Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc., reserves the right to revise this publication and to make changes to its content, at any time,
without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc., makes no representations or warranties with respect to any software, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc.,
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to
notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required
licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities on
the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export laws.
You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses. See the
Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information on
exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export
approvals.
This Novell ZENworks 10 Configuration Management Policy Management Reference includes
information about Policy Management features and procedures to help you configure and maintain
your Novell
guide is organized as follows:
Chapter 1, “Overview,” on page 11
Chapter 2, “Creating Policies,” on page 15
Chapter 3, “Managing Policies,” on page 41
Chapter 4, “Managing Policy Groups,” on page 61
Chapter 5, “Managing Folders,” on page 65
Appendix A, “Troubleshooting Policy Management,” on page 67
Appendix B, “Best Practices,” on page 95
Appendix C, “iPrint Policy Management Utility,” on page 97
®
ZENworks® 10 Configuration Management SP3 system. The information in this
novdocx (en) 16 April 2010
Appendix D, “Documentation Updates,” on page 107
Audience
This guide is intended for Novell ZENworks administrators.
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation, or go to the Novell Documentation Feedback site (http://www.novell.com/
documentation/feedback.html) and enter your comments there.
Additional Documentation
ZENworks Configuration Management is supported by other documentation (in both PDF and
HTML formats) that you can use to learn about and implement the product. For additional
documentation, see the ZENworks 10 Configuration Management SP3 documentation (http://
www.novell.com/documentation/zcm10/).
Documentation Conventions
In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and
items in a cross-reference path.
®
A trademark symbol (
trademark.
, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party
When a single pathname can be written with a backslash for some platforms or a forward slash for
other platforms, the pathname is presented with a backslash. Users of platforms that require a
forward slash, such as Linux*, should use forward slashes as required by your software.
Novell® ZENworks® 10 Configuration Management provides policies to configure operating
system settings and select application settings. By applying a policy to multiple devices, you can
ensure that all of the devices have the same configuration.
The following sections contain additional information:
Section 1.1, “What Is a Policy?,” on page 11
Section 1.2, “What Is a Policy Group?,” on page 11
Section 1.3, “Understanding the Policy Types,” on page 12
Section 1.4, “Understanding the Features of a Policy,” on page 12
1.1 What Is a Policy?
A policy is a rule that controls a range of hardware and software configuration settings on the
managed devices. For example, an administrator can create policies to control browser bookmarks
available in the browser, printers to access, and security and system configuration settings on the
managed devices.
novdocx (en) 16 April 2010
1
You can use the policies to create a set of configurations that can be assigned to any number of
managed devices. It helps you to provide the devices with a uniform configuration, and it eliminates
the need to configure each device separately.
You can assign a policy directly to a device or a user. You can also assign the policy to a folder or
group where the user or device is a member. Assigning a policy to device groups rather than device
folders is the preferred way, because a device can be a member of multiple device groups, but it can
be a member of only one device folder.
On managed devices, each policy type is enforced by a Policy Handler or Enforcer, which makes all
the configuration changes necessary to enforce or unenforce the settings in a given policy.
1.2 What Is a Policy Group?
A policy group is a collection of one or more policies. Creating policy groups eases the
administration efforts in managing policies. You can create policy groups and assign them to
managed devices the same way you would assign individual policies.
Because the policy inherits the group’s assignments, managing a policy group is easier than
managing individual policies. For example, if multiple policies are included in a policy group and
the policy group is assigned to a device or a device group, then all the policies included in the policy
group are automatically assigned to the device or device group at the same time. You need not
individually assign each policy to a device or a device group.
Overview
11
1.3 Understanding the Policy Types
ZENworks 10 Configuration Management lets you create the following policy types:
Browser Bookmarks Policy: Lets you configure Internet Explorer* favorites for Windows*
devices and users.
Dynamic Local User Policy: Lets you create new users and manage existing users created on
Windows 2000, Windows XP, and Windows Vista* workstations; and Windows 2000, 2003,
and Windows 2008 Terminal Server sessions after the users have successfully authenticated to
the user source.
Local File Rights Policy: Lets you configure rights for files or folders that exist on the NTFS
file systems.
The policy can be used to configure basic and advanced permissions for both local and domain
users and groups. It provides the ability for an administrator to create custom groups on
managed devices.
Printer Policy: Lets you configure Local, SMB, HTTP, and iPrint printers on a Windows
machine.
Remote Management Policy: Lets you configure the behavior or execution of Remote
Management sessions on the managed device. The policy includes properties such as Remote
Management operations and security.
Roaming Profile Policy: Lets you to create a user profile that is stored in a network path.
A user profile contains information about a user’s desktop settings and personal preferences,
which are retained from session to session.
Any user profile that is stored in a network path is known as a roaming profile. Every time the
user logs on to a machine, his profile is loaded from the network path. This helps the user to
move from machine to machine and still retain consistent personal settings.
SNMP Policy: Lets you configure SNMP services on the managed devices.
Windows Group Policy: Lets you configure a group policy for Windows devices.
novdocx (en) 16 April 2010
ZENworks Explorer Configuration Policy: Lets you to administer and centrally manage the
behavior and features of the ZENworks Explorer.
1.4 Understanding the Features of a Policy
A policy is applied to a device or a user only if the policy is directly or indirectly associated to
that device or user.
The Browser Bookmarks policy, Dynamic Local User policy, Printer policy, Remote
Management policy, Windows Group policy, and ZENworks Explorer Configuration policy
can be applied to a device or a user:
The Local File Rights and SNMP policies can be applied only to a device.
The Roaming Profile policy can be applied only to a user.
A policy can be associated to groups and containers.
In ZENworks Control Center, devices and users can be organized by using containers and
groups. A device or user can be a member of multiple groups. The containers can be nested
within other containers. If a policy is associated to a group of users, it applies to all users in that
group. If a policy is associated to a user container, it applies to all users in the entire subtree
rooted at that container. The same behavior applies to device groups and containers.
A policy can be associated to query groups.
In ZENworks Control Center, the devices can also be members of query groups. Query groups
are similar to ordinary groups except that the membership is determined by a query defined by
the administrator. All devices that satisfy the query become members of that device group. The
query is evaluated periodically and the membership is updated with the results. An
administrator can configure the periodicity of the evaluation. An administrator can also force
an immediate refresh of a query group. Query groups act just like other groups where policies
are concerned.
Policies are chronologically ordered by default.
When multiple policies are associated to a device, user, group, or container, the associations are
chronologically ordered by default. The administrator can change the ordering.
If a device or user belongs to multiple groups, the groups are ordered. Consequently, the
policies associated to those groups are also ordered. The administrator can change the ordering
of groups for a device or user at any time.
In addition, the policies in a policy group are ordered.
Policies have a precedence configured to determine the policy that is effective for a device or a
user.
Many policies of the same type can be applied to a user or a device through direct association
and inheritance. For example, if a Browser Bookmark policy is associated to a user and another
Browser Bookmark policy is associated to a container containing that user, the policy directly
associated to that user overrides the policy associated to the container.
Policies support management by exception.
novdocx (en) 16 April 2010
You can define a global policy for your enterprise and associate it to the top-level container
containing all your user objects. You can then override configuration items in the global policy
by defining a new policy and associating it to specific users or user groups. These users receive
their configuration from the new policy. All other users receive their configuration from the
global policy.
Policies support system requirements.
You can specify the system requirements of a device or user in a policy. The policy is applied to
a device or user only if the device or user meets the system requirements.
For example, the SNMP policy is applied by default on all devices having the SNMP service
installed.
ZENworks Configuration Management supports singular and plural policies.
Singular Policy: If multiple policies of the same policy type are assigned to a device or a user
and the policy type is a Singular policy, then only the nearest associated policy meeting the
system requirements is applied. If the policy type is associated to both user and device, then
two different policies can be assigned to user and device.
The SNMP policy, Dynamic Local User policy, Remote Management policy, Roaming Profile
policy, and ZENworks Explorer Configuration policy are singular policies.
Overview13
Plural Policy: If multiple policies of the same policy type are assigned to a device or a user
and the policy type is a Plural type, then all policies meeting the associated system requirement
are applied.
The Browser Bookmarks policy, Local File Rights policy, Windows Group policy, and Printer
policy are plural policies. However, the security settings in the Windows Group policy are not
plural.
Policies can be disabled.
When you create a policy in ZENworks Configuration Management, the policy is enabled by
default. You can disable it if you do not want to apply it on a user or a device.
ZENworks Configuration Management allows you to resolve policy conflicts.
The set of effective policies is a subset of the set of assigned policies. The set of effective
policies for a device or user is calculated by applying precedence rules, multiplicity rules, and
system requirements filters on the set of assigned policies. Effective policies are calculated
separately for devices and users. The Policy Conflict Resolution setting determines how user
and device policies interact for a specific user and device combination.
Effective policies are calculated separately for devices and users. When a user logs in to a
device, policies associated to both the user and the device must be applied. Policy Conflict
Resolution settings are used only when policies of the same type are associated to both the
device and the user. This setting determines the precedence order among the policies associated
to the user and those associated to the device. The Policy Conflict Resolution settings are
applied after the effective policies are calculated.
novdocx (en) 16 April 2010
Policy Conflict Resolution settings are defined when associating a policy to a device. The
settings cannot be defined for associations to users. For each policy type, the Policy Conflict
Resolution setting defined in the closest effective policy of that type is applied for all policies
of that type.
A Policy Resolution Conflict setting can have one of the following values:
User Last: Applies the policies associated to the device first, then the policies associated
to the user. This is the default value.
Device Last: Applies the policies associated to the user first, then the policies associated
to the device.
User Only: Applies only the policies associated to the user and ignores the policies
associated to the device.
Device Only: Applies only the policies associated to the device and ignore the policies
associated to the user.
NOTE: The Policy Conflict Resolution setting is taken from the device-associated policy with
the highest precedence.
Novell® ZENworks® 10 Configuration Management lets you create policies by using ZENworks
Control Center or by using the zman command line utility.
The following sections contain step-by-step instructions about creating policies by using ZENworks
Control Center:
Section 2.1, “Browser Bookmarks Policy,” on page 15
Section 2.2, “Dynamic Local User Policy,” on page 16
Section 2.3, “Local File Rights Policy,” on page 20
Section 2.4, “Printer Policy,” on page 23
Section 2.5, “Remote Management Policy,” on page 27
Section 2.6, “Roaming Profile Policy,” on page 28
Section 2.7, “SNMP Policy,” on page 29
Section 2.8, “Windows Group Policy,” on page 30
Section 2.9, “ZENworks Explorer Configuration Policy,” on page 32
novdocx (en) 16 April 2010
2
The following section explains how to create policies by using the zman command line utility:
Section 2.10, “Creating Policies by Using the zman Command Line Utility,” on page 34
2.1 Browser Bookmarks Policy
The Browser Bookmarks policy lets you configure Internet Explorer favorites for Windows devices
and users.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click New, then click Policy to display the Select Policy Type page.
3 Select Browser Bookmarks Policy, click Next to display the Define Details page, then fill in the
fields:
Policy Name: Provide a name for the policy. The policy name must be different than the name
of any other item (group, folder, and so forth) that resides in the same folder. The name you
provide displays in ZENworks Control Center.
Folder: Type the name or browse to and select the ZENworks Control Center folder where you
want the policy to reside. The default is
organize your policies.
Description: Provide a short description of the policy’s content. This description displays in
ZENworks Control Center.
4 Click Next to display the Bookmarks Tree Data Source page.
5 Create a browser bookmarks tree by importing a previously exported file or manually entering
the data. Before you import a book marks file ensure that it is in UTF-8 format. To manually
convert the bookmark file into UTF-8 format, use a text editor
/policies
, but you can create additional folders to
Creating Policies
15
The following list contains browser-specific information to create the exported file:
Internet Explorer 6.x/8.x: In the browser window, click File > Import and Export.
Follow the instructions given in the Import/Export Wizard to create
the bookmark.htm
file.
Internet Explorer 7: In the browser window, click Add to Favorites > Import and
Export. Follow the instructions given in the Import/Export Wizard to create the
bookmark.htm
Mozilla Firefox 2.x: In the browser window, click Bookmarks > Organize Bookmarks,
then click File > Export to create the
Mozilla Firefox 3.x: In the browser window, click Bookmarks > Organize Bookmarks,
then click Import and Backup > Export HTML to create
file.
bookmarks.html
file.
the bookmarks.html
file.
6 Click Next to display the Bookmarks Tree Configuration page, then use the options to
configure the bookmarks tree.
The following table lists the tasks you can perform with the New, Edit, and Delete options.
FieldDetails
novdocx (en) 16 April 2010
New Click New > Folder to display the Add Folder to Bookmarks dialog box, through
which you can add a new folder to the bookmarks tree.
Click New > Bookmark to display the Add Bookmark to Bookmarks dialog box,
through which you can add a new bookmark to the bookmarks tree by specifying
the bookmark name and a URL. Click the button next to the URL field to verify
that the URL entered by you is correct and functional.
Edit Select the bookmark name you want to change, click Edit > Rename, then specify
a new name.
Click Edit > Sort to organize the bookmarks in ascending or descending order.
Click Edit > Move Up, Move Down, or Move To to relocate a bookmark.
Click Edit > Select All Children to select all the subdirectories and bookmarks of
the selected parent directory.
Click Edit > Deselect All Children > to deselect all the subdirectories and
bookmarks of the selected parent directory.
Click Edit > Clear Selection > to clear the selections.
Delete
Click Delete to delete the selected bookmarks and the bookmarks folder from the
bookmarks tree. However, you cannot delete the default bookmarks folder named
Bookmarks
.
7 Click Next to display the Summary page.
8 Click Finish to create the policy now, or select Define Additional Properties to specify
additional information, such as policy assignment, system requirements, enforcement, status,
and which group the policy is a member of.
2.2 Dynamic Local User Policy
The Dynamic Local User policy lets you create new users and manage existing users on the
managed device after they have successfully authenticated to user source.
NOTE: Ensure that the latest version of the Novell client is installed on the managed device before
TM
the Dynamic Local User policy is enforced. To obtain the latest version of Novell Client
, see the
Novell Download Web site (http://download.novell.com/index.jsp).
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click New, then click Policy to display the Select Policy Type page.
3 Select Dynamic Local User Policy, click Next to display the Define Details page, then fill in the
fields:
Policy Name: Provide a name for the policy. The policy name must be different than the name
of any other item (group, folder, and so forth) that resides in the same folder. The name you
provide displays in ZENworks Control Center.
Folder: Type the name or browse to the ZENworks Control Center folder where you want the
policy to reside. The default is
/policies
, but you can create additional folders to organize
your policies.
Description: Provide a short description of the policy’s content. This description displays in
ZENworks Control Center.
4 Click Next to display the User Configurations page, then use the options on the page to
configure the user account.
The following table contains information about configuring dynamic local user accounts and
managing them on managed devices:
FieldDetails
Use User Source
Credentials
Use the Credentials
Specified Below
(Always volatile)
Enables logging in through the user's authoritative source credentials
instead of Windows 2000, Windows XP, or Windows Vista credentials.
Allows you to specify the following user credentials for a volatile user:
User Name: Specify the user’s name.
Full Name: Specify the user’s complete name.
Description: Provide any additional information that helps the
administrator to further identify this user account.
If a user logs in to a device that has the Dynamic Local User policy
applied and then logs out of the device when the device is disconnected
from the network, the user is unable to log in to the disconnected device
again. For information on this issue, see “Dynamic Local User Policy
Troubleshooting” on page 70.
Manage Existing User
Account (if any)
Volatile UserSpecifies the use of a volatile user account for login. The user account
Helps you to manage a user object that already exists.
If you select both the Volatile User and Manage Existing User Account (If Any) check boxes, and the user has a permanent local account that uses
the same username specified in the user source, the permanent account
is changed to a volatile (temporary) account and is removed when the
user logs out.
that NWGINA creates on the local workstation can be either a volatile or a
nonvolatile account.
Enable Volatile User
Cache
Enables the caching of the volatile user account on the device for a
specified period of time.
Creating Policies17
FieldDetails
novdocx (en) 16 April 2010
Cache Volatile User for
Time Period (Days)
Not a Member OfDisplays the available group to which a user can be assigned as a
Member OfDisplays groups a user is member of.
CustomClick Custom to display the Custom Group Properties dialog box, through
EditClick Edit to view and edit the details of a custom group. You cannot edit
DeleteClick Delete to delete a custom group. You cannot delete the default
Allows you to specify the number of days to cache the volatile user
account on the device. The default value is 5. You can specify a value
from 1 to 999 days.
This volatile user account is deleted after the expiry of the specified cache
period when another DLU user logs out from the device.
member.
which you can add a new custom group and configure its rights.
the default Windows groups with this option.
Windows groups with this option.
5 Click Next to display the Login Restrictions page, then use the options on the page to configure
user access.
The Dynamic Local User policy can be associated to either a user or device. If the policy is
associated to a user object, workstations can be included or excluded from the list. In this case,
Included / Excluded Users list will be ignored.
If the policy is associated to a device object, users can be included or excluded from the list. In
this case, Included / Excluded Workstations list will be ignored.
The Excluded Workstations List displays the workstations and containers that you want to
exclude DLU access to. Workstations listed or workstations that are part of containers listed in
this box cannot use DLU access. You can make exceptions for individual workstations by
listing them in the Included Workstations List. This allows DLU access to those workstations
only, and excludes DLU access to the remaining workstations in the container.
Rules for Workstations are:
By default, all workstations are included.
For an indirect association, if an object is in both the lists, the closeness of the association
is considered. A direct association is closer than a group association, which in turn is
closer than a folder.
If the closeness is the same, a workstation is directly added to Group A and Group B, and
the Included List takes precedence.
Excluded ListIncluded ListResult
Workstation-AWorkstation-BThe policy is applied on all
Workstation Group-1Workstation-AThe policy is not applied on
any workstations in
Workstation Group-1, except
for Workstation -A.
The policy is applied on
workstations that are not
contained in Workstation
Group-1.
novdocx (en) 16 April 2010
Container-1Workstation Group-1 or
Workstation-A
The policy is not applied on
any workstations in Container1, except for Workstation
Group-1 or Workstation-A.
The policy is also applied on
workstations that are not
contained in the Container-1.
The Excluded Users List displays the users and containers that you want to exclude DLU
access to. Users listed or users that are part of containers listed in this box cannot use DLU
access. You can make exceptions for individual users by listing them in the Included Users list.
This allows DLU access to those users only, and excludes DLU access to the remaining users in
the container.
Rules for Users are:
By default, all users are included.
For an indirect association, if an object is in both the lists, the closeness of the association
is considered. A direct association is closer than a group association, which in turn is
closer than a folder.
If the closeness is the same, a user is directly added to Group A and Group B, and the
Included List takes precedence.
Excluded ListIncluded ListResult
User-AUser-BThe policy is applied on all
users except User-A.
User Group-1User-AThe policy is not applied on
any users in User Group-1,
except for User -A.
The policy is also applied on
users that are not contained in
User Group-1.
Container-1User Group-1 or User-A The policy is not applied on
any users in Container-1,
except for User Group-1 or
User-A.
The policy is also applied on
users that are not contained in
Container-1.
Creating Policies19
6 Click Next to display the File Rights page.
The following table contains information about managing Dynamic Local User file system
access on the managed device:
FieldDetails
AddAllows you to select and assign appropriate file rights.
To add a file/folder:
1. Click Add, then specify a file or folder.
2. Select the file rights you want to assign to the specified file or folder.
3. If you want to restrict the inheritance of the rights to only the immediate child
file or folder, select Restrict inheritance to immediate child files/folders only.
4. Click OK.
EditCopy: Allows you to copy and add a file rights setting to the list.
1. Select a file or folder, then click Edit.
2. Click Copy.
3. Specify a new name.
4. Click OK.
novdocx (en) 16 April 2010
Rename: Allows you to edit only the filename.
1. Select a file or folder, then click Edit.
2. Click Rename.
3. Specify a new filename.
4. Click OK.
Move Up or
Move Down
RemoveAllows you to remove a file or a folder from the list.
Allows you to reorder the files or folders.
1. Select the check box next to the file or folder you want to move.
2. Click Move Up or Move Down to relocate it.
1. Select the check box next to the file or folder.
2. Click Remove.
7 Click Next to display the Summary page.
8 Click Finish to create the policy now, or select Define Additional Properties to specify
additional information, such as policy assignment, system requirements, enforcement, status,
and which group the policy is a member of.
2.3 Local File Rights Policy
The Local File Rights policy allows you to configure rights for files or folders that exist on the
NTFS file systems.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click New, then click Policy to display the Select Policy Type page.
3 Select Local File Rights Policy, click Next to display the Define Details page, then fill in the
Policy Name: Provide a name for the policy. The policy name must be different than the name
of any other item (group, folder, and so forth) that resides in the same folder. The name you
provide displays in ZENworks Control Center.
Folder: Type the name or browse to and select the ZENworks Control Center folder where you
want the policy to reside. The default is
/policies
, but you can create additional folders to
organize your policies.
Description: Provide a short description of the policy’s content. This description displays in
ZENworks Control Center.
4 Click Next to display the Configure Basic Properties page, then use the options on the page to
configure the attributes.
The following table contains information about configuring a file or folder and the attributes
associated with it:
FieldDetails
File / Folder Path Allows you to specify the complete path of a file or folder on the managed
device. You can use the ZENworks system variables or environment variables to
specify the path.
novdocx (en) 16 April 2010
To configure system variables in ZENworks Control Center, click the
Configuration tab > the Content setting in the Management Zone Settings panel
> System Variables. Click the Help button for details about configuring system
variables.
AttributesAllows you to specify the attributes of a file or folder, such as Read only and
Hidden.
This page allows you to configure permissions for only one file or folder. If you want to assign
permissions to multiple files or folders, then configure them in the Details page after creating
the policy.
5 Click Next to display the Configure Permissions page, then use the options on the page to
configure permissions for selected users or groups.
The following table contains information about configuring permissions:
Creating Policies21
FieldDetails
novdocx (en) 16 April 2010
Permission for
Users or Groups
Create Groups on
the Managed
Device if they Do
not Exist
Remove Access
Control Rules not
Configured by
ZENworks
Allows you to configure permissions for users or groups.
1. Click Add, then Click User or Group to select a user or a group from the
appropriate drop-down list.
2. Select the type of permission you want to configure as Simple NTFS Permissions or All NTFS Permissions. Depending on the type of
permission you select, a list of permissions are displayed. Configure the
permissions as applicable to the selected user or group.
3. By default, when a permission is set on a folder, all the subfolders and the
files also inherit the permissions. If you want to restrict the inheritance of
the rights to only the immediate child file or folder, select Restrict inheritance to immediate child files/folders only.
4. Click OK.
The permissions configured for the user or group in the Dynamic Local User
policy takes precedence over the permissions configured in the Local File
Rights policy.
Creates a group for which permissions are configured; however the group
does not exist on the managed device. With this option, you can create only
local groups.
Removes all access control entries for users or groups not configured by the
ZENworks Local File Rights policy. Also, updates the existing access control
entries for users and groups configured in the policy. After the policy is applied,
any manual changes made to the permissions for a user or group configured
by the policy are lost when the policy is re-applied.
Inherit Applicable
Access Rights
Configured on
Parent Folders
Select Yes if you want a file or folder to inherit applicable access control rules
from its parent object. If you select No, inherited rules are removed. If you do
not want to make any changes, select not configured on the managed
device.At least one attribute, permission, or inheritance setting must be
configured to create a policy. Without configuring any settings, you cannot
create a policy.
NOTE: If the Full Control access right is denied for the Administrators or Authenticated Users
group, the policy is successful only during the first enforcement. However, if the Full Control
access right is denied for the Administrators or Authenticated Users group and the Remove access control rules not configured by ZENworks option is selected, the policy fails.
The unenforcement of the Local File Rights policy from a device fails if the Full Control access
right is denied for the Administrators or Authenticated Users group in the policy.
6 Click Next to display the Summary page.
7 Click Finish to create the policy now, or select Define Additional Properties to specify
additional information, such as policy assignment, system requirements, enforcement, status,
and which group the policy is a member of.
The Printer policy allows you to configure Local, SMB, HTTP, and iPrint printers on a Windows
device.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click New, then click Policy to display the Select Policy Type page.
3 Select Printer Policy, click Next to display the Define Details page, then fill in the fields:
Policy Name: Provide a name for the policy. The policy name must be different than the name
of any other item (group, folder, and so forth) that resides in the same folder. The name you
provide displays in ZENworks Control Center.
Folder: Type the name or browse to and select the ZENworks Control Center folder where you
want the policy to reside. The default is
organize your policies.
Description: Provide a short description of the policy’s content. This description displays in
ZENworks Control Center.
4 Click Next to display the Printer Identification page, then select the type of printer to be
installed on the managed device.
5 Click Next, then skip to the appropriate step, depending on which printer type you chose in
Step 4:
Local Printer: Continue with Step 6.
Network Printer: Skip to Step 7.
/policies
, but you can create additional folders to
novdocx (en) 16 April 2010
iPrint Printer: Skip to Step 8.
6 (Conditional) If you are configuring a local printer, refer to the following table for more
information:
FieldDetails
NameSpecify the name of the local printer that you want to configure on the target
device.
PortSelect the physical port to which the printer is added, such as LPT1 or
COM1.
DriverBrowse to and select a suitable driver for the printer. If the driver is not
contained in the browser list, type in the correct model name. The driver
must either be installed on the target device or specified in the enforced
policies. The driver must be digitally signed by Microsoft*. However, if you
choose to use a driver that is not digitally signed, see the Troubleshooting
Scenario
Creating Policies23
FieldDetails
Install a DriverSelect this option to install a driver on the target device. The driver
installation must be non-interactive and silent. The supported driver
.inf
installation type is
or
.tar
formats. The
available on the target device. Ensure that the
installation of the driver.
NOTE: To add a new printer driver to the existing driver list:
For example, if you want to add an HP* Color LaserJet* 4550 PCL printer,
then add the following line:
HP = HP Color LaserJet 4550 PCL
novdocx (en) 16 April 2010
.zip
Model NameBrowse to select the model name of the driver.
Driver File PathSpecify the driver files either from a particular device where the browser is
running or from a path on the managed device, such as
C:\temp\nipp.zip
Supported PlatformsSpecify a platform for the driver. The platform information helps to select a
suitable driver from the available drivers list, which is based on the
installation platform.
Language of
Installation
Install Forcefully
Even if the Driver is
Already Installed
Select the installation language. Your choices are English (United States),
French, German, Portuguese, Spanish, Italian, Chinese (Traditional),
Chinese (Simplified), or Japanese.
Select this option to force installation of the driver, even though it is already
installed on the target device.
.
7 (Conditional) If you are configuring a Network printer, refer to the following table for more
information:
FieldDetails
Name / LocationSpecify the UNC path or URL name of the HTTP or an SMB printer.
For example, it is
http://server/printers/.myprinter/.printer
and
printer.
\\server-name\printer-name
for an SMB printer,
for a HTTP
NOTE: Support for network printer that prompts for user credentials is not
provided.
DriverBrowse to add and select a suitable driver for the Windows HTTP printer.
You can ignore this for SMB printers.
The driver must be digitally signed by Microsoft*. However, if you choose to
use a driver that is not digitally signed, see the Troubleshooting Scenario
Install a DriverUse this option to install a driver on the target device. The driver installation
is non-interactive and silent. The supported driver installation types is
and the
file can be specified directly if it is already available on the target device.
Ensure that the
NOTE: To add a new printer driver to the existing driver list:
For example, if you want to add an HP Color LaserJet 4550 PCL printer, then
add the following line:
HP = HP Color LaserJet 4550 PCL
Model NameBrowse to select the model name of the driver.
Driver File PathSpecify the driver files either from a particular device where the browser is
running or from a path in the managed device, such as
Supported Platforms Specify a platform for the driver. The platform information helps to select a
suitable driver from the available drivers list, which is based on the
installation platform.
Language of
Installation
Install Forcefully
Even if the Driver is
Already Installed
Select the installation language. Your choices are English (United States),
French, German, Portugese, Spanish, Italian, Chinese (Traditional), Chinese
(Simplified), or Japanese.
Select this option to force the installation of the driver on the device every
time the policy is applied on the device, even if the driver is already installed
on the device.
c:\temp\nip.zip
8 (Conditional) If you are configuring an iPrint printer, refer to the following table for more
information:
On Windows Vista devices, you need to install the Novell iPrint client 5.04 or later.
.
FieldDetails
Name / LocationSpecify the URI name of the iPrint printer. For example,
.
Update iPrint Printer
while Installing the
Driver
acme.com/ipp/servername
Select this option to update the printer driver and to reinstall the printer
driver from the iPrint server while installing the iPrint printer.
ipp://
Creating Policies25
FieldDetails
Install iPrint ClientSelect this option to install the iPrint client on a target machine. The iPrint
client is not supported on 64-bit versions of Windows Server 2003.
novdocx (en) 16 April 2010
iPrint Client Installer
File Path
The installation file can be either
which are capable of carrying out non-interactive silent installation.These
files can be uploaded from the machine where the browser is running.
To install the iPrint client, you cannot use a
a silent installation. For example, you cannot use a
install iPrint client.
Allows to specify the path to the iPrint Client Installer (which installs the
iPrint client on the managed device).
nipp.zip
or
nipp-s.exe
.exe
file that does not support
nipp.exe
On the Managed Device: Select this option to specify the path to
the iPrint client installer on the managed device.
