Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL

Roaming profiles > Using roaming clients - Pg. 617

1. 2. 3. 4. 5. 6. 7. Log on to the machine. Right- click a text document and select Encrypt this file. Copy this file to a shared area on your network. Go to a second machine. Copy the same encrypted file from your shared area to your local machine. Right click the file and select Decrypt this file. Look for a message that states that the file was successfully decrypted. Note: Depending on how your local policy is configured, you might have to type in your user password when performing this test. The password is the password you inserted in that user's account when you configured it in the security control panel. Now that you have configured and tested one user in your roaming profiles server configuration, it is easy to add more users. This is discussed in the next section. 6.5.3 Using roaming clients When your machines are configured for the roaming profiles system, you can use whatever machine you want in your network in combination with the Embedded Security Chip and the Client Security Software to make managing