File Name: 1597839851824-ThinKiosk_6.2_Profile_Configuration_Guide.pdf
File Size: 2.96 MB
File Type: Application/pdf
Last Modified: 2 years
Status: Available
Last checked: 2 hours ago!
This Document Has Been Certified by a Professional
100% customizable
Language: English
We recommend downloading this file onto your computer
Profile Configuration Guide Version 6.2 THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 1 ThinKiosk Profile Overview: ............................................................................................................................. 4Profile .................................................................................................................................................... 5 Profile Details .................................................................................................................................................. 5 ThinKiosk ......................................................................................................................................................... 6 ThinKiosk Mode: .............................................................................................................................................. 7 Device Login Options:....................................................................................................................................... 7 General............................................................................................................................................................ 7 Appearance ..................................................................................................................................................... 9 General Appearance: ....................................................................................................................................... 9 Language: ...................................................................................................................................................... 10 Splash Screen................................................................................................................................................. 10 Appearance – Ribbon Bar ............................................................................................................................... 11 Ribbon and Stratus Bar Appearance: .............................................................................................................. 11 KioskBar ........................................................................................................................................................ 12 General Settings: ........................................................................................................................................... 12 Window Control: ........................................................................................................................................... 13 Application Exclusion: .................................................................................................................................... 14 Display .......................................................................................................................................................... 14 Applications................................................................................................................................................... 17 Applications:.................................................................................................................................................. 17 Tile Appearance: ............................................................................................................................................ 18 Behaviour: ..................................................................................................................................................... 18 Applications – VDI Connectors........................................................................................................................ 19 Add StoreFront / RDS / Horizon / WVD Connector .......................................................................................... 20 Secondary Broker........................................................................................................................................... 21 Connector List ................................................................................................................................................ 22 Citrix Integration Options: .............................................................................................................................. 23 Microsoft RDS Integration Options ................................................................................................................. 24 VMware Horizon Integration Options ............................................................................................................. 24 Applications – Connector Login ...................................................................................................................... 25 Applications – Login Options .......................................................................................................................... 27 Legal Notice / MOTD ...................................................................................................................................... 29 Applications – Workspace Control .................................................................................................................. 30 End of Session Options: .................................................................................................................................. 31 Applications – LDAP Integration ..................................................................................................................... 32 Enable LDAP Password Change/Verification integration .................................................................................. 33 Applications – Local Applications .................................................................................................................... 34 Local Applications .......................................................................................................................................... 35 Citrix, Microsoft RDS or VMware Horizon connections .................................................................................... 36 Secure Browser .............................................................................................................................................. 37 Secure Browser: ............................................................................................................................................. 37 General Appearance: ..................................................................................................................................... 38 VDI Controls: ................................................................................................................................................. 38 General: ........................................................................................................................................................ 39 Browser Sites ................................................................................................................................................. 40 Adding / Editing a Site .................................................................................................................................... 40 URL Filtering .................................................................................................................................................. 41 Access Policies ............................................................................................................................................... 43 Network ........................................................................................................................................................ 43 Windows Update ........................................................................................................................................... 44 Computer Settings ......................................................................................................................................... 45 Local Device Restrictions ................................................................................................................................ 45 Ctrl+Alt+Del Screen: ....................................................................................................................................... 46 THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 2 Computer Settings – Startup Script ................................................................................................................. 47Startup Script................................................................................................................................................. 47Computer Settings – Login Script .................................................................................................................... 48Login Script .................................................................................................................................................... 48Computer Settings - Session Settings .............................................................................................................. 49Local Volume ................................................................................................................................................. 49Appearance: .................................................................................................................................................. 50Screen Saver: ................................................................................................................................................. 50Local Clean-up ............................................................................................................................................... 50Printers.......................................................................................................................................................... 50General.......................................................................................................................................................... 51Magic Filter:................................................................................................................................................... 51Magic Filter Delay Option: .............................................................................................................................. 52Computer Settings - Session Security .............................................................................................................. 53Power Options: .............................................................................................................................................. 53Computer Settings – Power Option................................................................................................................. 54Power Saving Options: ................................................................................................................................... 54Computer Settings - Additional Registry Values .............................................................................................. 56Additional Registry Values:............................................................................................................................. 57End Point Protection: ..................................................................................................................................... 58Windows Security Centre Detection ............................................................................................................... 58End Point Protection - Windows Security Centre Detection ............................................................................. 59End Point Protection - Windows Patch Management ...................................................................................... 60End Point Protection - Windows Firewall Control ............................................................................................ 65Windows Firewall Control .............................................................................................................................. 65End Point Security .......................................................................................................................................... 68End Point Security - Wi-Fi Adapters ................................................................................................................ 69End Point Security - Virtual Machine Detection ............................................................................................... 70End Point Security - USB Device Blocking ........................................................................................................ 70End Point Security - Application Execution Prevention .................................................................................... 71Application Execution Prevention ................................................................................................................... 71End Point Security - Application Execution Prevention (Offline) ....................................................................... 77End Point Security - Service Execution Prevention ........................................................................................... 79Service Execution Prevention ......................................................................................................................... 80Service Execution Prevention - User Notifications ........................................................................................... 81Administration............................................................................................................................................... 83Administrator Access: .................................................................................................................................... 83Administrative Access: ................................................................................................................................... 84Exclusions: ..................................................................................................................................................... 84Inclusions: ..................................................................................................................................................... 84Administration – Screen Capture .................................................................................................................... 85SMTP Settings: ............................................................................................................................................... 86Server Details: ............................................................................................................................................... 86SMTP User Credentials: .................................................................................................................................. 86Default Values: .............................................................................................................................................. 86Software Package Installation ........................................................................................................................ 87Client Paths ................................................................................................................................................... 88ThinScale Virtual Desktop Agent..................................................................................................................... 89 THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 3 ThinKiosk Profile Overview:The ThinKiosk profile provides all the configuration required for the ThinKiosk client
