Windows Desktop and Laptop

This topic describes how to configure Windows devices for online testing.

Testing Device

Installing Windows Media Pack for Windows 8.1 N and 8.1 KN

Some versions of Windows 8.1 and 10 are not shipped with media software installed. As a result, a user may need to install software to enable students to listen to and record audio as well as watch videos.

Microsoft provides additional information as well as a download package for devices with the following Windows 8.1 versions:

  • Windows 8.1 N
  • Windows 8.1 N/K with Bing
  • Windows 8.1 Enterprise N
  • Windows 8.1 Pro N
  • Windows 8.1 Pro N/K for EDU
  • Windows 10 N

A user is encouraged to download this software and ensure it works with sample websites and video and audio files prior to installing the Windows secure browser. Installation instructions are provided on Microsoft’s download page.

Configuring Touch Input

Blocking Device Touch Input Using the Group Policy Editor

Some tablets and devices have touch features that may need to be disabled before testing. When following these instructions, note that the settings for the device the user is configuring may be slightly different than those in the figure.

To disable the touch features on these devices to edit policy settings using the Group Policy Editor:

  1. Type gpedit.msc in the Search box on the Start menu and then select the link. The Local Group Policy Editor window, shown in figure 1, appears.

    Local Group Policy Editor window

    Figure 1. Local Group Policy Editor window

  2. In the left pane, navigate to Computer Configuration Administrative Templates Windows Components (indicated in figure 2).

    Local Group Policy Editor with the Windows Components folder icon indicated

    Figure 2. Windows Components panel

  3. In the Windows Components panel in the left pane, scroll down to the [Tablet PC] folder icon—indicated in figure 3—and double-click it.

    Local Group Policy Editor with the Tablet PC folder indicated

    Figure 3. Input Panel in the Local Group Policy Editor

  4. Double-click to select the [Input Panel] icon, which is also indicated in figure 3.
  5. In the Input Panel group, select a policy setting to view its description or double-click it to change its state; current policy settings are shown in the State column, indicated in figure 4.

    Turn off AutoComplete integration with Input Panel window with Enabled radio button and OK button indicated

    Figure 4. Disable text prediction screen

  6. To enable (turn off) an item, double-click on that item in the Setting column to open the Disable [policy setting] dialog box, which is shown in figure 4 for the setting “Turn off AutoComplete integration with Input Panel.” The following settings should be enabled:
    • Turn off AutoComplete integration with Input Panel
    • Prevent the [Input Panel] tab from appearing
    • For tablet pen input, do not display the [Input Panel] icon
    • For touch input, do not show the [Input Panel] icon
    • Disable text prediction
  7. To enable the setting, double-click the item, select the Enabled radio button, and then select [OK]. This dialog box also gives the user the option to disable the setting. Select [Apply] and then the [Next Setting] or [Previous Setting] button to move to the next or previous item displayed in the “Settings” list.
  8. Close the Local Group Policy Editor.

Configuring the Touch Keyboard on Microsoft Surface Pro Tablet

Some students using Surface Pro tablets and accessing the touch keyboard may have the touch keyboard disappear when they select outside a text box while testing or when they type an answer into a text box and then select [Next]. Then, the touch keyboard fails to reappear when they select inside the next text box. To avoid these issues, a student’s touch keyboard must be set to show up automatically.

When following these instructions, note that the settings for the device the user is configuring may be slightly different than those in the figure due to user interface changes by the manufacturer.

To set the touch keyboard to show up automatically:

  1. Access the device’s Settings (which can be done on devices using Windows 8.1 and above by using the keyboard shortcut [Windows] + [I]).
  2. Select [Devices] (indicated in figure 5).

    Settings interface with the Devices button indicated

    Figure 5. Surface Pro 3 Settings interface

  3. Select Typing from the left pane (shown in figure 6).

    Touch keyboard settings interface with the 'Automatically show the touch keyboard in windowed apps when there's no keyboard attached to your device' toggle indicated

    Figure 6. Touch keyboard settings interface

  4. Scroll down and toggle on Automatically show the touch keyboard in windowed apps when there’s no keyboard attached to your device, which is indicated in figure 6. (Depending on the version of Windows that is running, the text might alternatively read Show the touch keyboard or handwriting panel when not in tablet mode and there’s no keyboard attached.)

Disabling the Two-Finger Scrolling Feature in HP Stream Notebooks with Synaptics TouchPad

The trackpad software on the HP Stream notebooks can cause the secure browser to close and display an “environment not secure” error. This can occur when a student tries to use the advanced trackpad features such as scrolling gesture. The Synaptics TouchPad driver is the driver that allows full use of all trackpad features. To avoid this error and having the student exited from the secure browser, disable the TouchPad two-finger scrolling feature.

To disable the TouchPad feature in HP notebooks with Synaptics TouchPad:

  1. Select the Start menu [Start menu icon] and then type mouse in the Search programs and files field.
  2. Select Mouse from the list of options to open the Mouse Properties dialog box (figure 7).

    Mouse Properties dialog box with the Settings... button indicated

    Figure 7. Mouse Properties dialog box

  3. Select the [Device Settings] tab.
  4. From the Devices list, select Synaptics LuxPad V7.5 and then select [Settings...] (indicated in figure 7).
  5. Uncheck the Two-Finger Scrolling box, which is indicated in figure 8.

    Properties for Synaptics Touchpad V7.5 on PS/2 Port dialog box with the Two-Finger Scrolling checkbox indicated

    Figure 8. Properties for Synaptics TouchPad V7.5 on PS/2 Port dialog box

  6. Select [Close] and then [OK].
  7. In the Mouse Properties dialog box, select [Apply].

Configuring ZoomText to Recognize the Secure Browser

When displaying a test with a print-size accommodation above 4× magnification, the secure browser automatically enters streamlined mode. To retain the standard layout of a test but display it with a print magnification above 4×, consider allowing the student to use ZoomText, a magnification and screen-reading software that can be used with the secure browser.

To ensure ZoomText recognizes the secure browser:

  1. If ZoomText is running, close it.
  2. Go to the installation directory for ZoomText in Windows Explorer. For example, with ZoomText version 10.1, go to C:\Program Files (x86)\ZoomText 10.1\.
  3. In a text editor, open the file ZoomTextConfig.xml.
  4. Search for line containing the D2Dpatch property, similar to the following:

    <Property name="D2Dpatch " value ="*,~dwm,‌~firefox,~thunderbird"/>

  5. In the value attribute, add a value to represent the California secure browser:

    <Property name="D2Dpatch " value ="*,~dwm, ‌~firefox,~Casecurebrowser,~thunderbird"/>

  6. Save the file.
  7. Restart ZoomText.

Disabling Automatic Volume Reduction

A feature in Windows automatically lowers or mutes the volume of some apps if Windows detects audio recording.

To disable automatic volume reduction in Windows:

  1. Select [Start ].
  2. Access “Sound.” One way to do this is to navigate to Control PanelSound. This interface is shown in figure 9.

    Control Panel 'Sound' interface with the 'Do nothing' radio button indicated

    Figure 9. Control Panel Sound interface

  3. Select the [Communications] tab.
  4. By default, the selected option is Reduce the volume of other sounds by 80%. Change this to Do nothing (indicated in figure 9).
  5. Select [OK].

Disabling Fast User Switching in Windows

Microsoft Windows versions 8.1 and 10 have a “Fast User Switching” feature that allows more than one user to be logged on at the same time. This is a security risk because students can potentially start a new Windows session during the test and use that session to search the internet for answers, pausing the test in the meantime. The following subtopics describe how to disable Fast User Switching for Windows, if it is enabled.

To disable Fast User Switching in Windows 8.1 and 10:

  1. In the Search charm, type gpedit.msc (figure 10 presents the Search charm for Windows 8.1; figure 11 presents the Search box for Windows 10) and then press [Enter] or select the [Search] icon.

    Windows 8.1 Search charm with gpedit.msc entered

    Figure 10. Windows 8.1 Search charm

    Windows 10 Search box with gpedit entered

    Figure 11. Windows 10 Search box

  2. Double-click the [gpedit] icon in the Apps pane. The Local Group Policy Editor screen opens.
  3. Navigate to Computer ConfigurationAdministrative TemplatesSystemLogon.
  4. In the Setting pane, double-click Hide entry points for Fast User Switching (indicated in figure 12).

    Windows Local Group Policy Editor options with the Logon folder icon and the Hide entry points for Fast User Switching item indicated

    Figure 12. Windows Local Group Policy Editor options

  5. Select the Enabled radio button, and then select [OK ]. Both are indicated in figure 13.

    Hide entry points for Fast User Switching with the Enabled radio button and the OK button indicated

    Figure 13. Windows Local Group Policy Editor selection

  6. Close the Local Group Policy Editor.
  7. In the Search charm, type run.
  8. Select the [Run] icon in the Apps pane. The Run dialog box opens.
  9. Enter the command gpupdate /force into the Run dialog box and then select [OK ] (figure 14). (Note the space before the forward slash.)

    The Windows Run dialog box with gpudate /force entered in the Open field and the OK button indicated

    Figure 14. Windows Run dialog box

  10. The Command window opens (figure 15). The message Computer Policy update has completed successfully is the notification that Windows has successfully disabled Fast User Switching.

    The Success notification in the Windows Command window

    Figure 15. Notification in the Windows Command window

Disabling Screen Edge Swipe on Windows 10 Tablets and Laptops in Tablet Mode

Swiping inward from the edge of the display on Windows 10 tablets and laptops in tablet mode opens the Windows notification center. If this swiping gesture is not disabled and students taking a test in the secure browser on a Windows 10 tablet or laptop in tablet mode swipe from the edge of the screen during a test, the test will be paused when the notification center opens, displaying any notifications that might appear there. The following instructions describe how to disable Screen Edge Swipe using the Local Group Policy Editor.

An individual with administrator privileges might also use the Registry Editor to roll this change out to multiple devices at once.

To disable Screen Edge Swipe using the Local Group Policy Editor:

  1. In the Search charm, type gpedit.msc (figure 16 presents the Search charm for Windows 8.1; figure 17 presents the Search box for Windows 10) and then press [Enter] or select the [Search] icon.

    The Windows 8.1 Search charm with gpedit.msc entered

    Figure 16. Windows 8.1 Search charm

    Windows 10 Search box with gpedit entered

    Figure 17. Windows 10 Search box

  2. Double-click the [gpedit] icon in the Apps pane. The Local Group Policy Editor screen opens.
  3. Navigate to Computer ConfigurationAdministrative TemplatesWindows ComponentsEdge UI.
  4. In the Setting pane, double-click Allow edge swipe (indicated in figure 18).

    The Windows Local Group Policy Editor options with the Edge UI folder icon selected and the Allow edge swipe item indicated

    Figure 18. Windows Local Group Policy Editor options

  5. Select the Disabled radio button, and then select [OK]. Both are indicated in figure 19.

    Allow edge swipe with the Disabled radio button and the OK button selected

    Figure 19. Windows Local Group Policy Editor selection

  6. Close the Local Group Policy Editor.
  7. Restart the device for the change to take effect.

Disabling Task Manager

The Windows Task Manager allows users to switch to applications running in the background. This is a security risk because students can switch to other applications while running the secure browser. Disable the Task Manager in Windows 8.1 and 10 before the start of testing to mitigate this risk.

To disable the Task Manager using the Local Group Policy Editor:

  1. In the Search charm, type gpedit.msc (figure 20 presents the Search charm for Windows 8.1; figure 21 presents the Search box for Windows 10) and then press the [Enter] key or select the [Search] icon.

    The Windows 8.1 Search charm with gpedit.msc entered

    Figure 20. Windows 8.1 Search charm

    Windows 10 Search box with gpedit entered

    Figure 21. Windows 10 Search box

  2. Navigate to User ConfigurationAdministrative TemplatesSystemCtrl+Alt+Del Options and then double-click Ctrl+Alt+Del Options (figure 22).

