Manageengine Desktop Central :: Help Documentation

Total Page:16

File Type:pdf, Size:1020Kb

Manageengine Desktop Central :: Help Documentation ManageEngine Desktop Central 8.0 :: Help Documentation Table of Contents INTRODUCTION ............................................................................................................. 8 Release Notes ........................................................................................... 10 Contacting ZOHO Corporation ..................................................................... 19 How Desktop Central Works? ...................................................................... 21 INSTALLATION & SETUP ........................................................................................... 27 System Requirements ................................................................................ 28 Installing Desktop Central ........................................................................... 31 Working with Desktop Central ..................................................................... 33 Installing Service Pack ............................................................................... 36 Licensing the Product ................................................................................. 37 Understanding the Client UI ........................................................................ 39 Setting Up Desktop Central ......................................................................... 42 Configuring Desktop Central for Windows Vista / 2008 / Windows 7 .......................... 43 Defining the Scope of Management ....................................................................... 44 Adding Domain/Workgroup ............................................................................................45 Managing computers in LAN ...........................................................................................49 Managing Computers in Wide Area Networks (WAN) .........................................................51 Configuring Agent Settings ................................................................................... 65 Configuring Mail Server ........................................................................................ 67 Configuring Help Desk Integration ......................................................................... 68 Integrating Desktop Central with ServiceDesk Plus .................................................. 69 Integrating Asset Data ..................................................................................................70 Logging Help Desk Requests as Tickets............................................................................72 Deploying Software Applications .....................................................................................75 Complete UI Integration with ServiceDesk Plus .................................................................78 Generating an Authentication Key ...................................................................................80 Managing Custom Scripts ..................................................................................... 82 Configuring Server Settings .................................................................................. 84 Creating Custom Groups ...................................................................................... 85 Configuring Deployment Templates ....................................................................... 87 1 Zoho Corporation ManageEngine Desktop Central 8.0 :: Help Documentation Configuring Remote Access to the Database in Desktop Central ................................ 89 Personalizing the Client ........................................................................................ 92 Authenticating Users via Active Directory ............................................................... 94 Migrating Desktop Central Server .......................................................................... 95 User & Role Management ..................................................................................... 97 Setting Up Software Deployment ......................................................................... 102 Configuring Software Repositories ................................................................................. 103 Managing Software Packages ....................................................................................... 107 Software Deployment Templates .................................................................................. 115 Setting Up Patch Management ............................................................................ 117 Configuring Proxy Server ............................................................................................. 118 Configuring Vulnerability DB Synchronization ................................................................. 119 Configuring Automated Patch Deployment ..................................................................... 120 Configuring System Health Policy .................................................................................. 122 Enabling Patch Approval Process ................................................................................... 123 Decline Patches .......................................................................................................... 124 Setting Up Asset Management ............................................................................ 125 Scan Systems for Inventory ......................................................................................... 126 Manage Software Licenses ........................................................................................... 128 Create Software Groups............................................................................................... 130 Manage Software Category .......................................................................................... 131 Configure Prohibited Software ...................................................................................... 132 Configure E-Mail Alerts ................................................................................................ 135 Schedule Inventory Scanning ....................................................................................... 136 Setting Up User Logon Reports ..................................................................................... 137 Setting Up Active Directory Reports .............................................................................. 138 USER GUIDE .............................................................................................................. 139 Software Installation ................................................................................ 140 Installing MSI-based Applications for Users .......................................................... 141 Installing EXE-based Applications for Users .......................................................... 142 Installing MSI-based Applications for Computers ................................................... 143 Installing EXE-based Applications for Computers ................................................... 144 Uninstalling MSI-based Applications for Users ....................................................... 145 Uninstalling EXE-based Applications for Users ....................................................... 146 Uninstalling MSI-based Applications for Computers ................................................ 147 Uninstalling EXE-based Applications for Computers ................................................ 148 2 Zoho Corporation ManageEngine Desktop Central 8.0 :: Help Documentation Patch Management .................................................................................. 149 Patch Management Architecture .......................................................................... 150 Patch Management Life Cycle .............................................................................. 153 Scan Systems for Vulnerability ............................................................................ 155 Installing Missing Patches ................................................................................... 156 Patch Views ...................................................................................................... 157 Viewing Applicable Patches .......................................................................................... 158 Viewing Latest Patches ................................................................................................ 161 Viewing Missing Patches .............................................................................................. 162 Viewing Installed Patches ............................................................................................ 164 Viewing Supported Patches .......................................................................................... 165 Viewing Healthy Systems ............................................................................................. 166 Viewing Vulnerable Systems ......................................................................................... 167 Viewing Highly Vulnerable Systems ............................................................................... 168 Viewing Patch Reports ....................................................................................... 169 Viewing Vulnerable Systems Report .............................................................................. 170 Viewing Vulnerable Patches Report ..............................................................................
