Absolute Manage User Guide
Absolute Manage User Guide
www.absolute.com
October 29, 2011
Absolute Manage User Guide 6.0 - Documentation Release 1 This document, as well as the software described in it, is confidential and contains proprietary information protected by non-disclosure agreements. No part of this document may be reproduced in any form or disclosed to any party not bound by a non-disclosure agreement without the express written consent of Absolute Software Corporation. Absolute Software Corporation reserves the right to revise this document and to periodically make changes in the content hereof without obligation of such revisions or changes unless required to do so by prior agreement. Information contained herein is believed to be correct, but is provided solely for guidance in product application and not as a warranty of any kind. Absolute Software Corporation assumes no responsibility for use of this information, nor for any infringements of patents or other rights of third parties resulting from the use of this information. Absolute Software Corporation, Suite 1600, Four Bentall Centre, 1055 Dunsmuir Street PO Box 49211 Vancouver, British Columbia, Canada V7X 1K8. 2011 Absolute Software Corporation. All rights reserved. Computrace, Computrace Mobile and Absolute are registered trademarks of Absolute Software Corporation. All other trademarks are property of their respective owners. Computrace US Patents #5,715,174, #5,764,892, #5,802,280, #5,896,497 #6,244,758, #6,269,392, #6,300,863, and #6,507 , ,914. Canadian Patents #2,205,370 and #2,284,806. U.K Patents #EP793823, and #GB2338101. German Patent #695 125 34.6-08. Australian patent #699045. Japanese Patent #JP4067035.
ii
Contents
Part 1: Getting Started ........................................................................1
1 Introduction ..................................................................................................... 2
What does Absolute Manage do? ............................................................................................... 2 The Absolute Manage system..................................................................................................... 2
Elements of the Absolute Manage system........................................................................................... 3 How commands work........................................................................................................................... 3 How software distribution and license monitoring work ............................................................... 5 How managing mobile devices works ........................................................................................... 6 Absolute Manage users ........................................................................................................................ 8 Users ............................................................................................................................................. 8 Administrators................................................................................................................................ 8
2 Installation ..................................................................................................... 10
Overview ................................................................................................................................... 10 Before you install ....................................................................................................................... 10
System requirements ...................................................................................................................11 Choosing a computer for Absolute Manage Server......................................................................12
iii
iv
Creating a smart group ...............................................................................................................108 Creating smart groups, alternate technique................................................................................109 Editing groups .............................................................................................................................109 Deleting groups ..........................................................................................................................109 Saving group definitions..............................................................................................................109 Transferring groups ..................................................................................................................... 110 Exporting groups......................................................................................................................... 110 Sorting browser windows .................................................................................................................. 110 Sorting by a column .................................................................................................................... 110 Reversing the sort order ............................................................................................................. 111 Removing sorting........................................................................................................................ 111
vi
Making a configuration profile available for optional installation ........................................................145 Removing a configuration profile via a policy .....................................................................................146 Conflicting policy settings for configuration profiles ..........................................................................147
Configuring roaming on mobile devices .................................................................................. 149 Preparing iOS devices for software installation ....................................................................... 150
Preparing Absolute Apps....................................................................................................................150 Distributing AbsoluteApps .................................................................................................................152 Distributing AbsoluteApps to iOS 4.x devices ............................................................................152 Distributing AbsoluteApps to iOS 5 and later devices ................................................................153
Distributing App Store or Android Market apps to mobile users ............................................. 160
Recommending commercial apps......................................................................................................160 Making volume purchase codes available ..........................................................................................162 Deleting codes ............................................................................................................................163
vii
Overview ..................................................................................................................................191
Prerequisites ...............................................................................................................................191 Structure .....................................................................................................................................191 Setup...........................................................................................................................................192
viii
Part 3: Reference..............................................................................253
10 Absolute Manage Admin menu ................................................................. 254
About Absolute Manage Admin............................................................................................... 254 Preferences ............................................................................................................................. 254
General.............................................................................................................................................. 255 Deployment Center........................................................................................................................... 256 Remote Control................................................................................................................................. 258 Power Consumption.......................................................................................................................... 259
Switch Administrator and Server ............................................................................................. 260 Change Administrator Password ............................................................................................. 261 Services submenu ................................................................................................................... 261 Hide Absolute Manage Admin................................................................................................. 261 Hide Others ............................................................................................................................. 262 Show All................................................................................................................................... 262 Quit Absolute Manage Admin ................................................................................................. 262
Export ...................................................................................................................................... 266 Export Groups.......................................................................................................................... 267 Import Groups ......................................................................................................................... 267 Import Custom Field Data for Desktop Devices ...................................................................... 268 Import Custom Field Data for Mobile Devices ........................................................................ 270 Page Setup .............................................................................................................................. 270 Print ......................................................................................................................................... 270
Find.......................................................................................................................................... 272 Find Next ................................................................................................................................. 273 Find Previous ........................................................................................................................... 273 Use Selection for Find ............................................................................................................. 273 Jump to Selection ................................................................................................................... 273 Spelling submenu.................................................................................................................... 273 Spelling.....................................................................................................................................274 Check Spelling ..........................................................................................................................274 Check Spelling as You Type ......................................................................................................274 Special Characters....................................................................................................................274
Power Management Settings .................................................................................................. 288 Send Message ........................................................................................................................ 291 Change Operating State .......................................................................................................... 292 Wake Up.................................................................................................................................. 293 Terminate Process................................................................................................................... 293 Reinstall Mac OS X Computer................................................................................................. 294
Disk Image ........................................................................................................................................ 295 Message ........................................................................................................................................... 297
Change Services Operation State ........................................................................................... 299 Time Machine.......................................................................................................................... 300 Search Windows Registry ........................................................................................................301 Edit Windows Registry............................................................................................................ 302 Execute Script ......................................................................................................................... 303 Execute Macintosh File ........................................................................................................... 305
Executable ........................................................................................................................................ 306 Message ........................................................................................................................................... 308
Message ............................................................................................................................................310
Copy File/Folder ....................................................................................................................... 314 Create Alias ............................................................................................................................. 317 Create Folder ........................................................................................................................... 318 Delete File/Folder..................................................................................................................... 319 Find File ................................................................................................................................... 320 Move File/Folder ...................................................................................................................... 321 Open File ................................................................................................................................. 322
Executable ........................................................................................................................................ 322 Message ........................................................................................................................................... 323
Rename File/Folder.................................................................................................................. 323 View Text File........................................................................................................................... 324 Gather Process Information..................................................................................................... 325 Gather Inventory Information................................................................................................... 325 Gather Installed Software ........................................................................................................ 326 Gather Compliance Report ...................................................................................................... 327 Run Software Distribution Check............................................................................................. 329 Run License Monitoring Scan.................................................................................................. 329 Execute Command .................................................................................................................. 329 Command Options .................................................................................................................. 329 Execute Command Now.......................................................................................................... 330 Edit Command......................................................................................................................... 330 Reapply Command .................................................................................................................. 330 Show/Hide Target List ............................................................................................................. 331 Install Configuration Profile...................................................................................................... 331 Install Provisioning Profile........................................................................................................ 332 Install Application..................................................................................................................... 332 Issue Device Lock.................................................................................................................... 333 Issue Clear Passcode............................................................................................................... 333 Issue Remote Erase ................................................................................................................ 334 Set Roaming Options............................................................................................................... 334 Send Message to Device......................................................................................................... 335 Update Device Info .................................................................................................................. 335 Track Device............................................................................................................................. 335 Get Device Geolocation ........................................................................................................... 336 Reset Tracking Passphrase ...................................................................................................... 336
xi
Synchronize Server Settings.................................................................................................... 341 Save All Settings...................................................................................................................... 342 Restore All Settings................................................................................................................. 342 Create Placeholder Computer Records ................................................................................... 342 Change Server Registration..................................................................................................... 344
Mobile Devices........................................................................................................................ 355 Server Center .......................................................................................................................... 355 Agent Deployment Center ...................................................................................................... 356 Commands .............................................................................................................................. 356 Command Templates .............................................................................................................. 357
Toolbar buttons .......................................................................................................................... 357 Context menu ............................................................................................................................ 357
Status bar ................................................................................................................................ 364 Table columns.......................................................................................................................... 365 Drawer ..................................................................................................................................... 365 Sidebar..................................................................................................................................... 366
Categories.................................................................................................................................. 366 Smart groups ............................................................................................................................. 366 Details........................................................................................................................................ 366
Action menu ............................................................................................................................ 366 New Group .............................................................................................................................. 367 New Smart Group.................................................................................................................... 367 New Category.......................................................................................................................... 368 Rename Group......................................................................................................................... 368 Rename Category.................................................................................................................... 368 Edit Smart Group ..................................................................................................................... 368 Remove Group......................................................................................................................... 369 Remove Category .................................................................................................................... 369 Remove from Group ................................................................................................................ 369 Context menu .......................................................................................................................... 369 Copy......................................................................................................................................... 370 Copy <information item> .................................................................................................... 370 New Smart Group from <information item> ....................................................................... 370 Make Group from Selected Computers................................................................................... 370 Show Detail View .................................................................................................................... 371 Synchronize Records ............................................................................................................... 371 Enter Custom Field Data ......................................................................................................... 371 Remove from Server ............................................................................................................... 372 Remove Inventory Data ........................................................................................................... 372 Computer Tracking................................................................................................................... 372 Remove from Group ................................................................................................................ 373 Remote Control ....................................................................................................................... 373 View in Separate Window ........................................................................................................374 Open in Preview .......................................................................................................................374
Information panel..................................................................................................................... 378 Table columns.......................................................................................................................... 378 Sidebar..................................................................................................................................... 378 Action and context menus....................................................................................................... 379 Copy......................................................................................................................................... 379 Copy <information item> .................................................................................................... 379 Show Details for This Computer.............................................................................................. 380 Show Details for This Scoring Item ......................................................................................... 380 New Smart Report Summary Group ....................................................................................... 380 New Smart Report Item Summary Group ............................................................................... 381 New Smart Report Details Group ............................................................................................ 381 New Category.......................................................................................................................... 382 Rename Group......................................................................................................................... 382 Rename Category.................................................................................................................... 382 Edit Smart Group ..................................................................................................................... 383 Remove Smart Group .............................................................................................................. 383
Absolute Manage User Guide xiii
Action menu ............................................................................................................................ 391 Mobile Applications ................................................................................................................. 392 New In-house Application Package ......................................................................................... 393 New iOS App Store Application Package ................................................................................ 394
Application Info tab ........................................................................................................................... 394 Volume Purchase Codes tab ............................................................................................................. 395
New Android Market Application Package .............................................................................. 396 Duplicate Application Package................................................................................................. 397 New Smart Group: In-house Application Packages ................................................................. 397 New Smart Group: App Store Application Packages ............................................................... 397 New Smart Group: iOS Provisioning Profiles .......................................................................... 397 New Smart Group: Installed Applications................................................................................ 398 New Smart Group: Installed Application Statistics.................................................................. 398 New Smart Group: Mobile Devices by Installed Software ...................................................... 398 New Smart Group: Installed iOS Provisioning Profiles ............................................................ 398 New Smart Group: Installed iOS Provisioning Profiles Statistics ............................................ 398 New Smart Group: Mobile Devices by Installed iOS Provisioning Profiles.............................. 399 Configuration Profiles and Certificates .................................................................................... 399 New iOS Configuration Profile................................................................................................. 399 New Smart Group: iOS Configuration Profiles ........................................................................ 400 New Smart Group: Installed iOS Configuration Profiles ...........................................................401 New Smart Group: Installed iOS Configuration Profiles Statistics ...........................................401 New Smart Group: Mobile Devices by Installed iOS Configuration Profiles ............................401 New Smart Group: Installed Certificates..................................................................................401 New Smart Group: Installed Certificates Statistics ..................................................................401 New Smart Group: Mobile Devices by Installed Certificates .................................................. 402 Media ...................................................................................................................................... 402 New Media File ....................................................................................................................... 402 Duplicate Media File................................................................................................................ 403 New Smart Group: Media Files ............................................................................................... 404 Policies .................................................................................................................................... 404 New Policy............................................................................................................................... 404 New Smart Policy: Mobile Devices ......................................................................................... 404 New Smart Policy: Mobile Devices by Installed Applications.................................................. 404 New Smart Policy: Mobile Devices by Installed iOS Configuration Profiles ............................ 405 New Group: Mobile Devices ................................................................................................... 405
xiv
New Smart Group: Mobile Devices ......................................................................................... 405 New Smart Group: Command Queue ..................................................................................... 405 New Smart Group: Command History..................................................................................... 405 New Category.......................................................................................................................... 406 Rename Group......................................................................................................................... 406 Edit <item> ............................................................................................................................. 406 Remove <item>....................................................................................................................... 406 Table context menu ................................................................................................................. 406 Copy......................................................................................................................................... 408 Copy <information item> .................................................................................................... 408 New Smart Mobile Device Group from <information item> ............................................... 408 New Smart Policy from <information item>........................................................................ 408 New Smart Application Group from <information item> .................................................... 408 New Smart Configuration Profiles Group from <information item>.................................... 409 New Smart Provisioning Profiles Group from <information item> ...................................... 409 New Smart Media Files Group from <information item>.................................................... 409 New Command Queue Smart Group from <information item>.......................................... 410 New Command History Smart Group from <information item> ......................................... 410 New Policy with Selected Devices .......................................................................................... 411 Install Configuration Profile...................................................................................................... 411 Install Provisioning Profile........................................................................................................ 411 Install Application..................................................................................................................... 411 Issue Device Lock.................................................................................................................... 411 Issue Clear Passcode............................................................................................................... 411 Issue Remote Erase ................................................................................................................ 411 Set Roaming Options............................................................................................................... 411 Send Message to Device......................................................................................................... 411 Set Device Name..................................................................................................................... 412 Delete Application ................................................................................................................... 412 Delete Profile ........................................................................................................................... 412 Update Device Info .................................................................................................................. 413 Show Detail View .................................................................................................................... 413 Synchronize Records ............................................................................................................... 413 Enter Custom Field Data ......................................................................................................... 413 Import Custom Field Data ....................................................................................................... 413 Ignore Devices......................................................................................................................... 414 Reset All Ignored Devices ....................................................................................................... 414 Retry All Failed Profiles............................................................................................................ 414 Remove from Group ................................................................................................................ 414 Remove from Policy................................................................................................................. 414 Track Device............................................................................................................................. 415 Get Device Geolocation ........................................................................................................... 415 Reset Tracking Passphrase ...................................................................................................... 415 Show Location on Google Maps.............................................................................................. 415 Show Location on Bing Maps.................................................................................................. 415 Send Re-enrollment Message to Device ................................................................................. 415 Update Installed Application Statistics .................................................................................... 416 Show Mobile Application Package Details............................................................................... 416 New Mobile Application Package ............................................................................................ 416 New iOS App Store Application Package................................................................................. 416 New Android Market Application Package............................................................................... 417 Edit Mobile Application Package.............................................................................................. 417 Duplicate Mobile Application Package ..................................................................................... 417 Remove Mobile Application Package....................................................................................... 417 Show Configuration Profile Details .......................................................................................... 417
xv
New Configuration Profile ........................................................................................................417 Edit Configuration Profile..........................................................................................................417 Remove Configuration Profile.................................................................................................. 418 Remove Configuration Profile from Policy............................................................................... 418 Show Provisioning Profile Details............................................................................................ 418 Show Media File Details.......................................................................................................... 418 Set Availability Time ................................................................................................................ 418 New Media File ........................................................................................................................419 Edit Media File..........................................................................................................................419 Remove Media File...................................................................................................................419 Show Policy Members ............................................................................................................ 420 Remove Policy ......................................................................................................................... 420
Category bar............................................................................................................................ 427 Status bar ................................................................................................................................ 428 Table columns ......................................................................................................................... 428 Sidebar .................................................................................................................................... 428
Software Distribution ................................................................................................................. 428 License Monitoring .................................................................................................................... 431 Computer Groups ...................................................................................................................... 431 Administration............................................................................................................................ 432 Custom Information Fields......................................................................................................... 432 Server ........................................................................................................................................ 433
Action and context menus ...................................................................................................... 433 Software Distribution............................................................................................................... 434 New Software Package ........................................................................................................... 434
Package ............................................................................................................................................. 435 Installation Options ........................................................................................................................... 436 User Interaction ................................................................................................................................ 439 Installation Conditions....................................................................................................................... 441 Adobe CS Options............................................................................................................................. 442
xvi
Installation Options ........................................................................................................................... 445 User Interaction ................................................................................................................................ 448 Installation Conditions....................................................................................................................... 450
Duplicate Software Package .................................................................................................... 451 New Smart Software Package Group ...................................................................................... 451 New Payload ............................................................................................................................ 452 Duplicate Payload .................................................................................................................... 453 New Smart Payload Group....................................................................................................... 454 New Distribution Point............................................................................................................. 454 New Smart Distribution Points Group...................................................................................... 456 New Disk Image ...................................................................................................................... 457 New Smart Disk Image Group................................................................................................. 458 New Smart Installation Status Group ...................................................................................... 459 New Missing Software Packages Group ................................................................................. 459 License Monitoring.................................................................................................................. 460 New License Specification ...................................................................................................... 460
License.............................................................................................................................................. 461 Conditions .................................................................................................................................. 464 Purchase Tracking.............................................................................................................................. 464 Purchase .................................................................................................................................... 465 Vendor........................................................................................................................................ 465 Maintenance .............................................................................................................................. 465 Notes ......................................................................................................................................... 466
New Smart License Specification Group ................................................................................. 466 New License Status Report..................................................................................................... 466 New Software Usage Report................................................................................................... 467 New History Report ................................................................................................................. 467 New History Summary Report ................................................................................................ 468 New Missing Software Report ................................................................................................ 468 Computer Groups .................................................................................................................... 468 New Computer Group ............................................................................................................. 468 New Smart Computer Group................................................................................................... 469 Remove All Group Members ................................................................................................... 470 Administrator Setup................................................................................................................. 470 New Administrator................................................................................................................... 471 Remove Administrator from Group...........................................................................................474 New Administrator Group.........................................................................................................474 New Computer Appointment Group........................................................................................ 475 New Smart Computer Appointment Group ............................................................................. 475 New Mobile Devices Appointment Group............................................................................... 476 New Smart Mobile Devices Appointment Group .................................................................... 476 New Smart Administrator Group ............................................................................................. 477 Refresh .................................................................................................................................... 478 Custom Information Fields ...................................................................................................... 478 New Custom Information Field................................................................................................ 478 Duplicate Custom Information Field ........................................................................................ 483 Export Selected Fields............................................................................................................. 483 Import Fields............................................................................................................................ 483 Edit <item> ............................................................................................................................. 484 Remove <item>....................................................................................................................... 484 Retrieve Payloads .................................................................................................................... 484 Retry Package.......................................................................................................................... 485 Reset Package ......................................................................................................................... 485 Install Selected Software Packages ......................................................................................... 485 Repeat Selected Installations .................................................................................................. 486 Reset Current Server Load ...................................................................................................... 486
xvii
Table columns ..........................................................................................................................501 Sidebar .....................................................................................................................................501 Action menus ...........................................................................................................................501 New Custom Zone .................................................................................................................. 502
Zone .................................................................................................................................................. 502 Auto Deployment .............................................................................................................................. 503 Server Properties dialog.................................................................................................................... 505
Edit Custom Zone.................................................................................................................... 505 Remove Custom Zone............................................................................................................. 505 Search Zone............................................................................................................................. 506 Cancel Search.......................................................................................................................... 506 Refresh.................................................................................................................................... 506 New Smart Group ................................................................................................................... 506 Edit Smart Group..................................................................................................................... 507 Remove Smart Group.............................................................................................................. 507 Import Zones File .................................................................................................................... 508 Context menu.......................................................................................................................... 508 Copy ........................................................................................................................................ 509 Copy <information item> .................................................................................................... 509 New Smart Group from <information item>....................................................................... 509 Install Agent ............................................................................................................................ 509 Remove Agent..........................................................................................................................511 Set Inventory Server ................................................................................................................512
Inventory Server Properties dialog.....................................................................................................514
Refresh Status..........................................................................................................................514
Table columns ......................................................................................................................... 518 Sidebar .....................................................................................................................................519 Action and context menus .......................................................................................................519
xviii
Copy......................................................................................................................................... 520 Copy <information item> .................................................................................................... 520 New Smart Command Queue Group from <information item>.......................................... 520 New Smart Command History Group from <information item> ......................................... 520 New Smart Command Queue Group ...................................................................................... 521 New Smart Command History Group...................................................................................... 521 Edit Smart Group ..................................................................................................................... 522 Remove Smart Group .............................................................................................................. 522 Scheduling Options.................................................................................................................. 523 Execute Command Now.......................................................................................................... 523 Edit Command......................................................................................................................... 523 Reapply Command .................................................................................................................. 523 Remove Command.................................................................................................................. 523 Show Command Result........................................................................................................... 524
xix
Active Directory Users ............................................................................................................... 565 Software Distribution ........................................................................................................................ 565 Packages .................................................................................................................................... 566 Payloads..................................................................................................................................... 569 Distribution Points...................................................................................................................... 570 Disk Images ............................................................................................................................... 571 Installation Status ...................................................................................................................... 571 License Monitoring ........................................................................................................................... 572 License Specification ................................................................................................................. 572 Purchase Tracking....................................................................................................................... 573 License Status ............................................................................................................................ 574 License History ...........................................................................................................................574 License History Summary ..........................................................................................................574 License Status per Agent........................................................................................................... 575 Computer Groups ............................................................................................................................. 575
Agent Deployment Center .......................................................................................................576 Installed Software Statistics.................................................................................................... 577 Missing OS Patches Statistics................................................................................................. 577 Compliance Reports ................................................................................................................ 578
Reports.............................................................................................................................................. 578 Computer Summary.......................................................................................................................... 579 Item Summary .................................................................................................................................. 579 Score Items....................................................................................................................................... 579
xx
More .......................................................................................................................................... 608 Profiles ....................................................................................................................................... 608 About ......................................................................................................................................... 608 AbsoluteApps for Android ................................................................................................................. 608 Applications ............................................................................................................................... 609 Updates ......................................................................................................................................610 Market.........................................................................................................................................610 Messages ...................................................................................................................................610 About ..........................................................................................................................................610
Index .................................................................................................614
xxi
Chapter 1
Introduction
Welcome to Absolute Manage, the comprehensive management solution for network administrators. The following text explains the scope and concepts of Absolute Manage and the different parts of the Absolute Manage system. If you want to get your feet wet right away, you can turn to Installation on page 10; however, starting with this section will make it easier for you to set up Absolute Manage in the way best suited to your requirements and to quickly employ it for maximum benefit. For an overview of Absolute Manage, see: What does Absolute Manage do? on page 2 The Absolute Manage system on page 2 Elements of the Absolute Manage system on page 3 How commands work on page 3 Absolute Manage users on page 8
And Absolute Manage does all this without you having to leave your desk at all.
Introduction
There are several components in the Absolute Manage system: An agent is installed on each managed device. Agents receive commands from Absolute Manage and carry them out on the local computer, sending back information when required. There is a minimal local interface to specify some information. A central server acts as the hub of the system: On instructions from you, it sends out commands to the agents, collects the information they send back, and stores it in its database. There is usually one server per managed network; multiple servers are possible. Servers have no user interface of their own; they are managed by the admin application. Absolute Manage effortlessly handles hierarchies of servers and specialized servers for, e.g., software distribution. An optional MDM server handles the management of mobile devices. It is tightly coupled to the main Absolute Manage Server and controlled from the same admin application. The admin application is your command center for the system. You use it both to control the server and via the server the agents, and to display the required information. The admin application can be installed on as many computers as desired.
Absolute Manage Agent Notication server of the mobile OS vendor AbsoluteApps LAN connection Internet connection (typically)
The basic principle of working with Absolute Manage is the same for all commands (except for a software distribution and license monitoring,
which are described separately in Installing software on page 190 and Monitoring licenses on page 237, respectively.)
Absolute Manage Agent Notication server of the mobile OS vendor AbsoluteApps LAN connection Internet connection (typically)
2 1
When you issue a command to the Absolute Manage system, the command is transmitted from your admin application to the server (1). The server checks whether it needs additional information from the agents to complete the command or whether the command involves any agent actions. If neither is the case, the server does not contact the agents.
Introduction
If, however, the agents need to be involved, the server sends them the appropriate commands (2). Commands may be sent to one, some, or all agents, depending on the command specification from the admin.
Absolute Manage Agent Notication server of the mobile OS vendor AbsoluteApps LAN connection Internet connection (typically)
3 4
The contacted agents perform the appropriate tasks on their computers or collect requested information. They send back the results to the server (3) either information on the client computer or at least feedback that the set task has been completed. Any information on the client computers returned by the agents is stored by the server in its database for future reference. If the original command (1) from the administrator requires the return of information, the server sends the requested information back to the admin (4), processing it first if required.
An explanation of the principles and details of software distribution and license monitoring is available in Installing software on page 190 and Monitoring licenses on page 237, respectively.
When an admin issues a command that involves mobile devices, it is first sent to Absolute Manage Server(1). If that server determines that the commands require contacting mobile devices, it sends a contact request to OS vendors notification server (2), which is regularly contacted by the mobile devices. When a device for which a request is pending next contacts the notification server (3), the contact request is
Introduction
forwarded to the Absolute Manage client (AbsoluteApps) running on the device (4).
Absolute Manage Agent Notication server of the mobile OS vendor
5 8 5
The mobile device contacts the MDM server (5), which forwards the contact notice to the Absolute Manage Server (6). The Absolute Manage Server sends the command required to execute the original admin request (1) to the MDM server (7), which forwards it to the mobile device (8).
Absolute Manage Agent Notication server of the mobile OS vendor AbsoluteApps
9 9
If the request requires a response by the device (e.g., returning device status information), the response is sent to the MDM server (9), which forwards it to Absolute Manage Server (10). When the data has arrived on that server, the admin can retrieve it (11).
Absolute Manage is used by two groups of people in very different ways: Normal users users of the administered devices have no or very little interaction with Absolute Manage. Administrators are the persons who actively use the system to manage remote devices.
Users
Absolute Manage is transparent for users of administered devices. Neither is Absolute Manage activity noticeable for them except sometimes by its effects, such as new software being available on the device nor is their active cooperation required for any of Absolute Manages actions. There are some exceptions to this: At the discretion of the administrator, users can be notified of some pending actions, such as restarts, that may affect their work. Furthermore, the administrator may give users the option to cancel these actions. Users may be given the option to view or edit certain bits of information (so-called client information) locally. Apps and media can be made available to users of managed mobile devices to be installed or viewed at their leisure. (Apps can also be installed without requiring any user action.)
Administrators
Administrators use the Absolute Manage Admin application to manage client devices via the Absolute Manage system. Administrator access requires a password-protected account on the Absolute Manage Server. This ensures both that Absolute Manage cannot be used by unauthorized persons and that an administrator has the same use of Absolute Manage no matter from where he or she accesses the system. As a general rule, administrators do not have access to all client devices they can manage only devices to which they have expressly been assigned in the Absolute Manage system. (It is possible to configure individual administrator accounts so that they have access to all devices.) There are two types of administrators: Standard administrators can perform any action that Absolute Manage permits on the client devices to which they have been
Introduction
assigned. Optionally, their access to the assigned devices can be restricted to a specific list of functions. Superadministrators have access to all the same functions as standard administrators. In addition, they can create, configure, and delete administrator accounts and assign administrators to computers.
Details of managing administrator accounts are described in Administrator accounts on page 45.
Chapter 2
Installation
This chapter describes installing, updating, and uninstalling the components of the Absolute Manage system. For information on updating from earlier versions, see Updating Absolute Manage on page 38.
Overview
Absolute Manage should always be installed in the same order: 1. Server: First the Absolute Manage Server is installed; it is the central element of the Absolute Manage system without which it does not work.
2. Admin: Next, Absolute Manage Admin is installed on at least one administrator workstation. As soon as it is installed, it is used to perform the initial configuration of the server, including entering the authorization code. 3. Agents: Finally, the Absolute Manage Agents are installed. In many cases, this installation can be performed automatically using the Absolute Manage system. The installation procedures for all components are described below in this order.
2. Decide on a suitable server computer. Some relevant issues are discussed in Choosing a computer for Absolute Manage Server , below the system requirements. 3. Decide whether to use the provided Absolute Manage Agent installer or create a custom installer with preconfigured preferences. 4. Decide whether to use Absolute Manages Agent Deployment Center to install Absolute Manage Agent centrally on the administered computers. There must be suitable user accounts for remote installations: Mac OS X clients: SSH must be enabled and there must be an account for which you know the password.
10
Installation
Windows clients: There must be an administrator account for which you know the password.
Note: Installation becomes even easier if the same account name and password can be used on all computers running the same operating system.
System requirements
System requirements for desktop software components: Component Absolute Manage Server Mac OS X Mac OS X 10.5.0 or newer Windows Windows XP SP 2 or newer (Windows XP SP 2, Vista, 7 , Server 2003, or Server 2008)
An Absolute Manage PXE server or a FOG server in your network. FOG is open-source software running on Linux. The Absolute Manage PXE server has the same requirements as Absolute Manage Server. For the FOG server requirements, see www.fogproject.org. On the computer on which Absolute Manage Server is running, an ODBC driver capable of connecting to the FOG MySQL server must be installed. Any Windows system on which Absolute Manage Server is installed must include .NET 3.5.
A computer that can be reached from the Internet by HTTP and HTTPS connections. (This can be a computer on which Absolute Manage Server is running or a separate computer.) An SSL certificate for the computer on which you will be installing the MDM server. The certificate cannot be selfsigned. (See step 2 of Preparation on page 23 for details.) Mac OS X 10.5.0 or newer. Property List Editor utility. (This utility is part of the Mac OS X developer software.) Windows Server 2003 or 2008 Microsoft Internet Information Services (IIS) 6.0 or newer. The WebDAV Publishing role must not be installed. ASP .NET 2.0 .NET 3.5
MDM for iOS devices (in addition to the general MDM requirements above)
Membership in Apples iPhone Developer Enterprise Program Apples iPhone Configuration Utility. This utility is available (for Windows and Mac OS X) from Apples support web page.
11
Mac OS X Mac OS X 10.5.0 or newer Mac with an Intel processor Screen with a resolution of at least 1024 by 768 pixels For distributing Android apps, a Java runtime (JRE) is required.
Windows Windows XP SP 2 or newer (Windows XP SP 2, Vista, 7 , Server 2003, or Server 2008) Screen with a resolution of at least 1024 by 768 pixels For distributing Android apps, a Java runtime (JRE) is required. (not available)
InstallEase
Mac OS X 10.4 or newer Xcode 3.2.5 or newer (only for PKG support) Iceberg 1.2.2 or newer (only for Iceberg project support)
Mac OS X 10.3.9 or newer (Agent 4.0.4 for Mac OS X 10.2 or newer and Agent 4.5.1 for Mac OS X 10.3 or newer; with reduced functionality)
System requirements for mobile components: Component AbsoluteApps AbsoluteFind AbsoluteSafe iOS iOS 4.0 or newer iOS 4.0 or newer iOS 4.0 or newer Android Android 2.2 or newer (not available) (not available)
All Absolute Manage components also require a working IP network connection. The built-in firewalls of Mac OS X and Windows are fully supported. Windows and Mac OS X components can be freely mixed between the platforms; e.g., an admin running on Windows can control a server running on Mac OS X to work with agents running on Windows.
12
Installation
Network bandwidth: When Absolute Manage is used to administer a large number of computers, there may be substantial network traffic from and to the server at peak times. In such cases, it is helpful to have as much bandwidth as possible, e.g., by providing a high-bandwidth link to the switch. Processor power and disk space: Absolute Manage Server has no special requirements regarding processor power or disk space. Any modern computer should more than suffice. Note, though, that database operations require processor power in proportion to the number of administered computers. Also, the more administrators are active at the same time, the more processor power is required. Other server processes: Other server processes running on the same computer as Absolute Manage Server are not normally a problem. However, if they put a strain on resources in particular processor power and network bandwidth they may impair the performance of Absolute Manage.
2. Open the installation package and follow the on-screen instructions. There is no need to restart the server computer after the installation.
2. Open the folder and double-click the Setup application 3. Follow the on-screen instructions.
13
Installation
2. Open the folder and double-click the Setup application 3. Follow the on-screen instructions.
2. Enter the server address you can enter the IP number or a DNS name if the server computer has one. The port number should not normally be changed; however, if you have configured the server to use a different port number, enter that number. Do not enter a name or password. 3. Click Login. You are asked to verify the server identity. For security reasons, Absolute Manage uses SSL certificates to identify all components. When you contact a server for the first time, Absolute Manage Admin asks you to verify that the certificate that it presents indeed belongs to the server you want to contact (instead of, e.g., a malicious server used for a man-in-the-middle attack). 4. Display the server certificate as described in Displaying a servers certificate on page 17. 5. If the fingerprint of the certificate and the unique server identifier match the information in the Absolute Manage Admins verification dialog, click Connect. The Absolute Manage Setup wizard opens.
15
6. Start with entering your and your companys names as well as the serial number and activation key that you have received with your copy of Absolute Manage. Note: You can run Absolute Manage as a demo by clicking the demo button. In this case, you are limited to ten clients and the software will stop working after 45 days. 7 . Specify the ports that the server is to use for communicating with agents and with Absolute Manage Admin. You can use the same ports for both agents and Absolute Manage Admin. Different ports are recommended when you place an Absolute Manage Server in a demilitarized zone for access from the Internet, as explained in Setting up computer tracking on page 123 Absolute Manage Server opens the specified ports in the built-in Mac OS X or Windows firewall on its computer if the firewall is active. Note: We recommend that you change the ports only when you have a specific need to do so. 8. If you do not want to create administrator accounts on this server but instead want to use existing accounts on another Absolute Manage Server, check Use administrator accounts from server and specify the desired server. Note: If you use accounts from another server, you will not be prompted to create an initial account as described below. Click the Set button to open the SSL certificate for the specified server. (See Exporting a server certificate on page 18 for information on creating a certificate file.) 9. Create an initial superadministrator account for yourself. Note: Details of creating accounts are described in Administrator accounts on page 45. When you finish the wizard, it sets up the server as specified and launches Absolute Manage Admin, opening an empty browser window. Both Absolute Manage Server and Absolute Manage Admin are now installed. Continue the installation process: If you want Absolute Manage to be able to remotely reinstall Windows computers, continue with Installing support for reinstalling Windows computers below. , If support for reinstalling Windows clients is not required but you want to use Absolute Manage to administer mobile devices, continue with Installing MDM support below. ,
16
Installation
If neither of these capabilities is required, continue with installing Absolute Manage Agent on all computers that are to be administered, as described in Installing Absolute Manage Agent on page 27.
To ensure that it communicates only with the intended server, Absolute Manage Admin uses SSL certificates. When it contacts a server for the first time or when the servers certificate has changed (for example, after the server was reinstalled), you must verify that the presented certificate does indeed belong to the server it claims to identify. To verify a certificate, you compare the fingerprint and server unique identifier that Absolute Manage displays with the corresponding values you obtain from the server: 1. The procedure normally begins with Absolute Manage displaying a verification dialog. Leave the dialog open on the admin workstation. 2. Go to the server computer. While it is possible to obtain the server certificate information remotely, doing so is less secure than physically accessing the server computer. 3. Depending on the platform, execute a command line instruction: On a Mac OS X server, launch the Terminal application and enter this command (on a single line): "/Library/Application Support/LANrev Server/LANrev Server.app/Contents/MacOS/LANrev Server" --ShowCertificateFingerprint On a Windows server, launch the Command Prompt application and enter this command (on a single line): "C:\Program Files\Pole Position Software\LANrevServer\ LANrev Server.exe" --ShowCertificateFingerprint (On x64 systems, use C:\Program Files (x86)\ instead.)
Note: If you use --ShowCertificate instead of --ShowCertificateFingerprint, additional information is displayed, including the servers unique identifier. However, this is usually not needed, as the identifier is also part of the certificate and thus covered by the fingerprint verification. The certificate fingerprint is displayed. 4. Copy or write down the fingerprint and return to the admin workstation.
17
5. Compare the fingerprint you obtained from the server with the fingerprint displayed by Absolute Manage Admin: If the two fingerprints do not match, the server to which Absolute Manage Admin is about to connect is not the server from which you obtained the fingerprint. Make sure that the server address Absolute Manage Admin uses is correct. If the address is correct, there may be an attempt to compromise your Absolute Manage installation by having another server masquerade as your server. Do not continue the connection! Doing so could severely compromise the security of your network. If the two fingerprints match, click the Connect button in the verification dialog.
For security reasons, the individual components of Absolute Manage (servers, administrator applications, and agents) require SSL certificates to verify the identities of other components with which they communicate. This means that you must specify a certificate for any server that you assign to an agent (e.g., as an inventory server). You can do so either by exporting a certificate from Absolute Manage Admin or by copying the certificate file from the server computer. Both methods are described below.
18
Installation
Copy the certificate file from this location to the computer where it is needed.
To set up the Absolute support for reinstalling Windows computers: 1. Set up your Absolute Manage servers for software distribution, as described in Setting up distribution points on page 192.
2. Export the Absolute Manage Server certificate, as described in Exporting a server certificate on page 18. 3. Launch the PXE server installer. This installer is included on the Absolute Manage disk in the Absolute PC Imaging PXE Server . Note that the PXE server must not be installed on the computer that is used as the DHCP server.
19 Absolute Manage User Guide
4. Follow the instructions on screen until you reach the setup screen:
5. Specify this information: Disk image file: The AMWinPE.iso disk image provided by Absolute. You can download this image from the Resource Center. Note: This image is (in certain circumstances) required to boot a Windows computer that is about to be reinstalled and is not used as the source for the new installation on the computer. (You specify a different disk image in the Reinstall Windows Computer command dialog.) Do not modify the contents of this image. Absolute Manage Server address: The IP adress or fully qualified DNS name of the Absolute Manage Server in you network. Absolute Manage Server certificate file: The certificate file you have exported in step 2.
6. Click Next and continue to follow the on-screen instructions. 7 . Configure the DHCP server to allow network booting from the PXE server. (The following instructions apply to a Windows Server 2003 Enterprise Edition; adapt them as necessary for other servers.) Open the DHCP server console. Display the scope options. Right-click anywhere in the list of options and choose Configure Options from the context menu. Set option 066 Boot Server Host Name to the IP address of the PXE server you have installed in the previous steps. Set option 067 Bootfile Name to pxelinux.0 (without the quotes). Save the changed options and close the server console.
8. Make sure that the client Windows computers are not set to boot from the network.
20
Installation
Absolute Manage now supports remotely reinstalling Windows computers. Continue the installation process: If you want to use Absolute Manage to administer mobile devices, continue with Installing MDM support below. , Otherwise, continue with installing Absolute Manage Agent on all computers that are to be administered, as described in Installing Absolute Manage Agent on page 27.
To set up the FOG support for reinstalling Windows computers: 1. Install the FOG server and configure it. For details, see the FOG documentation. The FOG software and documentation is available from www.fogproject.org. In particular: Configure the FOG server to have a static IP address. Configure DHCP to use FOG.
2. Configure MySQL for network access. For details, see the FOG documentation and MySQL documentation for your platform, as required. 3. If you have installed Absolute Manage Server on a Windows computer, install .NET 3.5, if it is not already present. Skip this step when you have installed Absolute Manage Server on Mac OS X. Also, you do not need to upgrade any computers running Absolute Manage Admin (but not Server) to .NET 3.5. 4. Make sure that, on the Absolute Manage Server computer, an ODBC driver capable of accessing the MySQL database used by FOG is installed. If no such driver is present, install it.
21
2. Fill in the required information to access the MySQL database that FOG uses: Enter the name of the ODBC driver on the Absolute Manage Server computer that Absolute Manage is to use to access the MySQL database in FOG ODBC driver name. Enter the IP address or DNS name of the MySQL server in FOG MySQL database server address. Enter the name of the MySQL database that FOG uses in FOG MySQL database name. Enter your access credential for the MySQL database in FOG MySQL database username, in FOG MySQL database password, and FOG MySQL database password verification.
3. Fill in the required information to access the FOG server: In FOG server URL,enter the IP address or DNS name of the FOG server and the path of the FOG server management directory, e.g., http:// myfogserver.company.com/fog/management/ . Enter your access credential for the MySQL database in FOG username, in FOG password, and FOG password verification.
22
Installation
You have now configured Absolute Manage to allow reinstallation of administered Windows computers, as described in Reinstalling a Windows computer on page 230. If there are already disk images on the FOG server, you can verify the correctness of the setup by choosing (in Absolute Manage Admin) Commands > Reinstall Windows Computer. If Absolute Manage can properly access the FOG server, the disk images are visible in the Image pop-up menu. Absolute Manage now supports remotely reinstalling Windows computers. Continue the installation process: If you want to use Absolute Manage to administer mobile devices, continue with Installing MDM support below. , Otherwise, continue with installing Absolute Manage Agent on all computers that are to be administered, as described in Installing Absolute Manage Agent on page 27.
Managing a mobile device also requires it to be enrolled in the MDM administration. This is described later in Enrolling mobile devices on page 36.
Preparation
1.
If you want to manage iOS devices, create a push notification certificate: Open the iPhone Provision Portal. You can access this portal as a member of the iPhone Developer Enterprise Program. Request a new AppID. Use any description you like. The bundle identifier must begin with com.apple.mgmt As the individual part, we . recommend that you use com.mycompany.mdm when , mycompany.com is your companys Internet domain. Thus, the recommended full identifier would be com.apple.mgmt.com.mycompany.mdm .
23
Follow Apples instructions for requesting and downloading a production push SSL certificate and convert the certificate to p12 format. Export the certificate and key, saving them as MDMPushCertificate.p12 . Do not specify a password.
This step is not required if you only want to manage Android devices. 2. Obtain an SSL/TLS certificate for the computer on which you will be installing the MDM server. The certificate must come from a root certification authority (CA) or signed by a CA with authorization from a root CA. In the latter case, you also need the signer certificate of the CA. The certificate must either be a wildcard certificate for the domain under which the computer on which the MDM server will be installed can be reached from the Internet (e.g., *.mycompany.com) or specific to the servers DNS name. 3. Set up your firewall to allow connections from your Absolute Manage Server to the notification servers of Apple and Google, respectively: gateway.push.apple.com on port 2195 for iOS devices android.apis.google.com on port 443 for Android devices
If you do not manage a particular kind of device, you do not need to allow the corresponding connection. (For example, if you do not manage iOS devices, you do not need to allow connections to gateway.push.apple.com.) Continue with Installing the MDM server below. ,
The installation process differs slightly between Windows and Mac OS X. Both processes are described in separate sections below.
2. Run the Setup.exe application from the Absolute MDM Server folder. You are guided through the installation. 3. When prompted for the web site SSL certificate, choose the certificate described in step 2 of Preparation above. ,
24
Installation
4. When prompted for the Absolute Manage Server certificate, use the certificate you exported in step 1. As the DNS address, provide the fully qualified domain name, i.a., the name including the top-level domain. For example, use mdm.mycompany.com (instead of just mdm). As explained in Preparation above, this can be the computer on , which Absolute Manage Server is running but does not have to be. After you have installed the MDM server, continue with Configuring the MDM server below. ,
2. By default, MDM communications use port 443. If you want to use a different port, edit the server.port entry in the /private/etc/ lighttpd/lighttpd.conf file. 3. Copy the SSL certificate for the MDM server (see step 2 of Preparation) to /etc/lighttpd/certs on the MDM server computer and name it lighttpd.pem . If you have received a certificate that does not contain the SSL private key (e.g., a certificate in .p12 format), you must convert it to include the key, as described in Importing the SSL key into the certificate below. , 4. From Absolute Manage Admin, export the certificate of the Absolute Manage Server, as described in Exporting a server certificate on page 18. 5. Copy this certificate to /etc/lighttpd/certs on the MDM server computer and name it AMServerCertificate.pem . As explained in Preparation above, this can be the computer on , which Absolute Manage Server is running but does not have to be. 6. If the certificate was signed with an intermediate certificate (as opposed to a CA root certificate), append the content of the intermediate certificate to the content of your certificate. You can do so, e.g., by executing the command cat IntermediateCA.pem >> AMServerCertificate.pem (This assumes that your intermediate certificate is named IntermediateCA.pem.) 7 . On the computer on which the MDM server is installed, open the /Library/Preferences/com.absolute.mdm_server.plist file (using the Property List Editor utility) and enter in the AMServerHostname key the IP address or DNS name of the Absolute Manage Server.
25
8. On the computer on which the MDM server is installed, run the Start_MDM_Server.command shell script provided on the Absolute Manage installation disk. This starts the MDM server. Continue with Configuring the MDM server below. ,
2. Export the certificate and key to disk in Personal Information Exchange (.p12) format. 3. Convert the resulting file to Privacy Enhanced Mail (.pem) format using the ConvertSSLCertificate.command script provided in the Extras folder on the Absolute Manage installation image.
The MDM server is configured from Absolute Manage Admin. Configuration is required only for managing iOS devices, not for Android devices. 1. In Absolute Manage Admin, open the Server Center, display the server settings, and click the MDM tab.
2. Enter this information: Profile name: A descriptive name for the deployment profile. This name will be displayed on iOS devices during the enrollment process. Profile identifier: A unique identifier for the profile. It is needed to distinguish it from other profiles you may create on the server. Description: A brief explanation of the profiles purpose. It is displayed on the iOS device in the first screen of the enrollment process. MDM server: The full DNS name of the server on which you have installed the MDM server. Port: The port over which the MDM server communicates. By default, this is 443, but if you have edited the server port in step 2 of Installing the MDM server you must , specify the custom port here as well.
3. Click the Select button at the right of the panel and choose the certificate that you have created in step 1 of Preparation . 4. Choose Server > Save Server Settings.
26
Installation
Continue with installing Absolute Manage Agent on all computers that are to be administered as described below.
Installation method
There are three different methods of installing Absolute Manage Agent: Automatically, using the Agent Deployment Center. This is described in Installing Absolute Manage Agent using the Agent Deployment Center on page 30. For administered Windows computers: Automatically, using a login script. The details of setting this up depend on the specifics of your systems; providing them goes beyond the scope of this manual. Manually, executing the installer locally. This is described below. Note that manual installation requires the admin application to run on the same operating system platform as the agents. In other words, if you want to install agents on both Mac OS X and Windows, you need to also install Absolute Manage Admin on both platforms.
In most situations, the automatic methods will be preferable to the manual installation, particularly in cross-platform setups.
2. Open the installation package and follow the on-screen instructions. There is no need to restart the computer after the installation. 3. Make sure that Remote Login is enabled in the Sharing system preference. 4. Repeat these three steps on all other computers on which you want to install Absolute Manage Agent.
27
5. In Absolute Manage admin, choose Window > Agent Deployment Center. The Agent Deployment Center window opens. 6. Select the computer on which you have just installed agents. You can select multiple computers together if there is a user account with the same name and password on each of them. Computers with current versions of the Agent are indicated by green dots. In large networks, you may need to create custom zones to see all agents. See Creating zones in the Agent Deployment Center on page 32 for details on doing so. 7 . Right-click and choose Set Inventory Server from the context menu. The Inventory Server Properties dialog opens.
8. Enter the SSH username and password required to access the clients. Note that this means that all selected clients must have SSH accounts with the same usernames and passwords. If not all of your clients have such similar accounts, select them in multiple groups, with the clients in each groups having similar accounts. 9. If the server you want to assign is not present in the list, click the + button to add it.
28
Installation
11. Enter the DNS name or IP address of your Absolute Admin Server in the Inventory server address field. For most installations, you can leave the other settings at their defaults. More detailed considerations are found in Assigning inventory servers to agents on page 52. Recommended values for very large installations are provided in the separate Absolute Manage Optimization Guide. 12. If the Inventory server certificate field does not display valid , click the Set button to select the certificate for the server you are specifying. Creating a certificate is described in Exporting a server certificate on page 18. Note: Make sure that you are using a certificate that has been created after the last time the server has been installed. A certificate that has been created before a server has been reinstalled is indicated to be valid but will not allow a connection to the server. 13. Click OK to create the new server specification. 14. In the Inventory servers list, select all servers that you want to use to manage the selected agents. Optionally, you can also assign software distribution and license monitoring servers at this time, but it is often more efficient to do so later, as described in Assigning software distribution or license monitoring servers to agents on page 54. 15. Click OK to close the dialog and assign the specified servers to the agents. When the servers have been successfully assigned, the agent appears in the Computers window of any Absolute Manage Admin that is connected to one of these servers.
29
The Agent Deployment Center is an Absolute Manage Admin module that lets you install and update Absolute Manage Agent on computers in your network as well as review the currentness of installed agents.
NOTE Installing agents as described in this procedure is possible only for administrators with the Deploy Agents right. See New Administrator on page 471 for details. The Agent Deployment Center can be used to install agents on computers using the same operating system platform (Mac OS X or Windows) as the administrator application. For agent deployment in mixed networks, you should therefore install at least one Absolute Manage Admin application on each platform NOTE In contrast to the other parts of Absolute Manage, the Agent Deployment Center does not work through Absolute Manage Server. Installations are performed directly from Absolute Manage Admin to the client computers; all settings are stored locally on the administrator workstation.
30
Installation
All its functions are controlled from the Agent Deployment Center window:
Action menu
Sidebar
Toolbar
Table area
Columns drawer
Prerequisites
Installing or updating Absolute Manage Agent via the Agent Deployment Center requires your administrator account to have the Deploy Agents permission. (Creating administrator accounts is described in Administrator accounts on page 45.) In addition, every computer on which Absolute Manage Agent is to be installed must have SSH enabled and there must be an account that you can use (i.e., for which you know the password).
Overview
To install or update Absolute Manage Agent via the Agent Deployment Center, you perform these steps: 1. Create zones that list all relevant computers.
2. Select the computers on which you want to install or update Absolute Manage Agent, specify the access parameters, and install the agents. These steps are described below in detail. You can also specify that agents be installed on all found computers where they are not already present. This is also discussed below.
31
The Agent Deployment Center contains predefined network zones: Under Bonjour, all Bonjour (ZeroConf) zones defined in your network are automatically listed. In Absolute Manage Admin for Windows, these zones are displayed only when you have installed Bonjour on your workstation. Under Active Directory, all Active Directory zones defined in your network are automatically listed. This entry is displayed only if there is an Active Directory server in your network.
If these zones do not list all computers that you want to administer or if you want to group the computers differently than they are grouped by the zones, you can define custom zones. Custom zones are defined by IP address, IP address range, or by DNS name. NOTE You can also import custom zone definitions from a text file, as described in Import Zones File on page 508. To define a custom zone: 1. From the Agent Deployment Center action menu, choose New Custom Zone. The Custom Zone dialog opens. 2. Click the Zone tab:
3. Enter a descriptive name for the zone and use the pop-up menus to define conditions for computers that are to be included in the zone. You can specify single IP addresses, ranges of IP addresses, and DNS names. Using the + button, you can create additional conditions. The zone will include any computer that meets at least one of the specified conditions.
32
Installation
Use the button to remove unwanted conditions. 4. If you want Absolute Manage to regularly scan the zone (which is useful with automatic deployment as described below), check Repeat scan every and enter the desired interval in minutes. 5. If you do not wish Absolute Manage to automatically install Absolute Manage Agents without further interaction with you, skip to step 7. Otherwise, click the Auto Deployment tab:
6. Fill in the fields as described in step 9 through step 14 of Installing Absolute Manage Admin on Mac OS X, above. 7 . Click OK to create the zone.
8. To save the zone, choose Save from the File menu. Saving the zone is optional; however, if you do not do so, it is not available when you next start Absolute Manage Admin. The new zone appears in the drawer in the Custom Zones section. If you have specified automatic scanning, Absolute Manage scans the zone for computers. If you have also specified automatic deployment, Absolute Manage Agent will be installed on all computers on which it is not yet present. This requires the computers to have the same operating system as your administrator workstation Absolute Manage Admin running on Windows can only automatically deploy Absolute Manage Agent for Windows and Absolute Manage Admin for Mac OS X can only deploy Absolute Manage Agent for Mac OS X.
33
If you have not set the zone for automatic scanning, you will now want to search the zone for devices, as described below.
Searching zones
To search a zone, choose Search Zone from the action menu. Searching a zone usually takes up to about one second per specified IP address or DNS name. NOTE The exact time depends on the server connection timeout set in the Preferences dialog (see Preferences on page 254); each IP address where no device is found takes about a tenth of that time. IP addresses where devices are located are scanned much quicker. You can cancel a search in progress by choosing Cancel Search from the zones context menu. The found devices are listed in the table area of the Agent Deployment Center window. Colored dots in front of their names indicate their status: Green dot: Absolute Manage Agent is current. Yellow dot: Absolute Manage Agent is present but outdated. Red dot: No Absolute Manage Agent. Installing an agent is possible. Grey dot: No Absolute Manage Agent, and no agent can be installed. A common reason is that you are trying to install across platforms (i.e., from the Mac Admin to a Windows client or vice versa), which is not possible with the Agent Deployment Center. Other reasons include: The device is not a computer, or SSH is disabled on a Mac client. On computers that have no agent ( ) or an old version ( ), you can install the current version, as described below. If you have specified automatic deployment for the zone (see above), Absolute Manage automatically installs Absolute Manage Agent on all computers that have the same operating system as your administrator workstation and on which no Absolute Manage Agent is present.
Editing zones
To edit a custom zone, select it and choose Edit Custom Zone from the action menu. Predefined zones cannot be edited.
Deleting zones
To delete a custom zone, select it and choose Remove Custom Zone from the action menu.
34
Installation
When the computers on which Absolute Manage Agent is to be installed are listed in the Agent Deployment Center window (see above), you can install the agent on them.
NOTE For information on setting a zone up for automatic deployment, see step 5 of the procedure in Creating zones in the Agent Deployment Center above. , To install or update Absolute Manage Agent: 1. In the Agent Deployment Center window, select all computers on which you want to update or install the agent. You can select computers that require installations and ones that require updates at the same time. Make sure to select only Mac OS X computers; to install or update agents on Windows computers, use a Windows computers version of Absolute Manage Admin. On all Mac OS X computers that you select together, there must be an SSH account with the same name and password. 2. From the action menu, choose Install Agent. The Agent Deployment Settings dialog opens:
3. Fill in the fields as described in step 9 through step 14 of Installing Absolute Manage Admin on Mac OS X, above.
35
4. If you have prepared a custom installer package, click Other and then click Select to open it. 5. If you want to reuse the installer package for other Agent installations, click Export Installer Package to save the installer along with the specified server settings and required certificates. You can reuse this package in this dialog by opening it as described in step 4. 6. Click OK. Absolute Manage Admin now installs agents on the selected computers. The progress of the installation is displayed in the Agent Deployment Centers Connection Status column. Any errors that occur during an installation are logged in ~/Library/Logs/LANrev Agent Deployment/. If the built-in Mac OS X firewall is active on a client computer, installing the agent automatically opens the agent port as specified in the Preferences dialog (normally port 3970).
36
Installation
information item category). However, no Active Directory or Open Directory server is required. NOTE Irrespective of the technique used, Android users must enable the installation of content obtained from sources other than the Android Market to be able to complete the enrollment.
37
Windows Vista, Windows 7 or Windows Server 2008: , C:\ProgramData\Pole Position Software\LANrev Server\ Mac OS X: /Library/Application Support/LANrev Server/ For Android devices, the enrollment file is the AbsoluteApps.apk app package, which is included with the Absolute Manage installers in the Android folder.
2. Make the enrollment file MDMEnrollmentBootstrap.mobileconfig or AbsoluteApps.apk available on a web server. The file must be accessible with a standard http or https URL. We recommend that you put it in an area of the web server that requires logging in or provides another form of access control. 3. If you are using an IIS server, use IIS Manager to add the enrollment files MIME type to the servers Properties page: The extension for the iOS file is mobileconfig and the file type is application/x-apple-aspen-config . The extension for the Android file is apk and the file type is application/vnd.android.package-archive .
4. Send an e-mail with the URL of the enrollment file to all users whose mobile devices are to be managed. Make sure to send the e-mail to addresses that these users read on the mobile devices enrollment is not possible if the e-mail is accessed from another device, such as a desktop or portable computer. 5. In the e-mail, instruct the users to click on the link and follow the instructions this will display on the screen. Android users will need to manually launch the downloaded file (AbsoluteApps.apk), which should be mentioned in the e-mail. If they have not done so before, they will also need to enable the installation of content from sources other than the Android Market. Each device on which users follow this procedure appears in the Mobile Devices window in Absolute Manage Admin. You can manage it there using the context menu commands.
