Table of Contents. Novell ZENworks 7 Patch Management


Add to my manuals
364 Pages

advertisement

Table of Contents. Novell ZENworks 7 Patch Management | Manualzz

Table of Contents

Preface: About This Document............................................................................................. 17

Typographical Conventions................................................................................................................17

Contacting Novell............................................................................................................................... 17

Chapter 1: ZENworks Patch Management Overview...........................................................19

Product Overview............................................................................................................................... 19

Patch Management Server and Agent Process........................................................................ 20

System Requirements........................................................................................................................ 21

Minimum Hardware Requirements.............................................................................................21

Supported Operating Systems................................................................................................... 21

Other Software Requirements................................................................................................... 21

Supported Database Servers.....................................................................................................22

Recommended Configuration.....................................................................................................22

Agent Supported Operating Systems................................................................................................ 22

Agent Supported Languages............................................................................................................. 24

Chapter 2: Using ZENworks Patch Management.................................................................25

Getting Started with ZENworks Patch Management......................................................................... 25

Accessing ZENworks Patch Management.........................................................................................26

Logging on to ZENworks Patch Management........................................................................... 26

Logging Out of Update.............................................................................................................. 27

Common Functions within Patch Management Server..................................................................... 28

Defining Browser Conventions...................................................................................................28

Using Search..............................................................................................................................29

Using Filters............................................................................................................................... 30

Using Tabbed Pages................................................................................................................. 31

Expanding and Collapsing Folders and Outlines.......................................................................31

Advancing Through Pages.........................................................................................................31

Using the Action Menu.............................................................................................................. 32

Using Help..................................................................................................................................32

Exporting Data............................................................................................................................33

Viewing the Patch Management Server Home Page........................................................................ 34

- 5 -

Table of Contents

Using the Navigation Menu....................................................................................................... 35

Viewing Latest News..................................................................................................................37

Viewing the Documentation Links..............................................................................................38

Viewing Server Information........................................................................................................ 38

Viewing the Graph Dashboard...........................................................................................................39

Dashboard Charts...................................................................................................................... 39

Dashboard Settings and Behavior Icons................................................................................... 39

Adding a Graph to the Dashboard............................................................................................ 41

Removing a Graph from the Dashboard................................................................................... 41

License Expiration.............................................................................................................................. 42

Chapter 3: Using Vulnerabilities and Packages.................................................................. 43

The Relationship Between Vulnerabilities and Packages..................................................................43

About Vulnerabilities...........................................................................................................................44

Defining Vulnerability Structure..................................................................................................44

The Vulnerabilities Page.................................................................................................................... 46

To Access The Vulnerabilities Page..........................................................................................46

Viewing Vulnerabilities............................................................................................................... 46

Viewing Vulnerability Details...................................................................................................... 47

Vulnerability Status and Types.................................................................................................. 47

Vulnerability Package Cache Status and Type......................................................................... 48

Vulnerability Name..................................................................................................................... 49

Vulnerability Impacts.................................................................................................................. 49

Vulnerability Statistics................................................................................................................ 50

Searching, Filtering, and Saving Views..................................................................................... 50

Working with Vulnerabilities............................................................................................................... 51

Vulnerability Status Tabs........................................................................................................... 51

Column Definitions..................................................................................................................... 51

Device Status............................................................................................................................. 52

Deploying Vulnerabilities............................................................................................................ 53

Disabling and Enabling Vulnerabilities.......................................................................................53

Using the Scan Now Feature.................................................................................................... 53

Updating the Cache................................................................................................................... 55

About Packages................................................................................................................................. 55

Using the Packages Tab................................................................................................................... 57

- 6 -

Table of Contents

Package Information Tab...........................................................................................................59

Package Statuses and Types.................................................................................................... 61

Package Column Definitions...................................................................................................... 62

Searching, Filtering, and Saving Views..................................................................................... 62

Working with Packages......................................................................................................................63

Deploying a Package................................................................................................................. 63

Deleting a Package....................................................................................................................63

Updating the Package Cache.................................................................................................... 63

Editing a Package...................................................................................................................... 64

Creating a Package................................................................................................................... 64

Using the Package Editor.................................................................................................................. 64

Including Deployment Options in a Package.............................................................................73

Adding File and Directories to a Package................................................................................. 75

Creating Scripts for a Package..................................................................................................79

Chapter 4: Working With Deployments................................................................................ 81

About Deployments............................................................................................................................ 81

Viewing Deployments.................................................................................................................82

Deployment Types..................................................................................................................... 84

Standard and Chained Deployments......................................................................................... 85

Using the Deployment Pages............................................................................................................ 86

Deployment Status and Type.................................................................................................... 87

Deployment Details Summary................................................................................................... 89

Working With Deployments................................................................................................................90

Deployments Page..................................................................................................................... 90

Viewing the Deployment Details................................................................................................ 91

Viewing Deployment Results..................................................................................................... 94

Explaining Deployment Distribution Order................................................................................. 95

Aborting Deployments................................................................................................................ 95

Disabling Deployments...............................................................................................................95

Enabling Deployments............................................................................................................... 96

Modifying Deployments.............................................................................................................. 96

Deleting Deployments................................................................................................................ 96

Explaining Deployment Deadlines............................................................................................. 96

Using the Deployment Wizard........................................................................................................... 97

- 7 -

Table of Contents

Introduction Page....................................................................................................................... 97

Device / Device Groups Selection Page................................................................................... 98

Package Selection Page............................................................................................................99

Associated Vulnerability Analysis.............................................................................................101

Licenses Page..........................................................................................................................102

Deployment Options Page....................................................................................................... 103

Schedule Configuration Page.................................................................................................. 105

Selecting the Deployment Start and End Functions................................................................ 108

Package Deployment Order and Behavior Page.....................................................................110

Package Deployment Behavior Options Page.........................................................................114

Notification Options Page........................................................................................................ 118

Deployment Confirmation Page............................................................................................... 121

Associated Vulnerability Analysis Page................................................................................... 123

Deployment Summary Page.................................................................................................... 124

Chapter 5: Using Devices and Inventory............................................................................127

About Devices.................................................................................................................................. 128

Viewing Devices....................................................................................................................... 128

Using the Devices Page.......................................................................................................... 129

Using the Details by Device Page...........................................................................................132

Working with Devices.......................................................................................................................138

Installing an Agent................................................................................................................... 138

Viewing Device Details............................................................................................................ 140

Disabling a Device................................................................................................................... 140

Deleting a Device.....................................................................................................................141

Enabling a Device.................................................................................................................... 141

Deploying a Vulnerability......................................................................................................... 141

Exporting Device Information................................................................................................... 141

Scanning Devices.....................................................................................................................142

Rebooting Devices................................................................................................................... 142

About Inventory................................................................................................................................ 143

Viewing Inventory..................................................................................................................... 143

Using the Inventory Tab.................................................................................................................. 144

Inventory Types........................................................................................................................144

Scanning Inventory...........................................................................................................................145

- 8 -

Table of Contents

Manually Scheduling the DAU Task........................................................................................ 146

Using Custom Inventory...................................................................................................................146

Guidelines for Microsoft Windows based Operating Systems................................................. 146

Guidelines for Linux/Unix/Mac based Operating Systems.......................................................150

Chapter 6: Using Groups..................................................................................................... 153

To View Groups............................................................................................................................... 154

To Search for a Group.................................................................................................................... 154

Groups and the Directory Tree........................................................................................................155

Parent and Child Groups......................................................................................................... 155

Defining Groups....................................................................................................................... 155

Group Information............................................................................................................................ 156

Group Information Settings...................................................................................................... 157

Assigned Email Notification Addresses................................................................................... 157

Assigned Child Groups............................................................................................................ 158

Assigned Mandatory Baseline Items....................................................................................... 158

Assigned Policy Sets............................................................................................................... 158

Resultant Policy Information.................................................................................................... 159

Assigned Roles........................................................................................................................ 159

Group Membership...........................................................................................................................160

Creating a Group..................................................................................................................... 161

Moving a Group....................................................................................................................... 162

Deleting Groups....................................................................................................................... 163

Editing Groups..........................................................................................................................164

Device Membership..........................................................................................................................165

Adding or Removing Device Members.................................................................................... 166

Enabling or Disabling Devices within a Group........................................................................ 168

Mandatory Baseline..........................................................................................................................168

Viewing a Group Mandatory Baseline..................................................................................... 170

Managing Mandatory Baselines...............................................................................................171

Removing Deployments Created by Mandatory Baselines..................................................... 176

Device Group Vulnerabilities............................................................................................................177

Enabling Vulnerabilities within a Group................................................................................... 178

Disabling Vulnerabilities within a Group.................................................................................. 178

Device Group Inventory................................................................................................................... 179

- 9 -

Table of Contents

Device Group Deployments............................................................................................................. 180

Deploying to a Group...............................................................................................................181

Device Group Policies......................................................................................................................181

Adding a Policy to a Group..................................................................................................... 182

Removing a Policy from a Group............................................................................................ 182

Device Group Roles.........................................................................................................................183

Adding a Role to a Group....................................................................................................... 183

Removing a Role from a Group.............................................................................................. 184

Device Group Dashboard................................................................................................................ 185

Dashboard Charts.................................................................................................................... 185

Dashboard Settings and Behavior Icons................................................................................. 186

Adding a Graph to the Dashboard.......................................................................................... 187

Removing a Graph from the Dashboard................................................................................. 188

Device Group Settings..................................................................................................................... 188

Editing Group Settings............................................................................................................. 189

Assign a Source Group to a Custom Group........................................................................... 190

Chapter 7: Reporting............................................................................................................ 193

About Reports.................................................................................................................................. 193

Available Reports Page........................................................................................................... 194

Report Parameters Page......................................................................................................... 195

Report Results Page................................................................................................................197

Viewing Reports....................................................................................................................... 197

Working with Reports.......................................................................................................................199

Searching within Reports......................................................................................................... 199

Displaying Time and Date in Reports......................................................................................200

Exporting Reports.....................................................................................................................200

Viewing Printable Data in Reports...........................................................................................200

Available Reports............................................................................................................................. 201

Agent Policy Report................................................................................................................. 201

Deployment Detail Report........................................................................................................ 202

Deployment Error Report......................................................................................................... 202

Deployment In-Progress Report...............................................................................................203

Deployment Summary Report..................................................................................................204

Detection Results Not Found Report.......................................................................................205

- 10 -

Table of Contents

Device Duplicate Report.......................................................................................................... 205

Device Status Report............................................................................................................... 206

Hardware Inventory Detail Report........................................................................................... 206

Hardware Inventory Summary Report..................................................................................... 207

Mandatory Baseline Detail Report........................................................................................... 207

Mandatory Baseline Summary Report..................................................................................... 208

Operating System Inventory Detail Report.............................................................................. 209

Operating System Inventory Summary Report........................................................................ 209

Package Compliance Detail Report......................................................................................... 209

Package Compliance Summary Report...................................................................................210

Services Inventory Detail Report............................................................................................. 211

Services Inventory Summary Report....................................................................................... 211

Software Inventory Detail Report.............................................................................................211

Software Inventory Summary Report.......................................................................................212

Vulnerability Analysis Report................................................................................................... 212

Chapter 8: Managing Users and Roles...............................................................................215

About User Management................................................................................................................. 215

Viewing Users.......................................................................................................................... 216

Defining User Access.......................................................................................................................216

Windows-based Authentication................................................................................................ 216

Update Access Rights..............................................................................................................216

Defining Users..................................................................................................................................216

Defining Roles.................................................................................................................................. 217

Defining the Predefined System Roles....................................................................................217

Defining Custom Roles............................................................................................................ 218

Defining Access Rights............................................................................................................ 218

Defining Accessible Device Groups.........................................................................................221

Defining Accessible Devices.................................................................................................... 222

Working with Users.......................................................................................................................... 222

Creating New Users.................................................................................................................222

Adding Existing Users..............................................................................................................226

Editing User Profiles................................................................................................................ 228

Removing Users.......................................................................................................................229

Deleting Users..........................................................................................................................230

- 11 -

Table of Contents

Changing a User’s Password.................................................................................................. 230

Working with User Roles................................................................................................................. 232

Creating User Roles.................................................................................................................233

Editing User Roles................................................................................................................... 235

Assigning a User Role to an Existing User............................................................................. 236

Disabling User Roles............................................................................................................... 237

Enabling User Roles................................................................................................................ 238

Deleting User Roles................................................................................................................. 238

Chapter 9: Configuring Default Behavior........................................................................... 239

About the Options Page.................................................................................................................. 239

Viewing Configuration Options.................................................................................................240

Viewing Subscription Service Information........................................................................................241

Subscription Service Information............................................................................................. 242

Subscription Service History.................................................................................................... 242

Subscription Service Configuration.......................................................................................... 244

Setting the Vulnerability and Package Languages.................................................................. 247

Configuring Enhanced Content................................................................................................ 248

Supporting Red Hat Enterprise and Sun Solaris Agents.................................................................251

Enabling Enhanced Content.................................................................................................... 251

Content Credentials Manager.................................................................................................. 252

Verifying Subscription Licenses....................................................................................................... 255

Product Information.................................................................................................................. 255

Default Configuration........................................................................................................................257

Configuring Deployment Defaults............................................................................................ 258

Configuring Agent Defaults...................................................................................................... 259

Configuring User Interface Defaults.........................................................................................261

Configuring ISAPI Communication Settings............................................................................ 263

Working With Agent Policy Sets......................................................................................................264

Viewing Agent Policy Summary Information............................................................................265

Creating a Policy Set............................................................................................................... 265

Editing a Policy Set..................................................................................................................269

Deleting a Policy Set............................................................................................................... 270

Defining Inventory Collection Options......................................................................................272

Defining Agent Hours of Operation..........................................................................................275

- 12 -

Table of Contents

Defining FastPath Servers....................................................................................................... 276

Defining Agent Policy Conflict Resolution............................................................................... 278

Using E-Mail Notification..................................................................................................................279

Defining E-Mail Notification...................................................................................................... 280

Defining E-Mail Alert Thresholds............................................................................................. 281

Sending a Test E-Mail............................................................................................................. 282

Technical Support Information......................................................................................................... 283

Server Information....................................................................................................................283

Component Version Information.............................................................................................. 284

Support Information..................................................................................................................285

Chapter 10: Using the Agent............................................................................................... 287

About the Agent for Pre Windows Vista..........................................................................................287

Viewing the Pre Windows Vista Agent.................................................................................... 287

Deployment Tab....................................................................................................................... 288

Detection Tab........................................................................................................................... 291

Proxies Tab.............................................................................................................................. 293

About Tab.................................................................................................................................295

User Interaction During a Deployment.................................................................................... 296

User Interaction During a Reboot............................................................................................ 298

About the Agent for Windows Vista.................................................................................................299

Viewing the Agent.................................................................................................................... 299

Home Page.............................................................................................................................. 301

Tools and Settings................................................................................................................... 303

User Interaction During a Deployment.................................................................................... 306

User Interaction During a Reboot............................................................................................ 308

About the Agent for Mac................................................................................................................. 309

Viewing the Agent.................................................................................................................... 309

Deployment Tab....................................................................................................................... 309

Detection Tab........................................................................................................................... 311

Refreshing the Agent Information............................................................................................ 312

Starting the Agent.................................................................................................................... 312

Stopping the Agent.................................................................................................................. 312

Restarting the Agent................................................................................................................ 313

User Interaction During a Deployment.................................................................................... 313

- 13 -

Table of Contents

User Interaction During a Reboot............................................................................................ 314

About the Agent for Linux/Unix........................................................................................................315

Appendix A: Patch Management Server Reference.......................................................... 317

Server Security.................................................................................................................................317

Server Error Pages.......................................................................................................................... 318

WinInet Error Codes........................................................................................................................ 318

HTTP Status Codes......................................................................................................................... 319

Device Status Icons......................................................................................................................... 320

Appendix B: Securing Your Patch Management Server................................................... 321

Secure Your Server With SSL.........................................................................................................321

Use Secure Passwords....................................................................................................................322

Turn Off File and Printer Sharing.................................................................................................... 322

Turning Off File and Printer Sharing....................................................................................... 322

Put Your Server Behind a Firewall.................................................................................................. 323

Turn Off Non-Critical Services......................................................................................................... 323

Lock Down Unused TCP and UDP Ports........................................................................................323

Locking Unused Ports..............................................................................................................323

Apply All Security Patches...............................................................................................................327

Appendix C: Working With the Content Update Tool....................................................... 329

Content Update Tool System Requirements................................................................................... 329

Installing the Content Update Tool.................................................................................................. 330

Downloading the Content Update Tool....................................................................................330

Installing the Content Update Tool.......................................................................................... 332

Using the Content Update Tool....................................................................................................... 333

The Configuration Page........................................................................................................... 333

Using the Content Update Tool............................................................................................... 334

Appendix D: Creating a Disaster Recovery Solution........................................................ 341

Preparing Your Database................................................................................................................ 341

Changing the Database Recovery Model................................................................................ 341

Creating a Manual Solution............................................................................................................. 343

Creating a Database Backup...................................................................................................343

Restoring a Database Backup................................................................................................. 346

- 14 -

Table of Contents

Creating an Automated Solution......................................................................................................349

Creating a Maintenance Plan.................................................................................................. 349

Appendix E: Working With the Distribution Point............................................................. 357

Distribution Point System Requirements......................................................................................... 357

Installing the Distribution Point........................................................................................................ 358

Downloading the Distribution Point.......................................................................................... 358

Installing the Distribution Point................................................................................................ 359

Configuring the Distribution Point.................................................................................................... 361

- 15 -

Table of Contents

- 16 -

advertisement

Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Related manuals

advertisement

Table of contents