Recommended publications
  • 1 Table of Contents List of Figures
    Table of Contents List of Figures ..................................................................................................................... 4 List of Tables ...................................................................................................................... 5 Chapter 1: Introduction....................................................................................................... 6 1.1 Introduction....................................................................................................................6 1.2 Problem Statement .......................................................................................................12 1.3 Thesis Objective...........................................................................................................12 1.4 Thesis Organization.....................................................................................................14 Chapter 2: Intrusion Detection.......................................................................................... 15 2.1 Introduction..................................................................................................................15 2.2 What is an IDS .............................................................................................................15 2.2.1 The Basic Concepts of Intrusion Detection......................................................16 2.2.2 A Generic Intrusion-Detection System.............................................................17 2.2.3 Characteristics of
    [Show full text]
  • Adobe Application Manager Enterprise Edition Deployment Guide
    ADOBE® APPLICATION MANAGER ENTERPRISE EDITION GUIDE DE DEPLOIEMENT EN ENTREPRISE Adobe® Application Manager Enterprise Edition version 3.1 Version de document 3.1 Date du document : Septembre 2012 © 2012 Adobe Systems Incorporated and its licensors. All rights reserved. Adobe® Application Manager Enterprise Edition Guide de déploiement en entreprise This guide is licensed for use under the terms of the Creative Commons Attribution Non-Commercial 3.0 License. This License allows users to copy, distribute, and transmit the guide for noncommercial purposes only so long as (1) proper attribution to Adobe is given as the owner of the guide; and (2) any reuse or distribution of the guide contains a notice that use of the guide is governed by these terms. The best way to provide notice is to include the following link. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/3.0/ Adobe, the Adobe logo, Acrobat, Adobe Audition, Adobe Bridge, Adobe Device Central, Adobe OnLocation, Adobe Premiere, Adobe Premiere Pro, Adobe Technical Communication Suite, After Effects, Contribute, Captivate, Creative Suite, CS Live, Dreamweaver, Encore, Fireworks, Flash, Flash Builder, Flash Catalyst, FrameMaker, Illustrator, InDesign, Photoshop, RoboHelp, SiteCatalyst, and Soundbooth are either registered trademarks or trademarks of Adobe Systems Incorporated in the United States and/or other countries. Apple, Mac, and Mac OS are trademarks of Apple Inc., registered in the United States and other countries. Microsoft, Windows, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. UNIX is a registered trademark of The Open Group in the US and other countries.
    [Show full text]
  • Using Remote Desktop Services with Ifix 1
    Proficy iFIX 6.5 Using Remote Desktop Services GE Digital Proficy Historian and Operations Hub: Data Analysis in Context 1 Proprietary Notice The information contained in this publication is believed to be accurate and reliable. However, General Electric Company assumes no responsibilities for any errors, omissions or inaccuracies. Information contained in the publication is subject to change without notice. No part of this publication may be reproduced in any form, or stored in a database or retrieval system, or transmitted or distributed in any form by any means, electronic, mechanical photocopying, recording or otherwise, without the prior written permission of General Electric Company. Information contained herein is subject to change without notice. © 2021, General Electric Company. All rights reserved. Trademark Notices GE, the GE Monogram, and Predix are either registered trademarks or trademarks of General Electric Company. Microsoft® is a registered trademark of Microsoft Corporation, in the United States and/or other countries. All other trademarks are the property of their respective owners. We want to hear from you. If you have any comments, questions, or suggestions about our documentation, send them to the following email address: [email protected] Table of Contents Using Remote Desktop Services with iFIX 1 Reference Documents 1 Introduction to Remote Desktop Services 2 Using iClientTS 2 Understanding the iFIX and Remote Desktop Services 3 File System Support 5 Where to Find More Information on Remote Desktop Services 5 Getting
    [Show full text]
  • Netop Remote Control User's Guide
    USER'S GUIDE 27 September 2017 Netop Remote Control User's Guide Copyright© 1981-2017 Netop Business Solutions A/S. All Rights Reserved. Portions used under license from third parties. Please send any comments to: Netop Business Solutions A/S Bregnerodvej 127 DK-3460 Birkerod Denmark E-mail: [email protected] Internet: www.netop.com Netop™ is a trademark of Netop Business Solutions A/S. All other products mentioned in this document are trademarks of their respective manufacturers. Netop Business Solutions A/S denies any and all responsibility for damages caused directly or indirectly as a result of using this document. The content of this document is subject to change without notice. Netop Business Solutions A/S retains the copyright to this document. The document is optimized for double-sided printing. 27 September 2017 Netop Remote Control User's Guide Contents 1 Overview ....................................................................................................................................................4 1.1 Remote Control modules ...............................................................................................................................................4 1.2 Security ...........................................................................................................................................4 1.3 Communication profiles ...............................................................................................................................................5 2 Managing Hosts ........................................................................................................................................6
    [Show full text]
  • Project Proposal a Comparative Analysis of the LAMP (Linux, Apache, Mysql and PHP) and Microsoft .NET (Windows XP, IIS, Microsof
    Project Proposal A comparative analysis of the LAMP (Linux, Apache, MySQL and PHP) and Microsoft .NET (Windows XP, IIS, Microsoft SQL Server and ASP.NET) frameworks within the challenging domain of limited connectivity and internet speeds as presented by African countries. By: Christo Crampton Supervisor: Madeleine Wright 1.) Overview of the research With the recent releases of ASP.NET and PHP 5, there has been much debate over which technology is better. I propose to develop and implement an industry strength online journal management system (AJOL – African Journals OnLine) using both frameworks, and use this as the basis for comparative analysis of the two frameworks against eachother. 2.) Product Specification AJOL is an existing website ( www.ajol.org ) which acts as an aggregation agent for a number of publishers of African journals who wish to publish their journals online and of course for researchers looking for information. The existing system is based on the OJS (Open Journal System) developed by Berkeley University. The system consists of a user frontend – where users can browse and search the contents of the database online – and an administration frontend – where publishers can log in and manage their journals on the database by performing tasks such as adding new abstracts or editing existing abstracts. It is currently developed in PHP with a MySQL backend. The proposed system will consist of an online user interface, and online administration interface for publishers, as well as an offline administration interface for publishers. The online and offline administration interfaces are complementary and publishers can use either or both according to their preference.
    [Show full text]
  • Microsoft Active Platform: a Development Platform for Internet-Based Distributed Computing
    Microsoft Active Platform: A Development Platform for Internet-Based Distributed Computing Backgrounder March 19977 Intent on increasing online efficiency while reducing development and training costs, businesses are demanding a single solution for storing, publishing and retrieving information, as well as for running line-of-business applications on internal networks and the Internet. The Microsoft® Active Platform meets this demand by providing a foundation for distributed computing. An integrated, comprehensive set of client and server development technologies, the Active Platform makes it easy for developers to integrate the connectivity of the Internet with the power of the personal computer. The Active Platform is based on the leading standards-based implementation of HTML from Microsoft, open scripting and component architecture. It allows developers to use the same tools and components they know and use today to build powerful applications easily for the Internet and intranets. This comprehensive set of tools and technologies provides a new application development approach across clients and servers using a single component model. By making optimal use of today’s tools and tomorrow’s Internet technologies, the Active Platform enables developers to make the transition into the new paradigm for desktop computing and capitalize on the new opportunities it presents. The Active Platform offers users and administrators a graphically rich, intuitive, easy-to-manage and consistent experience across platforms. Developers benefit from rich services built into the system and a uniform programming model across the client and the server that can be accessed from a consistent, integrated set of tools. Figure1. The Microsoft Active Platform brings information to the desktop from the Internet and intranets under the comprehensive interface of the Active Desktop.
    [Show full text]
  • Management Console Reference Guide
    Secure Web Gateway Management Console Reference Guide Release 10.0 • Manual Version 1.01 M86 SECURITY SETUP AND CONFIGURATION GUIDE © 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA Version 1.01, published November 2010 for SWG software release 10.0 This document may not, in whole or in part, be copied, photo- copied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior written con- sent from M86 Security. Every effort has been made to ensure the accuracy of this document. However, M86 Security makes no warranties with respect to this documentation and disclaims any implied war- ranties of merchantability and fitness for a particular purpose. M86 Security shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. Due to future enhancements and modifications of this product, the information described in this documentation is subject to change without notice. Trademarks Other product names mentioned in this manual may be trade- marks or registered trademarks of their respective companies and are the sole property of their respective manufacturers. II M86 SECURITY, Management Console Reference Guide CONTENT INTRODUCTION TO THE SECURE WEB GATEWAY MANAGEMENT CONSOLE .................................................................... 1 WORKING WITH THE MANAGEMENT CONSOLE................ 3 Management Console . 3 Main Menu . 4 Using the Management Console . 6 Management Wizard . 10 User Groups Wizard . 11 Log Entry Wizard . 28 DASHBOARD............................................................... 33 Dashboard Console . 33 Functionality. 34 Device Gauges . 35 Performance Graphs . 38 Messages (SNMP). 40 Device Utilization Graphs. 41 USERS ......................................................................
    [Show full text]
  • Listener Feedback #127
    Security Now! Transcript of Episode #320 Page 1 of 30 Transcript of Episode #320 Listener Feedback #127 Description: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. They tie up loose ends, explore a wide range of topics that are too small to fill their own episode, clarify any confusion from previous installments, and present real world 'application notes' for any of the security technologies and issues we have previously discussed. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-320.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-320-lq.mp3 Leo Laporte: This is Security Now! with Steve Gibson, Episode 320, recorded September 28, 2011: Your questions, Steve's answers, #127. It's time for Security Now!. The Kindle Edition, I have a feeling, this week. Steve Gibson is here. He is the man in charge at GRC.com, a security guru and expert. He's done 320 of these shows talking about protecting yourself online. And a good day to you, Steve. Steve Gibson: Well, it would be 320 had we had the foresight of numbering from zero. As it is, we've done 319, and this one is #320. Leo: I'm including this one. This is an extra one. Steve: I'll tell you, it's those little details that trip up programmers an unbelievable number of times, like how many numbers are there between numbers 7 and 10? It's like, okay, wait a minute.
    [Show full text]
  • Peer Institution Research: Recommendations and Trends 2016
    Peer Institution Research: Recommendations and Trends 2016 New Mexico State University Abstract This report evaluates the common technology services from New Mexico State University’s 15 peer institutions. Based on the findings, a summary of recommendations and trends are explained within each of the general areas researched: peer institution enrollment, technology fees, student computing, software, help desk services, classroom technology, equipment checkout and loan programs, committees and governing bodies on technology, student and faculty support, printing, emerging technologies and trends, homepage look & feel and ease of navigation, UNM and UTEP my.nmsu.edu comparison, top IT issues, and IT organization charts. Peer Institution Research 1 Table of Contents Peer Institution Enrollment ................................................................................. 3 Technology Fees ................................................................................................. 3 Student Computing ............................................................................................. 6 Software ............................................................................................................. 8 Help Desk Services .............................................................................................. 9 Classroom Technology ...................................................................................... 11 Equipment Checkout and Loan Programs .........................................................
    [Show full text]
  • Guideline Formats and Architectures
    23.09.2021 17:00:47 Guideline Formats and Architectures Format selection Based on sources provided for package creation following procedures are available: • Transformation of existing vendor MSI. • Creation of MSI by repackaging legacy installer or from the scratch. • Usage of legacy setup. • Package Virtualization (App-V/ThinApp/MSIX) General packaging best practices are given below. An original vendor MSI may not be changed. Adjustments must always be made by MST. The original MSI Databases should Vendor MSI not be modified. In exceptional cases if transform creation is not possible or fixing of vendor MSI is not possible in acceptable timeframe, the setup capture may be performed. Vendor If vendor specific customization tool (e.g. Adobe InstallTuner, Microsoft Office Customization Tool) is available for original customization tool package, it should be used. More than one If original application contains more than one vendor MSI from different vendors, the packaging task should be divided for vendor MSI from separate tasks for each vendor MSI. different vendors Advantages and Disadvantages Application Virtualization Virtualizing applications (e.g. in App-V/MSIX) can offer customers advantages, but also disadvantages: Advantages Applications are installed and uninstalled correctly There are no conflicts between applications Multiple versions of the same application can be installed in parallel Advantages when rolling out applications Applications can be assigned per user (e.g. for VDI or Citrix) Disadvantages Virtualized versions of
    [Show full text]
  • Pdf, .Xps, .Png and More
    About the SQLyog program: SQLyog Version History Also read about plans for future versions of SQLyog SQLyog 8.2 (December 2009) Features • Added a ‘Schema Optimizer’ feature. Based on “procedure analyse()” it will propose alterations to data types for a table based on analysis on what data are stored in the table. The feature is available from INFO tab/HTML mode. • A table can now be added to Query Builder canvas multiple times. A table alias is automatically generated for second and higher instance of the table. This is required for special queries like self-JOINs. • In the ‘Import External Data’ wizard same import settings can now be applied to all tables in one operation. • In MESSAGES tab we are now displaying the query if error occurs during execution in order to make it easier to identify what query raised an error when executing multiple statements. Bug Fixes • ‘Import External Data Tool’ -TRIGGERS did not use the Primary Key for the WHERE-clause if a PK existed on source (all columns were used with the WHERE instead). This could cause problems with tables having Floating Point data. • A malformed XML-string could cause failure to connect with HTTP tunneling. This was a rare issue only. • After DROP a ’stored program’ followed by CREATE same, autocomplete would not recognize the ’stored program’ unless after a program restart. • ‘duplicate table’ has an option to duplicate triggers defined ON that table, but the way we named the new trigger could cause inconsistencies. Now the new trigger will be named Page 1/80 (c) 2009 Webyog <[email protected]> URL: http://www.webyog.com/faq/content/5/7/en/sqlyog-version-history.html About the SQLyog program: SQLyog Version History ‘oldtriggername_newtableame’.
    [Show full text]
  • Sonosite® Workflow Solutions
    SonoSite® Workflow Solutions SWS Software FAQs for IT 1. Why does SWS require a server? The SonoSite Workflow Solutions (SWS™ software) server provides a single, secure location for storage of all images and data that are collected from multiple ultrasound systems. 2. What are the SWS server requirements? The minimum requirements for a SWS server are: Microsoft Windows Operating Systems (Server or Client) • Windows XP with SP3 • Windows Vista Business • Windows Server 2008 MacIntosh Operating System (Server or Client) • Mac® OS 10.5.6 or later System Requirments • CD-ROM drive • USB drive • Ethernet connectivity (wired or wireless) Minimum Server System Hardware Requirements • 2 GHz processor • 4 GB system memory • 250 GB hard disk space Additional requirements for Client • A browser: FireFox 3.5 or later, Internet Explorer 7.0 or later, or Safari 4.0 or later • Adobe Reader 8.1 or later (See www.adobe.com) • Adobe Media Player (See www.adobe.com) 3. How much disk storage space is really used? A sample system with approximately 13,000 complete ultrasound exams uses about 75 GB of storage space. 4. How is SWS installed? SWS server software is installed on both Mac and PC systems using a “Wizard” type installation tool. The software is distributed on a DVD. SWS Client software is installed on PCs and Macs using a web interface on the server PC (or Mac). 5. Who maintains the SWS server? The IT or BioMed group that supports the Emed department would normally maintain the server. 6. How is SWS data backed up? SonoSite provides data backup and restore software with SWS.
    [Show full text]