iv DSView 3 Software Installer/User Guide
Sorting information in a window..............................................................................................24
Filtering information in a window............................................................................................24
Saving information in a window...............................................................................................25
Using the Customize link in windows.......................................................................................26
Displaying pages ......................................................................................................................27
Bookmarking a window ............................................................................................................27
Printing a window ....................................................................................................................28
Refreshing a window ................................................................................................................28
Using keyboard commands..............................................................................................................28
Chapter 4: Basic Operations......................................................................................... 31
DSView 3 Help.................................................................................................................................31
Configuring the DSView 3 help location..................................................................................31
Installing DSView 3 help on a local server..............................................................................32
Global System Properties ................................................................................................................32
Legal Notice.....................................................................................................................................32
Profiles.............................................................................................................................................33
Changing user options..............................................................................................................33
Changing the color scheme ......................................................................................................34
Changing your password..........................................................................................................34
Choosing the serial session application ...................................................................................35
Specifying a user certificate......................................................................................................35
Specifying an SSH key ..............................................................................................................36
Enabling user credential caching.............................................................................................37
Built-in User Groups .......................................................................................................................37
Preemption Levels............................................................................................................................38
Internet Explorer Considerations....................................................................................................39
Managing ActiveX
®
controls....................................................................................................40
Security zones ...........................................................................................................................41
Advanced Internet options........................................................................................................42
Certificates.......................................................................................................................................43
System certificate policy and trust store...................................................................................44
Integrated Windows Authentication.................................................................................................46
Firewalls..........................................................................................................................................46