
21 n. Choose the DOD certificate and Select OK SCREEN: Screen displays the DOD Certificate options o. Select OK SCREEN: Screen displays the DOD Warning Statement Virtual Desktop 21
22 Note: The Virtual Desktop is available to use, just as a user would navigate a traditional desktop SCREEN: Screen displays the Virtual Desktop 2.6 Thin Client Log Off Instructions I. Log-Off the Virtual Desktop Note: Users following this method will terminate the active Virtual Desktop session (i.e. they will not be able to transfer their session to another device) and shut down the Thin Client a. Select the Windows button in the lower lefthand corner of the screen (within Virtual Desktop session) SCREEN: Screen displays the Virtual Desktop; user can navigate the desktop similarly to their traditional desktop Virtual Desktop 22
23 b. Select the Log Off button (within Virtual Desktop session) SCREEN: Screen displays the Virtual Desktop; user can navigate the desktop similarly to their traditional desktop c. Select Start Menu and Select the Log Off button (on local machine) SCREEN: Screen displays the local machine desktop II. Removing CAC Remove CAC from CAC Reader - Users following this method will disconnect the active Virtual Desktop session, but will not terminate (i.e. they will be able to transfer their session to another device; sessions will be automatically logged off after 3 hours of inactivity) Note: Virtual Desktop session will close. Virtual Desktop 23
24 Section 3: Device Type Repurposed Laptop/Desktop, Government Furnished Equipment (GFE) 3.1 Purpose Provide an overview of the hardware, software, and steps to access the Virtual Desktop from a repurposed laptop/desktop. 3.2 Repurposed Laptop/Desktop Usage Overview The following are two types of repurposed endpoints that are used to access the Virtual Desktop: Repurposed Laptop is a traditional laptop that has been repurposed for Virtual Desktop access only. It can be used in the office with the wired DLA and wireless network. The repurposed laptop is approved for telework usage. Repurposed Desktop is a traditional desktop that has been repurposed for Virtual Desktop access only. It can only be used in the office with a wired DLA network connection. The repurposed desktop is not approved for telework usage. 3.3 Repurposed Laptop/Desktop Hardware Overview All users using repurposed laptops/desktops will be provided with all necessary attachments and accessories to use the Virtual Desktop. 3.4 Repurposed Laptop/Desktop Software Overview All software required for the GFEs (laptops or desktops) are DLA-managed. End user will not need to install any software. The equipment will come configured with all proper installs. Virtual Desktop 24
25 3.5 Repurposed Laptop/Desktop Login Instructions The following steps outline the Virtual Desktop login process using a traditional laptop/desktop: Note: There are two separate login instructions documented for users that will connect via DLA network (Internal) or Wireless network (External) DLA Network (Internal) a. Press the keystroke Ctrl+Alt+Delete SCREEN: Screen displays the ThinPC login image b. Select OK SCREEN: Screen displays the US Department of Defense Warning Statement Virtual Desktop 25
26 c. Insert CAC into the SmartCard Reader SCREEN: Screen displays the ThinPC Smart Card Input Screen d. Enter PIN SCREEN: Screen displays the ThinPC PIN Input Virtual Desktop 26
27 e. Select VDI Launcher Internal SCREEN: Screen displays the Virtual Desktop Internal/External Login methods f. Select DLA Standard Desktop Note: The DLA Standard Desktop will auto-launch for most users SCREEN: Screen displays the Citrix Receiver Desktop Options Virtual Desktop 27
28 g. Choose the DOD certificate and Select OK SCREEN: Screen displays the DOD Certificate options h. Select OK SCREEN: Screen displays the DOD Warning Statement Virtual Desktop 28
29 Note: The Virtual Desktop is available to use, just as a user would navigate a traditional desktop SCREEN: Screen displays the Virtual Desktop Wireless Network (External) a. Press the keystroke Ctrl+Alt+Delete SCREEN: Screen displays the ThinPC login image Virtual Desktop 29
30 b. Select OK SCREEN: Screen displays the US Department of Defense Warning Statement c. Insert CAC into the SmartCard Reader SCREEN: Screen displays the ThinPC Smart Card Input Screen Virtual Desktop 30
31 d. Enter PIN SCREEN: Screen displays the ThinPC PIN Input e. Select the Network Options Icon in the lower righthand corner of the screen SCREEN: Screen displays the Virtual Desktop Internal/External Login methods Virtual Desktop 31
32 f. Select Wireless Network and choose Connect Note: list is dependent on wireless options available SCREEN: Screen displays the Virtual Desktop Internal/External Login methods g. Enter Wireless Network Password and choose OK SCREEN: Screen displays the Virtual Desktop Internal/External Login methods Virtual Desktop 32
33 h. Select Appropriate Location SCREEN: Screen displays the Virtual Desktop Internal/External Login methods a i. Select Connect Note: User will not receive a Splash Page if connecting to Wi-Fi at home SCREEN: Screen displays an example of a splash page that a user may encounter when launching the Virtual Desktop from a public place (i.e. hotel, airport, etc.) Virtual Desktop 33
34 j. Select VDI Launcher External SCREEN: Screen displays the Virtual Desktop Internal/External Login methods k. Select the I Agree With The Statements Above button SCREEN: Screen displays the DLA Enterprise Remote Access Webpage requesting user to accept the use of a U.S Government (USG) Information System (IS) Virtual Desktop 34
35 l. Select the VDI LOGIN button SCREEN: Screen displays the DLA Enterprise Remote Access Webpage requesting user to Login m. Select DLA Standard Desktop Note: The DLA Standard Desktop will auto-launch for most users SCREEN: Screen displays the Citrix Receiver Desktop Options Virtual Desktop 35
36 n. Choose the DOD certificate and Select OK SCREEN: Screen displays the DOD Certificate options o. Select OK SCREEN: Screen displays the DOD Warning Statement Virtual Desktop 36
37 Note: The Virtual Desktop is available to use, just as a user would navigate a traditional desktop SCREEN: Screen displays the Virtual Desktop 3.6 Repurposed Laptop/Desktop Log Off Instructions I. Log-Off the Virtual Desktop Note: Users following this method will terminate the active Virtual Desktop session (i.e. they will not be able to transfer their session to another device) and shut down the Thin Client. a. Select the Windows button in the lower lefthand corner of the screen (within Virtual Desktop session) SCREEN: Screen displays the Virtual Desktop; user can navigate the desktop similarly to their traditional desktop Virtual Desktop 37