    Local Policy Editor screen options with the Ctrl+Alt+Del Options setting indicated

    Figure 22. Local Group Policy Editor screen options

  3. In the Setting pane, double-click Remove Task Manager (indicated in figure 23).

    The Windows Local Group Policy Editor options with the the Remove Task Manager item indicated

    Figure 23. Ctrl+Alt+Del Options settings

  4. Select the Enabled radio button in the Remove Task Manager screen shown in figure 24, and then select [OK].

    Remove Task Manager dialog box with the Enabled radio button and the OK button indicated

    Figure 24. Remove Task Manager screen

  5. Close the Local Group Policy Editor.

Disabling App Prelaunching in Windows 10

Application prelaunch is a feature in Windows 10 that allows Universal Windows Platform apps, such as the Photos app or Edge web browser, to prelaunch and run in the background even if a user did not open the app directly. If these forbidden apps are running in the background, a student can be unable to start the Take a Test app or will be exited from the TDS if an app launches while the Take a Test app is running.

App prelaunching can be disabled by using a PowerShell command and editing the registry. For instructions on how to disable app prelaunching, refer to the Microsoft Windows support topic, K–12 assessment unexpectedly reports apps running in the background in Windows 10.

Secure Browser

This subtopic contains installation instructions for Windows systems under a variety of deployment scenarios. on devices running on versions 8.1, 10, and 10 in S mode. (The secure browser does not run on other versions of Windows.)

The instructions in this subtopic assume devices are running a 64-bit version of Windows and that the secure browser will be installed to C:\Program Files (x86)\. If a 32-bit version of Windows is running, adjust the installation path to C:\Program Files\.

Installation

Installing on an Individual Device

In this scenario, a user with administrator rights installs the secure browser using standard Windows. (If a user does not have administrator rights, refer to the subtopic Installing Without Administrator Rights.)

  1. If a user installed a previous version of the secure browser in a location other than a default location—C:\Program Files (x86)\CASecureBrowser\ (64 bit) or C:\Program Files)\‌‌CASecureBrowser\ (32 bit)—manually uninstall the secure browser and its associated desktop shortcut. (If it was installed in the default location, the installation package automatically removes it.) Refer to the instructions in the Windows subtopic Uninstallation.
  2. Navigate to the CAASPP and ELPAC Secure Browsers website by visiting either the CAASPP Technology Resources web page or the ELPAC Technology Resources web page and then selecting the [Secure Browsers] link at either location.
  3. Select the [Windows] tab and then select the [Download Secure Browser 14] button (figure 25).

    Download Secure Browser 14 for Windows button

    Figure 25. [Download Secure Browser 14] button

  4. Locate the file that downloaded.
  5. Take one of the following steps; this step may vary depending on the web browser being used:
    1. If presented with a choice to run or save the file, select [Run]. This opens the Secure Browser Setup wizard.
    2. If presented only with the option to save, save the file to a convenient location. After saving the file, double-click the installation file CASecureBrowser14.0 64bit.msi to open the setup wizard.
    3. If presented with the option to open a downloaded file, locate the file and then double-click it.
  6. Follow the instructions in the setup wizard. When prompted for setup type, select [Install] and follow the prompts.
  7. Select [Finish] to exit the setup wizard. The following items are installed:
    • The secure browser in the default location C:\Program Files\‌CASecureBrowser\
    • A shortcut CASecureBrowser to the desktop (figure 26)

      CASecureBrowser shortcut icon

      Figure 26. [CASecureBrowser] shortcut icon for Windows

  8. Ensure all background jobs, such as virus scans or software updates, are scheduled outside of test windows. For example, if testing takes place between 8 a.m. and 3 p.m., schedule background jobs outside of these hours.
  9. Optional: Apply proxy settings by taking the following steps:
    1. Right-click the [CASecureBrowser] shortcut icon on the desktop and select Properties.
    2. Under the [Shortcut] tab, in the Target field, modify the command to specify the proxy (such as, "C:\Program Files (x86)\CASecureBrowser\CASecureBrowser.exe" ‑proxy 1:http:fake-url.com:8080 aHR0cHM6Ly9jYS50ZHMuY2FtYml1bWFzdC5jb20vc3R1ZGVudA==). Refer to table 2 in the Proxy Settings for Desktop Secure Browsers subtopic for available forms of this command. Take the following steps first if the Target field is disabled:
      1. Close the Properties dialog box and delete the desktop shortcut for the secure browser.
      2. /Program Files (x86) subdirectory: Create a new desktop shortcut in Windows Explorer by navigating to the relevant 32-bit subdirectory, C:\Program Files (x86)\. Right-click the file CASecureBrowser.exe and then select Send ToDesktop (create shortcut).
      3. /Program Files (x86) subdirectory: Create a new desktop shortcut in Windows Explorer by navigating to C:\Program Files\CASecureBrowser\, right-clicking the file CASecureBrowser.exe, and then selecting Send ToDesktop (create shortcut).
      4. Right-click the desktop shortcut for the secure browser and select Properties.
      5. Select the [Shortcut] tab.
    3. Select [OK] to close the Properties dialog box.
  10. For more information about proxy settings, refer to the Proxy Settings for Desktop Secure Browsers subtopic.
  11. Run the secure browser by double-clicking the [CASecureBrowser] shortcut icon on the desktop (figure 26). The secure browser opens
  12. To exit the secure browser, select [CLOSE SECURE BROWSER] in the upper-right corner of the screen.

Installing via the Command Line

In this scenario, a user with administrator rights installs the secure browser from the command line. If the user does not have administrator rights, refer to the subtopic Installing Without Administrator Rights.

  1. If a user installed a previous version of the secure browser in a location other than C:\Program Files (x86)\ (64 bit) or C:\Program Files\ (32 bit), manually uninstall the secure browser. (If it was installed in C:\Program Files (x86)\, the installation package automatically removes it.) Refer to the instructions in the Windows subtopic Uninstallation.
  2. Navigate to the CAASPP and ELPAC Secure Browsers website by visiting either the CAASPP Technology Resources web page or the ELPAC Technology Resources web page and then selecting the [Secure Browsers] link at either location.
  3. Select the [Windows] tab and then select the [Download Secure Browser 14] button (figure 27).

    Download Secure Browser 14 for Windows button

    Figure 27. [Download Secure Browser 14] button

  4. Locate the file that downloaded.
  5. Take one of the following steps; this step may vary depending on the web browser being used:
    1. If presented with a choice to run or save the file, select [Save] and save the file to a convenient location.
    2. If presented only with the option to save, save the file to a convenient location.
  6. Note the full path and file name of the downloaded file, such as c:\temp\CASecureBrowser14.0‑64bit.msi.
  7. Open a command prompt as the administrator.
    1. Type command into the Search field on the task bar.
    2. Right-click the [Command Prompt] icon in the “Best match” section of the Search pop-up list.
    3. Select Run as administrator from the shortcut menu.
    4. As necessary, type the administrator password for the device. The command prompt opens.
  8. Run the command msiexec /I <Source> [/quiet] [INSTALLDIR=<Target>], which uses the components described in table 1.

    Table 1. Components for Command Line Installation

    Command Component Description
    <Source> Path to the installation file, such as C:\temp\CASecureBrowser‑Win.msi
    <Target> Path to the location to install the secure browser (If absent, it installs to the directory described in step 10 ; the installation program creates the directory if it does not exist.)
    /I Perform an install
    [/quiet] Quiet mode, no interaction

    For example, the command

    msiexec /I c:\temp\CASecureBrowser‑Win.msi /quiet INSTALLDIR=C:\AssessmentTesting\BrowserInstallDirectory

    installs the secure browser from the installation package at C:\temp\‌CASecureBrowser‑Win.msi into the directory C:\AssessmentTesting\‌BrowserInstallDirectory using quiet mode.

  9. Follow the instructions in the setup wizard. When prompted for setup type, select [Install].
  10. Select [Finish] to exit the setup wizard. The following items are installed:
    • The secure browser to the default location C:\Program Files\‌CASecureBrowser\
    • A shortcut CASecureBrowser to the desktop (figure 28)

      CASecureBrowser shortcut icon

      Figure 28. [CASecureBrowser] shortcut icon for Windows

  11. Ensure all background jobs, such as virus scans or software updates, are scheduled outside of testing windows. For example, if testing takes place between 8 a.m. and 3 p.m., schedule background jobs outside of these hours.
  12. Run the secure browser by double-clicking the [CASecureBrowser] shortcut icon on the desktop (figure 28). The secure browser opens, displaying the student logon screen. The secure browser fills the entire screen and hides the task bar.
  13. To exit the secure browser, select [CLOSE SECURE BROWSER] in the upper-right corner of the screen.

Copying the Installation Directory to Testing Computers

In this scenario, a network administrator installs the secure browser on one machine and copies the entire installation directory to testing computers.

