Navigation
  • SOLUTIONS
    • INFORMATION SECURITY SOLUTIONS
      • Vulnerability Management
      • Multifactor Authentication
      • Network Management Solutions
      • Security Information and Event Management
      • Remote Access Software
      • File Integrity Management
      • Systems Administration Tools
      • Data Loss Prevention
      • Data / Password Recovery
      • Asset Management Solutions
      • Identity and Access Management
      • Activity Monitoring and Surveillance
      • Forensic Solutions
    • SOFTWARE DEVELOPMENT SOLUTIONS
      • Integrated Development Environments
      • DEVELOPMENT COMPONENTS
        • UI Tools
        • Networking Components
        • Office Components
        • Barcode Components
        • Communication Components
      • Imaging Solutions
      • Software Localization
      • Release Automation & Management
      • eLearning Authoring Solutions
      • Charting Solutions
      • PDF Solutions
      • Reporting Solutions
      • Testing & QA
      • Text Retrieval / Enterprise Search
      • Database
  • SERVICES
    • Training Services
    • Implementation Services
    • Best Practices Consulting
    • After-Sales Services
  • WHAT'S NEW
    • Event
    • Latest Updates
    • Special Offers
  • ABOUT
    • About LOGON Software Asia
    • Our Partners
    • Career
    • Partnership with LOGON
      • Join us as our Publishers
      • Join us as our Resellers
      • Join us as our Procurement Managers
Software Asia Limited
  • Solutions
    • Information Security
          • Vulnerability Management
          • Identity and Access Management
          • Security Information and Event Management
          • File Integrity Management
          • Multifactor Authentication
          • Threat Intelligence
          • Network Management Solutions
          • Remote Access Software
          • IT Asset Management
          • IT Service Management
          • Systems Administration Tools
          • Activity Monitoring and Surveillance
          • Forensic Solutions
          • Data / Password Recovery
          • Data Loss Prevention
    • Software Development
          • Integrated Development Environments
          • Reporting Solutions
          • Testing & QA
          • Database
          • Development Components
            • UI Components
            • Networking Components
            • Communication Components
            • Office Components
            • Barcode Components
          • Text Retrieval / Enterprise Search
          • eLearning Authoring Solutions
          • PDF Solutions
          • Imaging Solutions
          • Software Localization
          • Release Automation & Management
          • Charting Solutions
  • Services
        • Training Services
          Certified Training courses delivered by our trained and experienced specialists that enable your team to learn the skills, tools, and processes needed to become productive, implement best practices and achieve high quality standards.
        • Implementation Services
          We know that your satisfaction is dependent on both the right software and a fast and successful implementation. We accelerate Time-To-Value by delivering high-quality implementations to meet customer priorities and processes.
        • After-Sales Services
          Our relationship with you does not end when we close a sale. It develops from it. Our experienced support team responds promptly to queries, deliver scheduled health checks so you gain maximum benefits from our solutions.
        • Best Practices Consulting
          Our customer success stories prove the successful application of our methods and tools. Our experts rely on tested methods and help organizations in Asia find the answers they need to optimize their cybersecurity posture.
  • What's New
        • Our Events
          Don’t miss out on our upcoming events
        • 26 August 2021
          Local Date: Aug 25 2021 |

          ArcusTeam | Powerful Tips to Prevent Threats from Connected Devices

          Online

          View Detail
          No event found!
        • Latest Updates
          Catch on the latest updates and news of our partners
        • The Truly Hidden Gems of IntelliJ IDEA | JetBrains
          The Truly Hidden Gems of IntelliJ IDEA | JetBrains
          Get IntelliJ-based IDEs, Fully Localized in 3 Languages! | JetBrains
          Get IntelliJ-based IDEs, Fully Localized in 3 Languages! | JetBrains
          Don’t Lose Your Work! Stay Safe With DataGrip | JetBrains
          Don’t Lose Your Work! Stay Safe With DataGrip | JetBrains
          Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper
          Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper
        • Special Offers
          View our special offers on our available solutions and upgrades
        • Upgrade to InstallShield Premier | Get 25% Off the Upgrade Price
          Upgrade to InstallShield Premier | Get 25% Off the Upgrade Price
          InstallShield Pro | Get 50% Off a Standalone Build License
          InstallShield Pro | Get 50% Off a Standalone Build License
  • About
        • About Us
        • Locations
        • [email protected] - We are hiring !
        • Our Partners
        • Partner with LOGON
          • Publishers - Join our network
          • Resellers - Expand your portfolio
          • Procurement Managers
  • SEARCH

Set your main menu in Appearance > Menus

Email Us Service Hotlines: +852 25128491 / +91 7022022744
Software Asia Limited
  • Solutions
    • Information Security
          • Vulnerability Management
          • Identity and Access Management
          • Security Information and Event Management
          • File Integrity Management
          • Multifactor Authentication
          • Threat Intelligence
          • Network Management Solutions
          • Remote Access Software
          • IT Asset Management
          • IT Service Management
          • Systems Administration Tools
          • Activity Monitoring and Surveillance
          • Forensic Solutions
          • Data / Password Recovery
          • Data Loss Prevention
    • Software Development
          • Integrated Development Environments
          • Reporting Solutions
          • Testing & QA
          • Database
          • Development Components
            • UI Components
            • Networking Components
            • Communication Components
            • Office Components
            • Barcode Components
          • Text Retrieval / Enterprise Search
          • eLearning Authoring Solutions
          • PDF Solutions
          • Imaging Solutions
          • Software Localization
          • Release Automation & Management
          • Charting Solutions
  • Services
        • Training Services
          Certified Training courses delivered by our trained and experienced specialists that enable your team to learn the skills, tools, and processes needed to become productive, implement best practices and achieve high quality standards.
        • Implementation Services
          We know that your satisfaction is dependent on both the right software and a fast and successful implementation. We accelerate Time-To-Value by delivering high-quality implementations to meet customer priorities and processes.
        • After-Sales Services
          Our relationship with you does not end when we close a sale. It develops from it. Our experienced support team responds promptly to queries, deliver scheduled health checks so you gain maximum benefits from our solutions.
        • Best Practices Consulting
          Our customer success stories prove the successful application of our methods and tools. Our experts rely on tested methods and help organizations in Asia find the answers they need to optimize their cybersecurity posture.
  • What's New
        • Our Events
          Don’t miss out on our upcoming events
        • 26 August 2021
          Local Date: Aug 25 2021 |

          ArcusTeam | Powerful Tips to Prevent Threats from Connected Devices

          Online

          View Detail
          No event found!
        • Latest Updates
          Catch on the latest updates and news of our partners
        • The Truly Hidden Gems of IntelliJ IDEA | JetBrains
          The Truly Hidden Gems of IntelliJ IDEA | JetBrains
          Get IntelliJ-based IDEs, Fully Localized in 3 Languages! | JetBrains
          Get IntelliJ-based IDEs, Fully Localized in 3 Languages! | JetBrains
          Don’t Lose Your Work! Stay Safe With DataGrip | JetBrains
          Don’t Lose Your Work! Stay Safe With DataGrip | JetBrains
          Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper
          Complete End-to-End Management and Security for Connected Devices | ArcusTeam & Lansweeper
        • Special Offers
          View our special offers on our available solutions and upgrades
        • Upgrade to InstallShield Premier | Get 25% Off the Upgrade Price
          Upgrade to InstallShield Premier | Get 25% Off the Upgrade Price
          InstallShield Pro | Get 50% Off a Standalone Build License
          InstallShield Pro | Get 50% Off a Standalone Build License
  • About
        • About Us
        • Locations
        • [email protected] - We are hiring !
        • Our Partners
        • Partner with LOGON
          • Publishers - Join our network
          • Resellers - Expand your portfolio
          • Procurement Managers
  • SEARCH
View large
faronic-news, news, offer

Sign up for the 30-day Free Trial for Deep Freeze | Enforcing Social Distancing in Labs with Deep Freeze

Posted on at by

Enforcing Social Distancing in Labs with Deep Freeze

Recently we came across an interesting situation where a Deep Freeze customer was trying to enforce social distancing in computer labs. Soon after, another customer wanted to allows students to remote into “reserved” lab computers so they can access licensed applications while working from home.

