Novell Home

Novell Communities

Welcome to the Novell Communities. Consider this an exclusive invitation to get sideways social with Novell users, experts and commentators and discover best practices, innovative ideas, or ask a question. Come share your voice, read the latest news, help someone solve a challenge. Join the conversation on social media.


Blank screen on managed device during Remote Management session

The following procedure explains a way to force a blank screen on the managed device during a Remote Management (RM) session. Press the blank screen button on the RM viewer to enforce mouse and keyboard lock on the managed device. Open Screen Resolution by clicking the Start button, clicking Control Panel, and then, under Appearance …

Wake Up and Recognize the Demand for User-Centric Workspaces

Let’s face it: It’s not always easy to get work done in the office. First, you need to actually get to the office by battling through morning traffic. Then, once you manage to find parking and sit down at your desk, there are constant distractions and interruptions that can get in the way of your …

Securing ZENworks Virtual Appliances with System Updates

As we all know ZENworks Virtual Appliance is an alternate way to traditional way of deployment & installing ZENworks Server. This is fast, convenient, lowers deployment costs and accelerate time-to-value with a “plug-and-play” virtual appliance. Securing ZENworks Virtual Appliance As we release a newer version of ZENworks, the Virtual Appliance is …

Filr MV Log Aggregator for Mac

This tool intends to provide all the relevant information to the Mac Developers of Filr, in a single archive and with click of a mouse. The tool aggregates the following …

Generating a Self-Signed Certificate for HTTPS Keystore and API Keystore in Keyshield SSO Server

This article presents simple steps how to generate a self-signed certificate from Keyshield SSO server. In the KeyShield SSO server configuration page you have to provide the HTTPS keystore and API keystore file in PKCS #12 format in order to use the Https port for the keyshield Server. The following steps will tell you how …

The One-Step Plan to Stronger Digital Workspace Security in Your Enterprise

The digital business landscape has changed dramatically during the past few years, and this has led to more challenges facing IT departments than ever before. New threats like malware, ransomware and hacks are increasing by the day. Furthermore, next-generation technologies like the Internet of Things are weaving their way into the digital fabric of your …

Novell Service Desk 7.1 Beta availability announcement

We are pleased to announce and invite you to participate in Novell Service Desk 7.1-Beta. Novell Service Desk is a complete service management solution that allows you to easily monitor and solve service issue. It provides an online support system to meet the service requirements of all your customers, administrators, supervisors, and technicians.

Configuring an Additional NIC Card to a Filr Appliance

The network settings for a Filr Appliance are actually recommended to be configured through 9443 VA administration page. Currently, since there is no way to configure an additional NIC card completely through the VA-administration page, the following solution is proposed.

KeyShield SSO Integration With Filr-1.2.0

This article presents how to integrate KeyShield SSO with Filr-1.2.0. KeyShield SSO is a single sign-on solution that allows users to access their applications without having to authenticate to each one of them. Once users authenticate against a recognized user source – eDirectory, Active Directory, LDAP – they can simply launch their applications and KeyShield will provide the identity to the application.

From Gold to Fool’s Gold: Transform Your Data Through Encryption to Make It Useless to Hackers

Your business harbors a trove of sensitive data in its back-end servers that hackers would love to exploit for monetary value. These files can range drastically in value, depending on factors such as the type of information they contain and the industry. In healthcare, for instance, stolen patient records can sell for as much as …

ZCM 11 SP3 Agent registration with non-persistent VMware View 5.3 VDI Desktops

We want to use ZENworks Configuration Management to manage our Windows 7 FAT desktops and VDI desktops. In our environment we were struggling to get our non-persistent VMware Windows 7 desktops registered in the ZCM Zone. After the Quickprep process (VMware KB) some desktops did not register or registered with an extra guid in the …

Your Business’s Network Is Bigger Than You Think

You head the IT department of a small to midsized business (SMB) with 1,000 employees or less. But is this the true size of your network? It could actually be much larger than the total number of employees in your organization due to the amount of devices that your workers use to access your business’s …

Elephants, Cats, Coffee and Computers

As part of my job at Novell I get to travel around various places. This has given me the chance to try numerous types of coffee across many countries and cultures. Coffee itself has an interesting history, starting with the legend of Kaldi. Kaldi was a goat herder who noticed his goats become somewhat animated …

Annihilate Novell Backup Windows: The True Speed of SEP sesam

How long is your typical Novell backup window? 2 days? 4 days? 6 days? SEP recognizes the pain points in the industry when backing up Novell environments which include GroupWise, OES Clusters, eDirectories, and NSS Volumes …

Forrester Names Novell ZENworks a ‘Strong Performer’ in Endpoint Encryption

There are two ways that you can store sensitive corporate information in your database: in a regular format using plain text or in a protected format using advanced ciphering. In information technology (IT), the act of ciphering digital information is called encryption, and it’s one of the safest and strongest methods of devaluing private data …

© 2015 Micro Focus