Download presentation
Presentation is loading. Please wait.
Published byClare Shields Modified over 9 years ago
1
Desktop Configuration and Cloning Instructor: Chuck O’Shea coshea@infopeople.org An Infopeople Workshop Fall-Winter 2006
2
Infopeople is a federally-funded grant project supported by the California State Library. It provides a wide variety of training to California libraries. Infopeople workshops are offered around the state and are open registration on a first-come, first-served basis. For a complete list of workshops, and for other information about the project, go to the Infopeople website at infopeople.org. This Workshop is Brought to You by the Infopeople Project
3
Introductions Name Library Position What is your experience with adding software, configuring administration functions?
4
Packet Agenda PowerPoint Exercises Handouts CD
5
Class Assumptions You are comfortable with basic computer skills You have installed and configured software You are are the person at your library who will be configuring your Public Access Computers You will be using Windows XP
6
What kinds of computer issues arise when offering computers to the public?
7
How do you handle these problems currently?
8
Workshop Goals Help you understand the issues in making computers accessible to the public Share a solution –create a hard drive image set up for public access computing –clone it
9
If Working with a Used Computer Need to clean up the hard drive –don’t know how it’s been used –registry could be hiding things –get rid of personal files/programs Restore depends on manufacturer Want to do more than just reinstall OS
10
To Create a Secure Public Access Computer 1.Install Updates 2.Install Apps 3.Tighten System 4.Customize Profile 5.Use Shared Computer Toolkit 6.Change BIOS 7.Create Image 8.Clone We are assuming you have a new computer with a clean install of Windows XP or have restored the hard drive of a used computer.
11
Step #1 - Install Updates Download and run Service Packs and updates so you are running the most current version of the OS less vulnerable to security risks bug fixes take advantage of new technology
12
Step #2 - Install Applications For example Microsoft Office Virus & Spyware Protection Printer Drivers Public Browser Media Players
13
Public Browser Features: –easy configuration –URL tracking –popup restriction –auto clearing of cache and cookies Installation Configuration
14
Public Browser Configuration
15
Public Browser Overrides What are they? What do they do? Shift/Alt/Control/Insert
16
Exercise #1 Install & Configure Public Browser
17
Step #3 - Tighten System for Public Access Remove unnecessary programs Remove unnecessary features Disable unnecessary services
18
Removing Unnecessary Windows Components for Public Access Fax MSN Explorer Outlook Express Networking Services Windows Messenger What about games?
19
Exercise #2 Removing Unnecessary Windows Components for Public Access
20
Remove Unnecessary Features for Public Access Remote desktop System restore Fast user switching Offline files Hibernation
21
Exercise #3 Removing Unwanted Features for Public Access
22
Disable Unnecessary Services for Public Access Distributed link transaction Secondary logon Task scheduler Terminal services Telephony Wireless zero configuration
23
Exercise #4 Disable Unnecessary Services for Public Access Computers
24
Step #4 User Profile A user profile defines customized desktop environments, such as individual display and network and printer connections settings. With profiles, the system administrator can set access for different users: –Desktop shortcuts –Windows preferences –Printers –First-time settings
25
For PAC You Need Two Profiles Administrator –install and uninstall software –configure settings –create and delete users Limited –run programs –access the Internet –create files and folders –Public Adults Children
26
Create Public Account Creating a Public account for shared access with limited access Account will be shared by all public users Account will be a Limited Account that will not allow user to perform administrative functions
27
Configure the Public User Profile Log on as local user Run all programs installed for the first time –Examples configure Office programs Windows Media Player Adobe Reader Configure settings
28
Exercise #5 Create a User Account and Configure the “Public Profile”
29
Customize All Users Start menu Changes made to All Users Start Menu affect everyone that uses that computer. Most programs install Start menu shortcuts in the All Users profile To customize “All Users” Start Menu –Login as administrator –Remove unwanted Icons –Add programs to Start Menu
30
Step #5 - Use Shared Computer Toolkit Free from Microsoft –download the latest version –get product support –view demos http://www.microsoft.com/windowsxp/ sharedaccess/default.mspx
31
Microsoft Shared Computer Toolkit Only works on Windows XP –protects windows partition (drive c:) –allows you to restrict users easy access to computer settings profile manager –easy access –more options easily change Accessibility options
32
Hive Cleanup Service Prompted to get when you install Shared Computer Toolkit Eliminates log off problems Must be installed and running to work
33
SCT Step 1 – Prepare Disk Prepare the disk for Windows disk protection –requires unallocated space –we will use Symantec’s Partition Magic 8.0 to create an unallocated partition minimum of 1GB up to 10% of disk space space used for temporary files
34
Partition Magic Allows you to: –merge partitions –create new partitions –resize partitions Run it from the CD –does not need to be installed
35
Exercise #6 Download and Install Shared Computer Toolkit, Install Hive Cleanup Service, and Run Partition Magic
36
SCT Step 2 – Set Security Settings Prevent account names from being saved Force passwords to be secure Prevent Windows for caching credentials with profile Prevent creation of files and folders on Windows Drive* Prevent logon to locked profiles Remove cached copies of locked profiles Remove Shut Down and Turn Off Computer options Prevent MS Office document from opening in IE Use Welcome screen* Remove administrator from Welcome screen* * Recommended
37
SCT Step 3 – Create Public Account We’ve already done
38
SCT Step 4 - Configure the Public User Profile We’ve already done
39
SCT Step 5 - Restrict Local User Profile Set and lock to prevent permanent changes by user –change general settings –recommended restrictions –optional restrictions –lock profile Once changed and locked, must be unlocked to alter settings
40
General Settings IE Homepage Proxy Proxy Exceptions Session Times Restrict Drives Lock Profile Restart at Logoff
41
Locking a Profile The following are items that are not kept between logons when a profile is locked: Internet history and cookies Favorites Files stored on the desktop Desktop wallpaper Changes to program settings Accessibility changes Start menu changes
42
Recommend User Restrictions for Public Access Computers –Start Menu restrictions –General Windows restrictions –IE restrictions –MS Office restrictions –Software restrictions
43
Optional User Restrictions Include Additional… Start Menu restrictions General Windows XP restrictions Internet Explorer restrictions Software restrictions
44
Exercise #7 Setting User Restrictions
45
SCT Step 6 - Testing the Public User Profile –Check Desktop Screen saver Programs availability –Check Accessibility Tools Visuals Sound High contrast Keyboard and mouse –Check Menus
46
SCT Step 7 - Windows Disk Protection Protects the Windows operating system and program files from being permanently changed on a Windows partition. User changes will stay until the next restart Admin can make permanent changes –add new programs –modify registry –add user account
47
Options for setting Windows Disk Protection Clear Changes –clears all changes with each restart One Restart –retain changes for one restart Indefinitely –keeps files through multiple restarts Save Changes –write changes to C:
48
Windows Disk Protection Settings Set schedule for critical updates Set schedule for antivirus updates
49
Exercise #8 Turn on Disk Protection
50
What’s the BIOS? Acronym for basic input/output system, the built-in software that determines what a computer can do without accessing programs from a disk On PCs, the BIOS contains all the code required to control the keyboard, display screen, disk drives, boot order, date and time, and a number of miscellaneous functions
51
Step #6 - Change BIOS Access the BIOS during bootup by pressing and holding the F2 key Change Boot Sequence –Internal HDD –Only Internal HDD Bootable
52
Use Passwords for Security Admin Password System Password –NOT recommended –requires password to boot Internal HDD Password –NOT recommended –travels with hard drive even if removed from computer Password Changes –Set to “Permitted”
53
You MUST set an Admin password to keep people from changing BIOS settings.
54
Exercise #9 Change the BIOS
55
Yesterday We Created Our Public Access Image Installed Public Browser Removed programs, services, and features Partitioned disk Installed HIVE and the Microsoft Shared Computer Toolkit Created profiles Set security with SCT Changed the BIOS
56
Clone We spent a full day creating an image Now we want to make our other 20 computers identical without spending a day on each one So, you clone it
57
Benefits of Cloning Easy to set many computers When the computer goes bad –restore computer by replacing image
58
Cloning - Requirements –Image and clone must have identical hardware –Need different images for computers with different hardware
59
What now? Sysprep vs. New SID –What is Sysprep –When to run
60
How Do You Keep Your Computers Current? Create an updated image Re-image all computers
61
In the Ideal World Have a reference computer –no one uses it –update and patch regularly –update programs as needed Create new image from reference computer Re-image all computers
62
Exercise #10 Making It Happen
63
Evaluation Form infopeople.org/workshop/eval/
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.