beautypg.com

Letting users check out computers, Using wireless services, Using global security settings – Apple Mac OS X Server (Administrator’s Guide) User Manual

Page 462

background image

462

Chapter 10

If the user is the local administrator, he or she has total access to the all folders and
applications on the computer, including the System Folder.

Letting Users Check Out Computers

You can allow users to check out and take home a portable computer (to continue working
on a project after school, for example). Macintosh Manager settings and security features
remain in effect on the computer even while it is checked out.

To check out a computer:

1

In Macintosh Manager, click Computers.

2

Click Check Out and select a computer list.

3

Select “These computers can be Checked Out” and then select one of the checkout options
in the steps that follow.

4

Select “All users are allowed to Check Out these computers” to allow this option.

5

Select “Allow only the following users to Check Out these computers” to restrict checkout to
a list of specific users. Then, select users in the Available Users list and click Add to make
them allowed users.

To remove users from the Allowed user list, select one or more users and click Remove.

6

Click Save.

Using Wireless Services

You can provide wireless network service to managed clients using AirPort, for example.
Make sure the Macintosh Manager Server is within range of your wireless service. If a user on
a portable computer goes out of range, he or she cannot log in to Macintosh Manager, but
you can allow the user to work offline. See “Allowing Users to Work Offline” on page 458 for
more information.

If you need more information about using Airport, consult Airport documentation or visit the
Web site:

www.apple.com/airport/

Using Global Security Settings

In Macintosh Manager, global security settings apply to your entire Macintosh Manager
network (all users, groups, and computers). These settings cover a variety of options that
affect reports, guest access, passwords, and how preferences are copied.

This manual is related to the following products: