1.1 Management Capabilities

The ZENworks Configuration Management capabilities are as follows:

1.1.1 Discovery and Deployment

The Discovery process is used to find devices in the network through querying a set of provided IP addresses and to collect inventory information by using technologies like SNMP, WMI, and SSH. Discovery process can also find devices from Novell eDirectory or Active Directory, and migrate your traditional ZENworks devices from Novell eDirectory.

The Deployment process is used to distribute and install ZENworks Adaptive Agent to a collection of devices that are identified by the discovery process or by providing a list of devices explicitly. These devices then become managed devices.

For more information, see the ZENworks 10 Configuration Management Discovery, Deployment, and Retirement Reference.

1.1.2 Software Management

ZENworks Configuration Management lets you configure, distribute, install, remove, and roll back applications on your devices. This is done through the use of software bundles.

When you assign a bundle to a device, you can install and launch it on the device according to the schedules (distribution, launch, and availability) that you define.

For more information, seethe ZENworks 10 Configuration Management Software Distribution Reference.

1.1.3 Policy-Based Device Management

ZENworks Configuration Management lets you use policies to create a set of configurations that can be assigned to any number of managed devices. It helps you to provide the devices with a uniform configuration, and it eliminates the need to configure each device separately.

ZENworks Configuration Management policies help you manage the Internet Explorer favorites, Windows Group policies, local file rights, printers, SNMP service settings, roaming profiles, and configure dynamic local user accounts and manage them on the managed devices. You can also configure the behavior or execution of a Remote Management session on the managed device, and administer as well as centrally manage the behavior and features of ZENworks Explorer.

For more information, see the ZENworks 10 Configuration Management Policy Management Reference.

1.1.4 Imaging

ZENworks Configuration Management includes a preboot service that enables you to perform tasks on devices before their operating systems boot up. Using Preboot Services, you can automatically or manually do the following to a device when it boots up:

  • Run ZENworks imaging scripts containing any commands that you can issue at the bash prompt

  • Take an image of the device’s hard drives and other storage devices

  • Restore an image to the device

  • Take part in a session where an existing image is applied to multiple devices

  • Take or restore a WIM image by using Microsoft ImageX

  • Take or restore a Ghost image by using Symantec Ghost

To accomplish some of these tasks automatically, you simply need to have PXE (Preboot Execution Environment) enabled on your devices, then configure prebootable tasks in ZENworks Control Center and assign them to the devices. Then, the devices can automatically implement these tasks when they boot.

To manually implement the tasks, you can configure devices to require user intervention during bootup.

Using ZENworks Control Center, you can also replicate the tftp directory changes from a Primary Server to other Imaging servers (Primary Server or Satellite device with the Imaging role).

For more information, see the ZENworks 10 Configuration Management Preboot Services and Imaging Reference.

1.1.5 Remote Management

ZENworks Configuration Management provides the ability to remotely and securely manage devices through operations such as Remote Control, Remote View, Remote Execute, Remote Diagnostics, and File Transfer.

For more information, see the ZENworks 10 Configuration Management Remote Management Reference.

1.1.6 ZENworks Reporting

ZENworks Configuration Management provides advanced reporting capabilities with ZENworks Reporting Server. ZENworks Reporting Server uses an embedded BusinessObjects Enterprise XI R3.1 engine to create customized reports. You can use the predefined reports in ZENworks Reporting Server to report on Asset Management, Patch Management, Inventory, Discovery and Deployment, Bundles and Policies, and ZENworks Systems. You can also create custom reports, edit reports, assign rights on reports, and schedule reports to a set of users.

For more information, see the ZENworks 10 Configuration Management Reporting Server Installation Guide and the ZENworks 10 Configuration Management System Reporting Reference.

1.1.7 Inventory Collection

ZENworks Configuration Management can gather extensive software and hardware inventory for all managed and inventoried devices, and it also enables you to create and export standard and custom reports.

For more information, see the ZENworks 10 Configuration Management Asset Inventory Reference.

1.1.8 System Updates

You can update your ZENworks Configuration Management software on all devices in the Management Zone where the software is installed. Update downloads can be scheduled. Software updates are provided at the Interim Release level and you can choose whether to apply each update after viewing its content (interim releases are cumulative). You can also download the latest Product Recognition Update (PRU) to update your knowledgebase so that ZENworks Inventory can recognize newer software.

For more information, see the ZENworks 10 Configuration Management System Administration Reference.

1.1.9 Asset Management

ZENworks Asset Management provides various tools to help you manage your software assets. These tools encompass three areas:

  • Software Usage: You can track usage of software applications (including run time, active time, logged in user, machine, and application used) in your existing inventory. You can also track and report on software run via Terminal Server and Citrix, as well as Web applications run through the browser. You can run a full range of predefined software usage reports, as well as create, save, and run custom reports.

  • Contract Management: You can define and track IT contract details, including key dates and vendor, financial, SLA, lease, and renewal information; attach related documents; associate contracts with assets, licenses, and demographic data; and create automated e-mail notifications for specified dates. You can also run a full range of predefined contract management reports, as well as create, save, and run custom reports.

  • License Management: You can import and enter software purchase records, define license entitlements, attach supporting documentation, reconcile discovered software products to entitlements, and track ongoing compliance status. You can also run a full range of predefined license management reports, as well as create, save, and run custom reports.

For more information, see the ZENworks 10 Asset Management Reference.

1.1.10 Patch Management

Patch Management lets you apply software patches automatically and consistently to minimize vulnerabilities and issues.

Patch Management stays current with the latest patches and fixes by regular Internet communication with the ZENworks Patch Subscription Service. The Enterprise Edition requires a maintenance agreement or upgrade protection with Novell.

When a new patch is available from the subscription service, a ZENworks Server downloads information about it. You can deploy the patch to devices or disregard the patch.

For more information, see the ZENworks 10 Patch Management Reference.

1.1.11 Personality Migration

Personality Migration allows you to automate the process of migrating a set of customized system and application settings. A typical set of settings can be desktop wallpaper, e-mail account settings, browser proxy settings, files and folders, archived e-mails, Microsoft office templates, MS Excel Macros etc.This process significantly reduces the time and effort required in setting up or re-configuring a desktop for users.

For more information, see the ZENworks 10 Personality Migration Reference.

1.1.12 Linux Management

Linux Management makes it easy to embrace and extend Linux within your existing environment. It is the only solution that uses policy-driven automation to deploy, manage, and maintain Linux resources. These automated and intelligent policies allow you to provide centralized control across the life cycle of Linux systems for desktop lockdown, imaging, remote management, inventory management and software management. The result is a comprehensive Linux management solution that eliminates IT effort by dramatically reducing the required overhead needed to manage Linux systems.

For more information, see the Novell ZENworks 7.3 Linux Management documentation Web site.

1.1.13 Handheld Management

Handheld Management lets you manage Palm, Windows CE, Pocket PC, and BlackBerry handheld devices, including the ability to distribute applications and content to devices; secure information by using password enforcement, integration, self-destruct, and lockout capabilities; optimize low-bandwidth connectivity through the use of compression, checkpoint restart, delta technology, and configurable bandwidth technology; inventory hardware and software and use detailed queries to generate reports; automate device setup and standardize settings and programming; and retrieve files from devices to protect data and integrate it with corporate data.

For more information, see the Novell ZENworks 7 Handheld Management documentation Web site.

1.1.14 Endpoint Security Management

Endpoint Security Management simplifies endpoint security by combining security policy enforcement for data, devices, and connectivity under a single management console. This allows organizations to manage, control and enforce security policies for removable storage, wireless communications including MESH and WiMAX, application control, machine posture/integrity, data encryption, and advanced personal firewall. Its lightweight footprint in both size and traffic, its ease of management, and its comprehensive functionality earned it the Secure Computing Magazine’s “Reader’s Trust Award for Best Endpoint Security Solution” in 2007.

Endpoint Security Management simplifies endpoint security by putting administrators in control, combining “point” security solutions under a single, easy-to-use management console.

For more information, see the Novell ZENworks Endpoint Security Management 4.1 documentation Web site.