Presentation is loading. Please wait.

Presentation is loading. Please wait.

Desktop Configuration and Cloning Instructor: Chuck O’Shea An Infopeople Workshop Fall-Winter 2006.

Similar presentations


Presentation on theme: "Desktop Configuration and Cloning Instructor: Chuck O’Shea An Infopeople Workshop Fall-Winter 2006."— Presentation transcript:

1 Desktop Configuration and Cloning Instructor: Chuck O’Shea coshea@infopeople.org An Infopeople Workshop Fall-Winter 2006

2 Infopeople is a federally-funded grant project supported by the California State Library. It provides a wide variety of training to California libraries. Infopeople workshops are offered around the state and are open registration on a first-come, first-served basis. For a complete list of workshops, and for other information about the project, go to the Infopeople website at infopeople.org. This Workshop is Brought to You by the Infopeople Project

3 Introductions Name Library Position What is your experience with adding software, configuring administration functions?

4 Packet Agenda PowerPoint Exercises Handouts CD

5 Class Assumptions You are comfortable with basic computer skills You have installed and configured software You are are the person at your library who will be configuring your Public Access Computers You will be using Windows XP

6 What kinds of computer issues arise when offering computers to the public?

7 How do you handle these problems currently?

8 Workshop Goals Help you understand the issues in making computers accessible to the public Share a solution –create a hard drive image set up for public access computing –clone it

9 If Working with a Used Computer Need to clean up the hard drive –don’t know how it’s been used –registry could be hiding things –get rid of personal files/programs Restore depends on manufacturer Want to do more than just reinstall OS

10 To Create a Secure Public Access Computer 1.Install Updates 2.Install Apps 3.Tighten System 4.Customize Profile 5.Use Shared Computer Toolkit 6.Change BIOS 7.Create Image 8.Clone We are assuming you have a new computer with a clean install of Windows XP or have restored the hard drive of a used computer.

11 Step #1 - Install Updates Download and run Service Packs and updates so you are running the most current version of the OS less vulnerable to security risks bug fixes take advantage of new technology

12 Step #2 - Install Applications For example Microsoft Office Virus & Spyware Protection Printer Drivers Public Browser Media Players

13 Public Browser Features: –easy configuration –URL tracking –popup restriction –auto clearing of cache and cookies Installation Configuration

14 Public Browser Configuration

15 Public Browser Overrides What are they? What do they do? Shift/Alt/Control/Insert

16 Exercise #1 Install & Configure Public Browser

17 Step #3 - Tighten System for Public Access Remove unnecessary programs Remove unnecessary features Disable unnecessary services

18 Removing Unnecessary Windows Components for Public Access Fax MSN Explorer Outlook Express Networking Services Windows Messenger What about games?

19 Exercise #2 Removing Unnecessary Windows Components for Public Access

20 Remove Unnecessary Features for Public Access Remote desktop System restore Fast user switching Offline files Hibernation

21 Exercise #3 Removing Unwanted Features for Public Access

22 Disable Unnecessary Services for Public Access Distributed link transaction Secondary logon Task scheduler Terminal services Telephony Wireless zero configuration

23 Exercise #4 Disable Unnecessary Services for Public Access Computers

24 Step #4 User Profile A user profile defines customized desktop environments, such as individual display and network and printer connections settings. With profiles, the system administrator can set access for different users: –Desktop shortcuts –Windows preferences –Printers –First-time settings

25 For PAC You Need Two Profiles Administrator –install and uninstall software –configure settings –create and delete users Limited –run programs –access the Internet –create files and folders –Public Adults Children

26 Create Public Account Creating a Public account for shared access with limited access Account will be shared by all public users Account will be a Limited Account that will not allow user to perform administrative functions

27 Configure the Public User Profile Log on as local user Run all programs installed for the first time –Examples configure Office programs Windows Media Player Adobe Reader Configure settings

28 Exercise #5 Create a User Account and Configure the “Public Profile”

29 Customize All Users Start menu Changes made to All Users Start Menu affect everyone that uses that computer. Most programs install Start menu shortcuts in the All Users profile To customize “All Users” Start Menu –Login as administrator –Remove unwanted Icons –Add programs to Start Menu

30 Step #5 - Use Shared Computer Toolkit Free from Microsoft –download the latest version –get product support –view demos http://www.microsoft.com/windowsxp/ sharedaccess/default.mspx

31 Microsoft Shared Computer Toolkit Only works on Windows XP –protects windows partition (drive c:) –allows you to restrict users easy access to computer settings profile manager –easy access –more options easily change Accessibility options

32 Hive Cleanup Service Prompted to get when you install Shared Computer Toolkit Eliminates log off problems Must be installed and running to work

33 SCT Step 1 – Prepare Disk Prepare the disk for Windows disk protection –requires unallocated space –we will use Symantec’s Partition Magic 8.0 to create an unallocated partition minimum of 1GB up to 10% of disk space space used for temporary files

34 Partition Magic Allows you to: –merge partitions –create new partitions –resize partitions Run it from the CD –does not need to be installed

35 Exercise #6 Download and Install Shared Computer Toolkit, Install Hive Cleanup Service, and Run Partition Magic

36 SCT Step 2 – Set Security Settings Prevent account names from being saved Force passwords to be secure Prevent Windows for caching credentials with profile Prevent creation of files and folders on Windows Drive* Prevent logon to locked profiles Remove cached copies of locked profiles Remove Shut Down and Turn Off Computer options Prevent MS Office document from opening in IE Use Welcome screen* Remove administrator from Welcome screen* * Recommended

37 SCT Step 3 – Create Public Account We’ve already done

38 SCT Step 4 - Configure the Public User Profile We’ve already done

39 SCT Step 5 - Restrict Local User Profile Set and lock to prevent permanent changes by user –change general settings –recommended restrictions –optional restrictions –lock profile Once changed and locked, must be unlocked to alter settings

40 General Settings IE Homepage Proxy Proxy Exceptions Session Times Restrict Drives Lock Profile Restart at Logoff

41 Locking a Profile The following are items that are not kept between logons when a profile is locked: Internet history and cookies Favorites Files stored on the desktop Desktop wallpaper Changes to program settings Accessibility changes Start menu changes

42 Recommend User Restrictions for Public Access Computers –Start Menu restrictions –General Windows restrictions –IE restrictions –MS Office restrictions –Software restrictions

43 Optional User Restrictions Include Additional… Start Menu restrictions General Windows XP restrictions Internet Explorer restrictions Software restrictions

44 Exercise #7 Setting User Restrictions

45 SCT Step 6 - Testing the Public User Profile –Check Desktop Screen saver Programs availability –Check Accessibility Tools Visuals Sound High contrast Keyboard and mouse –Check Menus

46 SCT Step 7 - Windows Disk Protection Protects the Windows operating system and program files from being permanently changed on a Windows partition. User changes will stay until the next restart Admin can make permanent changes –add new programs –modify registry –add user account

47 Options for setting Windows Disk Protection Clear Changes –clears all changes with each restart One Restart –retain changes for one restart Indefinitely –keeps files through multiple restarts Save Changes –write changes to C:

48 Windows Disk Protection Settings Set schedule for critical updates Set schedule for antivirus updates

49 Exercise #8 Turn on Disk Protection

50 What’s the BIOS? Acronym for basic input/output system, the built-in software that determines what a computer can do without accessing programs from a disk On PCs, the BIOS contains all the code required to control the keyboard, display screen, disk drives, boot order, date and time, and a number of miscellaneous functions

51 Step #6 - Change BIOS Access the BIOS during bootup by pressing and holding the F2 key Change Boot Sequence –Internal HDD –Only Internal HDD Bootable

52 Use Passwords for Security Admin Password System Password –NOT recommended –requires password to boot Internal HDD Password –NOT recommended –travels with hard drive even if removed from computer Password Changes –Set to “Permitted”

53 You MUST set an Admin password to keep people from changing BIOS settings.

54 Exercise #9 Change the BIOS

55 Yesterday We Created Our Public Access Image Installed Public Browser Removed programs, services, and features Partitioned disk Installed HIVE and the Microsoft Shared Computer Toolkit Created profiles Set security with SCT Changed the BIOS

56 Clone We spent a full day creating an image Now we want to make our other 20 computers identical without spending a day on each one So, you clone it

57 Benefits of Cloning Easy to set many computers When the computer goes bad –restore computer by replacing image

58 Cloning - Requirements –Image and clone must have identical hardware –Need different images for computers with different hardware

59 What now? Sysprep vs. New SID –What is Sysprep –When to run

60 How Do You Keep Your Computers Current? Create an updated image Re-image all computers

61 In the Ideal World Have a reference computer –no one uses it –update and patch regularly –update programs as needed Create new image from reference computer Re-image all computers

62 Exercise #10 Making It Happen

63 Evaluation Form infopeople.org/workshop/eval/


Download ppt "Desktop Configuration and Cloning Instructor: Chuck O’Shea An Infopeople Workshop Fall-Winter 2006."

Similar presentations


Ads by Google