  1. On the machine from where the user will copy the installation directory, install the secure browser following the directions in the subtopic Installing on an Individual Device. Note the path of the installation directory, such as C:\Program Files\CASecureBrowser.
  2. Identify the directory on the local testing computers to which the user will copy the secure browser file (it should be the same directory on all computers). For example, a user may want to copy the directory to C:\AssessmentTesting\. Ensure selection of a directory in which the students can run executables.
  3. Take the following steps on each local testing computer:
    1. Ensure all background jobs, such as virus scans or software updates, are scheduled outside of testing windows. For example, if testing takes place between 8 a.m. and 3 p.m., schedule background jobs outside of these hours.
    2. Copy the installation directory used in step 1 from the remote machine to the directory selected in step 2. For example, if the target directory is C:\AssessmentTesting\, create a new folder C:\AssessmentTesting\CASecureBrowser.
    3. Copy the shortcut C:\AssessmentTesting\CASecureBrowser\‌CASecureBrowser.exe – Shortcut.lnk to the desktop.
    4. Run the secure browser by double-clicking the CASecureBrowser shortcut on the desktop. The secure browser opens, displaying the student logon screen. The secure browser fills the entire screen and hides the task bar.
    5. To exit the secure browser, select [CLOSE SECURE BROWSER] in the upper-right corner of the screen.

Installing for Use with an NComputing Terminal

In this scenario, a network administrator installs the secure browser on a Windows server accessed through an NComputing terminal. Prior to testing day, the technology coordinator connects consoles to the NComputing terminal, logs on from each console to the Windows server, and starts the secure browser so it is ready for the students.

This procedure assumes that there is already a working NComputing topology with consoles able to reach the Windows server.

For a listing of supported terminals and servers for this scenario, refer to the System Requirements topic.

  1. Log on to the machine running the Windows server.
  2. Install the secure browser following the directions in the subtopic Installing the Secure Browser on an Individual Computer.
  3. Open Notepad and type the following command (no line breaks):

    "C:\Program Files (x86)\CASecureBrowser\‌CASecureBrowser.exe" ‑CreateProfile %SESSIONNAME%

  4. If a different installation path on the Windows server was used, use that in the previous command.
  5. Save the file to the desktop as logon.bat.
  6. Create a group policy object that runs the file logon.bat each time a user logs on. For details, refer to Appendix C: Creating Group Policy Objects to Assign Logon Scripts in Microsoft Windows.
  7. On each NComputing console, create a new [CASecureBrowser] desktop shortcut icon by taking the following steps. This subprocess is necessary because the default shortcut created by the installation program has an incorrect target.
    1. Connect to the NComputing terminal.
    2. Log on to the Windows server with administrator privileges.
    3. Delete the secure browser’s shortcut currently appearing on the desktop.
    4. Navigate to the secure browser’s installation directory, usually C:\Program Files (x86)\‌CASecureBrowser\.
    5. Right-click the file CASecureBrowser.exe and select Send ToDesktop (create shortcut).
    6. On the desktop, right-click the new shortcut and select Properties. The Shortcut Properties dialog box appears.
    7. Under the [Shortcut] tab, in the Target field, type the following command:

      "C:\Program Files(x86)\CASecureBrowser\‌CASecureBrowser.exe" ‑P%SESSIONNAME%

      If a different installation path on the Windows server was used, use that in the previous command.

    8. Select [OK] to close the Properties dialog box.
  8. Verify the installation by double-clicking the shortcut to start the secure browser (figure 29).

    CASecureBrowser shortcut icon

    Figure 29. [CASecureBrowser] shortcut icon for Windows

Installing on a Terminal Server or Windows Server

In this scenario, a network administrator installs the secure browser on a server—either a terminal server or a Windows server. Testing machines then connect to the server’s desktop and run the secure browser remotely. This scenario is supported on Windows server 2012 R2 and 2016 R2.

LEA CAASPP or ELPAC coordinators should contact CalTAC for instructions and technical support before the secure browser is installed using this scenario.

Installing Without Administrator Rights

In this scenario, the user copies the secure browser from one machine where it is installed on to another machine on which the user does not have administrator rights.

  1. Log on to a device on which the secure browser is installed.
  2. Copy the entire folder where the secure browser was installed (usually C:\Program Files (x86)\CASecureBrowser) to a removable drive or shared network location.
  3. Copy the entire directory from the shared location or removable drive to any directory on the target computer.
  4. In the folder where the user copied the secure browser, right-click CASecureBrowser.exe and select Send ToDesktop (create shortcut).
  5. Ensure all background jobs, such as virus scans or software updates, are scheduled outside of testing windows. For example, if testing takes place between 8 a.m. and 3 p.m., schedule background jobs outside of these hours.
  6. Double-click the desktop shortcut to run the secure browser (figure 30).

CASecureBrowser shortcut icon

Figure 30. [CASecureBrowser] shortcut icon for Windows

About Sharing Over a Network

Resetting Profiles

A user who has been advised by CalTAC to reset the secure browser profile should take the following steps:

  1. Log on as an admin user or the user who installed the secure browser and close any open secure browsers.
  2. Delete the contents of the following folders:

    C:\Users\username\AppData\Local\CAI\

    C:\Users\username\AppData\Roaming\CAI\

    where username is the Windows user account where the secure browser is installed. (Keep the CAI\ directories; just delete their contents.)

  3. Start the secure browser.

Uninstallation

The following subtopics describe how to uninstall the secure browser from the Windows interface or from the command line. Older versions of the secure browser will be automatically uninstalled during the installation of a new version.

Uninstalling via the User Interface

The following instructions may vary depending on the version of Windows.

  1. Navigate to SettingsSystemApps & features (Windows 10) or Control PanelAdd or Remove Programs or Uninstall a Program (Windows 8.1).
  2. Select the secure browser program CASecureBrowser and select [Remove] or [Uninstall].
  3. Follow the instructions in the uninstall wizard.

Uninstalling via the Command Line

Take the following steps to uninstall the secure browser from the command line:

  1. Open a command prompt.
  2. Run the command msiexec /X <Source> /quiet, which uses the components described in table 2.

    Table 2. Components for Command Line Uninstallation

    Command Component Description
    <Source> Path to the executable file, such as C:\MSI\CASecureBrowser.exe
    /X Perform an uninstall
    [/quiet] Quiet mode, no interaction

    For example, the command

    msiexec /X C:\AssessmentTesting\‌CASecureBrowser.exe /quiet

    uninstalls the secure browser installed at C:\AssessmentTesting\ using quiet mode.

Secure Browser for Windows and the Microsoft Take a Test App

Windows 10 and Windows 10 in S mode come with Microsoft’s Take a Test app, which enforces a locked-down, secure testing environment similar to CAI’s secure browser. Users of the Take a Test app do not need to install the CA Secure Browser on the testing machine.

Creating a Dedicated Test Account for Non–Permissive Mode Users

Users not using permissive mode should create a dedicated test account for the Take a Test app; permissive mode features will not be available when using this method. To access permissive mode features, refer to the next subtopic, Creating Desktop Shortcuts for Permissive Mode Users.

Take the following steps to create a dedicated test account:

  1. Sign in to the device with an administrator account.
  2. Go to SettingsAccountsAccess work or school Set up an account for taking tests.
  3. Select an existing account to use as the dedicated testing account.
  4. In the Enter the test’s web address field, enter https://ca.tds.cambiumast.com/student.
  5. Select [Save].

The student can now sign in to the dedicated account to take the specified test.

Creating Desktop Shortcuts for Permissive Mode Users

Permissive mode users should create a desktop shortcut for the Take a Test app. Take the following steps to create a desktop shortcut for Take a Test:

  1. Log on to Windows as the user taking a test.
  2. Right-click on the Desktop and select NewShortcut. The Create Shortcut dialog box appears (figure 31).

    Create Shortcut dialog box

    Figure 31. Create Shortcut dialog box

  3. In the Type the location of the item field, enter ca-‍edu-‍secureassessment:https://ca.tds.cambiumast.com/student
  4. Select [Next].
  5. In the next dialog box, enter a name for the shortcut in the Type a name for this shortcut field.
  6. Select [Finish].

The shortcut appears on the desktop. To run the Take a Test app, double-click the shortcut. To exit the Take a Test app, press [Ctrl] + [Alt] + [Del].