09.11.2012 Views

WorkSpace On-Demand 2.0 Feature for Windows ... - IBM Redbooks

WorkSpace On-Demand 2.0 Feature for Windows ... - IBM Redbooks

WorkSpace On-Demand 2.0 Feature for Windows ... - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

2.5.1.2 System policy files<br />

In addition to the user profiles described above, an administrator can also<br />

make use of system policy file to control the user environment. A system<br />

policy file can be implemented on the domain controller so that all users that<br />

log on will have these restrictions or settings applied.<br />

Since the desktop logon and network access settings are stored, <strong>for</strong> the most<br />

part, in the computer’s registry database, system policy files <strong>for</strong> users<br />

overwrite settings in the current user area of the registry, and system policy<br />

<strong>for</strong> computers overwrites the current local machine area of the registry. This<br />

allows you to control user actions (user profiles) as well as computer actions<br />

<strong>for</strong> users and groups.<br />

The default system policy file contains a default user setting and a default<br />

computer setting. Use the System Policy Editor to manage the user desktop<br />

by changing the default user settings and manage the logon and network<br />

settings by changing the Default Computer settings.<br />

All systems loging on to a domain with system policy files implemented will<br />

use the same uni<strong>for</strong>m policy defined by the system policy file.<br />

When a user logs on to the OS/2 Warp Server Domain, the operating system<br />

looks in the NETLOGON SHARE to see if there is an NTConfig.pol file<br />

present <strong>for</strong> <strong>Windows</strong> NT or a Config.pol file present <strong>for</strong> <strong>Windows</strong> 9x. If the file<br />

is found, the contents of the file are copied to the local computer’s registry<br />

and is used to overwrite the current user and local machine portions of the<br />

registry.<br />

With the <strong>Feature</strong> <strong>for</strong> <strong>Windows</strong> Clients, there are three System Policy files: one<br />

<strong>for</strong> administrators, one <strong>for</strong> a sandbox machine, and one <strong>for</strong> all other <strong>IBM</strong><br />

<strong>WorkSpace</strong> <strong>On</strong>-<strong>Demand</strong> <strong>2.0</strong> <strong>Feature</strong> <strong>for</strong> <strong>Windows</strong> Clients. The location <strong>for</strong><br />

each of these is shown in Figure 13.<br />

<strong>Feature</strong> <strong>for</strong> <strong>Windows</strong> Clients architecture 47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!