Managed device help

The Agent configuration window (Tools > Configuration > Agent configuration) is where you customize device agent configurations. Use the Agent configuration dialog box to specify the agents you want to install and the options for those agents. You can create as many agent configurations as you want. Only one configuration can be the default. You can use this window to create Windows, Macintosh, Linux, and server agent configurations.

To create a configuration
  1. Click Tools > Configuration > Agent configuration.
  2. Click the New button to create a new Windows configuration. Click the New Mac button to create a new Macintosh configuration.
  3. Complete the Agent configuration dialog box as described in the following sections. Click Help on a page for more information.

NOTE: If you use the Agent configuration dialog box to create a new default agent configuration, be aware that all devices that are configured by WSCFG32 using login scripts will be automatically reconfigured with the new default configuration settings the next time a user logs in, even if their current settings match the new default settings.

The following sections describe the Agent configuration dialog box pages.

About the Start page

The Agent configuration dialog box's Start page contains the following options:

Agent components to install (Standard):

Power Management:

Distribution:

Security:

Real-time Inventory and Monitoring:

Provides several methods to monitor a device’s health status. While alert rulesets are defined at the Core Server Console and deployed to multiple devices, on individual devices you can define performance monitoring counters to monitor specific performance issues.

Other options:

Deploying the standard LANDesk agent

All Management Suite components require the standard LANDesk agent (formerly known as CBA), which is installed by default on all device installations. Among other things, the standard LANDesk agent provides device discovery and manages core server/device communication.

By default, the standard agent includes the LANDesk Security Suite security scanner.

Use the Standard LANDesk agent pages to configure the Standard LANDesk agent, which includes these components and settings:

About the Standard LANDesk agent page

Use this page to configure certificate-based security and what scope devices using this configuration will have.

Trusted certificates

Select the core server certificates you want devices to accept. Devices will only communicate with cores and consoles they have certificates for. For more information on certificates and copying them from other core servers so you can select them here, see Agent security and trusted certificates.

Below the trusted certificates box you can modify the core server that devices using this agent configuration will communicate with. By default, this box contains the current core server. The core name can either be a Windows computer name, an IP address, or fully-qualified domain name. A fully-qualified domain name for a core may be necessary if you'll be pushing agent configurations to devices in multiple domains or anytime a device can't resolve the core name unless it is fully-qualified. Managed devices will use the information you enter here to communicate with the core server, so make sure the name you enter is resolvable from all devices that will receive this configuration.

The core name you enter here as part of an agent configuration is added to a device's registry under:

Once you've selected trusted certificates, and changed the core name if necessary, you can test them. When you click Test, a message box appears indicating whether the device name or IP address you entered was resolvable. Note that the Test button doesn't ping the device you entered or verify that the name or IP address belongs to a core server.

Location (scope)

If you want devices to be included in scopes that are based on custom directories, enter a directory path in the Path field. The path you enter here defines the device's computer location inventory attribute. Scopes are used by Management Suite role-based administration to control user access to devices, and can be based on this custom directory path.

Custom directory paths use a format that's similar to a file path, but with forward slashes as separators. If you want to use custom directory-based scopes, first decide how you want to categorize your devices for role-based administration. You might categorize devices by geographic locale, department or group name, or any other organizational detail you prefer.

Directory paths you enter here as part of an agent configuration are added to a device's registry under:

You don't have to fill in this field. If you leave it blank, the device's computer location attribute is defined by its Active Directory or eDirectory path.

When the inventory scanner is run on a device, it records the device's computer location inventory attribute. If you entered a custom directory path in the Path field, that path is the directory the scanner records. If you left the custom directory path blank, the scanner tries to populate the computer location inventory attribute with the device's Active Directory or NetWare eDirectory path. If neither a custom directory path or an LDAP-compliant directory is found, the computer location attribute isn't defined. However, the device can still be accounted for in both query scopes or device group scopes.

For more information on how scopes are used in Management Suite role-based administration, and how you can define a scope using custom directory paths, see Role-based administration.

About the Inventory scanner page (under Standard LANDesk agent)

The Agent configuration dialog box's Inventory scanner page contains the following features:

Run Inventory Scans: 

About the Local scheduler page (under Standard LANDesk agent)

The local scheduler agent enables Management Suite to launch device tasks based on a time of day or bandwidth availability. The local scheduler agent is most useful for mobile computers that may not always be on the network or may connect to the network via a dial-up connection. For example, you can use the local scheduler to allow mobile computer package distribution only when those devices are on the WAN.

When you schedule software packages for distribution, or when you create application policies, you can specify which bandwidth the packages or policies require before they are applied.

The local scheduler runs as a service on Windows devices.

The Local scheduler page contains the following features:

About the Alerting page (under Standard LANDesk agent)

Alert rulesets define which events require immediate action or need to be logged for your attention. A ruleset contains a collection of alert rules, each of which has a corresponding alert action. When you define an alert ruleset you can deploy it to one or more devices to monitor the items that are important for that kind of device.

You can deploy one of the predefined rulesets or you can deploy rulesets you've created inside the alerting tool.

The Alerting page contains the following features:

About the Bandwidth detection page (under Standard LANDesk agent)

Bandwidth detection enables bandwidth detection between devices and the core server. You can limit Management Suite actions such as software distribution based on available bandwidth. Use this option if you have remote devices or devices that connect to the network via a slow link.

The Agent configuration dialog box's Bandwidth detection page contains the following features:

About the Device reboot options page (under Standard LANDesk agent)

Once you install Management Suite agents on devices, they may need a reboot to complete the agent configuration. The Agent configuration dialog box's Device reboot options page contains the following features:

About the Software usage monitoring page (under Standard LANDesk agent)

The Software usage monitoring page is used to track usage statistics for Software License Monitoring. This feature collects information on three types of data: usage statistics from software license monitoring, additional inventory information, and application blocking capabilities.

The Software usage monitoring page contains the following options:

Deploying custom data forms

You can create and distribute custom data forms to collect device information that will supplement the standard information available in the core database. The forms you create using the form designer can be distributed by a device deployment service or by using the Agent configuration dialog box.

Customize the forms that are distributed to devices in your management domain using the form designer. For more information, see Using custom data forms.

About the Custom data Forms page

The custom data forms section consists of two pages. The Custom data forms page contains the following features:

About the Agent configuration dialog box's Forms sent with agent page

The Forms sent with agent page lists all defined custom data forms. Select which forms are made available to devices receiving this configuration task. You'll have to create forms ( Tools > Configuration > Custom Data Forms) before they can appear in this list.

Deploying software distribution

Software distribution automates the process of installing software applications and distributing files to devices. Use this agent to install applications simultaneously to multiple devices or to update files or drivers on multiple devices.

Software distribution uses a Web or file server to store packages. Devices access this package server when downloading a package. You'll need to configure a package server as described in the software distribution chapter in the User's Guide. You can deploy the software distribution agent to devices before you set up a package server. For more information, see Software distribution.

About Software distribution page

The Agent configuration dialog box's Software distribution page contains the following features:

About the Policy options page (under Software distribution)

The policy-based distribution agent enables you to automatically install sets of applications on groups of devices. Use this agent to manage groups of devices that have common software needs.

The LANDesk software deployment portal runs on managed devices and shows available software for that managed device. To display available software, the software deployment portal needs to get policy information periodically from the core server. Policy updates happen when:

The Policy options page contains the following features:

About the LaunchPad page (under software distribution)

Use this page to configure what LaunchPad customization end users can do. The LaunchPad organizes links to deployed software on managed devices. Deployed software can be local, hosted, or just-in-time installed applications. The LaunchPad page contains the following features:

About the Portal page (under software distribution)

The Portal page lists all software distribution package tasks that have been distributed using a policy-based delivery method. Use this page to customize the Portal window's appearance.

A policy-based delivery method behaves differently from a push in that it requires the managed device to initiate the request for the policies. This means the package isn't pushed to the device from the core server, but its details are stored in the database on the core server until the managed device queries the core server for any policy-based software distribution tasks assigned to it. When the portal is opened it automatically launches the policy sync tool to update its list with any new tasks that have been assigned to the managed device.

The Portal page contains the Optional columns and Display columns and order for Application fields. These fields are used to lay out the options for customizing additional information about all packages in the LANDesk Desktop Manager Software Deployment Portal window on the managed device. The Software Deployment Portal window contains the Available and History tabs that are set up in the Agent configuration Portal page. The Optional columns field lets you arrange the Application and History columns that appear on the tabs and group the information in a logical way.

The Portal page contains the following features:

Deploying remote control

When deploying remote control, you need to consider which security model you want to use. You have these choices:

About Integrated security

Integrated security is the new default security model. Here's an outline of the integrated security remote control communication flow:

  1. The remote control viewer connects to the managed device's remote control agent, but the agent replies that integrated security authentication is required.
  2. The viewer requests remote control rights from the core server.
  3. The core server calculates remote control rights based on the viewer's scope, role-based administration rights, and Active Directory rights. The core server then creates a secure signed document and passes it back to the viewer.
  4. The viewer sends this document to the remote control agent on the managed device, which verifies the signed document. If everything is correct, the agent allows remote control to begin.

NOTE: Warning: Integrated security requires the core server
With integrated security remote control, if the core server isn't available, consoles won't be able to remote control devices. Integrated security remote control requires the core server to work.

Using Windows NT security/local template with Windows XP devices

For Windows NT security/local template authentication to work with Windows XP devices, you must configure devices so that the Windows XP sharing and security model for local accounts is classic (local users authenticate as themselves). If you don't do this, the default guest-only authentication won't work with remote control's Windows NT security.

To set the Windows XP security model to classic
  1. On the Windows XP device, click Start > Control Panel.
  2. In the Administrative Tools, Local Security Policy applet, click Security Options > Network access: Sharing and security model for local accounts, and set it to Classic - local users authenticate as themselves.

About the Remote control page

The Agent configuration dialog box's Remote control page contains the following features:

Adding users to the Remote control operators group and the View only group

If you select Windows NT security/local template as your security model, the Remote control operators group and View only group boxes list the users for the console or for the selected Windows NT domain. The users you select here will have remote control access to the devices that receive the settings defined in this configuration settings file. View only group users can only view remote devices. They can't take over the mouse or keyboard.

When adding users to one of the remote control groups, the console uses the logged-on user's Windows credentials, not the LANDesk console user's credentials, to list the users in a domain. If the List users from box isn't showing the domain you want, log in to Windows as a user with rights on that domain.

To choose from an existing server or domain
  1. In the Remote control page, click Windows NT security/local template and click the Add button.
  2. In the List names from box, select either the core server name or a Windows NT domain name containing user accounts.
  3. In the user list, select one or more users and click Insert to add them to the Inserted names list.
  4. Click OK to add the selected names to the Remote Control Operators group on each device that receives these configuration settings.
  5. If you want any of these users to be in the View only group, select them and move them over. Users can only be in one group.
To manually enter names

You can enter names manually by clicking in the Inserted names list and using any of the following formats to enter names. Use semicolons to separate names.

If you don't specify a domain or device name, it is assumed that the user or group specified belongs to the local device.

Click OK to add the names to the Remote Control Operators user group on the target device.

About the Permissions page (under Remote control)

The Remote control section's Permissions page contains the following features:

About the Indicators page (under Remote control)

The Remote control section's Indicators page contains the following features:

Deploying Security services

The security scanner (patch and compliance scanner) is installed by default with the standard LANDesk agent. However, you need to use the options on the specific Security and patch scan page when creating device agent configurations in order to configure certain aspects of how and when the security scanner runs on managed devices. You can also enable and configure custom variable override settings, frequent security scans, real-time spyware, and application blocking.

The security scanner allows you to scan managed devices for known OS and application vulnerabilities and other security risks, such as spyware, viruses, unauthorized applications, software and driver updates, system configuration security threats, custom security definitions, and more. The content of your security scan depends on your Security Suite content subscription and which security type definitions you've downloaded. You can also remediate detected problems via autofix, repair tasks, and repair policies. For details on these procedures, see Patch and Compliance.

Information about the following security-related pages can be found below. Click a link to go to that section.

About the Patch and Compliance Scan page

Use this page to configure how the security scanner (i.e., patch and compliance scanner) is launched and how it behaves on managed devices with this agent configuration. (NOTE: You can also run security scans as scheduled tasks and policies from the console, or manually at a managed device.)

This page contains the following options:

About the Custom Variables page

Use this page to assign a custom variable override setting to devices with this agent configuration.

The security scanner can utilize custom variables (editable values included in certain security types' definitions) to scan for and modify specific settings, and to implement standard system configuration settings to managed devices. You can change the value of a setting and select whether to override the current value with the new value, and then use this agent configuration to apply the configuration to target devices. In some situations you may want to ignore a custom variable setting, or in other words create an exception to the rule. Custom variable override settings let you decide which custom variables to essentially ignore when scanning devices so that they are not detected as vulnerable and are not remediated even if they meet the actual conditions of a definition's detection rules.

A custom variable override setting is not required with an agent configuration.

You can select an existing setting from the Custom variable settings list, click Configure to create a new setting, or leave the field blank.

This page contains the following options:

About the Frequent Security Scan page

Use this page to enable and configure a recurring security scan for a specific collection of high-risk vulnerabilities or other security definitions on devices with this agent configuration. A frequent security scan is useful if you need to regularly scan devices for particularly aggressive and harmful security attacks.

NOTE: Group scans only
Frequent security scans are based on the security definitions contained in a group you've selected from predefined security content groups.

This page contains the following options:

About the LANDesk Antivirus page

Use this page to select an antivirus setting that applies to devices with this agent configuration, and to select whether to remove any existing antivirus products from those devices when they are configured.

In order to select an antivirus setting, you must first select the LANDesk Antivirus agent's check box on the Start page.

Antivirus settings let you control how the antivirus scanner operates on target devices. You can define antivirus scan parameters such as files and folders to be scanned or excluded, manual scans, real-time scans, scheduled scans, quarantine and backup options, virus pattern file update options, and the information and interactive options that display on end user devices during the antivirus scan.

NOTE: Deploying LANDesk Antivirus to devices that already have an antivirus product installed
If another antivirus product is installed on target devices, you can have it removed automatically during agent configuration by selecting the Remove existing antivirus product option. If you choose not to remove the other antivirus product during agent configuration, LANDesk Antivirus is disabled until you manually remove the other product. However, you can still deploy the service to target devices.

For a current list of antivirus products that can be removed from devices, see List of third-party antivirus products that can be automatically removed.

This page contains the following options:

About the Spyware page

Use this page to enable real-time spyware detection and notification on devices with this agent configuration.

Real-time spyware detection checks only for spyware definitions that reside in the Scan group, and that have autofix turned on. You can either manually enable the autofix option for downloaded spyware definitions, or configure spyware definition updates so that the autofix option is automatically enabled when they are downloaded.

Real-time spyware detection monitors devices for new launched processes that attempt to modify the local registry. If spyware is detected, the security scanner on the device prompts the end user to remove the spyware.

This page contains the following options:

About the Application Blocker page

Use this page to enable real-time unauthorized application blocking and notification. Real-time application blocker checks only for applications that reside in the Scan group.

With real-time application blocking, remediation isn't a separate task. Application blocking takes place as part of the security scan itself, by editing the registry on the local hard drive to disable user access to those unauthorized applications. Security services uses the softmon.exe feature to deny access to specified application executables even if the executable file name has been modified, because softmon.exe reads the file header information.

This page contains the following options:

About the Windows Firewall page

Use this page to enable and configure the Windows firewall on managed devices with this agent configuration. You can enable/disable the firewall, as well as configure firewall settings including exceptions, inbound rules, and outbound rules (for services, ports, and programs).

You can use this feature to deploy a configuration for the Windows firewall on the following Windows versions:

This page contains the following options:

About the Endpoint Security page

Use this page to select an Endpoint Security setting for managed devices with this agent configuration. Endpoint Security includes three components: HIPS, Firewall, and Device Control.

In order to select an Endpoint Security setting, you must first select the Endpoint Security agent check box on the Start page.

This page contains the following options:

About the Agent Watcher page

Use this page to enable and configure the LANDesk Agent Watcher utility on devices with this agent configuration.

Agent Watcher allows you to actively monitor devices for selected LANDesk agent services and files. Agent watcher restarts agent services that have been stopped and resets the startup types for services that have been set to automatic. The utility also removes monitored agent files from lists of files to be deleted on reboot, in order to prevent deletion. Additionally, Agent Watcher alerts you when agent services can't be restarted, when agent files have been deleted, and when agent files are scheduled to be deleted on reboot.

This page contains the following options:

About the LANDesk 802.1x Support page

Use this page to enable the LANDesk 802.1x NAC solution. You can use 802.1x to enforce your compliance security policy on managed devices that support 802.1x, by running compliance security scans, granting or blocking access depending on device health status (compliance), putting unhealthy (non-compliant) devices in quarantine, and performing remediation.

NOTE: Enabling and configuring 802.1x NAC with an agent configuration
In order to enable 802.1x NAC and configure the options on this page, you must first select the Enable 802.1x Radius Server option on the 802.1x Configuration dialog box in the Network Access Control tool (Tools > Security > Network Access Control > Configure 802.1x > Radius Server). After you select that option, you can use this page to configure 802.1x with an agent configuration.

This page contains the following options:

Deploying Extended device discovery

About the Extended device discovery page

Use this page to enable and configure extended device discovery on managed devices with this agent configuration.

Extended device discovery is an extension of the Unmanaged device discovery tool. It finds devices on your network that haven't submitted an inventory scan to the core database. With extended device discovery, you can use one or both of the following discovery methods: ARP (address resolution protocol) discovery, and WAP (wireless access point) discovery.

With ARP discovery, the extended device discovery agent listens for network ARP broadcasts. The agent then checks any ARP-discovered devices to see whether they have the standard LANDesk agent installed. If the LANDesk agent doesn't respond, the ARP-discovered device displays in the Computers list. Extended device discovery is ideal in situations involving firewalls that prevent devices from responding to the normal ping-based UDD discovery methods.

Keep in mind that you don't have to deploy the extended device discovery agent to every managed device on your network, though you can if you want to. Deploying this agent to several devices on each subnet should give enough coverage.

This page contains the following options:

Deploying power management

About the Power Management page

Use the Power Management page to select the power policy to be distributed out to the client device. LANDesk Power Management functionality allows administrators to centrally control end-node power consumption by facilitating the creation, financial evaluation, and deployment of power management policies. While administrators centrally control the conditions under which computers and monitors stand by, hibernate, or power down, users can forestall specific Power Management actions on the client side if needed. In addition, a “soft” shutdown option protects unsaved user data. A pre-populated database of OEM wattage consumption values is matched to actual hardware inventory data, and available custom wattage settings allow high levels of precision in the estimation of financial and power savings.

The Power Management window contains the following features:

Deploying Desktop Manager

About the Desktop Manager page

Desktop Manager enhances the end-user experience by providing a consolidated desktop client UI that includes access to both the Software Deployment Portal and the LaunchPad console from a single shortcut off the Start menu.

Use the Desktop manager pages to configure how Desktop Manager looks.

The Desktop manager page contains the following features:

About the Customization page (under Desktop manager)

Use the Customization page to configure shortcut location selections for Desktop Manager and start up and shut down preferences.

The Customization page contains the following features:

About the Branding page (under Desktop manager)

Use the Branding page to customize the content and appearance of Desktop Manager.

The Branding page contains the following features:

Using the Client Setup Utility

About the Client Setup Utility dialog box

The Agent configuration utility dialog box displays the status of a scheduled device configuration task as the task is processed. This dialog box is for information only; the devices to be configured were selected when the task was scheduled.

The Agent configuration utility dialog box contains the following features:

Deploying to NetWare servers

You can install the inventory scanner to NetWare servers. The NetWare agent configuration utility will modify the AUTOEXEC.NCF file to load the scanner on startup. You must have the NetWare client loaded on the console you're installing the agent from and you must have write access to the NetWare server you want to install the agents on.

To install remote control and inventory on a NetWare server
  1. In the Management Suite console, click Configure > Deploy LDMS client to NetWare server.
  2. Enter the NetWare server name. Click Install, and then click OK. This installs the agents to the NetWare server.

About the Add a bare metal server dialog box

Use the Add a bare metal server dialog box to add devices to the queue so they can have provisioning tasks run on them. This is particularly helpful for the initial provisioning of new devices. Devices are added to the holding queue by using an identifier. A server identifier is a piece of information that can be used to uniquely identify a server. A server identifier may be a MAC address (most common), a vendor serial number, an IPMI GUID, or an Intel vPro GUID. In all cases, the identifier must be able to be queried by an agent running in the preboot environment on the target server.

You can add devices one at a time or many at a time. If you add many devices, you need to create a text file in CSV format with data for the devices. You'll import this file to add the devices to the queue.

To add a single device
  1. In the Network view, expand the Configuration group. Right-click Bare metal server and click Add devices.
  2. Click Add. Type a descriptive name in the Name text box. While the display name is optional, it is highly recommended. On a bare-metal device, the display name is the only differentiator in the Provisioning view.
  3. Select an identifier type from the Identifier type list (Mac address, serial number, IPMI GUID, or Intel vPro GUID), and enter the value in the Identifier text box. Click Add.
  4. Repeat steps 2-3 to add other devices. You can also add other identifiers for the device; just add another identifier with the same display name.
  5. Click OK.
To add multiple devices
  1. In the Network view, expand the Configuration group. Right-click Bare metal server and click Add devices.
  2. In the Identifier type list, select an identifier type that matches the data you will import.
  3. Type the location of a text file (CSV) which contains the identifier information in the text box (or click Browse to find the file), and click Import.

Each identifier should be separated by a comma in the CSV file. The import file format is identifier; display name.

Deploying to Linux and UNIX servers

You can use the console's agent configuration tool to deploy agents to supported Linux and UNIX operating systems. For more information on Linux agent deployment, see Configuring Linux and UNIX device agents.

About the Start page (under Linux agent configuration)

The Linux Agent configurationStart page has these options:

About the Standard LANDesk agent page (under Linux agent configuration)

The Linux Agent configuration's Standard LANDesk agent page has these options:

About the Inventory scanner page (Under Linux Agent configuration)

The Linux Agent configurationInventory scanner page has these options: