Sie sind auf Seite 1von 17

Day 1 Tech Verification Aspire Lifestyles Americas

Home based model



Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY







Tech Verification


Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Table of Contents

Module Preparation ....................................................................................................... 3
Introduction ................................................................................................................... 4
Class Introductions ..................................................................................................... 5
Tech Verification ............................................................................................................ 6
Disable Wireless Capability ......................................................................................... 7
User Account Worksheet ............................................................................................. 7
How to log in to V!M .................................................................................................... 8
How to log in to VPN ................................................................................................... 9
Using Start.vipdesk.com ............................................................................................ 10
Setting up Soft Phones ............................................................................................... 11
Using Entrust ID ........................................................................................................ 13
How to log in to VMWare........................................................................................... 13
ePCI .......................................................................................................................... 15




Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Module Preparation
Take a moment to review the following information with the class prior to teaching this module.
Module Time 5 hours

Agenda Disable Wireless
Log in to V!M Instant Messenger
Log in to VPN
How to use Start.vipdesk.com
Set up Soft Phone
Log in to Entrust ID
Log in to VMWare
ePCI overview


Module Objectives In a classroom setting, learners will:
Learn to log in to software required to call into training:
Soft Phones
VMWare
ePCI
Learn to log in to basic programs required to
participate in training.
Be able to use provided software to call into a
conference number.

Supporting Materials PPT Files:
Day 1 PPT.ppt
DOC Files:
Day 1 Facilitator Guide

System:
V!M
VPN
VMWare
Soft Phone

Participant Materials Handouts:
User Account Worksheet
Instructions for Dialing into Training
System:
V!M
VPN
VMWare
Soft Phone

Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

How to use this guide

The sections in this guide are laid out in tables.
Slide Number

This box could be read to the learners. This is the information that the facilitator is
explaining while on the slide indicated to the left.
Facilitator Note The box indicated as a facilitator note contains notes for the facilitator. These are not
necessarily read to the class but more of hints, tips or tricks for the facilitator. This is
an important box as it may include an instruction or tip to help the facilitator
overcome a known obstacle.
Activity
Discussion

This is the engagement box. The type of engagement is indicated to the left via an
icon and descriptor. In this module, you will find two types of engagements.
Activity is the most interactive engagement as it has the learner doing an activity.
Discussion is an engagement whereby the facilitator poses a question or sets up a
scenario and allows open discussion.


Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Introduction
Time: 30 Minutes
Welcome to training. Before we get started setting up our systems, lets begin with an introduction.

Class Introductions
Slide 3
Lets start off by introducing ourselves. I will start.


Facilitator Note

Start by introducing yourself to the group.
Discussion

Call on someone from the class roll to do their introduction.
Introductions are important for camaraderie. It is more important in our setting
since we are in a virtual training environment. Allow approximately three minutes
per learner to build this foundation.

Ideas for introduction:
Previous employment
Current state of residence
Hobby
Pets

Stick to three items for the introduction.












Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Tech Verification
Time:

This training course will provide you with the information you need to successfully set up your computer
and software to enable you to work remotely. You will first receive training on general set up of your
system followed by training on how to log in to the software you will use daily to do your job.

We all have online accounts or phones that now take passwords. Your email for example has a
username and password. Your ATM card requires a PIN to access your account. At Aspire Lifestyles, you
will have accounts that have log in credentials as well. Some will use passwords and some might use
PINs. This section of training will cover how to log in to the basic programs you need access to in order
to be successful at your job.

Enabling Objectives
At the end of this section, you will be able to:
o Log in to V!M
o Log in to VPN
o Use Start.vipdesk.com
o Set up Soft Phone
o Log in to Entrust ID
o Log in to VMWare
o Use ePCI to place a call

Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Disable Wireless Capability
Slide 5
For security and stability reasons, wireless capability must be disabled on your
workstation. To disable wireless capabilities, please refer to Microsofts instructions
based on your Operating System.


Facilitator Note
Link to instructions to disable wireless capabilities.
http://windows.microsoft.com/en-us/windows/enable-disable-network-
adapter#1TC=windows-7
Activity

Have the class check their wireless capability and ensure it is disabled.




User Account Worksheet
Slide 5
Before we start logging in to our various programs, lets first start by locating our
User Account Worksheet. This worksheet is where you can record your passwords
so you dont forget them. Please keep this worksheet in a safe and secure place
where you can easily locate it. No one has access to your passwords and you would
have to go through our tech support team to get support on a forgotten password.
This can result in lost productivity.


Facilitator Note
The worksheet could be named AspireWorksheetl.pdf or User Account If anyone
cannot locate their sheet, send them a copy. It is important that passwords are
easily located by the user as we cannot reset their passwords.
Activity

Have the class get out their User Account Worksheet. We want the learners to use
the worksheet so they always have their passwords available.






Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

How to log in to V!M
Slide 7
V!M is an Instant messaging software. This software allows us to
communicate instantly with each other and in groups. We will learn how to
use V!M later. Right now, we just want to verify that you are able to get
logged in to V!M.

Start by locating the icon for V!M and double click it to open the program.
Enter your log in credentials when the log in screen appears.
Username and password is the same as the VPN log in you were provided
with.


Facilitator Note
At this time, we are just ensuring the users are set up in each of the
programs. Demonstrating a few features of V!M would not be a bad idea as
they may need to communicate with IT Support. However, a full discussion
on using V!M will be done later in training.
Activity


Have the class log in to V!M.
Demonstrate a few features of the program.
- Using the roster to locate a person
- Using the roster to locate IT Support
- Send a message to the trainer
















Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

How to log in to VPN
Slide 9
VPN is our secure gateway to access our networks. This is another level of
security and adds access to programs and servers you would not have access
to without it.

To access the VPN, double click on the yellow padlock icon on your desktop.
When the log in box appears, you will enter your log in credentials. Refer to
your User Account Worksheet for your account information. When you have
successfully entered your log in credentials and select OK, you will be
presented with a second authentication box.

The second authentication box will have you respond to a grid challenge.
Using your assigned grid, you will locate the appropriate responses to the
given challenge.

To read your grid card and find the answer to the challenge, you locate the
letter first. Once the letter is located from the top of the grid card, you will
go down to find the row that corresponds with the given number. This will
give you the response needed. You will be asked to do this for three total
locations on the grid card.

Explain that all letters in the grid are upper case. Everyone is assigned their
own, unique grid and it has a serial number on it. This serial numbered grid is
associated with their log in credentials.

The example in the PowerPoint is as follows:
A5 - 0
B4 - C
H5 covered by sample ribbon.

Once you have entered the grid challenge, select OK. This will complete the
authentication process and you will be logged in to the VPN. The VPN does
not alert you to a successful log in. You will know you are successfully logged
in by checking your system tray. You will see a locked yellow padlock in the
system tray by the clock on your computer.

Facilitator Note If anyone is having issues, please refer them to the next section of this
training, start.vipdesk.com.
Activity
Ensure the learners have their grid card.
Have the class log in to the VPN.
Assist as needed.
Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Using Start.vipdesk.com
Slide 11
If a user locks themselves out of any program at Aspire Lifestyles, they can
use start.vipdesk.com to check their account. Several of our systems have a
default where three failed log in attempts will lock out the user account.
Start.vipdesk.com will inform the user if any of their accounts is locked out.

For this section, we are only focusing on the account status section. This is
the section that will address issues with account lock outs. To use this site,
the user must use the Chrome browser or the Firefox browser.

After selecting the Account Status icon, the user will enter their username
and enter characters that appear for security reasons. After the site checks
the username, it will display if the user has any passwords that are expired or
logins that are locked. It will also generate an email that will be sent to the
user if there is an issue with any of their log in credentials.


Facilitator Note
If anyone has a password issue or lock out issue, now would be a good time
for them to try this. If they cannot resolve the issue through
start.vipdesk.com, refer them to the IT Support person assigned to the new
hire group.

Discussion

Open the floor for discussion on this tool. Ask how the learners feel about having
access to the status of their accounts. Remind them this is the first step if they are
unable to access an application or account.


Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Setting up Soft Phones
Facilitator Note This section of the power point has animation on the screen where a click on
the screen will display the next step. Follow the click to activate prompts.
Slide 13







Slide 14




click to activate




click to activate





click to activate





click to activate



SIP Soft Phones is the software that will give you access to using Voice over
IP (VOIP) through our system. This system allows you to receive and make
phone calls without using a phone line.

To access the soft phones software, first double click on the Icon for soft
phones. Once you have done this and the software has loaded, you will know
by looking in your system tray and finding the Headphone Icon.

To set up Soft Phone, you will access the menu by right clicking on the
headphone icon in the system tray. When the menu opens you will first
select Audio Tuning Wizard to set up the audio portion for your headset.

The audio tuning wizard will open and will walk you through the audio set
up. The first screen is the introduction screen that will instruct you to close
out any programs that show video or play sound. You will also need to make
sure your headset is plugged in before continuing.


The next screen will display the microphone and speaker options for your
audio set up. From the drop down, you will want to select your headset for
both the microphone and speaker option. Select Next to continue.


The next screen will have you test the audio portion of the set up you
selected. By clicking on Test Speakers, you will hear sound coming through
your headset. You can adjust your headset volume here and adjust the
speaker balance. It is recommended that you leave the balance in the
middle.


The next screen allows you to test the microphone for your headset. When
you speak into your microphone, the line in the blue bar will show
waves/movement acknowledging your microphone is working. You may also
adjust your microphone volume here.


The next screen is the conclusion screen for the Audio Tuning Wizard. Click
finish to move on.
Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Activity

Direct the class to log in to their SIP Soft Phone and complete the audio tuning
wizard portion.
Once the group has completed the Audio Tuning Wizard, the next section will walk
them through the steps to provision their headset.
Facilitator Note This section of the power point has animation on the screen where a click on
the screen will display the next step. Follow the click to activate prompts.
Slide 15

Slide 16


click to activate


click to activate





click to activate



click to activate

The next step in the process of setting up Soft Phones is to provision your soft
phones. This will give your station access to use telephony features.

To access the provision feature, right click the headphone icon in your system tray.
Select the Provision option from the menu.

The first screen displayed for provisioning is a welcome screen confirming you are
going to provision your station. Click next to begin the process.

The screen that pops up next lets the user launch the Audio Tuning Wizard. Sine we
have already completed this, we can skip it and click next. In the future, you can
launch the audio tuning wizard from here.

The next screen will let you configure the settings by providing the server for
provisioning. The SIP Soft Phone needs to connect with our server to access the
phone lines. To do this, select the radio dial labeled Configure Settings. The
provisioning server will be one of two servers.
The server names should be: vipcic1.exodusvipdesk.com or
vipcic2.exodusvipdesk.com. Try vipcic1.exodusvipdesk.com and click Next. If you
have the incorrect server name entered, you will receive an error message. If you
receive that message, enter the other server name.

The next step is to select the network adapters. You will select the second radio
button that states you use a VPN. The RTP Network Adapter and SIP Network
Adapter should be set to the connection that begins with 10.99. Select that option
from the drop down on both of those selections. Click next to move on.

The provisioning is now complete. Click finish to complete the process.

Activity
Direct the class to provision their soft phone.
Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Using Entrust ID
Slide 18






Slide 19

As you have seen, we use multiple layers in our log ins for security purposes.
Entrust ID is another one of those layers. It is sometimes referred to as a soft
token.

We use Entrust ID as a second layer to log in to VMWare. We will look at that
software next, but lets first see how to log in to Entrust ID.

To open the Entrust ID, double click the Entrust IdentityGuard Soft Token
icon. After the first time you set up the token, you will just need to enter
your PIN to access a security code.

When the security code displays, you will notice it is on a timer. Each code
has a 30 second lifetime. To copy the code to your clipboard, just click on the
copy icon to the right of the number.


Facilitator Note The users will now go and log into the Entrust ID but will not have anywhere
to enter the Security code. Let them know we will use this code in the next
section of logging in.
Activity

Have learners log in to Entrust ID. Let them know we will use it for the next section
when we log in to VMWare.


How to log in to VMWare
Slide 21








We use a virtual desktop to do our work that allows everyone to have access
to the same computer programs and keeps them secure and up to date. A
virtual desktop is held on a server and is not stored locally on your computer.
VMWare is software that gives you access to our created desktop that
ensures everyone is using the same, updated software.

To open VMWare, double click on the VMWare icon. When VMWare loads, it
will have you select what server to connect to. You will select the server that
the virtual desktop is stored on. Currently that server is
vdiconnect.vipdesk.com.

After selecting the server and selecting connect, you will be brought to a log
in screen. Here you will enter your log in credentials. Your log in credentials
Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY




Slide 22




Slide 23




Slide 24
for VMWare is the same as your VPN. Once you have entered the
credentials, click OK.

The next screen to show for VMWare is a second layer of security for our
desktop. This is where you will enter your Entrust ID security code. Here, you
will go back to Entrust ID and click on the copy icon to copy the code to your
clipboard. Paste the code into the Next Response in the VMWare box asking
for your Token response. Select click when you have done this.

When you have entered your security token response correctly and selected
ok, you will be shown the desktops available to you. You are now connected
to the server. You are not connected to the desktop until you select it and
click connect. Once we click on Connect, your desktop will load.

Here is what the desktop will look like. This is where we will launch our next
application that gives us access to telephony functions.


Facilitator Note We want them to log in to VMWare so we can launch ePCi from there. We
will be able to further discuss VMWare later in training.
Activity

Have the learners log in to VMWare. Remind them they will need to use the Entrust
ID soft token. The security code only lasts 30 seconds, so it is best to get it when you
reach that point of the log in.


Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

ePCI
Slide 26






Slide 27



Slide 28













ePC is our CRM (Customer Relationship Manager) software. We use ePC to
track our customer interactions (phone calls and emails). This is also where
we have telephony controls for accepting and placing calls.

In VMWare, click the ePC icon on the desktop. You will momentarily see a
splash screen with a graphic of an owl, which is the logo of Astute Solutions
(the maker of ePowerCenter). Since you are in VMWare, the system knows
your log in credentials. The screen you will see come up will be the
workbench.

There are two horizontal tool bars in ePC. The second one is the one we
need to access the telephony features. We call this second tool bar ePCI.
Lets take a look at the tool bar.

To access the functions of ePCI, you must be logged in. To log in, click on the
icon that has a key with a handset. A small pop up box will appear.

You will enter your log in credentials to log in. Please be sure to set your
initial status to Gone for the Day. This will ensure you do not receive a call.

Your logs in credentials are as follows:
Username: VPN
Password: 5 numbers
Station: VPN login followed by .sip
Station type: Workstation
Initial Status: Gone for the Day

By selecting the check box next to Save as default the information will save
as entered. This should keep this information for all subsequent logins. Click
Logon and you will be logged in to ePCI.

You can confirm you are logged in when your status changes from
connecting to gone for the day.


Facilitator Note
Activity

Have learners log into ePCI. Remind them to double click on the ePC icon from
within VMWare. When ePC has loaded, remind them clicking on the icon with a key
and headset.

Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY

Slide 29



Slide 30





Slide 31







Slide 32

Now that you have logged in to ePCI, lets look at how to use the tool bar. To place a
call, you will enter the phone number you wish to dial in the Phone: box. The next
thing you will need to do is provide an account code. An account code allows Aspire
Lifestyles to know which department to charge the call to. While in training, we will
use the account code Training. You will select the account code from the drop
down. To make the call, select the dial icon.

To disconnect a phone call, you will select the disconnect icon. When you are
finished with ePC, you will close ePC. You will always close ePC by selecting the exit
icon. It is important to always select the exit icon and not the X in the upper right
hand corner.
If you use the X to close out of ePC, you run the risk to be logged in to ePC and still
being able to receive phone calls but not have access to ePC.

Lets move on and review the icons in ePCI. These are just the icons you might need
when calling in to training. We will go into more detail later.
First Icon used to log in to telephony (ePCI). This is what brought up the pop up
box with the log in credentials.
Dial Icon Dial, to be used when dial information has been entered such as
telephone number and account code selected from the dropdown.
Disconnect Icon used to disconnect the active call.
Escape Icon use this icon to close out of ePC. Never use the X to close the
window.

Now lets go over the order in which we want to log out of our programs.

Start by logging out of ePCI since it is running from inside VMWare. Once you have
logged out of ePCI, you will log out of VMWare. Once VMWare is closed, you will log
off of VPN. Finally, you will log out of SIP Soft Phones.

Facilitator Note
This brings us to the end of this section of this module. Have the learners log out of
the programs above and prepare for the culminating activity by having them access
the handout Instructions for Dialing into Training.
Activity

Have the learners access the handout Instructions for Dialing into Training.
Following the instructions outlined in the document, have them dial into the
training conference number.


Day 1 Tech Verification Aspire Lifestyles Americas
Home based model

Aspire Lifestyles 2014 All Rights Reserved
CONFIDENTIAL AND PROPRIETARY For Training Use ONLY


Module Wrap Up














Now lets review the module objectives to ensure we have completed them:

(As you go through these, gain agreement from the class that they are able
to do the actions mentioned by asking, Are you now able to ______?)

Log in to software required to call into training:
Soft Phones
VMWare
ePCI
Log in to basic programs required to participate in training.
Be able to use provided software to call into a conference number.

That completes this module. Congratulations, you now have the ability to
dial into training using our software.


Facilitator Note The module is now complete. If there are learners who had issues and have
not completed the module, follow up with them to ensure they are able to
answer yes to the objectives outlined for the module.

Das könnte Ihnen auch gefallen