Select from this Device: Select this option to add the iPrint client
installer as content with the policy. You can also distribute the iPrint
client installer along with the policy.
Install Forcefully Even
if the Driver is Already
Installed
Configure iPrint ClientSelect this option to configure the iPrint proxy server.
Proxy ServerSpecify the iPrint proxy server name. For example,
Select this option to force installation of the driver, even though it is
already installed on the target device.
If the workstations are located outside the physical firewall, you can use
this option to specify the proxy address followed by a (:) and the port
number.
http://
proxy.companyx.com:8080
, both of
file to
9 Click Next to display the Printing Preferences page, then use the options to specify the
preferences. Refer to the following table for more information:
FieldDetails
OrientationSelect this option to specify the paper layout for the printer, such as
landscape or portrait.
Duplex PrintingSpecify whether or not to print on both sides of the paper, if the printer has
that capability.
CollateSpecify whether or not the printer should organize multiple copies of a
document, if the printer has that capability.
Print QualitySelect the print quality. Select High quality, for the best possible resolution, or
select Low quality for lower resolution and lower quality.
Paper SourceSpecify the paper source for the printer. A source that is not listed in the
standard available list can also be specified, but it must be supported by the
printer. Information on supported paper sources is available in the printer
documentation or in the registry key
Paper SizeSpecify the paper size for the printer. You can specify any paper size
supported by the printer, in addition to the options listed in the menu.
Information on supported sizes is available in the printer documentation or in
the registry key
10 Click Next to display the Additional Printer Policy settings, then use the options to specify the
settings. Refer to the following table for more information:
FieldDetails
novdocx (en) 16 April 2010
Set as Default
Printer
Remove all
Printers not
Specified by
ZENworks Printer
Policies
Select this option to specify a printer as the default printer to which the print
requests are sent if no other printer is specified by the user.
On a Windows 7 managed device, the assigned printer might be set as a
default printer on the device even if the Set as Default Printer option is not
selected in the policy.
Select this option to remove all printers that are not specified through the
ZENworks Printer policy.
11 Click Next to display the Summary page.
This wizard allows you to configure only one printer. If you want to configure additional
printers, then configure them in the Details page after creating the policy.
12 Click Finish to create the policy now, or select Define Additional Properties to specify
additional information, such as policy assignment, system requirements, enforcement, status,
and which group the policy is a member of.
Only the preferences that are supported by the printer are configured on that printer.
2.5 Remote Management Policy
The Remote Management policy lets you configure the behavior or execution of a Remote
Management session on the managed device. The policy includes properties such as Remote
Management operations and security.
By default, a secure Remote Management policy is created on the managed device when the
ZENworks Adaptive Agent is deployed with the Remote Management component on the device.
You can use the default policy to remotely manage a device. To override the default policy, you can
explicitly create a Remote Management policy for the device.
For information on creating the Remote Management policy, see “Creating the Remote Management
Policy” in the ZENworks 10 Configuration Management Remote Management Reference.
Creating Policies27
2.6 Roaming Profile Policy
The Roaming Profile policy allows you to create a user profile that is stored in a network path. An
administrator can either use the roaming profile stored in the user’s home directory or the profile
stored in the network directory location.
IMPORTANT: Because of the security settings in Microsoft Vista, administrators must manually
add the appropriate security rights to the user registry hive to enable roaming profiles. For more
information, see Section 3.7, “Assigning a Roaming Profile Policy that has User Profile Stored on a
Windows Share Location to Users on a Windows Vista, Windows Server 2008, or Windows 7
Device,” on page 47.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click New, then click Policy to display the Select Policy Type page.
3 Select Roaming Profile Policy, click Next to display the Define Details page, then fill in the
fields:
Policy Name: Provide a name for the policy. The policy name must be different than the name
of any other item (group, folder, and so forth) that resides in the same folder. The name you
provide displays in ZENworks Control Center.
Folder: Type the name or browse to and select the ZENworks Control Center folder where you
want the policy to reside. The default is
organize your policies.
Description: Provide a short description of the policy’s content. This description displays in
ZENworks Control Center.
/policies
, but you can create additional folders to
novdocx (en) 16 April 2010
4 Click Next to display the Roaming Profile Policy page, then use the options to specify the
settings. Refer to the following table for more information:
FieldDetails
Store User Profile
in User’s Home
Directory
User Profile PathSelect a UNC path to a user’s roaming profile. If you want to administer the
Override Terminal
Server Profile
Select this option to load and save a user’s profile from the user’s home
directory as specified in eDirectory.
This option is applicable only if the user object is in eDirectory. However, it is
currently not supported in Domain Services for Windows environment.
policy on more than one user object, use
variable. In this case, the environment variable is resolved with the logged-on
username and the user profile is loaded from the specified path.
If a user is accessing a terminal server that has its own profile, enable this
option to override the terminal server’s profile.
%USERNAME%
as the environment
5 Click Next to display the Summary page.
6 Click Finish to create the policy now, or select Define Additional Properties to specify
additional information, such as policy assignment, system requirements, enforcement, status,
and which group the policy is a member of.
The SNMP policy allows you to configure SNMP parameters on the managed devices.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click New, then click Policy to display the Select Policy Type page.
3 Select SNMP Policy, click Next to display the Define Details page, then fill in the fields:
Policy Name: Provide a name for the policy. The policy name must be different than the name
of any other item (group, folder, and so forth) that resides in the same folder. The name you
provide displays in ZENworks Control Center.
Folder: Type the name or browse to the ZENworks Control Center folder where you want the
policy to reside. The default is
/policies
your policies.
Description: Provide a short description of the policy’s content. This description displays in
ZENworks Control Center.
4 Click Next to display the SNMP Community Strings page. Refer to the following table for more
information:
, but you can create additional folders to organize
novdocx (en) 16 April 2010
FieldDetails
Add a Community StringAllows you to add a community string.
Community StringSpecify the name of the SNMP community string to be added.
Community RightsAllows you to administer rights for a selected community, such as
Read Only, Read & Write, Read & Create, and Notify.
Remove All SNMP
Community Strings not
specified by ZENworks
SNMP Policies
Send SNMP Authentication
Trap
Select this option to remove all the community strings that are not
specified through ZENworks SNMP policy.
Select this option if you want to send authentication trap information.
This page allows you to add only one community string to the policy. If you want to add
multiple community strings, then configure them in the Details page after creating the policy.
5 Click Next to display the SNMP Default Access Control List page, then use the options to
specify the settings. Refer to the following table for more information:
FieldDetails
Allow SNMP CommunicationSelect this option to specify whether SNMP communication is
allowed from any host or a list of predefined hosts.
Remove All SNMP Allowed
Hosts not Specified by
ZENworks SNMP Policies
Select this option to remove all the SNMP allowed hosts that are not
specified through the ZENworks SNMP policy.
6 Click Next to display the SNMP Trap Targets page, then use the options to specify the settings.
Refer to the following table for more information:
Creating Policies29
FieldDetails
Add a Trap TargetAllows you to add a trap target for the SNMP service.
IP Address / Host NameSpecify an IP address or host name of the target device.
Community StringSpecify a community string for the trap target defined in IP address/
Host name.
novdocx (en) 16 April 2010
Remove All SNMP Trap
Targets Not Specified by
ZENworks SNMP Policies
Select this option to remove all the trap targets that are not
specified through the ZENworks SNMP policy.
This page allows you to add only one trap target to the policy. If you want to add multiple trap
targets, then configure them in the Details page after creating the policy.
7 Click Next to display the Default System Requirements for SNMP Policy page, then use the
options to specify the settings. Refer to the following table for more information:
FieldDetails
Apply Policy Only if SNMP
Service Exists On the Target
Device
Select this option apply the SNMP policy only if the SNMP service
exists on the target device. If the target device does not contain
the SNMP service, the SNMP policy cannot be fully applied or
effective on the target device.
8 Click Next to display the Summary page.
9 Click Finish to create the policy now, or select Define Additional Properties to specify
additional information, such as policy assignment, system requirements, enforcement, status,
and which group the policy is a member of.
2.8 Windows Group Policy
The Windows Group Policy allows you to configure a Group Policy for Windows devices.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click New, then click Policy to display the Select Policy Type page.
3 Select Windows Group Policy, click Next to display the Define Details page, then fill in the
fields:
Policy Name: Provide a name for the policy. The policy name must be different than the name
of any other item (group, folder, and so forth) that resides in the same folder. The name you
provide displays in ZENworks Control Center.
Folder: Type the name or browse to and select the ZENworks Control Center folder where you
want the policy to reside. The default is
/policies
, but you can create additional folders to
organize your policies.
Description: Provide a short description of the policy’s content. This description displays in
ZENworks Control Center.
4 Click Next to display the Windows Group Policy Settings page, then use the options to specify
the settings. Refer to the following table for more information:
With the Windows Group Policy, you can manage either a Local group or
an Active Directory group policy.
Before you can configure the Group Policy, you need to install a helper
application. Click Install the Group Policy Helper to install the
zenworks-grouppolicyhelper-10.x.x.x.msi
installer package. This installation needs to be done only once. After the
helper is installed, clicking Configure launches the helper, which you then
use to configure or import a policy.
, which is a Windows
novell-
Local Group Policy: Select this option to configure a Local Group
policy.
To launch the group policy helper, click Configure. Configure or edit
the settings in the Local Group policy, then upload the configured
policy to the ZENworks Server.
Active Directory Group Policy: Select this option to use an Active
Directory Group policy.
To launch the group policy helper, click Configure. Import an Active
Directory Group policy created from Windows Server 2003 or
Windows Server 2008 Active Directory, then upload to the ZENworks
Server. (You cannot edit an Active Directory policy through ZENworks
Control Center.)
NOTE: ZENworks Configuration Management SP3 supports
importing an Active Directory Group policy created from Windows
Server 2008 R2 Active Directory.
Select the
Configuration Settings
to Be Applied On the
Managed Device
After you have adjusted the policy settings as you prefer, you can select
how to apply the settings to the managed device.
Computer Configuration Select this option to apply the computer
configuration settings to the managed device.
Apply all settings: Select this option to apply all the computer
configuration settings to the managed device.
Apply only security settings: Select this option to apply only the
security settings to the managed device.
However, if you select this option, the software restrictions in security
settings are not enforced on the device. To enforce the software
restrictions, select Apply all settings.
Apply all settings except security settings: Select this option to
apply all the computer configuration settings except for security
settings to the managed device.
User Configuration Select this option to apply the user configuration
settings to the managed device.
NOTE: The Computer Configuration settings from a user associated group
policy are not applied when the user logs into a Windows 2000 or Windows
2003 Terminal Server.
5 Click Next to display the Summary page.
Creating Policies31
6 Click Finish to create the policy now, or select Define Additional Properties to specify
additional information, such as policy assignment, system requirements, enforcement, status,
and which group the policy is a member of.
If the login/logoff scripts are configured in a user-associated group policy and the After
enforcement, force a re-login on the managed device, if necessary option in the Apply
Immediatesection of the General Settings is selected, then a relogin is forced and the login
scripts run when the user logs into the managed device again. The startup scripts from a deviceassociated policy run only when the device reboots the next time.
The logoff scripts configured in the group policy does not run on Windows Server 2000,
Windows Server 2003, and Windows Server 2008.
The Group policy login scripts do not support the environment variables for users on Windows
Vista, Windows Server 2003, Windows Server 2008, Windows 7, and Windows Server 2008
R2.
The scripts configured through Active Directory group policy are not enforced on the device
even though the policy displays success in the ZENworks Adaptive Agent Policies page. For
more information see, Section A.14, “Windows Group Policy Troubleshooting,” on page 86.
IMPORTANT: If you want to apply the security settings of the Windows Group policy on
Windows XP SP1 or SP2 managed device, ensure that the device have Windows Hotfix
KB897327 installed. For more information about how to install the Hotfix, see the Microsoft
Support Web site (http://support.microsoft.com/KB/897327).
novdocx (en) 16 April 2010
2.9 ZENworks Explorer Configuration Policy
The ZENworks Explorer Configuration Policy allows you to administer and centrally manage the
behavior and features of ZENworks Explorer.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click New, then click Policy to display the Select Policy Type page.
3 Select ZENworks Explorer Configuration Policy, click Next to display the Define Details page,
then fill in the fields:
Policy Name: Provide a name for the policy. The policy name must be different than the name
of any other item (group, folder, and so forth) that resides in the same folder. The name you
provide displays in ZENworks Control Center.
Folder: Type the name or browse to and select the ZENworks Control Center folder where you
want the policy to reside. The default is
organize your policies.
Description: Provide a short description of the policy’s content. This description displays in
ZENworks Control Center.
4 Click Next to display the ZENworks Explorer Configuration Settings page, then use the options
to specify the settings. Refer to the following table for more information:
Enable Folder ViewUse this option to display a folder list in the application window.
The values are Yes , No, and Unconfigured. The default value is
Unconfigured and the existing settings of the managed device are
retained.
novdocx (en) 16 April 2010
Expand the Entire
Folder Tree
Display Applications in
Windows Explorer
Name of Root FolderUse this option to change the name of the root folder.
Hide the Zicon in the
taskbar
Enable Manual Refresh Use this option to specify whether manual refresh of applications is
Allow Logout / Login as
a New User
Use this option to expand the entire folder tree when the application
window is opened.
The values are Yes , No, and Unconfigured. The default value is
Unconfigured and the existing settings of the managed device are
retained.
Use this option to display the application list in Windows Explorer.
The values are Yes , No, and Unconfigured. The default value is
Unconfigured and the existing settings of the managed device are
retained.
Use this option to hide the ZENworks icon in the taskbar.
The values are Yes , No, and Unconfigured. The default value is
Unconfigured and the existing settings of the managed device are
retained.
enabled after starting ZENworks Explorer.
The values are Yes , No, and Unconfigured. The default value is
Unconfigured and the existing settings of the managed device are
retained.
Use this option to enable the user to log out and log in as a new user.
The values are Yes , No, and Unconfigured. The default value is
Unconfigured and the existing settings of the managed device are
retained.
Show ProgressUse this option to specify whether the progress of the bundle operations
should be displayed.
The values are Yes , No, and Unconfigured. The default value is
Unconfigured and the existing settings of the managed device are
retained.
Show Default
Notifications
Use this option to specify whether the default notification should be
displayed. The notification is displayed when the content associated with
a policy or a bundle is downloaded on the device. For example, during the
enforcement of the Printer policy on a device, the following message is
displayed in the notification area of the device:
Downloading Files for Printer Policy
The values are Yes , No, and Unconfigured. The default value is
Unconfigured and the existing settings of the managed device are
retained.
Creating Policies33
FieldDetails
novdocx (en) 16 April 2010
Start the ZENworks
Explorer with the {All}
Folder Displayed
Use this option to specify whether the [All] folder should be displayed
when ZENworks Explorer starts.
