41.3 Setting Up Rogue Process Management

Rogue process management is enabled and configured through the Windows registry. The following sections explain how to manually modify the registry on Windows 98 and Windows 2000/XP workstations and how to create an Application object to distribute the registry changes through Application Launcher:

41.3.1 Manually Modifying the Registry

  1. Use regedit.exe to open the Windows registry.

  2. Locate the following key:

    HKEY_CURRENT_USER\Software\NetWare\NAL\1.0
    
  3. Add a Process Management key under the 1.0 key:

    HKEY_CURRENT_USER\Software\NetWare\NAL\1.0\Process Management
    
  4. Add a Default Action value to the Process Management key using the following information:

    Value type: DWORD

    Value name: Default Action

    Value data: To have Application Launcher ignore all rogue processes, enter 0. To have Application Launcher terminate all rogue processes, enter 1.

    NOTE:If you build an exception list, as in Step 8 below, the meaning of this value data changes. See the information in that step for more information.

  5. Add a Report Terminated value to the Process Management key using the following information:

    Value type: DWORD

    Value name: Report Terminated

    Value data: To disable reporting of rogue processes that Application Launcher terminates, enter 0. To enable reporting of terminated rogue processes, enter 1.

  6. Add a Report Ignored value to the Process Management key using the following information:

    Value type: DWORD

    Value name: Report Ignored

    Value data: To disable reporting of rogue processes that Application Launcher ignores, enter 0. To enable reporting of ignored rogue processes, enter 1.

  7. If you enabled reporting by adding a Report terminated or Report ignored value, you need to determine where you want the reports sent. To do so:

    1. Add a Reporting targets key to the Process management key:

      HKEY_CURRENT_USER\Software\NetWare\NAL\1.0\Process Management\Reporting Targets
      
    2. To configure database reporting, add a Database value to the Reporting targets key using the following information:

      Value type: DWORD

      Value name: Database

      Value data: To disable reporting to a database, enter 0. To enable reporting to a database, enter 1. When this option is enabled, Application Launcher writes to the database determined by the Service Location Policy package associated with the user. For more information, see Enabling the ZENworks Database Policy.

      For information about queries you can use to generate reports from the database, see Section 44.6, Generating Reports from a Database.

    3. To configure SNMP reporting, add an SNMP value to the Reporting targets key using the following information:

      Value type: DWORD

      Value name: SNMP

      Value data: To disable SNMP reporting, enter 0. To enable SNMP reporting, enter 1. When this option is enabled, Application Launcher sends to the SNMP trap targets determined by the Service Location Policy package associated with the user. For more information, see Enabling the SNMP Trap Targets Policy.

    4. To configure XML reporting, add an XML value to the Reporting Targets key using the following information:

      Value type: DWORD

      Value name: XML

      Value data: To disable XML reporting, enter 0. To enable XML reporting, enter 1. When this option is enabled, Application Launcher sends to the XML targets determined by the Service Location Policy package associated with the user. For more information, see Enabling the SNMP Trap Targets Policy.

      If the XML reports are being processed into a database, see Section 44.6, Generating Reports from a Database for information about queries you can use to generate reports from the database.

    5. To configure log file reporting, add a File value to the Reporting targets key using the following information:

      Value type: String

      Value name: File

      Value data: Specify the full path and filename to be used for the log file. This can be a mapped drive or a UNC path to a local or network drive. For example, \\server1\vol1\process\rogue.txt. If you do not enter a value, log file reporting is disabled.

      For information about understanding the information written to the log file, see Section 44.7, Understanding Log File Reports.

  8. (Optional) Use an exception list.To configure the list for Rogue Process Management:

    1. Create an Exception list key under the following Process management key:

      HKEY_CURRENT_USER\Software\NetWare\NAL\1.0\Process Management\Exception List
      

      Treat the Default Action setting (Step 4 above) as a flag to determine the behavior of Rogue Process Management when exceptions are granted:

      Value Data

      Behavior

      0

      Blacklists the applications in the exception list and assumes they are rogues unless they are launched from Novell Application Launcher. Any processes not in the exception list are allowed to run normally.

      1

      Whitelists the applications listed in the exception list and assumes they are approved. Any other processes not included in the exception list are not allowed to run, unless they are launched from Novell Application Launcher.

    2. Add a DWORD value to the Exception list key for each process you want added to the list.

      Value type: DWORD

      Value name: Specify the process internal filename. If the process has an internal filename, it is listed on the Version tab of the executable's Properties dialog box (right-click the executable file > click Properties > click Version). For example, sol.exe has an internal filename of sol.exe, so you would name this application sol.exe on the exception list. If an application has no internal filename, use its standard filename or its name without the file extension. Do not provide a path for the file; specify only the filename.

      Value data: Do not specify anything in this field.

  9. Save the registry changes.

41.3.2 Creating an Application Object to Distribute the Registry Modifications

  1. In ConsoleOne®, create a simple Application object (see Section 28.0, Distribution: Simple Applications if necessary), using the following information:

    Object name: Specify a unique name for the eDirectory object (for example, Rogue Process Management).

    Path to file: Do not specify anything in this field.

    Distribution rules: If you want to enforce specific rules before the registry changes are distributed to a workstation, define the rules. You can also do this at a later time.

    Associations: Select the users or workstations you want the changes distributed to. You can also do this at a later time.

  2. After you've created the Application object, right-click the object, then click Properties to display the object's property pages.

  3. Click Distribution Options, then click Registry to display the Registry page.

  4. Create the following registry key:

    HKEY_CURRENT_USER\Software\NetWare\NAL\1.0\Process Management
    

    To create the key:

    1. Select the HKEY_CURRENT_USER key, click Add, then click Key to add a new entry key called New Key.

    2. Rename the key to Software.

    3. Repeat the process described in Step 4.a and Step 4.b to create the complete key structure.

  5. Add a Default Action value to the Process Management key. To do so:

    1. Select the Process Management key, click Add, click DWORD to display the Edit DWORD Value dialog box, then fill in the fields as follows:

      Value name: Default Action

      Value data: To have Application Launcher ignore all rogue processes, enter 0. To have Application Launcher terminate all rogue processes, enter 1.

      NOTE:If you build an exception list, as in Step 9 below, the meaning of this value data changes. See the information in that step for more information.

    2. Click OK to add the Default Action value to the Process management key.

  6. Add a Report Terminated value to the Process management key. To do so:

    1. Select the Process management key, click Add, click DWORD to display the Edit DWORD Value dialog box, then fill in the fields as follows:

      Value name: Report Terminated

      Value data: To disable reporting of rogue processes that Application Launcher terminates, enter 0. To enable reporting of terminated rogue processes, enter 1.

    2. Click OK to add the Report Terminated value to the Process management key.

  7. Add a Report ignored value to the Process management key. To do so:

    1. Select the Process management key, click Add, click DWORD to display the Edit DWORD Value dialog box, then fill in the fields as follows:

      Value name: Report Ignored

      Value data: To disable reporting of rogue processes that Application Launcher ignores, enter 0. To enable reporting of ignored rogue processes, enter 1.

    2. Click OK to add the Report ignored value to the Process management key.

  8. If you enabled reporting by adding a Report terminated or Report ignored value, you need to determine where you want the reports sent. To do so:

    1. Add a Reporting targets key to the Process management key:

      HKEY_CURRENT_USER\Software\NetWare\NAL\1.0\Process Management\Reporting Targets
      
    2. To configure database reporting, add a Database value to the Reporting targets key using the following information:

      Value type: DWORD

      Value name: Database

      Value data: To disable reporting to a database, enter 0. To enable reporting to a database, enter 1. When this option is enabled, Application Launcher writes to the database determined by the Service Location Policy package associated with the user. For more information, see Enabling the ZENworks Database Policy.

      For information about queries you can use to generate reports from the database, see Section 44.6, Generating Reports from a Database.

    3. To configure SNMP reporting, add an SNMP value to the Reporting targets key using the following information:

      Value type: DWORD

      Value name: SNMP

      Value data: To disable SNMP reporting, enter 0. To enable SNMP reporting, enter 1. When this option is enabled, Application Launcher sends to the SNMP trap targets determined by the Service Location Policy package associated with the user. For more information, see Enabling the SNMP Trap Targets Policy.

    4. To configure XML reporting, add an XML value to the Reporting targets key using the following information:

      Value type: DWORD

      Value name: XML

      Value data: To disable XML reporting, enter 0. To enable XML reporting, enter 1. When this option is enabled, Application Launcher sends to the XML targets determined by the Service Location Policy package associated with the user. For more information, see Enabling the SNMP Trap Targets Policy.

      If the XML reports are being processed into a database, see Section 44.6, Generating Reports from a Database for information about queries you can use to generate reports from the database.

    5. To configure log file reporting, add a File value to the Reporting targets key using the following information:

      Value type: String

      Value name: File

      Value data: Specify the full path and filename to be used for the log file. This can be a mapped drive or a UNC path to a local or network drive. For example, \\server1\vol1\process\rogue.txt. If you do not enter a value, log file reporting is disabled.

      For information about understanding the information written to the log file, see Section 44.7, Understanding Log File Reports.

  9. (Conditional) Use an exception list. To configure the list for Rogue Process Management:

    1. Create an Exception list key under the Process management key:

      HKEY_CURRENT_USER\Software\NetWare\NAL\1.0\Process Management\Exception List
      

      Treat the Default Action setting (Step 5 above) as a flag to determine the behavior of Rogue Process Management when exceptions are granted:

      Value Data

      Behavior

      0

      Blacklist the applications in the exception list: assume all are rogues except those that were launched from Novell Application Launcher. Any other processes not included in the exception list are allowed to run normally.

      1

      Whitelist the applications listed in the exception list: assume all are approved, but terminate those that were not launched from Novell Application Launcher. Any other processes not included in the exception list are not allowed to run.

    2. Add a DWORD value to the Exception list key for each process you want added to the list.

      Value type: DWORD

      Value name: Enter the process internal filename. If the process has an “internal” filename, it is listed on the Version tab of the executable's Properties dialog box (right-click the executable file > click Properties > click Version). For example, sol.exe has an internal filename of sol.exe, so on the exception list you would name this application sol.exe. If an application has no internal filename, use its standard filename. Do not enter a path for the file, only the filename.

      Value data: Do not enter anything in this field.

    3. Add a string value to the Exception list key for each process you want added to the list. To do so:

      1. Select the Exception list key, click Add., click DWORD to display the Edit DWORD Value dialog box, then fill in the fields as follows:

        Value name: Enter the process filename. You can enter either the displayed executable name or the original filename. If the process has an original filename, it is listed on the Version tab of the executable's Properties dialog box (right-click the executable file, click Properties, then click Version). Do not enter a path for the file, only the filename.

        Value data: Do not enter anything in this field.

      2. Click OK to add the value to the Exception list key.

  10. Click the Associations tab to display the Associations page.

  11. Add the users and workstation you want to distribute the changes to. To make sure the changes are made without requiring any user intervention, enable the Force run option on each association.

  12. Click OK to save the changes to the Application object.

The registry modifications are distributed to associated users the next time Application Launcher refreshes and to associated workstations the next time Application Launcher Workstation Helper refreshes.