Personality Migration; Linux Management; Handheld Management; Endpoint Security Management - Novell ZENWORKS 10 CONFIGURATION MANAGEMENT SP3 - ENTERPRISE EDITION GETTING STARTED GUIDE 10.3 30-03-2010 Getting Started Manual

Enterprise edition
Hide thumbs Also See for ZENWORKS 10 CONFIGURATION MANAGEMENT SP3 - ENTERPRISE EDITION GETTING STARTED GUIDE 10.3 30-03-2010:
Table of Contents

Advertisement

When a new patch is available from the subscription service, a ZENworks Server downloads
information about it. You can deploy the patch to devices or disregard the patch.
For more information, see the

1.1.11 Personality Migration

Personality Migration allows you to automate the process of migrating a set of customized system
and application settings. A typical set of settings can be desktop wallpaper, e-mail account settings,
browser proxy settings, files and folders, archived e-mails, Microsoft office templates, MS Excel
Macros etc.This process significantly reduces the time and effort required in setting up or re-
configuring a desktop for users.
For more information, see the

1.1.12 Linux Management

Linux Management makes it easy to embrace and extend Linux within your existing environment. It
is the only solution that uses policy-driven automation to deploy, manage, and maintain Linux
resources. These automated and intelligent policies allow you to provide centralized control across
the life cycle of Linux systems for desktop lockdown, imaging, remote management, inventory
management and software management. The result is a comprehensive Linux management solution
that eliminates IT effort by dramatically reducing the required overhead needed to manage Linux
systems.
For more information, see the
(http://www.novell.com/documentation/zlm73/index.html).

1.1.13 Handheld Management

Handheld Management lets you manage Palm*, Windows CE, Pocket PC, and BlackBerry*
handheld devices, including the ability to distribute applications and content to devices; secure
information by using password enforcement, integration, self-destruct, and lockout capabilities;
optimize low-bandwidth connectivity through the use of compression, checkpoint restart, delta
technology, and configurable bandwidth technology; inventory hardware and software and use
detailed queries to generate reports; automate device setup and standardize settings and
programming; and retrieve files from devices to protect data and integrate it with corporate data.
For more information, see the
(http://www.novell.com/documentation/zenworks7/zen7_zhm7.html).

1.1.14 Endpoint Security Management

Endpoint Security Management simplifies endpoint security by combining security policy
enforcement for data, devices, and connectivity under a single management console. This allows
organizations to manage, control and enforce security policies for removable storage, wireless
communications including MESH and WiMAX, application control, machine posture/integrity, data
encryption, and advanced personal firewall. Its lightweight footprint in both size and traffic, its ease
of management, and its comprehensive functionality earned it the Secure Computing Magazine's
"Reader's Trust Award for Best Endpoint Security Solution" in 2007.
ZENworks 10 Patch Management
ZENworks 10 Personality Migration
Novell ZENworks 7.3 Linux Management documentation Web site
Novell ZENworks 7 Handheld Management documentation Web site
Reference.
Reference.
Product Overview
13

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the ZENWORKS 10 CONFIGURATION MANAGEMENT SP3 - ENTERPRISE EDITION GETTING STARTED GUIDE 10.3 30-03-2010 and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Zenworks 10 configuration management sp3

Table of Contents