The ZENworks Server can deploy the ZENworks Agent to devices. This requires that you create a task, called a deployment task, for the ZENworks Server. The task identifies the target devices, the credentials required to perform an installation on the devices, the registration key to use (optional), the date and time to perform the installation, and other tasks you want performed on the devices either before or after the installation.
This form of deployment is only supported on Windows and Linux devices.
The steps for creating a deployment task vary slightly depending on whether or not the target devices are already listed as discovered devices in your Management Zone (see Section I, Device Discovery):
Before the ZENworks Server can deploy the ZENworks Agent to a device, make sure the following prerequisites are satisfied:
In addition to these requirements, ensure that the date and time are correct on both the ZENworks Server and on managed devices.
You need to enable the File and Printer Sharing for Microsoft Networks option to allow other computers on a network to access resources on your computer by using a Microsoft network.
Right-click My Network Places > Properties.
The Networks Connections window is displayed.
Right-click Local Area Connection > Properties.
The Local Area Connection Properties dialog box is displayed.
In the General tab, ensure that the File and Printer Sharing for Microsoft Networks option is selected.
Click OK.
For more information, see File and Printer Sharing for Microsoft Networks.
Right-click Network > Properties.
The Network and Sharing Center window is displayed.
In the left pane, click Manage network connections.
Right-click Local Area Connection > Properties.
The Local Area Connection Properties dialog box is displayed.
In the Networking tab, ensure that the File and Printer Sharing for Microsoft Networks option is selected.
Click OK.
Right-click Network > Properties.
The Network and Sharing Center window is displayed.
Right-click Local Area Connection > Properties.
The Local Area Connection Properties dialog box is displayed.
In the Networking tab, ensure that the File and Printer Sharing for Microsoft Networks option is selected.
Click OK.
Any target device that is using Windows Firewall needs to be configured to allow file and printer sharing through the firewall. This is done by enabling the File and Printer Sharing exception in the Windows Firewall configuration settings. You can access Windows Firewall through the Control Panel or through the Windows Security Center.
By default, the scope of the exception applies only to a local subnet. If the target device is in a different subnet than the Primary Server from which the deployment is run, you must add the IP address of the Primary Server to the Windows Firewall along with the local subnet.
From the desktop Start menu, click Settings > Control Panel.
Double-click Windows Firewall.
The Windows Firewall window is displayed.
Click the Exceptions tab.
In the Programs and Services list, select File and Printer Sharing, then click Edit.
The Edit a Service window is displayed.
Click Change Scope to include the IP address of the Primary Server and the local subnet.
Click OK.
From the desktop Start menu, click Settings > Control Panel.
Double-click Windows Firewall.
The Windows Firewall window is displayed.
In the left pane, click Allow a program or feature through Windows Firewall.
In the Allowed Programs and Features list, select File and Printer Sharing.
Click OK.
From the desktop Start menu, click Settings > Control Panel.
Double-click Windows Firewall.
The Windows Firewall window is displayed.
In the left pane, click Allow a program or feature through Windows Firewall.
In the Allowed Programs and Features list, select File and Printer Sharing.
Enable Windows Management Instrumentation (WMI).
Click OK.
You can allow WMI through Windows firewall.
At the command prompt, run the following command:
netsh firewall set service RemoteAdmin enable
For more information on WMI, see Connecting Through Windows Firewall.
The ZENworks Server needs classic file sharing access to the administrative share (displayed as Admin$) on target devices.
To know in detail about the ports that are opened when you enable Classic File sharing, see IP Discovery Technologies.
Windows XP uses simple file sharing by default. You need to disable simple file sharing to enable classic file sharing.
On the Windows XP device, right-click the My Computer icon, then click Open.
Click the Tools menu > Folder Options to display the Folder Options dialog box.
Click the View tab.
In the Advanced Settings list, deselect the Use simple file sharing option, then click OK to save the change.
Disabling this option changes the setting for the Network access: Sharing and security model for local accounts option in the Local Security Policy (Local Policies > Security Options) to Classic - local users authenticate as themselves. You can also use a Windows Group Policy to change the setting.
Open the Windows Registry and access the following:
HKLM/Software/Microsoft/Windows/CurrentVersion/Policies/System/LocalAccountTokenFilterPolicy
If the registry key does not exist, you need to create it.
Change its DWORD (32-bit) value to 1.
This allows remote users to log in and not be forced to be guest.
Close the registry to save the change.
Open the Services window and set the Remote Registry service to start automatically, then start it.
Click the desktop Start menu > Settings > Control Panel.
Double-click Network and Sharing Center.
Select Turn on File Sharing, then click Apply.
Open the Windows Registry and access the following:
HKLM/Software/Microsoft/Windows/CurrentVersion/Policies/System/LocalAccountTokenFilterPolicy
If the registry key does not exist, you need to create it.
Change its DWORD (32-bit) value to 1.
This allows remote users to log in and not be forced to be guest.
Close the registry to save the change.
Open the Services window and set the Remote Registry service to start automatically, then start it.
Click the desktop Start menu > Settings > Control Panel.
Double-click Network and Sharing Center.
In the left pane, click Change advanced sharing settings.
Select Turn on file and printer sharing, then click Save Changes.
Open the Windows Registry and access the following:
HKLM/Software/Microsoft/Windows/CurrentVersion/Policies/System/LocalAccountTokenFilterPolicy
If the registry key does not exist, you need to create it.
Change its DWORD (32-bit) value to 1.
This allows remote users to log in and not be forced to be guest.
Close the registry to save the change.
Open the Services window and set the Remote Registry service to start automatically, then start it.
Click the desktop Start menu > Settings > Control Panel.
Double-click Network and Internet > Network and Sharing Center.
In the left pane, click Change advanced sharing settings.
Select Turn on file and printer sharing, then click Save Changes.
Before the ZENworks Server can deploy the ZENworks Agent to a Linux device, make sure that SSH Port 22 is open. To open SSH port 22 use the following procedures to add SSH as an allowed service on the target device.
To add SSH as an allowed service on Red Hat Enterprise Linux (RHEL):
Edit vi/etc/sysconfig/iptables to append the following rule:
-A RH-Firewall-1-INPUT -m state –state NEW -m tcp -p tcp –dport 22 -j ACCEPT
Save the iptables file.
Restart the ip tables service by running either the service iptables restart command or the /etc/init.d/iptables restart command.
To add SSH as an allowed service on Red Hat Enterprise Linux (RHEL) 7.6 and later:
Add SSH port 22 by executing the following command:
firewall-cmd --permanent --zone=public --add-port=22/tcp
or
Add the service SSH to the firewall config by executing the following command:
firewall-cmd --permanent --zone=public --add-service=ssh
Restart the firewall service by running the following command:
systemctl restart firewalld.service
IMPORTANT:For Linux devices ensure that you copy the ZENworks11-gpg-pubkey.asc key on to the device and execute the import rpm --import ZENworks11-gpg-pubkey.asc command to avoid errors. The ZENworks11-gpg-pubkey.asc is key is available in the ZENworks 2020 iso.
To add SSH as an allowed service on SUSE Linux Enterprise Server (SLES) and SUSE Linux Enterprise Desktop (SLED) 11 and 12:
Edit the following file:
/etc/sysconfig/SuSEfirewall2
Add SSH to the list of ports under FW_SERVICES_<Firewall Zone>_TCP.
For example, for an external zone, add SSH under FW_SERVICES_EXT_TCP="ssh".
Run the following command:
/sbin/SuSEfirewall2.
To add SSH as an allowed service on SUSE Linux Enterprise Server (SLES) and SUSE Linux Enterprise Desktop (SLED) 15 and OpenSUSE 15:
Add the service SSH to firewall config by executing the following command:
/usr/bin/firewall-cmd --permanent --zone=public --add-service=ssh
Restart the firewall service by running:
systemctl restart firewalld.service
This section assumes that you have already performed a discovery task to add the target devices to your ZENworks database. If you have not, you can perform the discovery task before continuing (see Section I, Device Discovery) or you can perform the discovery as part of the deployment task (see Deploying to a Non-Discovered Device).
To deploy the ZENworks Agent to a discovered device:
In ZENworks Control Center, click the Deployment tab.
The Deployable Device panel lists all the devices (imported or discovered) to which you can deploy the ZENworks Agent.
In the Deployment Tasks panel, click New to launch the Deploy Device Wizard.
Complete the wizard by using information from the following table to fill in the fields.
Wizard Page |
Details |
---|---|
Enter Deployment Task page |
Specify a name for the task. The name cannot include any of the following invalid characters: / \ * ? : " ' < > | ` % ~ |
Select Devices page |
Allows you to identify the devices to which you want to deploy the ZENworks Agent. Click Add to display the Discovered Device Browser dialog box. You can deploy to the target devices by using one of the following options:
If you select IP Address and if the target device is not reachable by using the IP address, the deployment uses the DNS name. If you select DNS Name and if the target device is not reachable by using the DNS name, the deployment uses the IP address. If the deployment uses a proxy, the target device is only connected by using the option provided. |
Discovered Device Browser dialog box > Source > IP Address |
|
Discovered Device Browser dialog box > Source > Add New CSV File |
|
Discovered Device Browser dialog box > Source > existing user source |
|
Discovered Device Browser dialog box > Source > Add New LDAP Source |
|
Enter Credentials page > Save Credentials to DataStore field |
The Enter Credentials page lets you provide the usernames and passwords required to deploy the ZENworks Agent to the devices included in the task. Unless you save the credentials, they are stored only in memory. Saved credentials are encrypted in the database for increased security. Credentials that are not saved are cleared from memory when the ZENworks Server is restarted. If you are creating a scheduled deployment task, you should save the credentials to ensure that they are still available when the deployment is performed. |
Enter Credentials page > Credentials field |
To add a credential on Windows:
Depending on your environment, one credential might not provide access to all of the devices where you want to deploy the ZENworks Agent. In this case, you need to add as many credentials as necessary to cover the devices included in the task. The ZENworks Server uses the first credential that works. Specify only the root credential to deploy the ZENworks Agent on Linux. |
Select Schedule page |
The Select Schedule page lets you choose whether you want the task to run as soon as it is created (the Now option) or if you want to schedule the task to run at a future date and time. If you select Scheduled, choose one of the following schedules: No Schedule: Indicates that no schedule has been set. The task does not run until a schedule is set or it is manually launched. This is useful if you want to create the task and come back to it later to establish the schedule or run it manually. Date Specific: Specifies one or more dates on which to run the task. Recurring: Identifies specific days each week, month, or a fixed interval on which to run the task. See Section B.0, Schedules or click the Help button for more information about the schedules. |
Select Primary Server page > Primary Server field |
Select the ZENworks Server that you want to perform the deployment task. |
Select or Edit a Proxy Device page |
The Select or Edit a Proxy Device page lets you choose whether you want to use a proxy device to perform the deployment task. |
Select or Edit a Proxy Device page > Windows Proxy |
If you want to use a Windows Proxy instead of the Primary Server to perform the deployment tasks on Windows devices, click the Windows Proxy option and configure the settings in the Select Windows Proxy dialog box. A Windows Proxy is used to perform the following actions:
The connection between the ZENworks Server and the Windows Proxy is secured through SSL. For deployment, you need to add File and Printer Sharing as an exception in the Windows Firewall configuration settings. By default, the scope of the exception applies only to a local subnet. If the target device is in a different subnet than the Primary Server from which the deployment is run, you also need to add the IP address of the Primary Server as an exception. However, if you use a Windows Proxy in the same subnet as a target device, you do not need to change the scope of the Windows Firewall exception. Override Zone Windows Proxy Settings: Select this option if you want to override the Windows Proxy settings configured at the Management Zone and configure new settings for the task. Windows Proxy: Select a Windows managed device (server or workstation) to be used as a Windows Proxy for performing the deployment tasks instead of a ZENworks Server. The Windows Proxy must reside in the same network as the target devices. Windows Proxy Timeout: Specify the number of seconds you want the ZENworks Server to wait for a response from the Windows Proxy. |
Select or Edit a Proxy Device page > Linux Proxy |
If you want to use a Linux Proxy instead of the Primary Server to perform the deployment tasks on Linux devices, click the Linux Proxy option and configure the settings in the Select Linux Proxy dialog box. A Linux Proxy is used to perform the following actions:
The SSH discovery requires port 22 to be reachable in order to enable the Primary Server to connect to the target device. If the SSH port is blocked in the Network Firewall, you use a Linux managed device in the same subnet as the target device. Override Zone Linux Proxy Settings: Select this option if you want to override the Linux Proxy settings configured at the Management Zone and configure new settings for the task. Linux Proxy: Select a Linux managed device (server or workstation) to be used as a Linux Proxy for performing the deployment tasks instead of a ZENworks Server. The Linux Proxy must reside in the same network as the target devices. Linux Proxy Timeout: Specify the number of seconds you want the ZENworks Server to wait for a response from the Linux Proxy. |
Windows Options page > Reboot Option field |
After installation of the ZENworks Agent, a device must reboot to make the agent functional. Do the following:
NOTE:The Windows Options page is displayed only if you have provided Windows credentials on the Enter Credentials page. |
Windows Options page > Permission Prompt Options fields |
After deployment, you can use these options to postpone the agent installation on the target machine:
|
Windows Options page > Deployment Package field |
Depending upon the processor architecture of the managed device, select the deployment package to be used for installing ZENworks Agent on the device. If you are not sure about the device's processor architecture, choose the package with target architecture as All, which applies to 32-bit and 64-bit platforms. If the selected package has been deleted from the Primary Server, then the default deployment package is deployed. |
Windows Options page > Agent Installation Folder field |
Specify the directory on the managed device where you want to install ZENworks Agent. By default, the agent is installed to the directory specified in the %ZENWORKS_HOME% system environmental variable or to the %ProgramFiles%\novell\zenworks directory if the variable is not set on the managed device. Ensure that the installation path does not contain spaces. NOTE:If the directory you specify cannot be created, then the agent is installed in the default location. |
Linux Options page |
The Linux Options page lets you configure the installation options to make the ZENworks Agent functional after the installation of the agent on the Linux devices. Deployment Package: Depending upon the processor architecture of the managed device, select the deployment package to be used for installing ZENworks Agent on the device. If you are not sure about the device's processor architecture, choose the package with target architecture as All, which applies to 32-bit and 64-bit platforms. If the selected package has been deleted from the Primary Server, then the default deployment package is deployed. Installation Options: Configure the following options for deploying the ZENworks Agent:
NOTE:The Linux Options page is displayed only if you have provided Linux credentials on the Enter Credentials page. |
Add Registration Key page |
Select a registration key to use during the registration portion of the deployment process. A registration key provides information about the folders and groups to which a device is assigned during registration. Selecting a registration key is optional; if you do not select one, registration rules are used to determine the folder and group assignments. To deploy to servers or workstations, choose a server registration key or a workstation registration key respectively. For more information about registration keys and rules, see Section 10.0, Registering Devices. |
Pre/Post Deployment page |
Specify commands that you want to run before and after the agent is installed on a device. For example, you can execute operating system commands, run scripts, and launch executables. The commands are passed to the pre-agent as part of the deployment task package. The pre-agent executes the commands in the system space, so you must specify commands that do not require user interaction. For more information about predeployment and post-deployment commands, click the Help button. |
When you finish the wizard, the deployment task is added to the list in the Deployment Tasks panel. You can use the panel to manage current tasks and create new tasks for deploying the ZENworks Agent to devices. The panel includes the following information for each task:
Name: Displays the name given to the task. If Credentials Cleared is displayed below the task name, the credentials required to perform the task on the targeted devices have been cleared from the ZENworks Server memory and must be entered again. To avoid having credentials lost when they are cleared from memory, you must store them in the ZENworks database.
Schedule: Displays the dates on which the task is scheduled to run.
Status: Displays the following status information: Scheduled, Pending, Installing, Registering, Inactive, Finished, or Error. You can mouse over certain statuses to receive more information about the status.
If an error occurred, the error is also recorded for the target device in the Deployable Devices panel. You can click the target device in the Deployable Devices panel to receive more information about the error.
If a target device has not been added to your ZENworks database through a discovery task, you can select the device while you are creating the deployment task. The following sections explain how to create the deployment task depending on whether you want to identify the target device by its IP address/hostname, from a CSV file, or from an LDAP directory.
In ZENworks Control Center, click the Deployment tab.
In the Deployment Tasks panel, click New to launch the Deploy Device Wizard.
Complete the wizard by using information from the following table to fill in the fields.
Wizard Page |
Details |
---|---|
Enter Deployment Task page |
Specify a name for the task. The name cannot include any of the following invalid characters: / \ * ? : " ' < > | ` % ~ |
Select Devices page |
Allows you to identify the devices to which you want to deploy the ZENworks Agent. Click Add to display the Discovered Device Browser dialog box. You can deploy to the target devices by using one of the following options:
If you select IP Address and if the target device is not reachable by using the IP address, the deployment uses the DNS name. If you select DNS Name and if the target device is not reachable by using the DNS name, the deployment uses the IP address. If the deployment uses a proxy, the target device is only connected by using the option provided. |
Discovered Device Browser dialog box > Source > IP Address |
|
Discovered Device Browser dialog box > Source > Add New CSV File |
|
Discovered Device Browser dialog box > Source > existing user source |
|
Discovered Device Browser dialog box > Source > Add New LDAP Source |
|
Enter Credentials page > Save Credentials to DataStore field |
The Enter Credentials page lets you provide the usernames and passwords required to deploy the ZENworks Agent to the devices included in the task. Unless you save the credentials, they are stored only in memory. Saved credentials are encrypted in the database for increased security. Credentials that are not saved are cleared from memory when the ZENworks Server is restarted. If you are creating a scheduled deployment task, you should save the credentials to ensure that they are still available when the deployment is performed. |
Enter Credentials page > Credentials field |
To add a credential:
Depending on your environment, one credential might not provide access to all of the devices where you want to deploy the ZENworks Agent. In this case, you need to add as many credentials as necessary to cover the devices included in the task. The ZENworks Server uses the first credential that works. |
Select Schedule page |
The Select Schedule page lets you choose whether you want the task to run as soon as it is created (the Now option) or if you want to schedule the task to run at a future date and time. If you select Scheduled, choose one of the following schedules: No Schedule: Indicates that no schedule has been set. The task does not run until a schedule is set or it is manually launched. This is useful if you want to create the task and come back to it later to establish the schedule or run it manually. Date Specific: Specifies one or more dates on which to run the task. Recurring: Identifies specific days each week, month, or a fixed interval on which to run the task. See Section B.0, Schedules or click the Help button for more information about the schedules. |
Select Primary Server page > Primary Server field |
Select the ZENworks Server that you want to perform the deployment task. |
Select or Edit a Proxy Device page |
The Select or Edit a Proxy Device page lets you choose whether you want to use a proxy device to perform the deployment task. |
Select or Edit a Proxy Device page > Windows Proxy |
If you want to use a Windows Proxy instead of the Primary Server to perform the deployment tasks on Windows devices, click the Windows Proxy option and configure the settings in the Select Windows Proxy dialog box. A Windows Proxy is used to perform the following actions:
The connection between the ZENworks Server and Windows Proxy is secured through SSL. For deployment, you need to add File and Printer Sharing as an exception in the Windows Firewall configuration settings. By default, the scope of the exception applies only to a local subnet. If the target device is in a different subnet than the Primary Server from which the deployment is run, you also need to add the IP address of the Primary Server as an exception. However, if you use a Windows Proxy in the same subnet as a target device, you do not need to change the scope of the Windows Firewall exception. Override Zone Windows Proxy Settings: Select this option if you want to override the Windows Proxy settings configured at the Management Zone and configure new settings for the task. Windows Proxy: Select a Windows managed device (server or workstation) to be used as a Windows Proxy for performing the deployment tasks instead of a ZENworks Server. The Windows Proxy must reside in the same network as the target devices. Windows Proxy Timeout: Specify the number of seconds you want the ZENworks Server to wait for a response from the Windows Proxy. |
Select or Edit a Proxy Device page > Linux Proxy |
If you want to use a Linux Proxy instead of the Primary Server to perform the deployment tasks on Linux devices, click the Linux Proxy option and configure the settings in the Select Linux Proxy dialog box. A Linux Proxy is primarily used for Primary Servers if you want to deploy to Linux devices in a different subnet than the Primary Server. When a Primary Server receives a deployment task that includes devices in a different subnet, it offloads the deployment tasks to the Linux Proxy. A Linux Proxy is also used for performing deployment tasks on Linux devices in a network enabled for NAT. The SSH discovery requires port 22 to be reachable in order to enable the Primary Server to connect to the target device. If the SSH port is blocked in the Network Firewall, you use a Linux managed device in the same subnet as the target device. Override Zone Linux Proxy Settings: Select this option if you want to override the Linux Proxy settings configured at the Management Zone and configure new settings for the task. Linux Proxy: Select a Linux managed device (server or workstation) to be used as a Linux Proxy for performing the deployment tasks instead of a ZENworks Server. The Linux Proxy must reside in the same network as the target devices. Linux Proxy Timeout: Specify the number of seconds you want the ZENworks Server to wait for a response from the Linux Proxy. |
Windows Options page > Reboot Option field |
After installation of the ZENworks Agent, a device must reboot to make the agent functional. Do the following:
NOTE:The Windows Options page is displayed only if you have provided Windows credentials on the Enter Credentials page. |
Windows Options page > Permission Prompt Options fields |
After deployment, you can use these options to postpone the agent installation on the target machine:
|
Windows Options page > Deployment Package field |
Depending upon the processor architecture of the managed device, select the deployment package to be used for installing ZENworks Agent on the device. If you are not sure about the device's processor architecture, choose the package with target architecture as All, which applies to 32-bit and 64-bit platforms. If the selected package has been deleted from the Primary Server, then the default deployment package is deployed. |
Windows Options page > Agent Installation Folder field |
Specify the directory on the managed device where you want to install ZENworks Agent. By default, the agent is installed to the directory specified in the %ZENWORKS_HOME% system environmental variable or to the %ProgramFiles%\novell\zenworks directory if the variable is not set on the managed device. Ensure that the installation path does not contain spaces. NOTE:If the directory you specify cannot be created, then the agent is installed in the default location. |
Linux Options page |
The Linux Options page lets you configure the installation options to make the ZENworks Agent functional after the installation of the agent on the Linux devices. Deployment Package: Depending upon the processor architecture of the managed device, select the deployment package to be used for installing ZENworks Agent on the device. If you are not sure about the device's processor architecture, choose the package with target architecture as All, which applies to 32-bit and 64-bit platforms. If the selected package has been deleted from the Primary Server, then the default deployment package is deployed. Installation Options: Configure the following options for deploying the ZENworks Agent:
NOTE:The Linux Options page is displayed only if you have provided Linux credentials on the Enter Credentials page. |
Add Registration Key page |
Select a registration key to use during the registration portion of the deployment process. A registration key provides information about the folders and groups to which a device is assigned during registration. Selecting a registration key is optional; if you do not select one, registration rules are used to determine the folder and group assignments. To deploy to servers or workstations, choose a server registration key or a workstation registration key respectively. For more information about registration keys and rules, see Section 10.0, Registering Devices. |
Pre/Post Deployment page |
Specify commands that you want to run before and after the agent is installed on a device. For example, you can execute operating system commands, run scripts, and launch executables. The commands are passed to the pre-agent as part of the deployment task package. The pre-agent executes the commands in the system space, so you must specify commands that do not require user interaction. For more information about predeployment and post-deployment commands, click the Help button. |
When you finish the wizard, the deployment task is added to the list in the Deployment Tasks panel. You can use the panel to manage current tasks and create new tasks for deploying the ZENworks Agent to devices. The panel includes the following information for each task:
Name: Displays the name given to the task. If Credentials Cleared is displayed below the task name, the credentials required to perform the task on the targeted devices have been cleared from the ZENworks Server memory and must be entered again. To avoid having credentials lost when they are cleared from memory, you must store them in the ZENworks database.
Schedule: Displays the dates on which the task is scheduled to run.
Status: Displays the following status information: Scheduled, Pending, Installing, Registering, Inactive, Finished, or Error. You can mouse over certain statuses to receive more information about the status.
If an error occurred, the error is also recorded for the target device in the Deployable Devices panel. You can click the target device in the Deployable Devices panel to receive more information about the error.