An example of older software (legacy program) that you may be able to run on your network.
An Acceptable Use Policy (AUP) is a set of terms and conditions that a user must agree to after they log on but before they are given access to your network. You can require different groups of users to agree to one or more AUPs at different times. The user will only be allowed access to your network when they have agreed to each and every policy. When the user does not accept a policy, this fact is logged and they are denied access to your network.
Manages access to the Internet by allowing or preventing the use of Web sites, IP addresses and port numbers.
Microsoft programs designed to help users with specific needs make full use of the computer.
see assign packages.
You can assign a package or product from one or more computers or locations, so that it installs in the background.
Used to build a computer on the network.
Specifies the operating system settings and the disk structure to be applied to a computer, for example, the arrangement of partitions.
A computer on the network that a user can use to run programs and access resources at a server. A computer might be a desktop or laptop computer, or have roaming or wireless capabilities. To manage computers, use the Computers option of the RM Management Console.
Specific configuration settings you can apply to a computer that control the features and functions available to reflect the role and physical characteristics of the computer in the system.
Grouping of users and/or computers to which an Internet access level can be applied.
File containing information in Comma-Separated Value format (items in the file are separated by commas). A CSV file can be produced by many spreadsheets and database programs, and also by using a text editor or word processor. You can export data from and import data to your network using a CSV file. There must be at least one blank line at the end of the CSV file.
see unassign a package.
Can contain any combination of uppercase and lowercase letters, numbers and spaces.
The user's name that is displayed in their Start menu, or in a list of users in the right-hand pane of the RM Management Console.
A server on your network that is responsible for allowing host access to Windows domain resources. The domain controllers in your network are the centerpiece of your Active Directory directory service; they store user account information, authenticate users and enforce security policy for a Windows domain. The main server on your network is the Forest Root domain controller.
Assignment of a drive letter on a computer to access a specific shared area on a server. This ensures that all users who log on to that computer can use the same drive letter to access the same areas.
RM EasyLink is a Web site that is hosted on one of your RM network servers. This Web site uses Web Folders technology to enable users to access files on your network from a computer that is not managed by RM network management tools. For example, this computer could be a student’s computer (that has Internet access) at home or in another remote location.
Can be up to 256 characters (including the path to the folder). It can contain any uppercase or lowercase characters, except for the following:\" / \\ : | * ? < >. A folder name cannot start or end with a full stop.
See security group.
see home folder.
Folder on a server where users store their own files. By default, users see only their home folder as drive N: and their My Work folder. Users with the correct permission, such as teachers, can perform a variety of functions in the home folder, including creating subfolders and adding or deleting files.
Unique identifier for the user. For example, the student's Unique Pupil Number (UPN) or a Staff ID. IDs can be used for CSV file import and export. If you use Kaleidos, you must specify a unique ID for each of your users.
By default, a computer inherits the same properties (for example, drive mappings or packages) as assigned to the location in which it is situated. These properties can be changed for an individual computer.
Collection of documents, links to Web sites, and special folders such as collaborative areas, that relate to a particular area of study. Learning resources can be made available to groups of users.
see 16-bit program or MS-DOS program.
List linked to a security group.
You can group computers into locations reflecting the actual physical locations of the computers in your establishment, for example, buildings and rooms. Locations are arranged in a hierarchy, with each sublocation inheriting the properties of the locations above it.
When a user logs on at a computer with no fixed location (for example, a laptop), Location Chooser is displayed automatically and prompts the user to choose a location. This allows the user to access drive mappings and print to printers in their chosen location.
see system role.
A server that is not a domain controller, for example, a DAMMS or MIS server.
An example of older software (legacy program) that you may be able to run on your network.
Names can contain any combination of uppercase and lowercase letters, numbers, and spaces. We recommend that you establish a naming convention for items such as users, computers and locations to make it easier to identify and classify them.
Used as a security measure when you build a computer that is not connected to the network, or a computer that only has a wireless connection.
An option provides a specific function within the RM Management Console. For example, the Users option allows you to manage your users.
All the information (for example, installation files and setup information) needed to install a program on a computer.
A user logs on by typing a username and password that identifies them on the network. A password can contain any combination of uppercase and lowercase letters, numbers and spaces.
The location of a folder, either on a disk on the local computer or on another computer on your network. For example, C:\\WINDOWS\\system32 or \\\\SERVER1\\RMPublic
A user given a greater degree of access to a particular computer. A privileged user can change computer settings, add and remove hardware, software and printers, and access any software installed on the computer. The list of privileged users is a property of the computer and is managed from the Computers option of the RM Management Console.
A user profile comprises the user-specific settings of a user's Windows environment. This includes desktop settings, such as wallpaper and screen savers. Many programs use the user's profile to store configuration changes that the user has made to the program.
Collection of program shortcuts that can be made available to groups of users via the Start menu, organised so they are easy for users to find and start.
see reassign a package.
You can reassign a package or product to an individual computer, groups of computers, or a location, for example when the original assignment fails, or the program has been corrupted.
Collection of settings that apply to computers and users across your network. These settings give you control over your network, allowing you to override a computer's local or a user's personal policy settings.
Used to restore a computer in a shorter time than rebuilding the computer. A new restore image should be created after all packages have been assigned to the computer and any special configuration has been completed.
RM program designed, amongst other things, to help users start programs; display, copy, move, print or delete files; create or remove folders; and access specific Web pages.
Security groups allow you to grant or deny permission to access features of the system for multiple members at the same time.
A computer on the network that provides file storage, printing and/or other resources to another computer. The main server on your network is the Forest Root domain controller.
Makes resources like folders and printers available to users across the network.
A folder that provides a one-stop location for shortcuts to programs. To manage the Shortcut Bank, use the Program Sets option of the RM Management Console.
A stored search, for example, a list of users meeting specific criteria. When you access the smart-list, the search is regenerated to provide the latest data.
A collection of settings that allow or deny users the ability to run program files.
A work area that can contain a collection of files that can be made available to staff, usually in the same department. To manage staff subject areas, use the Shared Files option of the RM Management Console.
The Start page of the RM Management Console provides quick access to frequently-used functions. To re-display the Start page, click your establishment at the top of the left-hand pane.
Collection of permissions allocated to a user to control the management tasks they can and cannot perform for the network in the RM Management Console.
The tree view of the RM Management Console is displayed in the left-hand pane. Where available, clicking a [+] sign will display lower levels of the structure of your network. For example, clicking the [+] sign alongside the Users option displays your user lists and User Servers; clicking the [+] sign alongside User Servers displays your servers; and clicking the [+] sign alongside a user server displays your user folders.
You can unassign a package or product from one or more computers or locations so that it will be uninstalled the next time those computers are restarted.
Each user has an account on the network, for example, a student or a member of staff. To manage users, use the Users option of the RM Management Console.
A set of rules applied to a user to define the user's desktop and working environment to control what they can and cannot do on the network, and the features and functions that are available to them.
Associated with each user folder; it contains a common set of user properties that users added to the folder will inherit.
see user policy.
A user logs on by typing a username (and password) that identifies them on the network. Each username must be unique and can contain any combination of uppercase and lowercase letters, and numbers.
A technology that aids the installation process by holding all the information (for example, MSI files and other setup information) in a single application package.
see computer.
see computer policy.