Accessing Your Matrox Iris Gt From Your Computer; Configuring Network Policy - Matrox Iris GT MIL Installation And Technical Reference

Hide thumbs Also See for Iris GT MIL:
Table of Contents

Advertisement

54 Chapter 5: Accessing Matrox Iris GT
Using Microsoft
Windows Explorer
Using Microsoft
Internet Explorer
Microsoft Vista

Accessing your Matrox Iris GT from your computer

With file server access, you can logically map shared folders on your Matrox
Iris GT as drives on your computer's file system. Mapping drives also allows easy
access of Matrox Iris GT files from applications running on your computer.
The easiest way to access frequently accessed Matrox Iris GT folders is to either
map a network drive to one of the folders of your Matrox Iris GT or create a
shortcut.
Another way to access Matrox Iris GT folders is to use Microsoft Internet Explorer.
You can browse your files and folders using the Browse in user files using the web
server link, available from the Matrox Iris portal website.
In addition, shared folders can be created and managed using File server setting
page, accessible from the Administration utility page of the Matrox Iris portal
website.

Configuring network policy

A specific network policy related to NTLM must be set to access Matrox Iris via
the file server protocol.
❖ Note that the Matrox Iris portal website and the Discovery utility use ActiveX
components. ActiveX must be enabled on your computer. In addition, the Matrox
Iris portal website must be listed in Microsoft Internet Explorer as a trusted site.
To manually change your network security and LAN manager authentication
levels in Microsoft Windows Vista, perform the following:
1. Open the Microsoft Windows Control Panel and click on the Classic view link
in the sidebar.
2. Select the Administrative Tools utility. The Programs and features dialog box
opens inside the Control Panel window.
3. Select the Local Security Policy option from the list of options provided. The
Local Security Policy dialog box opens.
4. Select Local Policies and then Security Options. The dialog box is then filled with
a list of policies and their security settings.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents