iv DSView 3 Software Installer/User Guide
Sorting information in a window..............................................................................................24
Filtering information in a window............................................................................................24
Saving information in a window...............................................................................................25
Using the Customize link in windows....................................................................................... 26
Displaying pages ......................................................................................................................27
Bookmarking a window............................................................................................................27
Printing a window ....................................................................................................................28
Refreshing a window ................................................................................................................28
Using keyboard commands.............................................................................................................. 28
Chapter 4: Basic Operations................................................................ ......................... 31
DSView 3 Help.................................................................................................................................31
Configuring the DSView 3 help location..................................................................................31
Installing DSView 3 help on a local server..............................................................................32
Global System Properties ................................................................................................................32
Legal Notice.....................................................................................................................................32
Profiles.............................................................................................................................................33
Changing user options..............................................................................................................33
Changing the color scheme ......................................................................................................34
Changing your password..........................................................................................................34
Choosing the serial session application...................................................................................35
Specifying a user certificate......................................................................................................35
Specifying an SSH key ............................................................................................. .................36
Enabling user credential caching.............................................................................................37
Built-in User Groups .......................................................................................................................37
Preemption Levels............................................................................................................................38
Internet Explorer Considerations....................................................................................................39
Managing ActiveX® controls....................................................................................................40
Security zones...........................................................................................................................41
Advanced Internet options........................................................................................................42
Certificates.......................................................................................................................................43
System certificate policy and trust store...................................................................................44
Integrated Windows Authentication.................................................................................................46
Firewalls..........................................................................................................................................46