38 b. Select the Log Off button (within Virtual Desktop session) SCREEN: Screen displays the Virtual Desktop; user can navigate the desktop similarly to their traditional desktop c. Select Start Menu and Select the Log Off button (on local machine) SCREEN: Screen displays the local machine desktop Virtual Desktop 38
39 Section 4: Device Type Traditional Laptop/Desktop, Government Furnished Equipment (GFE) 4.1 Purpose Provide an overview of the hardware, software, and steps to access the Virtual Desktop from a traditional laptop/desktop (GFE). 4.2 Traditional Laptop/Desktop Usage Overview The following are two types of traditional endpoints that are used to access the Virtual Desktop: Traditional Laptop that was originally supplied by DLA can be used in the office with wired DLA network and Wi-Fi connection. The traditional laptop is approved for telework usage. Traditional Desktop that was originally supplied by DLA can only be used in the office with wired DLA network connection. The traditional desktop is not approved for telework usage. Users can continue to use their traditional laptop that was provided to them by DLA (if applicable) or use their personal computers at home to telework (see Section 6). 4.3 Traditional Laptop/Desktop Hardware Overview All users using traditional laptops/desktops will be provided with all necessary attachments and accessories to use the Virtual Desktop. 4.4 Traditional Laptop/Desktop Software Overview All software required for the GFEs (laptops or desktops) are DLA-managed. End user will not need to install any software. The equipment will come configured with all proper installs. Virtual Desktop 39
40 4.5 Traditional Laptop/Desktop Login Instructions The following steps outline the Virtual Desktop login process using a traditional laptop/desktop: a. Ensure CAC is inserted into CAC Reader b. Open Internet Explorer and select Certificate SCREEN: Screen displays Internet Explorer Windows Security c. Enter the following URL: SCREEN: Screen displays Internet Explorer Virtual Desktop 40
41 d. Choose the DOD certificate and Select OK SCREEN: Screen displays the Virtual Desktop Certificate Options e. Choose DLA Standard Desktop Note: DLA Standard Desktop may open automatically SCREEN: Screen displays the Virtual Desktop options available for the user Virtual Desktop 41
42 f. Select OK SCREEN: Screen displays the DOD Warning Statement g. Select the SmartCard Login option Note: To avoid the request being timed-out select the SmartCard Login option as the CAC is being read and do not navigate from the window until login process is successful SCREEN: Screen displays the Virtual Desktop Citrix Receiver requesting the user to select the SmartCard Login option Virtual Desktop 42
43 h. Enter PIN number SCREEN: Screen displays the Virtual Desktop Citrix Receiver requesting the user to enter their PIN Note: The Virtual Desktop is available to use, just as a user would navigate a traditional desktop SCREEN: Screen displays the Virtual Desktop Note: To switch between local machine and Virtual Desktop, expand the Desktop Viewer Drop Down option at the top of the page and choose Home SCREEN: Screen displays the Desktop Viewer Drop Down option Virtual Desktop 43
44 4.6 Laptop/Desktop (GFE) Log Off Instructions Users can log-off of the Virtual Desktop by following the steps below: I. Log-Off Virtual Desktop Note: Users following this method will terminate the active Virtual Desktop session (i.e. they will not be able to transfer their session to another device) a. Select the Windows button in the lower lefthand corner of the screen SCREEN: Screen displays the Virtual Desktop; user can navigate the desktop similarly to their traditional desktop a. Select the Log Off button SCREEN: Screen displays the Virtual Desktop; user can navigate the desktop similarly to their traditional desktop Virtual Desktop 44
45 II. Removing CAC Note: Users following this method will disconnect the active Virtual Desktop session (i.e. they will be able to transfer their session to another device; sessions will be automatically logged off after 3 hours of inactivity) a. Remove CAC from CAC Reader Note: Virtual Desktop session will close. Virtual Desktop 45
46 Section 5: Device Type Laptop/Desktop Contractor Furnished Equipment (CFE)/Personal Equipment (PE) 5.1 Purpose Provide an overview of the hardware, software, and steps to access the Virtual Desktop solution from a laptop/desktop (CFE/PE). 5.2 Laptop/Desktop (CFE/PE) Usage Overview The following outlines the usage overview for CFE/PE when accessing the Virtual Desktop: CFE/PE can be used on a non-government network connections (i.e. home network, coffee shop network, contractor office network, etc.) CFEs are approved for telework usage. Personal Equipment is not approved for DLA office usage, but is approved for telework usage. 5.3 Laptop/Desktop (CFE/PE) User Hardware Overview There are a wide range of CFEs and personal machines that can be used to access the Virtual Desktop. The following list outlines the necessary hardware required to access the Virtual Desktop from either a CFE or personal machine: Desktop Computer or Laptop CAC Reader Ethernet port (with active internet connection) or Wi-Fi Virtual Desktop 46
47 5.4 Laptop/Desktop (CFE/PE) User Software Recommendations Risks There are potential risks associated with installing prerequisite software components (i.e., ActivClient, Citrix Receiver, DOD Root Certificates) and using the remote access system. It is not possible to test these components with all software and/or applications that are commercially available and that may be on your home computer. Therefore, it is possible that the prerequisite software components could conflict with other applications or software residing on your home computer. Use of this capability on your personal non-government-furnished computer is at your own risk. Disclaimer of Liability With respect to installing prerequisite software components or using the remote access solution, neither the DOD, DLA, nor any employees within, provide any warranty, expressed or implied, or assume any legal or financial liability or responsibility for your non-government computer system and/or damages or repairs that may result from system incompatibilities with the remote access solution. By installing prerequisite software and using this product, you signify your agreement to the preceding terms and conditions. If you do not agree to these terms and conditions, do not install or use this product. Help Desk Support All liability for issues and troubleshooting non-gfe is the responsibility of the end user. The DLA Enterprise Help Desk will not provide support for issues with hardware/software not provided by DLA, including but not limited to non-gfe hardware, non-dla networks (e.g., home routers, public hot spots), and non-dla software compatibility issues with Citrix. DLA Enterprise Help Desk resources will support troubleshooting issues that are not related to the non-gfe hardware/software, including but not limited to accounts, DLA applications, and server-side issues. Virtual Desktop 47
48 Personal machines or CFEs running on Windows XP, Windows Vista, Windows 7, Windows 8/8.1, Windows 10 or the latest versions of Mac OS can be used to access the Virtual Desktop. Use the tables below to identify the recommended browser the user should use based on the operating system currently installed on the device. Note: It is highly recommended to use one of following combinations, as deviation could result in performance issues or inability to connect to the Virtual Desktop. Operating System Windows bit Editions Windows bit Editions Windows 7 Service Pack 1(SP1) 64-bit Editions Windows 7 Service Pack 1(SP1) 32-bit Editions Windows 8 64-bit Editions Windows 8 32-bit Editions Windows 7 Service Pack 1(SP1) 64-bit Editions Windows 8 Service Pack 1(SP1) 32-bit Editions Windows 7 64-bit or higher Windows 7 32-bit or higher Windows Vista 32-bit Editions with Service Pack 2 Windows Vista 64-bit Editions with Service Pack 2 Internet Explorer 11.x or later (32-bit mode) Internet Explorer 10.x or later (32-bit mode) Internet Explorer 9.x or later (32-bit mode) Browser Operating System Windows 7 64-bit Editions Windows 7 32-bit Editions Windows XP Professional with Service Pack 3 Windows XP Professional x64 Edition with Service Pack 2 Windows Vista 32-bit Editions with Service Pack 2 Windows Vista 64-bit Editions with Service Pack 2 Mac OS X Mavericks 10.9.x Windows 7 64-bit Editions Windows 7 32-bit Editions Windows XP Professional with Service Pack 3 Windows XP Professional x64 Edition with Service Pack 3 Windows Vista 32-bit Editions with Service Pack 2 Windows Vista 64-bit Editions with Service Pack 2 Internet Explorer 8.x (32-bit mode) Safari 7.0.x Browser Mozilla Firefox 4.x (32-bit mode) Windows XP Professional x32 Edition with Service Pack 3 Windows Vista 32-bit Editions with Service Pack 2 Windows 7 32-bit Editions Red Hat Enterprise Linux 5.4 Desktop Mozilla Firefox 3.x Virtual Desktop 48
49 Before connecting to the Virtual Desktop for the first time, certificates and client software will need to be installed. These are available on the DLA Enterprise Remote Access login page (i.e. The procedures outlined below provide users with the steps required to ensure all proper software is downloaded: Note: The following steps outline the process of downloading the appropriate software in Internet Explorer. The user will need to use the proper web browser based on the operating system installed on the machine (i.e. outlined in above table). Following these steps will result in a necessary machine reboot once completed. a. Connect your Common Access Card (CAC) Reader to an available USB Port on your CFE/Personal Computer System (Desktop/Laptop) b. Turn on your CFE/PE (Desktop/Laptop) c. Launch the Internet browser d. Validate that the required security protocols are enabled - From Internet Explorer, select Tools and then Internet Options Note: If the Tools option isn t visible, then while in the browser select the ALT key on the keyboard and the Tools option will become visible SCREEN: Screen displays the expanded Tools options in Internet Explorer Virtual Desktop 49
50 e. When the Internet Options window appears select the Advanced tab and ensure Use SSL 3.0 and Use TLS 1.0 are checked in the Security section. Select OK, close the Internet browser, and open a new Internet browser window. SCREEN: Screen displays the Advanced tab within the Internet Explorer Internet Options settings f. Insert CAC into CAC Reader g. In your Internet browser, navigate to the DLA Enterprise Remote Access login page (URL below) to access pre-requisite files for download. Enter following URL: Note: The first time navigating to this page, the user may see a warning message similar to the website below. If this appears, select Continue to this Web site (not recommended) SCREEN: Screen displays the Security Certificate Warning requesting the user to close this webpage or continue to this webpage Virtual Desktop 50
51 h. Select the I Agree with the Statements Above button SCREEN: Screen displays the DLA Enterprise Remote Access Webpage requesting user to accept the use of a U.S Government (USG) Information System (IS) i. On the screen below you will see two links for components that need to be installed prior to establishing a connection to the Virtual Desktop from each machine for the first time: SCREEN: Screen displays the DLA Enterprise Remote Access Webpage outlining the required software installs Virtual Desktop 51
52 j. Download DOD Root Certificates Select DOD Root Certificates (Windows/Mac depending on machine) Select Save when prompted Save this file to the computer, and after download is complete, locate file, right click on file, and select Run as Administrator. This exe file will install all required DOD Certificates to the appropriate location on your machine. These certificates are required to be installed on a machine when using a CAC. You may see two prompts issuing a security warning. These warnings are standard, and if you accept them, you should click Yes on both. Note: Clicking No will prevent the machine from accessing the Virtual Desktop SCREEN: Screen displays the DLA Enterprise Remote Access Webpage outlining the required software installs SCREEN: Screen displays the Security Warning prompts requesting the user to accept Virtual Desktop 52
