When it comes to deploying unified endpoint management software , small and midsized businesses have different requirements, priorities and trusted supplier sources compared with larger organizations. Smaller IT teams make unified endpoint management…
A backup solution is crucial to the future of your enterprise. Learn how you can make the most of your enterprise endpoint backup strategy.
The Case for Policy-Based Enterprise Endpoint Backup | Micro Focus
Why is a backup solution crucial…
Read this ZENworks lookbook to learn abut the latest upgrade!
ZENworks Suite
Depending on your current version, upgrading to the latest ZENworks release can mean up to 100+ game-changing enhancements. Your organization can find new ways…
Using Environment Variables in bundles can often present a challenge. Sometimes an administrator wants a variable name such as %USERNAME% to be used by a ZCM process. The ZCM administrator may want that variable resolved in the context of the logged on…
One of the most requested ZENworks Patch Management features we have is the ability to report on the patch policy compliance status. Basically you want to know which devices in the zone have all of the patches they are supposed to and which don't. While…
ZCM contains a very limited interface for creating windows shortcut files.
Furthermore, uploading pre-created LNK files can be difficult.
See - https://support.microfocus.com/kb/doc.php?id=3093343
Using a Powershell script to create LNK files avoids…
read more at microfocus
2 Steps to Close the Gap in Ransomware Defense
See the 2 Steps to Neutralize Evolving #Ransomware in this new InfoSec whitepaper: ...
This new paper explores the best breach defenses including four key protective capabilities:
Automated patching
Endpoint security
Encryption
Mobile security
Download paper here
read more at microfocus
Ransomware: Preventing Hostage Data
One way to combat Ransomware attacks is to employ secure, continuous backups of all your endpoints. Get all the details in our new InfoSec paper: ...
Some time back, a discussion with one of my colleagues got me thinking on the importance of blacklisting or whitelisting of applications on devices and its current relevance. To provide some background, some years back, the MDM capabilities offered by…
In today’s world, mobile devices and apps are a fact of life. They help users be more productive and provide more value to your business. Almost every end user wants mobile access to valuable company resources. And regardless of how sensitive this data…
Objective
This document explains the process of integrating ZENworks with the Apple Volume Purchase Program and the license distribution options with emphasis on reserving licenses for specific devices or users. The Apple Volume Purchase Program (VPP…
Do you manage printers with Microsoft Active Directory Print Management? Are you tired of manually creating and updating printer items in Micro Focus Service Desk? Even if you have done this, chances are good that this process quickly got out of hand…
Objective
The intent of this document is to describe the steps involved in integrating Micro Focus Desktop Containers (MFDC) – ZENworks product over SSL. The assumption is ZENworks server purchased with ZENworks Asset Management License and using Self…
Cool tool updated on June 09, 2016 For information about the update please click here . Introduction Micro Focus Service Desk has reports that provide information about the performance of Service Desk to Supervisors and users in a graphical snapshot…
We had another great Community Technical Webinar today delivered by Ingo from our European support center and Indumathi from our development team. They provided some great ideas on how the ZENworks Adaptive Agent works and how to troubleshoot problems…
In a call with our Customer Care team the other day someone asked if there was an easy way to import printers into the Micro Focus Service Desk (MFSD) system. In order to do that you could use a straight CSV import if you already have a system that knows…
ZENworks uses SSL certificates to protect & authenticate communications across the ZENworks management Zone. ZENworks provides you option to either use an internal ZENworks Certificates Authority (CA) or an external Certificate Authority (CA). Each Primary…
This is a predefined report created to provide the Allocation and installation details of each Licensed Product. This solution works for all DB's (Sybase, Oracle, MS-Sql)
The licensed product can be allocated by demographic (Site/Department/Cost Center…
Introduction: SSL is a protocol that provides security for communications between client and server by implementing encrypted data and certificate-based authentication. SSL is one of the most common ways of integrating secure communication on the internet…
As you may have read, TrueCrypt has become the Norwegian blue parrot of the software world and is no longer with us. A message on the TrueCrypt website suggests that the project ended due to ‘unfixed security issues’ and yet an independent project that…
As most of you know, Novell Service Desk
has inbuilt reporting capabilities that enables users to generate management reports from the captured record details. It provides a graphical snapshot of the overall performance of the Service Desk and its…
Overview:
The purpose of this document is to provide detailed steps for installation and configuration of eDirectory 8.8 SP6 on a Windows 2008 R2 machine using ZENworks Bundles. This would be a requirement when multiple eDirectory setups need to be…