Eastern Kentucky University



Faculty Notebook Orientation (PC Edition)

Procedures and Liability Statements

The HP NC6320 is a mobile computing solution. There are obvious security concerns related specifically to mobile computing devices, as evidenced in recent news headlines. You must report any loss or theft of your notebook to Public Safety within 24 hours (622-2821) and IT by the next business day (622-3000). This will initiate an equipment recovery process and a remote data deletion protocol which permanently erases all data from the hard drive. Any reported theft will be treated as a criminal case.

Your data is more vulnerable than ever before, and we strongly encourage you to take an active role in protecting it:

Backups

Copy your data to a location other than on your notebook. You have at your disposal space on a university maintained server for your use. The U Drive is easily accessible under My Computer in the network drives section, and contains approximately one gigabyte of available space.

You could also back up your data to compact disc (~700 MB), DVD (~4.7 gigabytes), USB flash drives/digital cards/external hard drives (sizes vary according to device).

IT recommends use of the U: drive because all data on this server is backed up every day, and can easily restore your data in most cases if there is some sort of a failure or loss. The U drive provides secure and convenient storage, as data resides on a central computer server. This allows access from multiple locations across campus based on your Active Directory username and password.

Other network drives which may be available to you include:

N: drive (Departmental data)

Q: drive (Specialized administrative/Read only access)

P: drive: (special projects)

W: drive: (personal web page at )

Sensitive data on the notebook

You should be careful about the kind of data you place on your notebook. Do not store sensitive data such as social security information, credit card numbers, or passwords on the hard drive. If the unit were lost or stolen, this information could be quickly harvested before data deletion/recovery measures take effect. Most personal data dealing with EKU business can be entered or accessed via a web interface and therefore stored remotely. It doesn’t usually need to be stored on a local machine. If you have any questions or concerns about the need to store sensitive data on your new notebook or how to encrypt folders to prevent harvesting of data, please call the helpdesk at 2-3000.

Limit access to the computer

You should be aware of the people who have access to the notebook. When it stays in your office, but is not in use, we recommend you either log off or lock your workstation. To log off go to Start > Log Off >Log Off. To lock the workstation, hold down CTRL+ALT+DEL > Lock Workstation. This will help prevent unauthorized access to your email, documents, and any network drives you access.

IT recommends that you be the sole user of this computer. If you must allow someone else to use the machine, create a local guest account before granting access. For questions regarding local guest access, please call the helpdesk at 2-3000.

Specifications and Features

Explanation of newer features

Dual core processor: CPU with two separate processor chips built in to one. Enhances multitasking capabilities in some circumstances.

Bluetooth: Wireless peripheral connectivity, such as keyboards/headphones.

Biometric scanner: Takes an image of your fingerprint, analyzing it for uniqueness. Uses this image to authenticate your identity as a single sign on solution.

Multicard reader: Allows file transfer from your digital storage cards (generally found in digital cameras) onto your notebook.

DVD+/- RW +DL: An optical disc drive which reads

and records most standard modern media types, including the new DVD double layer technology.

S-Video TV Out Port: Can be used to connect the notebook directly to a television for display (not all televisions are capable).

1394a (Firewire): Commonly used on PC platform to connect digital video cameras. Is also used with other peripherals, such as hard drives.

|Major Features Overview |

|Processor |Intel Core Duo Processor T2400* (1.83-GHz, 667-MHz FSB, 2-MB L2 cache) |

|Operating System |Genuine Microsoft Windows XP Professional Edition |

|Memory |1024-MB 533-MHz DDR2 SDRAM (1 DIMM) |

|Hard Drive |80-GB 5400 rpm SATA |

|Optical Drive |DVD+/-RW SuperMulti with Double Layer (Fixed) |

|Display |15.0-inch SXGA+ wide viewing angle (1400 x 1050 resolution and 16 M colors) |

|Video |Intel Graphics Media Accelerator 950 with up to 128-MB shared system memory |

|Audio |ADI1981HD High Definition CODEC, Line out/headphone and microphone jacks |

|Communications |56K Fax/Modem, NetLink Gigabit Ethernet Controller (10/100/1000 NIC) |

| Integrated Wireless |Intel Pro/Wireless 802.11 a/b/g Integrated Bluetooth |

| Network Interface Card |Broadcom NetLink Gigabit Ethernet PCI Controller (Integrated 802.11 a/b/g) |

|TPM Embedded |Yes |

|Security Chip | |

|Pointing Device |Touchpad with scroll zone |

|Battery |6-cell high capacity Lithium-Ion (52Wh) |

|Power |External 65W adapter |

|One-Touch Productivity |One-Touch Productivity provides one-touch access to the following features: HP Info Center, Wireless On/Off, |

|Buttons |Presentation Mode, Volume Up, Volume Down, and Volume Mute |

|Expansion Card Slots |One Type I/II PC Card slot (Supports 32-bit CardBus and 16-bit PC Cards) and one Express Card slot (Express Card/34 or|

| |ExpressCard/54) |

|Media Slots |A 7-in-1 Media Reader Supports SD (Secure Digital), MMC (MultiMedia Card), Memory Stick, Memory Stick Pro, Memory |

| |Stick Duo*, Smart Media, xD-Picture card |

|Warranty |3 Year Worldwide Limited Warranty |

Figure 1. Major features of the HP Compaq NC6230

*NOTE: Memory Stick Duo Adapters are required and sold separately. Inserting a Memory Stick DuoCard directly into your notebook could damage the memory card and/or notebook.

[pic]

|1. |Volume Mute Button with LED |

|2. |Volume Down Button |

|3. |Volume Up Button |

|4. |Integrated Microphone |

|5. |HP Biometric Fingerprint Sensor |

|6. |7-in-1 Media Reader |

|7. |Stereo Speakers |

|8. |Touchpad with Scroll Zone |

|9. |Hard Drive Activity LED |

|10. |Battery Charging LED |

|11. |Power/Standby LED |

|12. |Wireless On/Off LED |

|13. |PC Card Eject Button |

|14. |ExpressCard Slot |

|15. |PC Card Slot (or optional Smart Card Reader) |

|16. |Microphone Jack |

|17. |Headphone Jack |

|18. |2 USB 2.0 Ports |

|19. |VGA/External Monitor Connector |

|20. |RJ-45 Port (NIC) |

|21. |Power Button with LED |

|22. |HP Info Center Button |

|23. |Wireless On/Off Button with LED |

|24. |Presentation Mode Button |

|25. |Dual-band Wireless LAN Antennas |

|26. |WWAN Antennas (with WWAN option) |

[pic]

1. 2 USB 2.0 Ports

2. IEEE 1394a Port

3. RJ-11 Port (Modem)

4. Optical Drive Button

5. Optical Drive

Serial Port

S-Video TV Out

Parallel Port

DC Power Connection

Kensington Lock Slot

Docking

The docking station consists of the notebook dock with monitor shelf, a 17-inch LCD HP monitor, USB keyboard and mouse. To dock the notebook, close and slide it under the monitor shelf (notebook should be centered, with the front even with the front of the shelf).

Press firmly on notebook in order to lock it firmly into the port. Do not press too hard or you may damage both the dock and the notebook. It should easily slide down into the locking mechanism with a quiet snap. If it does not, reposition the notebook until it fits correctly over the locking mechanism. After docking, press the silver power button on the top left edge of the monitor shelf. A blue light will appear beside the button when the power is on. To undock, push the button on the right side of the dock behind the notebook (It has a blue light around it.). It should release easily from the dock, allowing you to lift it out. It will make a loud click, and the back of the notebook will rise up a few centimeters. This model is especially forgiving with the docking/undocking process while you have applications running. Most applications should function well while you are docking/undocking the notebook. You should not have to shut down or exit your applications.

Logging in

To log in, press CTRL+ALT+ DEL. The log on dialog box will appear. Type in your E-key (email username and password) and choose FACULTYSTAFF, from the drop-down arrow. After the first successful log in (which you should have done during your first training session), you can use this same procedure to log in to the notebook when you are off campus. The notebook caches your username and password, and allows you to log in even though you are not on the campus network. Please be aware that you will not have access to your network drives when you log on away from campus. Windows will only remember your E-key password for a limited amount of time before you’ll have to bring the notebook back to campus and log in on the network.

Notebook Specific Applications

The applications listed below come pre-installed on your notebook. These applications enhance the usability of your computer, but are not necessities.

◆ Bluetooth Functionality

◆ Credential Manager

◆ HP Backup and Recovery

◆ HP ProtectTools

◆ HP Software Update

◆ Intervideo WinDVD

Bluetooth was designed to provide cable free connectivity between a computer and a peripheral device or another computer.

Credential Manager is a new single sign on solution that provides a secure way to store password information. It allows you to input usernames and passwords for various applications (applications, web sites, secure documents, etc.) once, and then have the system automatically supply that information for subsequent visits.

HP Backup and Recovery allows you to back up your personal data, as well as build emergency recovery disks in case of a critical software/data failure on the machine.

HP ProtectTools provides advanced security and data encryption functionality. There are subcomponents of HP ProtectTools which can render your account and various files on the machine permanently inaccessible. Please exercise caution if using HP ProtectTools. Be aware that misuse or malfunction of this application could result in loss of all data residing on the notebook. In extreme cases, because we do not have the means to bypass or repair HP ProtectTools, we may be forced to reinstall the entire operating system in order to restore functionality to the machine.

HP Software Update conveys the ability to upgrade the HP-specific software contained on the machine.

Intervideo WinDVD is a DVD playback package.

Look for IT training sessions on these and other topics to come.

Specialized buttons

Your notebook comes with some specialized buttons that provide additional functionality. These are located at the top of your keyboard.

The presentation settings button allows you to configure display preferences when connected to a projector or external screen, save these settings, and easily revert to those settings. After configuring to your liking, simply connect the projector up to the VGA port and press the presentations settings button.

The wireless on/off button is a helpful feature addition to notebook computers. It allows you to turn off all wireless capability of the notebook, which helps conserve battery power. Just turn wireless off when you are in an area where wireless is unavailable. When you turn wireless off, the notebook does not have to provide power to the wireless radio. When you return to an area where there is wireless, just press the button again and turn it back on. You may additionally have to ask Windows to connect to the wireless network after turning wireless back on.

Function Keys

Most notebooks come with specialized function keys. These keys are indicated on the keyboard by blue symbols, letters, or numbers in the upper right corner of a key. To access the functions of the keys, you must hold down the fn button and press the appropriate key.

Preserving Battery Life

IT has already fully charged these batteries to achieve maximum performance and battery life. Follow the guidelines below, and your battery should last many years at high efficiency.

◆ Keep the lithium-ion battery cool. Avoid storing in a hot place such as a car. For prolonged storage, keep the battery at a 40% charge level

◆ Avoid frequent full discharges because this puts additional strain on the battery. When the battery gets down to 10-20%, plug it in and let the battery recharge.

◆ Several partial discharges with frequent recharges are better for lithium-ion than one deep one.

Borrowed from

Setting up EKU secure wireless in Windows

1. Go to Start > Connect To > Show All Connections.

[pic]

2. Right click Wireless Network Connection > Properties.

[pic]

3. In This connection uses the following items, Uncheck the Aegis Protocol checkbox > Click the Wireless Networks tab.

[pic]

4. Make sure the Use Windows to configure my wireless network settings box is checked. Click the Add button in the middle of the page to add a wireless connection.

[pic]

5. Type eku_secure in the Network name (SSID) box, select WPA in the Network Authentication dropdown, and TKIP in the Data encryption dropdown. Click the Authentication tab.

[pic]

6. Select Protected EAP (PEAP) in the EAP type dropdown and uncheck all checkboxes. Click the Properties button.

[pic]

7. Make sure top two boxes are checked. Type ekuwifi.eku.edu in the Connect to these servers box, and check Equifax Secure Certificate Authority in the Trusted Root Certification Authorities scroll box. Make sure the Do not prompt user to authorize box is unchecked, Secured password (EAP-MSCHAP v2) is visible in the dropdown box under Select Authentication Method, and check Enable Fast Reconnect. Click the Configure button.

[pic]

8. Make sure the checkbox is unchecked.

[pic]

9. Click OK in each dialog box (4 OKs) to get back to the main screen.

10. You may need to log out and log back in.

11. A message balloon should pop up from the system tray notifying you to provide credentials for the eku_secure connection. If not, just click on the wireless icon in the system tray.

[pic]

12. Type in your email username and password and click OK. If the process fails, retype your username, password. Leave the Logon domain box blank.

[pic]

13. You’re connected!

Configuring Outlook

1. Open Outlook.

2. Click Next.

[pic]

3. Click the round box beside Microsoft Exchange Server and click Next.

[pic]

4. Type FACSTAFF in the Microsoft Exchange Server box.

[pic]

5. Type in your email username in the username box.

6. Click the Check Name button. If Outlook changes your username to lastname, firstname and underlines it, then you are good to go.

7. Click Next.

8. Click Finish.

[pic]

9. You are set up. You may need to wait while Outlook synchronizes with the Exchange server.

Outlook 2007 Setup

Setup for Outlook 2007 is even easier than before:

1) Start Microsoft Outlook by double clicking the appropriate icon either on the desktop or located under Start Menu > All Programs > Microsoft Office

[pic]

2) Allow Outlook to automatically detect your username and password. Click Next.

3) Outlook will detect additional systems settings. Click Finish when this is complete.

[pic]

4) Click Finish one last time at the congratulations dialog screen.

[pic]

-----------------------

Figure 19. Select MS Exchange Server as the type.

Figure 13. Wireless Networks Authentication

Figure 18. Starting up Outlook

Figure 16. Click the balloon and provide your credentials.

Figure 15. Make sure this box is unchecked.

Figure 17. Entering your credentials for wireless.

Figure 14. Protected EAP Properties

Figure 12. Wireless Networks properties

Figure 11. Wireless Networks tab

Figure 10. Disable Aegis protocol.

Figure 9. Wireless connection properties.

Figure 8. show all connections

Figure 7. function keys

Figure 6. Wireless on/off notification box

Figure 5. Windows login screen

Figure 4. Typical dock and laptop config.

Figure 3. Back and left sides of notebook

Figure 2. Front and Left side of notebook

Figure 20. Provide the Server name and your username

Figure 21. Setup is successful.

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download