47
Perimeter Church Perimeter Network Introduction 2005

Perimeter Church Perimeter Network Introduction 2005

Embed Size (px)

Citation preview

Page 1: Perimeter Church Perimeter Network Introduction 2005

Perimeter Church

Perimeter NetworkIntroduction

2005

Page 2: Perimeter Church Perimeter Network Introduction 2005

Turning On Your Computer

Shutting Down Your Computer

Page 3: Perimeter Church Perimeter Network Introduction 2005

Shutting Down

• Start, Shut Down – If you use a desktop or notebook computer

• Start, Log Off– If you use a Citrix terminal

Page 4: Perimeter Church Perimeter Network Introduction 2005

Computer User Policy

Protect Perimeter’s ComputerProtect Perimeter's DataDon’t Load Software YourselfDon’t Launch a Virus from an

Email Attachment

Page 5: Perimeter Church Perimeter Network Introduction 2005

Software on Your Computer

Microsoft OutlookMicrosoft WordMicrosoft ExcelMicrosoft PowerPointMicrosoft Internet ExplorerShelby? No unauthorized software

Page 6: Perimeter Church Perimeter Network Introduction 2005

Press Ctrl+Alt+Delete to Log on

Page 7: Perimeter Church Perimeter Network Introduction 2005

Security

Why is security needed at a Church?

Why is security needed at a Christian School?

Page 8: Perimeter Church Perimeter Network Introduction 2005

Passwords - Minimum Length of 8 characters

- Must contain 3 of these 4:upper case lower case numbersspecial characters

Page 9: Perimeter Church Perimeter Network Introduction 2005

Passwords

- Must change Password every

90 days. System will remind

you.

- There are lots of easy to remember but hard to guess passwords, such as

Isa40:31

Page 10: Perimeter Church Perimeter Network Introduction 2005

Screen Saver

• Use the icon that looks like a key to turn on your Screen Saver when you leave your desk

• If you don’t turn it on, it will come on automatically in a couple of minutes

Page 11: Perimeter Church Perimeter Network Introduction 2005

Citrix

Citrix users use programs installed on the Citrix Server, not their own computer.

– Eliminates the need for standard programs on your computer.

– Eliminates the need for non-standard programs on your computer.

– Eliminates the need for a notebook computer to connect from home.

– Allows your high speed home connection to be used for remote access to Perimeter.

Page 12: Perimeter Church Perimeter Network Introduction 2005

Logging in

Page 13: Perimeter Church Perimeter Network Introduction 2005

What You See First - the Intranet

Page 14: Perimeter Church Perimeter Network Introduction 2005

Intranet Announcements

•The Intranet Home Page shows Announcements.

•You can Post Announcements for yourself or your Department.

•Click on Post an Announcement.

•OR Send an email message to

Announcements - Intranet.

•Check your Announcement to make sure it is what you intended.

Page 15: Perimeter Church Perimeter Network Introduction 2005

Telephones and Voicemail

Use voicemail shortcuts.

What is the extension for Randy Schlicting?

Page 16: Perimeter Church Perimeter Network Introduction 2005

What is the Extension for Randy?

Look for an extension number on the Intranet.

OR

Press the Menu key under the display on your phone.Then press Dir for a Directory sorted by last name.Use the Next key to get additional names.

Page 17: Perimeter Church Perimeter Network Introduction 2005

Intranet Searches

• Search for Randy in Phone List

• Search for Randy in Profile Description

• Search for Randy in Search field at top right of Intranet

Page 18: Perimeter Church Perimeter Network Introduction 2005

Network Components

What are the pieces of a Network??

Page 19: Perimeter Church Perimeter Network Introduction 2005

Network Components

Computers / SoftwareNetwork cardWiring / Hub

ServerPeople (computer users)

Page 20: Perimeter Church Perimeter Network Introduction 2005

Where should I save my files?

Floppy diskHard diskOther

Page 21: Perimeter Church Perimeter Network Introduction 2005

Drives on most Home ComputersACD

Page 22: Perimeter Church Perimeter Network Introduction 2005

Advantages of the Server Drives

1. Nightly backup2. Ease of sharing files

with other users

Page 23: Perimeter Church Perimeter Network Introduction 2005

Gehazi Drives

H P R

Page 24: Perimeter Church Perimeter Network Introduction 2005

Server Drives

H HomeP PublishedR Restricted

Page 25: Perimeter Church Perimeter Network Introduction 2005

Where on the Server DrivesShould I Save My Files?

Page 26: Perimeter Church Perimeter Network Introduction 2005

Server Drives

H Home - this is the default location, only you can view

P Published – all Staff can view

R Restricted - only your Department can view

Page 27: Perimeter Church Perimeter Network Introduction 2005

Field Trip

Visit the Server RoomObserve Gehazi in action Observe Joseph in action

Page 28: Perimeter Church Perimeter Network Introduction 2005

Intranet - Only for Staff use

Home Page contains:AnnouncementsChurch Event CalendarNew Church MembersNew StaffStaff RecognitionBirthdaysImportant Documents

Page 29: Perimeter Church Perimeter Network Introduction 2005

Intranet - Navigation Bar

All Departments- Email and Labels

Phone ListShelby DataeFormsResources

Page 30: Perimeter Church Perimeter Network Introduction 2005

Internet

Perimeter uses blocking software.

The list of blocked sites is updated on a regular basis.

Page 31: Perimeter Church Perimeter Network Introduction 2005
Page 32: Perimeter Church Perimeter Network Introduction 2005

Printing

Network Printers are the normLocal Printers seldom used

High Maintenance – toner, paper

Page 33: Perimeter Church Perimeter Network Introduction 2005

Watch out for Viruses

• Don’t open Attachments that are programs.

• It’s OK to read an email message.

• See the handout for a complete list of files that are OK to open.

• Follow the 3 Steps for each attachment.

Page 34: Perimeter Church Perimeter Network Introduction 2005

Microsoft Outlook

EmailCalendarAddress BookTasks

Page 35: Perimeter Church Perimeter Network Introduction 2005

1 - Search for that topic in Peroogle

2 - Send an email to helpdesk

Getting HELP with Your Computer

Page 36: Perimeter Church Perimeter Network Introduction 2005

Send an email to Helpdesk

- Provide as many details as possible

- In the TO field, type helpdesk

Page 37: Perimeter Church Perimeter Network Introduction 2005

Look in the Outlook Public Foldernamed _Staff KnowledgeBase

In Outlook,•Click on Public Folders•Then click on Favorites

Page 38: Perimeter Church Perimeter Network Introduction 2005

Exchange Public Folders:

Staff Knowledge Base Prayer Requests Humor Announcements – Intranet Helpdesk

Page 39: Perimeter Church Perimeter Network Introduction 2005

Server Drives (H,P,R)vs

Exchange Public Folders

Places to Share Information

Page 40: Perimeter Church Perimeter Network Introduction 2005

If another user is using a fileopen as Read Only

Two people can’t edit the same file at the same time

Page 41: Perimeter Church Perimeter Network Introduction 2005

Accessing Shelby

Do you have permission?Username - What is it?Password - What is it?

Page 42: Perimeter Church Perimeter Network Introduction 2005

Where to find Training Information

P:\OPE - Operations Division \ITD - Information Technology \IT_Training

Page 43: Perimeter Church Perimeter Network Introduction 2005

Information about Computers and Telephones

• Intranet Important Documents – top right of the Home Page

• _Staff Knowledge Base – in Outlook Public Folders

• P:\OPE - Operations Division\ITD - Information Technology\IT_Training

• P:\OPE - Operations Division\ITD - Information Technology\Telephones and Voice Mail

Page 44: Perimeter Church Perimeter Network Introduction 2005

Other IT Training Classes

Classes AvailableClasses already scheduled

Page 45: Perimeter Church Perimeter Network Introduction 2005

QUESTIONS??

Page 46: Perimeter Church Perimeter Network Introduction 2005

Quiz

Feedback Form

Page 47: Perimeter Church Perimeter Network Introduction 2005