Novell Home


Let me take you back to 1998.

  • The Denver Broncos become the first AFC team in 14 years to win the Super Bowl.
  • Intel launches 333 MHz Pentium II chip.
  • Dale Earnhardt wins the Daytona 500.
  • Bill Gates gets a pie thrown in his face.
  • Apple Computer unveils the iMac.
  • The United States Department of Justice and 20 US states file an antitrust case against Microsoft.
  • The Chicago Bulls win their sixth NBA title in eight years when they beat the Utah Jazz, 87-86 in Game Six. This is also Michael Jordan’s last game as a Bull.
  • Microsoft releases Windows 98 (First Edition).
  • Novell ships 1.0

In 1998, an innovative team at Novell released a new product that was called Do you remember why the periods were there? Because it stood for Zero Effort Networking—or ZEN. It has lived up to 44 fourth quarter/2007 its name by saving organizations countless hours and effort to manage their environments—from the desktop to the data center. Well, this innovative product has grown up and 2008 will be the 10—year anniversary!


A lot has changed over the last ten years. ZENworks has grown up to become a strategic product line in the Novell portfolio. We also just released a brand new addition to the family called ZENworks 10 Configuration Management. ZENworks Configuration Management is available in three editions to provide you with the capabilities you need. (See Figure 1.)

ZENworks Configuration Management has many new improvements, enhancements and capabilities. Built using Novell’s Blueprint for Better Management, you will find that it meets your needs today and in the future. You can download the whitepaper, Blueprint for Better Management, at

ZENworks Configuration Management provides a wealth of features and functions. Table 1 shows the key features and capabilities of ZENworks Configuration Management and what’s new or improved.

ZENworks Configuration Management High-Level Feature Summary Standard Advanced Enterprise
Managed systems N N N
Windows Vista N N N
Windows XP Professional N N N
Windows XP Tablet Edition N N N
Windows 2000 Professional N N N
Windows Server 2003 N N N
Windows 2000 Server N N N
Macintosh OSX *** N N N
Windows NT4 *** N N N
Windows 98 *** N N N
Windows 95 *** N N N
NetWare 6.5 *** N N N
Application management N N N
Application self-healing N N N
Remote control N N N
IT asset discovery & classification N N N
BusinessObjects reporting N N N
Integrated patch management*   N N
Removable media device control   N N
USB port control   N N
LAN, modem, Bluetooth, infrared, Firewire port control   N N
Serial and parallel port control   N N
Wi-Fi NIC control   N N
Manage authorized access point lists     N
Data encryption     N
Personal firewall     N
Security alert monitoring     N
Client self defense     N
Authorized application control     N
Application blocking     N
Integrated asset management     N
Reseller connectors for purchase record integration     N
Software asset license tracking     N
Software usage tracking     N
Asset contract management     N
Handheld device application management     N
Handheld device security management     N
Handheld device password sync with network security     N
Handheld device remote control     N
Linux systems management     N
Linux device patching and remediation     N
Linux device remote management     N
* Product includes 60 days of patch updates. Requires paid subscription for continued service. *** Inventory only

> Get a Jumpstart
Whether you are a customer or a partner wanting to get more information about ZENworks Configuration Management, you can learn more by taking the Jumpstart training. During this course, you will learn how to complete the following tasks:

ZENworks Configuration Management has many new improvements, enhancements and capabilities. Built using Novell’s Blueprint for Better Management, you will find that it meets your needs today and in the future.

  • Install ZENworks 10 Configuration Management on a Windows or Linux host.
  • Configure directory integration with Novell eDirectory or Microsoft Active Directory.
  • Deploy Windows XP and Windows Vista using Novell ZENworks 10 Configuration Management imaging.
  • Deploy applications in Windows Vista using ZENworks 10 Configuration Management.
  • Perform remote management, inventory and reporting.

The course is offered online or as a 3-day classroom training. To find a course near you go to and search for ZENworks Configuration Management. Following are some snippets you will learn in the course.

> New Terminology
ZENworks 10 Configuration Management changes many terms that traditional ZENworks users have used to refer to various objects and configurations. It also introduces many new terms. Following are some of these new terms that you will learn about in the course.

Zone:  A zone is both the smallest and largest unit of management in ZENworks 10 Configuration Management. A zone consists of one or more primary servers, managed devices, content distribution points, and any configuration managements objects that you want to be able to assign to these devices or the users that the zone is configured to access.

Primary Server:  A Primary Server is a server that hosts the Tomcat Web server, Web services and content repository necessary to distribute content to devices in the zone. A Primary Server can be a Windows 2003 32-bit or 64-bit, a SUSE Linux Enterprise 10 32-bit or 64-bit, or Open Enterprise Server 2 32-bit or 64-bit server.

In just 30 minutes, you can install ZENworks Configuration Management and get it running. One of the design goals for ZENworks 10 Configuration Management is to allow the product to be installed and usable within 30 minutes of beginning the installation.

Content Distribution Point:  A Content Distribution Point is a managed Windows workstation or server that has been configured to act as a source where other managed devices can retrieve bundle and policy content.

ZENworks Control Center:  The ZENworks Control Center is the main administrative tool for managing ZENworks 10 Configuration Management. This tool is a Web-based console that can be accessed from either Microsoft Internet Explorer 6/7 or Mozilla Firefox running on a Windows workstation.

User Source:  A user source is a pointer to an external Active Directory Services or eDirectory server from which you want the Primary Server to be able to read user, group and container data. By configuring a user source you allow ZENworks 10 Configuration Management policies and bundles to be assigned to users within these sources. Among the many other new things you will learn are:

  • ZENworks Management Command Line Tool (zman)
  • Setting
  • Policy
  • Bundle
  • And more

Service Oriented Architecture
ZENworks 10 Configuration Management uses the ZENworks Service Oriented Architecture (SOA). This architecture is a multi-tiered model that helps to improve the flexibility, stability and scalability of the ZENworks product line. (See Figure 2.) The ZENworks SOA is comprised of four layers:

  • The Web services layer consists of the Tomcat servlet engine and the servlets responsible for implementing all of the features that ZENworks provides. Each servlet provides a specific feature and will interact with each of the other layers in the SOA.
  • The data model layer is a set of APIs that allows Web services to interact with configuration data without needing to understand the underlying characteristics of the data store. This allows ZENworks Configuration Management to use different database platforms, without the need to have each service understand the database it is talking to. Using this approach, Novell can make changes behind the scenes without Web services developers needing to change their applications.
  • The storage layer in the ZENworks SOA is used for storing large amounts of data that are not logically stored in the data store. In ZENworks 10 Configuration Management, the storage layer is implemented as the Content Repository which is a file system location on each primary server. This repository is used to house all of the files necessary to distribute applications, policies, patches and images.
  • The last, optional layer, is the identity layer. This layer allows ZENworks services to interact with an identity store. In the current ZENworks SOA, the identity layer can interact with either Active Directory Services or Novell eDirectory. This identity layer leverages services provided by Novell’s Common Authentication Services Adapter (CASA) service.

Other important aspects of the architecture that you will learn about are the ZENworks Primary Server and the ZENworks Adaptive Agent. The communication between the ZENworks Adaptive Agent and the ZENworks 10 Configuration Management Primary Server is generally implemented as a standard Web session. Unlike previous versions of ZENworks, the ZENworks Adaptive Agent does not maintain a session with the Primary Server; instead, it makes an HTTPS request, receives the information it needs, and then disconnects from the server. This allows the Primary Server to service more clients.

This new architecture provides many advantages. The ZENworks agent no longer processes much of the work. Web services on the server handle the business logic and then supply their results to the agent. This generally results in less network traffic and greater scalability. The new architecture also provides improved ability to add future services and features.

During the course you will learn about key planning tasks to make your implementation and deployment smooth as butter. Key planning tasks are:

  • What are the business requirements?
    • What do you hope to achieve by using ZENworks Configuration Management?
    • How quickly can you roll out the environment?
  • What are your technical requirements?
    • How many devices do you need to manage?
    • What kind of devices are they?
    • What database platform(s) are in your environment?
    • What server platform do you want to use for ZENworks?
    • What does your network infrastructure look like?
    • Where is the authoritative source for user information?
    • Which users need to be able to administer the system and what rights do they need?

> Turn time into money
In just 30 minutes, you can install ZENworks Configuration and get it running. One of the design goals for ZENworks 10 Configuration Management is to allow the product to be installed and usable within 30 minutes of beginning the installation. This means that within 30 minutes you should be able to:

  • Install your first Primary Server.
  • Configure your Primary Server to access one or more User Sources.
  • Deploy the agent to at least one device on your network.

Once this task has been completed, the other design goal is to be able to push the ZENworks Adaptive Agent to any of the devices in your environment that you want to manage.

Once the installation wizard starts, the following tasks are performed by the installation tool:

  1. Install the Tomcat software. This is installed first as it is used to install the rest of the services.
  2. Install the Web services that are hosted by Tomcat. Tomcat and the Web services are then configured as the ZENworks Server service in the Services Control Panel.
  3. Install and configure the ZENworks Loader service. This service provides several key services that are needed for inventory, package replication, and server-based asynchronous actions such as device refresh and other quick tasks.
  4. Preboot Service Components are installed. These are the components required to support PXE workstations and imaging. All services except the Proxy DHCP Server are configured as automatic start services.
  5. Once the Primary server software has been installed and started, the ZENworks Adaptive Agent is installed on the server if it is a Windows device.
  6. Finally the files necessary to the server and the ZENworks-setup page is created. This is the location where you can manually pull the agent installation files, migration tools and other files important in your ZENworks environment.
  7. If you choose to use the Business Objects Enterprise installation, it is configured to install the reporting components of ZENworks Configuration Management.

Once the installation is complete, you can use the standard tools in the server operating system to check the status of the ZENworks services that were installed. You should also use a Web browser to access https://< server >/zenworks. This will validate that the Tomcat Web server is functional and that the ZENworks Control Center servlet was loaded successfully.

> Package and Re-Package
When delivering applications, packaging the application is a critical step. In the Jumpstart class you will learn best practices to follow when packaging or repackaging an application. These best practices include:

  • Repackage on the same type of host you are deploying to. When repackaging, it is recommended that you run the Repackager on the same operating system that you are planning on deploying the agent to. This ensures that if the legacy installer performs OS specific features that they are included in the MSI.
  • Use the Global Exclusions Editor. If you routinely find yourself excluding the same registry keys, files or ini information in an MSI, use the Global Exclusions Editor to add these exclusions so they are automatically ignored by the Repackager.
  • User Tuner only if no vendor-specific tools exist. This recommendation is based on the fact that the vendor will be more familiar with the MSI than Macrovision is and may provide more configuration options.

> Enforce Policies with Ease
In ZENworks 10 Configuration Management, policies are the term used to define a set of configuration settings and rules that should be applied to a managed device. Policies are generally used to configure the behavior of certain pieces of software installed on the device such as the Windows operating system, Microsoft Office Suite or the ZENworks Adaptive Agent.

ZENworks 10 Configuration Management allows policies to be assigned to Users, Workstations, Groups, Dynamic Groups and Folders. This gives you a tremendous amount of flexibility in how you assign policies. Each of the policies available in ZENworks 10 Configuration Management can be classified as one of the following three types:

  • Singular: A singular policy is one where only a single instance of that type of policy can be active on a given device. The majority of policies found in ZENworks 10 Configuration Management fall into this category. This includes the following policies:
    __ Dynamic Local User
    __ Local File Rights
    __ Remote Management
    __ Roaming Profile
    __ SNMP
    __ Windows Group Policy
  • Plural: Plural policies allow multiple policies of that type to be effective and applied to the machine. This is useful for providing a layered approach to applying the policy. For instance, you might want certain bookmarks to be available to different groups of users. If a particular user is a member of multiple groups, you want the user to have access to all of the bookmarks. The policies in ZENworks 10 Configuration Management that are plural include the following policies:
    __ Browser Bookmark
    __ Printer
  • Cumulative: Cumulative policies are those that allow multiple policies of that type to be effective, but that take into account the fact that there might be conflicting policy settings and have a known method of resolving the conflict. When multiple policies that are cumulative are effective for a given device or user, the policy closest to the device or user will overwrite any similar settings that have been obtained from a policy higher up in the zone. The only cumulative policy in ZENworks 10 Configuration Management is the ZENworks Exporer policy.

> Personality Migration
In order to understand what Personality Migration does, you need to understand what is meant by personality. The term personality refers to all user-specific operating system, application settings and data. A given machine’s personality is made up of these settings and data files for all users on the machine. Some of the settings that comprise the personality of a machine include:

  • The setting for the wallpaper that a given user is using and the actual wallpaper file itself
  • Customized appearance settings such as the color scheme in use, the mouse settings, sounds, and so forth
  • Internet Explorer and Mozilla Firefox settings such as a user’s bookmarks, security settings and other configurations
  • Microsoft Office settings such as customized dictionary information
  • ODBC settings, printers, network settings, dial-up settings
  • OpenOffice spreadsheets and documents, Microsoft Word documents and other data files created by users on the machine

All of these settings, data files and more comprise the machine’s personality. Additionally, each user on the machine has a personality of their own that is made up of their specific settings and data. If you are familiar with the concept of a Windows profile you can think of the personality as a superset of the profile.

> Keep Track of Your Assets
If you don’t know what you have, how will you manage it? ZENworks 10 Configuration Management provides capabilities for obtaining the following inventory information:

  • Hardware inventory: ZENworks 10 Configuration Management uses a variety of methods to obtain hardware information from Windows devices that are running the ZENworks Adaptive Agent, Windows Inventory Only Agent, Windows devices on which you execute the portable collector, Macintosh devices running OS X and the Inventory Only agent, or NetWare servers on which you install the Inventory Only agent. The methods used to extract this information are different for each platform.
  • Software inventory: ZENworks 10 Configuration Management also retrieves software information from the same platforms. The Windows agents and portable collector use the software knowledgebase to identify the software installed, as well as retrieving a list of all executables and other optional files from the machine. On the NetWare platform, software inventory is performed by reading information from the NetWare Products database. On Mac OS X the software inventory interfaces with the System Profiler application.
  • Bundle inventory: ZENworks 10 Configuration Management also retrieves bundle inventory information. This is done by querying the ZENworks Adaptive agent to determine the name and version of the bundles installed on the device. This allows you to easily track the devices that have received bundles via ZENworks 10 Configuration Management.

You can extend the capabilities of asset inventory by using the Asset Management Services found in ZENworks Configuration Management Enterprise Edition.

To make it easier to execute reports, the ZENworks 10 Configuration Management product includes a pre-configured Business Objects Enterprise universe that allows you to identify the key fields for reporting and to build reports using them.

> Keep Track of Your Assets
ZENworks 10 Configuration Management integrates Business Objects Enterprise XI R2. This is the industry-leading business intelligence platform that allows you complete flexibility in executing reports on most information in the database. The business intelligence platform requires more knowledge to create reports, but is extremely flexible in allowing customers to create their own reports.

To make it easier to execute reports, the ZENworks 10 Configuration Management product includes a pre-configured Business Objects Enterprise universe that allows you to identify the key fields for reporting and to build reports using them.

> 7 Products in 7 Days!
Beginning on August 7 and ending on August 14, the ZENworks product line grew. We released 7 new products in 7 days!

  1. ZENworks Configuration Management Standard Edition
  2. ZENworks Configuration Management Advanced Edition
  3. ZENworks Configuration Management Enterprise Edition
  4. ZENworks Endpoint Security Management 3.5
  5. ZENworks USB/Wireless Security Management 3.5
  6. ZENworks Orchestrator 1.1
  7. ZENworks Virtual Machine Management 1.1

> Secure Your Endpoints
On August 13, Novell announced the acquisition of Senforce and two new products: ZENworks Endpoint Security Management and ZENworks USB/Wireless Security. These new products are best-of-breed solutions to help you protect your laptops and desktops from rogue USB devices, wireless breaches and more. In Figure 4 you can see the capabilities ZENworks Endpoint Security Management provides.

To properly protect the endpoint, a product needs several things. This includes the ability to provide centralized management and one console. It must also maximize feature enforcement in a single suite (single price, single agent)_. To be effective, the solution needs to target the threat and pinpoint vulnerabilities without affecting user functionality. You need your users to spend time doing their jobs, not trying to configure their systems, or worse, trying to fix them.

Cost of Lost Data

  • Average cost per compromised customer record was $182
  • Average total incident cost to the company was $5 million
  • Average cost to prevent future breaches was $180,000

It is also critical to leave decisions in the hands of the security administrator and not the end users (no pop-ups, and hence, no uneducated decisions). And don’t allow circumvention. Finally, you need integration into existing directory services and infrastructure.

Novell ZENworks Endpoint Security Management Alerts Monitoring ensures that any attempts to compromise corporate security policies are reported in the Management Console. This allows the Administrator to know of problems immediately and take any appropriate remedial actions.

The Alerts dashboard is completely configurable, providing complete control over when and how frequently alerts are triggered. (See Figure 5.)

Not only does ZENworks Endpoint Security Management meet all the requirements for effective security, but it also provides key benefits to you by:

  • allowing for increased agility and productivity while managing the associated risk
  • protecting the data stored on the endpoint and accessed by the device
  • protecting the system’s health to increase user up time and associated productivity
  • decreasing overhead with a single console for configuration, management and reporting/alerts
  • decreasing overhead with a single agent for security enforcement
  • delivering targeted enforcement to address specific issues while maximizing user productivity
  • enforcing security decisions that are centrally defined by experts for the entire organization and enforcement can not be circumvented

> Optimize Your Data Center
On August 7, Novell began shipping two new product updates for ensuring that your data center works at peak performance.


Manage the Entire Lifecycle of Virtual Machines
Why spend hours managing virtual machines when Novell ZENworks Virtual Machine Management can do it for you? It provides complete management for the virtual machine lifecycle. You can discover servers for virtual machine commissioning; discover offline and online virtual machines; create, deploy, redeploy, rollback and store virtual machines; and manage physical and virtual storage. (See Figure 6.)

Why spend hours managing virtual machines when Novell ZENworks Virtual Machine Management can do it for you?

New, open virtualization formats from VMware and Microsoft make it easier to migrate workloads across virtual machines—including Xen—with minimal modification. Novell ZENworks Virtual Machine Management takes advantage of these open formats and allows you to easily manage your virtual resources, controlling the entire lifecycle of each virtual machine. Novell ZENworks Virtual Machine Management gives you the ability to confidently employ virtualization in your Data Center, whether you are running Linux, UNIX or Windows. From VMware to Microsoft to Xen virtualization environments, this policy-based solution automates the process of creating, deploying, managing and storing virtual Data Center assets. It also dynamically provisions workloads and ensures business continuity.

ZENworks Orchestrator 1.1 also sports an all-new user interface which allows you to more easily manage your data center environment. As you can see in (See Figure 7.), the interface provides all the tools you need at your fingertips.

> Mitigate Corporate Risk and Lower Your IT Costs
These exciting new ZENworks products and the entire ZENworks family will allow you to reduce the complexity, vulnerability and cost associated with distributed environments that have a mixture of devices, operating systems, software and other IT resources.

Novell is continuing to deliver on the blueprint for better management—desktop to data center. (See Figure 8.) Join us in celebrating this exciting decade of ZENworks and find out for yourself how you can benefit from using ZENworks in your environment.


© 2015 Micro Focus