Zen Quickstart
Zen Quickstart
The only warranties for products and services of Open Text and its affiliates and licensors (“Open Text”) are as may be set
forth in the express warranty statements accompanying such products and services. Nothing herein should be construed
as constituting an additional warranty. Open Text shall not be liable for technical or editorial errors or omissions contained
herein. The information contained herein is subject to change without notice.
2
Contents
1 Quick List 11
Management Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Zone Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Agent Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
System Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2 Management Tools 17
ZENworks Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Accessing ZENworks Control Center. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Navigating ZENworks Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
zman Command Line Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
Help with Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
zac Command Line Utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Help with Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
Contents 3
Defining a Network Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Creating Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Location and Network Environment Selection on a Managed Device . . . . . . . . . . . . . . . . . . . . . . . . 36
Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
5 System Messages 51
Viewing System Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Viewing a Summary of Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Acknowledging Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Where to Find More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Creating a Watch List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
6 Audit Management 55
Types of Audit Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Enabling an Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Viewing a Generated Event . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
7 Quick List 61
Asset Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Endpoint Security Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Full Disk Encryption. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
Patch Management. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
8 Asset Management 69
Activating Asset Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Enabling Asset Management in the ZENworks Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Collecting Software and Hardware Inventory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Initiating a Device Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
4 Contents
Viewing a Device Inventory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Generating an Inventory Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Where to Find More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Monitoring Software Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Monitoring License Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
License Compliance Components. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Discovering Installed Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Creating a Catalog Product and Purchase Record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Creating a Licensed Product . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Viewing Compliance Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Where to Find More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Allocating Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
9 Configuration Management 81
Activating Configuration Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Enabling Configuration Management in the ZENworks Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Distributing Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Creating a Bundle. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Assigning a Bundle. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Where to Find More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Applying Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Creating a Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Assigning a Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Where to Find More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Imaging Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Setting Up Preboot Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Taking an Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Applying an Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Where to Find More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Remotely Managing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
Creating a Remote Management Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Configuring Remote Management Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Performing Remote Control, Remote View, and Remote Execute Operations on a Windows
Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Performing a Remote Diagnostic Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Performing a File Transfer Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Performing Remote Control, Remote View, and Remote Login Operations on a Linux Device . . . 101
Performing Remote SSH Operation on a Linux Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Where to Find More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Collecting Software and Hardware Inventory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Initiating a Device Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Viewing a Device Inventory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Generating an Inventory Report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Where to Find More Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Linux Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Managing Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Enrolling Mobile Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Enrolling an iOS/iPadOS DEP Device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Enrolling an iOS/iPadOS Device using Apple Configurator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Enrolling an iOS/iPadOS Device using the ZENworks User Portal . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Enrolling Android Devices in the Work Profile Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Enrolling an Android device in the work-managed device mode . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Contents 5
Enrolling an ActiveSync-only device . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
6 Contents
About This Guide
This ZENworks Administration Quick Start helps you quickly master the basics of administering your
ZENworks Management system. You should already have installed your ZENworks system. If not,
see the ZENworks Server Installation.
The information in this guide is organized as follows:
System Configuration (page 9): Provides instructions for configuring your ZENworks
Management Zone prior to using the ZENworks products.
Product Administration (page 59): Provides instructions for using ZENworks products (Asset
Management, Configuration Management, Endpoint Security Management, Full Disk
Encryption, and Patch Management).
Audience
This guide is intended for anyone who will configure the ZENworks system, monitor the ZENworks
system, or perform any ZENworks tasks related to managing devices or users.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the comment on this topic link at the bottom of each page of
the online documentation.
Additional Documentation
ZENworks is supported by other documentation (in both PDF and HTML formats) that you can use to
learn about and implement the product. For additional documentation, see the ZENworks
documentation website.
The following sections provide information to help you configure your ZENworks system. The
configuration tasks apply regardless of which ZENworks products (Configuration Management, Patch
Management, Asset Management, and Endpoint Security Management) you are using.
Chapter 1, “Quick List,” on page 11
Chapter 2, “Management Tools,” on page 17
Chapter 3, “Management Zone Configuration,” on page 23
Chapter 4, “ZENworks Agent Deployment,” on page 37
Chapter 5, “System Messages,” on page 49
Chapter 6, “Audit Management,” on page 53
System Configuration 9
10 System Configuration
1 Quick List
1
You’ve installed your ZENworks Server (or maybe a couple of servers) and are eager to start using all
of the time-saving functionality in ZENworks.
Before you begin using any of the ZENworks products (Configuration Management, Patch
Management, Asset Management, Endpoint Security Management and Full Disk Encryption) that
you’ve licensed or are evaluating, you should review the concepts and tasks in the following
sections. These sections are designed to quickly introduce you to what you need to know and do to
configure your Management Zone:
“Management Tools” on page 11
“Zone Configuration” on page 11
“Agent Deployment” on page 14
“System Messages” on page 15
Management Tools
ZENworks provides both a Web-based console (ZENworks Control Center) and a command line utility
(zman) that you can use to manage your ZENworks system. You should become familiar with at least
ZENworks Control Center.
Task Details
Discover how to run the zman The zman utility is a command line interface
utility that lets you perform many of the same tasks as
ZENworks Control Center.
Discover how to run the zac The zac utility is a command line interface for
utility the ZENworks Agent.
Zone Configuration
Before you start taking full advantage of the management capabilities provided by the ZENworks
products you activated during installation of your Management Zone, there are a few configuration
tasks you need to complete to ensure that your Management Zone is configured correctly.
Quick List 11
Task Details
Create folders and groups for Organize devices into folders and groups to
organizing devices ease the overhead involved in applying
ZENworks configuration settings and
performing tasks on similar devices. Rather
than making assignments or performing tasks
on individual devices, you can manage the
folders and groups, with each device in a folder
or group inheriting the assignment or task.
12 Quick List
Task Details
Quick List 13
Agent Deployment
The ZENworks Agent communicates with the ZENworks Server to perform management tasks on a
device. You must deploy the ZENworks Agent to all devices you want to manage. Deploying the
ZENworks Agent installs the agent files and registers the device in your Management Zone. For more
information on enrolling mobile devices to the zone, see Enrolling Mobile Devices.
IMPORTANT: To support legacy Windows devices as mentioned below, weak cipher suites are used
to communicate between Servers and Managed Devices and these ciphers might be added into the
server configuration. To use strong ciphers, use a newer version of Windows in the zone.
Following are the legacy Windows devices:
Windows 7 SP1
Windows Embedded 7 SP1
Windows Server 2008 SP2
Windows Server 2008 R2
Windows 2008 R2 SP1
Windows 2012
Windows 2012 R2 Server
Task Details
Enable the ZENworks Agent The ZENworks Agent includes features specific to each of
features the ZENworks products (Asset Management,
Configuration Management, Endpoint Security
Management, Full Disk Encryption, and Patch
Management). By default, the features for your activated
products (licensed and evaluation) are enabled during
Management Zone installation. However, you should
verify the configuration in ZENworks Control Center.
Secure the ZENworks Agent You can configure the ZENworks Agent uninstall and self-
defense settings.
14 Quick List
Task Details
Install the ZENworks Agent You can use a variety of methods to install the ZENworks
Agent to a device:
Log in and use the ZENworks To receive user-assigned bundles and policies on a
Agent device, you must log in to the Management Zone.
System Messages
As you perform management tasks in your zone, information is recorded so that you can view the
status of your zone and the activities taking place within it.
Task Details
Create a Watch List If you have devices, bundles, and policies whose activity
you want to closely monitor, you can add them to the
Watch List.
Quick List 15
16 Quick List
2 Management Tools
2
ZENworks provides both a web-based console (ZENworks Control Center) and a command line utility
(zman) that you can use to manage your ZENworks system. The following sections explain how to
access and use the management tools:
“ZENworks Control Center” on page 17
“zman Command Line Utility” on page 19
“zac Command Line Utility” on page 20
https://ZENworks_Server_Address:port
Replace ZENworks_Server_Address with the IP address or DNS name of the ZENworks Server.
You only need to specify the port if you are not using the default port (443). ZENworks Control
Center requires an HTTPS connection; HTTP requests are redirected to HTTPS.
The login dialog box is displayed.
2 In the Username field, type Administrator.
3 In the Password field, type the Administrator password created during installation.
To prevent unauthorized users from gaining access to ZENworks Control Center, the
administrator account is disabled after three unsuccessful login attempts, and a 60-second
timeout is enforced before you can attempt another login. To change these default values, see
“Changing the Default Login Disable Values” in the ZENworks Control Center Reference.
4 Click Login to display ZENworks Control Center.
For more detailed information on logging in as a different administrator, see “Accessing
ZENworks Control Center” in the ZENworks Control Center Reference.
Management Tools 17
Navigating ZENworks Control Center
The following Workstations page represents a standard view in ZENworks Control Center.
Navigation Tabs: The tabs in the left pane let you navigate among the functional areas of ZENworks.
For example, the Workstations page shown above lets you manage tasks associated with
workstations.
Task List: The task list in the left pane provides quick access to the most commonly performed tasks
for the current page. The task list changes for each page. For example, the task list on the Devices
page displays device-related tasks and the task list on the Configuration page displays configuration-
related tasks.
Frequently Used Objects: The Frequently Used list in the left pane displays the 10 objects that you
have accessed most often, from most used to least used. Clicking an object takes you directly to the
details page for the object.
Work Panel: The work panels are where you monitor and manage your ZENworks system. The
panels change depending on the current page. In the above example, there are two work panels:
Devices and Search. The Devices panel lists the workstations, workstation folders, workstation
groups, and dynamic workstation groups that have been created; you use this panel to manage
workstations. The Search panel lets you filter the Devices panel based on criteria such as a
workstation’s name, operating system, or status.
Help Information: The Help button links to Help topics that provide information about the current
page. The Help button links change depending on the current page.
18 Management Tools
zman Command Line Utility
The zman utility provides a command line management interface that lets you perform many of the
tasks available in ZENworks Control Center. For example, you can add content to bundles, assign
policies to devices, and register devices. The main advantage to using the command line utility is the
ability to create scripts for handling repetitive or mass operations. Like ZCC, the zman utility is
installed on all Primary Servers, but it can only run from the command line on the server.
The primary purpose of the zman utility is to enable you to perform operations through a script.
However, you can also perform operations manually at a command line.
“Location” on page 19
“Syntax” on page 19
“Help with Commands” on page 20
Location
The utility is installed on all ZENworks Servers in the following location:
%ZENSERVER_HOME%\bin
where %ZENSERVER_HOME% represents the ZENworks installation path. On Windows, the default
path is C:\Program Files (x86)\Micro Focus\Zenworks\bin. On Linux, the default path is
/opt/microfocus/zenworks/bin.
Syntax
The zman utility uses the following basic syntax:
zman category-action [options]
For example, to assign a software bundle to a device, you use the following command:
zman bundle-assign workstation bundle1 wks1
where bundle-assign is the category-action and workstation bundle1 wks1 are the
options. In this example, the options are device type (workstation), bundle name (bundle1), and
target device (wks1).
For example, to initiate an inventory scan of a device, you use the following command:
zman inventory-scan-now device/servers/server1
Management Tools 19
Help with Commands
The best way to understand the commands is to use the online help or see “zman(1)” in the
ZENworks Command Line Utilities Reference.
To use the online help:
1 On the ZENworks Server, enter zman --help at a command prompt.
This command displays the basic usage (syntax) and a list of the available command categories.
You can also use the following to get help:
Command Description
Location
The utility is installed on all Windows managed devices in the following location:
%ZENWORKS_HOME%\bin
where %ZENSERVER_HOME% represents the ZENworks installation path. The default path is
c:\program files\microfocus\zenworks\bin on a 32-bit Windows device and c:\program
files (x86)\microfocus\zenworks\bin on a 64-bit Windows device.
Syntax
The zac utility uses the following basic syntax:
zac command options
For example, to launch a bundle on a device, you use the following command:
zac bundle-launch "bundle 1"
20 Management Tools
where bundle-launch is the command and bundle 1 is the command option. In this example,
the option is the display name of the bundle to be launched. Enclosing quotation marks are required
only if the bundle display name includes spaces.
For example, to initiate an inventory scan on a device, you use the following command:
zac inv scannow
Command Description
Management Tools 21
22 Management Tools
3 Management Zone Configuration
3
ZENworks is designed to let you efficiently manage a large number of devices and users with as little
effort as possible. The first step in easing this management burden is to ensure that you’ve
configured your Management Zone so that you can take full advantage of the ZENworks capabilities.
The following sections introduce the basic concepts you need to set up a Management Zone that
best supports the ongoing management tasks you perform. Each section explains a management
concept and provides general steps to perform the tasks associated with the concept.
“Organizing Devices: Folders and Groups” on page 23
“Creating Registration Keys and Rules” on page 26
“Connecting to User Sources” on page 29
“Creating ZENworks Administrator Accounts” on page 30
“Modifying Configuration Settings” on page 32
“Zone Sharing and Subscription” on page 33
“Updating ZENworks Software” on page 34
“Creating Locations” on page 34
“Dashboard” on page 36
Creating a Folder
1 In ZENworks Control Center, click the Devices tab.
2 Click the Workstations, or Servers or Mobile Devices folder.
3 Click New > Folder to display the New Folder dialog box.
4 In the Name field, type a name for the new folder.
When you name an object in the ZENworks Control Center (folders, groups, bundles, policies,
and so forth), ensure that the name adheres to the following conventions:
The name must be unique in the folder.
Depending on the database software being used for the ZENworks database, uppercase
and lowercase letters might not create uniqueness for the same name. The embedded
database included with ZENworks is case insensitive, so Folder 1 and FOLDER 1 are the
same name and cannot be used in the same folder. If you use an external database that is
case-sensitive, Folder 1 and FOLDER 1 are unique.
If you use spaces, you must enclose the name in quotes when entering it on the command
line. For example, you must enclose Folder 1 in quotes (“Folder 1”) when entering it in the
zman utility.
The following characters are invalid and cannot be used: / \ * ? : " ' < > | ` % ~
5 Click OK to create the folder.
Creating a Group
1 In ZENworks Control Center, click the Devices tab.
2 If you want to create a group for servers, click the Servers folder.
or
If you want to create a group for workstations, click the Workstations folder.
or
If you want to create a group for mobile devices, click the Mobile Devices folder.
3 Click New > Server Group (New > Workstation Group for workstationsor New > Mobile Device
Group for mobile devices.) to launch the Create New Group Wizard.
4 On the Basic Information page, type a name for the new group in the Group Name field, then
click Next.
The group name must follow the naming conventions.
5 On the Summary page, click Finish to create the group without adding members.
NOTE: The Registration Keys feature does not apply to Mac MDM devices.
Registration Keys
A registration key is an alphanumeric string that you manually define or randomly generate. During
deployment of the ZENworks Agent on a device, the registration key must be provided. When the
device connects to a ZENworks Server for the first time, the device is added to the folder and groups
defined within the key.
You can create one or more registration keys to ensure that devices are placed in the desired folders
and groups. For example, you might want to ensure that all of the Sales department’s workstations
are added to the /Workstations/Sales folder but are divided into three different groups
(SalesTeam1, SalesTeam2, SalesTeam3) depending on their team assignments. You could create
three different registration keys and configure each one to add the Sales workstations to the /
Workstations/Sales folder and the appropriate team group. As long as each workstation uses
the correct registration key, it is added to the appropriate folder and group.
To create a registration key:
1 In ZENworks Control Center, click the Configuration tab, then click the Registration tab.
2 In the Registration Keys panel, click New > Registration Key to launch the Create New
Registration Key Wizard.
3 Follow the prompts to create the key.
For information about what you need to supply at each step of the wizard, click the Help button.
You can also use the registration-create-key command in the zman utility to create a
registration key. For more information, see “Registration Commands” in the ZENworks Command
Line Utilities Reference.
NOTE:
${CPU} and ${IPAddress} are not applicable for Mac MDM Devices.
${CPU} is not applicable for Windows MDM Devices.
4 In the Device Naming Template panel, click , then select the desired machine variable from
the list.
You can use any combination of one or more variables. For example:
${HostName}${GUID}
5 Click OK to save the changes.
When you define an LDAP directory as a user source, the directory is not affected; ZENworks
requires only read access to the LDAP directory and stores all assignment information in the
ZENworks database. For more detailed information about the specific read rights required when
connecting to a user source, see “Creating User Source Connections”in the ZENworks User Source
and Authentication Reference.
You can connect to Novell eDirectory and Microsoft Active Directory as user sources. The minimum
requirements are Novell eDirectory 8.7.3 and Microsoft Active Directory on Windows 2000 SP4. The
minimum LDAP requirement is version 3.
After you connect to an LDAP directory, you define the containers within the directory that you want
exposed. For example, assume you have a Microsoft Active Directory domain tree named
MyCompany. All users reside in two containers in the MyCompany tree: MyCompany/Users and
MyCompany/Temp/Users. You could reference the MyCompany tree as the source and the
MyCompany/Users and MyCompany/Temp/Users as separate user containers. This limits access
within the directory to only those containers that include users.
In addition to the users that reside within the containers you add, ZENworks Control Center also
displays any user groups located in the containers. This enables management of both individual user
and groups of users
To connect to a user source:
1 In ZENworks Control Center, click the Configuration tab.
2 In the User Sources panel, click New to launch the Create New User Source Wizard.
3 Follow the prompts to create the user source.
For information about what you need to supply at each step of the wizard, click the Help button.
You can also use the user-source-create command in the zman utility to create a connection to
a user source. For more information, see “User Commands” in the ZENworks Command Line Utilities
Reference.
For more information about creating ZENworks administrator accounts, administrator rights, or
administrator roles, see ZENworks Administrator Accounts and Rights Reference.
You can also use the admin-create command in the zman utility to create a ZENworks
administrator account. For more information, see “Administrator Commands” in the ZENworks
Command Line Utilities Reference.
For more information about creating ZENworks administrator group accounts, administrator rights,
or administrator roles, see the ZENworks Administrator Accounts and Rights Reference.
You can also use the admin-create command in the zman utility to create a ZENworks
administrator account. For more information, see “Administrator Commands” in the ZENworks
Command Line Utilities Reference.
Creating Locations
Security requirements for a device might differ from location to location. For example, you might
have different personal firewall restrictions for a device located in an airport terminal than for a
device located in an office inside your corporate firewall.
To ensure that a device’s security requirements are appropriate for the location that it is in,
ZENworks supports both global policies and location-based polices. A global policy is applied
regardless of the device’s location. A location-based policy is applied only when the device’s current
location meets the criteria for a location associated with the policy. For example, if you create a
location-based policy for your corporate office and assign it to a laptop, the policy is applied only
when the laptop’s location is the corporate office.
If you want to use location-based policies, you must first define the locations that suit your
organization. A location is a place, or type of place, for which you have specific security
requirements. For example, you might have different security requirements when a device is used in
the office, at home, or in an airport.
Locations are defined by network environments. Assume that you have an office in New York and an
office in Tokyo. Both offices have the same security requirements. Therefore, you create an Office
location and associate it with two network environments: New York Office Network and Tokyo Office
Network. Each of these environments is explicitly defined by a set of gateway, DNS server, and
wireless access point services. Whenever the ZENworks Agent determines that its current
environment matches the New York Office Network or Tokyo Office Network, the agent sets its
location to Office and applies the security policies associated with the Office location.
The following sections explain how to create locations:
“Defining a Network Environment” on page 34
“Creating Locations” on page 35
“Location and Network Environment Selection on a Managed Device” on page 36
Creating Locations
When you create a location, you provide a location name and then associate the required network
environments with the location.
1 In ZENworks Control Center, click Configuration > Locations.
2 In the Locations panel, click New to launch the Create New Location wizard.
3 On the Define Details page, specify a name for the location, then click Next.
4 On the Assign Network Environments page:
4a Select Assign existing Network Environments to the Location.
4b Click Add, select the network environments for which you want to define the location, then
click OK to add them to the list.
4c Click Next when you are finished adding network environments.
5 On the summary page, click Finish to create the location and add it to the Locations list.
NOTE: For a network environment to be considered matched on the managed device, it must meet
all the restrictions set in the network environment. These include the Minimum Match attribute
specified for the network environment, and also the Match Required attribute specified for the
network services, within the network environment.
Dashboard
The dashboard feature provides a comprehensive snapshot of key indicators, so you can quickly
assess the overall health and compliance of devices in your zone. Using dashboards, you can drill
down to further areas of interest.
The ZENworks dashboards enable you to view information related to the status of devices and
patches within the zone, and perform the required actions.
For more information, see ZENworks Dashboard Reference.
The ZENworks Agent must be deployed to the devices that you want to manage. The following
sections provide instructions to help you understand the process of deploying the agent:
“Configuring ZENworks Agent Features” on page 37
“Configuring ZENworks Agent Security” on page 39
“Downloading the ZENworks Agent” on page 40
“Installing the ZENworks Agent” on page 40
“Using the ZENworks Agent” on page 45
NOTE: If a device does not meet the requirements for installing the ZENworks Agent (see “Managed
Device Requirements” in the .), you might be able to install the Inventory Only Module on it to
support inventorying of the device. For more information, see the ZENworks Discovery, Deployment,
and Retirement Reference.
Remote Management
Bundle Management
Image Management
Policy Management
Full Disk Encryption
Patch Management
Asset Management
User Management
Endpoint Security
Antimalware
By default, when you activate a ZENworks product, all of its ZENworks Agent features are installed
and enabled. The one exception is ZENworks Asset Management, which does not automatically
enable the User Management feature.
The following steps explain how to customize settings at the Management Zone level. For
information about customizing settings on a device folder or individual device, see “Customizing the
Agent Features” in the ZENworks Discovery, Deployment, and Retirement Reference.
1 In ZENworks Control Center, click the Configuration tab.
2 In the Management Zone Settings panel, click Device Management > ZENworks Agent.
3 In the Agent Features panel:
If you do not want to install a feature, deselect Installed next to a feature. The selected
feature is not installed on the device. If you choose to deselect all the features, then only
the core agent is installed.
If you want to install but disable a feature, select Installed and Disabled next to a feature.
The feature is installed on the device, but it is nonfunctional.
The installation of Bundle Management, Remote Management, or User Management features
requires a reboot of the device. The installation of Image Management feature requires a
reboot only on Windows 2008 and Windows Vista. You are prompted to reboot the device
based on the selected reboot option.
4 To save the changes, click OK.
OR
Open https://server:port/zenworks-setup
In the ZENworks Agent page, based on your requirements, you can download the required package.
For more information on the deployment packages, see Managing Deployment Packages in the
ZENworks Discovery, Deployment, and Retirement Reference.
NOTE: In addition to manually installing the ZENworks Agent, you can automate installation by using
network device discovery and deployment. The discovery and deployment process is beyond the
scope of this Quick Start. To learn how to use this process, see the ZENworks Discovery, Deployment,
and Retirement Reference.
1 Ensure that the device meets the necessary requirements (see “Managed Device
Requirements”.
2 On the target device, open a web browser and navigate to the following address:
https://server:port/zenworks-setup
Replace server with the DNS name or IP address of a ZENworks server and replace the port only
if the ZENworks server is not using the default port (443).
Or
In the ZCC Home page, go to Common Tasks, click Download ZENworks Tools and then click the
ZENworks Agent tab.
The web browser displays a list of deployment packages for the ZENworks Agent. For each
architecture (32-bit and 64-bit), these are the following types of packages:
Network (.NET required): The network (.NET required) package installs only the pre-agent
on the target device; the pre-agent then downloads and installs the ZENworks Agent from
the ZENworks Server. The network (.NET required) package requires that Microsoft .NET
4.0 or later is installed on the device prior to the deployment of the agent to the device.
Standalone (.NET required): The standalone (.NET required) package requires that
Microsoft .NET 4.0 or later is installed on the device prior to the deployment of the agent
to the device. This package contains all the executable files required for ZENworks Agent
installation except the Microsoft .NET installer.
Standalone: The standalone package installs the pre-agent and extracts all executable files
required for ZENworks Agent installation, including Microsoft .NET installer on the target
device. The pre-agent then installs the ZENworks Agent from the local device. The
standalone package is useful when you need to install the ZENworks Agent to a device that
is currently disconnected from the network. You can save the package to removable media
(CD, USB flash drive, and so on) and have the standalone device run the package from the
media. The ZENworks Agent is installed on the device, but no registration or management
occurs until the device connects to the network.
Custom: The package name, Default Agent, refers to the predefined deployment packages.
The custom deployment packages created through Deployment > Edit Deployment Package
are shown with the name given during the creation of the package.
Standalone (.NET required): The package contains all files required for ZENworks Agent
installation. The package is useful when ZENworks Agent needs to be installed on a device
that is currently disconnected from the network.
Network: The package contains signed ZENworks Pre-agent along with the zone details
when executed downloads and installs the ZENworks Agent.
Signed ZENworks Pre-Agent / Web-Installer: The package contains only Signed ZENworks
Pre-Agent, when executed downloads and installs the ZENworks Agent. On Windows, .NET
4.8 should be installed on the device.
IMPORTANT: If you choose to install a complete package, the installation of Windows Installer
or .NET Framework might require a reboot after you launch the package. A message is displayed
showing various options on rebooting. Select one of the following options:
Do nothing, and auto-reboot occurs after 5 minutes.
Click Cancel. You need to reboot later.
Click OK to reboot immediately.
When the device reboots, the installation automatically resumes.
5 After the completion of the installation, the device reboots automatically if you have rebooted
the device while installing Windows Installer or .NET Framework.
When the device reboots, it is registered in the Management Zone and the ZENworks icon is
placed in the notification area (system tray).
In ZENworks Control Center, the device appears in the \Servers folder or \Workstation
folder on the Devices page.
For information about logging in and using the ZENworks Agent on a device, see “Using the
ZENworks Agent” on page 45.
1 Make sure the device meets the necessary requirements (see “Managed Device Requirements”
in the ZENworks System Requirements).
2 On the target device, open a Web browser and navigate to the following address:
http://server:port/zenworks-setup
Replace server with the DNS name or IP address of a ZENworks Server and replace the port only
if the ZENworks Server is not using the default port (80 or 443).
Replace server with the DNS name or IP address of a ZENworks Server and replace the port only
if the ZENworks Server is not using the default port (443).
The web browser displays a list of deployment packages. For each architecture (32-bit and 64-
bit), these are the following types of packages:
Standalone: The standalone package installs the pre-agent and extracts all executable files
required for ZENworks Agent installation, including the JRE installer on the target device.
The pre-agent then installs the ZENworks Agent from the local device. The standalone
package is useful when you need to install the ZENworks Agent on a device that is currently
disconnected from the network. You can save the package to removable media (for
example, CD, or USB flash drive) and have the standalone device run the package from the
media. The ZENworks Agent is installed on the device, but no registration or management
occurs until the device connects to the network.
Network: The package contains signed ZENworks Pre-agent along with the zone details
when executed downloads and installs the ZENworks Agent.
Signed ZENworks Pre-Agent / Web-Installer: The package contains only Signed ZENworks
Pre-Agent, when executed downloads and installs the ZENworks Agent.
Custom: The package name, Default Agent, refers to the predefined deployment packages.
The custom deployment packages that are created through Deployment > Edit Deployment
Package are shown with the name given during the creation of the package.
3 Click the name of the deployment package that you want to use, save the package to the
device’s local drive, then give executable permissions to the file by running the command
chmod 755 filename.
For information about options that you can use with the package, when launching it from a
command line, see “Package Options for Windows, Linux, and Macintosh” in ZENworks
Discovery, Deployment, and Retirement Reference.
4 (Optional) On a RHEL device, run the following command:
chcon -u system_u -t rpm_exec_t filename
5 In the terminal window, go to the directory where you have downloaded the package, then
launch the package on the device by running the ./filename command.
If you are using Web-Installer to install the agent, then run the following command:
./<filename>.bin -server <PS_IP> -port <port> -sslignore <true/false>
Filename: Name of the package that was downloaded in Step 3.
PS_IP: URL of the Primary Server (Example: pg-lin-up-ps.epm.blr.novell.com)
IMPORTANT: You can install the ZENworks Agent on a Macintosh device if you have root or
administrator permissions.
1 On the target Macintosh device, open a Web browser and enter the following address:
http://<server>/zenworks-setup
Replace <server> with DNS name or the IP address of a ZENworks Server.
2 Click the appropriate Macintosh package to download.
3 At the command prompt, specify executable permissions to the downloaded .bin file by
running the chmod +x <file_name> command.
For more information on the options that you can use with the package, see “Package Options
for Windows, Linux, and Macintosh” in ZENworks Discovery, Deployment, and Retirement
Reference
4 At the command prompt, navigate to the directory where you have downloaded the package,
then launch the package on the device by running the following command:
sudo ./filename
The filename is the name of the package you downloaded in Step 2 on page 44.
5 Log out and log in to the device to view the ZENworks notify icon in the notification area, after
agent installation for the Macintosh device.
In ZENworks Control Center, the device appears in the \Servers folder or \Workstation
folder, on the Devices page.
ZENworks Application
The ZENworks Application is a standalone window that provides access to bundles. You can launch
the window from the Start menu (Start menu > Programs > Novell ZENworks > ZENworks Application).
The ZENworks Application left pane displays the following:
[All] folder: Contains all bundles that have been distributed to you, regardless of the folder in
which they are located.
ZENworks folder: Contains all bundles that have not been assigned to a different folder. The
ZENworks folder is the default folder for bundles; however, administrators can create additional
folders to organize bundles, and can even rename the ZENworks folder.
When you select a folder in the left pane, the bundles that are contained within the folder are
displayed in the right pane. You can:
Install a bundle or launch an application that is already installed.
View the properties of a bundle. The properties include a description of the bundle,
information about who to contact for help with the bundle, when the bundle is available for
use, and the system requirements established for the bundle.
Repair an installed application.
Uninstall an application. This is an administrator-controlled feature that might not be enabled.
ZENworks Explorer
ZENworks Explorer is an extension to Windows Explorer that enables bundles to be displayed in
Windows Explorer, on the desktop, on the Start menu, on the Quick Launch toolbar, and in the
notification area (system tray). The following graphic shows bundles displayed in Windows Explorer.
The following graphic shows bundles displayed on the desktop.
The tasks performed on the bundles in the ZENworks Window can also be performed in the
ZENworks Explorer.
ZENworks Icon
The ZENworks Icon is located in the Windows notification area (system tray). You can click the
icon to display the ZENworks Agent window.
To view the agent properties, right click the ZENworks icon and select Technician Application. The
ZENworks Agent Properties window is displayed.
The left navigation pane of the properties window contains links for the ZENworks Agent status and
its features:
Status: Displays information such as the last time the agent contacted a ZENworks Server and
whether the Agent features are running.
Policies: Displays the policies assigned to the device and the logged-in user, and also displays
whether the policy is effective. It is included only if ZENworks Configuration Management or
ZENworks Endpoint Security Management is enabled.
Bundles: Displays the bundles assigned to the device and the logged-in user. It also displays the
current installation status of each bundle (available, downloading, installing, and so forth) and
whether the bundle is effective (the device meets the requirements for distribution). It is
included only if ZENworks Configuration Management or ZENworks Patch Management is
enabled.
Inventory: Displays inventory information for the device. You can view hardware details, such as
the manufacturer and model of your hard drives, disk drives, and video card. You can also view
software details, such as installed Windows hot fixes and patches, and the version numbers and
locations of installed software products. It is included only if ZENworks Configuration
Management or ZENworks Asset Management is enabled.
NOTE: ZENworks no longer allows you to promote a 32-bit device to the Satellite Server role or add a
new role to an existing 32-bit Satellite Server. From ZENworks 2020 Update 3, the Macintosh devices
are no longer supported as a Satellite Server.
For detailed information about Satellites and how to promote a managed device to a Satellite, see
“Satellites” in the ZENworks Primary Server and Satellite Reference.
ZENworks lets you monitor the activity within your Management Zone through system messages.
“Viewing System Messages” on page 49
“Creating a Watch List” on page 51
System Messages 49
For any object type, click the number in one of its status columns ( ) to display a
listing of all the objects that currently have that status. For example, to see the list of
servers that have a normal status, click the number in the column.
For any object type, click the number in the Total column to display all the objects that
have critical, warning, or normal messages. For example, click the Total count for Servers to
display a list of all servers that have any type of messages.
Acknowledging Messages
A message remains in a message log until you acknowledge it. You can acknowledge individual
messages or acknowledge all messages in the message log at one time.
1 In ZENworks Control Center, click the Devices tab.
2 Navigate the Servers folder until you locate a ZENworks Server.
3 Click the server to display its details.
4 On the Summary tab, locate the Message Log panel.
The Message Log panel lists all messages (informational, warning, and error) generated by the
ZENworks Server. The following table explains the various ways you can acknowledge and
delete messages.
50 System Messages
Task Steps Additional Details
Acknowledge a 1. Click the message to display the If you do not want to acknowledge
message Message Detail Information dialog the message, click Finished to close
box. the dialog box. This causes the
2. Click Acknowledge. message to remain in the Message
Log list.
Delete a message 1. Click the message to display the Deleting a message completely
Message Detail Log dialog box. removes the message from your
2. Click Delete. ZENworks system.
You can also use the messages-acknowledge command in the zman utility to acknowledge
messages associated with devices, bundles, and policies. For more information, see “Message
Commands” in the ZENworks Command Line Utilities Reference.
System Messages 51
To add a device, bundle, or policy to the Watch List:
1 In ZENworks Control Center, click the Home tab.
2 In the Watch List panel, click Add, then select the type of object (device, bundle, or policy) that
you want to add to the list.
3 In the selection dialog box, select the desired object, then click OK to add it to the Watch List.
For example, if you are adding servers, browse and select a server.
Objects remain in the Watch List until you remove them.
52 System Messages
6 Audit Management
6
ZENworks enables you to successfully record and view activities that take place in your ZENworks
system, by using the Audit Management feature. The Audit Management feature enables you to
capture various events that occur in your zone. The details of a captured event can be used for
security and compliance purposes, enabling you to identify who did what and on which system,
when an important event occurs in your environment. Using this feature, you can centrally monitor
activities related to Primary Servers, Satellite Servers, and managed devices.
“Types of Audit Events” on page 53
“Enabling an Event” on page 53
“Viewing a Generated Event” on page 54
Enabling an Event
To audit an event, you must first enable the event in ZENworks Control Center. You can enable the
event at the zone or device level. An event that is enabled at the zone level applies to all devices in
the zone, and an event that is enabled at the device level applies to only the selected device.
1 Log in to ZENworks Control Center.
2 (Zone) To enable events at the zone, click Configuration > Management Zone Settings > Audit
Management.
or
(Devices) To enable events at the device, click Devices > Managed Devices. Locate the device in
the Servers or Workstations folders, click the device object to display its properties, then click
Settings > Audit Management.
3 Click Events Configuration to display the Events Configuration dialog page.
Audit Management 53
4 In the Change Events or Agent Events tab, click Add to display the Add Change Events or Add
Agent Events dialog box.
For information about the change and agent event categories, see ZENworks Audit
Management Reference.
5 Expand the Change Events or Agent Events tree and select the required event.
6 Specify the following information for the Event Settings:
Event Classification: Based on the importance of the event, select Critical, Major, or
Informational.
Days to Keep: Indicate the number of days to keep the event before purging it.
Notification Types: Specify whether the notification should be sent via email, SNMP Trap,
UDP, or to a local file when the event occurs. If you select Log message to a local file, you
must configure the local log file settings.
You can also select all notification types. For more information, see “Using Message
Logging”.
(Agent Events) Specify the Sample Frequency rate at which data should be collected in
order to generate audit events. This field is displayed only if a ZENworks Endpoint Security
Management event or a ZENworks Agent event is selected.
7 Click OK to add the event.
You can edit or delete an event by selecting the event in the Event Configuration page and clicking
Edit or Delete from the menu bar. To select multiple events at a time, press Ctrl and click to select.
54 Audit Management
folder. Hence, all bundle-related events can be viewed in the Bundles folder. The information is
categorized similar to the Events Configuration page. You can browse through events that have
occurred, and if you need more information, you can click the event to view the event details.
(Change Events) Objects: You can also view the audit events for an object within the object
folder. For example, if you select a particular bundle within a bundles folder, you can view the
events generated for that specific bundle.
(Agent Events) Devices Folder: The Audit tab in the Devices folder enables you to view the
events that are generated for a particular device (server or workstation).
To view the generated event details:
1 Log in to ZENworks Control Center.
2 (Dashboard) To view the events in the Dashboard, click Dashboard > Events.
or
(Object Folder) To view the events for all objects in a folder (for example, a device folder,
bundles folder, or policy folder), click the folder's Details link, then click the Audit tab.
or
(Object) To view the events for a specific object (for example, a device, bundle, or policy), click
the object, then click the Audit tab.
(Devices Folder) To view the events in the Devices folder, in the left pane, click Devices. If the
event has been performed on a server in the zone, click the server Details, or if the event has
been performed on a managed device, click the workstation Details. Then click the Audit tab to
view the Events screen.
3 Click the Change Events or Agent Events tab.
4 Expand the tree structure and navigate to the relevant category.
Depending on the number of audit events configured, the relevant count is displayed against
the category.
5 Click the event.
The details of the generated event are displayed in the right pane.
Audit Management 55
56 Audit Management
II Product Administration
I
The following sections provide information to help you use ZENworks products. Before attempting
any of the sections, you should have already completed the configuration tasks in Part I, “System
Configuration,” on page 9.
Chapter 7, “Quick List,” on page 61
Chapter 8, “Asset Management,” on page 69
Chapter 9, “Configuration Management,” on page 81
Chapter 10, “Endpoint Security Management,” on page 113
Chapter 11, “Full Disk Encryption,” on page 119
Chapter 12, “Patch Management,” on page 123
Product Administration 59
60 Product Administration
7 Quick List
7
After you have configured your Management Zone (see Part I, “System Configuration,” on page 9),
you should review the concepts and tasks in the following sections for any ZENworks products that
you have licensed or are evaluating:
“Asset Management” on page 61
“Configuration Management” on page 62
“Security” on page 64
“Endpoint Security Management” on page 64
“Full Disk Encryption” on page 65
“Patch Management” on page 66
Asset Management
ZENworks Asset Management lets you monitor software license compliance, track software usage,
and track software ownership through the allocation of licenses to devices, sites, departments, and
cost centers.
Task Details
Activate Asset Management If you did not activate Asset Management during installation of
the Management Zone, either by providing a license key or by
turning on the evaluation, you must do so before you can use
the product.
Enable the ZENworks Agent to perform The agent’s Asset Management feature is enabled by default
Asset Management operations when ZENworks Asset Management is activated (full license or
evaluation).
Quick List 61
Task Details
Scan devices to collect software and Scan devices to collect software and hardware inventories for
hardware inventory the devices. The inventory information can help you make
decisions about software distribution and hardware upgrades.
This task must be done before you can do any of the remaining
tasks.
Monitor software usage Generate to analyze how much and how often software
products are being used.
Monitor software license See whether the installed software products are properly
compliance licensed, under licensed, or over licensed.
Configuration Management
ZENworks Configuration Management lets you manage a device’s configuration, including
distributing software to the device, applying Windows configuration policies, and imaging and
applying images. In addition, you can collect device hardware and software inventory to inform your
upgrade and buying decisions, and remotely access devices to troubleshoot and solve problems.
The following tasks can be done as needed and in any order.
Task Details
Activate Configuration Management If you did not activate Configuration Management during
installation of the Management Zone, either by providing a
license key or by turning on the evaluation, you must do so
before you can use the product.
62 Quick List
Task Details
Enable the ZENworks Agent to For the ZENworks Agent to perform Configuration Management
perform Configuration Management operations on a device, the appropriate agent features must be
operations enabled. These features (Bundle Management, Image
Management, Policy Management, Remote Management, and
User Management) are enabled by default when ZENworks
Configuration Management is activated (full license or
evaluation).
You should verify that the features are enabled. Or, if you don’t
want to use certain features, you can disable them. For
instructions, see “Enabling Configuration Management in the
ZENworks Agent” on page 82.
Take images of and apply images to Create images of devices, apply images to devices, and run
devices imaging scripts on devices. ZENworks Configuration
Management uses its Preboot Services functionality to perform
these imaging tasks on devices at startup.
Scan devices to collect software and Scan devices to collect software and hardware inventories for
hardware inventory the devices. The inventory information can help you make
decisions about software distribution and hardware upgrades.
Quick List 63
Security
ZENworks Endpoint Security, Full Disk Encryption, and Patch Management capabilities are all
managed under the Security functional group in ZENworks Control Center. One of the key features
of ZENworks Security is the Getting Started pages, which you can use for initial configuration and
deployment of all the capabilities that these products encompass.
The individual product sections in this quick start reference provide information for executing tasks
in the ZENworks Control Center that predate the Getting Started pages in ZENworks Security. For
more information about employing any of Security’s product features from the Security > Getting
Started pages below, see the ZENworks Security reference.
Mitigating Vulnerabilities
Encrypting Devices
Securing Devices
Protecting Against Malware
Task Details
Activate Endpoint Security If you did not activate Endpoint Security Management during
Management installation of the Management Zone, either by providing a
license key or by turning on the evaluation, you must do so
before you can use the product.
Enable the Endpoint Security Agent The Endpoint Security Agent enforces security policies on
devices. It must be installed and enabled on each device to
which you want to distribute security policies.
64 Quick List
Task Details
Create security policies A devices security settings are configured through security
policies. There are 11 types of security policies you can create.
Assign policies to users and devices Security policies can be assigned to users or to devices.
Assign policies to zones To ensure that a device is always protected, you can define
default security policies for each policy type by assigning
policies to the zone. A zone-assigned policy is applied when a
device is not covered by a user-assigned or device-assigned
policy.
Task Details
Activate Full Disk Encryption If you did not activate Full Disk Encryption during installation of
the Management Zone, either by providing a license key or by
turning on the evaluation, you must do so before you can use
the product.
Quick List 65
Task Details
Enable the Full Disk Encryption The Full Disk Encryption Agent performs disk encryption. It must
Agent be installed and enabled on each device whose disks you want
to encrypt.
Create a Disk Encryption policy The information required to encrypt a devices disks is passed to
the Full Disk Encryption Agent via a Disk Encryption policy. You
must create at least one policy.
Assign the policy to devices Disk Encryption policies can only be assigned to devices, device
groups, or device folders.
Patch Management
ZENworks Patch Management lets you automate the process of assessing software vulnerabilities
and applying patches to eliminate the vulnerabilities.
The following tasks must be done in the order listed.
Task Details
Activate Patch Management If Patch Management was not activated during installation of
the ZENworks Management Zone, either by supplying a
subscription license or turning on the evaluation, you need to
activate the product.
Enable the ZENworks Agent to For the ZENworks Agent to perform Patch Management
perform Patch Management operations on a device, the agent’s Patch Management feature
operations must be enabled. The Patch Management feature is enabled by
default when ZENworks Patch Management is activated (full
license or evaluation).
Configure Patch Services and You must start Patch Services and configure the Patch Server on
the Patch Server a ZENworks Server. This server downloads patch data and
displays it in ZENworks Control Center.
66 Quick List
Task Details
Create patch policies After the subscription service has download patches, apply the
desired patches.
Quick List 67
68 Quick List
8 Asset Management
8
The following sections provide explanations and instructions for using ZENworks Asset Management
to collect software and hardware inventory from devices, monitor software usage on devices, and
monitor software license compliance.
“Activating Asset Management” on page 69
“Enabling Asset Management in the ZENworks Agent” on page 69
“Collecting Software and Hardware Inventory” on page 70
“Monitoring Software Usage” on page 72
“Monitoring License Compliance” on page 72
“Allocating Licenses” on page 78
Asset Management 69
NOTE: After enabling the ZENworks Asset Management module, ensure that you enforce a full scan
on all the devices by running the zac inv -f scannow command. Until you perform the scan,
Asset Management report will not be accurate.
70 Asset Management
4 In the task list located in the left navigation pane, click Server Inventory Scan or Workstation
Inventory Scan to initiate the scan.
The QuickTask Status dialog box displays the status of the task. When the task is complete, you
can click the Inventory tab to view the results of the scan.
To scan multiple devices at one time, you can open the folder in which the devices are located,
select the check boxes next to the devices, then click Quick Tasks > Inventory Scan.
You can also use the inventory-scan-now command in the zman utility to scan a device. For
more information, see “Inventory Commands” in the ZENworks Command Line Utilities Reference.
Asset Management 71
Monitoring Software Usage
After you’ve inventoried devices, you can run reports to view how much the devices’ applications
are used. ZENworks Asset Management includes standard reports for application usage by product,
user, and device. You can also customize reports to provide more detailed or focused information.
For example, Asset Management includes a predefined custom report that shows application that
have not been used in the last 90 days.
To run a report that shows how much a specific application is used:
1 In ZENworks Control Center, click the Asset Management tab, then click the Software Usage tab.
2 In the Software Usage Standard panel, click Application Usage to display the list of application
usage reports.
3 In the panel, click Local Application Usage by Product.
The report shows all the products, grouped by software manufacturer, that are installed on the
devices.
4 Find a manufacturer whose products you want to see, then click the number in the Installations
column to display the installed products.
The resulting report shows the current number of installations for each product, how many of
the installations have been used, when it was last used, and other usage information.
5 If you want to change the time period for the report, or change the list of products displayed
(all products, used products, or unused products), click Change Time Period/Filters at the
bottom of the report.
There are many other standard and predefined custom that you can use. For additional information
about application usage, see “Reports” in the ZENworks Asset Management Reference.
72 Asset Management
License Compliance Components
Before you begin implementing compliance monitoring, you need to understand the components
involved and how they work together, as explained in the following illustration and subsequent text.
Figure 8-1 License Compliance Components
Catalog Products
Product A
18 Licenses
Licensed Products
Product A
18 Licenses
15 Installations
Discovered Products
Product A
15 Installations
You scan the devices in your Management Zone to collect the list of installed software
products. These are called discovered products. In the above illustration, the inventory scan
discovered that ProductA is installed on 15 devices.
You create catalog products to represent the software products your organization has
purchased. Typically, each catalog product corresponds to a specific manufacturer part
number. In the above illustration, ProductA is the only catalog product. However, you might
have catalog products for ProductA, ProductA Upgrade, and ProductB.
You create purchase records to represent the purchase orders or invoices for software
products. Each line item in the purchase record lists a catalog product along with the license
purchase quantity. If a catalog product is listed in multiple purchase records, the catalog
product’s total licenses equal the purchase quantity for both purchase records. In the above
illustration, one purchase record includes 10 licenses of ProductA and another purchase record
includes 8 licenses. The total license count for ProductA is 18.
You create licensed products and associate the corresponding discovered products and catalog
products to them. This gives you a single licensed product that includes the number of licenses
and installations for the product. The result is a quick view of whether or not the product usage
complies with the license agreement. In the above illustration, ProductA has 18 licenses and is
installed on 15 devices, so ProductA complies with your license agreement.
Asset Management 73
Discovering Installed Products
If you have not already scanned the devices in your Management Zone to collect information about
installed products (referred to as discovered products), complete the steps in “Collecting Software
and Hardware Inventory” on page 70.
After you have discovered products, choose one whose compliance you want to monitor.
1 In ZENworks Control Center, click the Asset Management tab, then click the License
Management tab.
2 In the License Management panel, click Discovered Products to display the Discovered Products
list.
3 Browse the list to choose the discovered product you want to use.
The product must have a least one installation listed in the Installed Quantity column. If
possible, you should choose a product for which you have a purchase order or invoice readily
available. This allows you to complete the scenario using real information. Otherwise, you can
invent the purchase information as you go. Remember your product choice so that you can use
it later.
4 Continue with the next section, “Creating a Catalog Product and Purchase Record” on page 74.
74 Asset Management
2d Click Next to display the Summary page, the click Finish to add the product to the Catalog
Products list.
2e Click License Management (in the breadcrumb path at the top of the page) to return to the
License Management page.
3 Create the purchase record:
3a In the License Management panel, click Purchase Records.
3b Click New > Purchase Record to launch the Create New Purchase Record Wizard.
3c Fill in the following fields:
PO Number: Specify the purchase order number or invoice number associated with the
software product purchase. If you don’t have PO or invoice for this product, use any
number.
Order Date: Select the date the software was purchased.
Recipient - Reseller: These fields are optional. You can use them to further identify the
purchase record.
3d Click Next to display the Summary page.
3e Select the Define Additional Properties box, then click Finish to create the purchase record
and display its Purchase Details page.
3f Click Add to display the Add Purchase Detail dialog box, then fill in the following fields:
Product: Click to browse for and select the catalog product you created in Step 2.
Quantity: Specify the quantity of product purchased. For example, if the catalog product
you selected is ProductA 10-Pack and the purchase order was for 5 ProductA 10-Packs,
specify 5.
Unit MSRP - Extended Price: These fields are required. Specify the manufacturer’s
suggested retail price (MSRP), the price you paid per unit, and the extended price. If you
leave the Extended Price field blank, the wizard populates it by multiplying the Purchase
Quantity and the Unit Price.
Invoice # - Comments: These fields are optional. You can use them to further identify the
purchase.
3g Click OK.
4 Continue with the next section, Creating a Licensed Product.
Asset Management can also import purchase information from electronic files. During the process,
the purchase record is created as well as any catalog products for software products included in the
purchase record. For more information, see “License Compliance” in the ZENworks Asset
Management Reference.
Asset Management 75
Creating a Licensed Product
The final step in setting up compliance for the software product is to create a licensed product and
associate the discovered product and catalog product with it. Doing so populates the license
product with the installation and license information needed to determine its license compliance
status.
The following steps explain how to use the Auto-Reconcile Wizard to create the licensed product
and associate the discovered product and catalog product with it.
1 In ZENworks Control Center, click the Asset Management tab, then click the License
Management tab.
2 In the License Management panel, click Licensed Products.
3 In the Licensed Products panel, click Action > Auto-Reconcile: Create Licensed Products to launch
the Auto-reconcile Wizard. Complete the wizard using information from the following table to
fill in the fields.
Discovered Product Filter The Auto-Reconcile Wizard creates licensed products from existing
discovered products.To find your discovered product:
1. Click the Products Specified Below option.
2. In the Select list, select the manufacturer of your discovered
product.
3. In the Product field, enter the name of your discovered product.
Select Licensed Products Based on the information you specified on the Discovered Product
to Create Filter page, this page should display your discovered product and the
licensed that will be created for it.
Destination Folder Select the folder where you want to place the new licensed product.
The field defaults to the current folder (the folder from which you
launched the Auto-Reconcile Wizard). To specify another folder, click
to browse for and select the folder. The folder must already exist;
you cannot use the selection dialog to create a new folder.
76 Asset Management
Wizard Page Details
License Entitlements Every licensed product must have at least one entitlement and
license model.
The license model determines how the licenses are counted. Licenses
can be counted per installation, user, or device.
4 If you haven’t done so already, click Finish to create the licensed product and add it to the
Licensed Products list.
5 If the Auto-Reconcile Wizard was unable to associate your catalog product with the licensed
product:
5a Click the licensed product.
5b Click the License Entitlements tab.
5c In the Entitlements panel, click the entitlement.
5d Click the Proof of Ownership tab.
5e In the Catalog Products panel, click Add.
5f Select the catalog product, then click OK to add it to the Catalog Products panel.
The Catalog Products panel displays the catalog product’s Purchase Quantity, which is the
number of units of the catalog product that you’ve purchased (according to the purchase
record). It also displays the License Quantity, which is the total number of licenses
included in the purchased units.
6 Continue with the next section, Viewing Compliance Data, for information about monitoring
compliance.
Asset Management 77
Viewing the Compliance Status Summary
1 In ZENworks Control Center, click the Asset Management tab, then click the License
Management tab.
2 In the License Management panel, click Licensed Products to display the Licensed Products
page.
The Licensed Products list displays all licensed products and their current compliance status:
The software product is properly licensed. The number of purchased licenses equals the
number of installations.
The software product is over licensed. There are more purchased licenses than
installations.
The software product is under licensed. There are fewer purchased licenses than
installations.
Allocating Licenses
ZENworks Asset Management lets you allocate licenses within your organization to track ownership
and distribution of the licenses. You can allocate licenses to devices or demographics (sites,
departments, and cost centers).
A device allocation is the assignment of a license to a specific device. The device can have the
product installed or not installed. For example, you purchase 10 licenses of ProductA. You can
allocate the licenses to the target devices before ProductA is even installed on the devices.
A demographic allocation is the assignment of one or more licenses to a site, department, or cost
center. Any device that is assigned the demographic and has the product installed shows up as an
installation associated with the allocation. For example, you purchase 15 licenses of ProductA and
78 Asset Management
allocate them to DepartmentQ. There are 20 devices assigned to DepartmentQ. Of those 20 devices,
12 have ProductA installed. The result is that the DepartmentQ allocation shows 15 allocated
licenses with 12 installations.
The following steps explain how to allocate licenses to devices. For information about allocating
licenses to demographics, see “License Allocation” in the ZENworks Asset Management Reference.
1 In ZENworks Control Center, click the Asset Management tab.
2 On the License Management page, click Licensed Products.
3 In the Licensed Products list, click the licensed product for which you want to allocate licenses.
4 By default, only device allocation is enabled to track ownership for product licenses. To allocate
licenses to demographics, a user has to perform the following steps to enable demographic
allocation for the product:
4a Click the General tab.
4b In the License Allocation Settings panel, fill in the following fields:
Enable demographic allocations: Select this option.
Demographic allocation type: All demographic allocations for a single licensed product
must be of the same type. Select the type (Site, Department, Cost Center) you want to use
for this product.
Update license allocations with demographic data from future purchase record imports:
Select this option if, when importing future purchase records for the product, you want to
automatically update the allocated license quantity based on the purchase record’s
demographic data.
For example, assume that the product is using Department allocations. You import a
purchase record that includes licenses assigned to DepartmentQ. The licenses are added
as a DepartmentQ demographic allocation.
Also creates new allocations if necessary. For example, if a purchase record includes
ProductA licenses that are assigned to a DepartmentZ (a new department not listed in
ProductA’s allocations), a new allocation for DepartmentZ is created.
Allocated Quantity: Displays the total number of allocated licenses, either to devices or to
demographics.
4c Click Apply to save any changes.
5 Click the License Allocations tab.
6 (Optional) To see which devices have the product installed but do not have an allocated license,
click the Installations with no allocations number in the Device Allocations panel.
7 Click Add > Devices with Product Installed if the device you want to allocate a license to has the
product installed.
or
Click Add > Any Devices if the device you want to allocate a license to does not have the product
installed.
The Search for Device dialog box is displayed.
8 In the Device Type field, select whether you want to search Managed Devices, Inventoried
Devices, Managed or Inventoried Devices, ZAM Migrated Devices, or All.
If you are not sure of the device type, select All.
Asset Management 79
9 To limit the search, use the filters to create the search criteria.
If you don’t create filters, all devices (or all devices with the product installed) are displayed, up
to the maximum display number.
10 Specify the maximum number of devices you want the search to display.
11 Select the columns you want displayed in the resulting search dialog box. Control-click to select
multiple fields.
12 Click Search to display a Select Device dialog box that lists the search results.
13 Select the devices you want to allocate licenses to, then click OK.
The following information is provided for the allocation:
Machine Name, Login Name, and IP Address: Standard information about the device,
including the login name of the user who was logged in at the time the device was
inventoried.
Site, Department, Cost Center: Demographic data about the device. If one or more of the
fields is empty, the device’s inventory data does not contain that information.
Installed Quantity: The number of installations of the licensed product on the device. This
should typically be 1.
Duplicate Allocation: Includes a check mark if the device’s installation is also included in a
demographic allocation.
Installations with No Allocations: Displays the number of installations that are not
allocated a license either through a demographic allocation or a device allocation. Click the
number to display the list of installations.
80 Asset Management
9 Configuration Management
9
The following sections provide explanations and instructions for the tasks you can perform with
ZENworks Configuration Management. Depending on your environment and the functionality you
plan to use, you might not need to know how to perform all tasks. For the ones you decide to learn
about, you can review them in any order.
“Activating Configuration Management” on page 81
“Enabling Configuration Management in the ZENworks Agent” on page 82
“Distributing Software” on page 82
“Applying Policies” on page 84
“Imaging Devices” on page 86
“Remotely Managing Devices” on page 94
“Collecting Software and Hardware Inventory” on page 102
“Linux Management” on page 103
“Managing Mobile Devices” on page 104
“Enrolling Mobile Devices” on page 105
Configuration Management 81
Enabling Configuration Management in the ZENworks
Agent
For the ZENworks Agent to perform Configuration Management operations on a device, the
appropriate agent features must be enabled. These features (Bundle Management, Image
Management, Policy Management, Remote Management, and User Management) are enabled by
default when ZENworks Configuration Management is activated (full license or evaluation).
You should verify that the features are enabled. Or, if you don’t want to use certain features, you
can disable them. For instructions, see “Configuring ZENworks Agent Features” on page 39.
Distributing Software
ZENworks Configuration Management provides great flexibility in distributing software. You can
distribute applications and individual files; simply make modifications to existing files on a device;
install, remove, and roll back applications on your devices.
Software is distributed though the use of bundles. A bundle consists of all the files, configuration
settings, installation instructions, and so forth required to deploy and manage the application or
files on a device. When you assign a bundle to a device, you can install and launch it on the device
according to the schedules (distribution, launch, and availability) that you define.
You can also view the summary of the assignment, distribution, install and launch status of the
bundle, using the Bundle dashboard. For more information, see ZENworks Software Distribution
Reference.
There are four types of bundles you can create:
Corporate Bunde: Allows you to configure and manage corporate resources on mobile devices.
iOS/iPadOS Bunde: Allows you to deploy applications and install profiles on iOS and iPadOS
devices. devices.
Linux Bundle: Allows you to configure and manage applications on Linux devices.
Linux Dependency Bundle: Allows the software packages to be available on Linux devices to
resolve package dependencies.
Macintosh Bundle: Allows you to configure and manage applications on Macintosh devices.
Preboot Bundle: Allows you to perform a set of tasks on a managed or unmanaged device
before the operating system boots up on the device.
Windows Bundle: Allows you to configure and manage applications on Windows devices.
Android bundles (work apps associated with Android in the enterprise) and Apple VPP bundles are
created automatically as soon as ZENworks syncs with the respective Google and Apple servers.
However, you can create additional Android or Apple VPP bundles. For more information, see
Provisioning Applications.
The software included with a bundle is uploaded to the ZENworks Server repository. This enables
the ZENworks Server to distribute the software without requiring access to any other network
locations.
82 Configuration Management
Watch the following videos to learn about distributing software to Windows, Linux, and Macintosh
devices:
Creating a Bundle
To create a software bundle, you use the Create New Bundle Wizard. In addition to helping you
create the bundle, the wizard also lets you assign it to devices and users and create distribution,
launch, and availability schedules.
1 In ZENworks Control Center, click the Bundles tab.
2 In the Bundles panel, click New > Bundle to launch the Create New Bundle Wizard.
3 Follow the prompts to create the bundle.
Click the Help button on each wizard page for detailed information about the page.
When you complete the wizard, the bundle is added to the Bundles panel. You can click the
bundle to view and modify the bundle’s details.
4 Continue with the next section, Assigning a Bundle.
You can also use the bundle-create command in the zman utility to create a software bundle. For
more information, see “Bundle Commands” in the ZENworks Command Line Utilities Reference.
Assigning a Bundle
After you create a bundle, you need to assign it to the devices where you want it installed. You can
make assignments to devices or to users.
1 In the Bundles panel, select the bundle you want to assign by selecting the check box next to it.
2 Click Action > Assign to Device.
or
Click Action > Assign to User.
3 Follow the prompts to assign the bundle.
Click the Help button on each wizard page for detailed information about the page.
When you complete the wizard, the assigned devices or users are added to the bundle’s
Relationships page. You can click the bundle to view the assignments.
You can also use the bundle-assign command in the zman utility to assign a bundle. For more
information, see “Bundle Commands” in the ZENworks Command Line Utilities Reference.
Configuration Management 83
Where to Find More Information
For more information about distributing software, see the ZENworks Software Distribution
Reference.
For more information on distributing apps to mobile devices, see ZENworks Mobile Management
Reference.
Applying Policies
ZENworks Configuration Management lets you use policies to create a set of configurations that can
be assigned to any number of managed devices. It helps you to provide the devices with a uniform
configuration, and it eliminates the need to configure each device separately.
ZENworks Configuration Management policies help you manage the external services, puppet policy
related settings, Internet Explorer favorites, Windows Group policies, local file rights, A/C Power
Management settings, printers, SNMP service settings, roaming profiles, and configure dynamic
local user accounts and manage them on the managed devices. You can also configure the behavior
or execution of a Remote Management session on the managed device, and administer as well as
centrally manage the behavior and features of ZENworks Explorer.
The following section contains the list of Windows Configuration policies that can be created and
assigned to a user or a managed device.
Browser Bookmarks Policy: Configures Internet Explorer favorites for Windows devices and
users.
Dynamic Local User Policy: Configures users created on Windows XP, Windows Vista, Windows
7 workstations; and Windows 2003, Windows 2008, Windows 2008 R2 Terminal Servers after
the users have successfully authenticated to Novell eDirectory.
Local File Rights Policy: Configures rights for files or folders that exist on the NTFS file systems.
The policy can be used to configure basic and advanced permissions for both local and domain
users and groups. It provides the ability for an administrator to create custom groups on
managed devices.
Power Management Policy: Configures Power Management settings on the managed devices.
Watch a video that demonstrates how to use configure a Power Management policy.
Printer Policy: Configures Local, SMB, HTTP, TCP/IP, CUPS, and iPrint printers for Windows
devices and users.
Remote Management Policy: Configures the behavior or execution of a Remote Management
session on a managed device. The policy includes properties such as Remote Management
operations, security, and so forth. A Remote Management policy can be assigned to users as
well as managed devices.
Roaming Profile Policy: Allows the user to configure the path where his or her user profile
should be stored.
A user profile contains information about a user’s desktop settings and personal preferences,
which are retained from session to session.
84 Configuration Management
Any user profile that is stored in a network path is known as a roaming profile. Every time the
user logs on to a machine, his or her profile is loaded from the network path. This helps the
user to move from machine to machine and still retain consistent personal settings.
SNMP Policy: Configures SNMP parameters on the managed devices.
Windows Group Policy: Configures Group Policy for Windows devices and users.
ZENworks Explorer Configuration Policy: Allows you to administer and centrally manage the
behavior and features of ZENworks Explorer.
The following section contains the list of Linux Configuration policies that can be created and
assigned to a user or a managed device.
External Services Policy: Configures the external services on a Linux-managed device for the
YUM, ZYPP or MOUNT repositories. It provides the ability for an administrator to download and
install software packages or updates from these repositories, on the managed devices.
Puppet Policy: Specifies how to run puppet manifests and modules on a managed device,
upload the script files, and specifies if a dry run of the script should be performed on the
device.
The following section lists the policies that are applicable for mobile devices enrolled in the zone.
Mobile Device Control Policy: Enables you to allow or restrict users from accessing the various
features of a mobile device.
Mobile Email Policy: Enables you to manage the corporate email account on mobile devices.
Mobile Enrollment Policy: Enforces which users can enroll their mobile devices, what mobile
devices the users can enroll, the mode to be used for mobile device enrollment, and the
location and naming of the device.
Mobile Security Policy: Configures the password restrictions, encryption settings, and device
inactivity settings on devices.
Mobile Compliance Policy: Ensures devices are compliant with the rules applied on these
devices.
Android Enterprise Enrollment Policy: Allows users to enroll their Android devices in the work
profile mode or in the work-managed device mode as part of the Android Enterprise program.
Intune App Protection Policy: Enforces restrictions on Microsoft Intune apps such as
restricting cut, copy and paste actions on the app and enforcing the usage of a PIN to access an
Intune app. This is applicable for iOS, iPadOS, and Android devices.
Creating a Policy
To create a policy, you use the Create New Policy Wizard. In addition to helping you create the
policy, the wizard also lets you assign it to devices and users and decide whether to enforce the
policy immediately or wait until the device refreshes its information.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies panel, click New > Policy to display the Select Platform page.
3 Select the policy category, then click Next to display the Select Policy Category page.
4 Select the category of policy you want to create, then click Next.
Configuration Management 85
5 Select a Policy Type from the list of policies provided. Follow the on-screen prompts to create
the policy.
Click the Help button on each wizard page for detailed information about the page.
When you complete the wizard, the policy is added to the Policies panel. You can click the
policy to view the policy’s details and modify assignments.
You can also use the policy-create command in the zman utility to create a policy. For more
information, see “Policy Commands” in the ZENworks Command Line Utilities Reference.
Assigning a Policy
After you create a policy, you need to assign it to the devices where you want it applied. You can
make assignments to devices or to users.
1 In the Policies panel, select the policy you want to assign by selecting the check box next to it.
2 Click Action > Assign to Device.
or
Click Action > Assign to User.
3 Follow the prompts to assign the policy.
Click the Help button on each wizard page for detailed information about the page.
When you complete the wizard, the assigned devices or users are added to the policy’s
Relationships page. You can click the policy to view the assignments.
You can also use the policy-assign command in the zman utility to assign a policy. For more
information, see “Policy Commands” in the ZENworks Command Line Utilities Reference.
Imaging Devices
ZENworks Configuration Management includes a preboot service that enables you to perform tasks
on devices before their operating systems boot up. Using Preboot Services, you can automatically or
manually do the following to a device when it boots up:
Run ZENworks imaging scripts containing any commands that you can issue at the bash prompt
Take an image of the device’s hard drives and other storage devices
Restore an image to the device
Take part in a session where an existing image is applied to multiple devices via multicast
Take or restore a WIM image by using ImageX
Take or restore a Ghost image by using Symantec Ghost
86 Configuration Management
To accomplish some of these tasks automatically, you simply need to have PXE (Preboot Execution
Environment) enabled on your devices, then configure prebootable tasks in ZENworks Control
Center and assign them to the devices. Then, the devices can automatically implement these tasks
when they boot.
To manually implement the tasks, you can configure devices to require user intervention during
bootup.
Using ZENworks Control Center, you can also replicate the tftp directory changes from a Primary
Server to other Imaging servers (Primary Server or Satellite device with the Imaging role).
“Setting Up Preboot Services” on page 87
“Taking an Image” on page 90
“Applying an Image” on page 91
“Where to Find More Information” on page 94
Configuration Management 87
Configuring the Third-Party Imaging Settings
If you want to use the third-party imaging solutions, you must configure the Third-Party Imaging
Settings in ZENworks Control Center. ZENworks supports the following third-party imaging tools:
Microsoft ImageX that uses the WIM image file format and WINPE as the distro
Symantec Ghost that uses the Ghost image file format and WINPE as the distro
The ZENworks third-party Imaging supports only PXE as the boot mechanism.
To configure the Third-Party Imaging settings:
1 Install ZENworks Configuration Management on your Imaging Server.
For more information on how to install ZENworks 2020, see “Installing a ZENworks Primary
Server on Windows” in the ZENworks Server Installation.
2 Configure the third-party Imaging settings in ZENworks Control Center.
2a Ensure that Microsoft Windows Automated Installation Kit (WAIK) or Windows
Assessment and Deployment Kit (WADK)is installed on the device running ZENworks
Control Center.
2b In ZENworks Control Center, click Configuration tab.
2c In the Management Zone Settings panel, click Device Management > Preboot Services > the
Third Party Imaging Settings panel.
2d For 32 Bit Upload Settings:
Upload WinPE Base Distribution (Requires Windows AIK / Windows ADK): Click the
icon to upload the WIM Imaging file. In the Upload WIM Imaging Files dialog box, do the
following:
1. To upload a 32-bit winpe.wim file:
From WAIK: Browse to the Windows AIK\Tools\PETools\x86 folder under the
installed directory, then select the winpe.wim file.
From WADK: Browse to the Windows Kits\<version>\Assessment and
Deployment Kit\Windows Preinstallation Environment\x86\en-us
folder under the installed directory, then select the winpe.wim file.
Where <version> is a Windows Operating System version.
NOTE: Re-uploading the winpe.wim file overwrites the previous instance of this file
from the server.
2. Click OK.
This downloads the imaging files from the server to the device where you access
ZENworks Control Center and rebuilds winpe.wim with imaging files and then
uploads files from the device to the server. The progress of the download and upload
files is displayed in the Status field.
Upload ImageX Files to Support WIM Imaging (ImageX.exe):
1. Click the icon to browse for and select the Microsoft Imaging engine
(imagex.exe) on the device where you can access ZENworks Control Center.
2. After configuring the third-party imaging settings, click Apply.
88 Configuration Management
3. Click Status to view the status of content replication across all Primary Servers and
Satellites with the Imaging role in the management zone. Ensure that you start the
Imaging operation only when the status is Available.
NOTE: If you are uploading both 32-bit and 64-bit ImageX files, ensure that you do so
in different instances.
NOTE: If you are uploading both 32-bit and 64-bit ImageX files, ensure that you do so
in different instances.
Configuration Management 89
2. After configuring the third-party imaging settings, click Apply.
3. Click Status to view the status of content replication across all Primary Servers and
Satellites with the Imaging role in the management zone. Ensure that you start the
Imaging operation only when the status is Available.
3 Enable PXE on the device.
4 Ensure that you have a standard DHCP server, either on your Imaging Server or on another
network server.
Taking an Image
You can take and restore ZENworks images on a device by using ZENworks Imaging and third-party
images by using the ZENworks Third-Party Imaging utility. This utility allows you to take an image
and restore it on a local device or server by using Windows Imaging format (WIM) or Ghost Imaging
format.
1 In ZENworks Control Center, click the Devices tab.
2 Navigate the Servers or Workstations folder until you locate the device whose image you
want to take.
3 Click the device to display its details.
4 In the task list located in the left navigation pane, click Take an Image to launch the Take an
Image Wizard.
5 On the File Information page, fill in the following fields, then click Next.
For ZENworks imaging, specify the following:
Image Format: Select the format of the image to be taken for the device
Server and File Path: Click the icon to display the Server and Path Information dialog box.
Configure the following options.
Server Object/IP/DNS: Click the icon to browse for and select the object, IP address, or
DNS name of the Primary Server or the device that is promoted to the Imaging Server role.
File Path on Server: Click the icon to browse for and select an image file. The image file
must have the .zmg filename extension, meaning it is a valid ZENworks image file.
NOTE: You cannot browse to the specified file system if multiple search domains with
DHCP are configured for Linux and if the server is on Windows.
90 Configuration Management
Shared Network Path for Image File: Specify the shared-network path where you want to save
the .wim or .gho files. The directory must be a Windows share or a Linux SMB or CIFS share.
If you have not installed the Novell File Upload extension on this device, you must do so before
you can browse to and upload directories to be installed.
Image Filename: Specify the filename to save the .wim or the .gho file. This option is displayed
only for the Windows Imaging Format (.wim) and Ghost Imaging Format (.gho).
Network Credential: Click to browse for and select the network credentials to be used for
accessing the device having .wim files. This option is displayed only for the Windows Image
Format (.wim) and Ghost Image Format (.gho).
Use Compression: Compression is required. Choose one of the following:
Balanced: Automatically balances compression between an average of the reimaging
speed and the available disk space for the image file. This option is displayed only for the
ZENworks Image format
None: This option is displayed only for the Windows Image format and Ghost Image
format.
Optimize for Speed: Optimizes the compression to allow for the fastest reimaging time.
Use this option if CPU speed is an issue.
Optimize for Space: Optimizes the compression to minimize the image file’s size to
conserve disk space. This can cause reimaging to take longer.
Balanced is the default option for the ZENworks Image format and Optimize for Speed is the
default option for the Windows Image format and Ghost Image format.
Create an Image Bundle: Leave this field deselected.
6 Review the information on the Image File Summary page, click Finished, then click OK.
Because imaging tasks are completed by Preboot Services, the image of the device is taken the
next time the device reboots. The Imaging Work panel, located on the device’s Summary page,
shows that the work is scheduled. When the work is completed, the task is removed from this
panel.
7 To reboot the device immediately and initiate the imaging work, click Reboot/Shutdown
Workstation (or Reboot/Shutdown Server) in the left navigation panel.
The time required to take the image depends on the size of the device’s drives.
Applying an Image
To apply an image to a device, you use the Create New Bundle Wizard to create an Imaging bundle.
The bundle contains the image you want to apply. In addition to helping you create the bundle, the
wizard also lets you assign it to devices. After creating the Imaging bundle, you then initiate the
imaging work.
“Creating the ZENworks Image Bundle” on page 92
“Creating the Third-Party Image Bundle” on page 92
“Initiating the Imaging Work” on page 93
Configuration Management 91
Watch the following videos to learn about deploying Windows 7 images and Linux images to devices:
Define Details page Specify a name for the task. The name cannot include any of the
following invalid characters: / \ * ? : " ' < > | ` % ~
Summary page Click Next to continue with the wizard and assign the bundle to
the target device.
Bundle Groups page You should not assign the image bundle to any groups. Click Next
to bypass this page.
Add Assignments page Select the device where you want to apply the image.
Schedules page You should not assign a schedule to the image bundle. Click Next
to bypass this page.
Finish page Click Finish to create the bundle and assign it to the selected
device.
92 Configuration Management
4 On the Select Bundle Category page, select Third-Party Image, then click Next.
5 Complete the wizard using information from the following table to fill in the fields.
Define Details page Specify a name for the task. The name cannot include any of the
following invalid characters: / \ * ? : " ' < > | ` % ~
Summary page Click Next to continue with the wizard and assign the bundle to
the target device.
Bundle Groups page You should not assign the image bundle to any groups. Click Next
to bypass this page.
Add Assignments page Select the device where you want to apply the image.
Schedules page You should not assign a schedule to the image bundle. Click Next
to bypass this page.
Finish page Click Finish to create the bundle and assign it to the selected
device.
Configuration Management 93
Because imaging tasks are completed by Preboot Services, the image is applied to the device
the next time the device reboots. The Imaging Work panel, located on the device’s Summary
page, shows that the work is scheduled. When the work is completed, the task is removed from
this panel.
5 To reboot the device immediately and initiate the imaging work, click Reboot/Shutdown
Workstation (or Reboot/Shutdown Server) in the left navigation panel.
Remote View Lets you connect with a managed device so that you
can view the managed device instead of controlling
it. This helps you troubleshoot problems that the
user encountered.
94 Configuration Management
Remote Operation Description Additional Details
Remote Execute Lets you run any executable on a managed device This operation is supported
from the management console.To remotely execute only on a Windows managed
an application, specify the executable name in the device.
Remote Execute dialog box. If the application is not in
the system path on the managed device, then
provide the complete path of the application.
Remote Diagnostics Lets you diagnose and analyze the problems on a This operation is supported
managed device. This helps you to shorten problem only on a Windows managed
resolution times and assist users without requiring a device.
technician to physically visit the problem device. This
increases user productivity by keeping desktops up
and running.
File Transfer Lets you to transfer files between the management This operation is supported
console and a managed device. only on a Windows managed
device.
For more information on File Transfer operation, see
“Performing a File Transfer Operation” on page 100.
Remote Login Lets you log in to a managed device from the This operation is supported
management console and start a new graphical only on a Linux managed
session without disturbing the user on the managed device.
device; however, the user on the managed device
cannot view the Remote Login session. You must log into the device
with a non-root user
For more information on Remotely Logging a Linux credentials.
device, see “Performing Remote Control, Remote
View, and Remote Login Operations on a Linux
Device” on page 101.
Remote SSH Lets you securely connect to a remote Linux device This operation is supported
and safely execute commands on the device. only on a Linux managed
device.
For more information on Remotely Logging a Linux
device, see “Performing Remote SSH Operation on a
Linux Device” on page 102
Configuration Management 95
The following sections explain how to set up Remote Management and perform each of the
operations:
“Creating a Remote Management Policy” on page 96
“Configuring Remote Management Settings” on page 97
“Performing Remote Control, Remote View, and Remote Execute Operations on a Windows
Device” on page 97
“Performing a Remote Diagnostic Operation” on page 99
“Performing a File Transfer Operation” on page 100
“Performing Remote Control, Remote View, and Remote Login Operations on a Linux Device”
on page 101
“Performing Remote SSH Operation on a Linux Device” on page 102
“Where to Find More Information” on page 102
96 Configuration Management
Configuring Remote Management Settings
The Remote Management configuration settings, located on the Configuration page, let you specify
settings such as the Remote Management port, session performance, and available diagnostic
applications.
The settings are predefined to provide the most common configuration. If you want to change the
settings:
1 In ZENworks Control Center, click the Configuration tab.
2 In the Management Zone Settings panel, click Device Management > Remote Management.
3 Modify the settings as desired.
Click the Help button on the page for detailed information about the page.
4 When you are finished modifying the settings, click Apply or OK to save your changes.
Configuration Management 97
Port: Specify the port number on which the Remote Management Agent is listening. By default,
the port number is 5950.
Session Mode: Select one of the following modes for the session:
Collaborate: Allows you to launch a Remote Control session and a Remote View session in
collaboration mode. However, you cannot first launch a Remote View session on the
managed device. If you launch the Remote Control session on the managed device, then
you get all the privileges of a master Remote Operator, which include:
Inviting other Remote Operators to join the remote session.
Delegating Remote Control rights to a Remote Operator.
Regaining control from the Remote Operator.
Terminating a Remote Session.
After the Remote Control session has been established for the managed device in the
Collaborate mode, the other remote sessions on the managed device are Remote View
sessions.
Shared: Allows more than one Remote Operator to simultaneously control the managed
device.
Exclusive: Allows you to have an exclusive remote session on the managed device. No
other remote session can be initiated on the managed device after a session has been
launched in Exclusive mode.
Session Encryption: Ensures that the remote session is secured by using SSL encryption (TLSv3
protocol).
Enable Caching: Enables caching of the remote management session data to enhance
performance. This option is available only for Remote Control operation. This option is
currently supported only on Windows.
Enable Dynamic Bandwidth Optimization: Enables detection of the available network
bandwidth and accordingly adjusts the session settings to enhance performance. This option is
available only for Remote Control operation.
Route Through Proxy: Enables the remote management operation of the managed device to
be routed through a proxy server. If the managed device is on a private network or is on the
other side of a firewall or router that is using NAT (Network Address Translation), the remote
management operation of the device can be routed through a proxy server. Fill in the following
fields:
Proxy: Specify the DNS name or the IP address of the proxy server. By default, the proxy
server configured in the Proxy Settings panel to perform the remote operation on the
device is populated in this field. You can specify a different proxy server.
Proxy Port: Specify the port number on which the proxy server is listening. By default, the
port is 5750.
Use the Following Key Pair for Identification: If an internal certificate authority (CA) is
deployed, the following options are not displayed. If an external CA is deployed, fill in the
following fields:
Private Key: Click Browse to browse to and select the private key of the remote operator.
98 Configuration Management
Certificate: Click Browse to browse to and select the certificate corresponding to the
private key. This certificate must be chained to the certificate authority configured for the
zone.
The supported formats for the key and the certificate are DER and PEM.
Install Remote Management Viewer: Click on the Install Remote Management Viewer link to
install the Remote Management Viewer. This link is displayed only if you are performing the
Remote Management session on the managed device for the first time or if the Remote
Management Viewer is not installed on the managed device.
6 Click OK to launch the session.
Configuration Management 99
Enable Dynamic Bandwidth Optimization: Enables detection of the available network
bandwidth and accordingly adjusts the session settings to enhance performance.
Route Through Proxy: Enables the remote management operation of the managed device to
be routed through a proxy server. If the managed device is on a private network or is on the
other side of a firewall or router that is using NAT (Network Address Translation), the remote
management operation of the device can be routed through a proxy server. Fill in the following
fields:
Proxy: Specify the DNS name or the IP address of the proxy server. By default, the proxy
server configured in the Proxy Settings panel to perform the remote operation on the
device is populated in this field. You can specify a different proxy server.
Proxy Port: Specify the port number on which the proxy server is listening. By default, the
port is 5750.
6 Click OK to launch the session.
Linux Management
Linux Management makes it easy to embrace and extend Linux within your existing environment. It
uses policy-driven automation to deploy, manage, and maintain Linux resources. The automated
and intelligent policies allow you to provide centralized control across the life cycle of Linux systems
Patch Management
Patch Management is a fully integrated feature of ZENworks that provides agent-based patch,
vulnerability patch, and compliance management solution.
Patch Management provides the following capabilities:
Uses signatures to determine the required patches and them back for easy reporting.
Implements mandatory baselines for certain patches to always be present on a device.
Patches only the SLES and RHEL distributions.
For more information, see the Chapter 12, “Patch Management,” on page 123.
Prerequisites
Add a DEP Server in ZCC that links the ZENworks MDM Server and the virtual MDM Server in
the Apple portal.
Assign devices to the virtual MDM Server in the Apple portal. These devices are then
discovered by ZENworks and populated in ZCC.
(Optional) Assign users to the device, if you want only this user to be associated with the device
during DEP enrollment.
(Optional) Modify the DEP profile settings to enhance the enrollment process.
(Conditional) If you modify the DEP profile, ensure that modified DEP profile is successfully
assigned to the Apple Portal.
Additionally:
Assign a Mobile Enrollment Policy.
(Conditional) If you are re-enrolling a device that was retired by another user, then ensure that
the earlier device object is deleted in ZCC.
(Optional) Assign a Mobile Email Policy to configure the email account on the device.
For more information on each of these tasks, see ZENworks Mobile Management Reference.
Procedure
Follow the setup prompts to enroll the device. After the user configures the Wi-Fi settings, log-in to
the device with the user credentials. If the device is assigned to a specific user, then the credentials
of only this user should be specified or else enrollment will fail.
After the device enrolls, you can view the Deployment Status of the device in ZCC, which should
have changed from Discovered to Managed. You can view this status on the device’s summary page.
Prerequisites
Assign a Mobile Enrollment Policy.
Copy the Apple Enrollment URL, which specifies the MDM Server to which the device will
enroll. To obtain this, in ZCC navigate to Configuration > Infrastructure Management > MDM
Servers. Select a MDM Server and click Apple Enrollment URL.
(Optional) Assign a Mobile Email Policy to configure the email account on the device.
For more information on each of these tasks, see ZENworks Mobile Management Reference.
Procedure
1 Connect the device through the USB port to the Mac.
2 Right-click and select Prepare or select Prepare from the top menu bar in the Apple
Configurator.
3 Select Manual in the Configuration drop down menu. Click Next.
4 Select the MDM Server to which you want the device to enroll. If you do not have the MDM
Server saved in the drop-down menu, then select New Server.
5 Specify a name for the server and paste the Apple Enrollment URL copied from ZCC. To obtain
this, in ZCC navigate to Configuration > Infrastructure Management > MDM Servers. Select a
MDM Server and click Apple Enrollment URL. Copy the URL and paste it in the Define an MDM
Server page in the Apple Configurator. This MDM Server will be saved for future use.
6 Select Supervise devices, if you want to set the device as supervised. The check box to Allow
devices to pair with other computers is automatically enabled.
7 Select the organization that will supervise these devices.
8 Select the appropriate option from the Setup Assistant drop-down menu, if you want to skip
certain setup steps during enrollment of the device. Check the setup items that should be
presented during device enrollment.
9 Click Prepare to prepare the connected device.
After the preparation stage, the iOS/iPadOS device will reset to its factory settings. After the device
is reset, follow the prompts that will be displayed on the iOS/iPadOS device as configured in the
Configure iOS Setup Assistant page in the Apple Configurator. After entering the Wi-Fi password, the
user will be prompted for the user credentials.
Procedure
1 Enter ZENworks_server_address/zenworks-eup, where ZENworks_server_address is
the DNS name or IP address of the ZENworks MDM Server, in the Safari browser on the device.
The login screen for the ZENworks User Portal is displayed.
2 Enter the user’s user name and password. If Allow Simple Enrollment option is selected for the
user source to which the user belongs, then the registration domain need not be specified or
else specify the registration domain.
All devices associated with the user, are displayed in the ZENworks User Portal.
3 Tap Enroll in the upper-right corner to display the enrollment options for the device.
4 Tap Managed Device Only to display the Enroll Device Options screen. If you have configured
your Mobile Device Enrollment policy to allow the user to specify the device ownership
(corporate or personal), you are prompted for that information. Select the appropriate device
ownership option and click OK.
5 Tap Download Certificate to display the Install Profile screen.
NOTE: If you are enrolling an iOS 12.1.2 or older device, on clicking Download Certificate, you
will be navigated to the Install Profile screen. Click Install and follow the prompts to install the
profile.
NOTE: If the user is enrolling an iOS 12.1.2 or older device, then on clicking Download Profile,
the user will be navigated to Install Profile screen. Tap Install and follow the prompts to install
the profile.
Prerequisites
Mandatory Settings
Create an Android Enterprise Subscription.
Create and assign a Mobile Enrollment Policy.
Create and assign an Android Profile Enrollment Policy.
Ensure that the Android version is 5.0 or newer (for the work profile mode) or 6.0 or newer (for
work-managed device mode.
Optional Settings
Invite users to enroll their devices.
Procedure
The scenario elaborated in this section is meant for users who are enrolling their devices to
ZENworks for the first time. For users who have already enrolled their devices in the basic mode
(Android App only) and want to enroll in the work profile mode, see Work Profile Enrollment for
Existing Users.
Procedure
1 Install the ZENworks Agent App from Google Play Store. Alternatively, the user can follow the
procedure mentioned in the invite letter to download the ZENworks Agent app.
2 Click Open, after installation. A brief description of the ZENworks Agent is displayed. The user
clicks Continue.
3 Click Activate this Device Administrator to enable device management using the app.
4 Log into the app by specifying the following:
Username, Password, Domain, Server URL: Specify the username, password, and registration
domain (if Allow Simple Enrollment is disabled for the user) along with the server URL of the
ZENworks MDM Server. The user can obtain this information from the invite letter.
5 Specify the device ownership (corporate or personal) if you configured the Mobile Enrollment
policy to allow the user specify the ownership. Tap OK.
6 Follow the prompts appearing in the remaining screens and the device will automatically set up
a work profile and enroll to ZENworks.The ZENworks Agent App Home screen is displayed that
shows the device as enrolled and active.
7 View the device information in ZCC. Click Devices > Mobile Devices (or navigate to the folder as
configured in the Mobile Enrollment Policy) from the left hand navigation pane in ZCC. Click the
appropriate device and view its details in the Summary page. The enrollment mode is displayed
as Android App and Work Profile Mode is also enabled.
After your device is enrolled, a Badge icon attached to the ZENworks Agent App icon and other
system apps will help differentiate work apps from personal apps.
Prerequisites
Mandatory Settings
Create an Android Enterprise Subscription.
Create and assign a Mobile Enrollment Policy.
Create and assign an Android Profile Enrollment Policy.
Ensure that the Android version is 5.0 or newer (for the work profile mode) or 6.0 or newer (for
work-managed device mode.
Procedure
1 Follow the initial setup screens such as language setup and Wi-Fi configuration.
2 Specify the AFW identifier (afw#zenworks) in the setup screen that displays the Email ID field.
3 Click Next in the Android Enterprise page to proceed with the ZENworks App installation.
The ZENworks agent app will be automatically downloaded on the device.
4 Click Install to install the app on the device and follow the prompts to complete setting up the
device.
5 Follow the prompts appearing in the remaining screens to set up a work-managed device. The
device is now setup but is yet to be enrolled as a work-managed device.
6 Login to the app with the following details:
Username, Password, Domain, Server URL: Specify the username, password, and registration
domain (if Allow Simple Enrollment is disabled for the user) along with the server URL of the
ZENworks MDM Server.
The work-managed device is automatically setup on the device.
View the device information in ZCC. Click Devices > Mobile Devices (or navigate to the folder as
configured in the Mobile Enrollment Policy) from the left hand navigation pane in ZCC. Click the
appropriate device and view its details in the Summary page. The enrollment mode is displayed as
Android App and Work-managed Device Mode is also enabled.
Prerequisites
Before enrolling a mobile device as a fully managed device or an email only device, you need to
ensure that the following prerequisites are met:
ZENworks supports devices running on ActiveSync 12.1 and newer versions.
Procedure
This scenario shows you how to enroll a device as an Email Only device in your ZENworks
Management Zone. This scenario details the procedure to enroll an iOS device as an Email Only
Device.
1 Enter ZENworks_server_address/zenworks-eup, where ZENworks_server_address is
the DNS name or IP address of the ZENworks MDM Server, in a browser on the device.
The login screen for the ZENworks User Portal is displayed.
2 Enter the user’s user name and password in the ZENworks User Portal. If Allow Simple
Enrollment option is selected for the user source to which the user belongs, then the
registration domain need not be specified or else specify the registration domain.
3 Tap Enroll on the upper-right corner, to display the enrollment options for the device.
4 Tap Email Only to display the Enroll as Email Only screen. Use the displayed information to
create an email account for the user.
After the user configures the email account, an email is sent to the user stating that the
enrollment process needs to be completed. You can edit the contents of this email in ZCC, by
navigating to Configuration > Management Zone Settings > Event and Messaging > Email
Notifications.Click the relevant email and edit its contents.
5 Click the link to the ZENworks End User Portal provided in the email or visit the ZENworks End
User Portal as described in Step 1.
On the ZENworks User Portal, the device is displayed in the My Devices list. At this point, the
device has been added to the ZENworks Management Zone but is pending enrollment.
6 Tap Complete Enrollment.
If you configured your Mobile Enrollment policy to allow the user to specify the device
ownership (corporate or personal), you are prompted for that information. On the device,
provide the required enrollment information, then tap OK.
The My Devices list is updated to show that the device is enrolled and active.
7 Verify that the device is receiving emails, by sending an email to the user from another account.
After the device is enrolled to the ZENworks Management Zone, the enrollment mode of the
device is displayed as ActiveSync on the Device Information page in ZCC. To view the device
information, from the left hand side navigation pane in ZCC, click Devices > Mobile Devices (or
navigate to the folder as configured in the Mobile Enrollment Policy) and select the appropriate
device.
Creating Locations
Security requirements for a device can differ from location to location. For example, you might have
different personal firewall restrictions for a device located in an airport terminal than for a device
located in an office inside your corporate firewall.
To make sure that a device’s security requirements are appropriate for whatever location it is in,
Endpoint Security Management supports both global policies and location-based polices. A global
policy is applied regardless of the device’s location. A location-based policy is applied only when the
device’s current location meets the criteria for a location associated with the policy. For example, if
you create a location-based policy for your corporate office and assign it to a laptop, that policy is
applied only when the laptop’s location is the corporate office.
If you want to use location-based policies, you must first define the locations that make sense for
your organization. A location is a place, or type of place, for which you have specific security
requirements. For example, you might have different security requirements for when a device is
used in the office, at home, or in an airport.
Locations are defined by network environments. Assume that you have an office in New York and an
office in Tokyo. Both offices have the same security requirements. Therefore, you create an Office
location and associate it with two network environments: New York Office Network and Tokyo
Office Network. Each of these environments is explicitly defined by a set of gateway, DNS server,
and wireless access point services. Whenever the Endpoint Security Agent determines that its
current environment matches the New York Office Network or Tokyo Office Network, it sets its
location to Office and applies the security policies associated with the Office location.
For detailed information on how to create locations, see “Creating Locations” on page 34.
Policy Purpose
Antimalware Enforcement Installs the Antimalware Agent and configures the base on-access and
on-demand scans that protect managed devices from malware threats.
Because it is the base policy and installs the agent, it must be assigned to
devices before any optional policies (Custom Scan Policy, Network Scan
Policy, and Scan Exclusions Policy) can be assigned and enforced.
Antimalware Custom Scan Defines and schedules scans on local drives, in addition to the Full and
Quick scans already defined in the Antimalware Enforcement Policy.
Provides the capability to target specific threats that may not be covered
in the regularly scheduled scans using the Antimalware Enforcement
Policy.
Antimalware Network Scan Defines and schedules scans on files from network drives only. This
policy gives you the capability to target a network drive from a specific
device. For example, you could use this policy to scan a file storage disk
in an array of disks. Network credentials must be configured in the policy
to access network files.
Antimalware Scan Exclusions Customizes scan exclusions beyond those already configured in other
Antimalware policies. Once this policy is created, you can add the
Exclusions Policy option to the Custom Exclusions details of any of the
three other Antimalware policies. The policy is then enforced based on
having the same device assignment of the Exclusions Policy and the
Antimalware policy that this option is configured in.
Microsoft Data Encryption Manages encryption of removable data drives and fixed disk folders
using Microsoft BitLocker and Microsoft Encrypting File System (EFS),
respectively.
Scripting Runs a script (JScript or VBScript) on a device. You can specify the
triggers that cause the script to run. Triggers can be based on Endpoint
Security Agent actions, location changes, or time intervals.
Storage Device Control Controls access to CD/DVD drives, floppy drives, and removable storage
drives. Each storage device type is configured individually, which means
that you can disable some and enable others.
USB Connectivity Controls access to USB devices such as removable storage devices,
printers, input devices (keyboards, mice, etc). You can specify individual
devices or groups of devices. For example, you can disable access to a
specific printer and enable access to all Sandisk USB devices.
VPN Enforcement Enforces a VPN connection based on the device’s location. For example,
if the device’s location is unknown, you can force a VPN connection
through which all Internet traffic is routed.
Policy Purpose
Security Settings Designed to protect the Endpoint Security Agent from being tampered
with and uninstalled. However, This policy is retained to provide support
for devices that are still running the ZENworks 11 or ZENworks 11 SP1
Endpoint Security Agent and is not used with the current Endpoint
Security Agent. Those versions of the agent continue to use the Security
Settings policy.
Location Assignment Provides the list of allowed locations for a device or user. The Endpoint
Security Agent evaluates its current network environment to see if it
matches any of the allowed locations. If so, the location becomes the
security location and the agent applies any security policies associated
with the location. If none of the locations in the list are matched, the
security policies associated with the Unknown location are applied.
ZENworks Full Disk Encryption protects a device’s data from unauthorized access when the device is
powered off or in hibernation mode. To do this, it uses a combination of disk encryption and pre-
boot authentication.
Full Disk Encryption provides software-based encryption on standard, solid state, and self-encrypted
hard disks. All disk volumes (or selected disk volumes) are encrypted, including any temporary files,
swap files, and operating system files on the volumes. The data cannot be accessed until a valid user
successfully logs in, and the data can never be accessed by booting the device from media such as a
CD/DVD, floppy disk, or USB drive. For an authenticated user, accessing data on the encrypted disk
is no different than accessing data on an unencrypted disk.
Full Disk Encryption provides optional pre-boot authentication for hard disks. The ZENworks Pre-
Boot Authentication (PBA) component is installed as a small Linux partition on the hard disk. Login
occurs through the ZENworks PBA, which is protected from alteration through the use of MDT
checksums and password extraction by the use of strong encryption for the keys.
The ZENworks PBA supports single-sign on with the Windows login, enabling users to enter only one
set of credentials (ether user/password or smart card) to log in to both the ZENworks PBA and
Windows operating system.
“Activating Full Disk Encryption” on page 119
“Enabling the Full Disk Encryption Agent” on page 120
“Creating a Disk Encryption Policy” on page 120
“Assigning the Policy to Devices” on page 121
“Understanding What Happens After a Policy Is Assigned to a Device” on page 121
“Where to Find More Information” on page 122
IMPORTANT: ZENworks Full Disk Encryption does not support Windows Secure Boot, and this
feature must be disabled prior to the installation of the Full Disk Encryption Agent on devices. For
more information about system requirements, see “System Requirements” in the ZENworks Full
Disk Encryption Agent Reference.
IMPORTANT: The Disk Encryption policy is not supported on Windows devices that use UEFI BIOS. If
you assign a Disk Encryption policy to a Windows UEFI device, the policy is not applied to the device.
1 In the Policies panel, select the check box next to the Disk Encryption policy you want to assign.
2 Click Action > Assign to Device.
3 Follow the prompts to assign the policy.
Click the Help button on each wizard page for detailed information about the page.
When you complete the wizard, the assigned devices are added to the policy’s Relationships
page. You can click the policy to view the assignments.
Disk Encryption
ZENworks Full Disk Encryption provides software-based encryption on standard, solid state, and
self-encrypted hard disks.
Full Disk Encryption provides sector-based encryption of the entire disk or selected volumes
(partitions). All files on a volume are encrypted, including any temporary files, swap files, or
operating system files. Because all files are encrypted, the data cannot be accessed when booting
the computer from external media such as a CD-ROM, floppy disk, or USB drive.
Compatible hard disks are any 3.5 or 2.5 inch disks that have the IDE, SATA, or PATA interface
standard.
You can choose the industry-standard encryption algorithm (AES, Blowfish, DES, or DESX) and key
length that best meets your organizations requirements. If the device firmware is configured for
UEFI, the AES algorithm and 256 key length are automatically used.
Pre-Boot Authentication
ZENworks Full Disk Encryption protects a device’s data when the device is powered off or in
hibernation mode. As soon as someone successfully logs in to the Windows operating system, the
encrypted volumes are no longer protected and the data can be freely accessed. To provide
increased login security, you can use ZENworks Pre-Boot Authentication (PBA).
The ZENworks PBA is a Linux-based component. When the Disk Encryption policy is applied to a
device, a 500 MB partition containing a Linux kernel and the ZENworks PBA is created on the hard
disk.
During normal operation, the device boots to the Linux partition and loads the ZENworks PBA. As
soon as the user provides the appropriate credentials (user ID/password or smart card), the PBA
terminates and the Windows operating system boots, providing access to the encrypted data on the
previously hidden and inaccessible Windows drives.
The Linux partition is hardened to increase security, and the ZENworks PBA is protected from
alteration through the use of MD5 checksums and uses strong encryption for authentication keys.
ZENworks Pre-Boot Authentication is strongly recommended. If you don’t use the ZENworks PBA,
encrypted data is protected only by Windows authentication.
For more information about ZENworks Pre-Boot Authentication, see the ZENworks Full Disk
Encryption PBA Reference
Patch Management lets you apply software patches automatically and consistently to minimize
vulnerabilities and issues.
Patch Management stays current with the latest patches and fixes by regular Internet
communication with the ZENworks Patch Service. After the initial 60-day evaluation period, Patch
Management requires a paid subscription for you to continue the daily download of the latest
vulnerability and patch information.
When a new patch is available from the subscription service, a ZENworks Server downloads
information about it. You can deploy the patch to devices or disregard the patch.
With Patch Management, after the patches are downloaded to the ZENworks server and a patch
scan is performed, you can identify the vulnerable devices in your zone. However, you cannot easily
identify the vulnerability addressed by the patch. To identify the vulnerability addressed by the
patch you need to view the Patch Details window or you need to know the CVE ID based on which
you can perform a search. However, now, as part of the Security feature, ZENworks provides you
with a new security view that simplifies the setting up and tracking of security in your zone. You can
quickly grasp the security posture of your devices with the vulnerability based view and approach to
remediation. You can identify patches based on the CVE information and then remediate the
vulnerable devices by applying the relevant patch remediation policy or bundle. The process by
which ZENworks identifies these vulnerabilities is as follows:
1 Administrator creates and runs a CVE subscription to import data from the NVD repository.
2 Administrator creates and runs a Patch subscription to import data from the Patch Content
repository.
After the CVE and Patch subscriptions are run, CVEs and Patches are imported to the
configured ZENworks Server.
3 ZENworks maps the patches to the CVEs, based on the CVE ID associated with the patch
signature.
When a patch scan is performed on devices as part of the device refresh, the vulnerable devices
are identified. Users can also configure the patch scan schedule or they can manually run the
initiate patch scan quick task based on their requirement.
4 The applicable patches are then deployed on the vulnerable devices, either through patch
policies or through remediation bundles.
After all the CVE’s patches are installed on the device, the device is no longer vulnerable.
The following sections explain how to use the CVE and Patch Management features to identify the
vulnerabilities and issues that can occur with outdated or unpatched software.
“Creating and Configuring the CVE Subscription” on page 124
“Activating Patch Management” on page 126
“Enabling Patch Management in the ZENworks Agent” on page 126
“Configuring Patch Services and the Patch Server” on page 127
IMPORTANT: DO NOT change the URL, unless directed by Global Technical Support.
CVE Subscription Server: The server that syncs with the NVD repository, downloads CVE
data and stores it in the ZENworks database.
CVE Subscription API Key: ZENworks 2020 Update 3 and earlier versions use NVD 1.0 APIs
to import CVE data from NVD. Effective September 2023, NVD will discontinue all legacy
data feeds and 1.0 APIs and require consuming 2.0 APIs to fetch CVE data.
The CVE Subscription API Key field has been introduced that enables faster fetching of CVE
data from NVD. This key is optional. If not specified, the duration to fetch CVE data from
NVD might increase but will not impact the run functionally. The key can be obtained by
visiting NVD - API Key Request https://nvd.nist.gov/developers/request-an-api-key.
NOTE: This option is available only if you applied ZENworks 2020 Update 3 - FTF 961 or
later. For more information on FTF patches, see ZENworks Patch Updates.
Last Replication: The day and time at which the Subscription server last synced with the
NVD repository. You can select the relevant options to:
Run Now: Syncs immediately without waiting for the schedule. When the sync is done
for the first time, a full run is performed to download all the CVE data. However, if the
last run was performed less than 8 days ago, only the changes since the last run will
be downloaded.
NOTE: This option is available only if you are currently lower than ZENworks 2020
Update 3 - FTF 961. For more information on FTF patches, see ZENworks Patch
Updates.
Full Run: If no CVE data is downloaded or if the last run was performed more than 8 days
ago, then use this feature to download all the data from the NVD repository.
Status: Indicates the status of the last sync with the NVD repository.
Schedule Interval: The interval at which the sync is performed with the NVD server. You
can either perform the sync at a particular time, every day (daily) or you can perform the
sync at an hourly interval.
IMPORTANT: It is recommended that you initially apply patches to a test device before applying
them to devices throughout the zone. Any devices that are configured as “Test” devices will
automatically apply the patches to the assigned test devices via the Sandbox without executing Step
6 (publishing the policy).
When first creating the patch policy, you can also configure the policy to auto approve patches after
successful test enforcements. Selecting this option in the policy configuration will automatically
publish the policy to all devices assigned to the policy after 100 percent of Test devices pass
(omitting the need to publish (Step 6 above).