53 k. On the same page, Download Citrix Receiver Select Citrix Receiver (Windows/Mac depending on machine) When prompted, select Run and accept all defaults. SCREEN: Screen displays the DLA Enterprise Remote Access Webpage outlining the required software installs Note: The Citrix Receiver is required to establish a secure connection with Citrix. This client supports Mac, Windows XP, Vista, and Windows 7/8/8.1 operating systems. l. Download ActivIdentity ActivClient request the latest version of ActivClient from your local IT support Note: there are two choices of ActivClient to install, which are based on the configuration of your operating system: 32 bit 64 bit Virtual Desktop 53
54 Users can verify the version of your operating system by right-clicking the My Computer icon on your Desktop, and selecting Properties SCREEN: Screen displays the Computer Drives and the properties of the Computer On the screen that appears, it should state 32-bit or 64-bit Operating System. SCREEN: Screen displays the properties of the Computer Virtual Desktop 54
55 m. Update Trusted Sites Open Internet Explorer browser Select Tools and then Internet Options SCREEN: Screen displays the Internet Explorer Browser OR n. Select the Security tab SCREEN: Screen displays the Internet Options Virtual Desktop 55
56 o. Select the Trusted Sites and select Sites SCREEN: Screen displays the Internet Options Security p. Enter ( * asterisk; followed by a. Period; then dla.mil ) Select Add and Close SCREEN: Screen displays the Trusted Sites Virtual Desktop 56
57 q. Select Apply and OK SCREEN: Screen displays the Internet Options Security r. Update Compatibility View Settings Open Internet Explorer browser Select Tools and then Compatibility View Settings SCREEN: Screen displays the Internet Explorer Browser OR Virtual Desktop 57
58 s. Enter dla.mil, Select Add, and then Close SCREEN: Screen displays the Internet Options Security Note: Internet Explorer is now ready to be used. t. Reboot the computer after all prerequisite components have been installed Note: All required software is now available on the machine and user can proceed to the login process outlined below. 5.5 Laptop/Desktop (CFE/PE) Login Instructions The following steps outline the Virtual Desktop login process using a CFE/Personal Machine: Note: The following steps outline the process of logging in using Internet Explorer. User will need to use the proper web browser based on the operating system installed on the machine. a. Insert CAC into CAC Reader b. Open Internet Explorer c. Enter the following URL: Virtual Desktop 58
59 d. Select the I Agree With The Statements Above button SCREEN: Screen displays the DLA Enterprise Remote Access Webpage requesting user to accept the use of a U.S Government (USG) Information System (IS) e. Select the VDI LOGIN button SCREEN: Screen displays the DLA Enterprise Remote Access Webpage requesting user to Login Virtual Desktop 59
60 f. Choose the DOD certificate and Select OK SCREEN: Screen displays the Virtual Desktop Certificate Options g. Enter PIN SCREEN: Screen displays the PIN prompt h. Choose DLA Standard Desktop Note: DLA Standard Desktop may open automatically SCREEN: Screen displays the Virtual Desktop options available for the user Virtual Desktop 60
61 i. Select OK SCREEN: Screen displays the DOD Warning Statement j. Select the SmartCard Login option Note: To avoid the request being timed-out select the SmartCard Login option as the CAC is being read and do not navigate from the window until login process is successful SCREEN: Screen displays the Virtual Desktop Citrix Receiver requesting the user to select the SmartCard Login option Virtual Desktop 61
62 k. Enter PIN number SCREEN: Screen displays the Virtual Desktop Citrix Receiver requesting the user to enter their PIN Note: The Virtual Desktop is available to use, just as a user would navigate a traditional desktop SCREEN: Screen displays the Virtual Desktop Note: To switch between local machine and Virtual Desktop, expand the Desktop Viewer Drop Down at the top of the page and choose Home SCREEN: Screen displays the Desktop Viewer Drop Down option Virtual Desktop 62
63 5.6 Laptop/Desktop (CFE/PE) Log Off Instructions Users can log off of the Virtual Desktop by following one of the two outlined methods below. I. Log-Off the Virtual Desktop Note: Users following this method will terminate the active Virtual Desktop session (i.e. they will not be able to transfer their session to another device) a. Select the Windows button in the lower lefthand corner of the screen SCREEN: Screen displays the Virtual Desktop; user can navigate the desktop similarly to their traditional desktop b. Select the Log Off button SCREEN: Screen displays the Virtual Desktop; user can navigate the desktop similarly to their traditional desktop Virtual Desktop 63
64 II. Removing CAC Note: Users following this method will disconnect the active Virtual Desktop session (i.e. they will be able to transfer their session to another device; sessions will be automatically logged off after 3 hours of inactivity) a. Remove CAC from CAC Reader Note: Virtual Desktop session will close. 5.7 Home Use Printing Printing from home in Citrix when using your own computer can be done with a wireless connection to your printer, however, DLA cannot offer any technical support for connecting your own personal computer to your own personal printer. To print in Citrix: a. In the Citrix environment, make sure the printer is the default printer: Virtual Desktop 64
65 b. Open the document that you want to print and select File, and then Print Note: If the document doesn t print or if the printer is not set as the default, you may get an EMF viewer. An EMF Viewer will open outside of the Citrix environment; look for it in the task bar. c. Open the EMF Viewer and Select the Print button Virtual Desktop 65
66 d. If a Select Printer window opens, select the appropriate printer and select Print. Note: Printing from home in Citrix when using your government computer must be done with a wired connection to your printer, more information on connecting a wired printer can be found in the Home Use Printing How To. Once your home printer is connected to your government laptop and logged into the Citrix environment, the steps for printing are the same as above. Virtual Desktop 66
67 6.0 Appendix 6.1 Support DLA Enterprise Help Desk Support is available to provide any additional information concerning the Virtual Desktop implementation. Phone: (855) Virtual Desktop 67
Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
More informationCitrix Home User Guide Defense Logistics Agency
Citrix Home User Guide Defense Logistics Agency User Guide and Operational Procedures for Citrix Version 1.16 Date: January 14, 2014 Table of Contents 1. About This Guide... 3 1.1. Who Should Use It...
