Novell ZENWORKS 10 CONFIGURATION MANAGEMENT SP3 - SYSTEM PLANNING-DEPLOYMENT-BEST PRACTICES GUIDE 10.3 30-03-2010 System Planning Manual page 73

System planning, deployment, and best practices guide
Hide thumbs Also See for ZENWORKS 10 CONFIGURATION MANAGEMENT SP3 - SYSTEM PLANNING-DEPLOYMENT-BEST PRACTICES GUIDE 10.3 30-03-2010:
Table of Contents

Advertisement

Drawbacks:
The ZENworks Configuration Management server becomes less scalable because it is serving
more HTTP requests from managed devices.
It can take some time before an application has finished encrypting and injecting its data into
the Web server.
NetWare
You can use the Novell Client (Client32
to provision application data to your managed devices.
Benefits:
Uses the existing infrastructure.
Less overhead is required on the ZENworks Server.
Drawbacks:
ZENworks Configuration Management has no control over the distribution of the application
content. The distribution must be managed outside of ZENworks Configuration Management
with products such as ZENworks Server Management.
ZENworks Configuration Management has no control over who has access to the data.
Application content is not encrypted and can potentially be installed by anyone with access to
the server.
This is not a firewall-friendly solution. Access from outside the firewall requires VPN access in
order to deliver applications.
Microsoft
You can use Microsoft DFS shares, Active Directory servers, or file and print servers.
Benefits:
Uses existing infrastructure servers.
Less overhead is required on the ZENworks Server.
Uses existing domain credentials of devices and users to control access to the files you are
provisioning to managed devices.
Drawbacks:
ZENworks Configuration Management has no control over the distribution of the application
content. The distribution must be managed outside of ZENworks Configuration Management
with products such as ZENworks Server Management or Microsoft DFS.
ZENworks Configuration Management has no control over who has access to the data.
Application content is not encrypted and can potentially be installed by anyone with access to
the server.
This is not a firewall-friendly solution. Access from outside the firewall requires VPN access in
order to deliver applications.
) and existing mapped network drives or directly via UNC
TM
Performing Design Activities
73

Advertisement

Table of Contents
loading

This manual is also suitable for:

Zenworks 10 configuration management sp3

Table of Contents