Altiris Deployment Solution™ from Symantec User’s Guide
112
View log file
. View the Deployment Agent log file, if you have chosen the option to
create a log file. Passwords have no effect on this option.
Clear log file.
Clear the log file that has been created.
Shutdown for imaging
. Make an image of a computer without using a job. This
makes the required preparatory changes to the computer before an image is made.
Failure to do this breaks the reconfiguration phase when deploying the image using
a job. Passwords protect this option.
Change Name in Console
. Change how this computer is listed in the deployment
server console. This option does not change the NetBios name of the computer or
the name of the computer in the database, but only changes the name of the
computer displayed in the Computers window. Passwords protect this option.
Remove
. Uninstall Deployment Agent from the computer. Passwords protect this
option.
Exit
. Stops all Deployment Agent services from running but does not uninstall
Deployment Agent. Deployment Agent loads normally the next time you boot the
computer. Passwords protect this option.
User Properties
. Quickly go to the User Properties page to view or make changes.
Passwords protect this option.
Admin Properties.
Quickly go to the Admin Properties page to view or make
changes. Passwords protect this option.
Show Network Interfaces
. View what network cards are in your computer.
Passwords protect this option.
The following configuration properties (organized using tabs in the dialog) are included
in the
Production Agent Settings
dialog.
Server connection
Connect directly to this Deployment Sever.
Select this option so that the client
receiving the Deployment Agent connects to the Deployment Server you selected to
configure.
Address/Hostname
. Enter the IP address or NetBIOS name of the Deployment Server
computer.
Port.
Enter the port number communicating with the Deployment Server.
Enable key-based authentication to Deployment Server.
Select this option to
specify mandatory authentication for client computers to connect to the Deployment
Server. This helps keep rogue computers from connecting to unauthorized Deployment
Servers.
Discover Deployment Server using TCP/IP multicast.
Managed computers can use
the multicast address if they are on the same segment as the Deployment Server or if
multicast is enabled on the network routers. Ensure that the multicast address and port
match those set up on the Deployment Server. Try using defaults on both the client and
Deployment Server if you have problems while connecting.
Server connection
Log file
Access
Proxy
Security
Startup and shutdown
Содержание ALTIRIS DEPLOYMENT SOLUTION 6.9 SP4 - V1.0
Страница 1: ...Altiris Deployment Solution 6 9 SP4 from Symantec Admin Guide ...
Страница 40: ...Deployment Solution 40 What is Automation z Which Automation Operating System Should I Use page 44 ...
Страница 144: ...Altiris Deployment Solution from Symantec User s Guide 144 ...
Страница 371: ...Altiris Deployment Solution from Symantec User s Guide 371 ...