The values are Yes , No, and Unconfigured. The default value is
Unconfigured and the existing settings of the managed device are
retained.
5 Click Next to display the Summary page.
6 Click Finish to create the policy now, or select Define Additional Properties to specify
additional information, such as policy assignment, system requirements, enforcement, status,
and which group the policy is a member of.
2.10 Creating Policies by Using the zman
Command Line Utility
ZENworks Configuration Management allows you to create different types of policies, such as
Browser Bookmarks policy, Dynamic Local User policy, Local File Rights policy, and Printer
policy. Each policy has its own set of data and configuration settings. Because it is complex to pass
the data as arguments in the command line, the zman utility takes XML files as an input to create
policies. You can use exported XML files as a templates to create polices. To use the zman
command line utility to create a policy, you must have a policy of the same type already created
through ZENworks Control Center and export it to an XML file. For more information on creating
policies by using ZENworks Control Center, see Chapter 2, “Creating Policies,” on page 15.
For example, you can export a Browser Bookmarks Policy already created through ZENworks
Control Center into an XML file, then use it to create another Browser Bookmarks Policy by using
zman.
A policy can have file content associated with it. For example, the printer driver to be installed is a
file associated with the Printer policy.
Review the following sections to create a policy by using the zman command line utility:
Section 2.10.1, “Creating a Policy without Content,” on page 34
Section 2.10.2, “Creating a Policy with Content,” on page 36
Section 2.10.3, “Understanding the zman Policy XML File Format,” on page 37
2.10.1 Creating a Policy without Content
1 Create a policy in ZENworks Control Center.
For example, use ZENworks Control Center to create a Browser Bookmarks Policy called
google containing a bookmark to http://www.google.co.in.
2 Export the policy to an XML file by using the following command:
If you want to create a new policy with new data, continue with Step 3. If you want to create a
new policy with the same data as the google policy, skip to Step 4.
3 Modify the XML file according to your requirements.
For example, to create the yahoo policy, use the following command:
novdocx (en) 16 April 2010
zman policy-create yahoo google.xml
2.10.2 Creating a Policy with Content
1 Create a policy in ZENworks Control Center.
For example, use ZENworks Control Center to create a Printer policy of type iPrint called
iPrint Policy that automatically installs an iPrint driver from the
the policy content, and configures an iPrint printer on the device.
2 Export the policy to an XML file by using the following command:
If you want to create a new policy with new data, continue with Step 3. If you want to create a
new policy with the same data as iPrintPolicy, skip to Step 4.
3 Modify the
iPrintPolicy.xml
and
iPrintPolicy_actioncontentinfo.xml
files
according to your requirements.
For example, to create a new policy to configure and install another iPrint in the network with a
newer version of the driver, do the following:
novdocx (en) 16 April 2010
Change all references of
<PolicyData>
iPrintPolicy_actioncontentinfo.xml
Replace the name of the printer in the
section of
driver.zip
iPrintPolicy.xml
to
newDriver.zip
iPrintPolicy.xml
, and in the
.
in the
<ActionSet>
<ActionSet>
and the
section of
file with the new name of the
printer.
A sample
<ActionInformation>
<ActionSet type="Enforcement">
<Action name="printer policy" index="1">
<Content>
<ContentFilePath>driver.zip</ContentFilePath>
</Content>
</Action>
</ActionSet>
</ActionInformation>
iPrintPolicy_actioncontentinfo.xml
is shown below.
4 Create a new policy by using the following command:
2.10.3 Understanding the zman Policy XML File Format
The
policy-export-to-file
database, into an XML file. Each policy contains actions that are grouped into Action Sets,
Enforcement, and Distribution. An exported policy XML file contains information for the policy,
such as UID, Name, Path, PrimaryType, SubType, PolicyData, System Requirements, and
information on all Action Sets and their actions. The file does not include information about
assignment of the policy to devices or users.
command serializes the policy information, which is stored in the
WindowsGroupPolicy.xml
, is available at
/opt/novell/
on a Linux server and in
Creating Policies37
NOTE: If the exported XML file contains extended ASCII characters, you must open it in an editor
by using UTF-8 encoding instead of ANSI coding, because ANSI coding displays the extended
ASCII characters as garbled.
When you create a policy from the XML file, zman uses the information specified in the
element of actions in the exported XML file, ensure that the
, is available at
/opt/novell/zenworks/
new data is correct and that it conforms to the schema. The zman utility does a minimal
validation of the data and does not check for the errors. Hence, the policy might be successfully
created, but with invalid data. Such a policy fails when deployed on a managed device.
File content is associated with a particular action in an Action Set. The Action Content
Information XML file should contain the path of the file to which the file content is to be
associated and the index of the action in the Action Set.
For example, the Printer driver selected to be installed when creating a Printer policy is
associated to the printerpolicy action in the Enforcement action set of the created Printer policy.
The Action Set is specified by the type attribute in
<ActionSet>
element. It should be the
same as the Action Set type of the policy XML file.
The
The
<Action>
index
element has a name attribute, which is optional, for user readability.
attribute is mandatory. It specifies the action to which the content should be
associated to. The index value of the first action in the Action Set is 1.
Each action can have multiple
element. The
<ContentFilePath>
<Content>
elements, each containing a
<ContentFilePath>
element contains the path of the file content to be
associated with the Action. Ensure that the filename is the same as the filename specified in the
policy XML file in
Ensure that the order of the <
<Data>
for that action.
Content>
elements is in accordance with the order in the policy
XML file. For example, a Printer Policy can have multiple drivers configured.The path to the
driver files should be specified in the
Novell® ZENworks® 10 Configuration Management lets you use effectively manage software and
content in your ZENworks system. In addition to editing and deleting existing objects, you can
create new objects and perform various tasks on the objects.
You can use ZENworks Control Center or the zman command line utility to manage policies. This
section explains how to perform this task by using ZENworks Control Center. If you prefer the zman
command line utility, see “Policy Commands” in the ZENworks 10 Configuration Management
Command Line Utilities Reference.
Section 3.1, “Policy Groups,” on page 41
Section 3.2, “Editing Policies,” on page 42
Section 3.3, “Deleting Policies,” on page 43
Section 3.4, “Adding Policies to Groups,” on page 43
Section 3.5, “Assigning a Policy to Devices,” on page 44
Section 3.6, “Assigning a Policy to Users,” on page 46
novdocx (en) 16 April 2010
3
Section 3.7, “Assigning a Roaming Profile Policy that has User Profile Stored on a Windows
Share Location to Users on a Windows Vista, Windows Server 2008, or Windows 7 Device,”
on page 47
Section 3.8, “Assigning the Local File Rights Policy to Devices Running Different
Languages,” on page 49
Section 3.9, “Unassigning a Policy from Devices,” on page 50
Section 3.10, “Unassigning a Policy from Users,” on page 50
Section 3.11, “Adding System Requirements for a Policy,” on page 50
Section 3.12, “Disabling Policies,” on page 55
Section 3.13, “Enabling the Disabled Policies,” on page 55
Section 3.14, “Copying a Policy to a Content Server,” on page 55
Section 3.15, “Incrementing the Policy Version,” on page 57
Section 3.16, “Reviewing the Status of the Policies at the Managed Device,” on page 58
Section 3.17, “Policy Issues on a Windows 7, Windows Server 2008, or Windows Server 2008
R2 device,” on page 58
Section 3.18, “Viewing the Predefined Reports,” on page 59
3.1 Policy Groups
A policy group consists of two or more policies. Creating policy groups eases administration efforts
by letting you assign the group, rather than each individual policy, to devices and users. You can
create a policy group with a single policy and then add policies to the group as and when required.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click New, click Policy Group to display the Basic Information page, then
fill in the fields:
Managing Policies
41
Group Name: Provide a unique name for your policy group. The name you provide displays in
the ZENworks Control Center interface.
Folder: Type the name or browse to and select the folder that contains this policy group
Description: Provide a short description of the policy group’s content. This description
displays in ZENworks Control Center.
3 Click Next to display the Add Group Members page. You can add any number of policies to the
group. You cannot add other policy groups to the group.
To add a policy:
3a Click Add to display the Select Members dialog box.
Because you are adding policies to the group, the Select Members dialog box opens with
the
Policies
folder displayed.
3b Browse for and select the policies you want to add to the group. To do so:
3b1 Click next to a folder to navigate the folders until you find the policy you want to
select.
If you know the name of the policy you are looking for, you can also use the Item name box to search for the policy.
3b2 Click the underlined link in the Name column to select the policy and display its
name in the Selected list.
novdocx (en) 16 April 2010
3b3 (Optional) Repeat Step 3b1 and Step 3b2 to add additional policies to the Selected
list.
3b4 Click OK to add the selected policies to the group.
4 Click Next to display the Summary page.
5 Click Finish to create the policy group now, or select Define Additional Properties to specify
additional information, such as user assignment, device assignment, and which members the
policy group is a member of.
3.2 Editing Policies
The following table lists the tasks you can perform for a policy:
TaskStepsAdditional Details
Edit the content of a
policy
1. Click the policy whose content you
want to edit.
2. Click the Details tab, then edit the
settings according to your
requirements.
3. Click Apply.
4. Click the Summary page.
5. Increment the version of the policy
to enforce the changes made to
the policy on the managed device.
4 Browse for and select the devices, device groups, and device folders to which you want to
assign the group. To do so:
4a Click next to a folder (for example, the
Workstations
folder or
Servers
folder) to
navigate through the folders until you find the device, group, or folder you want to select.
If you are looking for a specific item, such as a Workstation or a Workstation Group, you
can use the Items of type list to limit the types of items that are displayed. If you know the
name of the item you are looking for, you can use the Item name box to search for the
item.
4b Click the underlined link in the Name column to select the device, group, or folder and
display its name in the Selected list box.
4c Click OK to add the selected devices, folders, and groups to the Devices list.
5 Click Next to display the Policy Conflict Resolution page.
6 Set the priority between device-associated policies and user-associated policies for resolving
conflicts that arise when policies of the same type are associated to both devices and users.
User Last: Select this option to apply policies that are associated to devices first and then
the users.
Device Last: Select this option to apply policies that are associated to users first and then
the devices.
novdocx (en) 16 April 2010
Device Only: Select this option to apply policies that are associated only to devices.
User Only: Select this option to apply policies that are associated only to users.
7 Click Next to display the Finish page, review the information and, if necessary, use the Back
button to make changes to the information.
If you want the policies to be immediately enforced on all the assigned devices, select Enforce Policies Immediately on all Assigned Devices.
8 Click Finish.
The following points are applicable when you assign a policy to a device:
If you assign a DLU policy to a device on which a user has logged in, the user is prompted to
log in to the device again. Unless the user logs in to the device again, no new policies are
enforced on the device.
When you assign a ZENworks Explorer Configuration Policy to a device, the settings
configured in the policy are not immediately reflected on the device. For example, even if Hide
the Z icon in the taskbar is enabled in the policy, the ZENworks icon is displayed for a few
seconds on the device after the policy is assigned to the device.
If both user-associated and device-associated policies are effective for a device, only the policy
that takes precedence according to the Policy Conflict Resolution settings is applied on the
device. However, the Effective status for both policies is displayed as Success in the ZENworks
Adaptive Agent icon
User settings of a device associated Group policy cannot be enforced in console sessions of a
Windows Server 2003, Windows Server 2008, or Windows Server 2008 R2 device.
Managing Policies45
On a managed device, if you launch a published application that is installed on a Citrix server
having iPrint policy configured, it might take considerable time for the policy to be enforced on
the server. During this period, the iPrint functionality is not available for the application.
The iPrint policy is not enforced on the device if you set the
DisableUserDaemonHealing
settings configured in the Group policy to be applied in terminal sessions of Windows Server
2003, Windows Server 2008, and Windows Server 2008 R2 devices. For more information, see
the Policy Management issue in the ZENworks 10 Configuration Management SP3 Readme
(http://www.novell.com/documentation/zcm10/).
registry keys on the device to enable the user configuration
ZENUserDaemon
and the
3.6 Assigning a Policy to Users
Certain key points that you must be aware of before you assign a policy to a user are as follows
There are two types of users: users in the corporate directory and local users on managed
devices. Policies can be associated to users in the corporate directory. ZENworks assumes that
a mapping exists between users in the corporate directory and users on a device. When a user
logs in to the corporate directory, ZENworks obtains the policies for the corporate user and
caches them on the device.
If a mapping exists between a corporate user and a local user, ZENworks also associates the
cached policies with the local user. When a user logs in to the device, the previously cached
policies are enforced for the local user. When the user also logs in to the corporate directory, the
policies for the corporate user are refreshed, then enforced.
The set of policies, both directly assigned and inherited, is called as a set of assigned policies
for a device or a user. When calculating the set of assigned policies, filters such as multiplicity
or system requirements are not applied. Groups and containers also have assigned policies.
Policies that are disabled are not included in the set of assigned policies.
novdocx (en) 16 April 2010
If you are assigning a Local File Rights policy to a network made up of devices running
different languages, see Section 3.8, “Assigning the Local File Rights Policy to Devices
Running Different Languages,” on page 49.
Before assigning a Roaming Profile policy to a user on a Windows Vista device or Windows
Server 2008 device, make sure a user profile with correct registry hive permissions is available
on the device. See Section 3.7, “Assigning a Roaming Profile Policy that has User Profile
Stored on a Windows Share Location to Users on a Windows Vista, Windows Server 2008, or
Windows 7 Device,” on page 47.
Perform the following steps to assign a policy to a user:
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, select the check box next to the objects such as policies or policy groups.
3 Click Action > Assign to User.
4 Browse for and select the user, user groups, and user folders to which you want to assign the
group. To do so:
4a Click next to a folder to navigate through the folders until you find the user, group, or
folder you want to select.
If you are looking for a specific item, such as a User or a User Group, you can use the
Items of type list to limit the types of items that are displayed. If you know the name of the
item you are looking for, you can use the Item name box to search for the item.
4b Click the underlined link in the Name column to select the user, group, or folder and
display its name in the Selected list box.
4c Click OK to add the selected devices, folders, and groups to the Users list.
5 Click Next to display the Finish page, review the information and, if necessary, use the Back
button to make changes to the information.
6 Click Finish.
The following points are applicable when you assign a policy to a user:
When you assign a ZENworks Explorer Configuration Policy to a user, the settings configured
in the policy are not immediately reflected on the device on which the user logs on. For
example, even if Hide the Z icon in the taskbar is enabled in the policy, the ZENworks icon is
displayed for a few seconds on the device after the policy is assigned to the user.
User assigned policies are not enforced in the console sessions of Windows Server 2003,
Windows Server 2008, and Windows Server 2008 R2 device.
If you launch a published application from a Citrix server on to the device, it might take some
considerable time for the list of the iPrint printers to be displayed on the device.