Mr. Albuquerque from the University of Florida’s Journalism department was tasked to enforce social distancing measures adopted by the university to keep the students safe during the COVID-19 pandemic. He found himself removing keyboards and mice from computers in several locations so students would not sit near each other. This task however meant that he would have to reattach all the keyboards and mice on hundreds of computers once the pandemic is over. Since his computers were already protected by Deep Freeze, he proceeded to use the Lock Keyboard and Mouse functionality from his console, however with a hard reboot, the keyboard and mice would go back to being enabled.

The solution that our customers were looking for was the ability to keep the computers Frozen (protected), while at the same time, enforcing the locking of the keyboard and mouse. Not only does this prevent users from physically using these computers but it also allows remote users to remote into these computers from home!

Since Deep Freeze does not (yet) have a Frozen Locked action from either the Enterprise Console or the Deep Freeze Cloud Console, we wrote a script for customers that will lock the keyboard and mouse once it restarts Frozen. There is a one-minute delay added just in case physical access is needed to Thaw the computer (you can always do so from the console). The locked computer would also display a message on the screen: “This computer is unavailable. The keyboard and mouse are disabled.”

Sign up for the 30-day Free Trial for Deep Freeze





    Deep Freeze Cloud Solution

    Use the new Custom Script functionality under the Applications page to create and deploy the below VB Script to the computers. Ensure the computer is Thawed prior to running the script.

    Deep Freeze Enterprise Solution

    Use the Remote Launch functionality in the Enterprise Console to launch the below script on Thawed computers.

    Run Script

    Run the below script on the computers you wish to Lock when Deep Freeze is in a Frozen state.

    1. Thaw the computer
    2. Script URL: http://faronics.org/proservices/SetupFrozenLocked.vbs
    3. To Enable, enter “/lock < dfc_password >” under Command Line
    4. Freeze the computer

    < dfc_password > is the Command-Line password configured under the Deep Freeze Passwords tab, don’t include

    To Disable, Thaw the computer and enter “/unlock” under Command Line

    Let us know if the above solution helps your situation. We’re always keen to hear your insights and help simplify your device management.

    For more information on Deep Freeze, click here:

    To Deep Freeze page
    was last modified: December 14th, 2020 by
    Share Post
    Previous
    Customers’ Choice in 2020 Gartner Peer Insights
    Next
    Silobreaker | Complimentary Access to Cyber Threat Intelligence

    About Author

    COMPANY

    Company Overview
    Career with LOGON
    Contact Us

    JOIN US TODAY

    Resellers
    Software Publishers
    Procurement Managers

    WE ARE AVAILABLE ON

    SAP Ariba   coupa

    gem

    SERVICES

    Training Services
    Implemetation Services
    After-sales Services
    Best Practices Consulting

    WHAT'S NEW

    Events
    Latest Updates
    Special Offers

    FOLLOW US ON

    GET IN TOUCH

    Phone:+852 25128491
    Email: [email protected]

    Legal   |   Privacy Policy

    Important Links

    • Call me
    • Legal
    • Privacy Policy

    Search engine

    Use this form to find things you need on this site
    Search
    Generic filters
    Newsletter
    Search

    Results for {phrase} ({results_count} of {results_count_total})

    Displaying {results_count} results of {results_count_total}

    Dont see what you were looking for ? Retry the search with a different phrase ? If unsuccessful, please click here

    Generic filters
    Exact matches only
    Search in title
    Search in content
    Search in excerpt
    Request for Training Quote
    • Please enter a number from 1 to 20.
    Request for Training Quote
    • Please enter a number from 1 to 20.
    Request for Training Quote
    • Please enter a number from 1 to 20.
    Request for Training Quote
    • Please enter a number from 1 to 20.
    Request for Training Quote
    • Please enter a number from 1 to 20.
    Request for Training Quote
    • Please enter a number from 1 to 20.
    Request for Training Quote
    • Please enter a number from 1 to 20.
    Request for Training Quote
    • Please enter a number from 1 to 20.
    Request for Training Quote
    • Please enter a number from 1 to 20.
    Contact Us Today
    Book a Demo with us


    Book a Demo with us


    Free Website Risk Detection Request

      Request a Demo !

        UserLock Video