Novell ZENworks 7 Desktop Management Administration Guide
- Novell ZENworks 7 Desktop Management Administration Guide
- Understanding ZENworks 7 Desktop Management
- Understanding the Novell Client
- The Role of the Novell Client
- Understanding the Desktop Management Agent
- What is the Desktop Management Agent?
- Getting Ready to Use the Desktop Management Agent
- Understanding the ZENworks Middle Tier Server and the Desktop Management Server
- What Is the ZENworks Middle Tier Server?
- Getting Ready to Use the ZENworks Middle Tier Server
- What Is the Desktop Management Server?
- Getting Ready to Use the Desktop Management Server
- Understanding the ZENworks Multiple UNC Provider
- What Is the ZENworks Multiple UNC Provider?
- Process Flow in ZENworks Desktop Management
- Authenticating to eDirectory
- Reading Attributes from eDirectory
- Accessing Policy and Application Files
- Implementing a DHCP Option for Delivering the Middle Tier Server Address
- Overview
- Creating a New DHCP Option
- Changing the DHCP Option
- Checking the Middle Tier Address in the Registry
- Using a ZENworks Tree
- Understanding the ZENworks Tree
- The ZENworks Tree in an Active Directory Environment
- The ZENworks Tree in an eDirectory Environment
- E-Mail and Dotted Name Login Support
- E-Mail Formatted Names
- Non-E-Mail Formatted Names
- Enabling E-Mail and Dotted Name Login Support
- Using the Novell Kerberos KDC to Support ZENworks Dynamic Local Users
- Kerberos Terms
- Kerberos KDC Services
- Things to Know Before Setting Up the Novell Kerberos KDC for ZENworks DLU
- Setting Up the Novell Kerberos KDC for ZENworks DLU
- Ports Used by ZENworks 7 Desktop Management
- Documentation Updates
- July 30, 2009 ((Support Pack 1 Interim Release 4a)
- February 9, 2007
- October 30, 2006
- July 14, 2006 (Support Pack 1)
- January 31, 2006
- December 23, 2005
- December 9, 2005
- Checking the ZENworks Desktop Management Installation
- Checking the Installation of Desktop Management Components on Servers
- Determining the Version of ZENworks Components Installed on a NetWare or Windows Server
- Using Logging Methods to Check ZENworks on NetWare and Windows Servers
- Identifying Processes Started by the Linux Installation
- Determining the Version of ZENworks Components Installed on a Linux Server
- Documentation Updates
- February 02, 2010
- June 17, 2009 (Support Pack 1 Interim Release 4)
- September 19, 2008
- July 14, 2006 (Support Pack 1)
- December 23, 2005
- December 9, 2005
- Automatic Workstation Import and Removal
- Understanding Automatic Workstation Import and Removal
- Understanding Workstation Import and Registration
- Server Considerations
- Setting Up Automatic Workstation Import and Removal
- Setting Up the Automatic Workstation Import and Removal Policies
- Setting Up Automatic Workstation Import and Removal to Run on the Servers
- Using the Novell Client and the ZENworks Desktop Management Agent
- Verifying that Automatic Workstation Import and Removal are Working
- Workstation Registration Files
- Registration File Functions
- Registration File Locations
- Using Zwsreg.exe
- Using Zenwsreg.dll
- Documentation Updates
- July 14, 2006 (Support Pack 1)
- December 9, 2005
- Workstation Management
- Understanding Workstation Management
- Workstation Management Components and Features
- ZENworks Database
- ZENworks Desktop Management Policies and Policy Packages
- Creating Policy Packages
- Setting Up the Search Policy in the Container Package
- Setting Up Server Package Policies
- Dictionary Update Policy
- Imaging Server Policy
- Inventory Roll-Up Policy
- Workstation Import Policy
- Workstation Removal Policy
- ZENworks Database Policy
- Associating the Server Package
- Setting Up Service Location Package Policies
- SMTP Host Policy
- SNMP Trap Targets Policy
- XML Targets Policy
- ZENworks Database Policy
- Associating the Service Location Package
- Setting Up User and Workstation Package Policies
- Platform Pages
- Computer/User Extensible Policies (Workstation/User Packages)
- Dynamic Local User Policy (User Package)
- Novell iPrint Policy (User and Workstation Packages)
- Remote Control Policy (User and Workstation Packages)
- Scheduled Action Policy (User and Workstation Packages)
- User Extensible Policies (User Package)
- Windows Desktop Preferences Policy (User Package)
- Windows Group Policy (User and Workstation Packages)
- Workstation Imaging Policy (Workstation Package)
- Workstation Inventory Policy (Workstation Package)
- ZENworks Desktop Management Agent Policy (Workstation Package)
- Associating the User or Workstation Package
- Generating Policy Reports
- The Effective Policies Report
- The Package Associations Report
- Copying Policy Packages
- Using the ConsoleOne Copy Policy Packages Utility
- Using the Windows Copy Policy Packages Utility
- Workstation Scheduler
- Understanding Workstation Scheduler
- Using Workstation Scheduler
- Documentation Updates
- September 18, 2009
- February 9, 2007
- July 14, 2006 (Support Pack 1)
- April 28, 2006
- February 28, 2006
- December 9, 2005
- Application Management
- Novell Application Launcher: Components Overview
- Application Window
- Application Explorer
- Application Browser
- Application Launcher Engine
- Application Launcher Service for Windows
- Application Launcher Workstation Helper
- Novell Application Launcher: Installing and Starting
- Installing Application Launcher
- Installing the Application Launcher Plug-In
- Starting Application Launcher
- Using Application Launcher As the Windows Shell
- Application Window Command Line Switches
- Application Explorer Command Line Switches
- Novell Application Launcher: Configuring Settings
- How Configuration Settings Are Applied
- Accessing the Application Launcher Configuration Settings
- Configuring User Settings
- Configuring Window Settings
- Configuring Explorer Settings
- Configuring Browser Settings
- Configuring Workstation Settings
- Designating the Top of a Configuration Tree
- Novell Application Launcher: Customizing Views
- Customizing the Application Window and Application Explorer Views
- Customizing the Application Browser View
- Novell Application Launcher: Managing Authentication and File System Access
- Novell eDirectory Authentication Overview
- File System Access Overview
- Authentication and File System Access for User-Associated Applications
- Authentication and File System Access for Workstation-Associated Applications
- Novell Application Launcher: Managing the Cache
- NAL Cache Structure and Content
- File System Rights to the NAL Cache
- Caching an Application
- Changing the Cache Location
- Disabling the Cache
- Novell Application Launcher: Organizing Applications
- Types of Folders
- Creating and Deleting Application Folders
- Adding Applications to Application Folders
- Adding Applications to Custom Folders
- ZENworks Launch Gadget: Configuring Settings
- Modifying Gadget Configuration Settings
- Adding Citrix MetaFrame Servers to the Portal
- Distribution: Overview
- Application Types
- User Associated vs. Workstation Associated
- Distribution: Simple Applications
- Preparing a Simple Application
- Configuring the Application in eDirectory
- Establishing File System Access
- Establishing eDirectory Rights
- What's Next
- Distribution: Complex Applications
- Understanding Software Packages
- Preparing the Software Package
- Configuring the Application in eDirectory
- Establishing File System Access
- Establishing eDirectory Rights
- What's Next
- Distribution: Terminal Server Applications
- Preparing a Terminal Server Application
- Configuring the Application in eDirectory
- Establishing eDirectory Rights
- What's Next
- Distribution: Web Applications
- Preparing a Web Application
- Configuring the Application in eDirectory
- Establishing eDirectory Rights
- What's Next
- Distribution: Applications to Terminal Servers
- Advanced Distribution: Creating Distribution Rules
- Types of Distribution Rules
- AND/OR Boolean Operators and Groups
- Distribution Rules vs. Legacy System Requirements
- Distribution Rules Examples
- Creating Distribution Rules
- Creating Distribution Rules by Importing Legacy System Requirements
- Maintaining Legacy System Requirements
- Advanced Distribution: Transferring Applications Using BITS
- Understanding How Application Launcher Uses BITS
- Setting Up Workstations
- Enabling Application Launcher to Use BITS
- Configuring an Application to be Transferred by BITS
- Changing the Default Settings for a BITS Job
- Changing the BITS Maximum Network Bandwidth Setting
- Advanced Distribution: Pre-Installing Applications
- User-Associated Applications vs. Workstation-Associated Applications
- Pre-Installing an Application Immediately
- Scheduling an Application Pre-Install
- Advanced Distribution: Configuring Fault Tolerance, Load Balancing, and Site Lists
- Setting Up Fault Tolerance
- Setting Up Load Balancing
- Setting Up Site Lists
- Advanced Distribution: Configuring Application Dependencies and Chains
- Primary Applications vs. Dependent Applications
- Application Chains
- What Happens During the Distribution, Launch, and Uninstall of an Application That Has Dependencies
- Adding an Application Dependency
- Removing an Application Dependency
- Deleting an Application That Has Dependencies
- Creating an Application Chain
- Viewing an Application Chain
- Users: Supporting Terminal Server Users
- Installing the RDP and ICA Clients
- Determining Where Novell Application Launcher Runs
- Managing Terminal Server User Accounts
- Determining the Best Type of Application Objects and File Packages to Use When Distributing an Application
- Ensuring Terminal Server Access Through a Firewall
- Users: Supporting Disconnected Users
- Disconnected Mode Overview
- Configuring Applications as Disconnectable
- Configuring Application Launcher to Start Automatically
- Distributing Applications to Disconnected Workstations
- Users: Supporting Remote Users
- Configuring How Application Launcher Detects a Remote Connection
- Disabling Applications
- Establishing Alternate Applications
- Distributing Applications
- Controlling Rogue Processes
- What Rogue Process Management Does
- How Rogue Process Management Works
- Setting Up Rogue Process Management
- Verifying Applications
- How Application Launcher Detects Broken Applications
- How Application Files are Verified
- Why Automatic Verification Can Fail
- Using Application Launcher to Verify an Application
- Uninstalling Applications
- Enabling an Application to be Uninstalled
- Uninstalling Applications by Disassociating Users or Workstations
- Uninstalling Unused Applications
- Using Application Launcher to Uninstall an Application
- Uninstalling Applications from Terminal Servers
- Reporting Application Events
- Setting Up Database Reporting
- Setting Up SNMP Trap Reporting
- Setting Up Log File Reporting
- Setting Up XML Reporting
- Configuring Applications to Use Reporting
- Generating Reports from a Database
- Understanding Log File Reports
- Enabling Windows Installer Verbose Logging
- Metering Software Licenses
- Installing Novell Licensing Services
- Creating Metered Certificates
- Installing the Novell Client and Licensing Files to Workstations
- Configuring Applications to Use License Metering
- Reference: AdminStudio ZENworks Edition
- Installing AdminStudio ZENworks Edition
- Using AdminStudio ZENworks Edition
- Reference: ZENworks SnAppShot
- Understanding SnAppShot
- Preparing a SnAppShot Workstation
- Creating an Installation Package
- Command Line Switches
- Reference: Application Object Settings
- Identification Tab
- Distribution Options Tab
- Run Options Tab
- Associations Tab
- Availability Tab
- Common Tab
- MSI Tab
- Terminal Server Client Tab
- Fault Tolerance Tab
- Reference: Macros
- Application Object Macros
- Special Windows Macros
- Login Script Macros
- eDirectory Attribute Macros
- Environment Variable Macros
- Language Variable Macros
- Macro Precedence
- Application Object Properties Where Macros Can Be Used
- Refreshing Macro Information
- Reference: Novell Application Launcher Tools
- Export Application Object
- Show Inherited Applications
- Search and Replace
- Manage Distribution GUIDs
- AOT/AXT File Tools
- Create Virtual CD
- Reference: Application Object Location
- Single Site
- Multiple Sites
- Reference: Novell Application Launcher Authentication Hook
- Creating an Authentication Hook
- Registering an Authentication Hook
- Authentication Function (NWAPPAuthenticateExtern)
- Documentation Updates
- August 19, 2011
- December 15, 2010
- February 02, 2010
- September 18, 2009
- December 03, 2007
- October 19, 2007
- September 27, 2007 (Support Pack 1, Interim Release 1)
- July 27, 2007
- June 15, 2007
- May 4, 2007
- February 9, 2007
- January 2, 2007
- November 17, 2006
- November 6, 2006
- July 14, 2006 (Support Pack 1)
- February 28, 2006
- January 31, 2006
- December 9, 2005
- October 24, 2005
- September 30, 2005
- Workstation and Server Imaging
- Common Imaging Deployment Strategies
- Installing a Standard Image Before Deploying New Workstations
- Enabling Existing Workstations for Future Reimaging
- Reimaging Corrupted Workstations
- Restoring Lab or Classroom Workstations to a Clean State
- Preparing a ZENworks Imaging Server
- Imaging Server Prerequisites
- Preparing an Imaging Server Where Automatic Workstation Import Is Not Installed
- Preparing an Imaging Boot Method
- Using Preboot Services (PXE)
- Preparing Imaging Boot CDs or DVDs
- Using the ZENworks Imaging Boot Disk Creator
- Creating an Imaging Hard-Disk Partition
- Using ZENworks Desktop Management Preboot Services
- Understanding Desktop Management Preboot Services
- Installing and Setting Up Desktop Management Preboot Services
- Checking the Preboot Services Server Setup
- Deploying Desktop Management Preboot Services in a Routed or Subneted Network Environment
- Enabling PXE on a Workstation
- Administering Desktop Management Preboot Services
- Using the Desktop Management Preboot Services PXE-on-Disk Utility
- Editing the Desktop Management Preboot Services Menu
- Setting Up Workstations for Imaging
- Windows Workstation Requirements
- Enabling a Windows Workstation for Auto-Imaging Operations
- Setting Up Imaging Policies
- Defining an Imaging Policy for Unregistered Workstations (Server Policy)
- Defining an Imaging Policy for Registered Workstations (Workstation Policy)
- Allowing Overwriting Filenames and Restricting the Save Location of Image Files (Imaging Server Settings)
- Creating and Restoring Images
- Creating a Workstation (Base) Image
- Creating an Add-On Image
- Using Image Explorer to Customize an Image
- Making an Image Available for Automatic Imaging
- Performing an Automatic Imaging Creation or Restoration
- Performing Manual Imaging Operations
- Manually Taking an Image of a Workstation
- Manually Putting an Image on a Workstation
- Setting Up Disconnected Imaging Operations
- Using a CD or DVD for Disconnected Imaging Operations
- Using a Hard Disk or Jaz Drive for Disconnected Imaging Operations
- Multicasting Images
- Understanding Multicasting
- Performing a Multicast Session
- Imaging Utilities and Components
- Image Explorer (imgexp.exe)
- ZENworks Imaging Windows Agent (Ziswin.exe)
- Image-Safe Data Viewer and Editor (Zisview and Zisedit)
- Imaging Floppy Boot Disk Creator (zimgboot.exe)
- Imaging Configuration Parameters (Settings.txt)
- Imaging Server (Imgserv.nlm or .dll or .dlm, or Linux Daemons)
- Imaging Server Log (Zimglog.xml)
- ZENworks Imaging Engine Commands
- Help Mode (img help)
- Auto Mode (img auto)
- Make Mode (img make)
- Restore Mode (img restore)
- Session (Multicast) Mode (img session)
- Partition Mode (img p)
- ZENPartition Mode (img zenPartition)
- Dump Mode (img dump)
- Information Mode (img info)
- Updating ZENworks Imaging Resource Files
- The Linux Distribution for Imaging
- Understanding Device Boot Processes in a ZENworks Imaging Environment
- Understanding ZENworks Partitions and Command Line Parameters
- Modifying ZENworks Imaging Resource Files
- Adding or Updating LAN Drivers
- Using Uname
- Variables and Parameters
- Troubleshooting Linux Driver Problems
- Supported Ethernet Cards
- Accessing IP Addresses for Devices Running Dual NICs
- Documentation Updates
- February 02, 2010
- November 18, 2009
- September 18, 2009
- June 17, 2009 (Support Pack 1 Interim Release 4)
- December 03, 2008
- September 19, 2008
- April 29, 2008 (SP1 IR3a)
- February 29, 2008
- December 14, 2007
- September 7, 2007 (Support Pack 1, Interim Release 1)
- June 15, 2007
- March 23, 2007
- February 9, 2007
- December 29, 2006
- October 30, 2006
- August 16, 2006
- July 14, 2006 (Support Pack 1)
- December 9, 2005
- Remote Management
- Understanding Remote Management
- Remote Management Terminology
- Understanding the Remote Management Components
- Setting Up Remote Management
- Remote Management Deployment Strategies
- Configuring the Remote Management Policy for the Registered Workstations
- Configuring the Remote Management Policy for Non-Registered Workstations
- Setting Up the Remote Management Agent Password
- Assigning Rights to the Remote Operator
- Operating with Windows XP Service Pack 2
- Starting Remote Management Operations Using ConsoleOne
- Starting Remote Management Operations Without Using ConsoleOne
- Configuring Remote Management Ports
- Managing Remote Workstations
- Managing a Remote View Session
- Managing a Remote Control Session
- Managing a Remote Execute Session
- Managing a File Transfer Session
- Managing a Remote Wake Up Session
- Viewing the Audit Log of Remote Management Sessions Using the Windows Event Viewer
- Remote Operator Identification Display
- Managing a Remote Management Audit Session
- Generating Remote Management Reports
- Improving the Remote Management Performance
- Using the Remote Management Agents
- Viewing the Diagnostic Information
- Viewing Diagnostic Information for a Managed Workstation
- Windows Memory Information
- Environment Information
- Event Log Information
- Device Drivers Information
- Services Information
- WIN32 Process Information
- WIN32 Modules Information
- NetWare Connections Information
- Novell Client Information
- Network Protocols Information
- Name Space Providers Information
- Network Drives Information
- Network Open Files Information
- Print Capture Information
- Documentation Updates
- August 23, 2010
- September 19, 2008
- January 2, 2007
- July 14, 2006 (Support Pack 1)
- December 9, 2005
- Workstation Inventory
- Understanding Workstation Inventory
- Workstation Inventory Terminology
- Overview of Inventory Components
- Understanding Inventory Scanning Cycle
- Understanding the Inventory Server Roles
- Setting Up Workstation Inventory
- Deploying Workstation Inventory
- Setting Up the Inventory Database
- Configuring the Inventory Service Object
- Changing the ScanDir Path for a Linux Inventory Server
- Configuring the Database Location Policy
- Configuring the Workstation Inventory Policy
- Configuring the Roll-Up Policy
- Configuring the Dictionary Update Policy
- Setting Up Distribution of Dictionary
- Understanding Workstation Inventory Components
- Understanding the Inventory Service Manager
- Understanding the Server Configuration Service
- Understanding the Inventory Scanner
- Understanding the Sender and Receiver
- Understanding the TCP Receiver
- Understanding the Selector
- Understanding the Storer
- Understanding the Str Converter
- Understanding the Inventory Sync Service
- Understanding Dictionary Provider and Dictionary Consumer
- Understanding the Upgrade Service
- An Overview of the Inventory Components on an Inventory Server
- Understanding the Inventory Database
- Understanding the Inventory Database Schema
- Overview
- CIM Schema
- Inventory Database Schema in ZENworks 7 Desktop Management
- Managing Your Inventory System
- Viewing the Servers Deployed for Inventory
- Customizing the Hardware Inventory Information To Be Scanned
- Customizing the Software Inventory Information To Be Scanned For ZENworks 7 Inventoried Workstations
- Customizing the Software Inventory Information To Be Scanned For ZENworks for Desktops 4.x and Earlier Versions of Inventoried Workstations
- Scanning for Workstations That Are Periodically Connected to the Network
- Scanning for Workstations That Are Never Connected to Your Network
- Removing Redundant Inventoried Workstations from the Inventory Database
- Removing Duplicate Workstation Objects from the Inventory Database
- Viewing Inventory Information
- Viewing the Inventory Information Using ConsoleOne
- Exporting the Inventory Information
- Viewing Inventory Information Without Using ConsoleOne
- Retrieving Inventory information from the Inventory Database Without Using the CIM Schema
- Monitoring Workstation Inventory Using Status Logs
- Viewing the Scan History of an Inventoried Workstation
- Viewing the Scan Status of an Inventoried Workstation
- Viewing the Roll-Up History of the Server
- Viewing the Status of Inventory Components on a Server
- Viewing the Status of the Last Scan in the Workstation Scan Log
- Viewing the Roll-Up Log for Servers
- Status Logs and Scan Logs Overview
- Viewing the Status Log in XML Format
- Performance Tips
- Database Parameter Tuning Tips
- Improving the Throughput of the Inventory Storer
- Performance Tips for the Inventory Server ( Support Pack 1)
- Performance Tips for the Inventory ConsoleOne Utilities
- References
- Hardware Information Collected by the Inventory Scanners
- ZENworks 7 Desktop Management Inventory Attributes
- Enumeration Values
- Enumeration Values for General-System Information-Management Technology
- Enumeration Values for General-Inventory Information-Scan Mode
- Enumeration Values for Software-Operating Systems-Windows - Name
- Enumeration Values for Installation Repository
- Enumeration Values for Hardware-Display Adapter-Video Architecture
- Enumeration Values for Hardware-Display Adapter-Video Memory Type
- Enumeration Values for Hardware-Pointing Device-Name
- Enumeration Values for Hardware-Battery-Chemistry
- Enumeration Values for Hardware-Processor-Processor Family
- Enumeration Values for Hardware-Processor-Upgrade Method
- Enumeration Values for Hardware-Chassis-Chassis Type
- Enumeration Values for Hardware-Bus-Protocol Supported
- Enumeration Values for Hardware-Processor-Role
- Enumeration Values for System-System Cache-Level
- Enumeration Values for System-System Cache-Cache Type
- Enumeration Values for System-System Cache-Replacement Policy
- Enumeration Values for System-System Cache-Read Policy
- Enumeration Values for System-System Cache-Write Policy
- Enumeration Values for System-System Cache-Associativity
- Enumeration Values for System-System IRQ-Availability
- Enumeration Values for System-System IRQ-IRQ Trigger Type
- Enumeration Values for System-System DMA-Availability
- Enumeration Values for Language
- Documentation Updates
- September 19, 2008
- September 27, 2007 (Support Pack 1 Interim Release 1)
- September 07, 2007
- July 27, 2007
- May 4, 2007
- October 30, 2006
- July 14, 2006 (Support Pack 1)
- December 23, 2005
- December 9, 2005
- September 30, 2005
- Legal Notices