If you launch a published application installed on a Citrix server that has iPrint printer policy
configured, it might take some considerable time for the policy to be enforced on the server.
During this period, the iPrint functionality is not available for the application.
novdocx (en) 16 April 2010
3.7 Assigning a Roaming Profile Policy that has
User Profile Stored on a Windows Share Location
to Users on a Windows Vista, Windows Server
2008, or Windows 7 Device
If a Roaming Profile policy is assigned to a user on a Windows Vista, Windows Server 2008, or
Windows 7 device, the policy fails if the user profile is stored on a Windows share location. This is
because the registry hive of the user profile does not have permissions to load the profile to other
devices. For more information, see the Microsoft TechNet Web site (http://technet.microsoft.com/
en-us/library/cc766489.aspx).
If a default profile already exists in a shared location, start with Step 3. If you do not yet have a
default profile, start with Step 1.
Before assigning a roaming profile policy to users on Windows Vista, Windows Server 2008, or a
Windows 7 device, do the following:
1 Create a default profile folder in a shared location.
For information on creating the default profile folder, see Section 3.7.1, “Creating a Default
Profile Folder in a Shared Location,” on page 48.
2 Copy a default profile from a Windows Vista device, Windows 2008 device, or a Windows 7
device to the default profile folder in the shared location.
For information on copying the default profile to the shared location, see Section 3.7.2,
“Copying a Default Profile from a Windows Vista Device, Windows 2008 Device, or a
Windows 7 device to the Default Profile Folder in the Shared Location,” on page 48.
3 Configure the registry hive permissions for the default profile.
Managing Policies47
For information on configuring the registry hive permissions, see Section 3.7.3, “Configuring
the Permissions for the Default Profile Registry Hive,” on page 48.
4 Copy the default profile to user folders.
For information on copying the default profile to user folders, see Section 3.7.4, “Copying the
Default Profile to User Folders,” on page 49.
3.7.1 Creating a Default Profile Folder in a Shared Location
Create a default profile folder in a shared location depending on where you want to store the user
profile. For example:
novdocx (en) 16 April 2010
Store User Profile in User’s Home Directory:
_server\sys\profiles\DefaultProfile\Windows NT 6.1 Workstation Profile.V2
3.7.2 Copying a Default Profile from a Windows Vista Device,
Windows 2008 Device, or a Windows 7 device to the Default
Profile Folder in the Shared Location
Ensure that the user profile you want to copy as a default profile already exists on the device. If the
desired profile is not available, create a new user account and then log in to the device with the new
account credentials to create the profile.
Perform the following steps to copy the default profile to the default profile folder in the shared
location:
1 Log in to the device as an administrator.
2 Right-click Computer, click Properties > Advanced system settings.
3 In the User Profiles section, click Settings.
4 Select a profile on the device to store as a default profile.
5 Click Copy To.
6 Browse to and select the default profile folder you created in Section 3.7.1, “Creating a Default
Profile Folder in a Shared Location,” on page 48.
7 Click Change in the Permitted to Use section.
8 Specify Everyone in the Enter the object name to select option to provide permissions, then
click OK.
9 Click OK to copy the profile to the shared location, then click OK.
10 Click OK.
3.7.3 Configuring the Permissions for the Default Profile
Registry Hive
1 At the shared location, run
If the shared location is on a Netware
device and open the Registry Editor on the Windows device.
Default Profile Folder in a Shared Location,” on page 48.
The
1. Open the default profile folder in Windows Explorer.
2. Click To ol s > Folder Options > View
3. Deselect Hide protected operating system files.
4 In the Load Hive dialog box, specify the Key Name for the hive. For example, Vista.
5 Right-click the Vis ta hive, then click Permissions.
6 Ensure that the following groups or usernames have Full Control permissions:
Administrators
SYSTEM
Users
7 Click Advanced.
8 Select the Replace permission entries on all child objects with entries shown here that apply to
child objects option and click OK, then click Yes .
9 Click OK.
10 Ensure to unload the hive. To unload the hive, select the Vist a registry hive that you created,
then click File > Unload Hive.
NTUSER.DAT
NTUSER.DAT
file from the default profile folder created in Section 3.7.1, “Creating a
file might be hidden. To unhide the file:
3.7.4 Copying the Default Profile to User Folders
Ensure that you copy the default profile to the user folders before assigning the Roaming Profile
policy to the users. Depending on the user profiles stored, these user folders are:
Store User Profile in User’s Home Directory:
_machine\sys\profiles\Username\Windows NT 6.1 Workstation Profile.V2
User Profile Path:
\\DNS_name_of_file_server\profiles\Username.V2
\\DNS_name_of_Netware
3.8 Assigning the Local File Rights Policy to
Devices Running Different Languages
1 Create a separate Local File Rights policy for each language. For more information on creating
the policy, see Section 2.3, “Local File Rights Policy,” on page 20.
2 Add a filter for each policy:
2a Click the policy, then click Requirements.
2b Click Add Filter, select the Registry Key Value condition, then specify the following:
For example, on a device with the English language, language is English (American). Yo u
can use the registry editor to determine the value data of the language.
2c Click Apply.
3 Assign the policy to the device. For more information on assigning a policy to a device, see
Section 3.5, “Assigning a Policy to Devices,” on page 44.
or
Assign the policy to the user. For more information on assigning a policy to a user, see
Section 3.6, “Assigning a Policy to Users,” on page 46.
3.9 Unassigning a Policy from Devices
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click the policy you want to unassign.
3 Click Relationships.
4 In the Device Assignments panel, select the devices from which you want to unassign the
policy.
5 Click Remove.
On a Windows Server 2008 device, the Group policy user settings associated to a user are not
unenforced when the user logs out.
novdocx (en) 16 April 2010
3.10 Unassigning a Policy from Users
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click the policy you want to unassign.
3 Click Relationships.
4 In the User Assignments panel, select the users from whom you want to unassign the policy.
5 Click Remove.
When you unassign a printer policy that is assigned to a user, the printer permissions for the user are
removed from the device. However, the printer continues to be configured on the device.
3.11 Adding System Requirements for a Policy
The System Requirements panel lets you define specific requirements that a device must meet for
the policy to be assigned to it.
You define requirements through the use of filters. A filter is a condition that must be met by a
device in order for the policy to be applied. For example, you can add a filter to specify that the
device must have exactly 512 MB of RAM in order for the policy to be applied, and you can add
another filter to specify that the hard drive be at least 20 GB in size.
To create system requirements for a policy:
1 In ZENworks Control Center, click the Policies tab.
2 Click the underlined link for the desired policy to display the policy’s Summary page.
4 Click Add Filter, select a filter condition from the drop-down list, then fill in the fields.
As you construct filters, you need to know the conditions you can use and how to organize the
filters to achieve the desired results. For more information, see Section 3.11.1, “Filter
Conditions,” on page 51 and Section 3.11.2, “Filter Logic,” on page 54.
5 (Conditional) Add additional filters and filter sets.
6 Click Apply to save the settings.
3.11.1 Filter Conditions
You can choose from any of the following conditions when creating a filter:
Bundle Installed: Determines if a specific policy is installed. After specifying the bundle, the two
conditions you can use to set the requirement are Yes and No. If you select Ye s, the specified bundle
must already be installed to meet the requirement. If you select No, the bundle must not be installed.
Connected: Determines if the device is connected to a network. The two conditions you can use to
set the requirement are Yes and No. If you select Yes , the device must be connected to the network to
meet the requirement. If you select No, it must not be connected.
novdocx (en) 16 April 2010
Connection Speed: Determines the speed of the device’s connection to the network. The condition
you use to set the requirement includes an operator and a value. The possible operators are equals
(=), does not equal (<>), is greater than (>), is greater than or equal to (>=), is less than (<), and is
less than or equal to (<=). The possible values are bits per second (bps), kilobits per second (Kbps),
megabits per second (Mbps), and gigabits per second (Gbps). For example, if you set the condition
>= 100 Mbps
to
, the connection speed must be greater than or equal to 100 megabits per second to
meet the requirement.
Disk Space Free: Determines the amount of free disk space on the device. The condition you use to
set the requirement includes a disk designation, an operator, and a value. The disk designation must
be a local drive map (for example, c: or d:). The possible operators are equals (=), does not equal
(<>), is greater than (>), is greater than or equal to (>=), is less than (<), and is less than or equal to
(<=). The possible values are bytes (Bytes), kilobytes (KB), megabytes (MB), and gigabytes (GB).
For example, if you set the condition to
c: >= 80 MB
, the free disk space must be greater than or
equal to 80 megabytes to meet the requirement.
Disk Space Total: Determines the amount of total disk space on the device. The condition you use
to set the requirement includes a disk designation, an operator, and a value. The disk designation
must be a local drive map (for example, c: or d:). The possible operators are equals (=), does not
equal (<>), is greater than (>), is greater than or equal to (>=), is less than (<), and is less than or
equal to (<=). The possible values are bytes (Bytes), kilobytes (KB), megabytes (MB), and gigabytes
(GB). For example, if you set the condition to
c: >= 40 GB
, the total disk space must be greater
than or equal to 40 gigabytes to meet the requirement.
Disk Space Used: Determines the amount of used disk space on the device. The condition you use
to set the requirement includes a disk designation, an operator, and a value. The disk designation
must be a local drive map (for example, c: or d:). The possible operators are equals (=), does not
equal (<>), is greater than (>), is greater than or equal to (>=), is less than (<), and is less than or
equal to (<=). The possible values are bytes (Bytes), kilobytes (KB), megabytes (MB), and gigabytes
(GB). For example, if you set the condition to
c: <= 10 GB
, the used disk space must be less than
or equal to 10 gigabytes to meet the requirement.
Managing Policies51
Environment Variable Exists: Determines if a specific environment variable exists on the device.
After specifying the environment variable, the two conditions you can use to set the requirement are
Ye s and No. If you select Ye s, the environment variable must exist on the device to meet the
requirement. If you select No, it must not exist.
En v iro nm e nt Va ri ab l e Va l u e : Determines if an environment variable value exists on the device.
The condition you use to set the requirement includes the environment variable, an operator, and a
variable value. The environment variable can be any operating system supported environment
variable. The possible operators are equal to, not equal to, contains, and does not contain. The
possible variable values are determined by the environment variable. For example, if you set the
condition to
c:\windows\system32
the
Path contains c:\windows\system32
path to meet the requirement.
, the Path environment variable must contain
File Date: Determines the date of a file. The condition you use to set the requirement includes the
filename, an operator, and a date. The filename can be any filename supported by the operating
system. The possible operators are on, after, on or after, before, and on or before. The possible dates
are any valid dates. For example, if you set the condition to
app1.msi
file must be dated 6/15/2007 or later to meet the requirement.
app1.msi on or after 6/15/07
, the
File Exists: Determines if a file exists. After specifying the filename, the two conditions you can
use to set the requirement are Yes and No. If you select Yes, the specified file must exist to meet the
requirement. If you select No, the file must not exist.
novdocx (en) 16 April 2010
File Size: Determines the size of a file. The condition you use to set the requirement includes the
filename, an operator, and a size. The filename can be any file name supported by the operating
system. The possible operators are equals (=), does not equal (<>), is greater than (>), is greater
than or equal to (>=), is less than (<), and is less than or equal to (<=). The possible sizes are
designated in bytes (Bytes), kilobytes (KB), megabytes (MB), and gigabytes (GB). For example, if
you set the condition to
doc1.pdf <= 3 MB
, the
doc1.pdf
file must be less than or equal to 3
megabytes to meet the requirement.
File Version: Determines the version of a file. The condition you use to set the requirement
includes the filename, an operator, and a version. The filename can be any file name supported by
the operating system. The possible operators are equals (=), does not equal (<>), is greater than (>),
is greater than or equal to (>=), is less than (<), and is less than or equal to (<=).
Be aware that file version numbers contain four components: Major, Minor, Revision, and Build.
For example, the file version for
calc.exe
might be 5.1.2600.0. Each component is treated
independently. For this reason, the system requirements that you set might not provide your
expected results. If you do not specify all four components, wildcards are assumed.
For example, if you set the condition to
calc.exe <= 5
, you are specifying only the first
component of the version number (Major). As a result, versions 5.0.5, 5.1, and 5.1.1.1 also meet the
condition.
However, because each component is independent, if you set the condition to
calc.exe
the
file must be less than or equal to version 5.1 to meet the requirement.
calc.exe <= 5.1
,
IP Segment: Determines the device’s IP address. After specifying the IP segment name, the two
conditions you can use to set the requirement are Yes and No. If you select Ye s, the device’s IP
address must match the IP segment. If you select No, the IP address must not match the IP segment.
Memory: Determines the amount of memory on the device. The condition you use to set the
requirement includes an operator and a memory amount. The possible operators are equals (=), does
not equal (<>), is greater than (>), is greater than or equal to (>=), is less than (<), and is less than
or equal to (<=). The memory amounts are designated in megabytes (MB) and gigabytes (GB). For
example, if you set the condition to
>= 2 GB
, the device must have at least 2 gigabytes of memory to
meet the requirement.
TM
Novell Client 32 Connection Used: Determines if the device is using the Novell Client
for its
network connection. The two conditions you can use to set the requirement are Yes and No. If you
select Yes , the device must be using the Novell Client to meet the requirement. If you select No, it
must not be using the Novell Client.
Operating System - Windows: Determines the architecture, service pack level, type, and version
of Windows running on the device. The condition you use to set the requirement includes a property,
an operator, and a property value. The possible properties are architecture, service pack, type, and
version. The possible operators are equals (=), does not equal (<>), is greater than (>), is greater
than or equal to (>=), is less than (<), and is less than or equal to (<=). The property values vary
depending on the property. For example, if you set the condition to
architecture = 32
, the
device’s Windows* operating system must be 32-bit to meet the requirement.
NOTE: Be aware that operating system version numbers contain four components: Major, Minor,
Revision, and Build. For example, the Windows 2000 SP4 release’s number might be
5.0.2159.262144. Each component is treated independently. For this reason, the system
requirements that you set might not provide your expected results.
novdocx (en) 16 April 2010
For example, if you specify Operating System - Windows in the first field, Version in the second
field, > in the third field, and 5.0 -Windows 2000 Versions in the last field, you are specifying only
the first two components of the version number: Major (Windows) and Minor (5.0). As a result, for
the requirement evaluated to true, the OS will have to be at least 5.1 (Windows XP). Windows 2003
is version 5.2, so specifying > 5.0 will also evaluate to true.
However, because each component is independent, if you specify the version > 5.0, Windows 2000
SP4 evaluates to false because the actual version number might be 5.0.2159.262144. You can type
5.0.0 to make the requirement evaluate as true because the actual revision component is greater than
0.
When you select the OS version from the drop-down, the Major and Minor components are
populated. The Revision and Build components must be typed in manually.
Primary User Is Logged In: Determines if the device’s primary user is logged in. The two
conditions you can use to set the requirement are Yes and No. If you select Yes , the primary user must
be logged in to meet the requirement. If you select No, the user must not be logged in.
Processor Family: Determines the device’s processor type. The condition you use to set the
requirement includes an operator and a processor family. The possible operators are equals (=) and
does not equal (<>). The possible processor families are Pentium, Pentium Pro, Pentium II,
Pentium III, Pentium 4, Pentium M, WinChip, Duron, BrandID, Celeron, and Celeron M. For
example, if you set the condition to
<> Celeron
, the device’s processor can be any processor family
other than Celeron* to meet the requirement.
Processor Speed: Determines the device’s processor speed. The condition you use to set the
requirement includes an operator and a processor speed. The possible operators are equals (=), does
not equal (<>), is greater than (>), is greater than or equal to (>=), is less than (<), and is less than
or equal to (<=). The possible processor speeds are hertz (Hz), kilohertz (KHz), megahertz (MHz),
and gigahertz (GHz). For example, if you set the condition to
>= 2 GHz
, the device’s speed must be
at least 2 gigahertz meet the requirement.
Managing Policies53
Registry Key Exists: Determines if a registry key exists. After specifying the key name, the two
conditions you can use to set the requirement are Yes and No. If you select Ye s, the specified key
must exist to meet the requirement. If you select No, the key must not exist.
Registry Key Value: Determines if a registry key value exists on the device. The condition you use
to set the requirement includes the key name, the value name, an operator, a value type, and a value
data. The key and value names must identify the key value you want to check. The possible
operators are equals (=), does not equal (<>), is greater than (>), is greater than or equal to (>=), is
less than (<), and is less than or equal to (<=). The possible value types are INT_TYPE and
STR_TYPE. The possible value data is determined by the key, value name, and value type.
Registry Key and Value Exists: Determines if a registry key and value exists. After specifying the
key name and value, the two conditions you can use to set the requirement are Yes and No. If you
select Yes , the specified key and value must exist to meet the requirement. If you select No, the key
and value must not exist.
Service Exists: Determines if a service exists. After specifying the service name, the two conditions
you can use to set the requirement are Yes and No. If you select Ye s, the service must exist to meet
the requirement. If you select No, the service must not exist.
novdocx (en) 16 April 2010
Specified Devices: Determines if the device is one of the specified devices. After specifying the
devices, the two conditions you can use to set the requirement are Yes and No. If you select Yes , the
device must be included in the specified devices list to meet the requirement (an inclusion list). If
you select No, the device must not be included in the list (an exclusion list).
3.11.2 Filter Logic
You can use one or more filters to determine whether the policy should be applied to a device. A
device must match the entire filter list (as determined by the logical operators that are explained
below) for the policy to be applied to the device.
There is no technical limit to the number of filters you can use, but there are practical limits, such as:
Designing a filter structure that is easy to understand
Organizing the filters so that you do not create conflicting filters
Filters, Filter Sets, and Logical Operators
You can add filters individually or in sets. Logical operators, either AND or OR, are used to combine
each filter and filter set. By default, filters are combined using OR (as determined by the Combine
Filters Using field) and filter sets are combined using AND. You can change the default and use
AND to combined filters, in which case filter sets are automatically combined using OR. In other
words, the logical operator that is to combine individual filters (within in a set) must be the opposite
of the operator that is used between filter sets.
You can easily view how these logical operators work. Click both the Add Filter and Add Filter Set
options a few times each to create a few filter sets, then switch between AND and OR in the
Combine Filters Using field and observe how the operators change.
As you construct filters and filter sets, you can think in terms of algebraic notation parentheticals,
where filters are contained within parentheses, and sets are separated into a series of parenthetical
groups. Logical operators (AND and OR) separate the filters within the parentheses, and the
operators are used to separate the parentheticals.
For example, “(u AND v AND w) OR (x AND y AND z)” means “match either uvw or xyz.” In the
filter list, this looks like:
u AND
v AND
w
OR
x AND
y AND
z
Nested Filters and Filter Sets
Filters and filter sets cannot be nested. You can only enter them in series, and the first filter or filter
set to match the device is used. Therefore, the order in which they are listed does not matter. You are
simply looking for a match to cause the policy to be applied to the device.
3.12 Disabling Policies
When you create a policy in ZENworks Configuration Management, the policy is enabled by
default. Policies can be disabled by an administrator. If a policy is disabled, it is not considered for
enforcement on any of the devices and users that it applies to.
novdocx (en) 16 April 2010
To disable a policy:
1 In ZENworks Control Center, click the Policies tab.
2 Select the check box next to the policy (or policies) that you want to disable.
3 Click Action > Disable Policies.
In the Policies list, the status of Enabled for the policy (or policies) is changed to No.
When you disable a policy that has already been enforced for some managed devices and users,
the policy is removed from those devices and it is not enforced for new devices and users.
3.13 Enabling the Disabled Policies
1 In ZENworks Control Center, click the Policies tab.
2 Select the check box next to the policy (or policies) that you want to enable.
3 Click Action > Enable Policies.
In the Policies list, the status of the Enabled column for the policy (or policies) is changed to
Ye s.
3.14 Copying a Policy to a Content Server
By default, a policy is copied to each content server. If you specify certain content servers as hosts,
the policy is hosted on only those content servers; it is not copied to all content servers. You can also
specify whether the selected policy is replicated to new content servers (ZENworks Servers and
satellite servers) that are added to the Management Zone.
To specify a content server:
1 In ZENworks Control Center, click the Policies tab.
Managing Policies55
2 In the Bundles list, select the check box next to the policy (or policies).
3 Click Action > Specify Content Server to display the New Content Replication Rules page.
novdocx (en) 16 April 2010
4 Specify the default replication behavior for new servers added to the system:
New Primary Servers Will: Specify the default replication behavior for new ZENworks
Primary Servers added to the system:
Include This Content: Replicates the content to any servers created in the future.
Exclude This Content: Excludes the content from being replicated to any servers
created in the future.
New Satellite Servers Will: Specify the default replication behavior for new ZENworks
satellite servers added to the system:
Include This Content: Replicates the content to any servers created in the future.
Exclude This Content: Excludes the content from being replicated to any servers
created in the future.
Be aware that any content replication relationships previously set between the content and
servers are lost upon completion of this wizard.
5 Click Next to display the Include or Exclude Primary Servers/Satellite Servers page:
This page lets you specify on which content servers (ZENworks Servers and satellite servers)
the content is hosted.
The relationships between content and content servers that you create using this wizard
override any existing relationships. For example, if Policy A is currently hosted on Server 1
and Server 2 and you use this wizard to host it on Server 1 only, Policy A is excluded from
Server 2 and is removed during the next scheduled replication.
5a In the Excluded Primary Servers or Excluded Satellite Servers list, select the desired
content server.
You can use Shift+click and Ctrl+click to select multiple content servers.
You cannot include content on a satellite server without including it on the satellite
server’s parent ZENworks Server. You must select both the satellite server and its parent.
5b Click the button to move the selected content server to the Included Primary
Servers or Included Satellite Servers list.
6 Click Next to display the Finish page, then review the information and, if necessary, use the
Back button to make changes to the information.
7 Click Finish to create the relationships between the content and the content servers. Depending
on the relationships created, the content is replicated to or removed from content servers during
the next scheduled replication.
3.15 Incrementing the Policy Version
The policy version number should be incremented whenever the policy is updated. This ensures that
the latest policy is enforced on the managed device.
3.15.1 Using the Action Menu
1 In ZENworks Control Center, click the Policies tab.
Managing Policies57
2 Select the check box next to the policy (or policies) for which you want to increment the
version.
3 Click Action > Increment Version.
4 In the Confirm Version Increment dialog box, click Yes .
3.15.2 Editing the Policy
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, click a Policy’s underlined link in the Name column to display its Summary
page.
3 Click Increment Version.
4 In the Confirm Version Increment dialog box, click Yes .
3.16 Reviewing the Status of the Policies at the
Managed Device
novdocx (en) 16 April 2010
The ZENworks Adaptive Agent applies policies that your administrator defines. Policies are rules
that control a range of hardware and software configuration settings. For example, your
administrator can create policies that control the Adaptive Agent features you can use, the
bookmarks available in your browser, the printers you can access, and the security and system
configuration settings for your.
You cannot change the policies applied by your administrator. Policies might be assigned to you or
they might be assigned to your device. Policies assigned to you are referred to as user-assigned
policies, and bundles assigned to your device are referred to as device-assigned policies
The ZENworks Adaptive Agent enforces your user-assigned policies only when you are logged in to
your user directory (Microsoft* Active Directory* or Novell eDirectory
you can log in through the ZENworks Configuration Management login screen. To do so, right-click
the ZENworks icon in the notification area, then click Login.
The Adaptive Agent always enforces the device-assigned policies regardless of whether or not you
are logged in. Therefore, device-assigned policies are enforced for all users of the device.
To view the policies assigned to you and your device:
1 Double-click the ZENworks icon in the notification area.
2 In the left navigation pane, click Policies.
TM
). If you are not logged in,
3.17 Policy Issues on a Windows 7, Windows
Server 2008, or Windows Server 2008 R2 device
Roaming Profile policy with the home directory option is not enforced in a terminal session of
a Windows Server 2008 or Windows Server 2008 R2 device if you have launched the terminal
session from a Windows Vista, Windows 7, Windows Server 2008, or Windows Server 2008
R2 device. This is because the Novell Client login dialog box is not displayed on the device and
only the Remote Desktop login is performed on the device.
To display the Novell Client login dialog box, do the following:
1. Open the registry editor.
2. Go to
3. Create a string called
HKEY_LOCAL_MACHINE\SOFTWARE\Novell\Login
TSClientAutoAdminLogon
, and set its value to 1.
novdocx (en) 16 April 2010
.
4. Create a string called
DefaultLoginProfile
, and set its value to
Default
.
5. Close the registry editor.
6. From a Windows Vista or Windows 7 device, launch a Remote Desktop session to the
Windows Server 2008 R2 device and specify the Windows user credentials.
7. A Novell Client window is displayed. Click Cancel.
8. In the next screen, click Novell Logon to display the Novell Client login dialog box.
Dynamic Local User Profile policy is not enforced in a terminal session of a Windows Server
2008 or Windows Server 2008 R2 device if you have launched the terminal session from a
Windows Vista, Windows 7, Windows Server 2008, or Windows Server 2008 R2 device. This
is because Novell Client login dialog box is not displayed on the device and only the Remote
Desktop login is performed on the device.
For information on resolving this issue, search for the Using Dynamic Local User Policy in
Windows Server 2008 R2 Remote Desktop Session Host article at the ZENworks Cool
Solutions Community (http://www.novell.com/communities/coolsolutions/zenworks)
If a Roaming Profile user logs in to a Windows Server 2008 or Windows Server 2008 R2
device and then logs out, the user cannot log in to a Windows 7 device or to other Windows
Server 2008 or Windows Server 2008 R2 devices.
A Roaming Profile policy cannot be enforced on a Windows 7, Windows Server 2008, or
Windows Server 2008 R2 device if the user profile is stored on a Windows Server 2003 shared
location. For more information, see the troubleshooting scenario “Unable to enforce a Roaming
Profile policy on a Windows Vista, Windows 7, Windows Server 2008, or Windows Server
2008 R2 device if the user profile is stored in a shared folder on a Windows Server 2003
device” on page 82.
3.18 Viewing the Predefined Reports
You must have installed ZENworks Reporting Server to view the Predefined reports. For more
information on how to install ZENworks Reporting Server, see ZENworks 10 Configuration
Management Reporting Server Installation Guide
To view the Predefined reports for Policies, do the following:
1 In the ZENworks Control Center, click Reports.
2 In the ZENworks Reporting Server Reporting panel, click ZENworks Reporting Server
InfoView to launch the ZENworks Reporting Server InfoView.
3 Navigate to the Novell ZENworks Reports folder > Predefined Reports > Bundles and Policies
folder.
4 The following Predefined reports are included for Policies:
Assigned Bundles and Policies by Device: Displays information on all the policies that
are assigned to a particular device.
Content By Server: Displays the content information for the selected server. The
information includes the content name, content type, replication state, and the disk space.
Managing Policies59
Content By Bundle and Policy: Displays the content information for the bundles and
policies. This information includes the content server, content type, replication state, and
disk space.
For more information on creating and managing reports, see the ZENworks 10 Configuration
Management System Reporting Reference documentation.
A policy group lets you group policies to ease administration and to provide easier assigning and
scheduling of the policies in the policy group.
®
You can use ZENworks
This section explains how to perform this task using the ZENworks Control Center. If you prefer the
zman command line utility, see “Policy Commands” in the ZENworks 10 Configuration
Management Command Line Utilities Reference.
Section 4.1, “Creating Policy Groups,” on page 61
Section 4.2, “Renaming or Moving Policy Groups,” on page 62
Section 4.3, “Deleting a Policy Group,” on page 62
Section 4.4, “Assigning a Policy Group to Devices,” on page 63
Section 4.5, “Assigning a Policy Group to Users,” on page 63
Section 4.6, “Adding a Policy to a Group,” on page 64
Control Center or the zman command line utility to create policy groups.
novdocx (en) 16 April 2010
4
4.1 Creating Policy Groups
1 In ZENworks Control Center, click the Policies tab.
2 Click New > Policy Group.
3 Fill in the fields:
Group Name: Provide a name for the policy group. The name must be different than the name
of any other item (policy, group, folder, and so forth) that resides in the same folder. The name
you provide displays in ZENworks Control Center.
For more information, see “Naming Conventions in ZENworks Control Center” in ZENworks
10 Configuration Management System Administration Reference
Folder: Type the name or browse to and select the ZENworks Control Center folder where you
want the policy to reside. The default is
organize your policies.
If you want to create the group in another folder, browse to and select the folder. By default, the
group is created in the current folder.
Description: Provide a short description of the policy group's contents. This description
displays in ZENworks Control Center.
4 Click Next to display the Add Group Members page, then specify policies to be members for
the group.
You can add any number of policies to the group. You cannot add other policy groups to the
group.
/policies
, but you can create additional folders to
4a Click Add to display the Select Members dialog box.
Because you are adding policies to the group, the Select Members dialog box opens with
Policies
the
folder displayed.
Managing Policy Groups
61
4b Browse for and select the policies you want to add to the group. To do so:
4b1 Click next to a folder to navigate the folders until you find the policy you want to
select.
If you know the name of the policy you are looking for, you can also use the Item name box to search for the bundle.
4b2 Click the underlined link in the Name column to select the policy and display its
name in the Selected list.
4b3 (Optional) Repeat Step 4a and Step 4b to add additional policies to the Selected list.
4b4 Click OK to add the selected policies to the group.
5 Click Next to display the Summary page, review the information and, if necessary, use the Back
button to make changes to the information.
6 (Optional) Select the Define Additional Properties option to display the group’s properties page
after the group is created. You can then configure additional policy properties.
7 Click Finish to create the group.
Before the bundle group’s contents are distributed to devices or users, you must continue with
Section 3.5, “Assigning a Policy to Devices,” on page 44 or Section 3.6, “Assigning a Policy to
Users,” on page 46.
novdocx (en) 16 April 2010
4.2 Renaming or Moving Policy Groups
Use the Edit drop-down list on the Policies page to edit an existing object. To access the Edit dropdown list, you must select an object by clicking the check box next to the object's name in the list.
Depending on the type of object you select, you can rename, copy, or move the selected object. For
example, if you select a policy object, you can rename, copy, and move the policy. If you select a
Policy Group object, you can rename or move the policy group object, but not copy it. If the option
is dimmed, that option is not available for the selected object type.
Some actions cannot be performed on multiple objects. For example, if more than one check box is
selected, the Rename option is not available from the Edit menu.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, select the box next to the policy group’s name, click Edit, then click an
option:
Rename: Click Rename, provide a new name for the policy group, then click OK.
Move: Click Move, select a destination folder for the selected objects, then click OK.
4.3 Deleting a Policy Group
Deleting a policy group does not delete its policies. It also does not unenforce the policies from
devices where they have already been enforced. To unenforce the policy from devices, remove the
assignment of each policy from the devices or users before deleting the policy group.
For information on unassigning policy from a user, see Section 3.10, “Unassigning a Policy from
Users,” on page 50.
For information on unassigning policy from a device, see Section 3.9, “Unassigning a Policy from
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, select the check box next to the policy group (or policy groups).
3 Click Delete.
4.4 Assigning a Policy Group to Devices
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, select the check box next to the policy group (or policy groups).
3 Click Action > Assign to Device.
4 Browse for and select the devices, device groups, and device folders to which you want to
assign the group. To do so:
4a Click next to a folder (for example, the
navigate through the folders until you find the device, group, or folder you want to select.
If you are looking for a specific item, such as a Workstation or a Workstation Group, you
can use the Items of type list to limit the types of items that are displayed. If you know the
name of the item you are looking for, you can use the Item name box to search for the
item.
4b Click the underlined link in the Name column to select the device, group, or folder and
display its name in the Selected list box.
Workstations
folder or
Servers
folder) to
novdocx (en) 16 April 2010
4c Click OK to add the selected devices, folders, and groups to the Devices list.
5 Click Next to display the Finish page, review the information and, if necessary, use the Back
button to make changes to the information.
6 Click Finish.
4.5 Assigning a Policy Group to Users
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, select the check box next to the policy group (or policy groups).
3 Click Action > Assign to User.
4 Browse for and select the user, user groups, and user folders to which you want to assign the
group. To do so:
4a Click next to a folder to navigate through the folders until you find the user, group, or
folder you want to select.
If you are looking for a specific item, such as a User or a User Group, you can use the
Items of type list to limit the types of items that are displayed. If you know the name of the
item you are looking for, you can use the Item name box to search for the item.
4b Click the underlined link in the Name column to select the user, group, or folder and
display its name in the Selected list box.
4c Click OK to add the selected devices, folders, and groups to the Users list.
5 Click Next to display the Finish page, review the information and, if necessary, use the Back
button to make changes to the information.
6 Click Finish.
Managing Policy Groups63
4.6 Adding a Policy to a Group
For more information, see Section 3.4, “Adding Policies to Groups,” on page 43.
A folder is an organizational object. You can use folders to structure your polices and policy groups
into a manageable hierarchy for your ZENworks
each type of policy (Browser Bookmarks policy, Dynamic Local User policy, and so forth), or, if
applications are department-specific, you might want a folder for each department (Accounting
Department folder, Payroll Department folder, and so forth).
The following sections contain additional information:
Section 5.1, “Creating Folders,” on page 65
Section 5.2, “Renaming or Moving Folders,” on page 65
Section 5.3, “Deleting a Folder,” on page 66
®
system. For example, you might want a folder for
5.1 Creating Folders
1 In ZENworks Control Center, click the Policies tab.
2 Click New > Folder.
3 Provide a unique name for your folder. This is a required field.
When you name an object in ZENworks Control Center (folders, policies, policy groups, and so
forth), ensure that the name adheres to the naming conventions; not all characters are
supported. For more information on naming conventions, see “Naming Conventions in
ZENworks Control Center” in ZENworks 10 Configuration Management System
Administration Reference.
4 Type the name or browse to and select the folder that will contain this folder in the ZENworks
Control Center interface. This is a required field.
5 Provide a short description of the folder's contents.
6 Click OK.
5.2 Renaming or Moving Folders
Use the Edit drop-down list on the Policies page to edit an existing object. To access the Edit dropdown list, you must select an object by clicking the check box next to the object's name in the list.
Depending on the type of object you select, you can rename, copy, or move the selected object. For
example, if you select a Policy object, you can rename, copy, and move the policy. If you select a
Folder object, you can rename or move the Folder object, but not copy it. If the option is dimmed,
that option is not available for the selected object type.
Some actions cannot be performed on multiple objects. For example, if more than one check box is
selected, the Rename option is not available from the Edit menu.
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, select the box next to the folder’s name, then click Edit.
3 Select an option:
Rename: Click Rename, provide a new name for the folder, then click OK.
Managing Folders
65
Move: Click Move, choose a destination folder for the selected objects, then click OK.
5.3 Deleting a Folder
Deleting a folder also deletes all of its contents (policies, policy groups, and subfolders).
1 In ZENworks Control Center, click the Policies tab.
2 In the Policies list, select the check box next to the folder (or folders).
Possible Cause: On Windows managed devices, the Internet Explorer does not allow a
bookmark name with special characters such as ! , *, / , or \\.
Action: When creating the policy, ensure that special characters such as ! , *, / , or \\
are not used in the bookmark name.
Unable to apply the Browser Bookmark Policy. For more information, see the
ZENworks error message online documentation at http://www.novell.com/
documentation
Explanation: If the password of the Dynamic Local User in the user source does not meet
the password complexity requirements, the user fails to log on to the managed
device.
Possible Cause: Password must meet complexity requirements is enabled in the password
policy setting of the Group policy of the device (Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy).
Action: Do one of the following:
Ensure that the password specified for the user in the user source meets
the password complexity requirements. For information on the password
complexity requirements, double-click Password must meet complexity requirements in the password policy setting of the Group policy
(Computer Configuration > Windows Settings > Security Settings > Account Policies > Password Policy).
novdocx (en) 16 April 2010
Disable the Password must meet complexity requirements setting on the
managed device.
Subsequent to the first login, the DLU user is prompted to provide the credentials
when he or she tries to log into the device again during the cache period specified in
the policy
Explanation: If the Use the credential specified below and Enable Volatile User cache
settings are configured in the Dynamic Local User policy, then subsequent to
the first login, the DLU user is prompted to provide the credentials when he or
she tries to log into the device again during the cache period specified in the
policy.
Action: To enable the user to log into the device without being prompted on
subsequent logins, ensure that the Manage existing user account option is
enabled in the policy. This ensures that the ZENworks Agent manages the
password on behalf of the user.
After logging out of a managed device that is disconnected from the network, a
Dynamic Local User is unable to log in to the device again
Explanation: If a Dynamic Local User policy that has Use the credential specified below,
Manage existing user account, and Enable Volatile User Cache options
enabled is assigned to a device and a user logs out of the device when the
device is disconnected from the network, the user is unable to log in to the
disconnected device again.
Troubleshooting Policy Management71
Action: Before the policy is assigned to the device or the device is disconnected from
the network, perform the following steps on the managed device to use the
user source password for logging in to the device:
1 Open the Registry Editor.
2 Go to \
HKLM\SOFTWARE\Novell\NWGINA\Dynamic Local User
\.
novdocx (en) 16 April 2010
3 Create a DWORD called
to 1.
EnableEDirPasswordForFA
, and set the value
A.5 General Policy Troubleshooting
“The user is prompted to log in again immediately after logging in to ZENworks by using
ZENworks icon” on page 72
“Unable to view the newly added user source in all the other concurrent sessions of ZENworks
Control Center” on page 72
“The Wake-on-LAN policy is not available in ZENworks Configuration Management” on
page 73
“The zman pvst command might not display the correct status of the policy assignment and
deployment on a managed device” on page 73
“The enforcement of policies such as DLU policy, Roaming Profile policy, or Group Policy
fails on the managed device” on page 73
“Closing a published application or logging out of the shared desktop of a Citrix server fails to
terminate the session on the Citrix server” on page 73
The user is prompted to log in again immediately after logging in to ZENworks by
using ZENworks icon
Explanation: If ZENworks Control Center is opened by more than one user at the same time
and a new user source is added to the management zone by one of the users,
the newly added user source is not reflected in the other open sessions of
ZENworks Control Center. Consequently, the policies might not be assigned to
the new user source.
Action: To assign policies to the new user source, log in to ZENworks Control Center
again.
The Wake-on-LAN policy is not available in ZENworks Configuration Management
Possible Cause: If a user logs into a managed device by authenticating with a eDirectory user
account that has trailing space characters, policies such as DLU policy,
Roaming Profile policy, or Group Policy are not enforced on the managed
device.
Action: Ensure that the eDirectory user account does not have trailing space
characters.
Closing a published application or logging out of the shared desktop of a Citrix
server fails to terminate the session on the Citrix server
Possible Cause: This occurs when a file or folder configured in the policy is not found on the
managed device.
Action: On the managed device, do the following:
1 Verify whether the file or folder exists and the name and path are correct.
2 Ensure that Windows Explorer is configured to display extensions for a
file of a known type. In Windows Explorer, click Too ls > Folder Options
to display the Folder Options dialog box. Click the Vie w tab, then ensure
that the Hide Extension for known file types option is not selected.
Possible Cause: The user permissions configured in the Local File Rights policy might conflict
with the user permissions configured in the Dynamic Local User policy. The
permissions configured for the user or group in the Dynamic Local User policy
take precedence over the permissions configured in the Local File Rights
policy.
Action: Ensure that the user permissions configured in the Local File Rights policy are
not conflicting with the user permissions configured in Dynamic Local User
policy.
A.8 Printer Policy Errors
“Printer driver installation failed for printer_name. The provided driver install file type is not
supported” on page 76
“Printer driver installation failed for printer_name. File extraction failed for filename” on
page 76
“Printer driver installation failed for printer_name. Check if provided drivers inf file is in
proper format” on page 76
“Unable to get iprint install file from the specified location in managed device, please check if
file is there in specified location” on page 76
“Unable to extract iprint client installer from the content” on page 77
“Bad iprint install file. Unable to extract setupipp.exe file. Expectation is for a zip file which
extracts setupipp.exe on the root. check the file mentioned for install” on page 77
“iPrint client install failed. Check if the provided iprint client supports silent install” on page 77
“Failed to add smb printer printer_name” on page 77
Troubleshooting Policy Management75
“Failed to add iprint printer printer_name” on page 77
“An incorrect error message that the iPrint policy could not be enforced is displayed on the
managed device” on page 78
Printer driver installation failed for printer_name. The provided driver install file type
is not supported
Possible Cause: The iPrint installer is not found on the managed device. This error message can
occur if the location of the file is not correctly specified in the Printer policy, or
the file resides in a shared network location and is not available to the Printer
policy handler module.
Action: Ensure that the file exists on the managed device or it is directly associated to
Possible Cause: The iPrint client attached with the Printer policy is not available on the
managed device. This error message can occur if the policy is enforced
immediately after it’s created.
Action: After creating the policy, wait for five to ten minutes before enforcing the
policy, then try to log into the managed device.
Bad iprint install file. Unable to extract setupipp.exe file. Expectation is for a zip file
which extracts setupipp.exe on the root. check the file mentioned for install
Explanation: The iPrint policy might take some time to install an iPrint printer on a device,
depending on the size of the iPrint printer driver and the network connectivity.
In such a scenario, even if the iPrint printer is successfully installed on the
device, an incorrect message that the iPrint policy could not be enforced is
displayed on the managed device.
Action: Ignore the error message and refresh the device.
The correct message indicating that the policy has been succesfully enforced is
displayed on the device after a manual or automatic refresh.
A.9 Printer Policy Troubleshooting
“Unable to install a printer driver on Windows managed devices through the Printer Policy” on
page 78
novdocx (en) 16 April 2010
“Unable to install the printer driver on a Windows Vista SP1 device” on page 79
“Changing the iPrint printer driver on a server does not update the driver on the managed
device” on page 79
“Unable to install or update the printer drivers on re-enforcing the policy” on page 79
“Unable to install iPrint printer on a Windows 2000 managed device” on page 80
“Unable to install iPrint printer on a Windows XP managed device” on page 80
“Uninstall does not roll back the previously enforced Printer policies” on page 80
“Installation of the iPrint printer fails on a device if the printer does not have the supported
drivers” on page 80
“Installation of the network printer might fail on a Windows Server 2008 R2 device” on
page 81
“Unable to enforce a printer policy on a managed device if the printer driver that is installed on
the device is unsigned” on page 81
“The Printer policy might fail to install an iPrint printer on a managed device if iPrint printer
drivers are configured in the policy” on page 81
Unable to install a printer driver on Windows managed devices through the Printer
Policy
Possible Cause: A printer model name is represented in different ways on Windows managed
devices. For example, the HP LaserJet 8100 Series PCL6 printer model is
represented as HP LaserJet 8100 Series PCL 6 on Windows 2000. (Note that
there is a space between PCL and 6).
While creating a Printer policy, you can manually specify the printer model or
select it from a predefined list. If you select it from a predefined list, the printer
is installed based on the model name defined in the list, which might not be the
printer model name on the Windows managed device. For example, if you
select HP LaserJet 8100 Series PCL6, the printer driver is installed only on the
managed devices having the HP LaserJet 8100 Series PCL6 printer model.
Consequently, the driver is not installed on the Windows 2000 managed
device.
Action: While creating the Printer policy, ensure that the correct printer model name is
specified.
Unable to install the printer driver on a Windows Vista SP1 device
Explanation: If the printer driver contains more than one
file, the installation of the
driver fails because the policy handler does not know which
.inf
novdocx (en) 16 April 2010
file to use.
Action: While installing the printer driver, ensure that only the valid
.inf
file is
available in the ZIP file. For example, if you download the HP 4700 Color
LaserJet print drivers for Vista, the ZIP file contains more than one
.inf
Remove all the
.inf
file required to install the HP 4700 Color LaserJet print driver.
files other than
hpc4700c.inf
because this is the only
.inf
Changing the iPrint printer driver on a server does not update the driver on the
managed device
Explanation: The Printer policy installs the printer driver during the first enforcement of the
policy. If the driver is changed after the first enforcement of the policy, the new
drivers are not installed or updated on the subsequent enforcement of the
policy.