More informationConnecting Remotely via the Citrix Access Gateway (CAG)
2011 Connecting Remotely via the Citrix Access Gateway (CAG) Version 2.0 *** The CAG is intended for users with OE equipment only. Users with GFE must still use RESCUE as their VPN solution. *** All VISN
More informationConnecting Remotely via the Citrix Access Gateway (CAG)
2011 Connecting Remotely via the Citrix Access Gateway (CAG) Version 2.0 *** The CAG is intended for users with OE equipment only. Users with GFE must still use RESCUE as their VPN solution. *** All VISN
More informationOUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL
United States Army Special Operations Command (USASOC) Special Operations Forces Information Technology Enterprise Contracts (SITEC) OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL Prepared by:
More informationUser Guide Remote PIV to VDI Using a PIV Card
User Guide Remote PIV to VDI Using a PIV Card Energy IT Services (IM-64) March 2015 Authors Prepared By Matthew Cummings Senior Systems Engineer IM-64 Version Control Date Version Document Revision Description
More informationVerizon Remote Access User Guide
Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks
More informationOUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL
United States Army Special Operations Command (USASOC) Special Operations Forces Information Technology Enterprise Contracts (SITEC) OUTLOOK WEB ACCESS (OWA) AND SSL VPN HOME USERS MANUAL Prepared by:
More informationCONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
More informationSSL VPN Support Guide
P a g e 1 SSL VPN Support Guide Revision date: 5/4/10 P a g e 2 Table of Contents Before calling the Support Desk..pg 3 What the Support Desk can assist users with. pg 4 Instructions for PC users (Internet
More informationOutlook Web Access 2003 Remote User Guide
UNITED STATES COAST GUARD Outlook Web Access 2003 Remote User Guide Using Common Access Card Access TISCOM TIS-42 07/29/2008 Version 1.0 CAC Enabled Outlook Web Access CAC Enabled OWA is a way to view
More informationNetwork Connect Installation and Usage Guide
Network Connect Installation and Usage Guide I. Installing the Network Connect Client..2 II. Launching Network Connect from the Desktop.. 9 III. Launching Network Connect Pre-Windows Login 11 IV. Installing
More informationUser Guide Remote Access to VDI/Workplace Using PIV
User Guide Remote Access to VDI/Workplace Using PIV Innovation & Engineering Office (IM-64) May 2015 Table of Contents 1 Overview... 3 1.1 Web Browsers... 3 1.2 Operating Systems... 3 2 Types of Smart
More informationmystanwell.com Installing Citrix Client Software Information and Business Systems
mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.
More informationCitrix Client Install Instructions
Citrix Client Install Instructions If you are using Citrix remotely, Information Technology Services recommends updating Citrix client to the newest version available online. You must be an administrator
More informationSetting up VPN and Remote Desktop for Home Use
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...
More informationManual for configuring NIC VPN in Windows OS
Manual for configuring NIC VPN in Windows OS NIC is introducing a new web based VPN interface to allow s to connect to NICNET through VPN. Apart from existing Client based VPN service, this new interface
More informationWindows Installation 1. On a Windows PC (For MAC, skip to next section), at the file download prompt click Run.
Introduction These instructions are for Windows and MAC users ONLY. For Mobile devices (IOS/Android), use the Mobile Device document found on the portal Login Page. For Windows 8.x users: At this time,
More informationConnecting to Remote Desktop Windows Users
Connecting to Remote Desktop Windows Users How to log into the College Network from Home 1. Start the Remote Desktop Connection For Windows XP, Vista and Windows 7 this is found at:- Star t > All Programs
More informationCitrix Introduction and FAQs
Citrix Introduction and FAQs Introduction to Citrix... 2 Why should I use this?... 2 What about Support?... 2 What browser should I use?... 2 Known Issues... 2 System Requirements for Windows-based computers...
More informationAccess to applications and the network depends on whether or not you are using personal equipment or a Firm-issued laptop or desktop.
Overview of Help & Tips The new System allows authorized users to log in and access the Firm s network through either Citrix or VPN (also known as Stonegate IPSec VPN). This system incorporates additional
More informationPrint Server Application Guide. This guide applies to the following models.
Print Server Application Guide This guide applies to the following models. TL-WR842ND TL-WR1042ND TL-WR1043ND TL-WR2543ND TL-WDR4300 CONTENTS Chapter 1. Overview... 1 Chapter 2. Before Installation...
More informationSetting up VPN and Remote Desktop for Home Use
Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3 IV. Remote Connect to Your Work Computer... 4
More informationPIGCHAMP MOBILE. PigCHAMP Knowledge Software. Installation Guide for Mobile Units
PIGCHAMP MOBILE PigCHAMP Knowledge Software Installation Guide for Mobile Units Table of Contents: Important Note:... 4 Chapter 1: PC Setup... 5 A. Install PigCHAMP Mobile Manager on Windows XP...5 B.
More informationCITRIX TROUBLESHOOTING TIPS
CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:
More informationRemote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0
Remote Access Remote Access Start-up Guide Non Cheshire East Council PC s/laptops Page 0 Page 1 1. Getting Started NGD provides easy access to all your Cheshire East documents and applications whilst not
More informationBasic Citrix Manual. Apple Computers and Laptops. Version 1.3. Created by Joshua Lindemann
Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring
More informationREMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM
REMOTELY ACCESS YOUR FILES WITH THE FLAGLER FILECONNECT SYSTEM This document explains the various ways to connect to your network files and group share data. In addition, staff and full-time faculty are
More informationHow To Use A Magistrate Desktop Computer
Windows 7 Tips and Tricks 2013 Fall Magistrates Conference (This page left blank) Magistrate Laptops Page 2 Purpose: Magistrates desktop computers are being replaced with a laptop, external monitor, docking
More informationFor Mac User Directions, see page 5
Windows Vista, Windows 7, and Windows XP with Service Pack 3 Remote Desktop Access For Mac User Directions, see page 5 This instruction allows district staff and students to access the Commack UFSD network
More informationPortal Instructions for Mac
Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationNetworking. General networking. Networking overview. Common home network configurations. Wired network example. Wireless network examples
Networking General networking Networking overview A network is a collection of devices such as computers, printers, Ethernet hubs, wireless access points, and routers connected together for communication
More informationVPN User Guide. For Mac
VPN User Guide For Mac System Requirements Operating System: Mac OSX. Internet Browser: Safari (Firefox and Google Chrome are NOT currently supported). Disclaimer Your computer must have the system requirements
More informationIntel Unite Solution. Standalone User Guide
Intel Unite Solution Standalone User Guide Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain the latest Intel
More informationNETGEAR genie Apps. User Manual. 350 East Plumeria Drive San Jose, CA 95134 USA. August 2012 202-10933-04 v1.0
User Manual 350 East Plumeria Drive San Jose, CA 95134 USA August 2012 202-10933-04 v1.0 Support Thank you for choosing NETGEAR. To register your product, get the latest product updates, get support online,
More informationWA1826 Designing Cloud Computing Solutions. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA1826 Designing Cloud Computing Solutions Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum
More informationContents. Business Everywhere user guide. 1. Introduction. 2. How to Install/Uninstall Business Everywhere. 3. The Business Everywhere interface
Contents 1. Introduction 2. How to Install/Uninstall Business Everywhere 3. The Business Everywhere interface 4. Launching Business Everywhere 5. Connection 6. Business Everywhere management tools 7. Troubleshooting
More informationXenApp & XenDesktop Documentation. Help Desk (202) 994-8096 www.columbian.gwu.edu/ots
XenApp & XenDesktop Documentation Help Desk (202) 994-8096 www.columbian.gwu.edu/ots 1 Version Date Comments Author v1.0 June 2011 Initial Version R. Shore v2.0 December 2011 Full Revision R. Shore v2.1
More informationOperating Instructions Driver Installation Guide
Operating Instructions Driver Installation Guide For safe and correct use, be sure to read the Safety Information in "Read This First" before using the machine. TABLE OF CONTENTS 1. Introduction Before
More informationHP Advanced Wireless Docking Station. User Guide
HP Advanced Wireless Docking Station User Guide Copyright 2014, 2015 Hewlett-Packard Development Company, L.P. Intel is a trademark of Intel Corporation in the U.S. and other countries. Windows and Windows
More informationApple OS / ios Installation Guide Includes MAC OSx and ios based devices
Apple OS / ios Installation Guide Includes MAC OSx and ios based devices Updated 8/10/2012 This page intentionally left blank Using SPOT on a Apple OS Device... 4 Summary... 4 Requirements... 4 Usage and
More informationPortions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
More informationThinPoint Quick Start Guide
ThinPoint Quick Start Guide 2 ThinPoint Quick Start Guide Table of Contents Part 1 Introduction 3 Part 2 ThinPoint Windows Host Installation 3 1 Compatibility... list 3 2 Pre-requisites... 3 3 Installation...
More informationFrequently Asked Questions
FAQs Frequently Asked Questions Connecting your Linksys router to the Internet 1 What computer operating systems does my Linksys router support? 1 Why can t I connect my computer or device to my router?
More informationTerminal Server Guide
Terminal Server Guide Contents What is Terminal Server?... 2 How to use Terminal Server... 2 Remote Desktop Connection Client... 2 Logging in... 3 Important Security Information... 4 Logging Out... 4 Closing
More informationThis document also includes steps on how to login into HUDMobile with a grid card and launch published applications.
Office of the Chief Information Officer Information Technology Division COMPUTER SELF-HELP DESK - TRAINING TIPS AND TRICKS HUDMOBILE ON HOME MACS This document is a step-by-step instruction to check or
More informationSimpleCall PC Dialler
SimpleCall PC Dialler User Guide Version 2 (For Windows PC) 1 SimpleCall PC Dialler The SimpleCall PC Dialler is an easy-to-use alternative to your landline or mobile for making cheap international calls.
More informationContents. VPN Instructions. VPN Instructions... 1
VPN Instructions Contents VPN Instructions... 1 Download & Install Check Point VPN Software... 2 Connect to FPUA by VPN... 6 Connect to Your Computer... 8 Determine Your Machine Type... 10 Identify 32-bit
More informationConfiguring the wireless security of your Linksys Wireless-N router through the web-based setup page
Contents Configuring the wireless security of your Linksys Wireless-N router through the web-based setup page.. 2 Checking the Linksys router s wireless settings through the web-based setup page and adding
More informationCitrix XenApp 6.5 User Guide. For Windows and OS X
Citrix XenApp 6.5 User Guide For Windows and OS X Table of Contents Target Audience... 3 Prerequisites... 3 Windows:... 3 OS X:... 3 Installing Client... 4 Downloading the Client:... 4 Launching the Installer...
More informationBefore You Begin Installing Your Scanner
Before You Begin Installing Your Scanner We recommend that you confirm the following before installing your scanner: MINIMUM SYSTEM REQUIREMENTS Review the following system and Internet requirements to
More informationUSER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
More informationMetasys System Direct Connection and Dial-Up Connection Application Note
Metasys System Direct Connection and Dial-Up Connection Application Note Code No. LIT-1201639 Software Release 5.1 Issued August 27, 2013 Supersedes October 4 2010 Refer to the QuickLIT website for the
More informationBasic Citrix Manual. Windows Computers and Laptops. Version 1.3. Created by Joshua Lindemann
Basic Citrix Manual Version 1.3 Created by Joshua Lindemann Table of Contents Technology Services Help Desk... 3 Background... 4 Citrix Virtual Environment... 4 Wireless Access... 4 Security... 4 Configuring
More informationHow To Set Up Hopkins Wireless On Windows 7 On A Pc Or Mac Or Ipad (For A Laptop) On A Network Card (For Windows 7) On Your Computer Or Ipa (For Mac Or Mac) On An Ipa Or
Wireless Configuration Guide: Windows 7 Additional hopkins wireless network instructions and requirements for Windows XP, Vista, 8, Mac OS X, Linux, and other Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/
More informationUsing Remote Web Workplace Version 1.01
Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote
More informationSHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
More informationBT Lancashire Services
In confidence BT Lancashire Services Remote Access to Corporate Desktop (RACD) Getting Started Guide Working in partnership Confidentiality Statement BT Lancashire Services Certain information given to
More informationSMART Board User Guide for Mac
SMART Board User Guide for Mac What is it? SMART Board is an interactive whiteboard available in an increasing number of classrooms at the University of Tennessee. While your laptop image is projected
More informationThis document is intended to make you familiar with the ServersCheck Monitoring Appliance
ServersCheck Monitoring Appliance Quick Overview This document is intended to make you familiar with the ServersCheck Monitoring Appliance Although it is possible, we highly recommend not to install other
More informationRemote Working from a Mac computer
Remote Working from a Mac computer Prepared by: Bonnie Cheng Version: 1.0 26 th June 2014 Table of Contents Introduction...3 Installing the Citrix Client...3 Working Remotely Via Citrix...5 Printing from
More informationContents. Overview. The notes in this document are written for Windows 7 though the steps are fairly similar in earlier versions of Windows.
Using Remote Desktop By Christopher A. Leonti Information Technology Support Specialist College of Ag / Montana Ag Experiment Station Montana State University-Bozeman http://ag.montana.edu/infotech Contents
More informationVirtual Desktop on any computer (incl. Desktop Bar Guide)
Viewpoint School Virtual Desktop on any computer (incl. Desktop Bar Guide) 091214 Accessing Your Viewpoint Virtual Desktop on any Computer We are pleased to announce the availability of Viewpoint s new
More informationThis guide is intended to help you troubleshoot problems connecting a wireless device to the Gogo Biz network.
This guide is intended to help you troubleshoot problems connecting a wireless device to the Gogo Biz network. TABLE OF CONTENTS Windows Operating System... 3 Blackberry... 5 Android... 6 Apple Macbook...
More informationVirtual Owl. Guide for Windows. University Information Technology Services. Training, Outreach, Learning Technologies & Video Production
Virtual Owl Guide for Windows University Information Technology Services Training, Outreach, Learning Technologies & Video Production Copyright 2015 KSU Division of University Information Technology Services
More informationVirtual Office Remote Installation Guide
Virtual Office Remote Installation Guide Table of Contents VIRTUAL OFFICE REMOTE INSTALLATION GUIDE... 3 UNIVERSAL PRINTER CONFIGURATION INSTRUCTIONS... 12 CHANGING DEFAULT PRINTERS ON LOCAL SYSTEM...
More informationPortions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2010 Installation Guide, product version 6.4. This guide is item number DOC-110, revision 1.045, May 2010 Copyright 1995-2010 Lenel Systems International, Inc. Information
More informationAccessing CAC-Restricted Sites From Home
Accessing CAC-Restricted Sites From Home If you are already able to reach Air Force (AF) sites with your Common Access Cards (CAC) from home, you probably do not need these instructions. This document
More informationGuide to Installing BBL Crystal MIND on Windows 7
Guide to Installing BBL Crystal MIND on Windows 7 Introduction The BBL Crystal MIND software can not be directly installed on the Microsoft Windows 7 platform, however it can be installed and run via XP
More informationProduct Description. Licenses Notice. Introduction TC-200
User Manual TC-200 Introduction TC-200 Product Description The TC-200 provides the fastest Thin Client performance on the market, It runs embedded Linux, swing user interface, Citrix 6.3, Microsoft RDP
More informationTHE. solution. STORe it. SHARE it.
THE small business solution THE HP Storageworks X510 Data Vault STORe it. SECURE it. SHARE it. T H E H P S t o r a g e w o r k s X 51 0 D a t a V a u l t data protection just got less puzzling If, like
More informationInternet and Email Help. Table of Contents:
Internet and Email Help The following tips are provided to assist you in troubleshooting and managing your Plex Internet and email services. For additional issues or concerns, you may also call our Product
More informationisupplier PORTAL ACCESS SYSTEM REQUIREMENTS
TABLE OF CONTENTS Recommended Browsers for isupplier Portal Recommended Microsoft Internet Explorer Browser Settings (MSIE) Recommended Firefox Browser Settings Recommended Safari Browser Settings SYSTEM
More informationCharter Business Desktop Security Administrator's Guide
Charter Business Desktop Security Administrator's Guide Table of Contents Chapter 1: Introduction... 4 Chapter 2: Getting Started... 5 Creating a new user... 6 Recovering and changing your password...
More informationAccessing Citrix on a MAC using OS X (Mountain Lion and Newer)
These instructions are specifically designed for OS X Mountain Lion and Mavericks. Earlier versions of the OS will require a different installation. These instructions assume that there are no Java, Citrix
More informationCitrix Web Client Installation and CAC Registration Guide
Citrix Web Client Installation and CAC Registration Guide Prepared By: Department of Defense Education Activity 1 Revision 1.1 To ensure a reasonably smooth process of establishing connectivity with the
More informationTechnology Services Group Procedures. IH Anywhere guide. 0 P a g e
VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple
More informationAn additional website URL has been added to the districts website address making this gateway easy to access and bookmark for future use.
Veribest ISD Virtual Desktop Integration Installing vworkstation for Remote (Home) Use Section 1: Installing the vworkstation Gateway The convenience of home access to your school district desktop is going
More informationSale Grammar School Remote Desktop Services User Instructions
Sale Grammar School Remote Desktop Services User Instructions Sale Grammar School Remote Desktop Services allows Staff and Students access to a virtual school computer while connected to the internet at
More informationRemote Access to Niagara Wheatfield s Computer Network
Remote Access to Niagara Wheatfield s Computer Network Niagara Wheatfield Central School District Office of Instructional Technology Revised: June 24, 2010 Page 1 of 15 To gain access to Niagara Wheatfield
More informationVeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
More informationSSL VPN Support Guide
Page 1 SSL VPN Support Guide Revision date: 4/16/14 Page 2 Table of Contents Before calling the Service Desk..pg 3 What the Service Desk can assist users with. pg 4 Instructions for PC users (Internet
More informationRemote Terminal Service (RTS) User Guide (Version 2.1)
Remote Terminal Service (RTS) User Guide (Version 2.1) Page 1 Table of Content Content Page 1 Introduction 3 2 Prerequisite 3 3 Logon Corporate Network via Internet 4 4 Download and Install RTS Client
More informationACP ThinManager Tech Notes Troubleshooting Guide
ACP ThinManager Tech Notes Troubleshooting Guide Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit www.thinmanager.com/technotes/ to download the manual, manual
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationVeterans Affairs. Remote Access Solutions
Veterans Affairs Remote Access Solutions ActivClient Installation Guide Version 1.2 May 5, 2014 WARNING: This document is FOR OFFICIAL USE ONLY. It contains information that may be exempt from public release
More informationAkita International University Online Application System. Usage Manual
Akita International University Online Application System Usage Manual Please Check the Following Before You Begin To Access the System: Ensure you are using one of the following Operating Systems (OS)
More informationHow to Connect to Berkeley College Virtual Lab Using Windows
How to Connect to Berkeley College Virtual Lab Using Windows Minimum Requirements Create and Save a Remote Desktop Services Connection Connecting to a Remote Desktop Services session Copy Files between
More informationMassey University Wireless Network Client Configuration Mac OS X 10.6 10.9
Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 MAC wireless network Requirements Information Technology Services You must have an active Massey username and password (i.e. you
More informationInstall and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
More informationWA2192 Introduction to Big Data and NoSQL. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1
WA2192 Introduction to Big Data and NoSQL Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationMicrosoft Windows Installation and Troubleshooting Guide
Remote Access Services Microsoft Windows - Installation and Troubleshooting Guide Version 2.1 February 19, 2013 1 P age TABLE OF CONTENTS 1 MICROSOFT WINDOWS XP INSTALLATION PROCEDURES... 3 2 MICROSOFT
More informationParallels Desktop for Mac
Parallels Software International, Inc. Parallels Desktop for Mac Quick Start Guide 3.0 (c) 2005-2007 Copyright 2006-2007 by Parallels Software International, Inc. All rights reserved. Parallels and Parallels
More informationMobileLite Wireless G2 5-in-1 Mobile Companion User Manual
MobileLite Wireless G2 5-in-1 Mobile Companion User Manual Document No. 480-MLWG2-021315.A00 Kingston MobileLite Wireless Page 1 of 21 Table of Contents Introduction... 3 What s Included:... 3 Getting
More informationLockView 4.3.1 CompX Database & Network Configuration & Installation Manual
LockView 4.3.1 CompX Database & Network Configuration & Installation Manual Table of Contents CompX Database & Network Configuration & Installation Manual Introduction... 4 Installation Requirements...
More informationintegration tools setup guide SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop
setup guide integration tools SIM 3 Remote Guide to controlling a SIM 3 Audio Analyzer remotely over a network connection from a laptop 2010 Meyer Sound. All rights reserved. SIM 3 Remote Setup Guide,
More information