The Action - Install Files dialog box lets you specify the file to copy to the content server and from content server to the device, the destination directory and filename, and the copy options.You can also specify the specific requirements that a device must meet for the action to be executed on the device.
You can access this information by using the following methods:
As part of the process of creating a Windows bundle by using the Section 2.5, Creating Windows Bundles.bundle category. For more information, see
In ZENworks Control Center, click thetab, click the underlined link of a bundle in the column of the list, click the tab, click one of the action set tabs (Distribute, Install, Launch, Repair, Uninstall, Terminate, or Preboot), click the drop-down list, then select an available action.
The following sections contains additional information:
The General page lets you specify the file to copy to the content server and from content server to the device, the destination directory and filename, and the copy options. Clickto display the Select Files dialog box.
The Select Files dialog box lets you specify the files to be copied, specify a destination and source directory, specify whether the files are hidden or read-only after being copied to the device, and specify a copy option.
Copying a file or directory copies the file or directory from one location to another without uploading the files into the ZENworks content repository. Copying a file or directory is described as copying without using content. When copying a file or directory, the managed device performs the copy operation and must be able to resolve both the source and destination paths. Also, when copying a file or directory, the file or directory is not cached on the managed device.
Installing a file or directory uploads the file or directory to the ZENworks content repository before it is distributed to assigned devices. Installing a file or directory is described as copying using content. When installing a file or directory, the file or directory is cached on the managed device.
Installing an executable file does not launch or execute the file. To launch or execute the file, you must add a launch executable action (Launch Executable, Launch Java Application, and so forth) to the bundle.
Click, allow browser to launch ZCC Helper. The Select Files dialog box is displayed, click Add, select the files you want to copy to the device, and then click . Repeat this step as many times as necessary to copy the desired files.
If ZCC Helper is not installed on this device, you must install it before you can browse for file paths.
By default, the content uploaded to the ZENworks content repository is encrypted and compressed before it is distributed to assigned devices. However, if you do not want the content to be encrypted and compressed, then select theoption.
Specify the destination directory on the device in which you want to install the file.
Select a copy option from the list:
Copy Always: Copies the file regardless of whether the file currently exists on the workstation.
Copy If Exists: Copies the file only if the file currently exists on the workstation.
Copy If Does Not Exist: Copies the file only if the file does not currently exist on the workstation.
Copy If Newer: Copies the file only if its modified date and time is newer than the existing file’s date and time, or if the file does not currently exist on the workstation.
Copy If Newer and Exists: Copies the file only if it already exists on the workstation and the date and time of the file is newer than the existing file’s date and time.
Copy if Newer Version: Copies the file only if its internal version is newer than the existing file’s version (if version information is present).
Request Confirmation: Prompts the user to confirm that the file should be copied when the file already exists on the workstation.
Copy If Different: Copies the file if its creation date, creation time, or size is different than the existing file’s date, time, or size.
Select thecheck box to specify that the file is hidden after installation.
Select thecheck box to specify that the file is read-only after installation.
On Windows 2000, Windows XP, Windows Vista, or Windows 7 device, the application executable can run in either the “user” space or the “system” space. By default, theoption is selected, which causes the application to run in the “user” space and inherit the same workstation security level as the logged-in user.
If the logged-in user's security level does not provide sufficient rights and file access to run the application, you can configure the application to run in the “system” space or as a dynamic administrator, as described below:
Run as logged in user: The action uses the logged-in user’s credentials. For example, the action has the same rights to the registry and the file system as the logged-in user.
Run as secure system user (Don't allow system to interact with desktop): The application is run under the Local System user and inherits Administrator-level credentials. For example, the application has full rights to the registry and the file system. Because the security level is set to, the application's interface is not displayed to the user and the application is only visible in the Task Manager. This option is useful when running applications that require full access to the workstation but require no user intervention. If you use mapped network drives to specify files and directories, the action fails because system users do not have access to user mapped drives.
Run as dynamic administrator: A dynamic administrator is an administrator account that is created on the fly to perform certain procedures, such as installing applications. Using a dynamic administrator is helpful when installing applications (some MSI applications, for example) that cannot be installed in the system space. When you select this action, the dynamic administrator is created, it performs the required tasks, and then the account is deleted.
You cannot use mapped network drives to specify files and directories because dynamic administrators do not have access to mapped drives.
Select credential for network access: If the file or directory specified in the action are a part of the UNC path or network share that can be accessed only through credentials, then browse through the credential vault to select a credential that has access to the network.
NOTE:Performing this action as dynamic administrator on a Windows domain controller fails because Microsoft does not allow the use of local administrator accounts on domain controllers.
The Requirements page lets you define specific requirements that a device must meet for the action to be enforced on it. For information about the requirements, see Requirements.