Action: Create a new printer policy with the new driver and assign it to the same
device or user.
Troubleshooting Policy Management79
Unable to install iPrint printer on a Windows 2000 managed device
Explanation: If a printer policy that is configured to install an iPrint printer on a managed
device is assigned to a user who logs in to a Windows XP device that has an
iPrint Client 4.x installed, the iPrint printer is not installed on the device.
Action: Do the following:
novdocx (en) 16 April 2010
1 Uninstall the iPrint Client 4.x from the device.
2 Download the iPrint Client 5.x from the Novell Downloads site (http://
download.novell.com/index.jsp).
3 Install the iPrint Client 5.x on the managed device.
For more information on installing the iPrint Client, see Step 8 in
Section 2.4, “Printer Policy,” on page 23
Uninstall does not roll back the previously enforced Printer policies
Explanation: If a printer configured in the iPrint policy has assigned drivers that are not
supported by the operating system on the managed device, then the Installation
of the printer fails.
For example, if a printer that has Windows XP and Windows Vista drivers is
configured in a iPrint policy and the policy is assigned to a Windows 7 device,
the installation of the printer on the Windows 7 device fails.
Action: Before assigning a iPrint policy to a device, ensure that the drivers assigned to
the printer configured in the policy are supported by the operating system on
the device.
Explanation: The iPrint policy might fail to install the iPrint printer on a device if iPrint
printer drivers are configured in the policy. You must not add iPrint printer
drivers in the Printer Driver Installation panel of a printer policy details page
because the iPrint drivers are automatically downloaded from the iPrint servers
when the iPrint printer is installed on the device.
Action: Edit the policy to remove the iPrint printers from the Driver List in the Printer
Driver Installation panel of the printer policy details page.
A.10 Roaming Profile Policy Errors
“The policy policy_name could not be successfully enforced as policy data was empty” on
page 82
Troubleshooting Policy Management81
The policy policy_name could not be successfully enforced as policy data was
empty
Action: Turn on debug logging on the managed device and refer to the
messages.log
information on how to turn on debug logging, see the “Message Logging” in
ZENworks 10 Configuration Management System Administration Reference.
Action: If the problem persists, contact Novell Support (http://www.novell.com/
support).
file to obtain more details about the error. For more
zmd-
A.11 Roaming Profile Policy Troubleshooting
“Unable to enforce a Roaming Profile policy on a Windows Vista, Windows 7, Windows
Server 2008, or Windows Server 2008 R2 device if the user profile is stored in a shared folder
on a Windows Server 2003 device” on page 82
Unable to enforce a Roaming Profile policy on a Windows Vista, Windows 7,
Windows Server 2008, or Windows Server 2008 R2 device if the user profile is stored
in a shared folder on a Windows Server 2003 device
Explanation: If a Roaming Profile policy is assigned to a user who has not logged into a
Windows Vista, Windows 7, Windows Server 2008, or Windows Server 2008
R2 device at least once before the policy was assigned, enforcing the policy
fails on the device. This is because of insufficient permissions configured for
the shared folder containing the user profile on the Windows Server 2003
device.
Action: Perform the following steps on the Windows Server 2003 device:
1 Create a local user account with the same credentials that the user
specifies to log in to the Windows Vista, Windows 7, Windows Server
2008, or Windows Server 2008 R2 device.
For example, if the username is user1, create a local account with user1
credentials.
2 Create a folder named
For example,
3 Right-click the folder, then click Properties.
4 Click Sharing and share the folder.
5 Click Permissions to provide Full Control permissions for the user, click
Apply, then click OK.
6 Click Security.
7 In the Group or user names panel, click CREATOR OWNER, then click
Advanced.
8 In the Advanced Security Settings box, click Owner.
Possible Cause: The security settings are not applied if a local group policy is created on a
higher version of Windows but applied to a managed device that is running a
lower version of Windows.
Action: Ensure that the ZENworks server and the managed device meet the ZENworks
Configuration Management requirements. For more information about the
managed device system requirements, see the ZENworks 10 Configuration
Management Installation Guide.
The Windows Hotfix "KB897327" required for exporting and applying Group policy
security settings on Windows XP was not found. Computer configuration security
settings could not be exported/applied
Explanation: If the security settings are not configured in the Windows Group policy, the
policy uses the default security settings of the device on which it was created.
When more than one Windows Group policy is applied to a device, the
security settings of the last applied policy are effective on the device.
Troubleshooting Policy Management87
Action: If you assign multiple policies to a device, ensure that the policy whose
security settings you want to be effective on the device is applied last on the
device.
The Security settings configured in the Windows Group policy are not applied on a
Windows XP SP1 or SP2 managed device
Explanation: The Group Policy Helper tool does not launch on a Windows Vista device if
the User Account Control (Start > Settings > Control Panel > User Accounts)
is enabled and Mozilla Firefox 3.0.10 or later is used.
novdocx (en) 16 April 2010
Action: Configure Firefox to run with administrator credentials.
To configure Firefox for a session, right-click the Firefox shortcut icon on
the desktop, then select Run as administrator.
To configure Firefox permanently:
1. On the desktop, right-click the Firefox shortcut icon and select
Properties. Click the Shortcut tab, then click the Advanced button. In
the Advanced Properties dialog box, select Run as administrator.
or
In Windows Explorer, navigate to the Firefox executable file, rightclick the file, then select Properties. Click the Compatibility tab,
then select Run this program as an administrator.
2. Restart the browser
Policy Enforcement status is not properly displayed
Explanation: If you assign more than one policy to a user or a device, the policy
enforcement status is not properly displayed.The consolidated status of a
Group policy is displayed in the ZENworks icon only for the last enforced
policy. That is, if any of the Group policies fail, the last effective policy is
displayed in the ZENworks icon as Failed and rest of the policies are displayed
as Success.
Possible Cause: The consolidated settings are applied only for the last policy.
Explanation: The Windows Group policy containing the local group policy settings is not
applied on a device if the operating system of the device where the policy is
applied is different from the operating system of the device where the policy is
created.
novdocx (en) 16 April 2010
Action: Remove the Operating System specific System Requirement from the
Windows Group policy and then apply the policy.
However, the security settings are applied only if the operating system version
of the device where the policy is applied is later than the operating system
version of the device where the policy is created.
Configuring Group Policy on a 64-bit version of Windows Vista device, Windows
Server 2008, and Windows 7 device is not yet supported
Explanation: You cannot configure Group policy on 64-bit version of Windows Vista
device, Windows Server 2008, and Windows 7 device. However, you can
enforce Group policy on these devices.
Action: To enforce Group Policy on 64-bit version of a device, configure a Group
policy on a corresponding 32-bit version of the device and assign it to the 64bit device. For example, create a Group policy on a 32-bit Windows 7 device
and assign it to a 64-bit Windows 7 device.
Scripts configured through Active Directory Group policy are not enforced on a
device.
Explanation: The scripts configured through Active Directory group policy are not enforced
on a device even though the policy displays success in the ZENworks
Adaptive Agent Policies page. However, the other settings if any configured in
the policy are enforced on the device.
Action: Configure scripts through Local Group policy.
Security settings that have not been configured in a ZENworks Group Policy are also
enforced on a managed device when the ZENworks Group Policy is enforced on the
managed device
Explanation: If you create a Windows Group Policy through the ZENworks Control Center
of a device that already has some security settings configured and assign this
policy to a managed device, the security settings that were configured on the
device, on which you created the group policy, are also applied on the
managed device.
Action: To remove all the previously configured security settings on a device, run the
following command before you launch the ZENworks Control Center on the
device to create the Group policy:
The following sections contain information on the best practices to follow when using the Novell®
ZENworks
Section B.1, “Local File Rights Policy,” on page 95
Section B.2, “Dynamic Local User Policy,” on page 95
Section B.3, “Roaming Profile Policy,” on page 95
Section B.4, “SNMP Policy,” on page 95
Section B.5, “Windows Group Policy,” on page 96
Section B.6, “Printer Policy,” on page 96
®
11 Configuration Management policies:
B.1 Local File Rights Policy
For information on managing access control to files and folders, see Microsoft’s Access
Control Best Practices Web site (http://technet2.microsoft.com/windowsserver/en/library/
5a6d7830-6c5e-4c93-b8e7-fb446954d91b1033.mspx?mfr=true).
B.2 Dynamic Local User Policy
Ensure that the latest version of the Novell Client
the Dynamic Local User policy is enforced. To obtain the latest version of Novell Client, see
the Novell Download Web site (http://download.novell.com/index.jsp).
TM
is installed on the managed device before
If a Dynamic Local User policy that has no login restrictions configured is assigned to a
managed device, the time taken to log in to the managed device can be significantly improved
by adding a DonotFetchUserGroups registry key as follows:
1. Open the Registry Editor.
2. Go to
3. Create a String called DonotFetchUserGroups and set its value to True.
HKLM\Software\Novell\ZCM\AgentSettings
.
B.3 Roaming Profile Policy
The local user account must have the same username and password on both the managed
device and the shared server that has the user profile stored because Windows authenticates the
user before loading or saving the profile across the devices.
Provide the necessary permission on the shared location to users whose profile is configured
for roaming.
B.4 SNMP Policy
Ensure that the SNMP service is running before applying the SNMP policy.
Best Practices
95
B.5 Windows Group Policy
Do not apply the Windows Group policy on Windows 2000 or Windows 2003 domain
controllers.
Do not apply the Windows Group policy to a Windows managed device that is a part of the
Microsoft domain and has a group policy from the Windows domain controller applied. The
ZENworks Windows Group policy must be applied only if the group policy from the Windows
domain controller is not applied.
If you want the Windows Group policy settings to be applied to all users of a device, the
settings must be configured as a part of a device-assigned policy. The user-assigned policies
must contain only the configuration settings specific to the user to whom the policy is assigned.
If you apply Local Group policies on a managed device that has ZENworks Group policies
already applied, some of the settings might not work correctly.
B.6 Printer Policy
You must not edit the Printer policy to add iPrint printer drivers in the Printer Driver Installation
panel of a printer policy details page. This is because the iPrint drivers are automatically
downloaded from the iPrint servers when the iPrint printer is installed on a device. However, you
can add local or network printer drivers to the drivers list if the policy has local or network printers
configured.
The iPrint Policy Management (IPPman) utility allows you to perform repetitive and mass
operations on printer policies that have an iPrint printer matching a specific iPrint URI or a specific
search criteria. You can use this utility to migrate the iprint printers from one iPrint server to another.
The IPPman utility enables you to create, clone, rename, modify, and delete the iPrint objects by
editing the existing printer policies that have iPrint printers. You can also export and import the
iPrint printer configurations for all the policies that match specific printer URI criteria.
The following sections contain more information on this utility:
Section C.1, “Installing the IPPman Utility,” on page 97
Section C.2, “Using IPPman Commands to Configure iPrint Printers,” on page 98
Section C.3, “Understanding the Format of the iPrint Printer Configuration File,” on page 105
Section C.4, “Printing Preferences for an iPrint Printer,” on page 106
novdocx (en) 16 April 2010
C
Section C.5, “iPrint Printer List Import File Format,” on page 106
C.1 Installing the IPPman Utility
The IPPman utility is installed by default in the ZENworks® installation directory of the ZENworks
Configuration Management server. However, you might need to manually install the utility on a
device in the following scenarios:
Migrate an iPrint printer from one device to another.
Install the utility on a device that is not a ZENworks server.
Download the file from ZENworks Control Center (in the Common Tasks, click Download ZENworks Tools > Administrative Tools).
2 Extract the
3 At the command prompt of the device, go to the directory where the
extracted and run
4 Set the IPPMAN_HOME environment variable to the directory where you extracted IPPman.
5 Set the JAVA_HOME environment variable to the JDK installation directory.
ippmanagement.zip
ippmanagement.zip
ippmanagement.exe
file from the
file to a temporary location.
.
.zip
contents are
iPrint Policy Management Utility
97
C.2 Using IPPman Commands to Configure
iPrint Printers
You can configure iPrint printers by using ZENworks Control Center or by using the zman
command line utility. In addition, you can use the IPPman utility to perform repetitive and mass
operations on printer policies that have an iPrint printer matching a specific iPrint URI or matching
a specific search criteria.
For more information on creating printer policies by using ZENworks Control Center, see
Section 2.4, “Printer Policy,” on page 23.
For more information on creating printer policies by using zman command line utility, see
“ZENworks Command Line Utilities”.
Review the following sections for more information on using the IPPman commands:
Section C.2.1, “Creating an iPrint Printer,” on page 98
Section C.2.2, “Cloning an iPrint Printer,” on page 99
Section C.2.3, “Renaming an iPrint Printer,” on page 100
Section C.2.4, “Modifying an iPrint Printer,” on page 101
novdocx (en) 16 April 2010
Section C.2.5, “Deleting an iPrint Printer,” on page 102
Section C.2.6, “Exporting iPrint Printer,” on page 103
Section C.2.7, “Importing an iPrint Printer,” on page 103
C.2.1 Creating an iPrint Printer
To create a new iPrint printer configuration for all the policies that match specific printer URI
criteria:
1 Create the iPrint printer configuration file.
For information on creating the iPrint printer configuration file, see Section C.3,
“Understanding the Format of the iPrint Printer Configuration File,” on page 105.
2 Use the
that have an iPrint printer with the URI specified in the command.
The printer name and the printing preferences for the new iPrinter printer are specified in the
iPrint printer configuration file.
ippman create
On a ZENworks server, enter the command as follows:
conf iPrint printer configuration file containing the printer name and the printing
preferences.
novdocx (en) 16 April 2010
username and
password
serverIP address of the ZENworks server.
portPort of the ZENworks server. The default port is 80.
Credentials of the ZENworks administrator.
To refer to the online help for the command, enter the following command:
ippman create -help
C.2.2 Cloning an iPrint Printer
To clone the iPrint printer configuration for all policies that match specific printer URI criteria, use
ippman clone
the
This command creates a new iPrinter printer for all the printer policies that have an iPrint printer
with the URI specified in the command. The URI of the new iPrint printer is also specified in the
command. The cloned printer has the same printing preferences as the original printer.
On a ZENworks server, enter the command as follows:
defaultWhether this is the default printer. The available options are true or false.
updatedriverUpdate the printer driver. The available options are true or false.
novdocx (en) 16 April 2010
username and
password
serverIP address of the ZENworks server.
portPort of the ZENworks server. The default port is 80.
Credentials of the ZENworks administrator.
To refer to the online help for the command, enter the following command:
ippman clone -help
After cloning an iPrint printer, you can choose to delete the original iPrint printer. For more
information on deleting the iPrint printer, see Section C.2.5, “Deleting an iPrint Printer,” on
page 102.
C.2.3 Renaming an iPrint Printer
To rename the iPrint printer configuration for all policies that match specific printer URI criteria, use
ippman rename
the
On a ZENworks server, enter the command as follows: