Product Description

In today's computing environments, the majority of new data is on endpoint devices. These devices are mobile and not always behind your perimeter security. Laptops, smartphones, MP3 players, thumb drives and other portable endpoint devices are especially vulnerable to loss and theft. Through wireless connections, endpoint devices can access networks that might not be secure.

At the same time, many users are not aware of the variety of security risks associated with their devices. Other users struggle to understand, implement, and maintain their security software.

ZENworks Endpoint Security Management 2017 simplifies endpoint security by putting you, not your users, in control of endpoint security. The ZENworks approach is simple: help you protect your network and mobile data by enforcing endpoint security policies that address both known and unknown security risks, whether users are within or beyond the office walls, by enabling you to manage the following endpoint security needs:

Key Features

  • Personal Firewall
    Control access to ports and protocols to protect against hackers, malware, protocol attacks, and more, while keeping security invisible to the end user.
  • Wireless Security
    Control when, how, and where users are allowed to connect. Wi-Fi connectivity can be limited to authorized and known access points, can be limited to access points with minimum encryption or signal strength, or can be disabled completely if necessary.
  • Data Encryption
    Secure data stored on the endpoint and on removable media by encrypting files so they can only be read by authorized users. Protects sensitive information on lost or stolen mobile computers.
  • USB Security
    Prevent intentional or inadvertent transmission of data to removable storage devices. Storage devices can be placed in read-only mode or fully disabled, while the endpoint hard drive and all network drives remain accessible and operational.
  • Application Control
    Ensure that only approved applications are run on corporate IT assets. Create black lists or enforce applications, (such as VPN or antivirus) to run prior to network connection.
  • Client Self Defense
    Protect the endpoint by ensuring that the Endpoint Security Agent cannot be altered, hacked, or uninstalled.
  • Port Control
    Control connectivity through LAN, modem, Bluetooth, infrared, 1394 (Firewire), and serial and parallel ports.
  • Scripting
    Run a JScript or VBScript on a device in either the system or user context. Trigger the script according to Endpoint Security Agent actions, location changes, or time periods.

Benefits

  • Use the same server infrastructure, management console, and endpoint client as the other ZENworks 2017 products: ZENworks Asset Management, ZENworks Configuration Management, ZENworks Full Disk Encryption, and ZENworks Patch Management.
  • Reduce administrative resource requirements by bringing all endpoints under central policy control regardless of whether they are at work, at home, or on the road.
  • Increase security and reduce IT support costs by automatically adjusting security settings (without user involvement) as users move from location to location.
  • Combine driver-layer and application-layer security for layered protection against all types of hacker attacks to protect sensitive and valuable data.
  • Use a driver-layer stateful firewall to open communication ports for authorized network traffic only, blocks all unwanted intrusions, and completely hides the endpoint from port scans and other attacks to block malicious hackers before they get started.
  • Create a complete perimeter around the endpoint by putting the administrator in control of LAN, WLAN, modem, Bluetooth, IRDA, 1394, serial, parallel, and USB communication ports.
  • Enable organizations to securely increase productivity through Wi-Fi connectivity by enforcing a complete set of Wi-Fi security controls.
  • Protect critical data from loss or theft of the device or by unauthorized transfer to removable storage devices.
  • Keep users protected all the time by blocking attempts to change security settings or disable the product—even in safe mode, and even for administrative users.

For additional information about key features and benefits, visit the ZENworks Endpoint Security Management product page.

File Description

Filename Usage
ZENworks2017a.iso Installation of ZENworks 2017 or upgrading a ZENworks 11.4.x Primary Server to ZENworks 2017. ZENworks 2017 includes ZENworks Asset Management, ZENworks Configuration Management, ZENworks Endpoint Security Management, ZENworks Full Disk Encryption and ZENworks Patch Management.
ZENworks2017a_Appliance-x86_64.ova
ZENworks2017a_Appliance-x86_64.vhd.zip
ZENworks2017a_Appliance-x86_64.zip.001
ZENworks2017a_Appliance-x86_64.zip.002
ZENworks2017a_Appliance-x86_64.zip.003
ZENworks2017a_Appliance-x86_64.zip.004
ZENworks2017a_Appliance-x86_64.zip.005
ZENworks2017a_Appliance-x86_64.zip.006
ZENworks2017_Appliance-x86_64.xen.tar.gz
Deployment of ZENworks 2017 Virtual Appliance or upgrading ZENworks 11 SP4 Virtual Appliance to ZENworks 2017 Virtual Appliance.
ZENworks_Reporting_62_Appliance-x86_64.ova
ZENworks_Reporting_62_Appliance-x86_64.vhd.zip
ZRS_Virtual_Appliance_6.2.x86_64-11.4.0.xen.tar.gz
ZENworks_Reporting_62_Migration_Utility.zip
Jaspersoft_Studio_6.2.iso
Deployment of ZENworks Virtual Reporting Appliance 6.2.1, migrating, or upgrading from ZENworks Reporting 5.6.1 to ZENworks Reporting 6.2.1.
ZENworksDiagnosticCenter.zip Installation of the ZENworks Diagnostic Center utility.
ZCM_17.1.0_Patch_1048701.zip
Contains installation information to allow iOS 11 devices to enroll to the ZENworks 2017 server. For more information, see the ZENworks 2017 Evaluator's Guide.

System Requirements

For ZENworks 2017 system requirements, see ZENworks 2017 System Requirements.

Downloading the Software

To download any of the files except the ZENworks Virtual Appliance image:

  1. If the download page displays a Proceed to Download button, you are not logged in yet. Click the button to log in. After you log in, you are returned to the download page.
  2. Click the Download button next to a file you want to download.
  3. Follow the on-screen prompts to download the file to a directory on your device.
  4. Repeat Steps 2 and 3 until you have downloaded all the files you need.

To download the ZENworks Virtual Appliance image:

  1. Do one of the following to download the ZENworks Virtual Appliance files to a temporary directory on your device:
    • Download the ZENworks Virtual Appliance OVA file.
    • Download the multi-part ZENworks Virtual Appliance ZIP files, then create the ZENworks Virtual Appliance OVA file:
      1. On the Download page, click the Download button next to ZENworks2017a_Appliance-x86_64.zip.001 to download the file to a temporary directory on your device.
      2. Download ZENworks2017a_Appliance-x86_64.zip.002, ZENworks2017a_Appliance-x86_64.zip.003, ZENworks2017_Appliance-x86_64.zip.004, ZENworks2017a_Appliance-x86_64.zip.005 and ZENworks2017a_Appliance-x86_64.zip.006 to the temporary directory that contains ZENworks2017a_Appliance-x86_64.zip.001.
      3. Extract ZENworks2017a_Appliance-x86_64.zip.001 by using 7-zip or WinZip 9.x.
        This task automatically merges all the multi-part ZENworks Virtual Appliance ZIP files and creates the ZENworks2017a_Appliance-x86_64.ova file.
  2. Import the ZENworks Virtual Appliance OVA file, then deploy it to a virtual infrastructure.

For detailed information on how to deploy the ZENworks Virtual Appliance, see the ZENworks Virtual Appliance Deployment and Administration Reference on the ZENworks 2017 Documentation Website.

Installing or Upgrading the Product

For installation instructions, see the the ZENworks 2017 documentation website.

Licensing

When you install ZENworks 2017, all products (Asset Management, Configuration Management, Endpoint Security Management, Full Disk Encryption, and Patch Management) are installed. During the installation, you are asked for a license code to activate the product. If you do not have a license code for a product, you can activate it in the evaluation mode.

Asset Management, Configuration Management, and Patch Management are automatically activated in evaluation mode. Endpoint Security and Full Disk Encryption are not automatically activated in evaluation mode. You must activate the evaluation for these two products.

The evaluation mode lasts 60 days, after which you must either discontinue the use of the product or provide a valid license code. No reinstallation of the software is required when you move from an evaluation license to a full license.

Patch Management is activated for patch downloads only if you provide the patch subscription license key, which you must purchase independently. You can provide the subscription license key during the installation or later through ZENworks Control Center. The Patch Management trial period starts when you activate it. You can choose to activate Patch Management at a later time. The evaluation period will last for 60 days from the day of activation. To purchase a subscription license, see the ZENworks Patch Management Product Website. ZENworks Patch Management 2017 can be installed as a stand-alone product and does not require Configuration Management to be installed.

For information about enabling evaluations and managing product licenses, see the ZENworks 2017 Product Licensing Reference.

Known Issues

For a list of known issues, see the ZENworks 2017 Readme.