This profile is JSON based and very easy to modify with the new ThinKiosk Profile Editor
The profile editor can be accessed in separate ways depending on the profile delivery method you haveopted to
• ThinScale Management Server - From the ThinScale Management Console, right click your profile and select ‘Edit Profile’ • Local Profile - From the ThinKiosk ‘Admin’ menu select ‘Profile Editor’ • FTP – Using the Profile Editor the profile can be exported and then saved to the configured location on your FTP server
THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 4 ProfileProfile DetailsProfile NameShows the profile’s name
Profile RevisionShows the total amount of edit you made on the profile
Revision NotesShows the comments you added when editing a profile
Profile DescriptionBrief description of the profile
Note: Base on the comments, you can track changes made on that profile and revert to a previous revisionif desired
THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 5 ThinKiosk THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 6 ThinKiosk Mode:ThinKiosk ShellThinKiosk UI is configured as the Windows shell and Windows Explorer will NOT run
Windows ShellWindows Explorer is used as the Windows shell application
Device Login Options:Use Local ThinKiosk AccountThe device will auto-login using a local account ‘ThinKioskUser’ created by ThinKiosk. This user is a lowprivileged user account
Use Custom AccountThe device will auto-login using the credentials supplied in the Username / Password and Domain fields
This can be an alternate local account, or a domain account if the device is domain joined
Don’t Auto LoginDisables any configured auto-login settings
Do NothingThinKiosk will not apply or remove any auto-login configuration. If the device already has auto-loginconfiguration applied or this configuration is delivered by other means it will remain in place
Ignore Shift OverridePrevents the left shift key from overriding the auto-login configuration
GeneralAllow ThinKiosk to be closedIf enabled, users will be able to close the ThinKiosk UI
Note: This is not recommended if ThinKiosk is configured as the shell
Flip process namesThe ThinKiosk UI ships as two executables: ThinKiosk.exe and iexplore.exe, these executables are identical
By default, ThinKiosk uses the iexplore.exe as the shell process, unless the Flip process names option isenabled
Enable shell monitoringEnables ThinKiosk’s shell monitoring application which can be accessed via the CTRL + ALT + BREAK hotkeycombination
THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 7 Only apply policy settings when ThinKiosk UI is activeWhen enabled, ThinKiosk lock down policies will only apply when the ThinKiosk UI is active
Don’t silently restart if a hard error occursThis option has been retired and is no longer available
Enable ThinKiosk ‘Pull Down’ menuThis option enables the CTRL + ALT + DOWN ARROW hotkey combination to display the ThinKiosk ‘PullDown’ menu
ThinKiosk’s ‘Pull Down’ menu can be accessed even when connected to a full screen remote session allowyou access to options available on ThinKiosk’s ribbon bar
Exclude SYSTEM account from ThinKiosk policyIf enabled, action performed under the SYSTEM account, will be allowed to run. Useful when a write filteris installed on the machine
THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 8 AppearanceGeneral Appearance:Custom TitleAllows you to configure a customised title for the ThinKiosk UI. If no custom title is provided, ThinKiosk willuse the title ‘ThinKiosk’ by default
ThemeSets the theme ThinKiosk UI will use
Window PercentSet’s the size of the ThinKiosk UI
Show ThinKiosk Maximised on launchIf enabled, the ThinKiosk UI will launch maximised and will override the Window Percent setting
THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 9 Do not allow window resizingWhen enabled the ThinKiosk UI is fixed to the size it was launched at
Language:Use USA flag for EnglishSwitches the USA flag icon in language selection for the English language
Use Swiss flag for GermanSwitches the Swiss flag icon in language selection for the German language
Retain Users Last Language PreferenceThinKiosk remembers the user’s language selection and automatically switches to that languages the nexttime is starts
Enforce LanguageForces ThinKiosk to use the selected language
Splash ScreenHide Splash Screen:If enabled, will hide the splash screen window
Custom Splash Screen image:Enter a fully qualified file name for the custom splash screen image. Supported file types include PNG,BMP, JPEG, GIF, TIFF. Image size 394x171
THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 10 Appearance – Ribbon BarRibbon and Stratus Bar Appearance:The distinct options in this section allow you to hide (if selected) the individual settings you do not requireto be displayed on the ribbon bar, the status bar or the ThinKiosk Taskbar for the ThinKiosk client
Use ThinKiosk Display Resolution SettingsIf enabled, ThinKiosk will use its own display settings panel, not the built-in Windows Control Panel appletor Settings application, to allow uses to change monitor resolutions
Note: this option must be selected when ThinKiosk is the main shell or a timeout error will be shown
Revert to Default:If clicked will reset all the setting to default one
Select All:If clicked will select all the option at once
THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 11 KioskBarGeneral Settings:Show the ThinKiosk KioskbarEnables the ThinKiosk task bar. This is a replacement task bar for the one provided by Windows Explorer,showing your currently running applications
THINKIOSK 6.2 PROFILE CONFIGURATION GUIDE 12
The profile editor can be accessed in separate ways depending on the profile delivery method you have opted to. • ThinScale Management Server - From the ThinScale Management …
Configuration profile enforcement 1 Configuration profiles. A configuration profile is an XML file (ending in .mobileconfig) that consists of payloads that load settings and authorization information onto Apple devices. 2 Enrollment profiles. ... 3 Configuration profile settings 4 Profile signing and encryption. ... 5 Profile installation. ...
Users can install configuration profiles directly on their devices using Apple Configurator for Mac, or they can be downloaded using Safari, sent attached to a mail message, transferred using AirDrop or the Files app in iOS and iPadOS, or sent over the air using a mobile device management (MDM) solution.
If organizations need to configure a large number of devices—or to provide lots of custom email settings, network settings, or certificates to a large number of devices—configuration profiles are a safe and secure way to do it.
Configuration profiles are the primary way that an MDM solution delivers and manages policies and restrictions on managed devices.