38
Installation
Installing Absolute Manage Server on page 13 Installing Absolute Manage Admin on page 14 Installing Absolute Manage Agent on page 27
2. Start Absolute Manage Admin and open the Server Center window. You find two automatically generated packages Absolute Manage Agent (Mac OS X) and Absolute Manage Agent (Windows) under Software Distribution > Software Packages. Note: If you have just installed or updated Absolute Manage Server, these packages may take a few minutes to appear in the Software Distribution Center. 3. Drag the packages to the computer groups that contain the clients you wish to update. If you want to update all clients, doing which we highly recommend, drag them to All Macs and All PCs, respectively. This updates the agents on all computers in the computer groups to which you have assigned the packages. Unless you later remove the packages from the groups, it also ensures that, in future, new version of Absolute Manage Agent are automatically distributed to these computers. (You are asked for permission first in each case.)
39
Because of a new architecture of the Software Distribution Center in Absolute Manage 2.0 and later, the definitions of distribution points and software packages need to be updated when you have been using version 1.x before. You may also want to consider the choice of computers as distribution points. These issues are described below.
2. If file server software on the computer was previously only used for distribution point purposes, you may want to disable it now. 3. In Absolute Manage Admins Server Center window, double-click the distribution point definition in the Software Distribution > Distribution Points category. The Distribution Point window opens. (It is described in detail in New Distribution Point on page 454.) 4. Enter the packages root path. This is the local path on the server of the directory in which Absolute Manage is to store software installers. This path may be different on each server. 5. If the distribution point the definition of which you are editing is to be the master server, check the Is master distribution point option. The master distribution point serves as the source of software installers for the other (mirror) distribution points, as discussed in Structure on page 191. There must always be exactly one master distribution point. Because the master distribution point gets traffic from the mirror distribution points in addition to the agents, it should have enough processor power and network bandwidth to not become a bottleneck. 6. Click OK.
Absolute Manage User Guide 40
Installation
7 .
Repeat the process for all other distribution point definitions. Continue with updating the software packages as described below.
2. In Absolute Manage Admins Server Center window, double-click the software package definition in the Software Distribution > Software Packages category. The Software Package window opens. (It is described in detail in New Software Package on page 434.) 3. Click the Select button and select the software installer. It does not matter where the installer is located, e.g., it does not need to be on a server. 4. Click OK. 5. Repeat the process for all other software package definitions and upload the changes to the Absolute Manage Server using the Save Distribution and Licensing Info command from the Server menu. Absolute Manage checks and uploads the installers to the master distribution point. From there, they are automatically and transparently distributed in the background to the mirror servers you no longer need to manually copy the installers to all distribution points.
41
42
Chapter 3
Overview
Absolute Manages access control centers on two main issues: Which administrators can do what in the system? Which server can access which agents? This, of course, is only an issue in systems with multiple servers.
Administrator accounts
There are two types of administrator accounts in Absolute Manage, standard accounts and superadministrator accounts. The two types differ in two respects: Superadministrators can create, configure, and delete administrator accounts; normal administrators cannot do this (except for changing their own passwords). Superadministrators are indicated by yellow icons ( ) in the Server Center windows sidebar. Standard administrators can see and send commands to only those administered computers to which they have been expressly assigned. Depending on the preference settings, superadministrators may be able to see all computers on which an Absolute Manage Agent is installed. Standard administrators are indicated by black icons ( ) in the Server Center windows sidebar.
All account information is stored on an Absolute Manage Server, so that an account has the same settings irrespective of the computer from which the administrator is logged in.
43
Overview
Exactly on which server the information is stored on can be configured: By default, each Absolute Manage Server stores its own information. But by entering the address of another server in a servers settings, you can direct it to not keep its own administrator account information but instead use that from the specified server. Any changes made to the information on the parent server is automatically propagated to all child servers, simplifying account management in large organizations.
Administrator privileges
All administrators can execute commands targeting the devices to which they have been assigned. Which commands an administrator is permitted to execute can be configured in the Administrator Center; by default, every administrator can execute all commands. In addition, the program functions to which an administrator has access can also be configured in a finely-grained way. For example, you can prevent an administrator from creating or changing installation packages without restricting other options. NOTE While these functions can be disabled for superadministrators as well, these administrators can because of their ability to configure accounts always re-enable them for their own accounts. Only standard administrators can really be prevented from using these functions.
44
different ones. They may be among the specified inventory servers or may be separate Absolute Manage Servers.
Agent access
As noted above, not all administrators can access all agents. Except for administrators for whom the Can manage all devices setting has been enabled, administrators can see information only from administered devices to which they have been expressly assigned. This makes it possible to, e.g., have administrators that are responsible only for the devices of one team without setting up a separate Absolute Manage Server for this purpose.
Administrator accounts
A person must have an administrator account to be able to access Absolute Manage Admin (and, by extension, the Absolute Manage Server). Accounts are created in Absolute Manage Admin but account information is stored on the Absolute Manage Server. NOTE You can edit administrator accounts on a particular server only if that server is not set to use another servers account information in the Server Settings dialogs General tab (see page 487).
2. Choose Administrator Setup > New Administrator from the action menu to create a new account.
45
Administrator accounts
3. Enter the name for the account and the password. Repeat the password in the Verify field. Both account names and passwords are case-sensitive. 4. Set the desired privileges for the account: Superadministrator: The administrator has superadministrator privileges. (These privileges are explained in Administrator accounts on page 43.) If the option is unchecked, the account is a standard account. Can manage all devices: If this option is checked, the administrator can access all devices that are managed on the Absolute Manage Server. If the option is unchecked, the administrator can manage only devices to which the account has been expressly assigned. Login enabled: The account is active. If this option is not checked, the account is disabled.
5. If desired, assign a profile from the Profile pop-up menu to the account and proceed with step 9. If you do not assign a profile, continue with the next step. Assigning a profile sets the commands and rights available to the account. The Profile pop-up menu also offers commands to create and delete profiles as well as edit their names. Note: Profiles are merely presets: You can change the settings for an individual account at any time without affecting the profile, and changing the profile does not affect existing accounts which are based on it.
46
6. In the commands list, uncheck all commands that you want the administrator not to be able to execute on client devices. The individual commands are described in Commands menu on page 278 and Mobile Devices on page 384. Note: Even if you set up a superadministrator account that cannot execute all commands, a superadministrator can always change his or her own account to regain those rights. 7 . In the rights list, uncheck all rights that you want the administrator not to have. The individual rights are described in New Administrator on page 471. Note: If you uncheck the Manage Mobile Devices right, the administrator is unable to send commands to managed mobile devices, even if the commands themselves are enabled in the administrator account (see step 6). Note: As with commands, you cannot effectively deny rights to superadministrators. 8. If desired, save the configuration of commands and rights you have created as a profile by choosing Save As from the Profile pop-up menu. Creating a profile lets you later quickly create other accounts with the same commands and rights. 9. Check Create appointment group for admin if you want to have two groups in the Server Center windows sidebar listing, respectively, all computers and all mobile devices to which this administrator has been assigned. 10. Click OK to create the account locally. 11. Create more administrator accounts if desired, as described above, starting with step 2. 12. When you are done, choose Save Administrator Info from the Server menu to store the new accounts on the Absolute Manage Server.
47
Administrator accounts
2. In the Server Center window, drag the desired users from the Active Directory group to the Administrators group. The Administrator dialog opens:
3. Set the desired privileges and other options for the account as described above in step 4 and following. Note: You cannot change from within Absolute Manage the names or passwords of administrator accounts imported from Active Directory. 4. Click OK to create the account locally. The account is not yet saved on the server; this has to be done in a separate step as described below. 5. Create more administrator accounts if desired, as described above. 6. When you are done, choose Save Administrator Info from the Server menu to store the new accounts on the Absolute Manage Server. Absolute Manage uses Active Directory for this accounts log-in process. Note that when the Active Directory user account from which you have created the administrator account is removed from Active Directory or is moved out of the Active Directory groups that have been specified in server settings, the administrator account will be deleted from Absolute Manage.
48
2. Right-click the account that you want to edit and choose Edit Administrator from the contextual menu. In the windows table area but not in the sidebar you can also select and edit multiple accounts. Note, however, that editing the names or passwords is not possible in that case. Editing the names or passwords of accounts based on Active Directory users is never possible from within Absolute Manage. 3. Set the account options as desired, as explained in Creating an administrator account from scratch above. , 4. Click OK. 5. Edit more administrator accounts if desired, as described above. 6. When you are done, choose Save Administrator Info from the Server menu to store the new accounts on the Absolute Manage Server. NOTE Administrators can change their own passwords using a different method, as described in Changing your password on page 51.
49
Logging in
When Absolute Manage Admin is started, it presents a login dialog:
To log in, make sure that the server address and port are correct. Enter your username and password, both of which are case-sensitive, and click OK. NOTE If the administrator account is based on an Active Directory user account, you can use the display name, the account name, or the login name to log in. You are now logged in and can use Absolute Manage according to the privileges of the specified account. If you check Remember password in keychain, you can in future log in from this user account of your computer without having to enter a password.
50
IMPORTANT Setting this option gives everybody with access to your user account on the Macintosh automatic access to Absolute Manage. You may want to disable the option if this could include unauthorized people.
NOTE There is no way to use Absolute Manage Admin without logging in.
Logging out
There is no way to explicitly log out of Absolute Manage. Logging out is automatic when you quit Absolute Manage Admin; the only other way to log out of your account is to switch to another account, as described below.
Switching accounts
You can at any time switch to another administrator account without having to quit Absolute Manage Admin. To do so, choose Switch Administrator and Server from the Absolute Manage Admin menu to open the Login dialog (see above). Enter the new account name and password. You can also log in to a different server at the same time.
51
2. Enter your current password and your new password. Re-enter the new password in the Password verification field. Note: Passwords are case-sensitive. 3. If desired, you can store the new password in the keychain. Please see the note on the security implications in Logging in above. , 4. Click OK. The new password is effective immediately. If you were logged into a slave server, the password is propagated to the master server (and from there to any other slave servers there may be). NOTE For changing passwords of other administrator, see Editing administrator accounts on page 49. Only superadministrators can change other administrators passwords.
52
In this dialog pane, you can add and remove inventory servers as well as change the communication settings. 3. To add a server, click the + button. A new line is added to the table of servers and the Inventory Server Properties dialog is opened. Enter the IP address or DNS name of the server. 4. If desired, you can edit the other settings for the server: The port number is the port on which the server communicates with agents (and the Absolute Manage Admin). This should not normally be changed. Note: If the built-in Mac OS X or Windows firewall is active on the server computer, the specified port is automatically opened in the firewall. If a server is to act only as the software distribution server or license monitoring server for this server, check the Basic Inv. Only option. This prevents unneeded inventory information from being sent to the server from the agent and so both reduces the network load and keeps the server from becoming bogged down by unneeded data. The heartbeat interval is the interval in which the agent lets the server know that it is still running. The inventory push interval is the interval in which the agents sends changes in the state of its computer in any information item, except those in the processes, fonts, files, printer, and startup item information.
53
5. If the Server certificate field does not display valid click the Set , button and choose the certificate for the server. Creating server certificates is described in Exporting a server certificate on page 18. Note: Make sure that you are using a certificate that has been created after the last time the server has been installed. A certificate that has been created before a server has been reinstalled is indicated to be valid but will not allow a connection to the server. 6. Click OK to close the Inventory Server Properties dialog. 7 . If desired, create more servers to add.
8. To remove a server, i.e., to stop agents from communicating with it, select it in the list and click the button. 9. Before changing the agents settings, review the table: All target agents will communicate with checked servers. Only target agents will communicate with unchecked servers that already communicate with them. (I.e., the status of these servers with regard to the target agents will not be changed.) None of the target agents will communicate with servers that are not in the list. (That is, any server not in the list will be removed from all target agents.)
10. Click Execute. The agents are reconfigured according to the command settings.
54
These servers can be assigned during the installation of the agent, as described in Installing Absolute Manage Agent on page 27, or later, as described in Assigning inventory servers to agents above. , If desired, you can at the same time adjust the intervals in which the selected agents are to check for new software and report on installed software, respectively.
Appointment groups combine a number of devices with one or more administrators, thereby giving these administrators access to the computers.
2. From the action menu, choose Administrator Setup > New Computer Appointment Group or Administrator Setup > New Mobile Devices Appointment Group, depending on the type of device you want to manage in this group.
55
3. Enter the desired name and click OK. The new group appears in the Server Center windows sidebar. 4. To add devices to the group, drag them on top of the group icon from a browser window or the Mobile Devices window. To remove devices, select them in the group, right-click them and choose Remove from Group from the context menu. A confirmation message is displayed. 5. To store the appointment group specification on the Absolute Manage Server, choose Save Administrator Info from the Server menu. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before doing so), but the new appointment group is lost unless you save the changes at some point before quitting Absolute Manage. Also, other administrators can use the group only after you have saved it to the server.
2. From the action menu, choose Administrator Setup > New Smart Computer Appointment Group or Administrator Setup > New Smart Mobile Devices Appointment Group, depending on the type of device you want to manage in this group The Smart Group dialog opens:
56
3. Enter the name for the new appointment group and specify the conditions that devices must meet to be included in the group. To define a condition, specify an information item in the left-hand text field, choose a comparison operator from the pop-up menu, and enter a comparison value in the right-hand text field. (For some information items, there is no comparison value.) When the text insertion mark is in a field, you can drag a column from the Columns drawer into the field. With the + and buttons, you can add and remove conditions. 4. If you have specified more than one condition, specify through the upper pop-up menu whether devices must meet one or all of the conditions. 5. Click OK. The new group appears in the Server Center windows sidebar. 6. To store the appointment group specification on the Absolute Manage Server, choose Save Administrator Info from the Server menu. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before doing so), but the new appointment group is lost unless you save the changes at some point before quitting Absolute Manage. Also, other administrators can use the group only after you have saved it to the server.
57
3. Change the selection criteria as described above in Setting up a smart appointment group.
Appointing administrators
To appoint an administrator to a device: 1. Make sure that the Server Center window is open.
2. In any browser window, select the computers to which you want to appoint administrators. Or select mobile devices in the Mobile Devices window. Note: The Agent Deployment Center window cannot be used for this purpose. 3. Drag the selected devices to the appointment group through which it is to be managed. This appoints all administrators belonging to the group to the selected devices.
58
To stop an administrator from managing the devices in an appointment group: 1. In the Server Center window, expand the appointment group and select the Assigned Administrators subcategory. All administrators that are assigned to the group are listed in the main part of the Server Center window. 2. Right-click the administrator and choose Remove from Group from the context menu. The administrator can no longer access the computer or mobile devices in the appointment group (unless he is assigned to another group that also contains some or all of the devices).
59
These procedures are described in: Specifying MDM access rights on page 60 Updating MDM access rights on enrolled iOS devices on page 61
NOTE Setting MDM access rights does not apply to Android devices.
To specify the access rights that administrators may have on the mobile devices managed through this Absolute Manage server: 1. Open the Server Center window.
2. In the sidebar, click Server > Server Settings. 3. In the main part of the window, click the MDM tab. The MDM settings are displayed:
4. In the Access rights section, check all privileges that you want administrators to be able to have. The available privileges are described in MDM on page 493. Note that for a particular administrator to have a privilege, the appropriate option must be checked in her or his account setup, as described in Administrator accounts on page 45. However, privileges that are unchecked in the MDM tab are unavailable to all administrators (including superadministrators), irrespective of their individual account settings.
60
5. Choose Server > Save Server Settings to save the changes on the server. 6. If there are iOS devices already enrolled on the server, you must re-enroll them to update the access privileges on them. See Updating MDM access rights on enrolled iOS devices below, for , details. You have changed the privileges that administrators can have on newly enrolled mobile devices. Privileges on already enrolled iOS devices will be updated once these devices are re-enrolled.
Any changes to the MDM access privileges for managed iOS devices (as set in the MDM tab of the server settings) require any devices that are already enrolled to be re-enrolled before the changes take effect on them. You are prompted to send re-enrollment messages to these devices whenever you change the MDM settings, but you also can do so manually at a later time: 1. In the Mobile Devices window, select all devices that need to be re-enrolled. To quickly find all affected devices, you can create a smart group that collects all devices where the Mobile Device MDM Profile Up-to-date has the value No . 2. Right-click the selected devices and choose Send Re-enrollment Message to Device from the context menu. The Message dialog is displayed:
3. Enter a text that you want to send to your users. Make sure not to delete the URL placeholder; it will automatically be replaced with the actual enrollment URL including the device identifier in the message sent to the users. If you accidentally delete the placeholder, the URL will be appended to the end of the message.
61
4. Click Send to send the message to all selected devices. All users will receive the message the next time they contact mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If they are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. When a user taps the URL, the device will be re-enrolled in a process that is similar to the original enrollment process. When that process is finished, the new MDM privileges are in effect on the device.
62
2. Click the + button. The entry fields in the dialog become active. 3. Enter the information for the placeholder record you are about to create. The serial number is optional, all other information is required. Instead of manually entering the information from each record, you can also click the Import button to import the data from a tabdelimited text file. The file format is described in Create Placeholder Computer Records on page 342. 4. To create additional placeholder records, repeat step 2 and 3. 5. Click OK to save the placeholder records displayed in the dialog.
2. Right-click the selected records and choose Remove from Server from the context menu. The records are deleted after you have confirmed that you want to do so.
63 Absolute Manage User Guide
2. In the Terminal window, enter this command and press Return: sudo /Library/Application\ Support/LANrev\ Server/LANrev\ Server.app/Contents/MacOS/LANrev\ Server --ExportPreferences <export file>.plist
<export file>
create. 3. When prompted, enter the password to execute the command with superuser privileges. The settings file is created with the specified name at the specified location.
2. In the terminal window, browse to the Program Files\Pole Position Software\LANrev Server directory. 3. In the terminal window, enter this command and press Enter:
64
<export
create. The settings file is created with the specified name at the specified location.
2. In the Terminal window, enter this command and press Return: sudo /Library/Application\ Support/LANrev\ Server/LANrev\ Server.app/Contents/MacOS/LANrev\ Server --ImportPreferences <import file>.plist
<import file>
import. 3. When prompted, enter the password to execute the command with superuser privileges. The specified settings file is imported and the existing server settings and custom field definitions are overwritten.
2. In the terminal window, browse to the Program Files\Pole Position Software\LANrev Server directory. 3. In the terminal window, enter this command and press Enter: LANrev Server.exe --ImportPreferences file>.plist
<import file> <import
import. The specified settings file is imported and the existing server settings and custom field definitions are overwritten.
65
Chapter 4
Overview
The gathering and managing of information by Absolute Manage centers on the central database integrated in Absolute Manage Server: The server collects information from the agents and stores it in its database. When you want to see specific information, the Absolute Manage admin application queries the server for it and displays it on your workstation. In principle, the flow of information is very simple: It is gathered by the agents, stored by Absolute Manage Server, and displayed by Absolute Manage Admin.
Gathering information
Information collection by the server is mostly automatic. Some types of information on processes, fonts, startup items, services and files are collected on request only to avoid wasting local processing power and network bandwidth. This is described in more detail in Gathering information on page 67.
Custom information
If Absolute Manages extensive list of information items does not provide the data you are looking for, you can extend it by creating custom information items. This is described in detail in Custom information on page 78.
The columns in these tables are called information items; they are the basic unit of information display in Absolute Manage.
Displaying information
Information is displayed by Absolute Manage Admin is so-called browser windows. These windows consist mainly of a table where the columns are information items and the rows represent computers or other object such as files. You request particular pieces of information in two basic ways from the server: To compare the same information for several administered computers, you put the respective information items into browser windows. To view in-depth information on one computer, you select that computer in the sidebar of a browser window.
Rearranging information
You can narrow down and rearrange information in a browser window by searching for text, creating groups of related computers, and sorting browser windows. This is described in more detail in Searching, filtering, and sorting on page 106.
Custom information
Absolute Manage provides ten text fields for storing any kind of information on client computers and retrieve it from there. These fields are intended for information, e.g., inventory numbers, that cannot automatically be determined by the software. This is described in more detail in Manually edited information on page 90.
Gathering information
Gathering information is performed by the Absolute Manage Agents which then forward this information to all inventory servers (i.e., Absolute Manage Servers) that are specified for them. Some types of information are gathered and forwarded automatically in regular intervals; other types information on files, processes, fonts, printers, and startup items are gathered only on request.
67
Gathering information
In addition, updates for the automatically gathered information can be requested manually in cases where you do not want to wait for the next scheduled update. This is discussed in detail in: Configuring automatic information gathering on page 68 Gathering and updating information manually on page 70 (includes gathering information on computers, processes, fonts, printers, and startup items) Gathering information on files on page 73 Gathering information on registry entries on page 75 Collecting FDCC SCAP compliance reports on page 77
Information on the computers hardware and software is gathered automatically by the Absolute Manage Agents and transmitted to the servers. The interval in which these transmissions happen can be configured.
NOTE The Absolute Manage Agents are smart about their transmissions: They send only changed information to the server, not everything they collect. To configure the update interval: 1. In any browser window, select the computers on which you want to configure the update interval. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Agent Settings. The Agent Settings dialog opens.
68
4. Select the desired Absolute Manage Server in the table, doubleclick the entry in the Inventory Push Interval column, and enter the desired update interval in minutes. Double-click the desired Absolute Manage Server in the table.The Inventory Server Properties dialog opens:
5. Enter the desired update interval in minutes. If several servers are specified in the table i.e., the selected agents are sending inventory information to several Absolute Manage Servers the interval can be set separately for each of them. 6. Make sure that the servers you have updated have a checkmark in the table and click Execute. The new interval is set on all target computers.
69
Gathering information
While most information that Absolute Manage provides is gathered automatically, some of it is only provided on request to avoid using up too much network bandwidth. This applies to information on: Fonts Printers Processes Startup items Installed software (including missing operating system patches)
NOTE While information on files also is collected in a manually triggered procedure, the process is somewhat different, as described in Gathering information on files on page 73. This information can be requested manually, as detailed below. By the same process, information that is normally gathered automatically can be updated before the next automatic update is due. While the server sends all information it receives to the admin application when required, information can also be manually loaded from the server to Absolute Manage Admin. This is also described below.
70
3. To cause the agents on the target computers to transmit all computer information (i.e., not just information that has changed) to the server, check Force full inventory. To gather font, printer, startup item, or service information, check the appropriate option. Note: Changed computer information is always transmitted when the Gather Inventory Information command is executed, even if none of the options in the dialog is checked. 4. Click Execute. The agents on the target computers collect the requested information and send it to the server, where it is entered in the appropriate tables. The server automatically forwards the information to the admin application if any browser windows display corresponding information items.
71
Gathering information
3. Check the desired options: Scan installer receipts: Absolute Manage checks the target computers for installer receipts and lists the corresponding software. Note that only some installers generate such receipts. Scan for missing operating system patches: Absolute Manage compares the list of applicable operating system patches that are available in the Software Development Center with the patches that are actually installed on the computer and notes all patches that are missing. Note: Patches that have been rejected by you or another administrator are not reported as missing. Scan for application: Absolute Manage scans the specified locations and their subfolders for applications: Applications folder: the Applications folders (on Mac OS X targets) or the Program Files folders (on Windows targets; folder chosen according to the local environment variable settings) Boot volume: the entire startup volume All local volumes: all volumes currently mounted on the target computer, except server volumes Note: Scanning entire hard disks can create a huge amount of data. We recommend scanning the boot volume or all local volumes only when really required.
You must check at least one option. If one method of searching for software is deselected, any software from the target computers that has been previously found by this method is deleted from Absolute Manages database. For example, if Scan installer receipts is unchecked, Absolute Manage will delete any software on the current target computers that was identified by its installer receipts from the Installed Software table. That software will no longer be displayed in the Installed Software window. 4. Click Execute.
72
The agents on the target computers collect the installed software information and send it to the server, where it is entered in the Installed Software table. The server automatically forwards the information to the admin application if any browser windows display related information items. Note that previously collected installed software information is deleted before the targets are searched: If one method of searching for software is deselected, any software from the target computers that has been previously found by this method is deleted from Absolute Manages database. For example, if Scan installer receipts is unchecked, Absolute Manage will delete any software on the current target computers that was identified by its installer receipts from the Installed Software table. That software will no longer be displayed in the Installed Software window.
Gathering information on files is different from the other information gathering methods except gathering information on registry entries in that it is always done selectively, i.e., not on all files on a target computer but only on those meeting specified conditions.
NOTE Viewing files is not covered in this section; please see Viewing files from administered computers on page 183 for information on how to view the contents of a file on an administered computer.
73
Gathering information
To gather information on files: 1. In any browser window, select the computers from which you want to gather the file information. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Find File. The Find File dialog opens:
3. Specify the parameters of the files you want to find. The available parameters are described in Files on page 557, except for Checksum. Checksum lets you select files by the MD5 checksums, making sure that files are really the desired version, without changes. Note that the checksum has to be calculated dynamically; doing so for a large number of files requires a huge amount of processing power on the client computer and should therefore be avoided. Always combine the Checksum criterion with other criteria that make sure that the checksum needs to be calculated only for a small number of files. Checksums are not available for folders. When you search for files by version number, make sure to observe the platform conventions: On Mac OS X, version numbers have one or two dots, e.g., 2.0, 2.0b1, or 2.0.1. On Window, version numbers have three dots, e.g., 1.2.123.54 or 2.120.43.3.
In general, you should specify the more selective criteria (e.g., name or bundle identifier) first and less selective criteria (e.g., Is File) later to speed up the search. Note: By default, Absolute Manage finds both visible and invisible files. If you wish to find only visible files, specify an additional
Absolute Manage User Guide 74
condition Is invisible No making sure to search for files fulfilling , all conditions (see next step). 4. Choose whether you want to find files that meet at least one of the specified conditions (logical OR) or only files that meet all of them (logical AND). 5. Specify the other options: Whether to search all volumes, just the boot volume, or just a specific folder and its subfolders. Whether to search inside packages on Mac OS X targets. Whether to search just the first matching file on each target computer or all matching files. 6. Specify the behavior when no file matching your specifications is found on a particular target computer: Choose Do Nothing to disregard the result. This simply causes neither a record for the non-existing file nor an error to be generated. Choose Add database record to create an entry in the file database for the missing file. Entries for missing files are distinguished in particular by having the value No in the File Found information item. Choose Add error to command history to create an entry in the command history noting that the specified file could not be found on the target computer in question. -
7 .
Click Execute.
The agents on the target computers search their local hard disks for matching files and send information on them to the server, where it is entered in the Files table. The server automatically forwards the information to the admin application if any browser windows display corresponding information items.
Gathering information on registry entries is different from the other information gathering methods except gathering information on files in that it is always done selectively, i.e., not on the entire registry contents of target computers but only on those meeting specified conditions. To gather information on registry entries: 1. In any browser window, select the computers from which you want to gather the registry entry information. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Search Windows Registry.
75
Gathering information
3. Specify the parameters of the registry entries you want to find. You can search for keys and values by name or path. When you specify a path, you can use environment variables, as described in Environment variables on page 134. 4. Choose whether you want to find registry entries that meet at least one of the specified conditions (logical OR) or only entries that meet all of them (logical AND). 5. Specify the other options: Whether to search the entire registries or just the subset at a specified path. Whether to find just the first matching entry on each target computer or all matching entries. What to do when no matching registry entry is found on a target computer. You can specify that nothing happens, an error message is inserted in the command history, or a special entry is created in Absolute Manages Registry Entries database table.
These special entries specify the registry entry that was searched for and have a value of No in the Registry Entry Found information item. This allows you, e.g., to easily find all computers missing a particular entry. 6. Click Execute. The agents on the target computers search their local registries for matching entries and send information on them to the server, where it is entered in the Registry Entries table. The server automatically forwards the information to the admin application if any browser windows, e.g., the Registry Entries window, display corresponding information items.
76
Using Absolute Manage, you can execute and collect FDCC SCAP compliance reports on administered computers
NOTE It is beyond the scope of this manual to discuss the theory, purpose, or use of FDCC SCAP reports. For details on these reports, please consult the relevant section of NISTs website at http://nvd.nist.gov/fdcc/ or other applicable documentation. To collect FDCC SCAP reports: 1. In any browser window, select the computers for which you want to collect the compliance reports. Compliance reports can only be collected from Windows clients. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Gather Compliance Report. The Gather Compliance Reports dialog opens:
77
Custom information
3. Click the Select button to choose the file containing the report definition or drag the file into the Checklist file field from the desktop. 4. From the Profile menu, choose the desired profile from the list of profiles available in the chosen report definition file. 5. In the Profile objects list, uncheck all options that you do not want to include in the profile. 6. Click Execute. The specified target computers are evaluated according to all chosen report options. The results, along with the calculated scores and the overall pass result, are stored in Absolute Manages internal Compliance Report database table and can be displayed in the Compliance Reports window.
Custom information
In addition to Absolute Manages extensive list of predefined information items, you can create your own custom information fields to support special requirements. The data for these custom information fields is gathered by the agents and transmitted to the server together with standard inventory information. Preparing and using custom information fields is a multi-step process: 1. First, you define the fields on the server. Fields can be either manual or dynamic. Data is entered manually into manual fields or it is imported from text files. Defining a dynamic field involves specifying scripts or other data sources for Mac OS X and Windows clients that will be evaluated on the administered computers to gather the desired information. The return values are used as the dynamic custom fields values. Creating either type of custom information field is described in Defining custom information fields on page 79. 2. If desired, you can share custom information fields among multiple Absolute Manage Servers. This is done by setting servers up to not keep their own field definitions but mirroring those of a specified other server. Details are available in Setting up custom information field mirroring on page 83. 3. Then, assign the custom information fields to agents. Custom information fields can gather information only from agents to which they are assigned.
Absolute Manage User Guide 78
This is described in Assigning custom information fields on page 84. 4. If desired, import data for manual information fields from text files. This is described in Importing data into custom information fields on page 87. 5. Finally, insert the custom information fields in browser windows in the same way as standard information items. This is described in Using custom information fields on page 86. 6. Optionally, you can export or import the definitions of custom information fields. This is described in Exporting and importing custom information field definitions on page 89. To gather the information for a dynamic custom information item, Absolute Manage evaluates the specified data sources on the assigned administrated computers.
Custom information fields are defined on the Absolute Manage Server, making them available to all administrators. To define a custom information field: 1. Open the Server Center window.
2. Choose Custom Information Fields > New Custom Information Field from the action menu.
79
Custom information
The Custom Information Field dialog is displayed in the main part of the Server Center window:
3. Enter a name and a description for the new custom information field. The description will be displayed as a tooltip for the field. 4. Specify whether the field is to be a manual or a dynamic field: Manual fields are for humans to individually enter data into. (Although data can be imported from external text files, as described in Importing data into custom information fields on page 87.) Dynamic fields receive their data from automated sources such as scripts or registry entries on the client computers. They behave much like standard information items.
5. Specify whether the custom information filed is intended for desktop devices or mobile devices. Dynamic fields can only be used for desktop devices; custom fields intended for mobile devices must be manual fields. If you chose Mobile as the device type, an additional field is displayed in which you can enter a variable name. This variable can then be used in configuration profiles in the form ${<VariableName>}. 6. Specify the desired data type of the field:
80
String: Any unformatted text Number: Any number. You can choose from several display formats. Boolean: True or false Date: A point in time File Version: A version number according to the conventions of the target platform IP Address: An IPv4 address (e.g., 192.168.0.1) Enumeration: A value from a predefined list. Specify the list of possible values using the + and - buttons. (All values are treated as strings.)
Enumeration is not available for dynamic fields; choose String instead. 7 . If you have specified a manual field, continue with step 13
8. Decide on when the data sources should be evaluated: When they are to be executed only when a full inventory report is made, check the Execute only when sending full inventory option. Note: Full inventory reports are made by the agents when they are first contacted by a server, when they start up, or when they are sent the Gather Inventory Information command with the Force full inventory option. When the scripts are to be executed every time the inventory is updated, uncheck the option.
Having data sources evaluated only for full inventory reports is especially useful in the case of scripts taking a long time to run, involving user interaction, or gathering information that changes only rarely. 9. If you want execution errors to be returned, check the Return execution errors as result option. This will cause the agents to send any execution errors of a script as if they were the actual results. These values are then stored normally in the custom field. If the option is unchecked, no values are returned in case of execution errors and the field remains empty. 10. If the entire result is to be stored as a single line of text in the field, check the Replace line feeds with spaces in result data option. 11. If you want the custom field to always be available for all client computers (much as built-in information items are), check the Automatically assign to all computers option. If this option is unchecked, you have to assign the field manually to computers, as described in Assigning custom information fields , below. This allows you, however, to give each computer only applicable fields, which may be useful if you have a large number
81
Custom information
of fields that each is relevant only for a subset of the administered computers. 12. Specify the scripts, other programs, or other data sources that are to be executed by choosing the desired option from the Data Source pop-up menu. Data sources are specified separately for Mac OS X and Windows computers; each platform is optional but at least one must be specified. Because of limitations in the Windows operating system, it is not possible to specify programs with the Other Executable type for Mac OS X clients in Absolute Manage Admin for Windows. You can, however, edit custom information fields with this specification in Absolute Manage Admin for Windows as long as you do not change the executable (or change it to one of the script types). Depending on the type of data source you specify, different options become available. These options are described in New Custom Information Field on page 478. Note: Any executables you specify must be available on your computer either locally or on a mounted server volume when you define the field. They do not need to be available later outside of the Absolute Manage system, as they are stored on the Absolute Manage Server. The line endings of any specified scripts are automatically converted to the conventions on the target platform during the upload to the Absolute Manage Server. (However, Absolute Manage does not convert line endings in any additional files that are upload as a consequence of you checking the Transfer all files in folder containing the executable option.) 13. If desired, create additional custom information fields. 14. From the Server menu, choose Save Custom Information Fields to upload the new field definitions to the Absolute Manage Server. Absolute Manage Admin uploads the field definition and the specified scripts or executables, if any, to the Absolute Manage Server. The new custom information fields are available in the Agent Information > Custom Fields section of the Information Items window. New dynamic custom information fields are used to actually gather information only if you have checked the Automatically assign to all computers option in step 11. Fields for which this option is not checked must be assigned to agents as described in Assigning custom information fields below. (This does not apply to manual custom , information fields, which are always assigned to all computers.)
82
You can set up Absolute Manage Servers so that they receive their custom field definitions from a different server. To make a server mirror another servers custom information field definitions: 1. Make sure that you are connected to the server that you want to set up as a mirror. If you are not, use the Switch Administrator and Server command to connect to it. 2. Open the Server Center window. 3. Click the Server > Server Settings category in the sidebar.
83
Custom information
The General pane of the Server Settings dialog is displayed in the main part of the Server Center window:
4. In the Use custom fields from server field, enter the DNS name or IP address of the server that is to be mirrored. If the server communicates over a non-standard admin port, change the port accordingly. The description will be displayed as a tooltip for the field. 5. From the Server menu, choose Save Server Settings to upload the new settings to the Absolute Manage Server. Absolute Manage Admin uploads the settings. This overwrites any custom field definitions that are currently in effect on the server and overwrites them with the definitions from the specified server. In future, changes on the mirrored server will automatically update this server.
Absolute Manage gathers information for dynamic custom information fields only from computers to which these fields have been specifically assigned. Only fields with the Automatically assign to all computers option checked (and manual custom information fields) are assigned automatically; all other fields have to be assigned manually according to this procedure. Not assigning fields automatically can have two benefits: First, scripts do not need to be executed on computers for which you are not interested in the information they produce. And second, you can use scripts that may not be compatible with all administered computers sharing a particular platform.
84
To assign a custom information field to computers: 1. Make sure that the custom information field has been defined, as described in Defining custom information fields on page 79.
2. In any browser window, select the computers to which you want to assign the field. Note: For information on specifying groups as targets, see Targets on page 281. 3. From the Commands menu, choose Agent Settings. The Agent Settings dialog is displayed. 4. Click the Custom Fields tab:
5. Check all fields that you want to assign to the target computers and uncheck all fields that you do not want to be assigned to them. The assignment status of fields with the checkbox in the third state ( ) remains unchanged. 6. Click Execute. The checked fields are assigned to all computers in the target list. From now on, information from these fields is gathered from the target computers (either with each inventory update or only with full inventory reports, as specified in the fields definitions). The assigned fields are also displayed when the single computer view of one of the target computers is opened in a browser window as described in Displaying an overview of a single computer on page 102.
85 Absolute Manage User Guide
Custom information
Custom fields are used like normal information items. Desktop custom fields are listed in the Agent Information > Custom Fields section of the Information Items window and can be used in browser windows like standard information items. (This is described in Displaying information on page 100.) Remember, however, that dynamic custom fields gather information only from computers to which they have been explicitly assigned, as described in Assigning custom information fields on page 84. Custom fields for mobile devices are listed in the Mobile Device Information > Custom Fields section of the Information Items window. They are always manual information fields, not dynamic, and so do not need to specifically be assigned to devices.
2. Right-click any of the selected computers and choose Enter Custom Field Data from the context menu. The Edit Custom Field Data dialog is displayed:
3. If you want to remove the content of a manual custom information field on all selected computers, click the Remove button in the row representing that field.
86
4. If you want to edit the content of a field, click in the Field Data column in the row of the field and enter the desired content. 5. Repeat step 3 or step 4 for other fields as desired. 6. Make sure that all fields that you want to modify for all selected computers are checked in the Modified column and all others are unchecked. Note: The Modified column is not displayed if only one computer was selected before the dialog was opened. 7 . When you are done, click OK.
Absolute Manage updates the content of the manual custom information fields on the selected computers.
You can import data from text files into manual custom information fields. To import data into custom information fields: 1. From the File menu, choose one of two commands, depending on the kind of custom information fields into which you want to import data: To import into custom information fields for desktop devices, choose Import Custom Field Data for Desktop Devices. To import into custom information fields for desktop devices, choose Import Custom Field Data for Mobile Devices.
The operating systems Open dialog is displayed. 2. Choose the desired text file and click Open. The text files must delimit records with returns and fields within records with tabs, commas, or semicolons. Absolute Manage supports all common text encodings.
87
Custom information
When you click Open, the Import Custom Field Data dialog is displayed:
3. If you have saved a fitting setup, choose it from the Use setup popup menu. 4. Specify the format and encoding in the respective pop-up menus. Absolute Manage usually detects these parameters automatically, but you can override it. 5. If the import file contains field names in the first row, check Dont import first row. 6. Click the Custom Fields tab and drag each custom field into which you want to import data to the column in the import file (displayed in the Import data preview section of the dialog) that you want to import into the field. If you have dragged a field onto the wrong column, you can remove it by clicking the button in the column title or right-clicking the column (not the title) and choosing Remove Field. 7 . Click the Key Fields tab and drag the information item that Absolute Manage is to use to assign import records to database records onto the column that Absolute Manage is to use for this purpose. During the import process, Absolute Manage will, for each import record, take the value from the column that you specified (by
88
dragging the field on top of it) and find the database records that contain the same value in the key field you specified. The values from the other fields in the import record are then imported into the specified fields (from step 6) of the database record, overwriting any previous content. It is possible for multiple database records to match the value from the import record, in which case the import values are imported into the fields of all matching database records. (This can be a powerful tool to quickly update many client computer records.) The specified column in the import file, on the other hand, must be a true key field. That is, no two import records may contain the same value in this column. If they do, no data is imported. If you have dragged the field onto the wrong column, you can remove it by clicking the button in the column title or rightclicking the column (not the title) and choosing Remove Field. 8. If you want to reuse the settings you made, save them as a preset using the Save As command from the Use setup pop-up menu. 9. Click Import to perform the import. Absolute Manage imports the data from the import file into the specified manual custom information fields according to your settings. Any previous content of these fields is overwritten.
You can export the definitions of custom information fields and import them. Note that you can also export or import all custom field definitions together with the server settings. This is mostly useful when migrating a server from one computer to another. See Exporting and importing server settings on page 64 for details.
2. Right-click in the sidebar and choose Custom Information Fields > Export Selected Fields from the context menu. The operating systems Save dialog is displayed. 3. Choose a name and location for field definition file and click Save. Absolute Manage exports the field definitions to the specified file.
89
You can also drag the fields from the Server Center window to the desktop.
Information can be stored in client information fields in two ways: By the administrator, using Absolute Manage Admin. By the local user, using the Absolute Manage control panel. This access can be prevented, as described below in Configuring local access to client information fields on page 94.
90
Displaying the information is likewise possible for both the administrator and the local user. (It is not possible to prevent the local user from viewing client information fields contents.)
4. Make the desired changes to the fields contents. 5. Click Execute. The fields contents are set on all selected computers. Editing client information fields locally on the administered computer requires an admin password for the computer as well as the fields to be unlocked for local modification (as described in Configuring local access to client information fields on page 94).
91
To edit client information fields locally: 1. On the administered computer, open System Preferences and click the Absolute Manage Agent preference pane.
3. Click the lock icon at the bottom left to unlock the preference pane and enter an administrator account name and password for the computer (not for Absolute Manage) when so prompted. 4. Make the desired changes to the fields contents. 5. Close the preference pane.
92
By default, client information fields have generic names. There is no need to rename them to use them; however, you may want to do so to indicate the kind of information that is stored in a field. To set the name of a client information field: 1. In the Server Center window, click the Server > Server Settings category. The Server Settings dialog is displayed. 2. Click the Client Info Titles tab:
3. Enter the desired names for the ten fields. 4. Click OK. The new names are sent to the server; all agents connected to this server now use these field names. NOTE If multiple inventory servers are specified for an agent, it uses the client info titles of the first one in the list in the Servers pane of the Agent Settings dialog. (For more details, see Servers on page 284.) The information items that display the fields contents are also renamed, as noted in Client Information 1 10 on page 527.
93
By default, local users of administered computers can edit the contents of client information fields through the Absolute Manage Agent preference pane. If desired, you can prevent them from doing so. To enable or disable local editing of client information fields: 1. In any browser window, select the computers that you want to configure. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Agent Settings. The Agent Settings dialog opens. 3. Click the Client Information tab:
4. To prevent local users from editing client information fields, check the User cannot modify client information option. To allow local users to edit the fields, uncheck the option. 5. Click Execute. The fields are locked or unlocked as specified on all selected computers.
94
requiring any manual interaction or configuration. (There are, indeed, no configuration options for data storage.) The gathered software can be made available to other tools by exporting it. There are three principal ways of doing so: Manual export to XML, HTML, or text files. This is described in XML, HTML, and text export on page 95. Periodic automatic export to an ODBC database, as described in ODBC export on page 95. Periodic automatic export to Microsoft System Management Server (SMS). This requires the Absolute Manage SMS Integration add-on module and is described in that modules documentation.
Absolute Manage also offers backup and maintenance functions: Automated database backup and maintenance. This is described in Configuring database backup and maintenance on page 97. Deleting unneeded information from the server. This is described in Deleting information from the server on page 99.
You can export information that is being displayed in an Absolute Manage window to a range of common exchange formats: HTML Comma-separated text (CSV) in two variants Tab-delimited text XML (using a custom structure)
The process is the same in each case: 1. Make sure that the information you want to export is displayed in a window. This includes both the desired records (computer, files, etc.) and the desired columns. 2. From the File menu, choose Export. The operating systems Save dialog opens. 3. From the dialogs File Format pop-up menu, choose the desired format. Specify a name and location for the export file and click Save. The data from the window is exported in the specified format to the specified location.
ODBC export
Absolute Manage Server can automatically export data from its database at specified intervals over an ODBC connection, allowing the
95
target database to be used for a range of applications such as logging, backup, or reporting.
Please see the documentation of the database or the ODBC driver for details on installing and configuring this software. NOTE While Absolute Manage is expected to be compatible with a wide range of ODBC software, it has currently only been tested with MySQL and the MyODBC driver. We cannot guarantee compatibility with other databases and drivers.
96
Database type: The kind of database management system connected via ODBC. Data source name (DSN): The name of the data source as defined in ODBC. Database server address: The IP address or DNS name of the database server. Database name: The name of the database on the server in which the information from Absolute Manage is to be stored. Database username: The database account that Absolute Manage is to use to store the data. Database password: The password for the database user account. Database password verification: Repeat the password here to guard against typos. Export interval: The desired interval in which Absolute Manage export data to the database.
Note: Apart from the data source name, you can leave all fields empty if the corresponding information is specified in the data source. 4. Click OK. The settings are stored on the server; the export is initiated immediately and in the specified interval from then on.
Absolute Manage lets you configure the databases backup and maintenance options. To configure the options: 1. In the Server Center window, click the Server > Server Settings category.
97
2. If you want Absolute Manage to automatically perform database maintenance, check the Run database maintenance option and specify the desired interval and time of day. Database maintenance involves eliminating empty blocks from the database file on disk and performing a full consistency check on the database. 3. If you want Absolute Manage to perform automatic database backups, check the Backup database option and specify the desired interval, time of day, and number of backup generations to keep. The Absolute Manage Server database is located in the /Library/ Application Support/LANrev Server folder on Mac OS X-based servers and in C:\Documents and Settings\All Users\Application Data\Pole Position Software\LANrev Server on Windows. Backups are located in the same folders, in subfolders with the suffix .dbbackup, .dbbackup1, .dbbackup2, etc. for the successive backup generations. 4. If you want to immediately perform the database maintenance or create a database backup, click the appropriate Run Now button. 5. Choose Save Server Settings from the Server menu. Absolute Manage performs the specified operations on the server until the settings are edited again.
98
Occasionally, you may have collected a significant amount of information that is no longer needed. To prevent this information from taking up space and processing power on the server, you can delete it manually.
2. Right-click the records and choose Remove from Server from the context menu. A confirmation alert is displayed. 3. Click OK. Absolute Manage removes all selected records (along with any associated data, such as inventory information for computer records) from the server. This operation cannot be undone; however, you may recreate the records, e.g., by performing a file search to recreate file records.
3. Check all the types of information that you would like to remove and click OK. Absolute Manage removes the specified types of associated data for all selected records from the server. This operation cannot be undone;
99 Absolute Manage User Guide
Displaying information
however, you can gather the deleted data anew using the Gather Inventory Information command.
Displaying information
When information on administered computers has been found by the Absolute Manage Agents and stored on the Absolute Manage Server, it can be displayed in the administrator application. This is done in browser windows. Browser windows are, basically, tables in which each row represents a computer or other monitored object (file, font, process, etc.), and each column an information item, i.e., a database table column. They also let you search for, filter, and sort objects, and provide a way to display an overview of information on a single computer. NOTE Details on the elements of browser windows are found in Browser windows on page 362. Details on displaying information are available in: Opening and configuring browser windows on page 100 Displaying an overview of a single computer on page 102 Controlling information display from a URL on page 104 Searching, filtering, and sorting on page 106
100
NOTE If the Columns drawer is not displayed, you can open it by choosing Configure Columns from the View menu. No particular action is required from you to display data in the columns you have added; this is done automatically as long as the data is available on the Absolute Manage Server. Note, however, that some types of data are not collected automatically and must be requested manually, as described in Gathering information on page 67. You can rearrange the groups in the sidebars of most browser windows by dragging them. You can also drag custom smart groups but not built-in ones such as Macs only between browser windows and the Server Center window.
Each Absolute Manage browser window can contain multiple tabs. Absolute Manage tabs are analogous to Web browser tabs: The content of each of them is independent of the others; the sizes of all tabs in one window are the same; all tabs in one window always move together on the screen.
101
Displaying information
2. Enter the desired name and click OK. The new tab appears in the window. NOTE Tabs can only be added to browser windows, not to other types of windows.
Renaming a tab
To rename a tab: 1. From the File menu, choose Rename Tab. The Rename Tab dialog is displayed, which looks similar to the New Tab dialog shown above. 2. Edit the name as desired and click OK. The name of the tab is changed.
Rearranging tabs
You can rearrange tabs (changing their order in their window) by dragging them by their titles.
Closing tabs
To close a tab, either click its close icon Close Tab from the File menu. or make it active and choose
While browser windows normally display a range of information items for a large number of computers, it can also display a complete overview of a single computer. To display an overview: 1. In the Groups & Computers sidebar of any browser window, open a group that contains the desired computer and click on the computer.
102
2. To see more detailed information, open the computer in the sidebar to display a range of information item categories. Click the desired category to display the respective information. 3. To revert to the normal tabular display, click on any group in the sidebar. NOTE If the Double-clicking a computer option in the Preferences dialog is set to Display detail view you can also double-click a computer to , view the details.
Any configuration changes you make in these display panes affect all other computers with the same operating system platform (Windows or Mac OS X). Saving the browser window (as described in Saving configured browser windows on page 101) also saves these configuration changes.
103
Displaying information
In addition to the standard selection of information to display via the graphical user interface, Absolute Manage also lets you specify computers to display via a URL. You can construct a URL to display information on a particular computer in Absolute Manage using this syntax: lanrevadmin:// showagent?<field>=<value>. <field> is the information item by which you want to find the desired computer. It can have any of these values (the value being the first word, with the full name of the information item added in parentheses): agentip (Agent Active IP) agentserial (Agent Serial Number) computername (Computer Name) agentname (Agent Name) computerserial (Computer Serial Number) primarymacaddress (Primary MAC Address) adcomputername (AD Computer Name) clientinfo1 (Client Information 1 10) clientinfo2 (Client Information 1 10) clientinfo3 (Client Information 1 10) clientinfo4 (Client Information 1 10) clientinfo5 (Client Information 1 10) clientinfo6 (Client Information 1 10) clientinfo7 (Client Information 1 10) clientinfo8 (Client Information 1 10) clientinfo9 (Client Information 1 10) clientinfo10 (Client Information 1 10) computerservicetag (Computer Service Tag) currentuseraccount (Current User Account) currentusername (Current User Name) customagentname (Custom Agent Name) mainboardassettag (Mainboard Asset Tag) mainboardserial (Mainboard Serial Number) osproductid (OS Product ID) osserial (OS Serial Number) securityid (Security Identifier) systemenclosuretag (System Enclosure Asset Tag) systemenclosureserial (System Enclosure Serial Number) <value> is the value to search for.
Calling the URL causes Absolute Manage to search the specified field for the specified value and display a single-computer overview of the found computer. For example, the URL lanrevadmin://showagent?computername=My%20Computer displays the computer with the name My Computer in the single-computer overview in Absolute Manage Admin.
104
Absolute Manage Admin must be installed on the computer on which the URL is called. If it is not running, it is started automatically. NOTE With some of the available fields, there may be more than one matching computer. If this happens, Absolute Manage displays the first computer matching the specified criteria.
3. Press return and close the page. 4. Quit Chrome. 5. Open the Local State file with a text editor. This file is found in different locations, depending on the operating system: Mac OS X: /Library/Application Support/Google/Chrome/ Windows XP or Windows Server 2003: C:\Documents and Settings\<username>\Local Settings\Application Data\Google\Chrome\User Data\ Windows Vista, Windows Server 2008, or Windows 7: C:\Users\<username>\AppData\Local\Google\Chrome\ User Data\
105
For information on where to find the Local State file on other platforms, please see the Chrome help. 6. In the protocol_handler section, excluded_schemes subsection, add this line (including quotes and comma):
"lanrevadmin": false,
7 .
You can now use lanrevadmin:// URLs in Chrome like in other browsers.
All these methods can be combined to present the information in the browser window. They are described below in: Searching in browser windows on page 106 Creating groups on page 107 Sorting browser windows on page 110
To search for specific text in browser windows: 1. Enter the text in the Search Records field in the toolbar:
2. Press Return. Absolute Manage searches the currently displayed records, hiding all that do not contain the text in the information items in the browser window. By default, all columns are searched. If you want to search just one particular column, choose that column from the pop-up menu before pressing Return.
106
Creating groups
Groups in browser windows are collections of administered computers. They allow you to view a subset of all managed computers with just one click. There are two kinds of groups: (Standard) groups are much like file folders: To include a computer in a group, you add it manually; to take it out again, you manually remove it. Smart groups are not so much collections of specific computers but descriptions of what kind of computers you want to include in a group. They are defined by selection criteria and at any time dynamically display those computers that meet the criteria in that instant. Inclusion and exclusion of computers is automatic. For example, you could define a smart group to include all computers with less than 512 MB of memory. When a computers RAM is updated to more than that amount, Absolute Manage automatically removes it from that group. In standard browser windows, there are three predefined smart groups for all computers, Mac OS X computers, and Windows computers. In specialized browser windows, e.g., the Server Center window, additional or different smart groups may be predefined.
You can use both kinds of groups as command targets by dragging them into the target area of the respective command window. When a command is saved for later execution, the target computers are the members of the groups at execution time, not the computers that were members of the groups when the command was saved. When smart groups are command targets for repeating commands, Absolute Manage re-evaluates for each repetition which computers belong to the group. In other words, a computer that was a command target because it met the group criteria may not be a target in the next execution because it no longer meets the criteria, and vice versa. NOTE For performance reasons, the group membership is evaluated periodically, as opposed to constantly. Therefore, computers may fail to be included as a command target if they start meeting the smart group criteria very shortly before the command execution, or they may be included even though they started failing to meet the criteria immediately before command execution.
107
2. Enter the name of the new group and click OK. 3. To add computers to the group, drag them from the table (not from other groups in the sidebar) into the group. 4. To remove computers from the group, display the group, right-click the computer, and choose Remove from Group from the context menu. Note: Computers cannot be individually removed from smart groups.
2. Enter the name for the new group and define the conditions that computers must meet to be included in the group. To define a condition, specify an information item in the left-hand text field you can use any information item listed in the Information Items window choose a comparison operator from the pop-up menu, and enter a comparison value in the right-hand text field. (For some information items, there is no comparison value.) When the text insertion mark is in a field, you can drag a column from the Columns drawer into the field. With the + and buttons, you can add and remove conditions. 3. If you have specified more than one condition, specify through the upper pop-up menu whether computers must meet one or all of the conditions.
108
4. Click OK.
Editing groups
To rename a group, select it and choose Rename Group from the action menu. To edit the definition of a smart group, select it and choose Edit Smart Group from the action menu. Adding computers to a standard group and removing them is described above in Creating a (standard) group on page 107.
Deleting groups
To delete a group, select it and choose Remove Group from the action menu.
109
Transferring groups
Groups can be exported and imported by means of the Export Groups and Import Groups commands. Export Groups stores all groups and smart groups (but not special categories such as License Specifications from the Server Center window) from the front-most window in one file. Import Groups inserts all groups from the selected file into the frontmost window. Existing groups remain unaffected. You can directly transfer groups between windows by dragging and dropping them.
Exporting groups
To export selected groups and smart groups from the front-most window: 1. From the File menu, choose Export Groups. A standard Save dialog is displayed. 2. Give the file a name, choose a storage location, and click Save. The definitions of the selected groups and smart groups (but not special categories such as License Specifications from the Server Center window) from the front-most window are saved in the file. Using an alternative method: Select the groups you want to export and drag them to the desktop.
Sorting by a column
To sort the window by a column, double-click the columns title. The column is made an additional sorting column: If this is the first sorting column, the records are sorted by this column. If there already are sorting columns, the double-clicked column is added as the next-lower sorting column. This means that all records that sort the same according to the existing columns are sorted by the newly added column. For example, when sorting by the first column only results in: 1 3 4 1 2 4 1 3 1 2 1 3 additionally sorting by the second column creates:
110
1 1 1 2
2 3 3 1
4 4 1 3
A sorting column is indicated by a small triangle in its title. The order of the sorting columns is indicated by the shading of the triangles: Primary sorting column Second column Third column Subsequent columns (these are not visually differentiated any more)
Removing sorting
If you want to stop sorting the table by a particular column, double-click its title with the Command key held down.
111
Chapter 5
Controlling computers
You can use Absolute Manage to control administered computers in several ways. On a basic level, you can restart them, shut them down, wake them up, or put them to sleep, as well as send them messages. You can also execute various files that are either present locally on the administered computers or on your workstation, and you can terminate processes. This is discussed in detail in: Sending messages on page 112 Restarting, shutting down, and sleep on page 114 Remotely controlling computers on page 119 Controlling Time Machine on page 122 Tracking computers on page 122 Executing files from your computer on page 126 Executing local files on page 129 Terminating processes on page 130 Working with services on page 131 Editing the registry on page 133 Environment variables on page 134
Sending messages
You can send messages to administered computers, e.g., to advise employees of upcoming administrative actions. NOTE While there is no dedicated facility for letting users answer to your messages, you can add a Cancel button to message dialogs. Because the agents report which button a user has pressed to dismiss the dialog and this information is noted in the command history, you can use this function to ask simple yes/no questions.
NOTE Sending messages to iOS devices requires a different process, which is described in Sending a message to mobile devices on page 136. To send a message to administered computers: 1. In any browser window, select the computers to which you want to send the message. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Send Message.
112
Controlling computers
3. Enter the desired message. Note: To insert a line break, press Option-Return. 4. Set the message options: When you want to make sure that the dialog does not remain on screen indefinitely when there is no user present, specify an interval after which the message is closed automatically. The dialog is closed as if the user had clicked OK. (The timeout is, however, noted in the log.) When you want the users to be able to express nonacceptance, add a Cancel button. (There is always an OK button.)
If a user dismisses the dialog by clicking on the Cancel button (if any), you can see this in the Command Error Info column in the Commands window.
113
3. Choose the desired action from the pop-up menu. Note: When you try to put to sleep a Windows computer, Absolute Manage first tries to hibernate it. If that is not supported, it tries to put it into stand-by mode. If the computer does not support this mode either, the command fails with an error log entry.
114
Controlling computers
4. If you want the user to be able to save any changes to open documents, check Allow user to save open documents. If this option is unchecked, restarts and shutdowns are hard, i.e., any running processes are killed immediately. 5. If desired, enter a message that warns the users. The relevant options are described in Sending messages on page 112. 6. Click Execute.
Waking up computers
Administered computers can be woken up only if Wake on LAN is enabled on them. How this function is enabled differs between systems. Depending on your system, you will find the required information in the documentation of the operating system, of the computer or motherboard, or of the LAN card. NOTE Usually, you find the required setting in the Energy Saver control panel on Mac OS X computers or the network adapters hardware properties on Windows systems. Waking up computers is possible across subnets as long as an Absolute Manage Server or Absolute Manage Agent is running (active) in the target subnet. To wake up administered computers: 1. In any browser window, select the computers that you want to control. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Wake Up. The Wake Up dialog opens. It contains no command-specific options. 3. Click Execute.
You can set schedules for all power management events. Events can be scheduled to occur at specific times or after a certain period of inactivity. A report on the effects of the power management is available, as described in Displaying a power usage report on page 118.
115
3. Click the + button to create a new schedule. 4. Enter a name for the new schedule in the Name field. 5. From the Settings for pop-up menu, choose the power modes to which the schedule applies. 6. From the Action pop-up menu, choose the event that is to occur when the schedules trigger fires. For details on the available options, see Power Management Settings on page 288.
116
Controlling computers
7 .
From the Trigger pop-up menu, choose the trigger that initiates the chosen action. You can choose between a specific time or a certain period of inactivity. When you have chosen After Inactivity Of, specify the interval in minutes.
8. Use the When checkboxes and radio buttons to specify the time of the day and days of the week when the schedule is active. The specified action can occur only on the chosen dates and hours of the day. 9. If desired, add more schedules as described in step 3 through step 8 or delete schedules as described below. 10. Click Execute. All schedules listed in the command dialog are applied to all specified target computers. If any schedules were active on the computers before, they are removed.
Deleting a schedule
To delete an existing schedule, select it in the Power saving schedules list and click the button. To remove all schedules from a computer, empty the list and execute the Power Management Settings command.
Saving schedules
You can save schedules as profiles that can be easily recalled to be applied to target computers. To save all schedules currently listed in the Power saving schedules list as a profile, choose Save As from the Profile pop-up menu and enter a name for the profile. The new profile is added to the Profile pop-up menu. To rename a profile, choose it from the Profile pop-up menu. Then choose Rename from the Profile pop-up menu and enter the new name.
117
To delete a profile, choose it from the Profile pop-up menu. Then choose Delete from the Profile pop-up menu.
2. In the windows sidebar, select the computer group on which you want to create a report. 3. Enter the desired report period in the Calculate power consumption between fields. 4. Enter the time the computers would have been running without power management schedules in the Baseline usage field.
Absolute Manage User Guide 118
Controlling computers
This is the average number of hours that you think a managed computer would have been running during the report period. 5. Enter the amount of money you pay for power in the Energy costs field. 6. Click the Update Report button. The actual and baseline values and savings are displayed in the report window and visualized as a graph. Details regarding the displayed information is available in Power Usage Reports on page 352. NOTE The power consumption of the various devices is set in the Power Consumption preference pane.
Supported applications
Absolute Manage supports these screen sharing applications: Apple Remote Desktop 3 (guest and host: Mac only) DameWare (guest and host: PC only) Mac OS X Screen Sharing (guest: any Mac or PC with a VNC client; host: Mac OS X 10.5 and later only) MS Remote Assistance (guest and host: PC only) PC Anywhere (guest and host: PC only) Remote Desktop: CoRD (guest: Mac only; host: PC only) MS Remote Desktop (guest: Mac or PC; host: PC only) SSH (guest and host: Mac only) Timbuktu (guest and host: Mac or PC) Timbuktu secure (guest and host: Mac only) VNC: Chicken of the VNC (guest: Mac only; host: Mac or PC) JollysFastVNC (guest: Mac only; host: Mac or PC) Real VNC (guest: PC only; host: Mac or PC) Tight VNC (guest: PC only; host: Mac or PC)
119
Ultra VNC (guest: PC only; host: Mac or PC) Note: VNC is cross-platform; you can combine any of the above VNC implementations as guest and host applications. NOTE Guest in the above list refers to the platforms on which the software runs as an observer, host indicates the platforms that can be observed. For example, using MS Remote Desktop, you can observe or control a PC from a Mac or a PC.
120
Controlling computers
4. Arrange the various supported applications in the list in the order in which you would like to prefer to use them by dragging them. Note: If a remote control connection to a given client is possible with more than one protocol, Absolute Manage uses the one that is highest in the list. For example, if your list looks like the one in the screenshot above and one client could be controlled through both MS Remote Desktop and VNC, Absolute Manage uses MS Remote Desktop. 5. For each protocol that you intend to use, select it in the list and enter the default username, password, domain, and port. Some of this information cannot be specified for all protocols. 6. Close the window.
2. Right-click the selected computer and choose Remote Control. Absolute Manage compiles a list of all suitable protocols (i.e., all supported protocols for which there is a control application on your computer and client software on the target) and chooses the one that is highest in the list of protocols in the Preferences dialogs Remote Control pane. If Absolute Manage is unable to find suitable client software on the target computer, it displays a dialog (similar to the one described above) in which you can manually specify a protocol and settings to use to connect to the client in question. 3. When a suitable connection setup has been found either automatically or manually Absolute Manage prompts the applicable control application on your computer to open a remote control connection to the target. You can then use the applications full capabilities to control the target computer. Note: For details on the applications capabilities, please see their respective documentation. Note: Some remote control applications do not accept passwords from other software. When using one of these applications, you need to re-enter the password in the application, even when you have already provided it in Absolute Manage.
121
This works just like displaying information for a computer via a URL, as described in Controlling information display from a URL on page 104, except that the command is remotecontrolagent instead of showagent . For example, the URL lanrevadmin://remotecontrolagent?computername=My%20Computer launches a remote control session with the computer named My Computer as the host.
To control the operation of Time Machine: 1. In any browser window, select the computers on which you want to control Time Machine. Only target computers running Mac OS X 10.5 or later will be affected by this procedure. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Time Machine. The Time Machine dialog opens:
3. Choose the desired action from the pop-up menu. 4. Click Execute.
Tracking computers
You can use Absolute Manage to track the current locations of mobile computers.
122
Controlling computers
This capability called TheftTrack is largely automatic; it requires minimal configuration and is thereafter available whenever needed. For information on tracking the locations of mobile devices, see Geotracking mobile devices on page 171. NOTE Absolute Manages computer tracking is not a comprehensive theft prevention or retrieval solution and should not be considered as such. (For example, thieves could circumvent it by reformatting the computers hard disk.) This feature can, however, be an important part of a larger comprehensive system that you set up.
NOTE Computer tracking can be set and altered only by administrators with the Change Computer Tracking right. See New Administrator on page 471 for details.
123
Tracking computers
The server settings are displayed in the main part of the window.
Note: The Server Setting command is available only to administrators with the Change Server Settings right. See New Administrator on page 471 for details. 2. In the dialogs General tab, set the agent port to a different number than the admin port. This separation of the ports is necessary so that the admin port can remain inaccessible from the Internet. 3. If you want to keep the data generated while tracking computers for only a limited time, check the Discard computer tracking data after option and enter the desired number of days after which Absolute Manage is to delete data. 4. Click OK to save the new server settings. 5. In your firewall, open the port that you have specified as Absolute Manage Servers agent port. You have now set up Absolute Manage Server so that it can receive information from agents even if they are located outside of your organizations network, as long as they are connected to the Internet. NOTE The Absolute Manage Server will not accept administrative requests over the agent port. Only agent communication is possible over that port. (This does not apply if both ports are identical.)
124
Controlling computers
2. Right-click the computer and choose Computer Tracking from the context menu. The Computer Tracking dialog opens:
3. To track the computer, check Track selected computers. If you want the computer to transmit screenshots, check that option as well. 4. Click OK. Absolute Manage immediately starts tracking the computer and continues to do so until you disable tracking. NOTE Tracking can be enabled when the computer is already outside your network but requires one contact between the agent and the Absolute Manage Server to actually begin.
125
To get information on an individual computer, open that computers detail view as described in Displaying an overview of a single computer on page 102 and click the Computer Tracking category. If you have set the tracked computer to take screenshots, they are displayed here as well. The context menu of the screenshot lets you view it in a separate window or Preview or copy it to the clipboard. In an exported HTML or XML file To get information on all tracked computers in an exported file, list all computers which you want to include in the file in a browser window and choose Export from the File menu. Choose either of the two TheftTrack Report options form the File Format menu in the Save dialog.
You can use the information displayed by Absolute Manage for taking appropriate steps to physically locate and retrieve the computers. You can also send commands to the tracked computer (e.g., to execute shell scripts), even if is located behind a firewall. Commands that you send are queued and executed when the tracked computer sends the next heartbeat signal.
Controlling computers
The command dialog opens. The individual dialogs are described below. 3. Set the desired options, as described below. 4. Click Execute. The file is copied to the target computers, executed there, and removed when the execution has been completed.
Script
Enter a script text in the Text field or select a text file containing a script file. If you enter a script text or choose an uncompiled text file, you must make sure that the text conforms to the respective syntax. In the case of AppleScript text entered directly, the Check Syntax button can help you. Note: When you specify scripts that are intended for other computer platforms than the one you are using, Absolute Manage automatically converts the scripts line endings to the convention required by the target platform. This does not apply to auxiliary files uploaded by means of the Transfer all files in folder containing executable option described below. If desired, specify command line options for the script. Absolute Manage provides these options to the script on the target computers according to the respective script architectures conventions. You can include shell variables in the options, as described in Environment variables on page 134. By default, any results the scripts return can be viewed in the command history. To have the results be displayed in their own windows upon script completion, check the Automatically view results option. To view the results from all target computers together in a single window, also check All results in one window. If the script must be executed with the privileges of an (operating system) administrator, check the Executable requires administrative privileges option. Note: Checking this option does not change the user account in which the script is executed, it merely gives the script more privileges. This is similar to the authorizing of installer applications by supplying an administrator password. Except for AppleScript scripts, choose the user context in which the script is to be executed either in the account of whatever user is currently logged in, with a system account, or in a specified account. In the latter case, the specified account must exist on all target computers. Note that scripts that access other applications need these applications to be present on the target computers and have the same names there. If applications are missing or have different names, script execution will fail.
127
If the script relies on additional files that must be transferred to the target computers, put them in the same folder and check the Transfer all files in folder containing executable option.
Details on the elements of the command dialog are available in Execute Script on page 303.
Macintosh application
Select the desired application using the Select button. Choose the installation volume. Specify the user account, as described above in Script . Specify the execution method whether to copy the file from your computer or from a server, and in the latter case using which method. If the application is to be copied from a server, provide the necessary access details. If desired, you can give command line options and a working directory. Specify a message, if desired. The details are described in Sending messages on page 112. NOTE If a message has been specified, this is indicated by a diamond in the dialogs Message tab. Details on the elements of the command dialog are available in Execute Macintosh File on page 305.
Windows application
Select the desired application using the Select button. Specify the user account in which the application is to be executed. You can choose either the current user, the local system administrator account, or a specific user account. In the latter case, you must specify the password. Also, the account must be available on every target computer either locally or via the domain and have the same password everywhere. When you specify a domain username, you must prefix the domain. If desired, you can give command line options and a working directory. NOTE When the executable is an MSI, MSP patch file, or MSU updater file and you do not specify command line options, Absolute Manage adds the /qn option (/quiet /norestart for MSU files) to run the installer silently. When you add your own options or when another type of installer is selected, you have to provide the command line parameters for a silent installation yourself.
128
Controlling computers
Specify the execution method whether to copy the file from your computer or from a server, and in the latter case using which method. If the application is to be copied from a server, provide the necessary access details. Specify a message, if desired. The details are described in Sending messages on page 112. NOTE If a message has been specified, this is indicated by a diamond in the dialogs Message tab. Details on the elements of the command dialog are available in Execute Windows File on page 308.
129
Terminating processes
3. Enter the path of the file that you want to execute. Note: If you select a file in step 1 (instead of computers), the path of that file is pre-entered in the dialog. 4. Specify the user account in which the file is to be executed. You can specify, the currently active user account, a user with system administrator privileges, or a specific account. In the latter case, you must provide the password for Windows target computers (but not Mac OS X targets). 5. If desired, you can specify command line options, provided the target application supports them You can include shell variables in the options, as described in Environment variables on page 134. 6. Click Execute.
Terminating processes
Absolute Manage lets you terminate processes on administered computers. There are two variants for doing so: soft, allowing users to save any changes, and hard, instantly killing the processes.
130
Controlling computers
To terminate a process on administered computers: 1. In any browser window, select the computers on which you want to terminate the process. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Terminate Process. The Terminate Process dialog opens:
3. Enter the name of the process that you want to terminate. The process must have the same name on all target computers. Note: If you select a process in step 1 (instead of computers), the name of that process is pre-entered in the dialog. 4. Choose a soft or hard termination. For a soft termination, check Allow user to save open documents. In this case, the process is sent a terminate event. The effect is similar to choosing Quit in an application. If the process is still operative, users have an opportunity to save any unsaved changes. If the process hangs, it cannot be terminated in this way; you must choose the hard termination. For a hard termination, uncheck the option. This is equivalent to forcefully killing a process. 5. Click Execute.
131
Stopping a service
To stop a service on an administered Windows computer: 1. In any browser window, select the computers on which you want to terminate the services. Note: If the desired service is contained in the server database (the information having been collected with the Gather Inventory Information command), you can also select the service in a browser window in which it is displayed. To display services, add information items from the Windows Services information items group. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Change Services Operation State. The Change Services Operating State dialog opens:
3. Enter the name of the service that you want to stop (as displayed in the Service Name information item. The service must have the same name on all target computers. Note: If you select a service in step 1 (instead of computers), the name of that service is pre-entered in the dialog. 4. Choose Stop from the Action pop-up menu. 5. Click Execute.
132
Controlling computers
Instead, choose an option from the Startup type pop-up menu, depending on the desired effect: Automatic: The service is automatically started whenever the operating system boots. Manual: The service is not automatically started but may be started by users or other applications. Disabled: The service cannot be started at all.
Note: Which fields are displayed in the dialog depends on the chosen action. If you have selected a registry entry before choosing the command, values from that entry are pre-entered into the dialog. 3. Choose the desired action from the Action pop-up menu.
133
Environment variables
Absolute Manage displays the fields appropriate to the action in the dialog. 4. Fill in the fields that are visible: Key path: Enter the path of the key in which you want to create a new key or value. Key name: Enter the new keys name. Value path: Enter the path of the value that you want to change. Value type: Specify the new data type of the value. Value: Enter the data that is to be stored in the specified value. Path: Specify the path of the key or value that you want to rename or delete. New name: Enter the new name of the specified key or value.
When you specify a path, you can include environment variables, as described in Environment variables on page 134. 5. Click Execute.
Environment variables
Several commands let you use shell or environment variables. Absolute Manage can use the standard variables of the target system and defines several variables of its own.
Controlling computers
applications are stored (usually C:\Program Files). On other systems, this variable is undefined. ProgramFilesSystemNative: On Windows systems, the folder in which system-native applications that is, 32-bit applications on 32-bit systems and 64-bit applications on 64-bit systems are stored (usually C:\Program Files). On other systems, this variable is undefined. CommonProgramFilesx64: On 64-bit Windows systems, the folder in which common files used 64-bit applications are stored (usually C:\Program Files\Common Files). On other systems, this variable is undefined. CommonProgramFilesSystemNative: On Windows systems, the folder in which the common files used by system-native applications that is, 32-bit applications on 32-bit systems and 64-bit applications on 64-bit systems are stored (usually C:\Program Files\Common Files). On other systems, this variable is undefined. SysDirx32: On Windows systems, the system folder for 32-bit applications. On other systems, this variable is undefined. SysDirx64: On 64-bit Windows systems, the system folder for 64-bit applications. On other systems, this variable is undefined. SysDirxSystemNative: On Windows systems, the system folder for system-native applications. (For 32-bit system, this is the same as SysDirx32. For 64-bit systems, this is the same as SysDirx64.) On other systems, this variable is undefined.
These variables do not apply to AppleScript scripts. Most of them are not available outside of Absolute Manage, although LANREV_EXECUTABLE_DIRECTORY is available as a command line option for scripts and applications launched by Absolute Manage.
135
Chapter 6
2. Right-click the devices and choose Send Message to Device from the context menu.
136
3. Enter the message and click Send. The message is sent to all selected mobile devices. It is displayed the next time they contact mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If they are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network.
137
2. Right-click the devices and choose Issue Device Lock from the context menu. A confirmation dialog is displayed. 3. Click Lock Device. The command is executed on each selected device the next time it contacts the mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. Locking a device is similar to switching it off; to reaccess the device, the user needs to swipe on the start screen and enter the passcode (unless no passcode has been set for the device). To remove the passcode from a mobile device: 1. In the Mobile Devices window, select the devices from which you want to remove the passcode.
2. Right-click the devices and choose Issue Clear Passcode from the context menu. A confirmation dialog is displayed. 3. Click Clear Passcode. The command is executed on each selected device the next time it contacts the mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. From that point, the device is accessible to anybody without requiring a passcode. If a configuration profile is in effect on the device that makes having a passcode mandatory, the user needs to specify a new passcode.
138
To erase a mobile device: 1. In the Mobile Devices window, select the devices you want to erase.
2. Right-click the devices and choose Issue Remote Erase from the context menu. A confirmation dialog is displayed. 3. Click Erase Device. The next time a selected device contacts the mobile OS vendors notification server, all of its data is erased. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. Erasing the device removes any user data and all applications that were installed by the user. This effectively resets the device to its factory condition. The erased device can no longer be administered through Absolute Manage until it has been enrolled again or it has been completely restored from a backup that contains the enrollment profile.
You can also use information items from the Device User Information category as variables, which is described in Using variables in configuration profiles below. ,
139
For details on working with variables, see: Defining a variable (page 140) Using variables in configuration profiles (page 140)
Defining a variable
To define a variable for use in a configuration profile: 1. Define a custom information field that will serve as the variable, as described in Defining custom information fields on page 79. Specify Manual as the field type and Mobile as the device type. Enter the name for the variable in the Variable name field. You can enter any name as long as it does not contain spaces, dollar signs ($), and curly brackets ({}). Specify the other settings for the field normally. This field is a normal mobile device custom information field and can be used as such, in addition to being available as a variable for configuration profiles. 2. After you have saved the new custom information fields to the server, fill them in for all mobile devices to which you want to upload configuration profiles with these variables. Entering information into custom information fields is described in Using custom information fields on page 86. You can also import the variables contents from a file, as described in Importing data into custom information fields on page 87. The variables can now be used in configuration files, as described below.
Variables that are to be used in a configuration profile must have been defined as described above. To use a variable in a configuration profile, create the profile as usual. Wherever you want the variable to appear, enter ${<variable_name>}, where <variable_name> is the name you have specified in the Variable name field when creating the custom information field. Absolute Manage comes with predefined variables that let you access information items from the Device User Information category, i.e., Active Directory information for the mobile user. (This requires the user to have enrolled through the MDM server, as described in Enrolling mobile devices on page 36.) These variables are available (the name of the corresponding information item is noted in parentheses): MDU_DisplayName (Mobile Device User Display Name) MDU_FirstName (Mobile Device User First Name)
140
MDU_LastName (Mobile Device User Last Name) MDU_LogOnName (Mobile Device User Log-on Name) MDU_EMail (Mobile Device User E-Mail) MDU_PhoneNumber (Mobile Device User Phone Number) MDU_Department (Mobile Device User Department) MDU_Company (Mobile Device User Company) MDU_Street (Mobile Device User Street) MDU_City (Mobile Device User City) MDU_State (Mobile Device User State) MDU_ZIPCode (Mobile Device User ZIP Code) MDU_Country (Mobile Device User Country) MDU_Office (Mobile Device User Office) MDU_OrganizationalUnit (Mobile Device User Organizational Unit) MDU_EnrollmentUsername (Mobile Device User Enrollment Username) MDU_EnrollmentDomain (Mobile Device User Enrollment Domain)
When the configuration profile is sent to a mobile device through Absolute Manage, Absolute Manage automatically replaces the variable code in the profile with the current content of the corresponding custom information field. Note that this is not a dynamic link: If you later change the content of the custom information field and want that change to be reflected in the installed configuration profile, you need to reinstall it. Note, too, that configuration profiles containing variables cannot be installed with other tools than Absolute Manage.
141
Installing a configuration profile on administered iOS devices requires the profile to be imported into Absolute Manage first. To import a configuration profile into Absolute Manage: 1. In the Mobile Devices window, right-click in the sidebar and choose Configuration Profiles and Certificates > New iOS Configuration Profile from the context menu. The iOS Configuration Profile dialog opens:
2. Click Select and choose the file containing the desired profile. Configuration profile files can be created in Apples iPhone Configuration Utility. 3. Edit the description if desired. 4. Click OK. The profile is imported into Absolute Manage and available for manual or profile-based installation on administered iOS devices.
To install a configuration profile on iOS devices: 1. In the Mobile Devices window, select the devices on which you want to install the configuration profile.
2. Right-click the devices and choose Install Configuration Profile from the context menu.
142
3. From the Configuration profile pop-up menu, choose the desired profile. The menu contains all profiles that have been installed in Absolute Manage, as described in Importing a configuration profile into Absolute Manage on page 142. You can also use the Other command from the menu to open a configuration profile file from a volume on your computer. 4. Edit the description if desired. 5. Click OK. The profile is sent to all selected mobile devices. It is installed on each selected device the next time it contacts the mobile OS vendors notification server and is unlocked. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. All configuration profiles that are installed on a device are listed in the Configuration Profiles section that is available when the device is expanded in the sidebar of the Mobile Devices window.
Failed installations
If a configuration profile could not be installed on a device, e.g., because it is not compatible with the device, an error message is generated. In that case, you can fix all profiles with issues and then reapply them in one step using the Retry All Failed Profiles context menu command for the device.
143
To remove a configuration profile from an iOS device: 1. In the sidebar of the Mobile Devices window, expand the device from which you want to remove the configuration profile.
2. Click the Configuration Profiles subgroup of the device. The configuration profiles that are present on the device are listed in the main part of the window. 3. Select the profile you want to remove and press the Backspace key. You can also right-click the profile and choose Delete Profile from the context menu. The profile is removed from the mobile device the next time it contacts the mobile OS vendors notification server and is unlocked. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network.
To install a configuration profile on iOS devices automatically: 1. In the Mobile Devices window, drag the profile from the Apps, Profiles & Media > Configuration Profiles group to either of these two categories of a policy to which the devices belong on which you want to install the profile: Required Configuration Profiles Policy-locked Configuration Profiles
In both cases, the profile will be installed automatically and remain on the device as long as it belongs to the policy. However, there is a difference when the device is removed from the policy: Required profiles remain on a device even after it is removed from the policy. (Users can remove the profiles manually, however.) Policy-locked profiles are automatically removed from each device that leaves the policy.
Note that the actual effect may be different for devices that belong to other policies where the same configuration profile has a different role. See Conflicting policy settings for configuration profiles on page 147 for details. 2. If you do not want to restrict the time during which the profile is available, you are done. Only if you want to restrict it, continue. 3. Click the group into which you have put the profile inside the policy in the sidebar so that the configuration profiles contained in it are being displayed in the main part of the window.
144
4. Right-click the profile and choose Set Availability Time from the context menu. The Set Availability Time dialog is displayed:
5. Specify when the profile should be available: To make it available for a particular time each day, choose Every day between and enter the desired start and end times. To make it available for a one-time period, choose From and specify the desired start and end times.
For further information, see the description of this dialog in Set Availability Time on page 418. The profile is sent to all devices that belong to the policy. It is installed on each device the next time it contacts the mobile OS vendors notification server and is unlocked. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. If devices are later added to the policy, the profile is installed on them as well. (This may not be the case for devices also belonging to another policy in which the configuration profile is forbidden. See Conflicting policy settings for configuration profiles on page 147 for details.)
To make a profile available on a device but let the user decide whether to install it: 1. In the Mobile Devices window, drag the profile from the Apps, Profiles & Media > Configuration Profiles group to the Ondemand Configuration Profiles folder of the policy via which you want to distribute it. The group lists all configuration profiles that have been imported into Absolute Manage, as described in Importing a configuration profile into Absolute Manage on page 142. 2. If you do not want to restrict the time during which the profile is available, you are done. If you want to restrict it, specify the
145
desired time as described beginning in step 3 of Installing a configuration profile via a policy above. , The profile is sent to all iOS devices that belong to the policy and is listed there in the Profiles section of AbsoluteApps. (This may not be the case for devices also belonging to a different policy with conflicting settings. See Conflicting policy settings for configuration profiles on page 147 for details.) If AbsoluteApps is not available on the device, nothing happens. (See Preparing iOS devices for software installation on page 150 for information on installing AbsoluteApps.) The profile is transferred to each device the next time it contacts the mobile OS vendors notification server and is unlocked. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. If devices are later added to the policy, the profile is made available on them as well. All configuration profiles that are installed on a device are listed in the Configuration Profiles section that is available when the device is expanded in the sidebar of the Mobile Devices window.
To remove a configuration profile from iOS devices automatically: 1. In the Mobile Devices window, drag the profile from the Apps, Profiles & Media > Configuration Profiles group to the Forbidden Configuration Profiles folder of the policy via which you want to remove it.
2. If you do not want to restrict the time during which the profile is forbidden, you are done. If you want to forbid it only during a certain time, specify the desired time as described beginning in step 3 of Installing a configuration profile via a policy above. , The next time a device that belongs to the policy contacts the mobile OS vendors notification server and is unlocked, the profile is removed from that device. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. This may not be the case for devices also belonging to a different policy with conflicting settings. See Conflicting policy settings for configuration profiles on page 147 for details.
146
If devices are later added to the policy, the profile is removed from them as well (unless they also belong to a different policy which prevents this). NOTE Profiles in the policy-locked profiles category of a policy are automatically removed from any device that is removed from the policy.
It is possible to assign a configuration profile to multiple policies in different roles. For example, it could be required in one policy and forbidden in another, or on-demand in one policy and policy-locked in another. This can become an issue if one device is a member of multiple policies and these policies contain the same configuration profile in different categories. For example, a device could belong to one policy in which the profile is required and another in which it is forbidden. Clearly, there is no way to satisfy both policies requirements at the same time. In cases like this, Absolute Manage uses this hierarchy for the different categories of profiles: Policy-locked profiles Forbidden profiles Required profiles On-demand profiles
Higher entries have precedence before lower entries. For example, if a configuration profile is required in one policy to which a device belongs and forbidden in another, the profile is not available on the device because the forbidden category has a higher priority than required . This means that, in some constellations, a policy-locked profile remains on a device even when the device is removed from the policy in question. This is the case when the device also belongs to another policy in which the profile is either required or on-demand (and the device does not belong to a policy in which the profile is forbidden).
147
To install a provisioning profile on iOS devices: 1. In the Mobile Devices window, select the devices on which you want to install the configuration profile.
2. Right-click the devices and choose Install Provisioning Profile from the context menu. The Install Provisioning Profile dialog opens:
3. From the Provisioning profile pop-up menu, choose the desired profile. The menu contains all profiles that are part of an application package. If the profile you want to install is not part of an application package, choose Other and select the provisioning profile file on your computer. 4. Click OK. The profile is sent to all selected mobile devices. It is installed on each device the next time it contacts the mobile OS vendors notification server and is unlocked. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. All provisioning profiles that are installed on a device are listed in the Provisioning Profiles section that is available when the device is expanded in the sidebar of the Mobile Devices window.
Failed installations
If a configuration profile could not be installed on a device, e.g., because it is not compatible with the device, an error message is generated.
148
In that case, you can fix all profiles with issues and then reapply them in one step using the Retry All Failed Profiles context menu command for the device.
To remove a provisioning profile from an iOS device: 1. In the sidebar of the Mobile Devices window, expand the device from which you want to remove the provisioning profile.
2. Click the Provisioning Profiles subgroup of the device. The provisioning profiles that are present on the device are listed in the main part of the window. 3. Select the profile you want to remove and press the Backspace key. You can also right-click the profile and choose Delete Profile from the context menu. The profile is removed from the mobile device the next time it contacts the mobile OS vendors notification server and is unlocked. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. Any applications that rely on this profile for authorization can no longer be used on the device after the next time the device (not the app) is restarted. All provisioning profiles that are installed on a device are listed in the Provisioning Profiles section that is available when the device is expanded in the sidebar of the Mobile Devices window.
2. Right-click the device and choose Set Roaming Options from the context menu.
149
3. In the Set Roaming Options dialog, configure the settings as desired. Settings that are checked will be enabled on the selected devices. Settings that are unchecked will be disabled. Settings in the third neutral state ( ) will be left unchanged. The options are set on each device the next time it contacts the mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network.
NOTE The preparation described in this section is not required for distributing Android software.
Before you can distribute Absolute Apps, you must prepare it properly. This must be done one time per release of Absolute Apps. (That is, you do not need to repeat the preparation when you update Absolute Manage, the MDM server or the iOS operating system, but you must repeat it when you update Absolute Apps to a new version.) You will need the following: A computer running Mac OS X on which Apples iOS SDK is installed: The provided script requires this operating system and development environment. Since Absolute Manage itself is not required for this procedure, it often will be easiest to perform it on the development computer that was used to create your in-house apps.
150
An MDM server that is fully set up (see Installing MDM support on page 23 for details) The ConfigureAbsoluteApps.sh script included on the Absolute Manage Mac OS X disk A valid signing identity, accessible through the Mac OS X Keychain utility, that corresponds to your organizations iOS distribution certificate An enterprise distribution provisioning profile that is to be attached to the app. It must correspond to the signing identity. The Absolute Apps iOS app bundle (AbsoluteApps.ipa) included on the Absolute Manage Mac OS X disk
NOTE Instead of using the procedure described below, you can also use the Configure iOS Apps utility that is included on the Absolute Manage installation disk. See the utilitys Help menu for more information. To prepare Absolute Apps for distribution to the administered iOS device: 1. Copy the ConfigureAbsoluteApps.sh script, the provisioning profile, and the Absolute Apps app bundle to convenient locations on your Mac OS X computer.
2. Make sure that the signing identity is available in your keychain. 3. Run the script by entering this command in the terminal:
ConfigureAbsoluteApps.sh --in <app> --out <prepared_app> --signingidentity <identity> --provisioningprofile <profile> --mdmurl <url> [--appname <name>] [--iconfile <icon>]
Where the parameters are: The Absolute Apps app bundle The location where the script is to create the prepared copy of Absolute Apps it creates as output. Any existing file at this location will be silently overwritten. You can specify the location of the input file (i.e., <app>). <identity>: The name under which the signing identity is stored in Keychain <profile>: The distribution provisioning profile that will be used to authorize the Absolute Apps app on the iOS devices <url>: The URL of the MDM server that you have set up. Make sure to include the https:// protocol specifier. <name>: The name that the prepared app will have and that is displayed on the iOS device. This is an optional parameter; if you omit it, the app will be named Absolute Apps . <icon>: The name of a graphics file that contains a different icon for the app to be displayed on the iOS device. The graphics file must have the PNG format and have a size of 57 by 57 pixels.
<prepared_app>: <app>:
151
This is an optional parameter; if you omit it, the app has the default icon as supplied by Absolute. For example:
ConfigureAbsoluteApps.sh \ --in "/Users/johndoe/Documents/to-convert/AbsoluteApps.app" \ --out "/Users/johndoe/Documents/to-deploy/AbsoluteApps.ipa" \ --signingidentity "iPhone Distribution" \ --provisioningprofile "/Users/johndoe/Documents/ My_App_Store.mobileprovision"\ --mdmurl "https://mdm.mycompany.com"\ --name "MyAppStore"\ --iconfile "/Users/johndoe/Documents/MyAppStoreIcon.png"
The script stores the URL of your MDM server in the app, optionally changes the name and/or icon, resigns the app using your identity, and saves the resulting new app file at the specified location. You can now distribute this app file as described in below.
Distributing AbsoluteApps
2. Enroll all iOS devices to which you want to distribute the app in Absolute Manage. This is described in Enrolling mobile devices on page 36. 3. In Absolute Manages Mobile Devices window, import the prepared application file created by the script (see above). This creates a configuration profile called Install AbsoluteApps . Importing applications is described in Importing an application into Absolute Manage on page 155. 4. Install the Install AbsoluteApps configuration profile on all administered iOS devices, as described in Installing configuration profiles on iOS devices on page 141. You can install the profile either manually or via a policy. If you install it via a policy, it is removed automatically once AbsoluteApps has been installed, ensuring that users do not continue to find the installation icon on their home screens although they already have the app. The installed configuration profile appears as an icon on the home screens of the iOS devices, like an app. Clicking on this profile launches Safari and then displays a dialog in which users are asked whether to install AbsoluteApps. Clicking OK in this dialog begins the installation and, after an interval of up to a minute during which there is no feedback,
152
displays a confirmation dialog in which users have to agree to install the app. 5. Communicate to the users (e.g., by e-mail) that they should click on the configuration profile and accept the installation request. Also communicate to the users that they must enable push notifications on their devices for AbsoluteApps to work properly. When users have performed these steps (installing the app and enabling push notifications), they have access to all apps you make available to their devices through Absolute Manage. They can also receive messages you send to them from Absolute Manage.
You can either push-install apps to individual devices or make apps available for user-initiated installation in the AbsoluteApps mobile application, which looks and works similar to Apples App Store. All steps are described below in these sections: Preparing iOS application files (page 154) Importing an application into Absolute Manage (page 155) Making applications available on mobile devices (page 157) Uninstalling applications from mobile devices (page 158)
Due to the requirements of iOS, an in-house app must be signed and an enterprise provisioning profile must be attached. In addition, the provisioning profile included with the app bundle by the Xcode development environment must be removed.
NOTE This procedure does not apply to Android or apps from the App Store apps. Absolute provides a script that handles the required steps automatically; this document describes using the script. You will need the following: A computer running Mac OS X on which Apples iOS SDK is installed: The provided script requires this operating system and development environment. Since Absolute Manage itself is not required for this procedure, it often will be easiest to perform it on the development computer that was used to create your in-house apps. The PrepareAppForDeployment.sh script included on the Absolute Manage Mac OS X disk A valid signing identity, accessible through the Mac OS X Keychain utility, that corresponds to your organizations iOS distribution certificate An enterprise distribution provisioning profile that is to be attached to the app. It must correspond to the signing identity. The iOS app bundle as created by Xcode
NOTE Instead of using the procedure described below, on Mac OS X 10.6 or later, it is usually easier to use the Configure iOS Apps utility that is included on the Absolute Manage installation disk. See the utilitys Help menu for more information. To prepare an app for distribution with the PrepareAppForDeployment.sh script: 1. Copy the script, the provisioning profile, and the app bundle to convenient locations on your computer.
154
Where the parameters are: The app bundle created by Xcode The location where the script is to create the prepared app it creates as output. Any existing file at this location will be silently overwritten. You can specify the location of the input file (i.e., <app>). <identity>: The name under which the signing identity is stored in Keychain <profile>: The distribution provisioning profile that will be used to authorize the app on the iOS devices
<prepared_app>: <app>:
For example:
PrepareAppForDeployment.sh \ --in /Users/johndoe/Documents/apps-to-convert/InHouse.app" \ --out "/Users/johndoe/Documents/apps-to-deploy/InHouse.ipa" \ --signingidentity "iPhone Distribution" \ --provisioningprofile "/Users/johndoe/Documents/ In_House_App.mobileprovision"
The script extracts the profile from the app bundle, resigns the app using your identity, and saves the resulting new app file at the specified location. You can now use this app file, together with the specified provisioning profile, to import and distribute the app to iOS devices as described in below.
An in-house iOS application that you want to import into Absolute manage must have been prepared as described in above. An in-house Android application can be imported as-is. To import a mobile application into Absolute Manage: 1. In the Mobile Devices window, right-click the sidebar and choose Mobile Applications > New In-house Application Package from the context menu.
155
The dialog is described in New In-house Application Package on page 393. 2. Click the upper Select button and choose the application file. This file must have the .ipa extension (for iOS apps) or .apk extension (for Android files), respectively. Note: Importing Android apps requires a Java runtime environment (JRE) to be installed on your computer. 3. If desired, edit the name for the application package. This is the name under which the application package is listed in Absolute Manage. It is automatically taken from the application file you have chosen, but you can modify it before saving the package. 4. When importing iOS apps, click the lower Select button and choose the provisioning profile. (Skip this step for Android apps.) The provisioning profile is required for the application to run. It must either be an ad-hoc profile that authorizes the application for a set of specific devices or an in-house provisioning profile that authorizes the application for all iOS devices. The provisioning profile must be provided by the applications developer. 5. Fill in the short, long, and update descriptions as desired.
156
6. If you want the app to remain on managed devices only as long as those devices are under MDM management, check the Delete application when device is removed from MDM management option. If the option is unchecked, this app remains on devices on which it is installed, even when MDM management of the devices ends. This option is available only for iOS apps. 7 . If you want the data of the application not to be copied in an iTunes backup of the device, check the Prevent backup of application data option. If the option is unchecked, the data of the app is backed up normally. This option is available only for iOS apps. 8. Click OK to save the package. The application package is saved in Absolute Manage and can now be made available in the AbsoluteApps mobile app as described in Making applications available on mobile devices below. ,
There are two ways for making apps available on managed mobile devices, via policies or via direct installation. Both are described below.
The application is displayed in the list of applications inside AbsoluteApps on any mobile device belonging to the policy as soon as the device next contacts the mobile OS vendors push notification server. If it is online via WiFi or a mobile network, this happens quickly, usually within a minute, but if it is not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. You can send messages (see Sending a message to mobile devices on page 136) or e-mails to the users of the devices to notify them of the availability of the new application.
157
2. Choose Commands > Install Application from the context menu. The Install Application dialog is displayed. 3. From the Application pop-up menu, choose the app you want to install. You can choose both in-house and commercial App Store or Market apps that you have imported. For information on importing commercial apps, see Recommending commercial apps on page 160. 4. If desired, edit the long description of the app. 5. Click OK. The application is transferred to each selected device and the users are prompted to install it the next time the device contacts the mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. On iOS 4.x devices, the user is prompted to install the application only when AbsoluteApps comes to the front the next time. If a user declines the installation, the app is not installed on that device. Note that you cannot install an application on an iOS device that already contains an unmanaged version of the application. (Unmanaged applications are all applications that have been installed by other means than through the MDM system.) All applications that are installed on a device are listed in the Applications section that is available when the device is expanded in the sidebar of the Mobile Devices window. Managed applications available for download are listed in the Assigned Apps, Profiles & Media section.
You can directly uninstall applications from devices, with the details varying according to the mobile operating system: On iOS 4 devices, direct uninstallation is not available. Instead, you have to remove the provisioning profile, as described below in Uninstalling applications from iOS 4 devices
158
On iOS 5, only managed applications can be removed, i.e., applications that have been installed through the Absolute Manage MDM system. On Android devices, any application can be removed, but the local user must confirm it.
To uninstall applications (other than from iOS 4 devices): 1. In the Mobile Devices window, display a list of installed applications. For example, display the Applications category of a managed device or the built-in All installed applications smart group. 2. Select the applications that you want to uninstall. 3. Right-click the selected applications and choose Delete Application from the context menu. The next time a device on which one of the selected application is installed contacts the mobile OS vendors notification server and is unlocked, any selected application is removed from that device. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. On Android devices, a confirmation alert is displayed before the application is actually removed. If the user does not allow the removal, the application remains on the device.
159
The next time a device that belongs to the policy contacts the mobile OS vendors notification server, the provisioning profile is removed from that device. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. After the next restart of the device, the application can no longer be used on that device. Also, the application cannot be installed on any device belonging to the policy. All applications that are installed on a device are listed in the Applications section that is available when the device is expanded in the sidebar of the Mobile Devices window.
You can create app packages for App Store or Android Market apps that can then be distributed to mobile devices. These app packages contain references to the apps, not the actual apps themselves, and appear in the App Store (for iOS apps) or Market (for Android apps) sections of AbsoluteApps. Users can install these apps just like any other commercial app. AbsoluteApps must be installed on all mobile devices to which you want to distribute these app packages. See Preparing iOS devices for software installation on page 150 for information on distributing
160
AbsoluteApps to iOS devices and Enrolling mobile devices on page 36 for information on distributing it to Android devices. To create and distribute recommended app packages: 1. In the Mobile Devices window, right-click in the sidebar and choose Mobile Applications > New iOS App Store Application Package or Mobile Applications > New Android Market Application Package, depending on the target platform. Depending on the command chosen, the iOS App Store Application dialog (shown below) or the Android Market Application dialog opens:
2. Enter the URL of the apps App Store page in the Apple App Store URL or Android Market URL field, respectively, and press the Tab key or click in another field. You can obtain the URL by right-clicking the apps icon anywhere in the respective online stores and choosing Copy Link from the context menu. 3. If you have volume purchase redemption codes for the app (iOS only), enter them as described in Making volume purchase codes available on page 162. 4. Click OK to close the dialog and save the new app package. 5. The new app package appears in the Apps, Profiles & Media > Recommended Applications group in the Mobile Devices window. 6. Drag the app package to the Recommended Apps group of a policy containing the devices to which you want to recommend the app. Policies are described in Working with policies on page 168.
161
The next time a device that belongs to that policy contacts the mobile OS vendors notification server, the app package information is sent to that device. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. The package appears on the device in the App Store section or Market section, respectively, of AbsoluteApps. Users can install the app by clicking the Install button; if they do so, the app is downloaded from the App Store or Android Market normally. All applications that are installed on a device are listed in the Applications section that is available when the device is expanded in the sidebar of the Mobile Devices window. Recommended applications are listed in the Assigned Apps, Profiles & Media section.
Apples App Store offers a volume purchasing program for apps. If you purchase a block of apps through this program, you receive a list of redemption codes and links. You can import such code lists into Absolute Manage and allow users of mobile devices to purchase apps through the volume purchasing program without needing to assign them codes individually. To make volume-purchased apps available to users: 1. Create an app package for the App Store app, as described in Recommending commercial apps above, until you reach step 3. ,
2. Click the Volume Purchase Codes tab to display the corresponding pane:
Copy and paste: Open the Excel file with the codes that you have received from Apple. Copy the entire contents or just the rows containing the codes and redemption links. Switch to Absolute Manage Admin and click inside the table area. Paste the copied codes. Exported text file: Open the Excel file with the codes that you have received from Apple. Save the file as a tab-delimited text file. Switch to Absolute Manage Admin and click the Import Codes button. A standard system Open dialog is displayed. Select the exported text file and click Open. Manually created text file: Create a text file in which each line contains a redemption code, a tab character, and the corresponding redemption link. Save the file as a tab-delimited text file. Switch to Absolute Manage Admin and click the Import Codes button. A standard system Open dialog is displayed. Select the text file and click Open.
The codes are added to the table in the dialog. 4. Continue the procedure described in Recommending commercial apps with step 4. All mobile devices to which the package is made available (via the policies to which you assign it) can now purchase the app using the redemption codes. To redeem a code, the user simply clicks Install in AbsoluteApps. Absolute Manage automatically and transparently transmits an unused redemption code and the corresponding link to the App Store. The user of the mobile device does not notice any of this. The used code is automatically marked as redeemed and will not be assigned to another device.
Deleting codes
You can delete redeemed codes in particular codes that have been redeemed outside of Absolute Manage and thus are still considered available there: 1. In the Mobile Devices window, double-click the App Store app package into which the codes have been imported.
2. Click the Volume Purchase Codes tab. 3. In the table, select the codes that you want to delete.
163
4. Press the Backspace key. 5. Click OK to save the changes and close the dialog. The codes are removed from the package and are no longer available for redemption inside Absolute Manage.
Numbers (.numbers) Images BMP (.bmp) GIF (.gif) JPEG (.jpg and .jpeg) PNG (.png) TIFF (.tif and .tiff) Audio AAC audio (.m4a) AAC audio books (.m4b and .m4p) AIFF (.aiff, .aif, .aifc, and .cdda) AMR (.amr) MP3 (.mp3 and .swa) MPEG audio (.mpeg, .mpg, .mp3, and .swa) WAVE (.wav and .bwf) Video and multimedia 3GP (.3gp and .3gpp) 3GP2 (.3g2 and .3gp2) MPEG-4 (.mp4 and .m4v) QuickTime (.mov, .qt, and .mqv)
To be able to assign a media file to a policy and thereby distribute it to managed mobile devices, you first import it into Absolute Manage: 1. In the Mobile Devices window, right-click in the sidebar and choose Media > New Media File. The Mobile Media File dialog is displayed.
2. Click Select and choose the desired file or drag the file from the desktop into the Media file area.
165
The Name, Category, and Icon fields are automatically filled based on the file you selected. 3. Edit the Name and Category fields if desired. You can also paste a graphic into the Icon field that is displayed as the media files icon on the mobile devices. 4. Enter a description in the Description field. This description will be displayed to mobile users and should give them some indication of the relevance of the file. 5. If desired, set a password for the media file by entering it in the Passphrase and Verify passphrase fields. The passphrase must be entered every time the file is displayed in AbsoluteSafe. If you set a passphrase, you cannot allow the media file to leave AbsoluteSafe. Therefore, you can set a passphrase only for file types that are supported by AbsoluteSafe. (See Supported media types on page 164 for a list of supported file types.) You cannot set a passphrase when Media file can leave media store is enabled. 6. If you want the mobile users to be able to view or edit the media file in apps other than AbsoluteSafe, check Media file can leave media store. This allows users, e.g., to view the file in a PDF reader, edit in a text editor, or forward it to others by e-mail. If desired, you can also check User can e-mail file and/or User can print file to provide buttons with AbsoluteSafe for these two tasks. You cannot check Media file can leave media store if you have set a password for the file, as described in step 5. Note: While unchecking this option reliably prevents the file from leaving AbsoluteSafe, the same is not necessarily true for the information contained in the file. For example, a mobile user still could take screenshots of the file and send those to other persons. 7 . Click OK.
The new media file is added to the Apps, Profiles & Media > Media section of the sidebar and can now be assigned to policies.
Once you have imported a media file as described in above, you can distribute it to mobile devices via assigning it to a policy: 1. Drag the media file from the Apps, Profiles & Media > Media group to the Media group inside any mobile policy that contains
166
the mobile devices on which you want to make the media file available. 2. If you do not want to restrict the time during which the file is available, you are done. Only if you want to restrict it, continue. 3. Click the Media group inside the policy in the sidebar so that the media files that are assigned to the policy are being displayed in the main part of the window. 4. Right-click the media file and choose Set Availability Time from the context menu. The Set Availability Time dialog is displayed:
5. Specify when the file should be available: To make it available for a particular time each day, choose Every day between and enter the desired start and end times. To make it available for a one-time period, choose From and specify the desired start and end times.
For further information, see the description of this dialog in Set Availability Time on page 418. 6. Click OK. The media file is displayed in the list of files inside AbsoluteSafe on any mobile device belonging to the policy as soon as the device next contacts the mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. You can send messages (see Sending a message to mobile devices on page 136) or e-mails to the users of the devices to notify them of the availability of the new file. All media files that are available to a device are listed in the Assigned Apps, Profiles & Media section that is available when the device is expanded in the sidebar of the Mobile Devices window.
167
Any changes you make to a policy becomes effective on a device the next time the device contacts the mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. The details of working with policies are described in: Creating a policy (page 168) Adding and removing mobile devices (page 169) Specifying applications in policies (page 170) Specifying configuration profiles in policies (page 170) Specifying media in policies (page 171)
Creating a policy
To create a policy to which you manually add devices: 1. In the Mobile Devices window, right-click in the sidebar and choose Policies > New Policy. The New Mobile Device Policy dialog is displayed.
168
2. Enter the name of the new policy and click OK. The new policy is added to the Policies section of the sidebar. It does not contain any devices; you must add them manually as described below in Adding and removing mobile devices . To create a policy to which devices are added automatically according to criteria you specify: 1. In the Mobile Devices window, right-click in the sidebar and choose Policies > New Smart Policy. The Smart Group dialog is displayed.
2. Enter the name of the new policy. 3. Specify the criteria that a mobile device must meet to be included in the group. For more information on using this kind of dialog, see Creating a smart group on page 108. 4. Click OK. The new policy is added to the Policies section of the sidebar. It contains all mobile devices that meet the specified criteria. You cannot manually add or remove devices. If a device later meets the criteria, it is automatically added; likewise a device belonging to the policy is automatically removed when it no longer meets the criteria.
Standard policies allow devices to be manually added or removed, but smart policies do not. To add a mobile device to a policy: 1. In the Mobile Devices window, drag the device that you want to add from any group listing devices to the policy to which you want to add it.
The device is now part of the policy and is listed in the main part of the window when you click the policy in the sidebar. To remove a mobile device from a policy: 1. In the Mobile Devices window, select the devices you want to remove.
169
2. Right-click the devices and choose Remove from Policy from the context menu. The device is now part of the policy and is listed in the main part of the window when you click the policy in the sidebar. All policies to which a device belongs are listed in the Policies section that is available when the device is expanded in the sidebar of the Mobile Devices window.
In policies, you can specify applications that are available for installation on the mobile devices that belong to the policy and applications that are prohibited on these devices. Doing so is covered in Making applications available on mobile devices on page 157 and Uninstalling applications from mobile devices on page 158, respectively. To recommend commercial apps (from the Apple App Store or Android Market) to users of mobile devices, see Recommending commercial apps on page 160.
In policies, you can specify configuration profiles that are required on the mobile devices that belong to the policy and configuration profiles that are prohibited on these devices. Configuration profiles specified in policies apply only to iOS devices, not Android devices.
Adding a profile
1. To add a configuration profile to a policy:
2. Drag the configuration profile from the Apps, Profiles & Media > Configuration Profiles group to the desired profile group inside the policy: Policy-locked Configuration Profiles: These profiles are automatically installed on any device that is added to the policy and automatically removed from any device that is removed from the policy. Required Configuration Profiles: These profiles are automatically installed on the devices belonging to the policy. On-demand Configuration Profiles: Users of the devices belonging to the policy can install these profiles if they so desire. The profiles are listed in the Profiles section of AbsoluteApps. Forbidden Configuration Profiles: These profiles cannot be installed on the devices belonging to the policy.
The next time a device that belongs to the policy contacts Apples push notification server, the configuration profile is installed and activated,
170
made available, or deleted on that device, depending on the category into which you have put it.
Removing a profile
To remove a configuration profile from a policy: 1. Select the configuration profile in the policy.
2. Right-click the profile and choose Remove Configuration Profile. The profile is removed from the policy. There is no immediate effect on the devices that belong to the policy. That is, when you remove a profile from the policys Required Configuration Profiles list, it is not removed from the devices; and when you remove a profile from the Forbidden Configuration Profiles list, it is not installed on the devices. However, the restrictions on the mobile devices with respect to the configuration profiles are lifted: A previously required profile may now be deactivated or removed, and a previously prohibited profile may now be installed and activated.
In policies, you can specify media that is automatically made available to user on every device that is added to the policy. Doing so is covered in Distributing a media file on page 166.
171
2. A passphrase for enabling tracking must be set, as described in Setting passphrases for mobile devices below. , 3. Tracking must be enabled for the devices, as described in Enabling geotracking on mobile devices on page 174. Collected mobile device locations can be shown either numerically or on a map, as described in Displaying geotracking information on page 177. NOTE AbsoluteApps must be running on the mobile device for geotracking to work. It does not need to be the front application, but if a user terminates it, geotracking is no longer possible. (A restart is unproblematic, as AbsoluteApps is automatically relaunched when it was running before the restart.) You can usually get a user to reopen AbsoluteApps by sending him or her a message (as described in Sending a message to mobile devices on page 136). Viewing the message launches AbsoluteApps.
NOTE While geotracking can often be helpful when recovering a stolen mobile device, it is not a reliable theft recovery system by itself. Among other things, a thief can prevent geotracking by switching the mobile device off or by resetting it to the factory condition (erasing AbsoluteApps in the process).
A passphrase must be set on a mobile devices before geotracking can be enabled on it. The passphrase is to ensure the legitimacy of any tracking requests sent to the device. A passphrase can be set either individually per device, or a group of devices can have the same passphrase.
172
2. When AbsoluteApps is launched for the first time, the user is first prompted for the server address and then asked to enter a passphrase:
3. Users must enter the same passphrase in both the Passphrase and Confirm fields before they can click OK to use AbsoluteApps. The passphrase can consist of any number of characters; it is not restricted to digits. Unless the user tells you this passphrase, you cannot enable tracking. If this passphrase is intended to track the device only in emergency situations when the device is lost or stolen it is advisable for the user to write down the passphrase in a safe location The mobile device now has a passphrase. Geotracking for the device can be enabled when the user provides the passphrase to you, as described in Enabling geotracking on mobile devices on page 174. The passphrase cannot be changed on the device. If users want to change the passphrase, they must contact an administrator who resets the passphrase for them, after which they can enter a new passphrase as described above. See Resetting a passphrase below, for more , information.
173
As part of the request, youll need to provide the desired passphrase. You may also need to sign a legal waiver. Absolute Software will return an encrypted token to you that is based on a combination of your serial number and the passphrase. You will also receive instructions on using this token to modify AbsoluteApps. 2. Follow the instructions provided to set the passphrase on all devices. Note that this process requires the user to accept the new passphrase on the device. All mobile devices on which this procedure was performed and on which the users have accepted the change now have the same passphrase. Geotracking for the device can be enabled using this passphrase, as described in Enabling geotracking on mobile devices on page 174.
Resetting a passphrase
You can reset the passphrase on a managed mobile device. This removes the current passphrase and requires a new passphrase to be set, either locally by the user as described in Setting a passphrase individually above, or remotely by you, as described in Setting one , passphrase for a group of devices above. , Passphrases can only be reset on one device at a time. To reset a passphrase: 1. In the Mobile Devices window, select the device on which you want to reset the passphrase.
2. Right-click the device and choose Reset Tracking Passphrase from the context menu. A confirmation dialog is displayed. 3. Click Reset Passphrase. The current passphrase is removed from the device and a new one must be set before AbsoluteApps can be used again on that device.
When mobile devices have been properly set up, as described in Setting passphrases for mobile devices on page 172, geotracking can be enabled on them.
Because the location of a mobile device often is also the location of its user, tracking mobile devices is subject to privacy or data protection laws in many jurisdictions.
174
Usually, the express consent of the user of the device is required before it may be tracked. In addition, there may be regulations governing how long gathered data may be stored and how and by whom it may be accessed. Failure to obtain the required consent or observe other applicable legal regulations may expose you to civil and/or criminal liability. To enable geotracking on mobile devices: 1. In the Mobile Devices window, select all devices on which you want to enable geotracking.
2. Right-click the devices and choose Track Device from the context menu. Note that, if you select multiple devices, all must have the same passphrase. The Mobile Device Tracking dialog is displayed:
3. Check the Track device option. 4. Enter the passphrase of the devices in the Activation passphrase field. See Dealing with lost passphrases below, for information on , what to do when a passphrase has been lost. 5. Set the desired tracking interval and location accuracy. Shorter tracking intervals allow for more fine-grained tracking but can create huge amounts of data. For example, tracking 50 devices with an interval of five minutes creates more than five million records per year. Better location accuracy lets you pinpoint a devices position with greater precision but is more intrusive of the bearers privacy. When the desired accuracy is not technically achievable, location data may have a lower accuracy than specified. Note that you can change the interval and accuracy at a later time, e.g., when the device is lost or stolen. 6. Click OK.
175
Geotracking is enabled on each device the next time it contacts the mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network.
4. Enter the device recovery token in the Device recovery token field and click OK.
176
Geotracking is enabled on the selected device the next time it contacts the mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network.
You can display collected locations of mobile devices numerically or graphically on a map.
2. Right-click the device and choose Set Device Name from the context menu. 3. In the New Mobile Device Name dialog, enter the desired new name and click OK. The device is renamed the next time it contacts the mobile OS vendors notification server. (See How managing mobile devices works on page 6 for more information.) If devices are online via WiFi
177 Absolute Manage User Guide
or a mobile network, this happens quickly, usually within a minute, but if they are not connected (switched off or out of range of any accessible network), it will happen once the device has reconnected to a network. The new name is displayed in the Mobile Device Name information item.
178
Chapter 7
Several file-related operations are described elsewhere in this manual: Distributing documents and media to managed mobile devices is described in Distributing media to mobile devices on page 164. Distributing software to administered desktop computers is described in Installing software on page 190. Distributing software to managed mobile devices is described in Installing software on mobile devices on page 153. Working with the registries of Windows computers is described in Editing the registry on page 133.
NOTE It is easier to work with files that are listed in the Files table of the Absolute Manage database. Searching for files to include them in the database is described in Gathering information on files on page 73.
179
described in An alternative method of specifying files on page 188. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Copy File/Folder or Move File/Folder, depending on the desired action. The Copy File or the Move File dialog opens. Both dialogs are very similar; the Copy File dialog is shown here:
Note: If you have selected only a single file, the path of that file is displayed in the File field. 3. Choose the target region and location and enter the path where the files are to be copied or moved. The available target regions and locations are discussed in Copy File/Folder on page 314. 4. If you want to give the copied or moved files new names, enter the desired new name. Note: If you have selected more than one file from the same target computer, trying to rename files will lead to errors. 5. If you want the copied or moved files to replace any files in the target folder that have the same name, check Replace existing file. IMPORTANT Deleted file cannot be recovered, short of using specialized tools that may or may not be successful. 6. Click Execute. Absolute Manage copies or moves the files as specified. Any errors are noted in the command history.
180
Deleting files
You can use Absolute Manage to delete files on administered computers. IMPORTANT Deleted file cannot be recovered, short of using specialized tools that may or may not be successful. To delete files: 1. In any browser window showing files, select the files that you want to delete. Note: If you would rather specify the computers first or if the file is not available in the Absolute Manage database, there is an alternative method for specifying the command target that is described in An alternative method of specifying files on page 188. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Delete File/Folder. The Delete File dialog opens:
Note: If you selected only a single file, the path of that file is displayed in the File field. 3. Click Execute. Absolute Manage deletes all specified files immediately; there is no confirmation, and files are not just moved to the Trash.
Renaming files
Absolute Manage lets you rename files on administered computers.
181
To rename files: 1. In any browser window showing files, select the files that you want to rename. Note: If you would rather specify the computers first or if the file is not available in the Absolute Manage database, there is an alternative method for specifying the command target that is described in An alternative method of specifying files on page 188. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Rename File/Folder. The Rename File dialog opens:
Note: If you selected only a single file, the path of that file is displayed in the File field. 3. Enter the new name for the files. Note: If you have selected more than one file from the same directory on the same computer, trying to rename them will lead to errors. 4. Click Execute. Absolute Manage renames the files.
182
3. To specify the file you want to view, do one of the following: Enter the files full path in the File to view field. For Mac OS X files, you can use the tilde (~) to refer to the current users home directory. For files on Windows target computers, you can use variables in the path. Drag the file from any Absolute Manage browser window to the File to view field, making sure to put the text insertion mark in the field first. Choose one of the predefined files from the pop-up menu.
4. If you are specifying a large file and do not want to view all of it, use the Data to view slider to restrict the amount of data from the file that Absolute Manage is to display. Absolute Manage displays the specified amount of data at the end of the file.
183
5. To automatically refresh the file display in regular intervals, check the Refresh automatically option and specify the desired interval. 6. Choose the text encoding of the file you are about to view. Note: Normally, we recommend that you choose UTF-8, which includes automated line-by-line checking of the actual encoding with conversion performed as required. 7 . Click Execute.
Absolute Manage displays the content of the file in a new window on your workstation. If you have added multiple computers to the target list, the files at the specified location on all computers are displayed, each in its own window. You can search the displayed files using the commands from the Find submenu or filter the displayed lines using the filter field at the top of the window. You can also save entire files to disk.
184
Note: If you had selected only a single file, the path of that file is displayed in the File field. 3. Choose the target region and location and enter the path where the aliases are to be created. The available target regions and locations are discussed in Copy File/Folder on page 314. 4. If you want to give the aliases names that are different from the default names created by the operating system, enter the desired new name. Note: If you have selected more than one file from one target computer, trying to name the aliases will lead to errors. 5. Click Execute. Absolute Manage creates the aliases at the indicated locations on the same computers as the specified files.
Creating folders
Absolute Manage lets you create new folders on administered computers in any desired location. To create folders: 1. In any browser window showing files, select the computers on which you want to create the folders. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Create Folder.
185
3. Choose the target region and location and enter the path where the folders are to be created. The available target regions and locations are discussed in Copy File/Folder on page 314. 4. If you create folders on Mac OS X computers, specify their access permissions, owner, and group. In each case, you can choose between letting the folders inherit these settings from their parent folder or providing an explicit setting. 5. Click Execute. Absolute Manage creates the folders at the indicated locations.
186
To transfer a file or folder from your workstation to administered computers: 1. In any browser window showing files, select the computers to which you want to transfer the files. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Transfer File/Folder. The Transfer File/Folder dialog opens:
3. Specify the file, folder, or Mac OS X disk image that you want to transfer, either by entering the path in the Source field or by clicking the Select button and choosing the desired object. 4. If you have selected a file, you can check the Transfer all files in folder containing source file option to transfer the entire contents of the folder in which the selected file is located to the target computers. If this option is not checked, only the file itself is transferred. 5. If you have selected a disk image, you can check the Transfer contents of disk image option to transfer the contents of the selected disk image file instead of the file itself. In this case, the target settings in the dialog pane become unavailable; the files from the disk image are always copied to the boot volume at the same paths they have on the disk image. 6. Choose the target region and location and enter the path where the folders are to be created.
187
The available target regions and locations are discussed in Copy File/Folder on page 314. 7 . If you copy the file or folder to Mac OS X computers, click the Permissions tab to specify the access permissions, owner, and group.
For owner, group, and each permission, you can choose between letting the folders inherit the setting from the source item on your computer or providing an explicit setting. For owner and group, you can also let the item inherit the setting from the enclosing folder on the target computer. 8. If you want to send a message to the user before the transfer begins, click the Message tab. Using this tab is similar to using the Send Message command as described in Sending messages on page 112. If you provide a Cancel button in the message dialog, the transfer is aborted on a target computer if a user clicks Cancel. Note: If a message has been specified, this is indicated by a diamond in the dialogs Message tab. 9. Click Execute. Absolute Manage transfers the file or folder to the indicated location on the target computers. Any errors are noted in the command history.
188
another browser window displaying files and then adding the target computers (if there is more than one target). Sometimes, it is easier to start with specifying the computers first and then entering the path of the file. In this case, the file does not need to be in the Files table of the Absolute Manage database, meaning that you do not have to search for it before being able to manipulate it. NOTE This procedure does not work on multiple files at the same time. To use this alternative method of working with files: 1. In any browser window, select the computers on which you want to manipulate the files. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose the desired file-related command. The commands dialog opens. 3. In the File field, enter the path of the file. 4. Proceed with specifying the command options and executing the command, as described in the respective procedures.
189
Chapter 8
Installing software
While you can use Absolute Manage to manually install software on administered computers (see below), it really shines when you use the Software Distribution Center to automatically distribute software to any number of computers. The Software Distribution Center can automatically install a specific range of applications on new computers as soon as they are put on the network. Or you can use it to distribute newly introduced or updated applications to specific workgroups or the organization. NOTE Installing software on administered mobile devices works differently and does not use the Software Distribution Center. See Installing software on mobile devices on page 153 for details. Using the Software Distribution Center is explained in: Overview on page 191 Setting up distribution points on page 192 Setting up payloads on page 199 Setting up software packages on page 201 Setting up metapackages on page 210 Setting up computer groups on page 216 Performing installations on page 221 Performing ad hoc installations on page 222 Automated patch management on page 224 Reinstalling a Mac OS X computer on page 226 Reinstalling a Windows computer on page 230
Installing software
the Execute Macintosh File or Execute Windows File commands, depending on the target platform. They are described in Executing files from your computer on page 126.
Overview
The Software Distribution Center is a module of the Absolute Manage Server that offers automatic server-based software distribution. It is controlled from the Server Center window. This section explains the basics of the Software Distribution Center structure, setup, and use. It also includes references to detailed instructions.
Prerequisites
Some features of the Software Distribution Center can be used only by administrators whose accounts have certain rights set. Configuring administrator accounts is described in Administrator accounts on page 45.
Structure
The software distribution system has four key components: Distribution points are servers that host the files to be installed. There can be any number of distribution points, allowing you to place them in a way that minimizes network traffic. One of the distribution points is defined as the master; all others are mirror servers. The software installers present on the master distribution point are automatically distributed to the mirror servers so that all distribution points always have the same range of software available without requiring any manual maintenance. There is comparatively little network traffic to the Absolute Manage Server (in its capacity as the Software Distribution Center) as it does not itself distribute the software installers. Payloads are files or folders that are to be installed. They can be created from local files but are always stored on distribution points.
191
Software packages are combinations of references to payloads with metadata regarding the target requirements and scheduling of the installation. Software packages come in two flavors: Standard packages contain payloads, while metapackages contain other software packages (including metapackages). Computer groups are collections of computers that are to receive the same software.
When these components are set up, the actual installation is almost completely automatic, requiring you only to indicate which software packages are to be installed in which computer groups.
Setup
Setting up the Software Distribution Center consists mainly of defining the key components distribution points, payloads, software packages, and computer groups. This is done in the Absolute Manage Admins Server Center window, as described in the following sections: Setting up distribution points on page 192 Setting up payloads on page 199 Setting up software packages on page 201 Setting up computer groups on page 216
Only in some cases do you need to configure agents: Where you have assigned more than one Absolute Manage Server to some or all agents. This requires you to specify for each agent which of the Absolute Manage Servers is to act as the software distribution server. This is necessary because, while any number of inventory servers can be assigned to one agent, each agent may have only one software distribution server. Where the software distribution server is not the inventory server (i.e., main Absolute Manage Server) assigned to the agent.
In this case, you need to explicitly assign the desired software distribution server to the agent using the Agent Settings command. This is described in Assigning software distribution or license monitoring servers to agents on page 54. You can use the same command to specify the interval in which the agent queries the software distribution server for new software.
192
Installing software
193
2. From the action menu, choose New Distribution Point. The Distribution Point dialog opens:
194
Installing software
This name is used only inside the Absolute Manage system; you can choose whatever name you like. 4. Enter the distribution point address either the IP number or the DNS name and the port on which the Absolute Manage Agent on the distribution point communicates. Note: We recommend that you do not change the default port unless you have a specific reason for doing so. 5. In a setup with multiple distribution points, any distribution point can normally serve any agent. If you want to restrict a distribution point to a certain group of clients (e.g., one particular satellite office), specify a range of IP addresses in the Assigned IP range fields. Note: You can also assign a distribution point to a computer group, making it the preferred distribution point for downloads from computers in that group. To assign a distribution point to a group, click the Distribution Points icon in the Server Center window after you have completed specifying the distribution point and drag it to the desired computer group. 6. Enter the path of the folder in which Absolute Manage is to store the software installers on this distribution point. Note: The contents of this folder is managed entirely by Absolute Manage. Do not manually delete from or add to this folder. 7 . Specify the maximum number of concurrent software downloads (agents downloading the software installers) the distribution point will provide. If you want this limit to be exceedable in cases where an agent wants to download an installer but no distribution point has available download slots, check Max. downloads may be exceeded. If the option is unchecked, the download attempts by the agent will be deferred in situations where no distribution point has download capacity. That means that the software installation on the clients concerned will still happen, only at a later time. 8. If you want this distribution point to be the master distribution point, check the Is master distribution point option. If the option is unchecked, the distribution point will become a mirror that receives all its software installers automatically from the master distribution point. There must always be exactly one master distribution point. Because the master distribution point must be up and running for the proper functioning of the software distribution and because it receives more traffic than mirror distribution points, we
195
recommend that you designate a reliable computer with highbandwidth network connections as the master distribution point. 9. If you want to limit how much network bandwidth is used for downloads from this distribution point (both for providing installers to clients and for mirroring to other distribution points), enter the desired limit in Download bandwidth. 10. If mirroring is to be limited to a certain time of the day (e.g., after hours), check the Only between option and enter the desired interval. Note: Because of a limitation in the operating system, midnight at the end of the day cannot be specified as 24:00 when using a 24-hour clock. Enter 0:00 instead. 11. Click OK to close the dialog. 12. To store the distribution point specification on the Absolute Manage Server, choose Save Distribution and Licensing Info from the Server menu. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before doing so), but the new distribution point becomes available to the Software Distribution Center only after you have done so.
196
Installing software
If you have recently made changes to payloads or have created new ones, you may want to compare the total size of the contents of the package root folders on the computers. 2. Edit the existing master distribution point specification as described in Editing distribution points, above. Uncheck the Is master distribution point option and click OK. 3. Edit the specification for the intended new master distribution point in the same way, checking the Is master distribution point option. Absolute Manage displays a dialog informing you of options to transfer the required payloads. 4. Click the Manually Copy Folder button. You do not actually need to copy anything as all required installers are already present on the new master distribution point. 5. From the Server menu, choose Save Distribution and Licensing Info to upload the new definitions to the Absolute Manage Server. The new master distribution point is now active; the previous master distribution point is now a mirror distribution point. If the new master distribution point has not been used as a distribution point so far: 1. Make sure that the Absolute Manage Agent is installed on the intended new master distribution point.
2. Manually create the package root folder on the intended new master distribution point. 3. Copy the entire contents of the package root folder from the existing master. Note: There is an alternative process for switching master distribution points in which Absolute Manage Admin re-uploads all the payloads. If you want to follow that process, make sure that the source files for all payloads are available on your computer. Note, however, that all automatically created software patches are lost in this procedure and must be redownloaded from Apples and Microsofts servers. Delete all these patches from the Software Distribution System before switching the server. 4. Define the new master distribution point as described in Specifying the distribution point in the Software Distribution Center, above. Make sure to check the Is master distribution point option. 5. Edit the existing master server specification as described in Editing distribution points, above. Uncheck the Is master distribution point option and click OK.
197
Absolute Manage displays a dialog informing you of options to transfer the required software installers. 6. Click the Manually Copy Folder button. You do not actually need to copy anything now as you have already done so in step 3, above. Note: If you follow the alternative procedure, click the Re-Upload Payloads button. 7 . From the Server menu, choose Save Distribution and Licensing Info. If you follow the alternative method, Absolute Manage Admin will now attempt to upload the source files for all payloads to the new master distribution point. If this does not succeed for all payloads, Absolute Manage Admin notifies you of the fact and marks all payloads that could not be uploaded as Source missing in the Upload Status column. Note: You may need to add the column to the Server Center window to see the information. Open each failed payload and respecify the source file. When you are done, choose Save Distribution and Licensing Info again. The new master distribution point is now active; the previous master distribution point is now a mirror. If you have chosen to re-upload payloads, it may take a while before the distribution point is ready, depending on the number and size of the payloads.
198
Installing software
Setting up payloads
Payloads are files or folders that are to be installed on the client computers. Payloads are stored on distribution points and referenced in installation packages. NOTE Due to limitations of the Windows operating system, payloads for Mac OS X clients must be created on administrator computers running Mac OS X.
NOTE Setting up payloads is possible only for administrators with the Modify Software Package right. See New Administrator on page 471 for details. To set up a payload: 1. Open the Server Center window by choosing Server Center from the Window menu.
2. From the action menu, choose Software Distribution > New Payload. The Payload dialog opens:
3. Enter the desired name in the Payload name field. This is the name by which the payload will be known in Absolute Manage; you can choose whatever name you like. 4. Click the Select button and specify the file or folder to install. If you want to create a package for Mac OS X targets, you must do so on a Mac OS X computer. Note: You can use Absolute Manage InstallEase to create custom installers.
199
Setting up payloads
You can specify a disk image (created manually or with Absolute Manage InstallEase) as the file. In that case, any files in the disk image are copied to the same locations on the target hard disk; any missing folders are automatically created by Absolute Manage. 5. If the specified file is not self-contained i.e., if it requires additional files to be present, as is usually the case for MSI installers make sure that these files are located in the same folder as the installer and check Transfer all files in folder containing executable. 6. If the selected file is an application, a system script, or an installer package, check Selected object is executable or installer package. 7 . Optionally you can enter a short description of the package in the Notes field.
8. Click OK to close the dialog. 9. To store the payload on the Absolute Manage Server, choose Save Distribution and Licensing Info from the Server menu. Absolute Manage uploads the payload to the master distribution point, compressing and encrypting it in the process. It also creates a checksum that is verified by agents during installations. When the payload has been successfully uploaded to the master server, its specification is stored on the Absolute Manage Server. Mirroring to any additional distribution points happens automatically in the background. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before doing so), but the new software package becomes available to the Software Distribution Center only after you have done so.
Editing payloads
To edit existing payloads: 1. Select the payload in the Server Center window and choose Edit Payload from the action menu. The Payload dialog opens. 2. Make the desired changes and click OK. 3. Choose Save Distribution and Licensing Info from the Server menu to activate the changes in the Software Distribution Center.
Removing payloads
To remove existing payloads: 1. Select the payloads in the Server Center window and choose Remove Payloads from the action menu.
200
Installing software
A confirmation message is displayed. 2. Confirm the decision. 3. Choose Save Distribution and Licensing Info from the Server menu to store the changes in the Software Distribution Center. Until you do this, the payloads are still available.
201
In the Package tab, you specify the payloads to be used. Note: Never use the Absolute Manage Agent updater as the payload in packages you generate. Absolute Manage automatically generates update packages for agents, and you must only use those packages. See Updating the Agent on page 39 for details on updating agents. 3. Enter the desired name for the software package in the Package name field. Optionally you can also enter a short description of the package in the Description field. This name is used only inside the Absolute Manage system; you can choose whatever name you like. 4. Specify the payloads that are to be included in the package. All payloads that are available on the distribution points are listed in the dialog pane. You can add new payloads by clicking the New Payload button; proceed as described in Setting up payloads on page 199. You can filter the displayed payload by entering parts of their names in the search field above the list of payloads. Check all payloads that are to be included in the package.
Absolute Manage User Guide 202
Installing software
5. From the Executable payload pop-up menu, choose the executable payload of the package. There must always be exactly one executable payload in each package, This is the payload that is launched by the agent after all payloads have been copied to the target computer. 6. Optionally, you can specify command-line options in the Command line options field. You can include environment variables in the options, as described in Environment variables on page 134. When the executable is an MSI, MSP patch file, or MSU updater file and you do not specify command line options, Absolute Manage adds the /qn option (/quiet /norestart for MSU files) to run the installer silently. When you add your own options or when another type of installer is selected, you have to provide the command line parameters for a silent installation yourself. 7 . For Mac OS X installers, you can specify a desired installation volume in the Target installation volume field. If this field is left empty, the installation will be performed on the boot volume.
203
To specify requirements and timing options, click the Installation Options tab:
8. If you do not want to make the software package available immediately, enter the earliest time when agents can install it in the Availability date field. 9. Normally, agents install software packages meant for them as soon as they become available. The Install at pop-up menu and Install when options lets you modify this behavior: You can instruct the agent to wait until the next startup of the administered computer or user login (choose Next startup or Next login). The latter is particularly useful when the installer requires a user to be logged in. You can specify that the package can be installed when a user is logged in on the target computer, when no user is logged in, or in both cases. Note: It is possible to check both options, which is indeed the default. At least one of the two options must be checked. When the user is allowed to refuse the installation (in the User Interaction pane, see below), the package can only be installed when a user is logged in. You can also specify that installations only happen during certain times, e.g., after hours when the office is not busy (Only install between).
10. If the package is to be installed only over fast networks, check Dont install on slow network.
204
Installing software
A network is considered slow when its nominal data rate is less than 100 Mbit/s. 11. Specify via the Download payloads setting when the agent is to download the payloads, before or after a user dialog is displayed. Downloading the payloads before displaying the dialog makes for snappier responses after the user answers the dialog but may mean unnecessary network traffic if the user refuses the installation. Downloading the payloads after displaying the dialog avoids unnecessary traffic but makes users wait for the download to happen after they have agreed to the installation. If no user dialog is displayed, the Download payloads setting is ignored. 12. Specify a priority if desired. The priority determines the order in which an agent installs packages when several are available simultaneously. 13. If you want to restrict the distribution points from which an agent may download the payloads of this software package to assigned distribution points (from the agents local subnet or from a computer group to which the agents computer belongs), choose an option from the Distribution point pop-up menu. If you choose From assigned distribution point if available, the agent tries to download the payloads from an assigned distribution point. If no such distribution point is available, it chooses a different one. If you choose From assigned distribution point only, the installation fails if there is no assigned distribution point. 14. Specify the user account that is to be used for installations. Normally, this will be the current local user on each computer. You can specify a different account. For Windows only, you must also specify the accounts password in this case. When you specify a Windows domain username, you must prefix it with the domain and \. You can also specify that the installation be performed in the context of the system user. If the installation requires administrator privileges on Mac OS X, check the Requires admin privileges option. Note: This latter option does not change the used account; it merely temporarily boosts the privileges available to the installation process. 15. If you want the installation files to remain on the target computers after the installation has finished, check Keep package files after installation.
205
If this option is unchecked, the agents delete the downloaded payloads after the installation is complete. 16. If you want the users to start the installation of this package on their own schedule creating a package for pull installation instead of push installation check the Allow on-demand installation option. Checking this option disables a number of other options in the Installation Options and User Interaction panes. 17 Specify the operating system platform Mac OS X or Windows, . optionally restricted to just client or just server systems and any minimum and/or maximum versions required by the software. If desired, choose an option from the Platform architecture pop-up menu to restrict installation of the package to Intel or PowerPC processors (Mac OS X) or 32-bit or 64-bit systems (Windows), respectively. 18. Click the User Interaction tab to specify which information is presented to users and what interaction options they have for the installation:
19. Specify in the Before installation pop-up whether the user is to be notified or have the option to postpone or refuse the installation. Depending on the option chosen, additional settings become available: You can specify that the installation is automatically started after a certain time if the notification should not be answered by the user.
206
Installing software
You can also specify that the installation cannot be postponed for more than a certain interval or beyond a certain date. Note: If you specify both an interval and a deadline, the earlier of the two resulting dates is effective. 20. If the user is to be informed of the progress of an installation under way, check Display progress to user. 21. From the After installation pop-up menu, choose the desired action that Absolute Manage Agent is to perform when the installation is complete. Depending on your choice, additional options may become available. You can specify an interval after which a notification is automatically closed. When a restart is to be performed, you can specify that the user is notified in advance. You may give him or her the opportunity to defer the restart, specify that the restart happens automatically after a certain time when the notification is not answered, and have the notification reappear in regular intervals. 22. If desired, check Warn user about slow network to inform users when their network connection to the distribution point has a nominal speed of less than 100 Mbit/s.
207
23. If desired, click the Installation Conditions tab to limit the package to be installed only on computers that meet certain prerequisites:
24. To have the software installed on all computers that belong to the computer groups to which the package is assigned, choose Install the software on all target computers. To have it installed only on certain computers, choose Install the software only on computers where the software specified below is and specify the appropriate conditions. The available settings are similar to the ones in Setting up license specifications on page 238. 25. If an executable payload containing an Adobe CS3 or CS 4 installer or updater is assigned to this software package, you can set additional options as described in Setting options for Adobe CS3 and CS 4, below. 26. Click OK to close the dialog. 27 To store the software package specification on the Absolute . Manage Server, choose Save Distribution and Licensing Info from the Server menu. Absolute Manage creates the package definition on the Absolute Manage Server. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before
208
Installing software
doing so), but the new software package becomes available to the Software Distribution Center only after you have done so.
2. Click Use the following settings for installation. If you click Use command line options for installations, all other settings in this pane are disregarded. If you choose that options, customize the installers behavior via the command line options in the Package pane, as described in step 6 of the previous procedure. 3. Check the desired components for installation or uninstallation in the scrolling list. 4. From the Action pop-up menu, choose whether to install or uninstall the software. 5. If desired, enter a serial number in the Serial number field. 6. Check the other options as desired. The options are explained in Adobe CS Options on page 442.
209
Setting up metapackages
Besides changing options for the packages, you can also use this process to specify different payloads, e.g., when a new version has become available.
Setting up metapackages
Metapackages are combinations of references to software packages and additional metadata. They represent a software installation within the Software Distribution Center. NOTE Setting up metapackages is possible only for administrators with the Modify Software Package right. See New Administrator on page 471 for details. To set up a metapackage: NOTE The settings you make for the metapackage override any conflicting settings for the software packages and metapackages included in the metapackage. 1. Open the Server Center window by choosing Server Center from the Window menu.
2. From the action menu, choose Software Distribution > New Metapackage.
210
Installing software
In the Package tab, you specify the packages to be used. 3. Enter the desired name for the metapackage in the Package name field. Optionally you can also enter a short description of the package in the Description field. This name is used only inside the Absolute Manage system; you can choose whatever name you like. 4. Choose the desired target operating system platform from the OS platform pop-up menu. 5. Specify the software packages that are to be included in the metapackage. All packages that are available on the distribution points, including other metapackages, are listed in the dialog pane. You can filter the displayed packages by entering parts of their names in the search field above the list of packages. Drag all payloads that are to be included in the metapackage from the left-hand list to the right-hand list. You can reorder packages in the right-hand list by dragging them higher or lower in the list. Absolute Manage installs packages contained in a metapackage in the order in which they are listed.
211 Absolute Manage User Guide
Setting up metapackages
6. If you want Absolute Manage to continue installing packages on a client even after the installation of one package fails, check Continue installation after failed packages. If the option is unchecked, a failed package causes the installation of the metapackage to stop. 7 . To specify requirements and timing options, click the Installation Options tab:
8. If you do not want to make the metapackage available immediately, enter the earliest time when agents can install it in the Availability date field. 9. Normally, agents install metapackages meant for them as soon as they become available. The Install at pop-up menu and Install when options lets you modify this behavior: You can instruct the agent to wait until the next startup of the administered computer or user login (choose Next startup or Next login). The latter is particularly useful when the installer requires a user to be logged in. You can specify that the metapackage can be installed when a user is logged in on the target computer, when no user is logged in, or in both cases. Note: It is possible to check both options, which is indeed the default. At least one of the two options must be checked. When the user is allowed to refuse the installation (in the User Interaction pane, see below), the package can only be installed when a user is logged in.
212
Installing software
You can also specify that installations only happen during certain times, e.g., after hours when the office is not busy (Only install between).
10. If the package is to be installed only over fast networks, check Dont install on slow network. A network is considered slow when its nominal data rate is less than 100 Mbit/s. 11. Specify via the Download payloads setting when the agent is to download the payloads of the contained packages, before or after a user dialog is displayed. Downloading the payloads before displaying the dialog makes for snappier responses after the user answers the dialog but may mean unnecessary network traffic if the user refuses the installation. Downloading the payloads after displaying the dialog avoids unnecessary traffic but makes users wait for the download to happen after they have agreed to the installation. If no user dialog is displayed, the Download payloads setting is ignored. 12. Specify a priority if desired. The priority determines the order in which an agent installs packages when several are available simultaneously. 13. If you want to restrict the distribution points from which an agent may download the payloads for this metapackage to assigned servers (from the agents local subnet or from a computer group to which the agents computer belongs), choose an option from the Distribution point pop-up menu. If you choose From assigned distribution point if available, the agent tries to download the payloads from an assigned distribution point. If no such distribution point is available, it chooses a different one. If you choose From assigned distribution point only, the installation fails if there is no assigned distribution point. 14. The user context cannot be set in a metapackage; it is taken from the individual packages. Likewise, the software packages determine which payloads are kept after installation and which are deleted. 15. Specify the operating system platform Mac OS X or Windows, optionally restricted to just client or just server systems and any minimum and/or maximum versions required by the software. If desired, choose an option from the Platform architecture popup menu to restrict installation of the package to Intel or PowerPC processors (Mac OS X) or 32-bit or 64-bit systems (Windows), respectively.
213
Setting up metapackages
16. Click the User Interaction tab to specify which information is presented to users and what interaction options they have for the installation:
17 Specify in the Before installation pop-up whether the user is to be . notified or have the option to postpone or refuse the installation. Depending on the option chosen, additional settings become available: You can specify that the installation is automatically started after a certain time if the notification should not be answered by the user. You can also specify that the installation cannot be postponed for more than a certain interval or beyond a certain date. Note: If you specify both an interval and a deadline, the earlier of the two resulting dates is effective. 18. If the user is to be informed of the progress of an installation under way, check Display progress to user. 19. From the After installation pop-up menu, choose the desired action that Absolute Manage Agent is to perform when the installation is complete. Depending on your choice, additional options may become available:
214
Installing software
You can specify an interval after which a notification is automatically closed. When a restart is to be performed, you can specify that the user is notified in advance. You may give him or her the opportunity to defer the restart, specify that the restart happens automatically after a certain time when the notification is not answered, and have the notification reappear in regular intervals. 20. The Warn user about slow network setting is taken from the individual software packages. 21. If desired, click the Installation Conditions tab to limit the package to be installed only on computers that meet certain prerequisites:
22. To have the software installed on all computers that belong to the computer groups to which the metapackage is assigned, choose Install the software on all target computers. To have it installed only on certain computers, choose Install the software only on computers where the software specified below is and specify the appropriate conditions. The available settings are similar to the ones in Setting up license specifications on page 238. 23. Click OK to close the dialog.
215
24. To store the metapackage specification on the Absolute Manage Server, choose Save Distribution and Licensing Info from the Server menu. Absolute Manage creates the package definition on the Absolute Manage Server. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before doing so), but the new metapackage becomes available to the Software Distribution Center only after you have done so.
Editing metapackages
To edit existing metapackage definitions: 1. Select the metapackages in the Server Center window and choose Edit Software Package from the action menu. The Metapackage dialog opens. 2. Make the desired changes and click OK. 3. Choose Save Distribution and Licensing Info from the Server menu to activate the changes in the Software Distribution Center. Besides changing options for the metapackages, you can also use this process to specify different contained packages.
Removing metapackages
To remove existing metapackage definitions: 1. Select the metapackages in the Server Center window and choose Remove Software Package from the action menu. A confirmation message is displayed. 2. Confirm the decision. 3. Choose Save Distribution and Licensing Info from the Server menu to store the changes in the Software Distribution Center. Until you do this, the metapackages are still available.
216
Installing software
There are standard and smart computer groups: Standard computer groups are maintained manually computers are added and removed by explicit administrator decision. The group is defined by the computers it contains. Smart computer groups are maintained automatically. They are defined by one or more criteria and contain all computers meeting those criteria. Absolute Manage automatically adds a computer to a group when it meets the criteria and automatically removes it if it no longer does. Although standard and smart groups can be used in the same way, they are defined and edited differently, as described below. NOTE The same computer groups are available for license monitoring and software distribution.
2. From the action menu, choose Computer Groups > New Computer Group. The New Computer Group dialog opens:
3. Enter the desired name and click OK. The new group appears in the Server Center windows sidebar. 4. To add computers to the group, drag them on top of the group icon from the table area, e.g., from the Unassigned Computers default computer group, or from any browser window displaying computers. To remove computers, select them in the group, right-click them and choose Remove from Group from the context menu. A confirmation message is displayed. 5. If desired, you can assign distribution points to groups. Computers from a group will prefer these assigned servers for installer downloads.
217
To assign a distribution point to a group, select the distribution point in the Server Center windows sidebar, displaying its details in the window:
Check all groups to which you want to assign the server. 6. To store the computer group specification on the Absolute Manage Server, choose Save Distribution and Licensing Info from the Server menu. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before doing so), but the new computer group becomes available only after you have done so.
2. From the action menu, choose Computer Groups > New Smart Computer Group.
218
Installing software
3. Enter the name for the new computer group and define the conditions that computers must meet to be included in the computer group. To define a condition, specify an information item in the left-hand text field, choose a comparison operator from the pop-up menu, and enter a comparison value in the right-hand text field. (For some information items, there is no comparison value.) When the text insertion mark is in a field, you can drag a column from the Columns drawer into the field. With the + and buttons, you can add and remove conditions. 4. If you have specified more than one condition, specify through the upper pop-up menu whether computers must meet one or all of the conditions. 5. Click OK. The new group appears in the Server Center windows sidebar. 6. If desired, you can assign distribution points to groups. Computers from a group will prefer these assigned servers for installer downloads.
219
To assign a distribution point to a group, select the server in the Server Center windows sidebar, displaying the servers details in the window:
Check all groups to which you want to assign the server. 7 . To store the computer group specification on the Absolute Manage Server, choose Save Distribution and Licensing Info from the Server menu. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before doing so), but the new computer group becomes available only after you have done so.
220
Installing software
Performing installations
Once the software distribution system has been set up as described in the previous sections of this chapter, any installation process is a very simple matter. To initiate a new installation process: 1. Open the Server Center window by choosing Server Center from the Window menu.
2. Make sure that the software installation package or metapackage has been properly defined. 3. Drag the package from the table area to all computer groups to which the software is to be distributed. Software installation will begin automatically shortly thereafter. (See below for details.) You can monitor the progress of the individual installation processes in the subgroups of the Installation Status subcategory in the sidebar. The available subgroups are described in Software Distribution on page 428. NOTE Installations may not begin immediately for a variety of reasons, among them that you have set a later availability date or chosen an option from the software packages Installation time pop-up menu.
Installation process
The actual installation process is completely automatic. It involves these main steps: The agents contact their assigned software distribution server to check whether there is new software available for them.
221
The server and the contact interval is set in the Agent Settings dialog that is described in Agent Settings on page 282. The server checks to which computer groups an agent belongs and reviews all software packages and metapackages assigned to those computer groups: Is the software package already available (as per the setting in the package definition)? Does the agent meet the operating system requirements? Are the optional auxiliary requirements from the package definition met (installation time during the day, user logged in, etc.)? Is the package not yet installed on the agents computer? If all these questions are answered with yes the Absolute , Manage Server notifies the agent of the availability of a new package and provides the location of the payloads on one of the distribution points. The agent downloads the payloads from the distribution point. If the package specifies a user notification or allows the user to postpone or cancel the installation, the agent displays the message before or after downloading the payloads, as specified in the package. The agent executes the executable payload locally according to the specifications in the package. During the installation process, the agent reports the progress to the Absolute Manage Server. When the installation is done, the result is reported success or failure, and error details in the case of failure. Absolute Manage Admin displays the results in the Software Distribution > Installation Reports section of the Server Center.
Ad hoc installations require payloads, software packages, and distribution points to be set up.
222
Installing software
To install software packages ad hoc: 1. In any browser window, select the computers on which you want to install the software packages. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Install Software Packages. The Install Software Packages dialog opens:
3. Check the packages and metapackages that you want to install. 4. If you want to install selected packages and metapackages on a target computer even if that package has already been installed there, check the Install packages even if they are already present option. If you also want to install all packages contained in selected metapackages regardless of whether they have already been installed, check Install packages contained in metapackages even if they are already present as well. 5. Click Execute. Software installation will begin automatically shortly thereafter. Any settings in the packages regarding the installation time are disregarded. Settings regarding user interaction are honored, however.
223
Absolute Manage Admin displays the installation results in the Software Distribution > Installation Reports section of the Server Center NOTE You can also launch this command by selecting the desired packages in the Server Center window, right-clicking them, and choosing Install Selected Software Packages from the context menu. In that case, you need to add the target computers to the command window.
Overview
The automated patch management covers all software updates that Apple and Microsoft make available via the automatic update functions in their operating systems, in particular: Free operating system updates and service packs Driver patches for Macintosh computers Free software updates for application software such as the iLife and iWorks suites or Internet Explorer
You can thus install an operating system in its shipping version (e.g., Mac OS X 10.5) and let all patches automatically be installed, creating a fully up-to-date system with no additional effort. NOTE For even easier installations of operating systems on computers that already have an Absolute Manage Agent, see Reinstalling a Windows computer on page 230.
Process
Automated patch management follows this process: 1. Agents check Apples and Microsofts servers for any new patches that apply to the computers on which they are running.
2. If such patches are found, the agents check the Software Distribution Center for the presence of the patch. 3. If the patch is not present, it is automatically downloaded and a payload and software package are created from it. This package is placed in the Unconfirmed Updates smart group.
224
Installing software
4. When patches have been downloaded to the Unconfirmed Updates smart group, they must be approved by you before any further processing happens: Drag them to the Rejected Updates group when you do not want them installed. If you want them installed, drag them to all groups containing computers on which the patch is to be installed. Note: You can reverse the decision to reject a package at any time. (You can also reverse the decision to accept a package, but that obviously does not undo any installations that may already have happened.) The software package contains information (received from the operating systems update utilities) about the intended target computers. It is installed on only those client computers where it is according to this information actually required. We therefore recommend that you handle packages that you want to accept in the following way: For Mac OS X packages, just drag them to the All Macs computer group. For Windows packages, create a smart computer group for each major strain of the operating system (e.g., Windows 2003 Server, Windows XP Windows 7) using the OS , Platform information item. Then just drag each accepted patch to the appropriate smart computer group.
5. Software installation from here on follows the same process as for other software packages, as described in Installation process on page 221, with only one deviation: Packages are installed only when they apply to the individual computer according to the local Software Update or Windows Update utilities. So, a package that is not needed on a particular client would not be installed, even though it is assigned to a group to which the computer belongs.
225
To deactivate the patch management completely, switch it off for all agents, as described above.
When you tell Absolute Manage to reinstall a client computer, it stops all processes running on that computer, erases the specified hard disk optionally preserving user folders and network settings , copies the disk images contents to the hard disk, and reboots the computer. To reinstall a Mac OS X computer: 1. Install on a hard disk volume the operating system.
2. Install and configure the Absolute Manage Agent. In particular, set the inventory server and, if you employ them, the software distribution server and the license monitoring server. Note: If you do not include Absolute Manage Agent on the disk image, reinstallation is still possible but Absolute Manage will be unable to administer the reinstalled client computers until Absolute Manage Agent is installed on them once more. 3. Install any additional software that you want to be present on the client computers. 4. Create a disk image from the boot volume, e.g., using Apples Disk Utility, and save it on your computer.
226
Installing software
The disk image file must be saved in Apples .dmg format or any other format that can be mounted on the client computers without requiring additional software. For performance reasons, we recommend saving the image file as a compressed image, using the appropriate option in Disk Utility. 5. If you plan to use the image only once, skip to step 10. If you plan to reuse the disk image, create a disk image specification as described in the following steps. Note: Setting up disk images as described in the next steps is possible only for administrators with the Modify Disk Image right. See New Administrator on page 471 for details. 6. Open the Server Center window, right-click in the left-hand sidebar, and choose Software Distribution > New Disk Image from the context menu. The Disk Image dialog opens:
7 .
Enter the disk image specification: Disk image name: The name that you want to give the disk image specification for purposes of identifying it within Absolute Manage. Disk image file: The file that contains the disk image. Absolute Manage supports Apples .dmg format as well as any other disk image that can be mounted without additional software on the target computer. Disk image password: If the image is passwordprotected, enter the password here. Distribution point: This option specifies from which distribution points the target computer may download the image: Any: The image can be downloaded from any distribution point on which it is found. From assigned distribution point if available: The image is downloaded from a distribution point that is assigned to the target computers subnet or a computer group to which the target computer belongs. If the image is not available on any such distribution point, it is downloaded from another distribution point.
227
From assigned distribution point only: As above, but if the image is not available, the installation fails.
8. Click OK to save the disk image specification. If desired, create more disk image specifications. 9. From the Server menu, choose Save Distribution and Licensing Info to store the changes on the server. You can start using the new disk image through the Software Distribution Center when the upload is complete. Note: While disk images can be stored in the Software Distribution Center, they cannot be assigned to computer groups as software packages can. Applying a disk images to a clients computer is only possible by explicitly selecting that computer and choosing the Reinstall Mac OS X Computer command. 10. In any browser window, select the Mac OS X computers that you want to reinstall. 11. From the Commands menu, choose Reinstall Mac OS X Computer.
228
Installing software
12. In the Disk image source section, specify the disk image that is to be the source of the reinstallation. The individual options in this dialog are described in Reinstall Mac OS X Computer on page 294. 13. In the Destination section, specify the volume on which the disk images content is to be installed. IMPORTANT The option to install on the first volume other than the startup volume is primarily intended to allow you to reinstall the (sole) local volume of a computer that has been booted from a network volume. If there are more than two volumes on a client, there is no way to tell which of the non-startup volumes will be chosen. We strongly recommend against using this option on computers with more than two mounted volumes.
229
14. In the Options section, specify execution options such as scripts to be executed before or after the installation, settings to keep, or user interaction options. 15. If you want to send a message to the user before the installation begins, click the Message tab. Using this tab is similar to using the Send Message command as described in Sending messages on page 112. If you provide a Cancel button in the message dialog, the installation is aborted on a target computer if a user clicks Cancel. Note: If a message has been specified, this is indicated by a diamond in the dialogs Message tab. 16. Click Execute. Absolute Manage erases the specified disks of the target Mac OS X computers and copies the software from the disk image. Any errors are noted in the command history.
No manual steps beyond initiating the process are needed, let alone physically visiting the computer. All that is required is that an Absolute Manage Agent is already installed on the computer. Windows computers can be reinstalled, provided that the computer is set to boot from the network first. This is possible even if no agent is installed on them. IMPORTANT This process completely reinstalls a target computers hard disk. It is in its nature to irrecoverably delete the target volumes previous contents. Before going ahead, you should therefore make absolutely sure that no important data is lost. Reinstalling a Windows computer involves these main steps:
230
Installing software
1.
Create a disk image with the desired hard disk contents and save it on a distribution point. The details of this step differ depending on which PXE server you use. See the appropriate section for details: Preparing a disk image using the Absolute server (page 231) Preparing a disk image using FOG (page 233)
2. Schedule the computer for reinstallation and restart it. For details, see Reinstalling Windows client computers on page 235. When you tell Absolute Manage to reinstall a client computer, it reboots the computer from the PXE server. It then erases the computers boot disk and installs the content of the specified disk image on it. After that, the computer is rebooted from the reinstalled hard disk. For details, see: Preparing a disk image using the Absolute server (page 231) Preparing a disk image using FOG (page 233) Reinstalling Windows client computers (page 235)
Preparing disk images using the procedure below requires that an Absolute PXE server is properly set up in your network, as described in Setting up the Absolute solution on page 19. To create a disk image: 1. Install the operating system on a Windows computer.
2. Create an empty file C:\AMFOGImage or C:\AMImage. 3. Install and configure the Absolute Manage Agent. In particular, set the inventory server and, if you employ them, the software distribution server and the license monitoring server. Note: If you do not include Absolute Manage Agent on the disk image, reinstallation is still possible but Absolute Manage will be unable to administer the reinstalled client computers until Absolute Manage Agent is installed on them once more. Also, the computer cannot automatically join a domain and the computer name is not set. 4. Install any additional software that you want to be present on the client computers.
231
5. Stop the LANrev Agent service and delete the registry value HKLM\Software\Pole Position Software\LANrev Agent\ AgentSerialno . Note: This is an optional but recommended step that provides a safety measure against duplicate agent IDs. Absolute Manage can reassign new IDs when it detects a duplicate, but deleting the ID from the registry in the first place makes this process unnecessary. 6. Run the Microsoft Sysprep utility on the computer: Windows XP: The utility is found on the Windows installation disk in \Support\Tools\Deploy.cab. Create the directory C:\sysprep, copy Sysprep to it, and execute Sysprep using: Windows 7: The utility is installed on the boot disk by default. Execute it with the following command (all in one line):
See the Sysprep documentation for details, including creating an answer file. 7 . Restart the computer, enter the BIOS configuration, and set it to boot from the network.
232
Installing software
10. Enter the address and access information for an SMB share or an FTP server on which you want the image file to be created. We do not recommend using TFTP because it does not support any kind of authentication. 11. Click Test Connection to verify that the connection is working. When it is, click OK. 12. In the device list, select the hard disk from which you want to create the installation image. We recommend that you choose a complete hard disk (a row with HDD in the Type column), not a partition (a row with a file system name in the Type column). 13. Enter the desired name for the image file in the Image File Name field. 14. Click Create Image. The disk contents is transferred to the specified server share. When the transfer is complete, you can use this disk image to reinstall client computers, as described in Reinstalling Windows client computers on page 235.
Preparing disk images using the procedure below requires that an FOG server is properly set up in your network, as described in Setting up the FOG solution on page 21.
2. Create an empty file C:\AMFOGImage 3. Install and configure the Absolute Manage Agent. In particular, set the inventory server and, if you employ them, the software distribution server and the license monitoring server. Note: If you do not include Absolute Manage Agent on the disk image, reinstallation is still possible but Absolute Manage will be unable to administer the reinstalled client computers until Absolute Manage Agent is installed on them once more. Also, the computer cannot automatically join a domain and the computer name is not set. 4. Install any additional software that you want to be present on the client computers. 5. Stop the LANrev Agent service and delete the registry value HKLM\Software\Pole Position Software\LANrev Agent\ AgentSerialno . Note: This is an optional but recommended step that provides a safety measure against duplicate agent IDs. Absolute Manage can reassign new IDs when it detects a duplicate, but deleting the ID from the registry in the first place makes this process unnecessary. 6. Run the Microsoft Sysprep utility on the computer: Windows XP: The utility is found on the Windows installation disk in \Support\Tools\Deploy.cab. Create the directory C:\sysprep, copy Sysprep to it, and execute Sysprep using: Windows 7: The utility is installed on the boot disk by default. Execute it with the following command (all in one line):
See the Sysprep documentation for details, including creating an answer file. 7 . Using FOG, create a disk image of the computer as described in the FOG documentation. Choose an image type depending on the operating system and partitioning scheme: For Windows XP with a single partition, choose Single Partition (NTFS only, Resizable).
234
Installing software
For Windows XP with multiple partitions (e.g., when there is a recovery partition), choose Multiple Partition Image Single Disk (Not Resizable). For Windows 7 choose Multiple Partition Image - Single , Disk (Not Resizable).
You can now use this disk image to reinstall client computers, as described below.
When a PXE server is properly set up (as described in Installing support for reinstalling Windows computers on page 19) and a suitable disk image has been created (as described in Preparing a disk image using the Absolute server on page 231 and Preparing a disk image using FOG on page 233), you can reinstall administered Windows computers: 1. In any browser window, choose the computers you want to reinstall. All selected computers will receive the same disk image. You can also select computers on which no agent is installed if you have created placeholder records for them, as described in Creating placeholder records for computers on page 62. 2. From the Commands menu, choose Reinstall Windows Computer. The Reinstall Windows Computer dialog opens:
3. From the Image pop-up menu, choose the desired disk image to be used for reinstalling the computers. 4. In the Computer name section, specify a new name for the selected computers or choose Keep existing to not change them.
235
5. In the Active Directory section, specify whether the reinstalled computers are to join a domain. If they are to join a domain, provide the name of the domain and administrator credentials for the domain. 6. If you want the reinstallation to proceed automatically when you send the command, check the Automatically restart computer to begin imaging process option. If this option is not checked, the target computers must be restarted manually before they will be reinstalled. The option has no effect for target computers on which no agent is installed; that is, such computers must always be manually restarted. 7 . If you want to send a message to the user before the installation begins, click the Message tab. Using this tab is similar to using the Send Message command as described in Sending messages on page 112. If you provide a Cancel button in the message dialog, the installation is aborted on a target computer if a user clicks Cancel. Note: If a message has been specified, this is indicated by a diamond in the dialogs Message tab. 8. Click Execute. Absolute Manage sends instructions to the PXE server to reinstall the computers after their next restart. If you have checked the Automatically restart computer to begin imaging process option, Absolute Manage also instructs the agents to restart the target computers. Note that the target computers must be set to boot from the network first in order for the reinstallation to be possible. 9. If no agent is installed on the target computers or you have not checked the Automatically restart computer to begin imaging process option, restart the target computers manually. Make sure that they boot from the network first. Many BIOSes allow you to specify the boot order on the fly by pressing the F10 or F12 key during the boot process. The target computer reboot from the network. The PXE server provides them with the specified disk image and controls the reinstallation process. The reinstallation task is displayed in the Window Reinstallation Tasks window.
236
Chapter 9
Monitoring licenses
Absolute Manage allows you to monitor the installation and use of licensed software on the computers in your network, record purchasing and maintenance agreement details, and create reports on historic usage, ensuring compliance with licensing limits. You can also specify software that is prohibited in your network and have all instances of this software be reported and optionally terminated automatically. The various aspects of license monitoring are explained in: Overview on page 237 Setting up license specifications on page 238 Tracking purchasing information on page 243 Setting up computer groups on page 245 Configuring agents on page 245 Checking licenses on page 249 Reports on page 250
Overview
The License Monitoring Center is a module of the Absolute Manage Server that provides constant automated monitoring of both per-installation and concurrent-use licenses as well as prohibited software. It also provides a repository for information related to license purchases and maintenance agreements. This section discusses the basics of license monitoring and provides an overview of setting it up.
Prerequisites
Some functions of the License Monitoring Center can be used only by administrators whose accounts have certain rights enabled. Configuring administrator accounts is described in Administrator accounts on page 45.
Setup
Setting up license monitoring involves defining license specifications which define the software to be monitored and the licensing parameters and optionally include purchasing and maintenance agreement information and computer groups groups of computers that are considered together for purposes of license monitoring. This is described in Setting up license specifications on page 238 and Setting up computer groups on page 245. Optionally, you can configure on the agents the servers to which they send reports. (If you do not configure this setting, reports are sent to
Absolute Manage User Guide 237
the default inventory server.) This is described in Configuring agents on page 245. You can also configure the times and intervals for checking for licensed software as well as the intervals for sending information to the server. This is described in Configuring agents on page 245. If everything has been set up, license specifications are assigned to groups. The compliance with these specifications is then monitored and recorded by the Absolute Manage Server. This is described in Checking licenses on page 249; the available reports are discussed in Reports on page 250.
Prohibited software
If there is software the use of which is prohibited in your network, you can use Absolute Manage to check for the presence of such software. This is done in exactly the same way as license monitoring; all that is required is to mark the software prohibited in the license specification.
238
Monitoring licenses
To create a license specification: 1. Open the Server Center window by choosing Server Center from the Window menu.
2. From the action menu, choose License Monitoring > New License Specification. The Software License Specification dialog opens:
3. Enter the desired name in the Specification name field. You can choose any desired name.
239
4. Choose the type of software that is to be monitored. Your choice in this menu determines, what kind of data Absolute Manage considers when checking whether the licensed software is installed on an administered computer: Mac OS Application Package: Mac OS X packages (a folder appearing as a file) are checked. Mac OS Application File: Mac OS X files are checked. Files are only considered to match if they are executable applications. Mac OS File: Mac OS X files are checked. Mac OS Installer Receipt: Installer receipts are checked. Installer receipts are descriptions of installed software in the form of an installer package that some Mac OS X installers create. Windows Application File: Windows files are checked. Files are only considered to match if they are executable applications. Windows File: Windows files are checked. Windows Installer Receipt: The reports on installed software that MSI installers create are checked. Windows Registry: The contents of the Windows registry is checked.
5. Specify the conditions that an object must match to be identified as the licensed software. You can click the Values from button to insert default comparison value from a file on your computer. The available conditions are explained in Files on page 557 or New License Specification on page 460, depending on the software type selected. When you specify a path or registry location, you can include environment variables, as described in Environment variables on page 134. Note: When you specify a license by Windows registry data, you should use the Key Name and Value Name conditions only when there is no other way to specify the desired software. Checking either condition requires the entire registry to be parsed, which generates significant local processor load on the client computer and also takes a while. If you do require either condition, specify it after any other conditions that may apply because that causes Absolute Manage to apply it only to the part of the registry that meets those other conditions. Note: When specifying a file version, make sure to use the right format (three numbers for Mac OS X files, four for Windows files), as described in Gathering information on files on page 73. 6. Enter the number of available licenses.
240
Monitoring licenses
Note that this field is disabled if you have chosen to have Absolute Manage calculate the number of available licenses automatically from the purchase records, as described in Tracking purchasing information on page 243. 7 . Choose the type of the license: Computer License (Installed Files): The license governs how many copies of the software may be installed in your network. Floating License (Running Processes): The license governs how many copies of the software may be in use at the same time. Site License: This type is for software that may be used without restriction throughout your network. You can also choose it when you want to use the license specification purely for monitoring purposes. Prohibited Application: Software that is not allowed in your network. This is not really a license type; however, this setting allows you to use the license-checking mechanism to watch for the presence of undesirable software.
8. Set the other options: Check Meter application usage if you want Absolute Manage to not only scan the hard disks but also monitor the running processes for the licensed software and store the numbers for later reports. Note: Only applications on administered computers that have a working network connection to the server are included in the count. If you want Absolute Manage Agents to automatically terminate any applications launching which exceeds the available license count, check Terminate launched applications if licenses exceeded. When an application is automatically terminated, a message informs the local user about the reason; you can specify the text for this message in the Termination description field. If you want Absolute Manage Agents to automatically terminate any prohibited application on their computers, check Terminate prohibited applications. (This option is available only when you have set the license type to Prohibited Application .) To also delete the offending application, check the Delete prohibited applications option. When an application is automatically terminated, a message informs the local user about the reason; you can specify the text for this message in the Termination description field.
241
If Absolute Manage is to provide an overview of the computers on which this software is not available, check Track as missing software. Note: Usually, you will want to activate this option only for software that should be installed on all or most of the administered computers. Tracking applications intended only for a few computers can clutter up the display of missing applications. If you want Absolute Manage to look for the licensed software on all local volumes of administered computers, check Scan all volumes. Otherwise, only the boot volume is scanned.
9. If desired, you can enter details of license purchases and maintenance agreements, as described in Tracking purchasing information on page 243. 10. Click OK to close the dialog. 11. To store the license specification on the Absolute Manage Server, choose Save Distribution and Licensing Info from the Server menu. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before doing so), but the new license specification becomes available to the License Monitoring Center only after you have done so.
Deleting reports
To delete an existing custom report, select it in the sidebar of the Server Center window and choose Remove License Specification from the action menu. The license specification is deleted. Choose Save Distribution and Licensing Info from the Server menu to save the changes to the Absolute Manage Server.
242
Monitoring licenses
3. To enter details of a new purchase of any type: new software, software update, maintenance agreement, or maintenance extension click the + button below the list. 4. Enter the information in the four subpanes. These subpanes fields are described in Purchase Tracking on page 464.
243 Absolute Manage User Guide
Note that checking the Add to Licenses owned option in the Purchase subpane makes Absolute Manage add up all your license purchases to automatically fill the license specifications Licenses owned field. Manual entry into that field is disabled in this case. 5. Click OK to close the dialog. 6. To store the new information on the Absolute Manage Server, choose Save Distribution and Licensing Info from the Server menu. You do not need to save the changes to the Absolute Manage Server immediately (you can perform additional setup steps before doing so), but you must do so before quitting Absolute Manage Admin otherwise the changes will be lost.
244
Monitoring licenses
3. In the list in the upper part of the tab, select the entry that you want to delete. 4. Click the button below the list. The selected purchasing or maintenance agreement record is removed. 5. Click OK to close the dialog. 6. To store the new information on the Absolute Manage Server, choose Save Distribution and Licensing Info from the Server menu.
Configuring agents
The details of license monitoring can be configured individually on each Absolute Manage Agent: The intervals in which the agents check the hard disks for licensed software and the times of the day and the week in which they are doing so. (If the License Monitoring Center is configured to monitor running processes for licensed software, it does so constantly.) The Absolute Manage Server to which they send license monitoring information and the interval in which they do so. Configuring the checking intervals and times will often be unnecessary as the defaults serve most organizations well.
245
Configuring agents
Configuring agents
To configure Absolute Manage Agents for license monitoring: 1. In any browser window, select the computers on which you want to configure the agents. Note: For information on specifying groups as targets, see Targets on page 281. 2. From the Commands menu, choose Agent Settings. The Agent Settings dialog opens:
3. If desired, specify the days of the week and period during the day when license scans are performed and the interval of such scans. These settings are provided to avoid sending meaningless data to the server. For example, nothing happens in a normal office at 3 am, so there is no need to monitor license compliance when this has happened at 6 pm and will happen again at 9 am. The times and intervals for monitoring installed software are set in the License monitoring disk scans section, those for monitoring running software (concurrent-use or floating licenses) are set in the License monitoring process reports section.
246
Monitoring licenses
4. If you want to specify a license monitoring server or set the contact interval for the agent (if you do not want to do so, you can skip to step 7), click the Servers tab:
5. In the License Monitoring Server section of the dialog, enter the IP address or DNS name of the Absolute Manage Server that is to be the selected agents license monitoring contact, the port on which the server listens to traffic from the agents, and the desired interval in which agents check the server for new licensing information. Note: If you enter an abbreviated DNS name (i.e., a partial name that is completed with the default domain you have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain). 6. If the Server certificate field does not display valid click the Set , button and choose the certificate for the server. Creating server certificates is described in Exporting a server certificate on page 18. Note: Make sure that you are using a certificate that has been created after the last time the server has been installed. A certificate that has been created before a server has been reinstalled is indicated to be valid but will not allow a connection to the server. 7 . Click Execute.
247
Configuring intervals
Configuring intervals
You can configure the interval in which Agents scan the hard disks for installed licensed software and the interval in which they send reports to the server. These intervals are the same for all Agents connected to a particular license monitoring server. NOTE The interval for scanning for running applications is not set. In contrast to scans of hard disks, such scans consume only negligible processor power and so are always performed frequently usually about once per minute. Configuring these intervals and times will often be unnecessary as the defaults serve most organizations well. To set the intervals: 1. Make sure that you are connected to the license monitoring server that you want to configure.
2. Open the Server Center window by choosing Server Center from the Window menu. 3. In the Server Center windows sidebar, click Server. The Server Settings dialog is displayed in the Server Center window. 4. Click the License Monitoring tab:
5. In the Agent License monitoring disk scans section, specify the days of the week and the period during the day when license scans are to be performed and the interval of such scans.
248
Monitoring licenses
These settings are provided to avoid sending meaningless data to the server. For example, nothing happens in a normal office at 3 am, so there is no need to monitor license compliance when this has happened at 6 pm and will happen again at 9 am. Note: Because of a limitation in the operating system, midnight at the end of the day cannot be specified as 24:00 when using a 24-hour clock. Enter 0:00 instead. 6. In the License monitoring disk scans section, specify the period during which Agents are to send licensing reports to the server and the interval for sending these reports. These reports also include results of scans for running software (if any license specifications include such scans), which are performed about once per minute. 7 . Click OK.
The updated settings are sent to the server with the regular license monitoring updates. (The interval for these updates is specified in the Servers tab of the Agent Settings command window.)
Checking licenses
Once licenses and computer groups are set up, checking licensing compliance requires assigning licenses to groups. Absolute Manage Server then automatically transmits the information about what to look for to all relevant Absolute Manage Agents. These agents check their hard disks and, if so configured, running processes according to their individual settings for the specified software and return the results to the server.
Reports
assigned to computer groups to which they belong. The agents send the results to the server immediately after they have completed their scans, irrespective of the schedule set in the Servers tab of the Agent Settings dialog for doing so.
Scan results
The results of all scans manual or automatic are collected by the Absolute Manage Server and presented to connected admins as a series of reports. These reports are discussed below.
Reports
The results of the license monitoring are presented by the Absolute Manage Server in the form of a number of reports. There are predefined reports; you can also define custom reports that also take the form of groups of database records. Both predefined and custom reports are described below.
250
Monitoring licenses
licenses remain in this report for an extended period of time, they may not have been assigned to any computer group. Software usage: A list of all copies of licensed or prohibited software. This report includes all pairs of license specifications and computers that have been found, i.e., if the software of a license specification has been found on a computer, there is an entry stating the license, the computer, and the number of copies found. Missing software: A list of all software that should be installed on a computer but is not. This report includes all pairs of license specifications and computers that have not been found. Any computer is checked for all licenses that have been assigned to a computer group to which it belongs, except prohibited software. If any of the software is not found on the computer, an entry in this report is generated stating the license and the computer. History: A trail of license numbers. This report includes time-stamped entries of license summaries. Each entry includes the license specification and the number of copies of the specified software found throughout the network.
2. From the action menus License Monitoring section, choose one of these commands: New License Status Report to create a report on the status of license specifications, similar to the Fully compliant, Licenses exceeded, or Prohibited software reports. New Software Usage Report to create a report on the usage of licensed software on individual computers, similar to the Software usage report. New History Report to create a report on past counts of licensed software, similar to the History report. New History Summary Report to create a statistical report on the usage levels of licensed software in a selectable period, similar to the History summary report. New Missing Software Report to create a report on the computers lacking a particular piece of licensed software, similar to the Missing software report.
251
Reports
All five dialogs are similar; they differ only in the contents of the left-hand pop-up menu. 3. Enter a name for the report. 4. Specify the conditions that a license specification, software usage information, or history entry must match to be included in the report. To do so, choose an information from the left-hand pop-up menu, a relation from the pop-up in the middle, and enter a comparison value in the text field. You can add and remove conditions using the + and buttons. When using multiple conditions, use the top pop-up menu to specify whether records must match all conditions (logical AND) or any condition (logical OR) to be included in the report. 5. Click OK to create the report.
Editing reports
To edit an existing custom report, select it in the sidebar of the Server Center window and choose Edit <Report Type> from the action menu. The Smart Group dialog opens that is described above. You cannot edit predefined reports.
Deleting reports
To delete an existing custom report, select it in the sidebar of the Server Center window and choose Remove <Report Type> from the action menu. The report is deleted. You cannot delete predefined reports.
252
Part 3: Reference
The Reference part of the manual describes the menus, dialogs, windows, and information items of Absolute Manage. Dialogs and windows are described together with the menu commands that open them. Complex windows are described in their own chapters. Menus: Absolute Manage Admin menu on page 254 File menu on page 263 Edit menu on page 271 View menu on page 275 Commands menu on page 278 Server menu on page 338 Window menu on page 346 Help menu on page 361
Windows: Browser windows on page 362 Compliance Report window on page 376 Mobile Devices on page 384 Server Center on page 421 Agent Deployment Center on page 498 Commands window on page 516
Client software: Absolute Manage Agent on page 602 Mobile Apps on page 606
253
Chapter 10
Preferences
The Preferences command opens the Preferences dialog that lets you specify settings for the application: The Preferences dialog has four tabs: General Deployment Center Remote Control Power Consumption
254
General
The General tab of the Preferences dialog lets you specify various preferences settings for Absolute Manage Admin:
The tab contains these elements: Default when a command target is not available: The default behavior for cases where a target computer for a command is not available when the command is executed. If you choose Defer command, the Defer task if target computer is not available option in the options dialog is checked for each new command. If you choose Discard command, the option in the command options dialog is unchecked by default. If Try waking up target computer first is checked, the Wake up computer if not available option in the command options dialog is checked by default. You can still change the options settings for each command that you issue. Timeout when trying to connect to server: The time that Absolute Manage Admin waits for responses from Absolute Manage Server before it considers a connection attempt to have failed. Initially display no more than: This option lets you limit the number of records that Absolute Manage Admin displays when opening a new browser window or group in a browser window. If a database table on the server contains more records than are displayed by Absolute Manage Admin, there is an indication more in the windows status bar. The additional records can be displayed by choosing Display All Records from the View menu or clicking the more indicator. This option is intended primarily for networks with very large database tables.
255
Preferences
Double-clicking a computer: The action that Absolute Manage Admin takes when you double-click a computer record in a browser window. Reset All Warning Dialogs: Some of Absolute Manages warning alerts offer the option of turning this type of warning off for the future via a do not show this dialog again option. Clicking this button resets all such alerts, showing them again. (Of course, you can turn any of these alerts off again by checking the option once more.)
Deployment Center
The Deployment Center tab of the Preferences dialog lets you specify defaults for installing Absolute Manage Agent on administered computers or removing it. NOTE You can override all settings when you perform an actual installation using the Install Agent command described on page 509 or remove Absolute Manage Agent using the Remove Agent command described on page 511.
The tab contains these elements: SSH login username: The username that is to be used for SSH login on the selected computers. The account names (as well as the passwords) as case-sensitive. You must use the abbreviated username.
256
SSH login password: The password for the SSH account. Password verification: Re-enter the password to guard against typos. Ignore SSH host keys: Checking this option skips verification of deployment target computers by their SSH host keys. This prevents error messages if the operating system of a known client is altered (e.g., after reimaging). It may also allow illegitimate devices to pose as legitimate clients, particularly if physical access to your network is possible. Agent port: The TCP port on which the agent is to communicate with the server. Note: We recommend not to change the port unless you have a specific reason for doing so. Use Agent installer: Choose whether the installer embedded in Absolute Manage Agent is to be used for installing the Agent or a custom installer that you provide. You can create a custom installer using the Export Installer Package button in the Agent Deployment Settings dialog, as described in Install Agent on page 509. Select: Clicking this button lets you select a custom installer. Protocols: These options let you choose which network protocols Absolute Manage Admin is to use to detect computers on which Absolute Manage Agent could be installed. For the Active Directory protocol, you can specify that Absolute Manage automatically scans the network using that protocol. (With Bonjour, automatic scanning always happens when the protocol is activated.) SD Server: The software distribution server to be used for this Agent. Clicking Set lets you specify a server, as described in Server Properties dialog on page 505. LM Server: The license monitoring server to be used for this Agent. Clicking Set lets you specify a server, as described in Server Properties dialog on page 505. Inventory servers: This table lists all known Absolute Manage inventory servers. The list contains these columns: AM Server Address: The IP address or DNS name of the server. Note: If you enter an abbreviated DNS name (i.e., one that relies on being completed with the default domain you have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain). Port: The port over which the server communicates with agents. Basic Inv. Only: If this option is checked, the agents send only basic inventory information (as opposed to complete inventory information) to this sever. This option is intended for servers that act only as software distribution or license monitoring servers and thus have no need for full inventory information. Restricting these servers to basic information
257
Preferences
can save significant network bandwidth in large installations. Heartbeat Interval: The interval in which the agents are to contact the server to let it know that they are still available. Note: This interval should not be longer than the Agent Offline Threshold setting of the Absolute Manage Server. (See Server Settings on page 486 for details.) Inv. Push Interval: The interval in which the agents are to send updated information on their computers to the server. (To save network bandwidth, only the changes are sent, not complete inventories.) Double-clicking a server displays a dialog for editing its settings. The dialog is described in Inventory Server Properties dialog on page 514. Clicking the + button adds a new server to the list. A dialog is displayed in which you can edit the server's setting; the dialog is described in Inventory Server Properties dialog on page 514. Clicking the button removes the selected server.
Remote Control
The Remote Control tab of the Preferences dialog lets you configure the remote control software that Absolute Manage is to use for viewing the screens of client computers.
The tab contains these elements. Depending on the selected service, inappropriate fields may be disabled: List of supported remote control services: The list contains the remote control services that Absolute Manage supports, along with important parameters. You can drag the entries to reflect the order of your preference; Absolute Manage always tries from the top of the list before lower ones to remotely control a client.
258
You can edit the parameters that appear in the list in place (by double-clicking their cells) or when the service is selected in the fields below the list. Username: The user account for the remote control software on the client computers. Password and Verify: The password for the specified account. Note: Some VNC applications do not support being supplied with a username and password when they are launched; when you are using these applications, you must enter a username and password within the application, even if you have already supplied both in Absolute Manage. This is a limitation of these applications, not of Absolute Manage. Application: The local application that will be used to connect to the client. If n/a is displayed, no application for the selected protocol was found. Domain: The Window networking domain to be used for accessing client computers. Note: Some VNC applications do not support domains. Port: The network port on which to contact the remote control software on the client computers.
Power Consumption
The Power Consumption tab of the Preferences dialog lets you configure the power consumption levels of various types of devices. Absolute Manage uses these rates in calculating the power usage reports.
The tab contains Normal and a Standby fields for computers (stationary and portable) and monitors (LCD and CRT). They contain the typical amounts of power (measured in watts) that a device of that type consumes in your organization.
259
NOTE This dialog is also the login dialog when Absolute Manage is launched, the only difference being that the Cancel button is a Quit button. The dialog contains these text fields: Server address: The IP address or DNS name of the computer on which the desired Absolute Manage Server is running. Server port: The port number on which the Absolute Manage Server is listening. The server is preconfigured to use port 3791; we strongly recommend against changing this value unless you experience conflicts. Name: The username as defined in Absolute Manages Administrator Center window. Password: The accounts password as defined in Absolute Manages Administrator Center window. If the account is based on an Active Directory user account, you can use the display name, the account name, or the login name to log in. Note: When you set up a server for the first time, you leave the Password field empty. Details on setting up a server are available in Installing Absolute Manage Server on page 13. Remember password in keychain: If this option is checked, the password is stored in the keychain of the current Mac OS X user account. On future launches of Absolute Manage, you will automatically be logged in with the current account. Note: This gives everybody with access to your user account on the Macintosh automatic access to Absolute Manage. If you cannot be sure that unauthorized persons will not gain access to your account on the Mac, you may want to disable this option. Note: To remove the password from the keychain, either delete it with the Keychain utility or choose Change Administrator Password and uncheck the Remember password in keychain option.
260
Clicking Login terminates the current session and connects you to the specified server and account in a new session.
NOTE This command is not available when the currently active account is based on an Active Directory user account. The dialog contains these fields: Name: The name of the user account. Old Password: The existing password. Password: The new password. A password may contain any Unicode character. Verify: Retype the new password in this field. If the contents of the Password and Verify fields do not match, an error message is displayed and the password change is rejected. Remember password in keychain: If this option is checked, the new password is stored in the keychain of the current Mac OS X user account.
Services submenu
This submenu contains services provided by other applications and utilities. It is managed by the operating system. For details on the commands in this submenu, see the Mac OS X documentation and the documentation of the applications and utilities providing the services.
261
Hide Others
Hide Others
The Hide Others command hides all open applications except Absolute Manage Admin.
Show All
The Show All command displays all running applications. It is dimmed when no application is currently hidden.
262
File menu
Chapter 11
File menu
The File menu contains commands related to working with documents. Absolute Manage offers the usual range of commands in this menu: New (page 263) New Tab (page 263) Open (page 264) Open Recent submenu (page 264) Close (page 264) Rename Tab (page 264) Close Tab (page 265) Save (page 265) Save As (page 265) Export (page 266) Export Groups (page 267) Import Groups (page 267) Import Custom Field Data for Desktop Devices (page 268) Import Custom Field Data for Mobile Devices (page 270) Page Setup (page 270) Print (page 270)
New
The New command creates a new browser window. Browser windows display information from the Computers table in Absolute Manages internal database and can display related information from other tables, e.g., the Fonts or Files table. A detailed description of browser windows is available in Browser windows on page 362.
New Tab
The New Tab command creates a new tab in the front-most window. Choosing the command opens the New Tab dialog:
263
Open
Open
The Open command lets you open saved Absolute Manage documents. Choosing the command brings up a standard Open dialog from the operating system. For details on this dialog, please see the Mac OS X documentation. When you open a document, the browser window structure is recreated as it had been saved. The window is automatically populated with the current data. A detailed description of browser windows is available in Browser windows on page 362.
Close
The Close command closes the front-most window, just like clicking the windows close box. If the window contains unsaved changes, Absolute Manage asks you whether you want to save the changes. NOTE This excludes changes to the Software Distribution Center and License Monitoring Center. Such changes are automatically saved locally but not sent to the server. They will thus be available to you when you next open Absolute Manage Admin but will not take effect before you manually send them to Absolute Manage Server.
Rename Tab
The Rename Tab command lets you rename the active tab.
264
File menu
The command is available only if the front-most window contains more than one tab.
Close Tab
The Close Tab command closes the active tab. Choosing the command closes the active tab after displaying a confirmation message. NOTE If you hold down the Option key while choosing Close Tab, no confirmation message is displayed. The command is available only if the front-most window contains more than one tab.
Save
The Save command saves the current state of the front-most window in a file on disk. If the window is untitled, i.e., if no document has yet been assigned to it, choosing Save has the same effect as choosing Save As (see below). When the front-most window cannot be saved to a file, the Save command is disabled. When the front-most window is a command window, choosing Save opens the Save Template dialog that is described in Command window toolbar on page 279. NOTE Save is not available for the Agent Settings command. When the front-most window is the Agent Deployment Center window, choosing Save saves any changes to custom zones.
Save As
The Save As command lets you save the state of the front-most window under a different name than before.
265
Export
Choosing the command opens the Save dialog from the operating system. For details on this dialog, please see the Mac OS X documentation. The saved file contains the windows entire structure information groups and smart groups, columns, etc. but none of the actual contents. The contents can be stored in a local file by means of the Export command. NOTE To save the contents of a browser window, use the Export command. When the front-most window cannot be saved to a file, the Save As command is disabled.
Command window
When the front-most window is a command window, choosing Save As opens the Save Template dialog that is described in Command window toolbar on page 279.
Text file
When the front-most window is a text file display window, choosing Save As lets you save the windows contents as a text file on your computer.
Export
The Export command lets you export the contents of the front-most window as a file. Choosing the command opens the Save dialog from the operating system. For details on this dialog, please see the Mac OS X documentation. The command supports these export formats: HTML: The data is saved as an HTML page. The data is saved as a single HTML page according to the HTML 4.01 Transitional standard. Text (CSV, UTF-8): The data is saved as comma-separated values in a text file. Fields contents are enclosed in quotes and separated by commas; records are separated by line-feed characters. The first record contains the column names. Dates and times are formatted as short dates and times, respectively, according to the systems current region settings. Numbers are exported raw, i.e., without any kind of formatting. Bytes are not converted to megabytes or other multiples. Text is encoded as UTF-8 (Unicode).
266
File menu
Text (CSV): As Text (CSV, UTF-8) but with the current system encoding used instead of UTF-8. Text (localized CSV): As Text (CSV), but with localized list dividers as separators between fields, e.g., semicolons instead of commas. Text (tab-delimited, UTF-8): The data is saved as tabdelimited text, encoded as UTF-8. Fields contents are separated by tab characters; records are separated by line-feed characters. The first record contains the column names. Fields are formatted as in the browser window being exported. TheftTrack Report (HTML): An HTML file providing an overview of the theft-tracking information on the computers in the window. TheftTrack Report (XML): The theft-tracking information on the computers in the window in XML format. XML: The data in the window is saved in XML format for processing in other applications or automated workflows. The data is saved in a simple structure that contains information about the document, about the columns exported, and the data for the individual records.
Clicking Save exports the data from the window. When the front-most window cannot be exported, the Export command is disabled.
Export Groups
The Export Groups command lets you export the selected groups and smart groups of the front-most window to a file. Choosing the command opens the Save dialog from the operating system. For details on this dialog, please see the Mac OS X documentation. The Export Groups command is available only if the front-most window contains groups or smart groups. NOTE You can also export groups by dragging them to the desktop.
Import Groups
The Import Groups command lets you import groups and smart groups from a file into the front-most window. Choosing the command opens the Open dialog from the operating system. For details on this dialog, please see the Mac OS X documentation.
267
In the dialog, you can choose any group file that has been previously saved from Absolute Manage. Opening the file adds all groups that are specified in it to the front-most window. The Import Groups command is available only if the front-most window can contain groups or smart groups. NOTE You can also import groups by dragging them to the windows sidebar from the desktop.
The dialog includes these elements: Data file: The file you have chosen to import.
268
File menu
Use setup: This pop-up menu lets you save particular configurations of this dialog under a name and reopen saved configurations. In addition to all saved setups, it includes these commands: Save As: Save the current settings in the dialog as a new named setup. All settings from the dialog are saved, except the import file chosen Rename: Rename the currently chosen setup. Delete: Delete the currently chosen setup. This does not affect the current settings in the dialog. Data file format: This menu lets you specify the field delimiter in the import file. Absolute Manage tries to identify the delimiter automatically and presets this menu accordingly. Data file encoding: The text encoding of the import file. Again, Absolute Manage tries to determine the encoding before displaying the dialog. Dont import first row: If this option is checked, Absolute Manage starts importing the file with the second row. This is useful if the first row contains the field names. Import data preview: This table shows the first few lines of the import file according to the current settings in the dialog. It also lets you assign custom information fields to columns in the import file by dragging a field from the Custom Fields list to a column. Dragging a field from the Key Fields list to a column makes that column the column by which import records are matched to Absolute Manages database records. Clicking the small badge in the column title removes the assigned field. Custom Fields: This list contains all manual custom information fields for desktop devices that can be assigned to columns of the import file. Fields are assigned by dragging them on top of columns. Assigning a field to a column causes that columns data to be imported into the field. Entering text into the search field filters the list of custom information fields. Key Fields: This list contains all information items that can be assigned to columns of the import file. Fields are assigned by dragging them on top of columns. Assigning a key field to a column causes Absolute Manage to store the data from each import record in that database record for which the key field matches the assigned column in the import record. Entering text into the search field filters the list of key fields. Show Me How: Clicking this button displays a brief tutorial on importing custom information field data. Cancel: Clicking this button cancels the import process. No data is imported. Import: Clicking this button imports the chosen file according to the specified settings.
269
Page Setup
The Page Setup command will be supported in a future release of Absolute Manage.
Print
The Print command will be supported in a future release of Absolute Manage.
270
Edit menu
Chapter 12
Edit menu
The Edit menu contains commands related to editing and finding text and objects. Absolute Manage offers the usual range of commands in this menu: Undo (page 271) Redo (page 271) Cut (page 271) Copy (page 272) Paste (page 272) Delete (page 272) Select All (page 272) Find submenu (page 272) Find (page 272) Find Next (page 273) Find Previous (page 273) Use Selection for Find (page 273) Jump to Selection (page 273) Spelling submenu (page 273) Spelling (page 274) Check Spelling (page 274) Check Spelling as You Type (page 274) Special Characters (page 274)
Undo
The Undo command reverses the effects of the last action. Whenever an undoable action has been performed, it is added to the name of the Undo command, e.g., Undo Typing . Absolute Manage supports unlimited undo levels. Not all actions are undoable.
Redo
The Redo command takes back the last Undo command you issued, restoring the action that was reversed by the undo. Whenever an undo action has been performed, it is added to the name of the Redo command, e.g., Redo Typing .
Cut
The Cut command removes the selected text from its window and places it on the clipboard.
271
Copy
Copy
The Copy command places a copy of the selected text or object on the clipboard. Besides selected text and objects such as groups, you can also copy selected records. They are converted to text in the clipboard and can be pasted in other applications that accept text.
Paste
The Paste command inserts the text or objects on the clipboard into the front-most window. The command is dimmed when the clipboard does not contain information that can be pasted at the current location.
Delete
The Delete command removes the currently selected text or records. The command is dimmed when no deletable item is selected.
Select All
The Select All commands selects all text or records in the current context. The command is dimmed when the keyboard focus is on an area where there are no selectable objects, e.g., an empty list, or where only one object can be selected at a time, e.g., the Groups & Machines list.
Find submenu
The Find submenu contains commands for finding text. Its use in Absolute Manage is limited to windows displaying text files from administered computers. The commands in this submenu are available only when the front-most window is a text file window.
Find
The Find command opens the Find dialog that lets you specify the text you are searching for and control the searching process.
272
Edit menu
The Find dialog is provided by Mac OS X. Please see the operating system documentation for details. This command is available only when the front-most window is a text file display window.
Find Next
The Find Next command finds the next instance of the specified search text. This command is available only when the front-most window is a text file display window and you have specified a search string in the Find dialog.
Find Previous
The Find Previous command finds the previous instance of the specified search text. This command is available only when the front-most window is a text file display window and you have specified a search string in the Find dialog.
Jump to Selection
The Jump to Selection command scrolls the front-most window so as to display the selected text. This command is available only when the front-most window is a text file display window and text is selected in that window.
Spelling submenu
The Spelling submenu contains commands to control spell-checking. Absolute Manage uses the spell-checking feature of Mac OS X. This means, for example, that spellings that have been learned are shared with other applications.
273
Spelling
The commands in this submenu are available only when the text insertion mark is located in a text field.
Spelling
The Spelling command opens the Spelling dialog that lets you check the spelling of your text; accept, revise, or turn down suggestions; and choose a spell-checking dictionary. The Spelling dialog is provided by Mac OS X. Please see the operating system documentation for details. This command is available only when the text insertion mark is located in a text field.
Check Spelling
The Check Spelling command checks the spelling of your text, marking words that may be misspelled. This function is provided by Mac OS X. Please see the operating system documentation for details.
This function is provided by Mac OS X. Please see the operating system documentation for details.
Special Characters
The Special Characters command opens the Character Palette of Mac OS X that lets you enter characters that are not available on the keyboard. This palette is provided by the operating system; please see the Mac OS X documentation for details.
274
View menu
Chapter 13
View menu
The View menu contains commands related to displaying and configuring toolbars. Details (page 275) Select Container (page 275) Configure Columns (page 275) Display All Records (page 276) Hide Toolbar (page 276) Show Toolbar (page 276) Customize Toolbar (page 277)
Details
The Details command displays details for a selected computer, software package, or license specification. Choosing the command for a computer selects it in the browser windows sidebar and displays in the sidebar all information categories that are available for the computer. Choosing the command for a software package or license specification displays the packages or specifications details in the table area of the browser window.
Select Container
The Select Container command selects (in a browser windows sidebar) the container of a selected item. Choosing the command selects the next-higher container (i.e., expandable item) in the browser windows sidebar. NOTE You can also press Command-Up Arrow on the keyboard for the same effect.
Configure Columns
The Configure Columns command lets you add, rearrange, or remove columns from the front-most window.
275
If the drawer is already open, choosing Configure Columns closes it. The drawer contains the titles of all columns that appear in the window, in the order in which the columns appear. Rearranging the column titles in the drawer rearranges the columns in the window. Dragging an information item from the Information Items window to the drawer adds a corresponding column to the windows. Clicking Remove removes the selected column from the window. Choosing Configure Columns again closes the drawer
Hide Toolbar
The Hide Toolbar command hides the toolbar of the front-most window. It is available only if the toolbar of the front-most window is currently visible.
Show Toolbar
The Show Toolbar command displays the toolbar of the front-most window. It is available only if the toolbar of the front-most window is currently hidden.
276
View menu
Customize Toolbar
The Customize Toolbar command lets you customize the contents of the toolbar of the front-most window. It is available only if the frontmost window has a toolbar (visible or hidden). Choosing the command displays a customization dialog that contains these elements: Buttons and other items: These buttons and additional items like spaces and dividers can be dragged into the toolbar to be displayed there. Items already in the toolbar can be dragged out of it, in which case they will no longer be displayed. The exact range of items available in the dialog depends on the type of window to which the toolbar belongs. Show: This pop-up menu lets you choose the style in which the toolbar contents is displayed. Use Small Size: If this option is checked, the size of the items in the toolbar is reduced. Done: Clicking Done closes the dialog and sets the toolbar of all windows of this type to the specifications you made.
277
Chapter 14
Commands menu
The Commands menu contains commands that let you perform actions related to the managed computers. There are two different command lists in the menu, one when the frontmost window shows information related to desktop computers and another when the window shows information related to mobile devices. Both versions are listed below.
278
Commands menu
Favorites
The Favorites submenu contains command templates that you want to have quickly available. The menu contains all command templates that have been saved with the Include in favorites option in the Save Template dialog or that have been checked in the Command Templates windows Favorites column.
These buttons are described in: Execute on page 280 Options on page 280 Targets on page 281 Save Template on page 282 Show Help on page 282
279
Execute
The Execute button executes the command with the currently specified options and closes the command window. Depending on the scheduling settings (see below), clicking Execute executes the command immediately or enters it in the command queue for later execution.
Options
The dialog contains these elements: Command description: The title under which the command will appear in the Commands window. Schedule for immediate execution: The command will be executed immediately when the Execute button in the command window is clicked. Schedule for: When the Execute button in the command window is clicked, the command will not be executed immediately but entered in the command queue to be executed at the specified date. Repeat every: If this option is checked, the command is executed in the specified intervals after its first execution. Wake up computer if not available: If this option is checked, Absolute Manage tries to wake up any target computer that is not available before considering it unavailable. Note: The default for this setting is specified in the Preferences dialog. Defer task if target computer is not available: This option determines what happens with the command if a target computer is not available. If it is checked, the command is entered in the command queue to be executed when the target computer becomes available. If the option is unchecked, the command is considered to have failed and no attempt is made to execute it at a later date. Note: The default for this setting is specified in the Preferences dialog. History options: These options let you specify in which this command will be entered into the command history: Always add to command history: After the command has been completed, it is added to the command history in all cases, no matter the outcome.
280
Commands menu
Only add to command history in case of an error: The command is only added to the command history when it could not be executed successfully. Never add to command history: After the command has been completed, it is removed from the command window. In no case is it added to the command history.
Targets
Clicking the Targets button opens or closes the Target Computers drawer, toggling its state.
Dragging a computer from a browser window into this list adds it to the target list, causing the command to be executed on that computer as well. You can include computer groups and smart groups as targets. This has the following effects: Specifying a (non-smart) computer group as a target has exactly the same effect as specifying all their members as targets individually. The effect of specifying a smart computer group as a target varies according to the type of command execution: When the command is executed immediately or at a specified time or when it is saved as a template and later re-used, all computers that are members of the specified smart group at the moment of execution are the command targets. (That is, it does not matter which computers belong to the smart group at the moment when the command is saved.) When the command is a repeating command, the membership of the smart group is evaluated anew each time the command is executed. All computers that meet the smart group criteria at that time are command targets, and all computers that do not meet these criteria are not targets. This means that a computer can be sometimes but not always a target of a repeating command with a smart group as its target. Note: For performance reasons, the membership in the smart groups for purposes of determining targets of repeating commands is evaluated only periodically.
281
Agent Settings
Therefore, computers may be erroneously included in or excluded from the list of targets when their status with respect to the smart group criteria changes very shortly before the execution of the repeating command. Clicking the Remove button removes the selected computers from the target list.
Save Template
Clicking the Save Template button opens the Save Template dialog:
The dialog lets you save the command in its currents state including all settings as a template for future reuse. It contains these elements: Save as template: The name for the command template. Description: The description for the command template that will be displayed in the Command Templates window. When the dialog is opened, this field contains the text from the Options dialogs Command description field. Include target computer list: If this option is checked, the current list of target computers for the command is included in the template. If the option is unchecked, the template is saved with an empty target list. Add to favorites: If this option is checked, the saved template is listed in the Favorites submenu. Save: Clicking the Save button stores the command as a command template that can be reused via the Command Templates window.
Show Help
Clicking the Show Help button displays the help for the command to which the command dialog belongs.
Agent Settings
The Agent Settings command lets you specify various settings for the Absolute Manage Agents on the selected computers. Choosing the command opens the Agent Settings dialog. The dialog has four panes: General Servers Client Information Custom Fields
282
Commands menu
All three are described below. The toolbar of command windows is described in Command window toolbar on page 279. Note, however, that it is not possible to save the Agent Settings command as a command template; both the Save Template button in the toolbar and the Save command in the File menu are disabled.
General
The General pane of the Agent Settings dialog lets you configure various basic parameters for the agents operation:
Absolute Manage computer name: The name that is displayed for the computer in the Absolute Manage system. You can choose to use the name specified for the computer in the local operating system or you can specify a custom name that is only used by Absolute Manage. This option is not available when there is more than one computer in the commands target list. Agent port: The TCP port over which the Agent communicates with the Absolute Manage Server. We recommend that you do not change this port unless there is a specific reason. Connection timeout: The interval before the Agent considers an attempt to contact a server to have failed. When the attempt was made to send a regular information report (such as the heartbeat or an inventory report), the Agent retries at the next scheduled time. Attempts to download software to be deployed or to report the success of a software installation are repeated at the next opportunity. Include in patch management: Whether this agent is to use the Software Update Utility (Mac OS X) or Windows Update (Windows) to check for available patches and then install them
Absolute Manage User Guide
283
Agent Settings
using the Software Distribution Center. (This is discussed in more detail in Automated patch management on page 224.) Use only Absolute Manage for OS Updates: When this option is checked, the local update mechanism of the operating system i.e., Software Update for Mac OS X or Windows Update for Windows is disabled. The agents neither check for new software via this mechanism nor do they download any updates from Apples or Microsofts servers. All operating system software updates are performed via Absolute Manages Software Distribution Center.
When there is more than one target computer, checkboxes are displayed to the right of most options. Only checked options are updated in the Agents. NOTE The options in this tab can be set only by administrators with the Change Agent General Settings right. See New Administrator on page 471 for details.
Servers
The Servers pane of the Agent Settings dialog lets you configure server addresses and communication intervals:
When there is more than one target computer, checkboxes are displayed to the right of all options outside the list. Only checked options are updated in the agents.
284
Commands menu
Main list
The main list contains the Absolute Manage Servers with which the selected agents can communicate: When a server is checked, all agents will be set to communicate with it. When a server is unchecked but present in the list, its current state on the agents will not be changed. (That is, agents that were set to communicate with it before will remain to be thus set. Agents who were not set to communicate with this server before will not be set to do so afterwards.) A server that is not in the list will be removed from the list of servers to communicate with on all agents; none of the target agents will communicate with this server after the command has been executed. A server which is checked in the Basic Inv. Only column will be sent only basic inventory information by the target agents. This useful for eliminating unnecessary network traffic to servers that are to act only as software distribution servers or license monitoring servers. The list columns contains parameters for the server that you can edit by double-clicking it opening the Inventory Server Properties dialog (see Inventory Server Properties dialog on page 514): Absolute Manage Server Address: The IP address or DNS name of the server. Note: If you enter an abbreviated DNS name (i.e., one that relies on being completed with the default domain you have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain). Port: The port over which the server communicates with agents. Basic Inv. Only: If this option is checked, the agents send only basic inventory information (as opposed to complete inventory information) to this sever. This option is intended for servers that act only as software distribution or license monitoring servers and thus have no need for full inventory information. Restricting these servers to basic information can save significant network bandwidth in large installations. Heartbeat Interval: The interval in which the agents are to contact the server to let it know that they are still available. Note: This interval should not be longer than the Agent Offline Threshold setting of the Absolute Manage Server. (See Server Settings on page 486 for details.) Inventory Push Interval: The interval in which the agents are to send updated information on their computers to the server. (To save network bandwidth, only the changes are sent, not complete inventories.)
Clicking the + button opens a dialog that lets you add a new server to the list. The dialog is described in Inventory Server Properties dialog on page 514. Clicking the button removes the selected server.
285
Agent Settings
NOTE The options in this tab can be set only by administrators with the Change Agent Server Settings right. See New Administrator on page 471 for details.
286
Commands menu
Client Information
The Client Information pane of the Agent Settings dialog lets you specify the contents of the ten Client Information fields that allow, e.g., locations or inventory numbers to be stored on the administered computers:
When there is more than one target computer, checkboxes are displayed to the right of all fields. Only checked fields are updated in the agents. The User cannot modify client information option lets you prevent users from changing the fields contents locally or allow them to do so. NOTE The names of the fields can be changed in the Server Settings dialog.
NOTE The options in this tab can be set only by administrators with the Change Agent Client Info Settings right. See New Administrator on page 471 for details.
287
Custom Fields
The Custom Fields pane of the Agent Settings dialog lets you assign existing custom information fields to selected agents:
The dialog contains a list displaying all custom information fields that are defined on the Absolute Manage Server. All fields that are checked in the Use column are assigned to the target computers; all fields that are not checked are unassigned. The status of fields whose checkbox is in the neutral state ( ) remains unchanged. NOTE The options in this tab can be set only by administrators with the Change Custom Info Fields Settings right. See New Administrator on page 471 for details.
288
Commands menu
The dialog contains these elements: Power saving schedules: This list contains all schedules that are to be applied to the target computers. You can define any number of schedules; all are applied to the targets and all are active at the same time on these computers. Click the + button to create another schedule. Click a schedule in the list to display its settings. You can change the settings of the selected schedule; all changes are saved automatically when you select another schedule. Click the button to delete the selected schedule. Name: The name of the schedule. Settings for: The type of power supply to which this schedule applies. The schedule will only be active if the target computer runs on the specified type of power. Action: What is to happen when the conditions specified in this schedule are met. Available actions include: Start Up or Wake Up: The computer is woken from sleep. If it is switched off, it is started. This option applies only to Macintosh clients. Wake Up: The computer is woken from sleep. If it is switched off, nothing happens. This option applies only to Macintosh clients. Sleep: The computer is put to sleep.
Absolute Manage User Guide
289
Hibernate: The computer is put into hibernation. This option applies only to Windows clients. Restart: The computer is restarted. This is a soft restart, i.e., the user is prompted to save open documents that contain unsaved changes. If these prompts are not answered, the restart fails. Restart (Forced): The computer is restarted. This is a hard restart, i.e., there is no user prompt, all applications are terminated by force, and any unsaved changes in open documents are lost. Shut Down: The computer is shut down. This is a soft shutdown, i.e., the user is prompted to save open documents that contain unsaved changes. If these prompts are not answered, the shutdown fails. Shut Down (Forced): The computer is shut down. This is a hard shutdown, i.e., there is no user prompt, all applications are terminated by force, and any unsaved changes in open documents are lost. Log Out: The active user is logged out. The user is prompted to save open documents that contain unsaved changes. If these prompts are not answered, the logout fails. Display Sleep: The display is dimmed to blackness. Hard Disk Sleep: The hard disks are spun down. Before the Sleep, Hibernate, Restart, Shut Down, or Log Out actions are performed, an alert is displayed on the target computer that gives the user the chance to cancel the action. Note: Individual client computers may lack the required hardware or operating system support for some options. Trigger: The kind of condition by which the action is triggered. You can specify that the action happens at particular times of the day or after a certain period of inactivity. When: The times of the day and the week when this schedule is to be active. You can either specify that it is active all the time or you can restrict it to certain days and times of the day. The time of the day is the same for all days. Note that the time is specified using a 24 hour clock. Profile: Using this menu, you can save the current settings for easy later recall. When the pop-up menu is closed, it displays the currently active profile. If no profile is active, it displays Custom. Save As: Choosing this command lets you save all schedules currently listed in the list at the top of the command window under a name of your choice. All saved profiles are added to the pop-up menu. Rename: Choosing this command lets you edit the name of the currently active profile. The command is unavailable if no profile is active. Delete: Choosing this command removes the currently active profile from the Profile pop-up menu. Note: This does not remove the currently shown schedules from the command window. Only when nobody is logged in: If this option is checked, the schedule applies only as long as no user is logged in on the
290
Commands menu
target computer. If it is unchecked, it applies regardless of whether a user is logged in. The toolbar of command windows is described in Command window toolbar on page 279.
Send Message
The Send Message command sends a message to selected client computers. Choosing the command opens the Send Message dialog:
The dialog contains these elements: Message: The text that will appear on the client computers. Note: To insert a line break in the text, press Option-Return. Remove message after: If this option is chosen, you can enter a time in minutes and seconds after which the message dialog on the client computer is automatically closed. The dialog is closed as if the user had clicked OK. (The timeout is, however, noted in the command history.) Add Cancel button to message dialog: If this option is checked, the message dialog on the client computer has a Cancel button in addition to the OK button. You can see in the command history whether a user clicked the Cancel button.
291
When the command is executed, the message appears in a dialog on the screen of each selected target:
The toolbar of command windows is described in Command window toolbar on page 279.
The dialog contains these elements: Action: The desired change in the operating states of the target computers. Note: When you try to put to sleep a Windows computer, Absolute Manage first tries to hibernate it. If that is not supported, it tries to put it into stand-by mode. If the computer does not support this mode either, the command fails with an error log entry.
292
Commands menu
Message: An optional text that will appear on the target computers before the action is executed. Leave empty to display no message. Note: To insert a line break in the text, press Option-Return. Remove message after: If this option is chosen, you can enter a time in minutes and seconds after which the message dialog on the client computer is automatically closed. Add Cancel button to message dialog: If this option is checked, the message dialog on the client computer has a Cancel button in addition to the OK button. If a user clicks the Cancel button, the action is not executed on that computer. Allow user to save open documents: If this option is checked, quit events are sent to all running processes, allowing the user to save unsaved changes. If the option is unchecked, all processes are forcefully terminated and unsaved changes are lost.
The toolbar of command windows is described in Command window toolbar on page 279.
Wake Up
The Wake Up command wakes up remote computers. There are no options for this command, but target computers must support Wake On LAN and the feature must be activated. Waking up computers is possible across subnets as long as an Absolute Manage Server or Absolute Manage Agent is running (active) in the target subnet. The toolbar of command windows is described in Command window toolbar on page 279.
Terminate Process
The Terminate Process command stops processes running on target computers. Choosing the command opens the Terminate Process dialog:
293
The dialog contains these elements: Process name: The name of the process that you want to terminate. You must enter the exact name. If you open the dialog while a process is selected in the frontmost window, the name is pre-entered. If you select more than one process, only the number of processes is shown. Allow user to save open documents: If this option is checked, quit events are sent to the target processes, allowing the user to save unsaved changes. If the option is unchecked, the processes are forcefully terminated and unsaved changes are lost.
The toolbar of command windows is described in Command window toolbar on page 279.
Both are described below. The toolbar of command windows is described in Command window toolbar on page 279.
294
Commands menu
Disk Image
The Disk Image pane of the Reinstall Mac OS X Computer dialog lets you choose an image and set options for the reinstallation of the target computers.
The dialog contains the following elements: Software Distribution: When one of the disk images available in the Software Distribution Center is chosen from the pop-up menu, that images contents will be written to the boot volumes of the target computers. Disk image on target disk: Specify the path to a disk image that is already present on the intended target disk. Transfer disk image: Choosing Transfer disk image allows you to select a disk image file on your computer instead of one from the Software Distribution Center. Clicking Select opens an Open dialog for choosing the image. Time Machine: If the target computer runs Mac OS X 10.5 or newer and Time Machine is active on it, you can specify that a Time Machine Backup be restored. The pop-up menu lets you
295
specify a date; Absolute Manage restores the last backup prior to that date. File server: Specify a disk image that is located on a file server. Clicking the Specify button opens a dialog in which you specify the server and the location of the disk image on it: Disk image source: The path of the disk image on the server volume. Server address: The file servers network address. Server volume: The volume on which the disk image is located. User: The user account which Absolute Manage is to use for logging in to the server. Password: The password for the account. Disk image password: If the image is password-protected, enter the password here. Re-image: The volume on which the disk images contents is to be installed. Options include: Startup volume: The selected clients current boot volume. First volume other than startup volume: The second volume in the clients volume list, with the startup volume considered the first volume in the list.
IMPORTANT
This option is primarily intended to allow you to reinstall the (sole) local volume of a computer that has been booted from a network volume. If there are more than two volumes on a client, there is no way to tell which of the non-startup volumes will be chosen. We strongly recommend against using this option on computers with more than two mounted volumes. Other volume: The name of a local volume of the client. New volume name: The name that the target computers boot volumes will have after the reinstallation. User folder to keep: Whether to keep any user folders (i.e., subfolders of the Users folder belonging to individual users) during the reinstallation and, if so, which ones: No user folders: All user folders will be deleted during the reinstallation. Folder of current user: The user folder of the user who is currently logged in will be preserved; all others will be deleted. All user folders: All user folders will be preserved. Preserve: Preserve the target computers current network settings during the reinstallation: Network settings: General network settings. Directory Access settings: Settings related to accessing directory services such as Active Directory. Absolute Manage Agent: The Absolute Manage Agent with all its settings. Local user accounts: Currently existing user accounts on the target computers. Computer name: The name of the computer by which it is known in the network. User accounts: If Copy user accounts from the source image is chosen, all user accounts that have been defined on
296
Commands menu
the source image, including their access privileges and data, are copied to the reinstalled computer. If Dont copy user accounts from the source image is chosen, no accounts from the source image are added to the preserved accounts (if any) on the target computer. Pre-flight script: Clicking the Select button allows you to specify a shell script that is executed on the target computers after the disk has been mounted but before any files have been copied to the local hard disk. These parameters are supplied to the script: $1: the disk image mount point $2: the name of the specified target volume (/ for the boot volume) Pre-process script: Clicking the Select button allows you to specify a shell script that is executed on the target computers before the reinstallation. These parameters are supplied to the script: $1: the path to the folder where the installation files have been copied Other options: Additional settings for the reimaging process: Show progress to user: A progress bar on the local computer keeps the user informed of the process state. Restart computer after reinstallation: If this option is checked, the target computer is rebooted when the installation is complete. When the startup volume is reinstalled, this option cannot be deactivated. Prompt user before restart: If this option is checked, a dialog is displayed on the target computer, allowing the user to postpone restarting. This gives local users additional time to save open documents, etc.
Message
The Message tab of the Reinstall Mac OS X Computer dialog lets you send a message to target computers before their computers are reinstalled. A black diamond on the tab indicates that a message has been specified, even when you select another tab. The elements of this pane are described in Send Message on page 291. If a Cancel button is added to the dialog, any target computer on which the user clicks Cancel will not be reinstalled.
297
Using the command requires a FOG server or Absolute Manage PXE server in addition to Absolute Manage Server. The required installation procedure is described in Installing support for reinstalling Windows computers on page 19. Choosing the command opens the Reinstall Windows Computer dialog. The dialog has two panes: Disk Image Message
Both are described below. The toolbar of command windows is described in Command window toolbar on page 279.
Disk Image
The Disk Image pane of the Reinstall Windows Computer dialog lets you choose an image and set options for the reinstallation of the target computers.
The dialog contains the following elements: Image: This pop-up menu includes all disk images that are stored on the FOG server (if you use FOG) or in Absolute Manage Server under Windows Disk Images (if you use the Absolute Manage PXE server). Computer name: The name to give the target computer: Keep existing: After the reinstallation, the computer has the same name as now. Use name: The name is changed to the specified name during reinstallation. Join domain after imaging task: If this option is checked, the computer joins the specified Active Directory domain after the reinstallation. Domain name: The name of the Active Directory domain to join.
298
Commands menu
Domain admin name: The username of an administrator account for the domain controller. You can also enter the UPN (user principal name) for the account. Domain admin password: The password for the administrator account. Automatically restart computer to begin the imaging process: If this option is checked, the selected target computers are automatically restarted to begin the reinstallation. This option has no effect on target computers without an agent (i.e., target computers that have been specified by means of placeholder records).
Message
The Message tab of the Reinstall Windows Computer dialog lets you send a message to target computers before their computers are reinstalled. A black diamond on the tab indicates that a message has been specified, even when you select another tab. Messages cannot be sent to selected target computers without agents (i.e., computers that are represented by placeholder records). The elements of this pane are described in Send Message on page 291. If a Cancel button is added to the dialog, any target computer on which the user clicks Cancel will not be reinstalled.
The dialog contains these elements: Service name: The name of the service you wish to affect, as displayed in the Service Name information item. If a single service is selected in a browser window when you open the command dialog, its name is pre-entered in the field. If more than one service is selected, the number of services is displayed in the field.
Absolute Manage User Guide
299
Time Machine
Action: The change to the operating state that you want to affect. Startup type: The startup status to which you want to set the selected services: Automatic: The service is automatically started whenever the operating system boots. Manual: The service is not automatically started but may be started by users or other applications. Disabled: The service cannot be started at all.
The toolbar of command windows is described in Command window toolbar on page 279.
Time Machine
The Time Machine command lets you control the operation of Time Machine on target computers. The command can only be used on target computers running Mac OS X 10.5 or later. Choosing the command opens the Time Machine dialog:
The dialog contains these elements: Action: The action that you want Time Machine to perform. Start Backup Now: The target computers immediately begin a Time Machine backup. Note: This command has an effect only on target computers where a Time Machine disk has already been specified. Stop Running Backup: Any Time Machine backups in progress on the target computers are immediately stopped. Enable Automatic Backup: On all target computers, automatic Time Machine backups are enabled. (This has the same effect as sliding the master switch in the Time Machine control panel to On.) Note: This command has an effect only on target computers where a Time Machine disk has already been specified. Disable Automatic Backup: On all target computers, automatic Time Machine backups are disabled. (This has the same effect as sliding the master switch in the Time Machine control panel to Off.)
300
Commands menu
The toolbar of command windows is described in Command window toolbar on page 279.
The dialog contains these elements: Find registry entries that match: When all is chosen from this pop-up menu, registry entries are found that match all specified conditions (Boolean AND). If any is chosen, entries are found that match at least one of the specified conditions (Boolean OR). Condition area: The first pop-up menu lets you choose a condition to match registry entries. The second one contains the possible comparison operators. For most conditions, one or two text field lets you specify the value to compare entries against. The + and buttons let you add new conditions or remove existing ones. These search criteria are available: Key At: Enter a full path of a key to check whether the key exists (or does not exist) on the target computers. Value At: As Key at, but for values. String At: Enter the full path of a string type value and compare it against a fixed value. Number At: As String at, but for numbers. Binary At: As Binary at, but for binary values. Key Path: Search for keys by partial paths all keys are found whose paths contain the search string. The keys names are not considered part of their paths. Value Path: As Key Path, but for values. Key Name: Search for keys by their names. Value Name: As Key Name, but for values. String Value: Search for string values by their contents. Number Value: As String Value, but for numbers.
301
When you specify a path, you can include environment variables, as described in Environment variables on page 134. Search complete registry: The entire registries of the target computers are searched. Start search at: When this option is checked and a path in the registry is specified, only keys and values below that path are searched. Stop after first match: If a matching file has been found on a target computer, the search is stopped on that computer. If the registry entry is not found on a computer: Specify what Absolute Manage is to do when the registry search returns no hits on a particular target computer: Do nothing: No particular action is taken; no entries from this computer appear in the Registry Entries window. Add database record: A record is created in the Registry Entries database with a value of No in the Registry Entry Found information item. Add error to command history: An error entry, stating that the key could not be found, is added to the History section of the Commands window.
Any found registry entries are added to the Registry Entries database and displayed in the Registry Entries window. The toolbar of command windows is described in Command window toolbar on page 279.
The dialog contains these elements: Action: This pop-up menu lets you specify the desired action that you want to perform in the target computers registries. These actions are available: New Key: Create a new key at a specified path.
302
Commands menu
New Value: Create a new value in a specified key. Change Value: Alter a value at a specified location. Delete Key: Delete a specified key and all its contents. Delete Value: Delete a specified value. Rename Key: Change the name of a specified key. Rename Value: Change the name of a specified value.
Additional elements let you enter key and value specifications and data. Which of them are visible depends on the chosen action. This is a list of all elements; only a subset is visible in each case: Key path: The path of an existing key in which a new key or value is to be created. Key name: The name of the new key that you want to create. Value path: The path of a value that is to be changed. Value type: The data type of a new value or of a value that is to be changed. Value: The new data of a value. Path: The path of a key or value that is to be deleted or renamed. New name: The new name of a key or value.
When you specify a path, you can include environment variables, as described in Environment variables on page 134. The toolbar of command windows is described in Command window toolbar on page 279.
Execute Script
The Execute Script command executes script files on the target computers.
303
Execute Script
The dialog contains these elements: Executable type: The type of program that is to run on the clients to gather the information for the field: Unix shell script (Mac OS X targets) AppleScript (Mac OS X targets) DOS batch file (Windows targets) Visual Basic script (Windows targets) PowerShell script (Windows targets) Depending on the choice made in this pop-up menu, different fields become available in the dialog pane. File: The field can take the path of a file on your computer that is to be executed on the administered computers. You can enter the path manually or select the file using the Select button. (This option is available for all executable types.) Line endings in any scripts you specify are converted to the conventions of the target platform when they are uploaded to Absolute Manage Server. Text: The text of a script can be entered in this field. The entered script is executed on the target computers. (This option is available for all executable types.) Note: Absolute Manage offers syntax verification functions only for AppleScript scripts; we strongly recommend that you test the scripts before entering them here. Transfer all files in folder containing executable: If this option is checked, all files in the same folder as the specified script file are transferred to the target computers before the
304
Commands menu
script is executed. (This option is available for all executable types.) Note: Line endings in any files that are uploaded because this option is checked are not converted (as are those in scripts, as described above). Command line options: Any text entered in this field is passed as a parameter to the specified script (using the usual calling conventions of the script type in question). You can include shell variables in the options, as described in Environment variables on page 134. Automatically view results: If this option is checked, the results that the scripts return are automatically displayed in result windows on your computer. (By default, they are just entered in the command history.) If All results in one window is checked, all returned script results are displayed together in a single window. Clicking a computer in the windows upper half scrolls the lower half to that computers results. If All results in one window is unchecked, a separate window is opened for each script result. Executable requires administrative privileges: If this option is checked, the specified script is executed with administrator privileges on the target computers. (This option is available for the Unix Shell Script executable type.) Execute as: This pop-up menu allows you to specify a user account on the target computers with the privileges of which the script is executed. (This option is available for the Unix Shell Script, DOS Batch File, Visual Basic Script, and PowerShell executable types.)
NOTE The result of the script execution, if any, can be displayed via the Show Command Result context menu command in the Commands window. The toolbar of command windows is described in Command window toolbar on page 279.
305
Choosing the command opens the Execute Macintosh File dialog, which has two tabs: Executable Message
The toolbar of command windows is described in Command window toolbar on page 279.
Executable
The Executable tab of the Execute Macintosh File dialog lets you specify the file to execute and the manner of its execution:
The tab contains these elements: Source: The file on your computer or on the server that is to be executed. Select: Clicking this button opens a dialog in which the file to be executed can be selected. Transfer all files in folder containing executable: If this option is selected, Absolute Manage transfers not only the executable itself to the target computer but also any other files that are located in the same folder. Tell installer to install on: The volume where the installer is to install the software. Note: Specifying a target volume may not be supported by all installers. Execute as: The user with whose privileges the application is to run.
306
Commands menu
Executable requires administrative privileges: If this option is checked, the Agents run the script with system administrator privileges. Command line options: Any text entered in this field is passed as a parameter to the application. You can include shell variables in the options, as described in Environment variables on page 134. Execution method: Whether the installer is copied to the target computers or run from a server: Install and launch: The specified file is copied from the administrators computer to the target computers and run there. Launch from server: The specified server volume (see below) is mounted, the file executed, and the server volume unmounted. Launch using server URL: The specified file (see URL, below) on a server is executed. Address: The IP address or DNS name of the server. SMB server addresses must be prefixed by a double backslash, according to UNC notation. Note: If you enter an abbreviated DNS name (i.e., one that relies on being completed with the default domain you have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain), if you use DNS names. Volume: The volume of the server on which the file is located. User: The username to use to connect to the server. Password: The password to use to connect to the server. URL: The URL of the server volume. The URL is made up of several elements, some of which are optional, in this order: The protocol (afp or smb), followed by :// Optionally a username followed by @ Optionally for AFP servers ;AUTH= and an authentication type (see below) Optionally : and a password The servers IP address or DNS name Optionally, : and a port number The path of the server volume to use The following authentication methods are supported: No User Authent Cleartxt Passwrd Randum Exchange 2-Way Randnum DHCAST128 DHX2 Client Krb v2 Microsoft V1.0 These are two sample URLs: afp://username:[email protected]/ volumename/ afp://user:pass;AUTH=Cleartxt [email protected]/volumename/
307
Message
The Message tab of the Execute Macintosh File dialog lets you send a message to target computers before the file is executed. A black diamond on the tab indicates that a message has been specified, even when you select another tab. The elements of this pane are described in Send Message on page 291. If a Cancel button is added to the dialog, the file will not be executed on any target computer on which the user clicks Cancel.
The toolbar of command windows is described in Command window toolbar on page 279.
308
Commands menu
Executable
The Executable tab of the Execute Windows File dialog lets you specify the file to execute and the manner of its execution:
The tab contains these elements: Source: The file on your computer or on the server that is to be executed. Select: Clicking this button opens a dialog in which the file to be executed can be selected. Transfer all files in folder containing executable: If this option is selected, Absolute Manage transfers not only the executable itself to the target computer but also any other files that are located in the same folder. Execute as: The user with whose privileges the application is to run. Command line options: The command line options with which the file is launched on the target computer. You can include shell variables in the options, as described in Environment variables on page 134. Note: When the executable is an MSI, MSP patch file, or MSU updater file and you do not specify command line options, Absolute Manage adds the /qn option (/quiet /norestart for MSU files) to run the installer silently. Working directory: The working directory for the files execution on the target computers. Execution method: Whether the installer is copied to the target computers or run from a server: Install and launch: The specified file is copied to the target computers and run there.
309
Launch from server: The specified server volume (see below) is mounted, the file executed, and the server volume unmounted. Launch using server URL: The specified file (see URL, below) on a server is executed. Address: The IP address or DNS name of the server. SMB server addresses must be prefixed by a double backslash, according to UNC notation. Note: If you enter an abbreviated DNS name (i.e., one that relies on being completed with the default domain you have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain), if you enter a DNS name. Volume: The volume of the server on which the file is located. User: The username to use to connect to the server. For Windows clients in networks with domains, the username must be specified as domain\username. Password: The password to use to connect to the server. URL: The URL of the server volume. The URL is made up of several elements, some of which are optional, in this order: The protocol (smb), followed by :// Optionally a username followed by @ Optionally : and a password The servers IP address or DNS name Optionally, : and a port number The path of the server volume to use
Message
The Message tab of the Execute Windows File dialog lets you send a message to target computers before the file is executed. A black diamond on the tab indicates that a message has been specified, even when you select another tab. The elements of this pane are described in Send Message on page 291. If a Cancel button is added to the dialog, the file will not be executed on any target computer on which the user clicks Cancel.
310
Commands menu
Choosing the command opens the Install Software Packages File dialog:
The dialog contains these elements: Search field: Enter part of the name of a software package here to restrict the display to packages with matching names. List of packages: Check all packages that you want to install. Install packages even if they are already present If this option is checked, packages are installed on the target computers even if they are already present. If the option is unchecked, the selected packages are installed only on those target computers that do not already have them. Install packages contained in metapackages even if they are already present If this option is checked, all packages contained in selected metapackages are installed on the target computers even if they are already present. If the option is unchecked, packages in the selected metapackages are installed only on those target computers that do not already have them.
The toolbar of command windows is described in Command window toolbar on page 279.
Transfer File/Folder
The Transfer File/Folder command copies files or folders from your hard disk to those of target computers.
311
Transfer File/Folder
Choosing the command opens the Transfer File/Folder File dialog, which has three tabs: Transfer Permissions Message
The toolbar of command windows is described in Command window toolbar on page 279.
Transfer
The Transfer tab of the Transfer File/Folder dialog lets you specify the files or folders to be transferred from your computer:
The tab contains these elements: Source: The file or folder on your computer or on the server that is to be transferred. Select: Clicking this button opens a dialog in which the file or folder to be transferred can be selected. Transfer all files in folder containing source file: If this option is selected, Absolute Manage transfers not only the selected file itself to the target computer but also any other files that are located in the same folder. Transfer contents of disk image: When a disk image has been selected as the source file, the Transfer all files in folder containing source file option becomes this option. Checking it makes Absolute Manage transfer not the disk image itself but its contents to the target computers boot volumes. In this case, the Target Region, Target Location, and Target Path options are not available; the folder structure from the disk image is mirrored on the boot volumes. Target Region: The general domain where the files or folders are to be transferred to. The available regions are explained in Copy File/Folder on page 314.
312
Commands menu
Target Location: The specific location within the target region where the files or folders are to be transferred to. The available locations are explained in Copy File/Folder on page 314. Target Path: The path of a folder within the specified target location where the files or folders are to be transferred to (optional). When Use Path Only is chosen as the location, you can specify the user folder on Mac OS X targets and its subfolders using the ~/ notation. (E.g., ~/Fonts for the users fonts folder.) For Windows targets, you can use environment variables when Use Path Only is chosen, as described in Environment variables on page 134. After Transfer: What Absolute Manage is to do with a file or folder after having transferred it: Do nothing: No action is taken beyond transferring the file or folder. Open file: Open the file, same as using the Open File command (see Open File on page 322). Open file with admin privileges: Open the file, same as using the Open File command. The file is opened with administrator privileges. Delete existing file: If this option is checked, a file at the target location with the same name as a transferred file or folder is replaced. If the option is unchecked, the transfer fails if a file with the same name already exists.
Permissions
The Permissions tab of the Transfer File/Folder dialog lets you specify the access permissions for the transferred on Mac OS X target computers:
The tab contains these elements: Mac OS X Permissions: The access permissions: This permission is set for the transferred file or folder.
313
Copy File/Folder
This permission is set to the same value for the transferred file or folder as for the source file on your computer. This permission is not set for the transferred file or folder. The permissions are displayed in standard BSD notation below the array for easy verification. Unix owner: When a file or folder is transferred to a Mac OS X target, its owner can be set. The owner can either be the owner of the parent folder on the target computer, the owner of the source file on your computer, or a specified user of the target computer. Unix group: When a file or folder is transferred to a Mac OS X target, its group can be set. The group can either be the group of the parent folder on the target computer, the group of the source file on your computer, or a specified group on the target computer.
Message
The Message tab of the Transfer File/Folder dialog lets you send a message to target computers before the files or folders are transferred. A black diamond on the tab indicates that a message has been specified, even when you select another tab. The elements of this pane are described in Send Message on page 291. If a Cancel button is added to the dialog, the transfer will not take place to any target computer on which the user clicks Cancel.
Copy File/Folder
The Copy File/Folder command copies files or folders on the target computers to another location on the same computers. Choosing the command opens the Copy File dialog:
The dialog contains these elements: File: The path of the file or folder that is to be copied. If you select a file or folder before choosing the command, its path is pre-entered. If you select more than one file or folder, only the number of objects is shown.
314
Commands menu
To specify a file or folder manually, enter the entire path, with slashes as path dividers for Mac OS X files and backslashes for Windows files. For files on Windows targets, you can use environment variables, as described in Environment variables on page 134. Target Region: On Mac OS X target computers, the general domain to which the file or folder is to be copied. These target regions exist: System Domain: /System and its subfolders All Users Domain: /Library and its subfolders Current User Domain: ~/ and its subfolders Classic Domain: The Mac OS 9 system folder or one of its subfolders. (Requires the Classic environment to be configured on the target computer.) Network Domain: The network resources folder defined by NetInfo and its subfolders. On Windows targets, only some domains are recognized: System Domain: The operating system folder and its subfolders All Users Domain: The Users folder (Vista and later) or Documents and Settings folder (XP and earlier) and their subfolders Current User Domain: The current users folder and its subfolders Target Location: The specific location within the target region where the file or folder will be copied. Location Use Path Only Mac OS X Windows
The target region is ignored and only the contents of the Target Path field is considered. (Using the contents as an absolute path.) The desktop of the target computer. The top level of the specified domain. ~/ Current users folder (in Vista and later usually in Users, in XP and earlier usually in Documents and Settings) Users folder (Vista and later) or Documents and Settings folder (XP and earlier) Program Files folder
Users
/Users
Applications
/Applications
315
Copy File/Folder
Location Documents
Mac OS X ~/Documents
/Applications/ Utilities Library folder in the target region. Library/ Frameworks folder in the target region. Library/ Preferences folder in the target region. Library/ PreferencePanes folder in the target region. Library/Extensions folder in the target region. Library/Fonts folder in the target region. Library/ScriptingAdditions folder in the target region. Library/ StartupItems folder in the target region. Library/Application Support folder in the target region. Library/Contextual Menu Items folder in the target region.
Preferences
n/a
Preference Panes
System directory for control panels (usually c:\windows \system32) Active system folder (usually c:\windows \system32) Windows fonts folder (usually c:\windows\fonts) n/a
Kernel Extensions
Fonts
Target Path: The path of a folder within the specified target location where the file or folder is to be copied (optional).
316
Commands menu
When Use Path Only is chosen as the location, you can specify the user folder on Mac OS X targets and its subfolders using the ~/ notation. (E.g., ~/Fonts for the users fonts folder.) For Windows targets, you can use environment variables when Use Path Only is chosen, as described in Environment variables on page 134. New Name: A name for the copied file or folder that is different from the original (optional). Replace existing file: If this option is checked, a file with the same name as the copied file or folder at the target location is replaced. If the option is unchecked, the copying process fails if a file with the same name already exists.
The toolbar of command windows is described in Command window toolbar on page 279.
Create Alias
The Create Alias command creates an alias of the selected files or folders on the target computers in a specified location on the same computers. (On Windows targets, a shortcut is created.) Choosing the command opens the Create Alias dialog:
The dialog contains these elements: File: The path of the file or folder from which an alias is to be created. If you select a file or folder before choosing the command, its path is pre-entered. If you select more than one file or folder, only the number of objects is shown. To specify a file or folder manually, enter the entire path, with slashes as path dividers for Mac OS X files and backslashes for Windows files. For Windows targets, you can use environment variables, as described in Environment variables on page 134. Target Region: The general domain where the alias is to be created. The available regions are explained in Copy File/ Folder on page 314.
317
Create Folder
Target Location: The specific location within the target region where the alias is to be created. The available locations are explained in Copy File/Folder on page 314. Target Path: The path of a folder within the specified target location where the alias is to be created (optional). When Use Path Only is chosen as the location, you can specify the user folder on Mac OS X targets and its subfolders using the ~/ notation. (E.g., ~/Fonts for the users fonts folder.) For Windows targets, you can use environment variables, as described in Environment variables on page 134. New Name: A name for the alias that is different from the default name (optional). Replace existing file: If this option is checked, a file with the same name as the alias at the target location is replaced. If the option is unchecked, the process fails if a file with the same name already exists.
The toolbar of command windows is described in Command window toolbar on page 279.
Create Folder
The Create Folder command creates a folder on the target computers in a specified location. Choosing the command opens the Create Folder dialog:
The dialog contains these elements: Folder Name: The desired name of the folder.
318
Commands menu
Target Region: The general domain where the folder is to be created. The available regions are explained in Copy File/ Folder on page 314. Target Location: The specific location within the target region where the folder is to be created. The available locations are explained in Copy File/Folder on page 314. Target Path: The path of a folder within the specified target location within which the folder is to be created (optional). Use slashes as path dividers for Mac OS X targets and backslashes for Windows targets. Note: This is not the path of the folder that is to be created but the path of its parent folder. When Use Path Only is chosen as the location, you can specify the user folder on Mac OS X targets and its subfolders using the ~/ notation. (E.g., ~/Fonts for the users fonts folder.) For Windows targets, you can use environment variables when Use Path Only is chosen, as described in Environment variables on page 134. Mac OS X Permissions: When creating folders on Mac OS X target computers, you can specify its permissions: This permission is set for the folder. This permission is set to the same value for the folder as for the parent folder. This permission is not set for the folder. The permissions are displayed in standard BSD notation below the array for easy verification. Unix owner: When a folder is created on a Mac OS X target, its owner can be set. The owner can either be the owner of the parent folder or a specified user of the target computer. Unix group: When a folder is created on a Mac OS X target, its group can be set. The group can either be the group of the parent folder or a specified group on the target computer.
The toolbar of command windows is described in Command window toolbar on page 279.
Delete File/Folder
The Delete File/Folder removes a file or folder from the target computers. IMPORTANT Once executed, this command is not reversible. The selected files and folders are not put into the trash but removed completely. They cannot be recovered, short of using specialized tools.
319
Find File
The dialog contains these elements: File: The path of the file or folder that is to be deleted. If you select a file or folder before choosing the command, its path is pre-entered. If you select more than one file or folder, only the number of objects is shown. To specify a file or folder manually, enter the entire path, with slashes as path dividers for Mac OS X files and backslashes for Windows files. For Windows targets, you can use environment variables, as described in Environment variables on page 134.
The toolbar of command windows is described in Command window toolbar on page 279.
Find File
The Find File command searches target computers for files and enters found files into the Files table of the Absolute Manage database. Choosing the command opens the Find File dialog:
The dialog contains these elements: Find files that match: When all is chosen from this pop-up menu, files are found that match all specified conditions (Boolean AND). If any is chosen, files are found that match at least one of the specified conditions (Boolean OR).
320
Commands menu
Values from: Clicking this button lets you select a file. All specified conditions are filled with the respective parameters from this file. If you later add new conditions, they initially also contain comparison values from this file. Condition area: The first pop-up menu lets you choose a condition to match files. The second one contains the possible comparison operators. For most conditions, a text field lets you specify the value to compare files against. The + and buttons let you add new conditions or remove existing ones. The parameters available for specifying conditions are described in Files on page 557, except for Checksum and Path: Checksum lets you select files by their MD5 checksums, making sure that files are really the desired version, without alterations. Note that the checksum has to be calculated dynamically; doing so for a large number of files requires a huge amount of processing power on the client computer and should therefore be avoided. Always combine the Checksum criterion with other criteria that make sure that the checksum needs to be calculated only for a small number of files. Checksums are not available for folders. Path lets you select files and folders by their paths on the hard disk. It references the File Path information item. When this option is chosen, you can specify the user folder on Mac OS X targets and its subfolders using the ~/ notation. (For example, ~/Documents for the users documents folder.) For Windows targets, you can use the environment variables when this option is chosen, as described in Environment variables on page 134. All volumes: All volumes of the target computers are searched. Boot volume only: Only the boot volumes of the target computers are searched. Starting at: Only the directory specified in the text field and its subdirectories are searched. You can use Mac OS X ~/ notation for the user folder and Windows environment variables as described above for the Path criterion. Descend into packages: If this option is checked, the contents of packages on Mac OS X target computers are included in the search. If it is unchecked, the packages are treated as files and their contents are not searched. Stop after first match: If a matching file has been found on a target computer, the search is stopped on that computer.
The toolbar of command windows is described in Command window toolbar on page 279.
Move File/Folder
The Move File/Folder command moves files or folders on the target computers to another location on the same computers.
321 Absolute Manage User Guide
Open File
The command is similar in all respects to the Copy File/Folder command (see Copy File/Folder on page 314), except that files and folders are moved instead of copied. The toolbar of command windows is described in Command window toolbar on page 279.
Open File
The Open File command opens a file on the target computers. The effect is the same as if the file had been double-clicked locally. The file to be opened must already be present on each target computer. (Compare Transfer File/Folder on page 311.) Choosing the command opens the Open File dialog, which has two tabs: Executable Message
The toolbar of command windows is described in Command window toolbar on page 279.
Executable
The Executable tab of the Open File dialog lets you specify the file to open:
The tab contains these elements: File: The location of the file on the target computers. If a file is selected in a browser window when you open this command, that files location is pre-entered. If you select more than one file, only the number of files is shown. On Windows targets, the PATH variable is automatically evaluated, allowing you to specify just the filename instead of
322
Commands menu
the full path as long as the file is located in a directory that is included in PATH. You can use other environment variables as well, as described in Environment variables on page 134. Currently logged-in user: The file is opened with the privileges of the current user of the target computer. System account / privileged user: The file is opened with the privileges of an administrator account. Other user: The file is opened as if executed by the specified user. For Windows target computers, the password of the user account must also be specified. For Windows clients in networks with domains, the username must be specified as domain\username. Command line options: Any command-line options you specify here apply only if application files are opened. You can include shell variables in the options, as described in Environment variables on page 134.
Message
The Message tab of the Open File dialog lets you send a message to target computers before the file is opened. The elements of this pane are described in Send Message on page 291. If a Cancel button is added to the dialog, the file will not be opened on any target computer on which the user clicks Cancel.
Rename File/Folder
The Rename File/Folder command changes the name of files or folders on target computers. Choosing the command opens the Rename File dialog:
The dialog contains these elements: File: The path of the file or folder that is to be deleted. If you select a file or folder before choosing the command, its path is pre-entered. If you select more than one file or folder, only the number of objects is shown. To specify a file or folder manually, enter the entire path, with slashes as path dividers for Mac OS X files and backslashes for Windows files.
323
For Windows targets, you can use environment variables, as described in Environment variables on page 134. New name: The new name of the selected files or folders, without the path.
The toolbar of command windows is described in Command window toolbar on page 279.
The dialog contains these elements: File to view: The file that you want to display. You specify the file in any of these ways: Enter the complete path of the file on the computer, including the files name and extension (if any). For Windows targets, you can use environment variables, as described in Environment variables on page 134. When a file has been selected in an Absolute Manage browser window before the View Text File command is chosen, that files path is pre-entered into the File to view field. Choose one of the predefined files from the pop-up menu. Data to view: Specify how much of the files data Absolute Manage is to display. You may not want to transmit very large files in their entirety across the network. In that case, you can limit the amount Absolute Manage displays (and thus has to transmit). Absolute Manage displays the amount of data you specify from the end of the file. Refresh: If this option is checked, Absolute Manage automatically continues to fetch the contents of the file in the specified interval. Note: Fetching large files in short intervals can create significant network loads.
324
Commands menu
Text encoding: The text encoding system used for the file.
Executing the command opens the specified file on all target computers. If more than one target computer was chosen, Absolute Manage Admin opens multiple windows, one for each target computer. The toolbar of command windows is described in Command window toolbar on page 279.
The dialog contains these elements: Force full inventory: If this option is checked, the server gets from the agents on the target computers all inventory information. If the option is unchecked, only information that has changed since the last transmission is transmitted to the server. Include font information: If this option is checked, font information is gathered from the target computers. If the option is unchecked, no font information is gathered.
325
Include printer information: If this option is checked, information on printers is gathered from the target computers. If the option is unchecked, no printer information is gathered. Include startup item information: If this option is checked, information on startup items is gathered from the target Mac OS X computers. If the option is unchecked, no startup item information is gathered. Include service information: If this option is checked, information on active services is gathered from the target Windows computers. If the option is unchecked, no services information is gathered.
NOTE The information collected by this command is also collected automatically through regular inventory scans. Use this command when you would like to check the status on some computers immediately or more frequently than allowed for by the inventory push interval set through the Agent Settings command. The toolbar of command windows is described in Command window toolbar on page 279.
The dialog contains these elements: Scan installer receipts: If this option is checked, Absolute Manage scans target computers for installed software by looking for installer receipts. If it is unchecked, all installed software that was found through installer receipts is deleted from the Installed Software table in the Absolute Manage database.
326
Commands menu
Scan for missing operating system patches: If this option is checked, Absolute Manage scans target computers for operating system patches that are present in the Software Distribution Center and would apply to the target computers but are not installed on them. (Patches that were rejected by an administrator are not considered to be missing.) The results can be viewed in the Missing Operating System Patches window. Scan for application: If this option is checked, Absolute Manage scans target computers for installed software by looking for applications in the specified locations and their subfolders. Applications folder: the Applications folders (on Mac OS X targets) or the Program Files folders (on Windows targets; folder chosen according to the local environment variable settings) Boot volume: the entire startup volume All local volumes: all volumes currently mounted on the target computer, except server volumes Note: Scanning entire hard disks can create a huge amount of data. We recommend scanning the boot volume or all local volumes only when really required. If the Scan for application option is unchecked, all installed software that was found through searching the application folders is deleted from the Installed Software table in the Absolute Manage database.
The toolbar of command windows is described in Command window toolbar on page 279.
327
The dialog contains these elements: Checklist file: This is the FDCC file containing the report parameters, an XML file the name of which usually contains xccdf Clicking the Select button lets you choose a file from . your hard disk. Profile: This pop-up menu lets you choose the desired profile from the profiles contained in the chosen file. Profile Objects: This list contains the individual options contained in the chosen profile. You can switch them off and on individually. Using the context menu commands, you can also switch on or off multiple selected items together. Entering text in the search field above the list restricts the list to display just the objects containing that text. Description: The description of the selected object.
The toolbar of command windows is described in Command window toolbar on page 279.
328
Commands menu
Execute Command
The Execute Command command executes the command in the front-most window with the current settings. The effect is the same as clicking the Execute button. Execute Command is available only if a command window is the frontmost window.
Command Options
The Command Options command lets you change the options for a command. Command Options is available only if the Commands window or a command window is the frontmost window.
329
Choosing the command opens the Command Options dialog described in Options on page 280.
Edit Command
The Edit Command command lets you change the settings for a command in the command queue. Edit Command is available only if the Commands window is the frontmost window and a queued (i.e, scheduled or deferred) command is selected. Choosing Edit Command displays a message asking you to choose between editing the command setting only for the selected target or for all targets for which the command was originally given. When you have made your choice, the original command dialog will be opened, displaying the current settings. The target list contains all or one of the original targets, as per your choice. After you have modified the command settings as desired, clicking the Execute button executes the command or re-enters it into the command queue in its edited form, depending on the scheduling options you have specified.
Reapply Command
The Reapply Command command lets you execute a command again that has already been executed, successfully or failing. You can change the command settings before re-executing the command. Reapply Command is available only if the Commands window is the frontmost window. Using Reapply Command is similar to using Edit Command, described above.
330
Commands menu
The dialog contains these elements: Configuration profile: The configuration profile you want to install. The pop-up menu contains all profiles that are available in Absolute Manage. You can choose Other from this menu to open a configuration profile file that has not yet been imported into Absolute Manage. Name: The name of the profile. Identifier: The identifier of the profile. Organization: The organization of the profile. Removal options: Whether the local user of the iOS device can remove the profile and whether a passcode is required for doing so. Description: A description of the profile. This description is displayed to the user of the managed mobile device. You can edit it before assigning the profile.
331
The dialog contains these elements: Provisioning profile: The provisioning profile you want to install. The pop-up menu contains all profiles that are available in Absolute Manage. You can choose Other from this menu to open a provisioning profile file that has not yet been imported into Absolute Manage. Name: The name of the profile. Expiration date: The date on which the provisioning profile becomes invalid. Unique ID: The globally unique identifier for the profile.
Install Application
Choosing this command displays the Install Application dialog in which you can choose an in-house or recommended app to install on the selected devices.
332
Commands menu
Application: The in-house app you want to install. The pop-up menu contains all apps for the operating system of the selected devices that are available in Absolute Manage. Bundle identifier: The bundle identifier of the chosen application. Version: The version of the chosen application. Build number: The build number of the chosen application. Minimum OS version: The minimum version of the mobile OS required by the chosen application. Supported devices: The types of device on which the app can be used. This information is displayed only for iOS devices. Short description: The short description of the application that it was given when it was imported into Absolute Manage. Long description: The long description of the application that it was given when it was imported into Absolute Manage. You can edit this description before installing the app.
Clicking OK in this dialog transfers the app to the selected mobile devices upon the next contact and presents their users with a prompt to install the app. If a user declines, the app is not installed on that device. Note that you cannot install an application on an iOS device that already contains an unmanaged version of the application. (Unmanaged applications are all applications that have been installed by other means than through the MDM system.)
333
The dialog contains these elements: Enable voice roaming: If this option is checked, voice roaming will be enabled on the mobile device. If it is unchecked, voice roaming will be disabled. (If it is in the third state, no change will be made.) Note that some mobile communications companies prevent access to this setting. If that is the case for the selected devices, this option is disabled. Enable data roaming: If this option is checked, data roaming will be enabled on the mobile devices. If it is unchecked, voice roaming will be disabled. (If it is in the third state, no change will be made.)
Note that local users of the mobile devices will still be able to change the settings you make in this dialog.
334
Commands menu
Track Device
This command lets you enable and disable geotracking for mobile devices and set tracking details. It is not available when multiple devices are selected. IMPORTANT Because the location of a mobile device often is also the location of its user, tracking mobile devices is governed by privacy or data protection laws in many jurisdictions. Usually, the express consent of the user of the device is required before it may be tracked. In addition, there may be regulations governing how long gathered data may be stored and how and by whom it may be accessed. Failure to obtain the required consent or observe other applicable legal regulations may expose you to civil and/or criminal liability. Choosing the command opens the Mobile Device Tracking dialog:
The dialog contains these elements: Track device: Checking this option enables tracking of the selected device, unchecking it disables it. Note that tracking can be enabled only for devices on which AbsoluteApps is installed. Deploying AbsoluteApps is described in Preparing iOS devices for software installation on page 150.
Absolute Manage User Guide
335
Activation passphrase: The pin needed to access the selected mobile device. This pin is specified when AbsoluteApps in launched for the first time on a mobile device or centrally after the deployment of AbsoluteApps. See Setting passphrases for mobile devices on page 172 for details. Tracking interval: The interval in which a location record for the device is recorded. If the device has no contact with the MDM server at the scheduled time, it caches its locations and transmits it when it next has contact. If a device has no location information at the scheduled time, e.g., because it has no GPS contact and is not in range of a known WiFi network, no location record is created. Specifying short tracking intervals can lead to very large numbers of tracking records and should therefore be carefully considered. For example, tracking 50 devices with an interval of five minutes creates more than five million records per year. Location accuracy: The maximum accuracy with which the device position is recorded. Lower accuracies mean that a device cannot be located as precisely but better preserves the privacy of the user.
If the Option key is pressed while choosing the Track Device command, a slightly different version of the dialog is displayed that allows you to enable geotracking on a device for which you do not have the passphrase. See Dealing with lost passphrases on page 176 for details. For more information on geotracking, see Geotracking mobile devices on page 171.
336
Commands menu
locally or remotely) before AbsoluteApps can be used again on the device. See Setting passphrases for mobile devices on page 172 for details.
337
Chapter 15
Server menu
The Server menu contains commands that let you configure the Absolute Manage Servers settings and exchange information with it. All commands affect only the server where you are currently logged in. Synchronize All Tables (page 338) Reload All Tables (page 338) Synchronize Selected Records (page 339) Reload Selected Records (page 339) Save Distribution and Licensing Info (page 339) Read Distribution and Licensing Info (page 340) Save Administrator Info (page 340) Read Administrator Info (page 340) Save Custom Information Fields (page 340) Restore Custom Information Fields (page 340) Synchronize Custom Information Fields (page 341) Save Server Settings (page 341) Restore Server Settings (page 341) Synchronize Server Settings (page 341) Save All Settings (page 342) Restore All Settings (page 342) Create Placeholder Computer Records (page 342) Change Server Registration (page 344)
338
Server menu
This command makes sure that the tables in your copy of Absolute Manage Admin contain the same information as the tables in the Absolute Manage Server database, even if they previously have been out of sync.
339
340
Server menu
Pressing the Option key changes this command to Synchronize Custom Information Fields (see below).
341
Pressing the Option key changes this command to Synchronize Server Settings (see below).
342
Server menu
Choosing the command opens the Create Placeholder Computer Records dialog:
The dialog contains these elements: The list at the top contains all custom computer records that you have specified since opening the dialog. The list does not contain records that you have specified in earlier uses of this dialog. The + button lets you create a new record. Clicking the button creates a new entry in the list and activates the entry fields below the list. Clicking the - button deletes the currently selected records from the list. OS platform: The flavor of operating system used on the computer. This information appears in the OS Platform column of browser windows. Computer type: The make of the computer that is being specified. This information appears in the Computer Type column of browser windows. Computer name: A descriptive name for the computer. This information appears in the Agent Name column of browser windows. MAC address: The MAC address of the network interface of the specified computer. This information appears in the Primary MAC Address column of browser windows. Computer serial number: The serial number of the computer. This information is optional; if provided, it appears in the Computer Serial Number column of browser windows.
343
Import: Clicking this button displays a standard Open dialog in which you can selec a tab-delimietd text file that contains the information for the placeholder records you want to create. The file must contain one line for each record, with this information (in this order, separated by tabs): OS platform: Mac OS X or Windows Computer type: The type as displayed in the Computer Type information item Computer name: The name as displayed in the Computer Name information item MAC address: The MAC address of the computer main network interface Computer serial number: The serial number as displayed in the Computer Serial Number information item. This information is optional. OK: Clicking the OK button creates dummy computer records in the Absolute Manage database. These records appear in browser windows but can be used only as targets for the Reinstall Windows Computer command.
The dialog contains these fields:. Name: Your name. Company: The name of your company. Serial number: The serial number of your copy of Absolute Manage. Activation key: The Absolute Manage activation key that you have received. Demo: Clicking this button starts Absolute Manage Server in demo mode. In demo mode, Absolute Manage can be used for
344
Server menu
45 days to administer up to ten computers and up to ten mobile devices. Note: The demo mode is only available when the server has not yet been registered. NOTE The Change Server Registration command can be used only by administrators with the Change Server Settings right. See New Administrator on page 471 for details.
345
Zoom
Chapter 16
Window menu
The Window menu contains commands related to working with windows. There are commands for arranging windows, commands to open a range of predefined windows, and commands for opening usercreated windows: Zoom (page 346) Minimize (page 346) Bring All to Front (page 346) Computers (page 347) Files (page 347) Fonts (page 347) Processes (page 347) Installed Software (page 348) Missing Operating System Patches (page 349) Registry Entries (page 351) Compliance Reports (page 351) Power Usage Reports (page 352) Mobile Devices (page 355) Server Center (page 355) Agent Deployment Center (page 356) Commands (page 356) Command Templates (page 357) Window Reinstallation Tasks (page 358) Information Items (page 359) User windows (page 360) ; other open
The front-most window is indicated by a checkmark windows are marked with a dash .
Zoom
The Zoom command toggles the front-most window between its normal size and full-screen size.
Minimize
The Minimize command reduces the front-most window to an icon and puts it in the dock.
346
Window menu
Computers
The Computers command opens the Computers window. The Computers window is a predefined browser window that displays the contents of the Computers table of the Absolute Manage database, i.e., all administered client computers. Browser windows are described in Browser windows on page 362. The columns in the Computers window are described in Information items on page 525.
Files
The Files command opens the Files window. The Files window is a predefined browser window that displays the contents of the Files table of the Absolute Manage database, i.e., all files that have been searched for on client computers. Browser windows are described in Browser windows on page 362. The columns in the Files window are described in Files on page 557.
Fonts
The Fonts command opens the Fonts window. The Fonts window is a predefined browser window that displays the contents of the Fonts table of the Absolute Manage database, i.e., all fonts that have been found to be installed on client computers. Browser windows are described in Browser windows on page 362. The columns in the Fonts window are described in Fonts on page 552.
Processes
The Processes command opens the Processes window. The Processes window is a predefined browser window that displays the contents of the Processes table of the Absolute Manage database, i.e., all processes that have been found to be running on client computers. Browser windows are described in Browser windows on page 362. The columns in the Processes window are described in Processes on page 555.
347
Installed Software
Installed Software
The Installed Software command opens the Installed Software window. The Installed Software window is a predefined browser window that displays the contents of the Installed Software table of the Absolute Manage database, i.e., all software that has been found to be installed on client computers by means of the Gather Installed Software command described on page 326. NOTE The Gather Installed Software command may not find all software on client computers. Software outside the Applications or Program Files folders the installation of which has not generated an installer receipt is not listed in this window. Browser windows are described in Browser windows on page 362. The columns in the Processes window are described in Processes on page 555. The Installed Software window contains some additional groups and context menu items that are not present in standard browser windows. These are described below.
Groups
There are a number of predefined smart groups in the Installed Software window: Mac Software: All installed software both installer receipts and the contents of the Applications folder that has been found on Mac OS X clients. Mac Installer Receipts: Installed software that has been found on Mac OS X clients by checking installer receipts. Mac Applications: Installed software that has been found on Mac OS X clients by searching the specified folders on client computers. Apple Software: Software from Apple Computer, Inc., that has been found on Mac OS X clients. Non-Apple Software: Software that has been found on Mac OS X clients and that has not been created by Apple Computer, Inc. PC Software: All installed software both installer receipts and the contents of the Program Files folder that has been found on Windows clients. PC Installer Receipts: Installed software that has been found on Windows clients by checking installer receipts. PC Applications: Installed software that has been found on Windows clients by searching the specified folders on client computers. PC Hotfixes: Any installed patches from Microsoft were found on client computers and are marked as hotfixes.
348
Window menu
Mac Installer Receipt Statistics: Summary information on the kinds and numbers of all installed software that has been found on client Mac OS X computers by scanning installer receipts. Mac Application Statistics: Summary information on the kinds and numbers of all installed software that has been found on client Mac OS X computers by searching the Applications folders. PC Installer Receipt Statistics: Summary information on the kinds and numbers of all installed software that has been found on client Windows computers by scanning installer receipts. PC Application Statistics: Summary information on the kinds and numbers of all installed software that has been found on client Windows computers by searching the Program Files folders.
In addition to some commands found in other browser windows, the context menu of the Installed Software window contains some unique commands: New Installed Software Smart Group: This command opens a dialog in which you can define a new smart group for the contents of the Installed Software table (i.e., the contents of the Installed Software window). New Installed Software Statistics Smart Group: This command opens a dialog in which you can define a new smart group for statistics information on installed software. New Missing Software Smart Group: This command opens a dialog in which you can define a new smart group for computers on which some installed software is missing. When you have specified software in the smart group dialog by choosing a method of matching and giving matching criteria the group contains all those client computers on which the specified software is not found. Only computers with the appropriate operating system are listed. For example, if you specify software matching by PC installer receipt, the resulting group contains only Windows client computer missing the specified software. Mac OS X client computers who by definition also lack the specified software are not listed.
NOTE Creating smart groups is described in Creating a smart group on page 108.
349
The Missing Operating System Patches window is a predefined browser window that displays patches that are known to Absolute Manage but are not installed on applicable computers. The data displayed in this window is collected using the Gather Installed Software command. NOTE Patches that were rejected by an administrator are not considered to be missing patches. Furthermore, only client computers that are part of the automated patch management are considered. The Missing Operating System Patches window has slightly different predefined smart groups and context menu than other browser windows, as described below.
Context menu
The context menu contains these commands: New Missing Mac OS Patches Smart Group: Creates a new smart group for missing Mac OS X patches. New Missing Microsoft Patches Smart Group: Creates a new smart group for missing Windows patches. New Missing Mac OS Patches Statistics Smart Group: Creates a new smart group for summary information on missing patches on Mac OS X computers. New Missing Windows Patches Statistics Smart Group: Creates a new smart group for summary information on missing patches on Windows computers.
The dialog for defining smart groups is described in New Smart Group on page 367. Computer- and file-related commands in the context menu are described in Commands menu on page 278.
350
Window menu
For the remaining three commands (Rename Group, Edit Smart Group, and Remove Group), please see the description of browser windows in Browser windows on page 362.
Further information
Browser windows in general are described in Browser windows on page 362. The columns in the Missing Operating System Patches window are described in Missing OS Patches on page 555. Details of Absolute Manages patch management are described in Automated patch management on page 224.
Registry Entries
The Registry Entries command opens the Registry Entries window. The Registry Entries window is a predefined browser window that displays registry entries which have been found by the Search Windows Registry command.
Context menu
The context menu commands are covered in the description of browser windows in Browser windows on page 362.
Further information
Browser windows in general are described in Browser windows on page 362. The columns in the Registry Entries window are described in Registry Entries on page 559.
Compliance Reports
The Compliance Reports command opens the Compliance Reports window. The Compliance Reports window is a predefined browser window that displays compliance reports which have been created by means of the Gather Compliance Report command. Double-clicking any report opens the Compliance Report window for that report. See Compliance Report window on page 376 for details.
Context menu
The context menu commands are covered in the description of browser windows in Browser windows on page 362. (The New Smart Compliance Report Group command is similar to the New Smart Group command.) The context menu in the main window area contains an additional command, Show Report Details. Choosing this command opens the Compliance Report window for that report, just like double-clicking the report.
Further information
Browser windows in general are described in Browser windows on page 362. The columns in the Compliance Reports window are described in Compliance Reports on page 578.
Context menu
The context menu commands are covered in the description of browser windows in Browser windows on page 362.
352
Window menu
In the configuration section: Update Report: Clicking this button recalculates the displayed statistics and the graph based on the current configuration settings for the selected computer group. Calculate power consumption between: The power consumption between the dates you specify here (inclusive) is displayed both in the statistics section and the graph. Compare to power consumption between: If this option is checked, the historic power consumption in the specified period is displayed in the graph for comparison purposes. This period is exactly as long as the primary period chosen above.
353
Baseline usage: This is the number of hours per day that an administered computer is considered to be running without the Absolute Manage power management. In effect, this number provides the value from which your savings are calculated. Energy costs: The price you pay for a kilowatt-hour of electricity. Enter a value and a currency; some common currencies can be chosen from the pop-up menu.
In the statistics section: Report period: The days for which the statistics are provided. Note that this may differ from the dates in the configuration section if you have changed the period and not yet clicked the Update Report button. Days covered: The number of days in the report period. Computers covered: The number of computers that have been included in the report. Managed computers: The number of computers to which power management schedules are currently being applied. Power management schedules used: A list of power management schedules that are being applied to the managed computers. Power-on time: The time the computers included in the report have been running. Reported values include: Total: the sum over all computers and report days Avg/day: the daily average for all computers Avg/computer: the average per computer over the entire report period Baseline: the comparison value over all computers and days if no power management had happened Energy usage: The power consumption of the computers in the report. The consumption is calculated using these typical values: Desktop computer: 105 W operational, 5 W sleep Laptop computer: 30 W operational, 2 W sleep LCD monitor: 35 W operational, 0 W sleep CRT monitor: 65 W operational, 0 W sleep See Power-on time, above for explanations of the individual values. Costs: The costs of the consumed power. See Power-on time, above for explanations of the individual values. Energy savings: The power saved when compared to the baseline level. See Power-on time, above for explanations of the individual values. Cost saving: The money saved when compared to the baseline level. See Power-on time, above for explanations of the individual values.
The graph provides a visual overview of the power that has been used during the report period. It contains three data series:
354
Window menu
Baseline usage: The amount of power that would have been consumed without the power management schedules. (Based on the number of hours that is specified in the Baseline usage field.) Actual usage: The amount of power that was consumed during each displayed interval. Historic usage: The power usage during the specified comparison period.
NOTE Both the actual and the baseline power consumption is calculated based on the values in the Power Consumption preferences pane.
Further information
Absolute Manages power management functions are described in Scheduling power management events on page 115.
Mobile Devices
The Mobile Devices command opens the Mobile Devices window that integrates all aspects of working with administered mobile devices, such as iPhones and iPads. The Mobile Devices window is much like a browser window. However, in contrast to a normal browser window, it displays information from one of several database tables grouped into multiple categories, depending on which smart group or other sidebar entry is selected. The items and action menu commands of the Mobile Devices window are described in Mobile Devices on page 384. Browser windows in general are described in Browser windows on page 362. The columns in the Mobile Devices window are described in Mobile Device Information on page 580.
Server Center
The Server Center command opens the Server Center window that integrates all aspects of configuring software distribution, license monitoring, and administrator accounts, and server monitoring. The Server Center window is much like a browser window. However, in contrast to a normal browser window, it displays information from one of several database tables grouped into multiple categories, depending on which smart group or other sidebar entry is selected. The items and action menu commands of the Server Center window are described in Server Center on page 421.
355
Browser windows in general are described in Browser windows on page 362. The columns in the Server Center window are described in Server Center on page 562.
Commands
The Commands command opens the Commands window that displays all pending and currently executing commands as well as the command history and lets you edit and reschedule commands. You can also issue new commands by selecting the desired target computers and choosing the desired option from the Commands menu. The Commands window is much like a browser window. However, in contrast to a normal browser window, it displays information items from the Commands category (described in Commands on page 561). The items and action menu commands of the Commands window are described in Commands window on page 516. Browser windows in general are described in Browser windows on page 362.
356
Window menu
Command Templates
The Command Templates command opens the Command Templates window that lists all commands that have been saved as templates.
The window contains these elements: Search Templates: This field lets you quickly restrict the display to command templates that contain the search text. Favorite: Command templates checked in this column appear in the Favorites submenu of the Commands menu. Template Name: The name under which the template has been saved. You can click this field of a selected command template to edit the name. Command: The command that is executed by the template. Description: The description of the command template that you have entered when saving the template. You can click this field of a selected command template to edit the description.
Toolbar buttons
The toolbar can contain these buttons (in addition to standard elements common to toolbars in all applications): Search Templates: When text is entered into this field, the display is restricted to command templates containing that text. Use Templates: Clicking this toolbar button opens the selected templates, just like the Use Template context menu command described below. Remove Templates: Clicking this toolbar button deletes the selected templates, just like the Remove Template context menu command described below.
Context menu
The windows context menu contains these commands: Use Template: Choosing this command opens the selected templates, displaying the respective commands command dialogs.
357
You can edit all the options in these dialogs, including the target list, before clicking the Execute button to actually issue the command. Remove Template: Choosing this command deletes the selected templates from the Command Templates window. If the template was included in the Favorites submenu, it is removed there as well.
You can edit a templates name or description by double-clicking it in the Command windows table area.
The window lists all issued reinstallation tasks for Windows target computers (i.e., tasks started with the Reinstall Windows Computer command). It may also include tasks executed by a FOG server that have not come from Absolute Manage, e.g., because they were entered through the FOG web interface.
Toolbar buttons
The toolbar can contain these buttons (in addition to standard elements common to toolbars in all applications): Synchronize Records: Clicking this button updates the displayed information with current data from the PXE server.
358
Window menu
Context menu
The windows context menu contains these commands (in addition to standard commands for all browser windows described in Action menu on page 366 and Context menu on page 369, respectively): Show Computer Detail View: This command is similar to the Show Detail View command standard to all browser windows. Choosing this command displays the selected computers detail information in the Computers window. Synchronize Records: Clicking this button updates the displayed information with current data from the PXE server.
Information Items
The Information Items command opens the Information Items window that lists all information items.
The window contains these elements: Search Items: This field lets you quickly restrict the display to information items the name of which contains the search text. The pop-up menu in the field lets you repeat recent searches. Groups & Items: A hierarchical list of information items, grouped by category.
Dragging an information item to a browser window adds a column displaying the information item to the window.
Context menu
The Information Items windows context menu contains these commands: Copy: This command copies the name of the current information item. It has the same effect as the Copy command from the Edit menu. Edit Custom Field: This command is available only for custom information items. Choosing it lets you edit the selected custom information item in the Custom Information Field dialog.
Absolute Manage User Guide
359
User windows
A custom information item can also be edited by doubleclicking in the Information Items window.
User windows
The bottom part of the menu contains all browser windows and command dialogs that you have opened. If no such window has yet been opened, this section is not displayed.
360
Help menu
Chapter 17
Help menu
The Help menu lets you access the Absolute Manage online help: Absolute Manage Admin Help (page 361) Show Release Notes (page 361) Absolute Manage Support (page 361) Absolute Manage Web Site (page 361) Acknowledgements (page 361)
Acknowledgements
The Acknowledgements command opens a window displaying the acknowledgements for code incorporated into Absolute Manage and other contributions.
361
Chapter 18
Browser windows
Browser windows display the contents of Absolute Manages internal database in a configurable table view.
Action menu
Sidebar
Toolbar
Table area
Columns drawer
Browser windows contain these elements: Toolbar (page 363) Status bar (page 364) Table columns (page 365) Drawer (page 365) Sidebar (page 366) Action menu (page 366) New Group (page 367) New Smart Group (page 367) New Category (page 368) Rename Group (page 368) Edit Smart Group (page 368) Remove Group (page 369) Remove Category (page 369) Remove from Group (page 369) Context menu (page 369) Copy (page 370) Copy <information item> (page 370) New Smart Group from <information item> (page 370) Make Group from Selected Computers (page 370) Show Detail View (page 371) Synchronize Records (page 371) Enter Custom Field Data (page 371) Remove from Server (page 372) Remove Inventory Data (page 372) Computer Tracking (page 372)
362
Browser windows
Remove from Group (page 373) Remote Control (page 373) View in Separate Window (page 374) Open in Preview (page 374) The + button in the lower left-hand corner is not separately described. Clicking it creates a new smart group as if you had chosen New Smart Group; clicking it with the Option key held down acts like you had chosen New Group.
Toolbar
Browser windows have toolbars that allows quick access to common actions. NOTE The toolbar can be customized by means of the Customize Toolbar command described on page 277. The toolbar can contain these elements (some commands omitted in the screenshot):
The elements are explained below, except for those that are not specific to Absolute Manage Admin (Flexible Space through Print).
Configure Columns
The Configure Columns button opens the columns drawer or closes it when it is already open. It has the same effect as the Configure Columns command described on page 275.
363
Status bar
Synchronize Records
The Synchronize Records button downloads updated information for the selected records from the server to which you are connected. It has the same effect as the Synchronize Selected Records command described on page 339.
Command buttons
For each command from the Commands menu (except those that are only usable in the Commands window), there is one button. Clicking that button has the same effect as choosing the corresponding command from the Commands menu.
Search Records
The Search Records field lets you quickly restrict the display to records that contain the search text. The pop-up menu lets you specify whether all columns should be searched or just one particular column. Pressing Return executes the search.
Status bar
Browser windows have status bars displaying information on the state of the window. The status bar displays the number of records currently shown in the window. It also shows the kind of information displayed:
If the window does not display all records from the server database table (because the number of records exceeds the initial display limit set in the Preferences dialogs General pane), this is indicated with the addition (more) after the record count in the status bar. Clicking more displays the additional records. If data on an individual computer is displayed (as described in Sidebar on page 366), the status bar also indicates how old the currently shown information is.
364
Browser windows
Table columns
The columns displayed in browser windows are completely configurable: The columns display information items from the Agent Information, Hardware Information, Software Information, Command History, and License Status per Agent categories. Information items are described in Information items on page 525. Columns can be dragged around in the window to be rearranged. Dragging an item from the Information Items window into a browser window creates a new column at the right of the table. Deleting columns is possible in the Columns drawer, in addition to rearranging and adding columns. This is described below. Double-clicking a column title in the browser window sorts the table by that column or, if the column is already a sort column, reverses the sort order. If there already are sorting columns, double-clicking a new column makes it a subsorting column. Double-clicking while holding down the Command key unsorts a column. If individual computers are selected in the sidebar (see below), the columns are hidden and information on the selected computer is displayed.
Drawer
Browser windows contains a drawer for rearranging the columns in the window. It is opened by choosing Configure Columns from the View menu. The drawer contains the titles of all columns that are displayed in the browser window. The order of the column titles is the same as that of the columns in the table in the window. Dragging a column title to another location in the drawer repositions the column in the window. Dragging an information item into the drawer adds a corresponding column to the window. You can also drag columns from one Columns drawer to another or transfer them by copying and pasting. Clicking the Remove button deletes the selected columns from the window.
365
Sidebar
Sidebar
Browser windows contains a sidebar with a number of categories and predefined smart groups to which more can be added.
Categories
New browser windows contain the Built-in category. (Predefined windows may contain other or additional categories.) More categories can be added using the New Category context menu command. Categories group other categories, groups, and smart groups very much like folders in a file system.
Smart groups
All Computers: All computers listed in the Computers table in the Absolute Manage database. Macs only: All Mac OS X computers contained in the database. PCs only: All Windows computers contained in the database.
Additional smart groups and groups can be added using the New Group and New Smart Group commands in the action context menu. NOTE Smart groups are defined by selection criteria, dynamically displaying computers that match the criteria at the moment. Groups are folderlike, containing the computers that have been put into them manually. You can rearrange smart groups by dragging them to the desired place in the list.
Details
The smart groups can be expanded to reveal the computers contained in them. A computer can be clicked to reveal basic information on that computer in the table area. Expanding a computer displays a range of categories in the sidebar. Clicking on of the categories displays information from that category for the respective computer in the table area. Details can be displayed in the same way for computers in user-created groups and smart groups.
Action menu
The action menu of browser windows contains commands for managing groups and smart groups. The commands are described in detail in the following sections.
366
Browser windows
New Group on page 367 New Smart Group on page 367 New Category on page 368 Rename Group on page 368 Rename Category on page 368 Edit Smart Group on page 368 Remove Group on page 369 Remove Category on page 369 Remove from Group on page 369
New Group
The New Group command creates a new (non-smart) group. Choosing the command opens the New Group dialog:
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand text field lets you specify an information item on which records are to be matched. The pop-up menu in the middle contains the possible comparison operators.
367
New Category
The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
New Category
The New Category command creates a new category in the browser windows sidebar. Choosing the command opens the New Category dialog:
The dialog contains a field for editing the name of the category.
Rename Group
The Rename Group command renames an existing smart or nonsmart group. Choosing the command lets you edit the name of the group (inline in the windows sidebar). If a category is selected, this command is renamed Rename Category.
Rename Category
If a category in the sidebar is selected, the Rename Group command is renamed Rename Category. Choosing the command is similar to choosing Rename Group; see there for details.
368
Browser windows
Remove Group
The Remove Group command deletes the selected smart or nonsmart groups. Choosing the command deletes the selected groups. A confirmation alert is displayed first. The computers listed in the groups is not deleted from the database. If a category is selected, this command is renamed Remove Category.
Remove Category
If a category in the sidebar is selected, the Remove Group command is renamed Remove Category. Choosing the command is similar to choosing Remove Group; see there for details.
Context menu
The context menu of browser windows contains commands from the Commands menu. In addition, it contains a number of specific commands: Copy on page 370 Copy <information item> on page 370 New Smart Group from <information item> on page 370 Make Group from Selected Computers on page 370 Show Detail View on page 371 Synchronize Records on page 371 Remove from Server on page 372 Remove Inventory Data on page 372 Computer Tracking on page 372 Remove from Group on page 373 Remote Control on page 373 View in Separate Window on page 374 Open in Preview on page 374 For information on the rest of the commands in the context menu, see Commands menu on page 278. (The Favorite Commands context menu item corresponds to the Favorites submenu in the Commands menu.)
369
Copy
Copy
The Copy command copies the selected records as tab-delimited text to the clipboard. If multiple records are selected, all are copied. In the Computer Tracking section of a computers detail view, you can use Copy to copy a screenshot. The Copy context menu command has the same effect as the Copy command from the Edit menu described on page 339.
370
Browser windows
Synchronize Records
The Synchronize Records command downloads updated information for the selected records from the server to which you are connected. It has the same effect as the Synchronize Selected Records command described on page 339.
The dialog contains a list of available manual custom information fields. Clicking one of the fields Field Data column lets you edit the content of that field for all selected computers. Clicking the Remove button removes the field content from all selected computers. Only fields that are checked in the Modified column are modified when you click OK. NOTE The Modified column is not displayed if only one computer was selected before the dialog was opened.
371
NOTE The Remove from Server command can be used for computer records only by administrators with the Remove Computer Records right. See New Administrator on page 471 for details.
The checkboxes allow you to specify the data to be deleted. Clicking OK deletes all data on the server of the marked types which relate to the selected computers. NOTE The Remove Inventory Data command can be used for computer records only by administrators with the Remove Inventory Data right. See New Administrator on page 471 for details.
Computer Tracking
The Computer Tracking command lets you activate or deactivate tracking for the selected computers and specify tracking options.
372
Browser windows
The dialog contains these options: Track selected computers: Check this option to activate tracking the computers; uncheck it to stop tracking them. Take screenshots: If this option is checked, the tracked computers take screenshots and transmit them to the Absolute Manage Server whenever they send a heartbeat (e.g., when the network connection is changed, when a user logs in or out, when the computer is woken up, or in regular intervals otherwise).
NOTE The Computer Tracking command is available only to administrators with the Change Computer Tracking right. See New Administrator on page 471 for details.
Remote Control
The Remote Control command lets you remotely control the selected client computers using screen sharing software. Choosing the command launches a local remote control software such as Timbuktu, MS Remote Desktop, or a VNC application and connects it to the selected client computer. Details of the process are described in Remotely controlling computers on page 119. A screen sharing client for the application must be available on the remote computer. If Absolute Manage does not detect any such client
373
or if you hold down the Option key while choosing the command, the Remote Control Settings dialog opens:
The dialog contains these elements. Fields that do not apply to the chosen service are disabled: Service: The desired protocol to use for remotely controlling the target computer. Username: The user account for the remote control software on the client computers. Password and Verify: The password for the specified account. Note: Some VNC applications do not support being supplied with a username and password when they are launched; when you are using these applications, you must enter a username and password within the application, even if you have already supplied both in Absolute Manage. This is a limitation of these applications, not of Absolute Manage. Application: The local application that will be used to connect to the client. If n/a is displayed, no application for the selected protocol was found. Select: Click this button to choose the desired application to use. Domain: The Window networking domain to be used for accessing client computers. Note: Some VNC applications do not support domains. Port: The network port on which to contact the remote control software on the client computers.
Open in Preview
The Open in Preview command opens the selected image in Apples Preview application.
374
Browser windows
The command is available only in the context menu for a screenshot in the Computer Tracking section of a computers detail view.
375
Chapter 19
Action menu
Sidebar
Toolbar
Information panel
Table area
Columns drawer
The elements of a Compliance Report window are described below: Toolbar (page 377) Information panel (page 378) Table columns (page 378) Sidebar (page 378) Action and context menus (page 379) Copy (page 379) Copy <information item> (page 379) Show Details for This Computer (page 380) Show Details for This Scoring Item (page 380) New Smart Report Summary Group (page 380) New Smart Report Item Summary Group (page 381) New Smart Report Details Group (page 381) New Category (page 382) Rename Group (page 382) Rename Category (page 382) Edit Smart Group (page 383) Remove Smart Group (page 383) Remove Category (page 383)
The + button in the lower left-hand corner is not separately described. Clicking it creates a new queue smart group as if you had chosen New
376
Smart Report Item Summary Group; clicking it with the Option key held down acts like you had chosen New Smart Report Summary Group.
Toolbar
The Compliance Report window has a toolbar that allows quick access to common actions. NOTE The toolbar can be customized by means of the Customize Toolbar command described on page 277. After such customization, not all of the buttons described below may be present in the toolbar. The toolbar can contain these elements:
The elements are explained below, except for those that are not specific to Absolute Manage Admin (Flexible Space through Customize).
Configure Columns
The Configure Columns button opens the columns drawer or closes it when it is already open. It has the same effect as the Configure Columns command described on page 275.
Update Report
Clicking the Update Report button synchronizes the display in the Compliance Report window with the report data on the server. This is useful if gathering the report was still in progress when you opened the window, so that additional data may have arrived on the server since then.
377
Information panel
Search Records
The Search Records field lets you quickly restrict the display to commands that contain the search text. The pop-up menu lets you specify whether all columns should be searched or just one particular column. Pressing Return executes the search.
Information panel
The information panel at the top of a Compliance Report window displays information on the report itself. Clicking the triangle it. at the left of the panel left expands and collapses
In its collapsed state, it displays the name of the report as well as the profile and the benchmark file used. In its expanded state, it displays additional information on the report. These information items are described in Reports on page 578.
Table columns
The columns displayed in a Compliance Report window are described in Compliance Reports on page 578.
Sidebar
The Compliance Report window contains a sidebar with predefined and custom groups displaying commands by their execution status: Summary All Computers: Summary information on all computers for which the report has been completed. Summary by Scored Item: Summary information on all score items, showing how the compliance for each item was across all tested computers. Expand the category and click any score item to display the individual results of each computer. Details All Computers: Detailed information for one computer on each score item.
378
Expand the category and click the desired computer in the sidebar to display its details. Pending Reports: All reports that are in the process of being collected. Completed Reports: All reports that have been completely gathered.
Any additional smart groups that you define are displayed below these groups.
For information on the rest of the commands in the context menu, see Commands menu on page 278. (The Favorite Commands context menu item corresponds to the Favorites submenu in the Commands menu.)
Copy
The Copy command copies the selected records as tab-delimited text to the clipboard. If multiple records are selected, all are copied. The Copy context menu command has the same effect as the Copy command from the Edit menu described on page 272.
is copied; the title of that information item is noted in the context menu command (e.g., Copy Command Name). If multiple records are selected, the contents of the information item from all of them are copied.
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. The available information items are described in Computer Summary on page 579.
380
The second pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. The available information items are described in Item Summary on page 579. The second pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
381
New Category
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. The available information items are described in Score Items on page 579. The second pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
New Category
The New Category command creates a new category in the windows sidebar.
Rename Group
The Rename Group command renames an existing smart group. Choosing the command lets you edit the name of the group (inline in the windows sidebar). If a category is selected, this command is renamed Rename Category.
Rename Category
If a category in the sidebar is selected, the Rename Group command is renamed Rename Category. Choosing the command is similar to choosing Rename Group; see there for details.
382
Remove Category
If a category in the sidebar is selected, the Remove Smart Group command is renamed Remove Category. Choosing the command is similar to choosing Remove Smart Group; see there for details.
383
Chapter 20
Mobile Devices
The Mobile Devices window displays information on mobile devices enrolled in the MDM server that is specified in the server settings. (See MDM on page 493 for more information.) It also displays limited information on iOS devices that are managed through a copy of iTunes installed on any administered computer. NOTE Administrators can see in this window only information about devices to which they have been assigned, unless the Can manage all devices option has been activated for their account. The window is opened by choosing the Mobile Devices command form the Window menu.
Action menu Sidebar Toolbar Table area Status bar
The elements of the Mobile Devices window are described below: Toolbar (page 387) Table columns (page 389) Sidebar (page 389) Action menu (page 391) Mobile Applications (page 392) New In-house Application Package (page 393) New iOS App Store Application Package (page 394) New Android Market Application Package (page 396) Duplicate Application Package (page 397) New Smart Group: In-house Application Packages (page 397)
384
Mobile Devices
New Smart Group: App Store Application Packages (page 397) New Smart Group: iOS Provisioning Profiles (page 397) New Smart Group: Installed Applications (page 398) New Smart Group: Installed Application Statistics (page 398) New Smart Group: Mobile Devices by Installed Software (page 398) New Smart Group: Installed iOS Provisioning Profiles (page 398) New Smart Group: Installed iOS Provisioning Profiles Statistics (page 398) New Smart Group: Mobile Devices by Installed iOS Provisioning Profiles (page 399) Configuration Profiles and Certificates (page 399) New iOS Configuration Profile (page 399) New Smart Group: iOS Configuration Profiles (page 400) New Smart Group: Installed iOS Configuration Profiles (page 401) New Smart Group: Installed iOS Configuration Profiles Statistics (page 401) New Smart Group: Mobile Devices by Installed iOS Configuration Profiles (page 401) New Smart Group: Installed Certificates (page 401) New Smart Group: Installed Certificates Statistics (page 401) New Smart Group: Mobile Devices by Installed Certificates (page 402) Media (page 402) New Media File (page 402) Duplicate Media File (page 403) New Smart Group: Media Files (page 404) Policies (page 404) New Policy (page 404) New Smart Policy: Mobile Devices (page 404) New Group: Mobile Devices (page 405) New Smart Group: Mobile Devices (page 405) New Smart Group: Command Queue (page 405) New Smart Group: Command History (page 405) New Category (page 406) Rename Group (page 406) Edit <item> (page 406) Remove <item> (page 406) Table context menu (page 406) Copy (page 408) Copy <information item> (page 408) New Smart Mobile Device Group from <information item> (page 408) New Smart Policy from <information item> (page 408) New Smart Application Group from <information item> (page 408)
385
New Smart Configuration Profiles Group from <information item> (page 409) New Smart Provisioning Profiles Group from <information item> (page 409) New Smart Media Files Group from <information item> (page 409) New Command Queue Smart Group from <information item> (page 410) New Command History Smart Group from <information item> (page 410) New Policy with Selected Devices (page 411) Install Configuration Profile (page 411) Install Provisioning Profile (page 411) Install Application (page 411) Issue Device Lock (page 411) Issue Clear Passcode (page 411) Issue Remote Erase (page 411) Set Roaming Options (page 411) Send Message to Device (page 411) Set Device Name (page 412) Delete Application (page 412) Delete Profile (page 412) Update Device Info (page 413) Show Detail View (page 413) Synchronize Records (page 413) Enter Custom Field Data (page 413) Import Custom Field Data (page 413) Ignore Devices (page 414) Reset All Ignored Devices (page 414) Retry All Failed Profiles (page 414) Remove from Group (page 414) Remove from Policy (page 414) Track Device (page 415) Get Device Geolocation (page 415) Reset Tracking Passphrase (page 415) Show Location on Google Maps (page 415) Show Location on Bing Maps (page 415) Send Re-enrollment Message to Device (page 415) Update Installed Application Statistics (page 416) Show Mobile Application Package Details (page 416) New Mobile Application Package (page 416) New iOS App Store Application Package (page 416) New Android Market Application Package (page 417) Edit Mobile Application Package (page 417) Duplicate Mobile Application Package (page 417) Remove Mobile Application Package (page 417) Show Configuration Profile Details (page 417) New Configuration Profile (page 417) Edit Configuration Profile (page 417) Remove Configuration Profile (page 418) Remove Configuration Profile (page 418) Show Provisioning Profile Details (page 418) Show Media File Details (page 418) Set Availability Time (page 418) New Media File (page 419)
386
Mobile Devices
Edit Media File (page 419) Remove Media File (page 419) Show Policy Members (page 420) Remove Policy (page 420)
The + button in the lower left-hand corner is not separately described. Clicking it creates an item, depending on the kind of object currently selected in the sidebar.
Toolbar
The Mobile Devices window has a toolbar that allows quick access to common actions. NOTE The toolbar can be customized by means of the Customize Toolbar command described on page 277. After such customization, not all of the buttons described below may be present in the toolbar. The toolbar can contain these elements:
The elements are explained below, except for those that are not specific to Absolute Manage Admin (Flexible Space through Customize).
Configure Columns
The Configure Columns button opens the columns drawer or closes it when it is already open. It has the same effect as the Configure Columns command described on page 275.
387 Absolute Manage User Guide
Toolbar
Synchronize Records
Clicking the Synchronize Records button synchronizes the display in the Mobile Devices window with the report data on the server. It has the same effect as the Synchronize Selected Records command described on page 339.
Send Message
This is the Send Message to Device command described on page 411.
Remove Profiles
This is the Install Application command described on page 332.
Lock Device
This is the Issue Device Lock command described on page 333.
Clear Passcode
This is the Issue Clear Passcode command described on page 333.
Search Records
The Search Records field lets you quickly restrict the display to commands that contain the search text. The pop-up menu lets you specify whether all columns should be searched or just one particular column.
388
Mobile Devices
Table columns
The columns displayed in a Mobile Devices window are described in Mobile Device Information on page 580.
Sidebar
The Mobile Devices window contains a sidebar with predefined and custom groups displaying commands by their execution status:
Built-in
All mobile devices: All found managed mobile devices. Devices that have been removed with the Ignore Devices context menu command are not listed. All iOS devices: All found mobile devices running iOS. Any devices that have been removed with the Ignore Devices context menu command are not listed. All iPhones: All found iPhones. Any iPhones that have been removed with the Ignore Devices context menu command are not listed. All iPads: All found iPads. Any iPads that have been removed with the Ignore Devices context menu command are not listed. All iPod touch devices: All found iPod touch devices. Any iPods that have been removed with the Ignore Devices context menu command are not listed. All Android devices: All found mobile devices running Android. Any devices that have been removed with the Ignore Devices context menu command are not listed. All Android phones: All found mobile phones running Android. Any phones that have been removed with the Ignore Devices context menu command are not listed. All Android tablets: All found tablets running Android. Any tablets that have been removed with the Ignore Devices context menu command are not listed. All installed applications: All applications that were found on the listed devices. No applications from devices that have been removed with the Ignore Devices context menu command are listed. All installed provisioning profiles: All provisioning profiles that were found on the listed devices. All installed configuration profiles: All configuration profiles that were found on the listed devices. All installed certificates: All certificates that were found on the listed devices. Installed software statistics: Summary information on the applications that were found on the iOS devices. No applications from devices that have been removed with the
389
Sidebar
Ignore Devices context menu command are included in the summary. These statistics are not automatically updated. To update them, choose Update Installed Application Statistics from the context menu.
Policies
All policies that have been created in Absolute Manage. Each policy has a number of categories: Allowed In-house Apps: Apps that are available for installation in AbsoluteApps on the devices belonging to the policy. Forbidden In-house Apps: Apps that may not be installed on the devices belonging to the policy. Recommended Apps: Apps from the Apple App Store that have been recommended for use on the devices belonging to the policy. Policy-locked Configuration Profiles: Configuration profiles that are automatically installed on devices that are added to the policy and uninstalled from devices that are removed from the policy (unless the devices belong to another policy in which the profile is mandatory or policy-locked). Forbidden Configuration Profiles: Configuration profiles that must not be installed on the devices belonging to the policy. Required Configuration Profiles: Configuration profiles that are mandatory on the devices belonging to the policy. On-demand Configuration Profiles: Configuration profiles that users of the devices belonging to the policy can install if desired. Media: Media files that are automatically transferred to mobile devices belonging to this policy.
Commands
Queued Commands: Commands issued to managed mobile devices that have not yet been reported as completed. Command History: Commands issued to managed mobile devices that have been completed, successfully or unsuccessfully. Any additional smart groups that you define are displayed below these groups.
Absolute Manage User Guide 390
Mobile Devices
Action menu
The action and the context menus of the sidebar of the Mobile Devices window contains commands for grouping devices as well as working with applications, profiles, certificates, and policies. The commands are described in detail in the following sections. Mobile Applications on page 392 New In-house Application Package on page 393 New iOS App Store Application Package on page 394 Duplicate Application Package on page 397 New Smart Group: In-house Application Packages on page 397 New Smart Group: App Store Application Packages on page 397 New Smart Group: iOS Provisioning Profiles on page 397 New Smart Group: Installed Applications on page 398 New Smart Group: Installed Application Statistics on page 398 New Smart Group: Mobile Devices by Installed Software on page 398 New Smart Group: Installed iOS Provisioning Profiles on page 398 New Smart Group: Installed iOS Provisioning Profiles Statistics on page 398 New Smart Group: Mobile Devices by Installed iOS Provisioning Profiles on page 399 Configuration Profiles and Certificates on page 399 New iOS Configuration Profile on page 399 New Smart Group: iOS Configuration Profiles on page 400 New Smart Group: Installed iOS Configuration Profiles on page 401 New Smart Group: Installed iOS Configuration Profiles Statistics on page 401 New Smart Group: Mobile Devices by Installed iOS Configuration Profiles on page 401 New Smart Group: Installed Certificates on page 401 New Smart Group: Installed Certificates Statistics on page 401 New Smart Group: Mobile Devices by Installed Certificates on page 402 Media on page 402 New Media File on page 402 Duplicate Media File on page 403 New Smart Group: Media Files on page 404 Policies on page 404 New Policy on page 404 New Smart Policy: Mobile Devices on page 404 New Group: Mobile Devices on page 405 New Smart Group: Mobile Devices on page 405 New Smart Group: Command Queue on page 405
391
Mobile Applications
New Smart Group: Command History on page 405 New Category on page 406 Rename Group on page 406 Edit <item> on page 406 Remove <item> on page 406
For information on the rest of the commands in the context menu, see Commands menu on page 278. (The Favorite Commands context menu item corresponds to the Favorites submenu in the Commands menu.)
Mobile Applications
The Mobile Applications submenu contains commands for working with application packages and provisioning profiles: New In-house Application Package on page 393 New iOS App Store Application Package on page 394 New Android Market Application Package on page 396 Duplicate Application Package on page 397 New Smart Group: In-house Application Packages on page 397 New Smart Group: App Store Application Packages on page 397 New Smart Group: iOS Provisioning Profiles on page 397 New Smart Group: Installed Applications on page 398 New Smart Group: Installed Application Statistics on page 398 New Smart Group: Mobile Devices by Installed Software on page 398 New Smart Group: Installed iOS Provisioning Profiles on page 398 New Smart Group: Installed iOS Provisioning Profiles Statistics on page 398 New Smart Group: Mobile Devices by Installed iOS Provisioning Profiles on page 399
392
Mobile Devices
The dialog contains these elements: Name: The name for the package. This name is displayed in AbsoluteApps. Application: The application file, which must have the .ipa extension. Clicking the Select button lets you select the file on your computer. Provisioning profile: The provisioning profile authorizing the application for deployment on the intended mobile device. The provisioning profile is provided by the application developer. Clicking the Select button lets you select the file on your computer containing the profile. Provisioning profiles do not apply to Android apps. Supported devices: The devices on which this app can be used. Check all devices that support this app. This option applies only to iOS apps. Short description: A brief description of the application. This description is displayed in AbsoluteApps. Long description: A more extensive description of the application. This description is displayed in AbsoluteApps. Update description: A description of the changes in the application compared to the previous version. This description is displayed in AbsoluteApps. It should only be filled in when the application package contains an application for which an earlier version exists. Delete application when device is removed from MDM management:If this option is checked, the app will automatAbsolute Manage User Guide
393
ically deleted from any device on which it is installed when that device is no longer under MDM management. If the option is unchecked, removing a device from management leaves the app untouched on it. This option applies only to iOS apps. Prevent backup of application data: If this option is checked, any data belonging to this app that is stored on the device is not included in iTunes backups of the device. If the option is unchecked, the application data is backed up normally. This option applies only to iOS apps.
The Application Info tab lets you specify the app and its important parameters.
The dialog contains these elements: The field for the icon at the top left. This field is filled automatically when the App Store URL is specified but you can paste in a custom graphic. Name: The name for the package. This name is displayed in AbsoluteApps. Category: The App Store category to which the app belongs. Platform: The iOS hardware platforms on which the app can run.
394
Mobile Devices
Minimum iOS version: The minimum version of iOS required to run this app. Apple App Store URL: The URL of the App Store page for this app. You can obtain the URL by right-clicking the apps icon anywhere in Apples App Store and choosing Copy Link from the context menu. Short description: A brief description of the application. This description is displayed in AbsoluteApps. Long description: A more extensive description of the application. This description is displayed in AbsoluteApps.
The Volume Purchase Code tab lets you import and manage available App Store volume purchase program redemption codes.
The dialog contains these elements: Order number: The order number for the redemption code purchase. Purchaser: The user through whose App Store account the codes were purchased. Codes purchased: The total number of redemption codes purchased for this app. Codes redeemed: The number of codes for this app that have already been redeemed. Codes remaining: The number of redemption codes for this app that have not yet been redeemed. Codes purchased is always the sum of codes redeemed and codes remaining. Import Codes: Clicking this button let you import redemption codes into the app package definition. It opens a standard Open dialog where you can choose a text file in one of the following formats:
395
A file exported from the Excel file with the purchased code you received from Apple. To create this file, open the Excel file and save it as tabdelimited text. Files of this type must begin with two asterisks (**). A standard tab-delimited text file. Files of this type contain in each line a redemption code followed by a tab and the redemption link. This kind of file must not begin with a double asterisk. The codes in the imported file are appended to the list of codes in the dialog. The list that takes up the main part of the dialog lists all redemption code for this app package. It contains these columns: Code: The redemption code. Redeemed: Whether this code has already been redeemed. Redeemed by: The device on which this code was redeemed. Redemption date: The date on which the code was redeemed.
Pasting text that conforms to the two supported import file formats into the list enters the codes just as if they had been imported.
The dialog contains these elements: The field for the icon at the top left. This field is filled automatically when the Android Market URL is specified but you can paste in a custom graphic. Name: The name for the package. This name is displayed in AbsoluteApps.
396
Mobile Devices
Category: The Android Market category to which the app belongs. Minimum OS version: The minimum version of Android required to run this app. Android Market URL: The URL of the Android Market page for this app. You can obtain the URL by right-clicking the apps icon anywhere in the Android Market and choosing Copy Link from the context menu. Short description: A brief description of the application. This description is displayed in AbsoluteApps. Long description: A more extensive description of the application. This description is displayed in AbsoluteApps.
397
398
Mobile Devices
399
The iOS Configuration Profile dialog lets you import a configuration profile into Absolute Manage that can then be distributed to administered iOS devices.
The dialog contains these elements: Configuration profile: The file containing the configuration profile. Clicking the Select button lets you select the file on your computer. Configuration profiles are created in Apples iPhone Configuration Utility. Name: The name of the profile. The name is automatically read from the profile and cannot be changed in Absolute Manage. Identifier: The identifier of the profile. The identifier is automatically read from the profile and cannot be changed in Absolute Manage. Organization: The organization of the profile. The identifier is automatically read from the profile and cannot be changed in Absolute Manage. Removal options: Whether the local user of the iOS device can remove the profile and whether a passcode is required for doing so. Description: A description of the profile. This description is displayed to the user of the managed mobile device. Variables used: The variables used in this profile that will be replaced with actual values during the installation. (See Creating configuration profiles containing variables on page 139 for information on using variables in profiles.)
400
Mobile Devices
401
Media
The Media submenu contains commands for working with media objects: New Media File on page 402 Duplicate Media File on page 403 New Smart Group: Media Files on page 404
The dialog contains these elements: Media file: The file you want to make available. Clicking the Select button lets you choose a file. You can also drag a file from the desktop into this area to choose it. Name: The name under which the file appears on managed mobile devices.
402
Mobile Devices
Category: The category in which it is displayed by AbsoluteSafe on the managed device. This field is preppoluated by Absolute Managed based on the kind of file selected, but you can enter any desired category name. If the category does not yet exist, AbsoluteSafe will create it. Icon: The icon that is displayed for the media file on the managed mobile devices. The icon is automatically created based on the type of the selected file, but you can also paste any graphic into this field. File type: The type of the selected file. Size: The file size in bytes. Description: A description of the file for the mobile users. This description is displayed in AbsoluteSafe. Passphrase: When you enter text into this field, the media file is only displayed when the user enters the same text on the mobile device. Verify passphrase: Repeat the passphrase to guard against typos. Media file can leave media store: If you check this option, users of mobile devices can open the file in an app other than AbsoluteSafe, for example, to view it in a PDF reader or to mail it to somebody else. Two other options become available: User can e-mail file: If this option is checked, a button for sending this file by e-mail appears in AbsoluteSafe. User can print file: If this option is checked, a button for printing this file appears in AbsoluteSafe. If this option is unchecked, mobile users can view the file only in AbsoluteSafe. Note: While unchecking this option reliably prevents the file from leaving AbsoluteSafe, the same is not necessarily true for the information contained in the file. For example, a mobile user still could take screenshots of the file and send those to other persons.
Clicking OK saves the media file in Absolute Manage. It can then be assigned to a policy to make it available to mobile users.
403
Policies
The Policies submenu contains commands for working with configuration profiles: New Policy on page 404 New Smart Policy: Mobile Devices on page 404 New Smart Policy: Mobile Devices by Installed Applications on page 404 New Smart Policy: Mobile Devices by Installed iOS Configuration Profiles on page 405
New Policy
This command opens the New Mobile Device Policy dialog in which you can specify a name for a new policy. A policy groups administered mobile with permitted and prohibited applications as well as required and prohibited configuration profiles. See Working with policies on page 168 for more information.
404
Mobile Devices
For details on the Smart Group dialog, see New Smart Group on page 367.
405
New Category
New Category
This command is the New Category command standard to all browser windows. For details, see New Category on page 368.
Rename Group
This command is the Rename Group command standard to all browser windows. For details, see Rename Group on page 368.
Edit <item>
This command lets you edit the selected items from the Mobile Devices window. The items are opened in the dialog in which they were created; see these dialogs descriptions for details.
Remove <item>
This command lets you remove the selected items from the Mobile Devices window. Not all objects can be removed.
Mobile Devices
New Command Queue Smart Group from <information item> on page 410 New Command History Smart Group from <information item> on page 410 New Policy with Selected Devices on page 411 Install Configuration Profile on page 411 Install Provisioning Profile on page 411 Install Application on page 411 Issue Device Lock on page 411 Issue Clear Passcode on page 411 Issue Remote Erase on page 411 Set Roaming Options on page 411 Send Message to Device on page 411 Set Device Name on page 412 Delete Application on page 412 Delete Profile on page 412 Update Device Info on page 413 Show Detail View on page 413 Synchronize Records on page 413 Enter Custom Field Data on page 413 Import Custom Field Data on page 413 Ignore Devices on page 414 Reset All Ignored Devices on page 414 Retry All Failed Profiles on page 414 Remove from Group on page 414 Remove from Policy on page 414 Track Device on page 415 Get Device Geolocation on page 415 Reset Tracking Passphrase on page 415 Show Location on Google Maps on page 415 Show Location on Bing Maps on page 415 Send Re-enrollment Message to Device on page 415 Update Installed Application Statistics on page 416 Show Mobile Application Package Details on page 416 New Mobile Application Package on page 416 New iOS App Store Application Package on page 416 New Android Market Application Package on page 417 Edit Mobile Application Package on page 417 Duplicate Mobile Application Package on page 417 Remove Mobile Application Package on page 417 Show Configuration Profile Details on page 417 New Configuration Profile on page 417 Edit Configuration Profile on page 417 Remove Configuration Profile on page 418 Remove Configuration Profile from Policy on page 418 Show Provisioning Profile Details on page 418 Show Media File Details on page 418 Set Availability Time on page 418 New Media File on page 419 Edit Media File on page 419 Remove Media File on page 419 Show Policy Members on page 420 Remove Policy on page 420
407
Copy
Copy
This command is the Copy command from the Edit menu. For details, see Copy on page 272.
408
Mobile Devices
have right-clicked: The information item is used as the selection criterion, and the contents of the item in the selected records are used as the comparison values. You can edit these criteria, add new ones, or delete them as desired before saving the smart group. For details on the dialog, see New Smart Group on page 367.
409
Choosing the command opens the New Smart Group dialog with one or more criteria already specified. The specified criteria are taken from the selected records and the information item column in which you have right-clicked: The information item is used as the selection criterion, and the contents of the item in the selected records are used as the comparison values. You can edit these criteria, add new ones, or delete them as desired before saving the smart group. For details on the dialog, see New Smart Group on page 367.
410
Mobile Devices
Install Application
This is the same command as Install Application on page 332.
411
The dialog contains this element: New device name: The name in this field will be assigned to the device.
This command applies only to Android devices. The names of iOS devices can be set locally on the device or in iTunes.
Delete Application
Choosing this command removes the selected applications from the mobile devices on which they are installed. This command can be used only to delete installed applications, such as when the list of applications on a particular device or the list of all applications are displayed. Which applications can be removed depends on the mobile OS: iOS 4.x: No applications can be removed. iOS 5.0 and later: Managed applications can be removed, i.e., applications that have been installed through the MDM system. No user confirmation is required. Android: Any application can be removed. The local user must confirm the removal.
Delete Profile
Choosing this command removes the selected configuration or provisioning profiles from the mobile devices on which they are installed. This command can be used only to delete installed profiles, such as when the list of configuration profiles on a particular device or the list of all installed provisioning profiles are displayed. This command cannot be used to remove profiles from iOS 4 devices.
412
Mobile Devices
These commands have the same effect as the Details command described on page 275.
Synchronize Records
This command is the Synchronize Records command standard to all browser windows. It has the same effect as the Synchronize Selected Records command described on page 339.
413
Ignore Devices
Ignore Devices
Choosing this command removes the selected iOS devices from the Mobile Devices window. Ignored devices and the applications, on them are not listed in any of the groups in the window. This command applies only to iOS devices found because they are connected to administered computers. It does not apply to mobile devices managed through an MDM server. Devices will be redisplayed the next time that their agents send inventory information to the server.
414
Mobile Devices
Track Device
This is the same command as Track Device on page 335.
415
which is necessary when you have changed the MDM privileges in the MDM tab of the server settings:
The dialog contains this element: Message text: The text in this field will be sent to the users of the managed devices. The URL placeholder will be replaced by an individualized enrollment URL in the actual message.
416
Mobile Devices
417
418
Mobile Devices
The dialog contains these elements: Always: If this option is chosen, the media file is available to the members of this policy at any time. Every day between: If this option is chosen, the media file is available to the members of this policy only during a certain time of the day (for example, during office hours). The specified times refer to the local time of the Absolute Manage server. Note that you can set the start time to be later than the end time. In that case, the availability is from the beginning of the day to the end time and from the start time to the end of the day. (Think of this as a wrap-around interval crossing midnight.) For example, a start time of 9:00 and an end time of 8:00 would result in the profile being available from midnight to 8:00 and from 9:00 to midnight. From: If this option is chosen, the media file is available to the members of this policy only for the specified interval, not before or after.
NOTE Times are entered by you as local times and stored as UTC (Coordinated Universal Time, similar to GMT or Greenwich Mean Time). This means that you have to take into account any time differences between the server and mobile clients. You also have to manually compensate for daylight saving time (DST), if desired, because DST does not apply to UTC.
419
Remove Policy
This command removes the selected policy from Absolute Manage.
420
Server Center
Chapter 21
Server Center
The Server Center is a module of the Absolute Manage system that lets you easily manage the software distribution and license monitoring capabilities of the software. You can also manage administrator accounts, configure custom information fields, and set server options. All these functions are controlled via the Server Center window in Absolute Manage Admin.
Action menu
Sidebar
Category bar
The elements of the Server Center window are described below: Toolbar (page 422) Category bar (page 427) Status bar (page 428) Table columns (page 428) Sidebar (page 428) Action and context menus (page 433) Software Distribution (page 434) New Software Package (page 434) New Metapackage (page 444) Duplicate Software Package (page 451) New Smart Software Package Group (page 451) New Payload (page 452) Duplicate Payload (page 453) New Smart Payload Group (page 454) New Distribution Point (page 454) New Smart Distribution Points Group (page 456) New Disk Image (page 457) New Smart Disk Image Group (page 458) New Smart Installation Status Group (page 459) New Missing Software Packages Group (page 459) License Monitoring (page 460) New License Specification (page 460)
Absolute Manage User Guide
421
Toolbar
New Smart License Specification Group (page 466) New License Status Report (page 466) New Software Usage Report (page 467) New History Report (page 467) New History Summary Report (page 468) New Missing Software Report (page 468) Computer Groups (page 468) New Computer Group (page 468) New Smart Computer Group (page 469) Remove All Group Members (page 470) Administrator Setup (page 470) New Administrator (page 471) Remove Administrator from Group (page 474) New Administrator Group (page 474) New Computer Appointment Group (page 475) New Smart Computer Appointment Group (page 475) New Mobile Devices Appointment Group (page 476) New Smart Mobile Devices Appointment Group (page 476) New Smart Administrator Group (page 477) Refresh (page 478) Custom Information Fields (page 478) New Custom Information Field (page 478) Duplicate Custom Information Field (page 483) Export Selected Fields (page 483) Import Fields (page 483) Edit <item> (page 484) Remove <item> (page 484) Retrieve Payloads (page 484) Retry Package (page 485) Reset Package (page 485) Install Selected Software Packages (page 485) Repeat Selected Installations (page 486) Reset Current Server Load (page 486) Server Settings (page 486) Server Monitor (page 496) The + button in the lower left-hand corner is not separately described; clicking it creates an item in the selected folder, just as if you had chosen the appropriate menu command.
Toolbar
The Server Center window has a toolbar that allows quick access to common actions. NOTE The toolbar can be customized by means of the Customize Toolbar command described on page 277. After such customization, not all of the buttons described below may be present in the toolbar.
422
Server Center
The elements are explained below, except for those that are not specific to Absolute Manage Admin (Flexible Space through Print).
Configure Columns
The Configure Columns button opens the columns drawer or closes it when it is already open. It has the same effect as the Configure Columns command described on page 275.
423
Toolbar
Software distribution and licensing (comprises the Software Distribution, License Monitoring, and Computer Groups headings in the sidebar) Administration Custom information fields Server settings
Clicking Save Category to Server has the same effect as choosing the corresponding Save command from the Server menu.
Search Records
The Search Records field lets you quickly restrict the display to records that contain the search text. The pop-up menu lets you specify whether all columns should be searched or just one particular column.
Absolute Manage User Guide 424
Server Center
New Administrator
The New Administrator button creates a new administrator account.
425
Toolbar
It has the same effect as the New Administrator command described on page 471.
Delete Administrator
The Delete Administrator button deletes the selected administrator account.
Server Center
It has the same effect as the New Smart Mobile Devices Appointment Group command described on page 475.
Delete
The Delete command deletes the selected objects from the window. It has the same effect as the Delete command described on page 272.
Category bar
The Server Center window contains a category bar that lets you restrict the display in the window to one or a few of the categories listed in the sidebar.
Clicking each category toggles its display on or off. If all categories are off in the category bar, all categories are displayed. You can activate display of each category independently of the others, for example, displaying custom information fields together with the server setup. NOTE Clicking a category with the Option key held down restricts the display in the window to that category. Computer groups are displayed if either Software Distribution or License Monitoring is activated; they cannot be displayed or hidden on its own.
427
Status bar
Status bar
The Server Center window has a status bar displaying information on the state of the Server Center. The status bar displays the number of records currently shown in the window.
Table columns
The columns displayed in the Server Center change depending on the object selected in the sidebar. The columns display information items applicable to the category selected in the sidebar or a custom information view similar to a dialog. Columns can be configured as for other browser windows. (Configuring columns is described in Opening and configuring browser windows on page 100.)
Sidebar
The Server Center window contains a sidebar with a number of categories and smart groups custom-made for using the Server Centers functions. The smart groups are divided into several categories; there are also settings categories. Categories in the sidebar that contain modifications which require uploading to the server before becoming active are marked with a small pen icon ( ). Choose the appropriate command from the Server menu to save these changes to the server.
Software Distribution
This category contains several subcategories: Payloads: All installers and installer help support files that have been defined for software distribution. Clicking a payload displays the payloads details in the main window area. Double-clicking a payload displays the Payload dialog. Software Packages: All software packages and metapackages that have been defined for software distribution. Clicking a package or metapackage displays its settings in the main window area. You can check groups to assign the package to these groups. Holding down the Option key checks or unchecks all groups in the list. Double-clicking a metapackage opens the Software Distribution Metapackage dialog. Double-clicking a software package opens the Software Distribution Package dialog.
428
Server Center
Clicking a payload displays the file contained in the payload. Double-clicking a payload file displays the Payload dialog. Mac OS Patches: All software packages that have automatically been created by the operating system patch management for Mac OS X clients. (Details are available in Automated patch management on page 224.) Accepted Patches: Automatically created patch software packages that have been accepted by an administrator. Rejected Patches: Automatically created patch software packages that an administrator has decided should not be installed on client Mac OS X computers. Unconfirmed Patches: Automatically created patch software packages that no administrator has yet decided on. Within these categories, patches are further grouped according to the version of Mac OS X to which they apply. Some patches may apply to more than one version. In this case, they are listed in all applicable subgroups. Deleting the patch from any of those groups deletes it from all others as well. Clicking a patch displays its details in the Server Center windows table area. Double-clicking a patch opens it in an editing dialog similar to the one described in New Software Package (page 434). Windows Patches: All software packages that have automatically been created by the operating system patch management for Windows clients. (Details are available in Automated patch management on page 224.) The subcategories are the same as for Mac OS Patches, described above. Patches for Windows are also subgrouped according to the Windows version for which they are intended. Mac OS Disk Images: All disk images for Mac OS clients that have been defined for software distribution. Clicking a disk image displays its details in the main window area. Double-clicking it opens the Disk Image dialog. Windows Disk Images: All disk images for Windows clients that have been defined for software distribution. Distribution Points: All distribution points that have been defined for software distribution.
429
Sidebar
Clicking a distribution point displays its settings and an editable list of groups to which it is assigned:
Checking a group assigns the distribution point to it, unchecking the group unassigns the distribution point. When a distribution point is assigned to a group, computers from that group download installers preferably from that distribution point. Note: Holding down the Option key while clicking a checkbox in the list of assigned groups checks or unchecks all groups in the list. Double-clicking a distribution point displays its settings in the Distribution Point dialog. Installation Status: This is a collection of smart groups that contain installation processes by their states: General log: All installation processes, whether scheduled, under way, or completed. Installations in Progress: Installation processes that have begun but are not yet completed. Successful Installations: Installation processes that have been completed with the successful installation of the software. Failed Installations: Installation processes that have been terminated without successfully installing the software. Deferred Installations: Installation processes that were scheduled for a time in the past but had to be deferred because the target computer could not be contacted. Refused Installations: Installation processes that failed because the user of the target computer declined the installation.
Clicking any subcategory displays all installation processes that are part of the category.
430
Server Center
License Monitoring
License Specifications: All license specifications that have been defined for license monitoring. Clicking a license specification displays its details in the main window area. Double-clicking it opens the License Specification dialog. License Purchases: All license specifications for which license purchases that have been entered. Clicking a license specification here displays the specifications purchasing details in the main window area. Double-clicking it opens the License Specification dialog. Reports: This is a collection of smart groups that contain license specifications by their states and other reports: Selecting the Reports group itself displays all license specifications, regardless of status. Fully compliant: All software licenses that are not exceeded. Licenses exceeded: All software licenses that are used more often than the number of licenses in the license specification allows. Prohibited software: All found software instances that are prohibited according to its license specifications. Each agent has one entry per type of prohibited software that was detected on it. Undetermined licenses: All license specifications that have been defined and saved to the Absolute Manage Server, but which no agent has yet checked for. Software usage: All found software instances on all agents. Each agent has one entry per licensed software that was detected on it. Missing software: License specifications that are assigned to a computer group but not present on all computers of each group to which they have been assigned. There is one entry per missing software per agent. History: List of all license monitoring counts. Each count is timestamped. There is one entry for each license specification per reporting date. History summary: A statistical overview of the license usage in the past.
Clicking any of the subcategories displays the items that belong to it.
Computer Groups
This category contains all computer groups that have been defined. It also creates a few predefined smart groups: All Macs: All administered computers running Mac OS X. Assigned Packages: All packages that are assigned to the group. Clicking the subcategory displays all assigned packages.
431
Sidebar
Assigned License Specifications: All license specifications that are assigned to the group. Clicking the subcategory displays all assigned license specifications. Assigned Distribution Points: All distribution points that are assigned to the group. Assigning distribution points to a group tells the Absolute Manage Agents in the group to prefer these distribution points for installer downloads. Clicking the subcategory displays all assigned distribution points. All PCs: All administered computers running Windows. This smart group contains the same subgroups as All Macs, described above. Unassigned Computers: All administered computers that are not part of any computer group. Clicking the category displays all unassigned computers.
Administration
Active Directory: All Active Directory accounts from the Active Directory groups that have been specified in the Server Settings dialogs Active Directory subpane. Administrators: All administrator accounts that have been defined in Absolute Manage Server and all manually managed administrator groups. Clicking an administrator displays all agents to which it has been assigned in the main window area. Double-clicking an administrator displays its settings in the Administrators dialog. Appointments: All standard and smart appointment groups. Any devices that have not been added to any appointment group are contained in the Unmanaged Computers and Unmanaged Mobile Devices groups. Clicking an appointment group displays the devices that are part of it. Double-clicking a standard appointment group lets you edit its name; double-clicking a smart appointment group lets you edit its definition. Clicking the Assigned Admins category within an appointment group displays the administrators that are part of the group.
The Administration category also contains all smart administrator groups that have been defined. Clicking a smart administrator group displays all administrators who belong to it; double-clicking the group opens its definition.
432
Server Center
Server
This category groups the server-related information. Server Settings: Clicking this subcategory displays the server settings in a dialog-like format in the main part of the Server Center window. This is described in Server Settings on page 486. Server Monitor: Clicking this subcategory displays a monitoring pane in which important server statistics are displayed. This is described in Server Monitor on page 496.
433
Software Distribution
New Smart Mobile Devices Appointment Group (page 476) New Smart Administrator Group (page 477) Refresh (page 478) Custom Information Fields (page 478) New Custom Information Field (page 478) Duplicate Custom Information Field (page 483) Edit <item> (page 484) Remove <item> (page 484) Retrieve Payloads (page 484) Retry Package (page 485) Reset Package (page 485) Install Selected Software Packages (page 485) Repeat Selected Installations (page 486) Reset Current Server Load (page 486)
When one or more administered computers are selected in the window, other commands are displayed in the context menu that are described in Commands menu on page 278. (The Favorite Commands context menu item corresponds to the Favorites submenu in the Commands menu.)
Software Distribution
The Software Distribution submenu contains commands for managing software distribution functions: New Software Package (page 434) New Metapackage (page 444) Duplicate Software Package (page 451) New Smart Software Package Group (page 451) New Payload (page 452) Duplicate Payload (page 453) New Smart Payload Group (page 454) New Distribution Point (page 454) New Smart Distribution Points Group (page 456) New Disk Image (page 457) New Smart Disk Image Group (page 458) New Smart Installation Status Group (page 459) New Missing Software Packages Group (page 459)
434
Server Center
All four are described below. NOTE The New Software Package command can be used only by administrators with the Modify Software Packages right. See New Administrator on page 471 for details.
Package
The Package pane of the Software Distribution Package dialog lets you specify basic settings for the software package:
The pane contains these elements: Package Name: The name of the software package. Executable Payload: The payload that will be launched on the client computers to install this package. A package can have any number of payloads; however, there must be exactly one executable payload. Executable payloads can be applications (in particular, installers) or, for Mac OS X target computers, shell scripts. Note: Non-executable payloads can, e.g., be configuration files for the installer (the executable payload). Including a configuration file as the non-executable payload allows you to perform different installations without needing multiple copies of the executable.
435
You can choose the executable from the pop-up menu. The menu contains all payloads checked in the list of payloads. Clicking the New Payload button opens the Payload dialog, letting you define a new payload on the fly. The search field lets you filter the list of available payloads. Command line options: Options for the execution of the payload. (Optional.) You can include shell variables in the options, as described in Environment variables on page 134. Note: When the executable is an MSI, MSP patch file, or MSU updater file and you do not specify command line options, Absolute Manage adds the /qn option (/quiet /norestart for MSU files) to run the installer silently. Target installation volume: The volume of the target computers on which the software is to be installed; relevant for Mac OS X only. When this is empty, the software is installed on the boot volume. Description: A description of the software contained in the package. This text is displayed if the local user is asked for confirmation.
Installation Options
The Installation Options pane of the Software Distribution Package dialog lets you specify various options for the installation of the package:
The pane contains these elements: Availability date: The earliest date when this package may be used for software installations on administered computers.
436
Server Center
Install at: Whether to install the package anytime or just on particular occasions. Install when: These options let you further specify conditions that must be met for the installation to proceed: A user is logged in: If this option is checked, the package will be installed when a user is logged in on the target computer. No user is logged in: If this option is checked, the package will be installed when no user is logged in on the target computer (and the computer is running). Note: Both these options can be checked at the same time, in which case the package is installed irrespective of whether a user is logged in. It is not possible to uncheck both options. Note, too, that certain settings in the User Interaction pane force the settings of these options, in which case they are disabled. Only install between: This option lets you restrict the installation of the package to a certain period of the day, e.g., after hours. Dont install on slow network: If this option is checked, installations take place only when the network connection between the client and the distribution point has a nominal transfer rate of at least 100 Mbit/s. Download payloads: This setting specifies when the Agent downloads a payload, before displaying a user dialog or after. Downloading the payload before displaying the dialog makes the installation feel more responsive to the user. Downloading the payload after the dialog avoids unnecessary downloads when the user cancels the installation. The setting has no effect when there is no user interaction during the installation. Priority: The priority of this package. When more than one package is available for installation on a client, packages with higher priorities are installed first. Distribution point: An optional restriction on the distribution point from which the installer is transferred to the client: Any: No restriction. From assigned distribution point if available: When an assigned distribution point (see below) is available, that distribution point is used. When no assigned distribution point is available, another distribution point is used. From assigned distribution point only: When an assigned distribution point (see below) is available, that distribution point is used. When no assigned distribution point is available, the installation fails. An assigned distribution point is a distribution point that either includes the agents IP address in the range of IP addresses it is set to serve (see New Distribution Point on page 454 for details) or that has been assigned to a computer group of which the target computer is a member. If no IP range has been specified in a distribution point definition, it is considered to be assigned to all clients in the same subnet. (The servers subnet mask is used to determine the extent of the subnet.)
437
Installation user context: The user name of the account that is to be used for running the installer. The Currently logged-in user option runs the installation in the user context of the user who is logged in on the client computer at installation time. The System account user option runs the installation from the system user account. User context password: The password for the account to be used. This is not required for installations on Mac OS X. Requires admin privileges: This option applies only to installations on Mac OS X. If it is checked, the installer is authorized to run with administrator privileges. Note: This does not change the user account from which the package is installed; it merely increases the available privileges for the installation, if necessary. Other options: Miscellaneous settings. Keep package files after installation: If this option is checked, Absolute Manage does not delete the installation files after the installation is complete. Allow on-demand installation: If this option is checked, this package appears when the user manually queries the software distribution server for new packages. Checking this option disables a number of other options in the Installation Options and User Interaction panes. OS Platform: The operating systems on which the package may be installed. Minimum OS: The lowest version of the operating system on which the package may be installed. Maximum OS: The highest version of the operating system on which the package may be installed. Platform architecture: This option lets you restrict the installation to only Intel or PowerPC-based computers under Mac OS X. Under Windows, you can restrict installations to 32bit or 64-bit versions of the OS.
NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
438
Server Center
User Interaction
The User Interaction pane of the Software Distribution Package dialog lets you specify the information users are given during the installation process and the actions they can perform:
The pane contains these elements: Before installation: The way in which the user may influence the installation: Install without asking: The user is not informed of the installation. Inform user before installation: The user is informed of the installation before the fact but cannot affect it. Allow to reschedule: The user can postpone the installation but not disallow it altogether. Allow to refuse: The user may altogether refuse to have this package installed on his or her computer. Autostart installation after: This option is only active when a Before installation option other than Install without asking is chosen. It lets you specify a time after which the installation starts automatically when the user does not respond to the installation notification. Allow deferring for: This option is only active when Allow to reschedule or Allow to refuse has been chosen as the Before installation option. It lets you specify the maximum time for which users can postpone the installation. Installation deadline: This option is only active when Allow to reschedule or Allow to refuse has been chosen as the
439
Before installation option. It lets you specify the latest time when the installation must begin. NOTE When you specify both a maximum deferring interval and an installation deadline, both are active. This means that the earlier of the two resulting dates becomes effective: If the deadline is reached, the installation is forced (unless the user has canceled it altogether), even if the interval has not yet expired. And if the interval expires, the installation begins even if the deadline has not yet been reached. Display progress bar to the user: If this option is checked, the users of the target computers are informed of the installation progress by a progress bar. If the option is unchecked, there is no feedback on the progress. After installation: The action that Absolute Manage Agent performs on the target computer after the installation is complete: Do nothing: No action is performed. Notify user: A message informing the user of the completed installation is displayed. An additional option becomes available: Automatically close notification after: This option lets you specify a time after which Absolute Manage Agent automatically closes the notification alert. Restart: The computer is automatically restarted without a notification displayed first. Processes are sent termination messages, allowing data in open documents to be saved first. Additional options become available: Show notification: Checking this option causes Absolute Manage Agent to display a notification of the pending restart. The restart happens after the user has responded to the notification. Restart after no more than: This option is available only when Show notification has been checked. It lets you set an interval after which the restart is performed even when the user does not respond to the notification. Allow user to postpone restart: This option is available only when Show notification has been checked. It lets you give the user the option to defer the restart to a later date. Show dialog again every: This option is available only when Allow user to postpone restart has been checked. It lets you make Absolute Manage display the restart notification dialog at regular intervals, reminding the user that a restart is still required. If an interval has been specified in the Restart after no more than option (see above), it applies to these reminders as well. Force restart: As Restart, above, but processes are forcibly terminated. All unsaved data is irrecoverably lost. The same options as for Restart become available. Shut down: As Restart, above, but the target computer is shut down instead of restarted.
440
Server Center
The same options as for Restart become available. Force shutdown: As Shut down, above, but processes are forcibly terminated. All unsaved data is irrecoverably lost. The same options as for Restart become available. Warn about slow network: If this option is checked, the user of a target computer is warned before installations when the network connection between the client and the distribution point has a nominal transfer rate of less than 100 Mbit/s. The warning is not displayed if the software package is set to install without asking the user. -
NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
Installation Conditions
The Installation Conditions pane of the Software Distribution Package dialog lets you specify that a package be installed only on client computers that meet certain criteria:
The pane contains these elements: Install the software on all target computers: The package will be installed on all computers in the computer groups to which it is assigned.
441
Install the software only on computers where the software specified below is: Choose whether the package is to be installed only on computers that already have certain software (choose present) or on computers that lack specified software (choose not present).
The rest of the elements are similar to the corresponding ones in the New License Specification dialog discussed on page 460. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
Adobe CS Options
The Adobe CS Options pane of the Software Distribution Package dialog lets you set special options for installing, uninstalling or updating the Adobe Creative Suite. The tab is only available when a payload containing an Adobe CS3 or CS4 installer or updater is assigned to the software package. NOTE The settings in this tab are not compatible with Adobe CS 5 or newer. For remotely distributing these versions of Adobe CS, prepare an installer using Adobe Application Manager Enterprise Edition (AAMEE) and use that installer to create a standard software distribution package in Absolute Manage Admin.
442
Server Center
The pane contains these elements: Use command line options for installation: If you choose this option, you can specify the installer behavior by supplying command line options in the Package pane. If you choose this option, all other settings in the dialog are ignored. Use the following settings for installation: If you choose this option, you can check the components that you want to be installed by this package in the scrolling list. You can also set additional options through the other checkboxes and radio buttons. The exact content of the list depends on which Adobe CS installer you are using. Action: Displays whether this package installs or uninstalls software. (You made this choice when creating the payload.) Language: The desired user interface language for the installed software. Serial number: Enter the serial number for the package here. Depending on the specific Adobe software you are installing the serial number is either optional or mandatory; this is indicated beside the field. If you do not enter an optional serial number, the serial number will have to be entered individually for each installed copy when it is first launched. Other options: These settings let you disable various optional functions of the installer: Suppress registration : If this option is checked, local users are not prompted to register their copy of Adobe CS. Suppress EULA: If this option is checked, the license agreement is not displayed when Adobe CS is first started on the a target computer. Suppress updates: If this option is checked, the installed copies of Adobe CS will not check Adobes servers for available updates. Suppress process check: If this option is checked, the installer does check for certain running applications. If the option is unchecked, the installer refuses to run on a target computer on which any of these applications is running. Disable Adobe Product Improvement Program: If this option is checked, the Adobe Product Improvement Program (a tool that collects data and sends it to Adobe) is disabled. Dont show installer icon in dock: If this option is checked, the Adobe CS installer does not show up in the dock of target Macintosh computers.
If the assigned payload contains an Adobe CS updater (instead of an installer), only some of the options in the dialog are available. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
443
New Metapackage
New Metapackage
The New Metapackage command creates a new metapackage. Choosing the command opens the Metapackage dialog. The dialog has four panes: Metapackage Installation Options User Interaction Installation Conditions
All four are described below. NOTE The New Metapackage command can be used only by administrators with the Modify Software Packages right. See New Administrator on page 471 for details.
Metapackage
The Package pane of the Metapackage dialog lets you specify basic settings for the metapackage:
The pane contains these elements: Package Name: The name of the metapackage.
444
Server Center
OS Platform: The operating systems on which the metapackage may be installed. The chosen platform determines which packages are displayed in the pane. Packages: These two lists display the available packages and the packages contained in the metapackage. Dragging a package to the right list adds it to the package; dragging it back to the left list removes it. Dragging packages within the right lost changes their installation order: Packages are installed in the order listed, from top to bottom. Entering text in the filter field above the lists filters the list of available packages. Continue installation after failed packages: If this option is checked, Absolute Manage will skip over any failed packages and install the rest of the packages in the metapackage. If the option is unchecked, the installation of a metapackage is stopped when a package contained in it fails to install. Description: A description of the software contained in the metapackage. This text is displayed if the local user is asked for confirmation.
Installation Options
The Installation Options pane of the Metapackage dialog lets you specify various options for the installation of the package:
NOTE The installation options specified in this pane override any conflicting options of the packages contained in the metapackages.
445
New Metapackage
The pane contains these elements: Availability date: The earliest date when this metapackage may be used for software installations on administered computers. Install at: Whether to install the metapackage anytime or just on particular occasions. Install when: These options let you further specify conditions that must be met for the installation to proceed: A user is logged in: If this option is checked, the metapackage will be installed when a user is logged in on the target computer. No user is logged in: If this option is checked, the metapackage will be installed when no user is logged in on the target computer (and the computer is running). Note: Both these options can be checked at the same time, in which case the metapackage is installed irrespective of whether a user is logged in. It is not possible to uncheck both options. Note, too, that certain settings in the User Interaction pane force the settings of these options, in which case they are disabled. Only install between: This option lets you restrict the installation of the metapackage to a certain period of the day, e.g., after hours. Dont install on slow network: If this option is checked, installations take place only when the network connection between the client and the distribution point has a nominal transfer rate of at least 100 Mbit/s. Download payloads: This setting specifies when the Agent downloads a payload, before displaying a user dialog or after. Downloading the payload before displaying the dialog makes the installation feel more responsive to the user. Downloading the payload after the dialog avoids unnecessary downloads when the user cancels the installation. The setting has no effect when there is no user interaction during the installation. Priority: The priority of this metapackage. When more than one metapackage or standard package is available for installation on a client, packages with higher priorities are installed first. Distribution point: An optional restriction on the distribution point from which the installer is transferred to the client: Any: No restriction. From assigned distribution point if available: When an assigned distribution point (see below) is available, that distribution point is used. When no assigned distribution point is available, another distribution point is used. From assigned distribution point only: When an assigned distribution point (see below) is available, that distribution point is used. When no assigned distribution point is available, the installation fails. An assigned distribution point is a distribution point that either includes the agents IP address in the range of IP addresses it is set to serve (see New Distribution Point on page 454 for
446
Server Center
details) or that has been assigned to a computer group of which the target computer is a member. If no IP range has been specified in a distribution point definition, it is considered to be assigned to all clients in the same subnet. (The servers subnet mask is used to determine the extent of the subnet.) Installation user context: This option is not available for metapackages; all packages are installed with their individual user contexts. User context password: This option is not available for metapackages; all packages are installed with their individual user passwords (if any). Requires admin privileges: This option is not available for metapackages; all packages are installed with their individual settings. Other options: Miscellaneous settings. Keep package files after installation: This option is not available for metapackages; all packages are installed with their individual settings. OS Platform: The operating systems on which the metapackage may be installed. Minimum OS: The lowest version of the operating system on which the metapackage may be installed. Maximum OS: The highest version of the operating system on which the metapackage may be installed. Platform architecture: This option lets you restrict the installation to only Intel or PowerPC-based computers under Mac OS X. Under Windows, you can restrict installations to 32-bit or 64-bit versions of the OS.
NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
447
New Metapackage
User Interaction
The User Interaction pane of the Metapackage dialog lets you specify the information users are given during the installation process and the actions they can perform:
NOTE The installation options specified in this pane override any conflicting options of the packages contained in the metapackages. The pane contains these elements: Before installation: The way in which the user may influence the installation: Install without asking: The user is not informed of the installation. Inform user before installation: The user is informed of the installation before the fact but cannot affect it. Allow to reschedule: The user can postpone the installation but not disallow it altogether. Allow to refuse: The user may altogether refuse to have this metapackage installed on his or her computer. Autostart installation after: This option is only active when a Before installation option other than Install without asking is chosen. It lets you specify a time after which the installation starts automatically when the user does not respond to the installation notification. Allow deferring for: This option is only active when Allow to reschedule or Allow to refuse has been chosen as the Before
448
Server Center
installation option. It lets you specify the maximum time for which users can postpone the installation. Installation deadline: This option is only active when Allow to reschedule or Allow to refuse has been chosen as the Before installation option. It lets you specify the latest time when the installation must begin.
NOTE When you specify both a maximum deferring interval and an installation deadline, both are active. This means that the earlier of the two resulting dates becomes effective: If the deadline is reached, the installation is forced (unless the user has canceled it altogether), even if the interval has not yet expired. And if the interval expires, the installation begins even if the deadline has not yet been reached. Display progress bar to the user: If this option is checked, the users of the target computers are informed of the installation progress by a progress bar. If the option is unchecked, there is no feedback on the progress. After installation: The action that Absolute Manage Agent performs on the target computer after the installation is complete: Do nothing: No action is performed. Notify user: A message informing the user of the completed installation is displayed. An additional option becomes available: Automatically close notification after: This option lets you specify a time after which Absolute Manage Agent automatically closes the notification alert. Restart: The computer is automatically restarted without a notification displayed first. Processes are sent termination messages, allowing data in open documents to be saved first. Additional options become available: Show notification: Checking this option causes Absolute Manage Agent to display a notification of the pending restart. The restart happens after the user has responded to the notification. Restart after no more than: This option is available only when Show notification has been checked. It lets you set an interval after which the restart is performed even when the user does not respond to the notification. Allow user to postpone restart: This option is available only when Show notification has been checked. It lets you give the user the option to defer the restart to a later date. Show dialog again every: This option is available only when Allow user to postpone restart has been checked. It lets you make Absolute Manage display the restart notification dialog at regular intervals, reminding the user that a restart is still required. If an interval has been specified in the Restart after no more than option (see above), it applies to these reminders as well.
449
New Metapackage
Force restart: As Restart, above, but processes are forcibly terminated. All unsaved data is irrecoverably lost. The same options as for Restart become available. Warn about slow network: If this option is checked, the user of a target computer is warned before installations when the network connection between the client and the distribution point has a nominal transfer rate of less than 100 Mbit/s. The warning is not displayed if the metapackage is set to install without asking the user.
NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
Installation Conditions
The Installation Conditions pane of the Metapackage dialog lets you specify that a metapackage be installed only on client computers that meet certain criteria:
NOTE The installation options specified in this pane override any conflicting options of the packages contained in the metapackages.
450
Server Center
The pane contains these elements: Install the software on all target computers: The metapackage will be installed on all computers in the computer groups to which it is assigned. Install the software only on computers where the software specified below is: Choose whether the metapackage is to be installed only on computers that already have certain software (choose present) or on computers that lack specified software (choose not present).
The rest of the elements are similar to the corresponding ones in the Software License Specification dialog discussed on page 460. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
NOTE The Duplicate Software Package command can be used only by administrators with the Modify Software Packages right. See New Administrator on page 471 for details.
451
New Payload
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand text pop-up menu lets you choose an information item on which records are to be matched. You can use any information item from the Packages subcategory of the Software Distribution category (see page 566). The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
New Payload
The New Payload command lets you create a new payload specification for use in software distribution packages. Choosing the command opens the Payload dialog:
452
Server Center
The dialog contains these elements: Payload name: The name by which the payload is displayed in Absolute Manage. You can enter any name desired. File/Folder: The file or folder that forms this payload. Clicking the Select button lets you select a file or folder. Transfer all files in folder containing selected object: If this option is checked, all files that are located in the same folder as the payload file are transferred as part of this payload. If the option is unchecked, only the file itself is transferred. Selected object is executable or installer package: If this option is checked, this payload is considered executable by Absolute Manage. Each software distribution package must contain exactly one executable payload. Notes: Here you can enter explanations and remarks for yourself or other administrators. The text in this field is not visible to users of client computers. The Copy context menu command has the same effect as the Copy command from the Edit menu described on page 272. NOTE The New Payload command can be used only by administrators with the Modify Software Packages right. See New Administrator on page 471 for details.
Duplicate Payload
The Duplicate Payload command lets you create a new payload based on an existing one. Choosing the command opens the Payload dialog that is described in New Payload on page 452. If you click OK in that dialog, a new package is created. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
NOTE The Duplicate Payload command can be used only by administrators with the Modify Software Packages right. See New Administrator on page 471 for details.
453
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand text pop-up menu lets you choose an information item on which records are to be matched. You can use any information item from the Packages subcategory of the Software Distribution category (see page 566). The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
454
Server Center
The dialog contains these elements: Distribution point name: The name by which the distribution point is to be known inside Absolute Manage. Distribution point address: The distribution points IP address or DNS name. Note: If you enter an abbreviated DNS name (i.e., one that relies on being completed with the default domain you have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain), if you enter a DNS name. Distribution point port: The port on which the Absolute Manage Agent installed on the distribution point communicates. Assigned IP range (optional): These fields can be used to assign the distribution point to computers within a particular IP range. The lower limit of the range must be specified in the left-hand field, the upper limit in the right-hand field. This setting is used when a package is set to be provided from assigned distribution points, as described in Distribution Point in Installation Options on page 436. Only use when assigned to group or via IP range: Checking this option causes the distribution point to serve only client computers to which it has been expressly assigned in one of two ways: Because the computers IP addresses lie in the specified range Because the distribution point has been assigned to a computer group to which the computers belong Packages root path: The path on the distribution point of the folder in which Absolute Manage is to store the software installers. Max. concurrent downloads: The number of download processes that may be under way at the same time.
455
Max. downloads may be exceeded: This option governs the distribution points behavior when all available distribution points are operating at capacity and an additional agent request for an installer download comes in: If the option is checked, the installer is provided to the agent even though the specified maximum number of downloads is already in progress, because no other distribution point has available capacity. If the option is unchecked, the agents request is turned down and the agent must repeat it later. Is master distribution point: If this option is checked, the distribution point is the master distribution point from which all other distribution points receive their software installers. If it is unchecked, the distribution point is a mirror that receives its installers from the master. There must always be exactly one master distribution point. Download bandwidth: This option lets you limit the network bandwidth employed for both providing installers to agents and mirroring installers between distribution points. Only between: This option lets you restrict mirroring of installers to or from this distribution point to a certain time of the day. Outside of the specified interval, no mirroring involving this distribution point happens.
NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
NOTE The New Distribution Point command can be used only by administrators with the Modify Distribution Points right. See New Administrator on page 471 for details.
The dialog contains these elements: Smart Group Name: The name for the smart group.
456
Server Center
Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand text field lets you enter an information item on which records are to be matched. You can use any information item from the Distribution Points subcategory of the Software Distribution category (see page 570). The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
The dialog contains these elements: Disk image name: The name that you want to give the disk image specification for purposes of identifying it within Absolute Manage. Disk image file: The file that contains the disk image. Absolute Manage supports Apples .dmg format as well as any other disk image that can be mounted without additional software on the target computer. Disk image password: If the specified disk image is password-protected, enter the password here. Distribution point: This option specifies from which distribution points the target computer may download the image: Any: The image can be downloaded from any distribution point on which it is found. From assigned distribution point if available: The image is downloaded from a distribution point that is assigned to the target computers subnet or to its computer group. If the image is not available on any such distribution point, it is downloaded from another distribution point.
Absolute Manage User Guide
457
From assigned distribution point only: As above, but if the image is not available, the installation fails.
NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
NOTE The New Disk Image command can be used only by administrators with the Modify Disk Images right. See New Administrator on page 471 for details.
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. You can use any information item from the Disk Images subcategory of the Software Distribution category (see page 571). The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
458
Server Center
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. You can use any information item from the Installation Status subcategory of the Software Distribution category (see page 571). The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
459
License Monitoring
Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. You can use any information item from the Installation Status subcategory of the Software Distribution category (see page 571). The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
License Monitoring
The License Monitoring submenu contains commands for managing software distribution functions: New License Specification (page 460) New Smart License Specification Group (page 466) New License Status Report (page 466) New Software Usage Report (page 467) New History Report (page 467) New History Summary Report (page 468) New Missing Software Report (page 468)
Both are described below. NOTE The New License Specification command can be used only by administrators with the Modify License Specifications right. See New Administrator on page 471 for details.
460
Server Center
License
The License pane of the Software License Specification dialog lets you enter the details of the software license:
The pane contains these elements: Specification Name: The name of the license specification. Identify software by: How the software is to be identified that is described by this license: Mac OS Application Package: a Mac OS X package (a folder appearing as a file). Mac OS Application File: a Mac OS X file. Files are only considered to match if they are executable applications. Mac OS File: a Mac OS X file. Mac OS Installer Receipt: a description of the installed software in the form of an installer package that some Mac OS X installers create. Windows Application File: a Window file. Files are only considered to match if they are executable applications. Windows File: a Windows file. Windows Installer Receipt: a report on the installed software created by MSI installers. Windows Installed Software: software installed on the administered computer. Windows Registry: specified contents of the Windows registry. Identify software matching: When all is chosen from this pop-up menu, software is found that matches all specified conditions (Boolean AND). If any is chosen, software is found that matches at least one of the specified conditions (Boolean OR).
461
Values from: Clicking this button lets you select a file. All specified conditions are filled with the corresponding parameters from this file. If you later add new conditions, they initially also contain comparison values from this file. Condition area: The first pop-up menu lets you choose a condition to match software. The second one contains the possible comparison operators. For most conditions, a text field lets you specify the value to compare files against. The + and buttons let you add new conditions or remove existing ones. The parameters available for specifying conditions are described in Files on page 557, except for Path and the conditions available when Windows Registry is selected as the software type. These additional conditions are described in Conditions on page 464. Path: Lets you select files and folders by their paths on the hard disk. It references the File Path information item. When this option is chosen, you can specify the user folder on Mac OS X targets and its subfolders using the ~/ notation. (For example, ~/Documents for the users documents folder.) For Windows targets, you can use the environment variables when this option is chosen, as described in Environment variables on page 134. Original File Name: The original file name of a Windows file, as displayed in its properties in the Windows Explorer. Internal Name: The internal name of a Windows file, as displayed in its properties in the Windows Explorer. Note: When you specify a license by Windows registry data, you should use the Key Name and Value Name conditions only when there is no other way to specify the desired software. Checking either condition requires the entire registry to be parsed, which generates significant local processor load on the client computer. If you do require either condition, specify it after any other conditions that may apply because that causes Absolute Manage to apply it only to the part of the registry that meets those other conditions. Note: When specifying a file version, make sure to use the right format (three numbers for Mac OS X files, four for Windows files), as described in Gathering information on files on page 73. Licenses owned: The number of licenses that are available for use. You can either enter these licenses manually or have Absolute Manage calculate them automatically as the sum of your license purchases. In the latter case, you must create purchase records in the dialogs Purchase Tracking pane for all licenses you have purchased of this software. License type: Computer License (Installed Files): The license governs how many copies of the software may be installed in your network. Floating License (Running Processes): The license governs how many copies of the software may be in use at the same time.
462
Server Center
Site License: This type indicates software that may be used without restriction throughout your network. Choose it when you want to use the license specification for monitoring purposes. Prohibited Application: Using this software is not allowed in your network. (This is not really a license type but allows you to check for the presence of undesirable software.) Meter application usage: If this option is checked, the running processes on the client computers are checked for the licensed software. Note: Only applications on administered computers that have a working network connection to the server are included in the count. Note: The computers hard disks are always checked for installed packages, whether this option is activated or not. Terminate launched application if licenses exceeded: If a user launches the specified application and all licenses are already in use, Absolute Manage immediately terminates the application again, displaying the message from the Termination description field (see below) on the administered computer. Track as missing software: Absolute Manage lists this software as missing when it is not installed on a client computer. Scan all volumes: If this option is checked, all local volumes of administered computers are scanned for this software. If it is unchecked, only boot volumes are scanned. Terminate prohibited applications: If this option is checked, Absolute Manage automatically terminates any found applications that you have assigned the Prohibited Application license type. Absolute Manage displays the message from the Termination description field (see below) on the administered computer This option is available only for Mac OS application packages and files and Windows application files. It requires that the Meter application usage option is also checked. Delete prohibited applications: If this option is checked, the prohibited application is deleted from the client computer in addition to being terminated. Termination description: This is the message displayed on client computers when Absolute Manage terminates an application because licenses are exceeded or the application is prohibited. To insert a line break, type Option-Enter. Clicking the Set as Default button makes the current text in the field the default for any licenses you create from now on.
NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
463
Conditions
Most of the conditions available for specifying how to determine the presence of licensed software are information items that are described in Files on page 557. There are, however, some additional conditions: Path lets you select files and folders by their paths on the hard disk. It references the File Path information item. Path of Key is the path of a key in the Windows registry. Path of Value is the path of a value in the Windows registry. String at Path is the value at the supplied path, interpreted as a string. Number at Path is the value at the supplied path, interpreted as a number. Key Name is a key with the specified name anywhere in the registry. Value Name is a value with the specified name anywhere in the registry. Note: Searching for either Key Name or Value Name creates significant processor loads on the clients. Use these options only when there is no other way to identify the presence of the software.
Purchase Tracking
The Purchase Tracking pane of the Software License Specification dialog lets you view, create, and maintain records of any purchases and maintenance contracts associated with the specified license:
The pane contains a list of recorded purchases in the upper half and four subpanes described below that display full information on the selected purchase.
464
Server Center
The + button lets you add a new purchase. When a single existing purchase is selected, holding down the Option key while clicking the button duplicates the purchase. The button lets you delete the selected purchase from the list.
Purchase
The Purchase subpane lets you record the basic information about a license purchase: The Purchase type pop-up menu lets you specify the type of purchase you are recording. In the Date field, the date of the purchase can be entered. The License count field includes the number of licenses that were bought in the recorded purchase. If the Add to Licenses owned option is checked, the total number of licenses in the License panes Licenses owned field is automatically calculated from all purchases with this option checked. The option is only available when the purchase type is New Software . The Purchase price field lets you record the price of the licenses. The Software version field contains the version of the software that was bought. The PO # field lets you specify a purchase order or other internal reference number for the recorded purchase. The License owner field lets you specify an employee or department that is internally in your organization considered to be the owner of the licenses acquired in the recorded purchase.
Vendor
The Vendor subpane lets you record information about the vendor from whom the license was purchased: The Name field contains the companys name. The Reference # allows you to specify an internal supplier reference number or a similar key for the vendors company. The Contact field contains your contact person at the vendors company. The Support field contains a phone number, e-mail address or other contact information for technical support regarding the purchased licenses.
Maintenance
The Maintenance subpane lets you specify the maintenance purchased: Check the Maintenance purchased from option if maintenance has been purchased, either together with software licenses or in a separate agreement. Specify the duration in the two date fields.
Absolute Manage User Guide
465
The Maintenance price field lets you enter the price of the maintenance contract. The Reference # field contains a contract number or similar identifying information for the maintenance agreement.
Notes
The Notes subpane lets you enter any additional information regarding the purchased licenses. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. The pop-up menu in the middle contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
Server Center
this way is similar to the Fully compliant, Licenses exceeded, or Prohibited software reports. Choosing the command opens the Smart Group dialog:
The dialog contains these elements: Smart Group Name: The name for the licensing report. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. The pop-up menu in the middle contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
467
Computer Groups
The Computer Groups submenu contains commands for managing computer groups for both software distribution and license monitoring: New Computer Group (page 468) New Smart Computer Group (page 469) Remove All Group Members (page 470)
The New computer group name field lets you specify the name for the new group. Clicking OK creates the group.
468
Server Center
Computers, software packages, and license specifications can be assigned to the computer group by dragging them on top of the category. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
NOTE The New Computer Group command can be used only by administrators with the Modify Computer Groups right. See New Administrator on page 471 for details.
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand text field lets you enter an information item on which records are to be matched. You can use any computer-related information item. The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
469
Clicking OK creates the group. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Distribution and Licensing Info command (described on page 339).
NOTE The New Smart Computer Group command can be used only by administrators with the Modify Computer Groups right. See New Administrator on page 471 for details.
NOTE The Remove All Group Members command can be used only by administrators with the Modify Computer Groups right. See New Administrator on page 471 for details.
Administrator Setup
The Administrator Setup submenu contains commands for managing administrator accounts as well as administrator and appointment groups: New Administrator (page 471) Remove Administrator from Group (page 474) New Administrator Group (page 474) New Computer Appointment Group (page 475) New Smart Computer Appointment Group (page 475) New Mobile Devices Appointment Group (page 476) New Smart Mobile Devices Appointment Group (page 476) New Smart Administrator Group (page 477) Refresh (page 478)
470
Server Center
New Administrator
The New Administrator command opens the dialog for creating a new administrator account on the currently connected Absolute Manage Server. Choosing the command opens the Administrator dialog:
The dialog contains these elements: Name: The log-in name of the account. Password: The password. A password may contain any Unicode character. Verify: Whenever the password is changed, you need to retype the new password in this field. If the contents of the Password and Verify fields do not match, an error message is displayed and the password change is rejected. Superadministrator: When this option is checked, the account has superadministrator privileges, when it is not, it has normal privileges. (Details on administrator privileges are available in Initial configuration of Absolute Manage Server on page 15.) Can manage all devices: If this option is checked, the administrator can access all computers and mobile devices that are managed on the Absolute Manage Server. If the option is unchecked, the administrator can mange only devices to which the account has been expressly assigned. Login enabled: The account is active. If the option is unchecked, the account is temporarily suspended; the user cannot access Absolute Manage Admin. Profile: Using this pop-up menu, account settings can be saved as a profile and profiles applied to the account.
471
New Administrator
Profile names: In the upper section of the pop-up menu, all existing profiles are listed. Choosing a profile from the menu applies its settings to the current administrator account. Note: Profiles are merely presets: Changing a profile-based account does not affect the profile and vice versa. Commands available to administrator: The administrator can use all commands checked in this list. The individual options in the list correspond to commands from the Commands menu. Note: Any commands related to mobile devices also require the Manage Mobile Devices right (see below) to be enabled for the administrator to be able to use them. Note: Holding down the Option key while clicking a checkbox in this list checks or unchecks all options in the list. Create appointment group for admin: If this option is checked, Absolute Manage automatically creates two appointment groups in the Server Centers sidebar, one for computers and one for mobile devices. The groups list, respectively, all computers and mobile devices to which the administrator has been assigned and offers a convenient way to assign him or her to additional devices. Rights available to administrator: The administrator can perform all actions checked in this list. These are the available rights and the corresponding access options in Absolute Manage Admin: Change Agent Client Info Settings: Set options in the Client Information tab of the Agent Settings command window. Change Agent Custom Field Settings: Set options in the Custom Fields tab of the Agent Settings command window. Change Agent General Settings: Set options in the General tab of the Agent Settings command window. Change Agent Server Settings: Set options in the Servers tab of the Agent Settings command window. Change Command History Options: Specify in a command windows Command Options dialog under which conditions the command will be listed in the command history. If an administrator does not have this right, all of his or her commands will be issued with the Always add to command history setting. Change Computer Tracking: Set and edit computer tracking options using the Computer Tracking context menu command from a browser window. Change Mobile Device Tracking: Set and edit mobile device tracking options. Deploy Agents: Use the Agent Deployment Center. Enable Computer Tracking Screenshots: Enable the Take screenshots option in the Computer Tracking dialog. Enter Custom Field Data: Enter and edit information in Manual type custom information fields (i.e., fields that are not calculated automatically by Absolute Manage).
472
Server Center
Manage Mobile Devices: Issue commands to mobile devices managed from Absolute Manage through an MDM server. This right is a master switch for the administrator account. It is required for the administrator to be able to send commands to mobile devices at all, but any specific commands he or she is to be able to send must also be checked in the Commands available to administrator list, (see above). Modify Computer Groups: Create, edit, or delete computer groups in the Server Center. Modify Custom Information Fields: Create, edit, and delete custom information field definitions on the server. Modify Disk Images: Create, edit, or delete disk images for reinstalling computers in the Server Center. Modify Distribution Points: Create, edit, or delete distribution point definitions in the Server Center. Modify iOS Configration Profiles: Import or delete configuration profiles for iOS devices in the Server Center. Modify License Specifications: Create, edit, or delete license specifications in the Server Center. Modify Mobile Applications: Create, edit, or delete application packages for installation on administered mobile devices. Modify Mobile Device Policies: Create, edit, or delete policies for administered mobile devices. Modify Mobile Media: Create, edit, or delete media files to be distributed to administered mobile devices. Modify Server Settings: View and change server options in the Server Center or via the Change Server Registration command. Modify Software Packages: Create, edit, or delete software packages in the Server Center. Remote Control: Open a screen-sharing connection to an administered computer using the Remote Control command. Remove Computer Records: Delete a computer from a browser window, e.g., using the Remove from Server command. Remove History Commands: Delete entries from the History group in the Commands window. Remove Inventory Data: Delete inventory data, e.g., using the Remove Inventory Data command. Remove License Reports: Delete log entries from the License Monitoring > Reports group in the Server Center. Remove Mobile Device History Commands: Delete entries from the Commands group in the Mobile Devices window. Remove Mobile Device Records: Delete a mobile device from the Mobile Devices window. Remove SD Log Entries: Delete log entries from the Software Distribution > Installation Status group in the Server Center.
473
Reset Software Packages: Use the Reset Package context menu command in the Server Center. Retry Software Packages: Use the Retry Package context menu command in the Server Center. View Administrator Settings: See administrator-related information in the Server Center. View Commands Window: Open the Commands window and view its contents. View Computer Tracking Data: See the contents of information items from the Computer Tracking category. View Computer Tracking Screenshots: See the screenshots taken as part of the computer tracking. View Custom Information Fields: See the contents of custom information fields. View License Monitoring Settings: Open the License Monitoring category in the Server Center and view its contents. View Mobile Device Tracking Data: See the collected geolocation data of tracked mobile devices. View Server Status: Open the Server Monitor category in the Server Center and view its contents. View Software Distribution Settings: Open the Software Distribution category in the Server Center and view its contents. Note: Holding down the Option key while clicking a checkbox in this list checks or unchecks all options in the list.
474
Server Center
The dialog contains a field for naming the new group. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Administrator Info command (described on page 340).
The dialog contains a field for naming the new group. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Administrator Info command (described on page 340).
475
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand text field lets you enter an information item on which records are to be matched. You can use any computer-related information item. The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
Clicking OK creates the group. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Administrator Info command (described on page 340).
The dialog contains a field for naming the new group. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Administrator Info command (described on page 340).
476
Server Center
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand text field lets you enter an information item on which records are to be matched. You can use any information items for mobile devices. The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
Clicking OK creates the group. NOTE Any changes become effective only when you commit them to the Absolute Manage Server, e.g., using the Save Administrator Info command (described on page 340).
477
Refresh
Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand text field lets you enter an information item on which records are to be matched. You can use any computer-related information item. The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
Clicking OK creates the group. NOTE Any changes become effective only when you commit them to the Absolute Manage Server using the Save Administrator Info command (described on page 340).
Refresh
The Refresh command updates the information displayed in the Active Directory section with the current information from the Active Directory servers. This command is only available when the Active Directory category or one of its subcategories is selected.
478
Server Center
Choosing the command displays the setup fields for the newly created field in the Server Centers main area:
The dialog contains these elements: Field name: The name of the custom information field under which it appears in the Information Items window. Description: An optional description of the field which is displayed as a tooltip in the Information Items window. Data type: The type of data that the field contains. Available types include: String: Any unformatted text Number: Any number. You can choose from several display formats. Boolean: True or false Date: A point in time File Version: A version number according to the conventions of the target platform IP Address: An IPv4 address (e.g., 192.168.0.1) Enumeration: A value from a predefined list. You must specify the list of possible values. (All values are treated as strings.) Specifying the proper data type especially helps with sorting the records as expected. Field type: There are two types of custom information fields: Manual: Information in the field is entered manually by you or other administrators. Dynamic: Information in the field is automatically calculated by Absolute Manage.
479
Execute only when sending full inventory: If this option is checked, the specified scripts are executed only when a full inventory is requested from the agent. (At the first contact, when the agent starts up, or later whenever the Gather Inventory Information command is issued with the Force full inventory option.) If the option is unchecked, the script is executed also when the inventory is incrementally updated. This option applies only to dynamic fields. Return execution errors as result: If this option is checked, any error information that is created during an unsuccessful execution of the specified scripts is returned and entered into the field. If the option is unchecked, the field remains empty when the script encounters an execution error. This option applies only to dynamic fields. Replace line feeds with spaces in result data: If this option is checked, Absolute Manage replaces all linebreaks in the results returned by the script with spaces, turning the result into a single line of text. This option applies only to dynamic fields. Automatically assign to all computers: If this option is checked, the custom information field is automatically assigned to all client computers. If it is unchecked, it must be assigned manually to any client computer to which it is to apply. This option applies only to dynamic fields. Macintosh: This tab lets you the program that is to gather the information for the custom information field on Mac OS X clients. The program must return the desired information as its result. If an action has been defined for the Macintosh platform, a diamond is displayed on the tab. This option applies only to dynamic fields. It contains these elements: Data source: The type of program or setting that Absolute Manage is to use on the clients to gather the information for the field. Depending on the choice in this pop-up menu, different fields become available in the dialog pane. File: The field can take the path of a file on your computer that is to be executed on the administered computers. You can enter the path manually or select the file using the Select button. (This option is available for the Unix Shell Script and AppleScript data sources.) Line endings in any scripts you specify are converted to the conventions of the target platform when they are uploaded to Absolute Manage Server. Executable: The field is similar to File, described above. (This option is available for the Other Executable data source.) Text: The text of a script can be entered in this field. The entered script is executed on the target computers. (This
480
Server Center
option is available for the Unix Shell Script and AppleScript data sources.) Note: Absolute Manage offers syntax verification or debugging functions only for AppleScript scripts; we strongly recommend that you test the scripts before entering them here. Command line options: Any text entered in this field is passed as a parameter to the specified script (using the usual calling conventions of the script type in question). You can include shell variables in the options, as described in Environment variables on page 134. This option is available for the Unix Shell Script and Other Executable data sources. Transfer all files in folder containing executable: If this option is checked, all files in the same folder as the specified script file are transferred to the target computers before the script is executed. (This option is available for the Unix Shell Script and AppleScript data sources.) Note: Line endings in any files that are uploaded because this option is checked are not converted (as are those in scripts, as described above). Execute as: This pop-up menu allows you to specify a user account on the target computers with the privileges of which the script is executed. (This option is available for the Unix Shell Script and Other Executable data sources.) Executable requires administrative privileges: If this option is checked, the specified script is executed with administrator privileges on the target computers. (This option is available for the Unix Shell Script data source.) Location: The place where the desired plist preferences file is located. (This option is available for the Property List Value data source.) Note: The Current Host setting refers to preferences stored in ~/Library/ByHost/. Domain: The domain name used as an identifier for the plist file. This is the same as the file name without the .plist extension. (This option is available for the Property List Value data source when the User Preferences or System Wide Preferences location has been chosen.) Note: For example, the domain for the Docks preferences would be com.apple.dock. Full Path: The full path to the desired plist file. (This option is available for the Property List Value data source when the Full Path location has been chosen.) Key: The top-level key in the plist file the value of which Absolute Manage returns as the custom fields contents. (This option is available for the Property List Value data source.) Note: If you require value from the second or lower levels of a plist file, you have to extract them with a custom script. Windows: This tab lets you the program that is to gather the information for the custom information field on Windows
481
clients. The program must return the desired information as its result. If an action has been defined for the Macintosh platform, a diamond is displayed on the tab. The tab contains these elements: Data source: The type of program or setting that Absolute Manage is to use on the clients to gather the information for the field. Depending on the choice in this pop-up menu, different fields become available in the dialog pane. File: The field can take the path of a file on your computer that is to be executed on the administered computers. You can enter the path manually or select the file using the Select button. (This option is available for the Visual Basic Script, DOS Batch File, and PowerShell data sources.) Line endings in any scripts you specify are converted to the conventions of the target platform when they are uploaded to Absolute Manage Server. Executable: The field is similar to File, described above. (This option is available for the Other Executable data source.) Text: The text of a script can be entered in this field. The entered script is executed on the target computers. (This option is available for the Visual Basic Script, DOS Batch File, and PowerShell data sources.) Note: Absolute Manage offers no syntax verification or debugging functions for these scripts; we strongly recommend that you test the scripts before entering them here. Command line options: Any text entered in this field is passed as a parameter to the specified script (using the usual calling conventions of the script type in question). You can include environment variables in the options, as described in Environment variables on page 134. This option is available for the Visual Basic Script, DOS Batch File, PowerShell, and Other Executable data sources. Transfer all files in folder containing executable: If this option is checked, all files in the same folder as the specified script file are transferred to the target computers before the script is executed. (This option is available for the Visual Basic Script, DOS Batch File, PowerShell, and Other Executable data sources.) Note: Line endings in any files that are uploaded because this option is checked are not converted (as are those in scripts, as described above). Execute as: This pop-up menu allows you to specify a user account on the target computers with the privileges of which the script is executed. (This option is available for all data sources.) Registry Path: The full path in the registry of the desired value. (This option is available for the Registry Value data source.) All values are returned as strings, irrespective of the data type of the registry value.
482
Server Center
You can include environment variables in the options, as described in Environment variables on page 134. NOTE The New Custom Information Field command can be used only by administrators with the Modify Custom Information Fields right. See New Administrator on page 471 for details.
NOTE The Duplicate Custom Information Field command can be used only by administrators with the Modify Custom Information Fields right. See New Administrator on page 471 for details.
Import Fields
The Import Fields command lets you import definitions for custom information fields that have previously been exported from Absolute Manage. Choosing the command displays a standard Open dialog.
483
Edit <item>
Edit <item>
The Edit <item> commands lets you edit existing items in the Server Center. The actual name of the command reflects the selected item. If no item or an item that cannot be edited is selected, the command is not available. Choosing any of the command opens the appropriate dialog. See the descriptions of the corresponding commands for details: Edit Administrator: New Administrator Edit Administrator Group: New Administrator Group Edit Appointment Group: New Computer Appointment Group Edit Custom Information Field: New Custom Information Field Edit Disk Image: New Disk Image Edit License Specification: New License Specification Edit Payload: New Payload Edit Smart Group: New Smart Software Package Group (or another smart group command) Edit Software Package: New Software Package Edit Distribution Point: New Distribution Point
Remove <item>
The Remove <item> commands lets you delete existing items in the Server Center. The actual name of the command reflects the selected item. If no item or an item that cannot be deleted is selected, the command is not available. Choosing any of the commands deletes the selected item. NOTE Any changes become effective only when you commit them to the Absolute Manage Server using the appropriate command from the Server menu.
NOTE Using the commands may require specific rights in your administrator account. See New Administrator on page 471 for details.
Retrieve Payloads
The Retrieve Payloads command lets you download payloads from the distribution point to your local computer.
484
Server Center
Choosing the command displays a standard Save dialog in which you can choose a location to which to download the payload file. NOTE The Retrieve Payloads command can be used only by administrators with the Modify Software Packages right. See New Administrator on page 471 for details.
Retry Package
The Retry Package command causes Absolute Manage Server to reattempt to install a failed software installation. This command is available only in the context menu of the content area and only when software packages, patches, or the Installation Status group or one of its subgroups are displayed. Choosing this command makes the Absolute Manage Server retry the installation on all computers where it failed before. It does not reattempt deferred or refused installations. NOTE The Retry Package command can be used only by administrators with the Retry Software Packages right. See New Administrator on page 471 for details.
Reset Package
The Reset Package command causes Absolute Manage Server to treat the selected package as not yet having been installed on any target computer. This command is available only in the context menu of the content area and only when software packages, patches, or the Installation Status group or one of its subgroups are displayed. Choosing this command causes Absolute Manage Server to install the package on all computers in the distribution groups to which it is assigned, just as if the package was newly created, and irrespective of whether the package has already been installed on a computer or its installation been refused or deferred. NOTE The Reset Package command can be used only by administrators with the Reset Software Packages right. See New Administrator on page 471 for details.
485
difference being that the software packages or metapackages on which you right-click are already selected in the command window.
Server Settings
The Server Settings category lets you view and specify basic settings for the connected Absolute Manage Server and set the names of client information fields. Choosing the command displays the Server Settings dialog in the main area of the Server Center window. It has five panes: General (page 487) Client Info Titles (page 489) License Monitoring (page 490) ODBC Connection (page 491) Active Directory (page 492) MDM (page 493) FOG (page 495)
NOTE The Server Settings command can be used only by administrators with the Change Server Settings right. See New Administrator on page 471 for details.
486
Server Center
General
The General pane lets you specify the basic server parameters.
The General pane contains these options: Offline threshold: The interval in which an agent must contact the server. If the server is not contacted by an agent for this time, it considers the agents computer to be offline. Note: This interval should be no shorter than the Heartbeat Interval setting for the agents. (See Servers on page 284 for details.) Maximum number of entries in licensing history: The maximum number of entries displayed in license history reports. If more entries are generated, only the newest entries are displayed. Note: A license history entry records the entire licensing state at a given time, much like a snapshot in a backup history. Connection timeout: The time after which the server considers an attempt to establish a connection with an Absolute Manage Agent or Admin to have failed. Maximum number of connections: How many simultaneous connections to agents or admins will this server allow at most? Server admin port: The port over which the server communicates with Absolute Manage Admins. Server agent port: The port over which the server communicates with Absolute Manage Agents. MDM server port: The port over which the MDM server communicates. Note: The three ports may be the same or different. Use administrator information from server: By default, each Absolute Manage Server contains its own administrator information (accounts, privileges, etc.). When another server is specified here, it instead dynamically gets the information from that server.
487
Server Settings
Clicking the Set button opens the Server Properties dialog where you can specify the server. The dialog is described below. Use custom fields from server: By default, each Absolute Manage Server contains its own custom field definitions. When another server is specified here, it instead dynamically gets the information from that server. Clicking the Set button opens the Server Properties dialog where you can specify the server. The dialog is described below. Discard computer tracking data after: If this option is checked, Absolute Manage deletes data collected while tracking administered computers after the specified number of days. Run database maintenance every: This option lets you specify the interval in which the Absolute Manage servers internal database is maintained. Maintenance includes compacting the database file and checking it for possible corruption. If corruption is detected, Absolute Manage tries to correct the problem automatically. It informs you whether it appears to have succeeded or not. Clicking the Run Now button immediately creates a backup. Backup database every: This option lets you specify the interval in which the Absolute Manage servers internal database is backed up up as well as the number of backup generations that are kept. Clicking the Run Now button performs the maintenance immediately. Backup files are stored in the same directory as the database file itself. Server unique identifier: The unique identifier of the displayed server. You can use this information to verify that you are connected to the correct server. Server certificate fingerprint: The fingerprint of the SSL certificate with which the displayed server identifies itself. You can use this information to verify that you are connected to the correct server. Save Certificate: Clicking this button lets you save the server's certificate for use in identifying the server when you assign it to clients.
488
Server Center
The dialog contains these elements: Server address: The DNS name or IP address of the desired server. Server port: The port over which the specified server communicates with agents. Server certificate: This field indicates whether a valid certificate for the server has been provided. If no valid certificate is available, the server cannot be saved. Clicking the Set button lets you choose an SSL certificate for identifying the server. (Certificates can be created by means of the Save Certificate button in the Server Settings section of the Server Center, as described in Exporting a server certificate on page 18.) Note: Make sure that you are using a certificate that has been created after the last time the server has been installed. A certificate that has been created before a server has been reinstalled is indicated to be valid but will not allow a connection to the server.
The Client Info Titles pane of the Server Settings dialog contains the names of the ten client information fields in which you can store custom information on the clients.
Editing one of the titles automatically changes the name of that client information field on all agents connected to the server. NOTE If multiple inventory servers are specified for an agent, it uses the client info titles of the first one in the list in the Servers pane of the Agent Settings dialog. (For more details, see Servers on page 284.)
489
Server Settings
License Monitoring
The License Monitoring tab of the Server Settings dialog lets you specify the schedules for the agents license monitoring activities.
In the Licensing monitoring disk scans section, you can specify when and how often the Agent should scan the disk for licensed software. The Agent scans at all checked days of the week during the specified hours in the specified interval. In the Licensing monitoring process reports section, you specify when and how often the Agent sends reports on licensed software to the server. Since these reports include both installed software and running software (if there are license specifications that are configured accordingly), it can make sense to send reports more often than disk scans are performed. Any changes you make here are pushed to the Agents according to the license monitoring update interval settings. (The setting is specified in the Servers tab of the Agent Settings command window.)
490
Server Center
ODBC Connection
The ODBC Connection tab lets you activate and configure link via ODBC to a database into which all data from Absolute Manages internal database is exported at regular intervals. NOTE This is a one-way link; no changes to the data in the target database are ever re-imported into Absolute Manages internal database.
The ODBC Connection pane contains the options listed below. Note that all the database specifications (i.e., all options except Enable ODBC export and Data source name) can be omitted if they are already contained in the specified ODBC data source. Enable ODBC export: This is the master switch that activates or deactivates the automatic ODBC export. Database type: The type of the database that is connected via ODBC. Data source name: The ODBC data source that represents the database. Database server address: The DNS name or IP address of the server on which the database is hosted. Database name: A login name for the database. The corresponding account must have sufficient privileges to create tables and write data. Database password and Database password verification: The password for the specified database user account. Export interval: The interval in which Absolute Manage is to export data to the database.
491
Server Settings
Active Directory
The Active Directory tab of the Server Settings dialog lets you specify the Active Directory groups the accounts in which Absolute Manage makes available for creating administrator accounts.
NOTE The accounts in the specified groups are not automatically made administrator accounts in Absolute Manage; they are merely available in the Server Center windows sidebar for this purpose. Account from groups not specified here are not available.
The tab contains these elements: List of groups: The list contains all groups you have so far specified. +: This button lets you add groups to the list. Clicking the button opens a dialog in which you enter the groups name. -: Clicking this button removes the selected group from the list.
Double-clicking a group in the list opens a dialog that lets you change that groups name. NOTE If an Active Directory account from one of the specified groups is moved out of the group, it will be deleted as an Absolute Manage administrator account.
492
Server Center
MDM
The MDM tab of the Server Settings dialog lets you specify the settings required to manage mobile devices through Absolute Manage. NOTE Any change in the Access rights section of this dialog has no effect on currently enrolled devices until they are re-enrolled (as described in Enrolling mobile devices on page 36).
The tab contains these elements: Profile name: A descriptive name for the deployment profile. The name will be displayed on the mobile device during the enrollment process. Profile identifier: A unique identifier for the deployment profile. Organization: The name of your organization. This information is optional. Description: A brief description of the purpose of the deployment profile. Users of mobile devices will see this description during the enrollment process. MDM server: The full DNS name of the mobile device management server into which the profile enrolls the mobile device. Also include the port over which the MDM server communicates. MDM Push Services certificate: Clicking the Select button lets you select a certificate issued by Apple for validating the MDM server to the mobile devices. Obtaining this certificate is described in Preparation on page 23. Query devices for: These checkboxes determine the information from the managed mobile devices that administrators can view:
493
Server Settings
General settings: Administrators can view the general settings of an administered mobile device. Security settings: Administrators can view the securityrelated settings of an administered mobile device. Network settings: Administrators can view the network settings of an administered mobile device. Restrictions: Administrators can view the restrictions in effect on an administered mobile device. Configuration profiles: Administrators can view the configuration profiles installed on an administered mobile device. This setting can only be changed when Configuration profiles is unchecked in the Add and remove section (see below). Applications: Administrators can view the applications that are installed on the mobile device. This includes both applications from the iTunes store and in-house applications. Provisioning profiles: Administrators can view the provisioning profiles installed on an administered mobile device. This setting can only be changed when Provisioning profiles is unchecked in the Add and remove section (see below). Add and remove: These checkboxes determine the which kind of profiles administrators can delete from the device or add to it: Configuration profiles: The administrators can add or delete configuration profiles. Only administrators with the Modify iOS Configuration Profiles privilege can do so. Provisioning profiles: The administrators can add or delete provisioning profiles. Only administrators with the Modify Mobile Applications privilege can do so. Applications: The administrators can install apps on the device using the Install Application command and delete them using Delete Application. This feature is not available for devices running iOS 4.x. Security: These checkboxes determine the which kind of security-related operation the administrators with the Manage Mobile Devices privilege can perform on the mobile device: Change device password: The administrators can set a new password for the device. Remote wipe: The administrators can remotely erase the entire contents of the mobile device. This resets the device to its factory condition. Note that this also removes the MDM settings from the device, so that it is no longer possible to access it from Absolute Manage. Change settings: The administrators can remotely change certain settings on the mobile device, such as roaming options. In contrast to specifying these settings via profiles, the settings are changed directly and can be changed back by the user of the managed device. AbsoluteApps Push Services certificate: The certificate needed for the server to inform devices of new and updated inhouse applications available in the AbsoluteApps app and send them messages.
494
Server Center
This certificate is needed only when you plan to distribute inhouse apps to iOS devices. If you will not do so, specifying this certificate provides no benefits. You can obtain an app push services certificate from Apples iPhone Provision Portal. Device contact interval: The interval in which the MDM server sends a request to managed mobile devices to contact the server and updates its status. These contact requests are sent through Apples notification servers and are subject to a timeout on these servers; i.e., when there is no contact to the mobile device for a certain time, the contact request is removed without having been delivered to the device. The length of the timeout is unknown but believed to be a few days. We therefore recommend to set the contact interval no higher than 48 hours to ensure that the timeout period does not cause contact requests to fail, e.g., for devices that are switched off for long periods of time. Update device information: If this option is checked, the information about the device stored in the Absolute Manage database is updated each time the device contacts the MDM server. (This information includes data on hardware, operating system, network used, and installed software.) If the option is off, the information stored on the device is never updated.
FOG
The FOG tab of the Server Settings dialog lets you specify the settings for reinstalling administered computers with the Reinstall Windows Computer command.
The tab contains these elements: FOG ODBC driver name: The name of the ODBC driver which the Absolute Manage Server computer is to access the MySQL database of the FOG server.
495
Server Monitor
FOG MySQL database server address: The IP address or DNS name of the computer on which the FOG MySQL database server is running. FOG MySQL database name: The name of the MySQL database used by the FOG software. FOG MySQL database username: The account name that Absolute Manage Server is to use to access the FOG MySQL database. FOG MySQL database password: The password for the account. FOG MySQL database password verification: The password for the account repeated, to guard against typos. FOG server URL: The IP address or DNS name of the computer on which the FOG server (i.e., the FOG software itself, not the MySQL database server it is using) is running and the path of the FOG management directory on that computer. For example: http://myfogserver.company.com/fog/ management/. FOG username: The account name that Absolute Manage Server is to use to access the FOG server. FOG password: The password for the account. FOG password verification: The password for the account repeated, to guard against typos.
Server Monitor
The Server Monitor category in the Server Center window lets you view current server activities. Selecting the category displays a range of information in the main area of the Server Center window:
The monitor contains these elements: Network connections: The number of active network connections of the server.
496
Server Center
Max. connections: The maximum number of connections that is configured on this server. (This is the total number of connections; the Maximum number of connections field in the Absolute Manage Servers Server Settings dialog specifies only the number of outgoing agent connections.) Max. simultaneous conn.: The maximum number of simultaneous network connections on this server since it was last launched. Connections since launch: The total number of network connections on this server since it was last launched. Uptime: The amount of time that has elapsed since the last time the server was launched. Server version: The version number of the server. Last ODBC export: The time when the last ODBC export was performed. If ODBC exports are not activated, Disabled is displayed. Last database export: The time when the last database backup was performed. If database backups are not activated, Disabled is displayed. Last database maintenance: The time when the database maintenance was performed. If database maintenance is not activated, Disabled is displayed. Last status update: The time when the information displayed in the server monitor was last updated. Admins: The number of administrators who have been logged in on this server since the last time the server was restarted (including administrators who are currently logged in). Clicking this tab displays an overview of these admins. Active commands: The number of commands that are currently being executed on the server. Clicking this tab displays a list of the commands. Caches: Clicking this tab displays a breakdown of the requests by type as well as the maximum numbers of agent request or inventory requests that were cached at the same. Status Refresh Interval: The interval for automatic updates of the information displayed in the server monitor. Refresh Now: Clicking this button updates the the information displayed in the server monitor irrespective of the refresh interval. Keep connection open: If this option is checked, the connection to the server is not closed after the data has been refreshed. This helps reduce network overhead in case of frequent updates.
497
Chapter 22
Action menu
Sidebar
Toolbar
Table area
Columns drawer
The elements of the Agent Deployment Center window are described below: Toolbar (page 499) Table columns (page 501) Sidebar (page 501) Action menus (page 501) New Custom Zone (page 502) Edit Custom Zone (page 505) Remove Custom Zone (page 505) Search Zone (page 506) Cancel Search (page 506) Refresh (page 506) New Smart Group (page 506) Edit Smart Group (page 507) Remove Smart Group (page 507) Import Zones File (page 508) Context menu (page 508) Copy (page 509) Copy <information item> (page 509)
498
New Smart Group from <information item> (page 509) Install Agent (page 509) Remove Agent (page 511) Set Inventory Server (page 512) Refresh Status (page 514)
The + button in the lower left-hand corner is not separately described; clicking it creates a new custom zone as if you had chosen New Custom Zone.
Toolbar
The Agent Deployment Center window has a toolbar that allows quick access to common actions. NOTE The toolbar can be customized by means of the Customize Toolbar command described on page 277. After such customization, not all of the buttons described below may be present in the toolbar. The toolbar can contain these elements:
The elements are explained below, except for those that are not specific to Absolute Manage Admin (Flexible Space through Print).
Configure Columns
The Configure Columns button opens the columns drawer or closes it when it is already open. It has the same effect as the Configure Columns command described on page 275.
499
Toolbar
Install Agent
The Install Agent button installs Absolute Manage Agent on the selected computers. It has the same effect as the Install Agent command described on page 509.
Remove Agent
The Remove Agent button uninstalls Absolute Manage Agent from the selected computers. It has the same effect as the Remove Agent command described on page 511.
Refresh Status
The Refresh Agent Info updates the information display for the selected network devices. It has the same effect as the Refresh Status command described on page 514.
Delete
The Delete command deletes the selected objects from the window. It has the same effect as the Delete command described on page 272.
Search Records
The Search Records field lets you quickly restrict the display to records that contain the search text. The pop-up menu lets you specify whether all columns should be searched or just one particular column. Pressing Return executes the search.
500
Table columns
The main table in the Agent Deployment Center window displays network devices found in the zones that have been searched. The columns in the table display information items that are mostly described in Agent Deployment Center on page 576. In addition, to the named columns displaying information items, the first column indicates the status of the device: A green dot indicates that the current version of Absolute Manage Agent is installed on the computer. A yellow dot indicates that an outdated version of Absolute Manage Agent is installed on the computer. A red dot indicates that Absolute Manage Agent is not installed on the computer but could be installed. A grey dot indicates a device that does not support Absolute Manage Agent, i.e., one of the following: A computer with an incompatible operating system (i.e., Windows when you are installing from a Mac OS X Admin) A non-computer device (such as a router or printer) A computer that could support Absolute Manage Agent but on which the required connection protocol (SSH for the Mac OS X Admin) is disabled.
Sidebar
The Agent Deployment Center window contains a sidebar with predefined and custom zones reflecting the network structure: Bonjour: All Bonjour (previously known as Rendezvous, an implementation of ZeroConfig) zones. Active Directory: All Active Directory zones in your network. If there are no Active Directory servers in your network, this sidebar entry is missing. Custom zones: All zones that you have defined.
Clicking on any zone displays the network devices that have been found in that zone.
Action menus
The action menu of the Agent Deployment Center window contains commands for managing custom zones. The commands are described in detail in the following sections.
501
New Custom Zone on page 502 Edit Custom Zone on page 505 Remove Custom Zone on page 505 Search Zone on page 506 Cancel Search on page 506 Refresh on page 506 New Smart Group on page 506 Edit Smart Group on page 507 Remove Smart Group on page 507 Import Zones File on page 508
Zone
The Zone pane of the Custom Zones dialog lets you define a virtual network zone that Absolute Manage uses to search for computers and for deploying agents:
The pane contains these elements: Zone Name: The name under which your custom zone will be displayed. Condition area: Choose between including computers in zones by IP address or by host name. For IP addresses, you can choose between single addresses or address ranges by means of the second pop-up menu. The text field lets you enter the address or name to look for.
502
The + and buttons let you add new conditions or remove existing ones. A zone includes all computers that match any of the specified conditions (Boolean OR). Repeat scan every: Check this option and enter a number of minutes to have Absolute Manage scan this zone automatically for new computers in the specified interval. Note: This setting is particularly useful in combination with automatic deployment of agents, as described below.
Auto Deployment
The Auto Deployment pane of the Custom Zones dialog lets you specify whether and how to automatically install agents on computers found in the zone on which no agent is present:
NOTE Automatic installation is possible only on computers running the same operating system as your administrator workstation. That is, if you are running Absolute Manage Admin on Mac OS X, you can automatically deploy only to client computers running Mac OS X. And from Absolute Manage Admin for Windows, automatic deployment is only possible to computers running Windows. The pane contains these elements: Automatically deploy agents: If this option is checked, Absolute Manage automatically installs Absolute Manage Agents on computers found in this zone that do not already have them. Automatically update agents: If this option is checked, Absolute Manage automatically updates any Absolute Manage Agents found on computers in this zone when they are outdated.
503
SSH login username: The username that is to be used for SSH login on the selected computers. The account names (as well as the passwords) as case-sensitive. You must use the abbreviated username. SSH login password: The password for the SSH account. Password verification: Re-enter the password to guard against typos. Use Agent installer: Choose Built-in if the installer embedded in Absolute Manage Agent is to be used for installing the Agent. Choose Other to specify a custom installer using the Select button. SD Server: The software distribution server to be used for this Agent. Clicking Set lets you specify a server, as described below in Server Properties dialog on page 505. SM Server: The license monitoring server to be used for this Agent. Clicking Set lets you specify a server, as described in Server Properties dialog on page 505. Inventory servers: This table lists all known Absolute Manage inventory servers. Any servers selected in this list are assigned to the selected agents when you click OK. The list contains these columns: AM Server Address: The IP address or DNS name of the server. Note: If you enter an abbreviated DNS name (i.e., one that relies on being completed with the default domain you have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain). Port: The port over which the server communicates with agents. Basic Inv. Only: If this option is checked, the agents send only basic inventory information (as opposed to complete inventory information) to this sever. This option is intended for servers that act only as software distribution or license monitoring servers and thus have no need for full inventory information. Restricting these servers to basic information can save significant network bandwidth in large installations. Heartbeat Interval: The interval in which the agents are to contact the server to let it know that they are still available. Note: This interval should not be longer than the Agent Offline Threshold setting of the Absolute Manage Server. (See Server Settings on page 486 for details.) Inv. Push Interval: The interval in which the agents are to send updated information on their computers to the server. (To save network bandwidth, only the changes are sent, not complete inventories.) Double-clicking a server displays a dialog for editing its settings. The dialog is described in Inventory Server Properties dialog on page 514. Clicking the + button adds a new server to the list. A dialog is displayed in which you can edit the server's setting; the dialog
504
is described in Inventory Server Properties dialog on page 514. Clicking the button removes the selected server.
The Server Properties dialog lets you specify a software distribution or license monitoring server.
The dialog contains these elements: Server address: The IP address or DNS name of the server. Note: If you enter an abbreviated DNS name (i.e., one that relies on being completed with the default domain you have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain). Server port: The port over which the server communicates with agents. Interval: The interval in which the agents are to check the software distribution server for new installation packages or check the license monitoring server for changes to the license specifications, respectively. Clicking the Set button lets you choose an SSL certificate for identifying the server. (Certificates can be created by means of the Save Certificate button in the Server Settings section of the Server Center, as described in Exporting a server certificate on page 18.) The certificate is required for specifying the server.
505
Search Zone
Choosing the command deletes the selected custom zones. A confirmation alert is displayed first.
Search Zone
The Search Zone command searches the selected zone for network devices. Choosing the command makes Absolute Manage admin scan the network range specified in the zone for client computers. While a zone scan is in progress, the command changes to Cancel Search, described below. NOTE It takes approximately a tenth of the server connection timeout set in the Preferences dialog (see Preferences on page 254) to scan one IP address when there is no device present at that address; i.e., about a second at the default timeout of ten seconds. When a device is present, scanning is usually faster.
Cancel Search
The Cancel Search command terminates the current scan of the selected zone. This command replaces the Search Zone command, described above, while a zone scan is under way.
Refresh
The Refresh command recreates the Windows Networking domains and workgroups and redisplays the computers within them. This command is only available when the Windows Networking category is right-clicked, which is not supported in Absolute Manage Admin for Mac OS X.
506
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. The pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
NOTE Devices may appear multiple times in smart groups when they were found using more than one method (e.g., through Bonjour and by scanning an IP range.)
507
Context menu
The context menu of the Agent Deployment Center window contains commands for installing and uninstalling Absolute Manage Agent and refreshing the display. The commands are described in detail in the following sections. Copy on page 509 Copy <information item> on page 509 New Smart Group from <information item> on page 509 Install Agent on page 509 Remove Agent on page 511 Set Inventory Server on page 512 Refresh Status on page 514
508
Copy
The Copy command copies the selected records as tab-delimited text to the clipboard. If multiple records are selected, all are copied. The Copy context menu command has the same effect as the Copy command from the Edit menu described on page 272.
Install Agent
The Install Agent command installs Absolute Manage Agent on the selected computers. If an older version of Absolute Manage Agent is already present on the computer, it is updated. You can install Absolute Manage Agents only on the same platform on which your copy of Absolute Manage Admin is running, i.e., you cannot deploy Windows agents from Mac OS X or vice versa.
509
Install Agent
The command is available only if Absolute Manage Agent can be installed on the selected computer. NOTE SSH must be active on the target computer for this installation to work. Choosing the command opens the Agent Deployment Settings dialog:
The dialog contains these elements: SSH login username: The username that is to be used for SSH login on the selected computers. The account names (as well as the passwords) as case-sensitive. You must use the abbreviated username. SSH login password: The password for the SSH account. Use Agent installer: Choose whether the installer embedded in Absolute Manage Agent is to be used for installing the Agent or a custom installer that you provide. Select: Clicking this button lets you select a custom installer. SD Server: The software distribution server to be used for this Agent. Clicking Set lets you specify a server, as described in Server Properties dialog on page 505. SM Server: The license monitoring server to be used for this Agent. Clicking Set lets you specify a server, as described in Server Properties dialog on page 505. Restore Servers from Preferences: Clicking this button selects the inventory servers that have been specified in the Deployment Center pane of the Preferences dialog. Inventory servers: This table lists all known Absolute Manage inventory servers. Any servers selected in this list are assigned to the selected agents when you click OK. The list contains these columns: AM Server Address: The IP address or DNS name of the server. Note: If you enter an abbreviated DNS name (i.e., one that relies on being completed with the default domain you
510
have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain). Port: The port over which the server communicates with agents. Basic Inv. Only: If this option is checked, the agents send only basic inventory information (as opposed to complete inventory information) to this sever. This option is intended for servers that act only as software distribution or license monitoring servers and thus have no need for full inventory information. Restricting these servers to basic information can save significant network bandwidth in large installations. Heartbeat Interval: The interval in which the agents are to contact the server to let it know that they are still available. Note: This interval should not be longer than the Agent Offline Threshold setting of the Absolute Manage Server. (See Server Settings on page 486 for details.) Inv. Push Interval: The interval in which the agents are to send updated information on their computers to the server. (To save network bandwidth, only the changes are sent, not complete inventories.) Double-clicking a server displays a dialog for editing its settings. The dialog is described in Inventory Server Properties dialog on page 514. Clicking the + button adds a new server to the list. A dialog is displayed in which you can edit the server's setting; the dialog is described in Inventory Server Properties dialog on page 514. Clicking the button removes the selected server. Export Installer Package: Clicking this button lets you save a custom installer package that includes both the server settings you have specified in this dialog as well as the required certificates. You can use this installer package in the Use agent installer section of this dialog.
Except for the servers to assign, the presets in all fields are specified in the Preferences dialog (see page 254). NOTE If the built-in Mac OS X firewall is active on a client computer, installing the Absolute Manage Agent automatically opens the agent port as specified in the Preferences dialog (usually port 3970).
Remove Agent
The Remove Agent command removes Absolute Manage Agent from the selected computers. You can remove Absolute Manage Agents only from the same platform on which your copy of Absolute Manage Admin is running, i.e., you
511
cannot remove Windows agents from an admin running on Mac OS X or vice versa. The command is available only if Absolute Manage Agent is installed on the selected computer. It is not available if no Absolute Manage Agent is present or if SSH is disabled on the target computer. Choosing the command opens the Remove Agent dialog:
The dialog contains these elements: SSH login username: The username that is to be used for SSH login on the selected computers. The account names (as well as the passwords) as case-sensitive. You must use the abbreviated username. SSH login password: The password for the SSH account. Password verification: Re-enter the password to guard against typos.
The presets in all fields are specified in the Preferences dialog (see page 254).
512
The dialog contains these elements: SSH login username: The SSH username for connecting to the client. SSH login password: The password for the specified SSH account. SD Server: The software distribution server to be used for this Agent. Clicking Set lets you specify a server, as described in Server Properties dialog on page 505. LM Server: The license monitoring server to be used for this Agent. Clicking Set lets you specify a server, as described in Server Properties dialog on page 505. Inventory servers: This table lists all known Absolute Manage inventory servers. Any servers selected in this list are assigned to the selected agents when you click OK. The list contains these columns: AM Server Address: The IP address or DNS name of the server. Note: If you enter an abbreviated DNS name (i.e., one that relies on being completed with the default domain you have specified in your computers network settings), make sure that all agents have the same default domain set. To avoid problems, we recommend that you use only fully qualified DNS names (i.e., ones that include the full domain). Port: The port over which the server communicates with agents. Basic Inv. Only: If this option is checked, the agents send only basic inventory information (as opposed to complete inventory information) to this sever. This option is intended for servers that act only as software distribution or license monitoring servers and thus have no need for full inventory information. Restricting these servers to basic information can save significant network bandwidth in large installations.
513
Refresh Status
Heartbeat Interval: The interval in which the agents are to contact the server to let it know that they are still available. Note: This interval should not be longer than the Agent Offline Threshold setting of the Absolute Manage Server. (See Server Settings on page 486 for details.) Inv. Push Interval: The interval in which the agents are to send updated information on their computers to the server. (To save network bandwidth, only the changes are sent, not complete inventories.) Double-clicking a server displays a dialog for editing its settings. The dialog is described below. Clicking the Up button moves the selected entry up in the list, clicking the Down button moves it down. Clicking the + button adds a new server to the list. A dialog is displayed in which you can edit the server's setting; the dialog is described below. Clicking the button removes the selected server.
Most of the fields in the dialog for specifying a new inventory server or editing an existing one correspond to the columns in the inventory server list described above.
The Inventory server certificate field indicates whether a valid certificate for the server has been provided. If no valid certificate is available, the server cannot be saved. NOTE Make sure that you are using a certificate that has been created after the last time the server has been installed. A certificate that has been created before a server has been reinstalled is indicated to be valid but will not allow a connection to the server. Clicking the Set button lets you choose an SSL certificate for identifying the server. (Certificates can be created by means of the Save Certificate button in the Server Settings section of the Server Center, as described in Exporting a server certificate on page 18.)
Refresh Status
The Refresh Status command updates the displayed information for the selected network devices.
514
Choosing the command causes Absolute Manage Admin to query the device and update the displayed information.
515
Chapter 23
Commands window
The Commands window lists all commands that are pending, that are being executed, that have been executed and those that have failed. It lets you reschedule and edit these commands or re-execute completed commands.
Action menu
Sidebar
Toolbar
Table area
Columns drawer
The elements of the Commands Center window are described below: Toolbar (page 517) Table columns (page 518) Sidebar (page 519) Action and context menus (page 519) Copy (page 520) Copy <information item> (page 520) New Smart Command Queue Group from <information item> (page 520) New Smart Command History Group from <information item> (page 520) New Smart Command Queue Group (page 521) New Smart Command History Group (page 521) Edit Smart Group (page 522) Remove Smart Group (page 522) Scheduling Options (page 523) Execute Command Now (page 523) Edit Command (page 523) Reapply Command (page 523) Remove Command (page 523) Show Command Result (page 524)
The + button in the lower left-hand corner is not separately described. Clicking it creates a new queue smart group as if you had chosen New Smart Command Queue Group; clicking it with the Option key held
Absolute Manage User Guide 516
Commands window
down acts like you had chosen New Smart Command History Group.
Toolbar
The Commands window has a toolbar that allows quick access to common actions. NOTE The toolbar can be customized by means of the Customize Toolbar command described on page 277. After such customization, not all of the buttons described below may be present in the toolbar. The toolbar can contain these elements:
The elements are explained below, except for those that are not specific to Absolute Manage Admin (Flexible Space through Print).
Configure Columns
The Configure Columns button opens the columns drawer or closes it when it is already open. It has the same effect as the Configure Columns command described on page 275.
Options
The Options button lets you reschedule a pending command and change other command options. It is not available for commands that are already executing or have been completed. Clicking the Options button opens the Options dialog that is described in Options on page 280, although the Command description field is not available.
517
Table columns
Execute Now
The Execute Now button lets you immediately execute a pending or deferred command. It is not available for commands that are already executing or have been completed. Clicking the button executes the selected commands immediately, irrespective of their scheduling options.
Edit
The Edit button lets you change the settings of a command that has not yet been executed. Clicking the Edit button opens the selected commands command dialog, as described in Commands menu on page 278. This is similar to choosing the Edit Command command from the context menu.
Reapply
The Reapply button lets you execute a command one more time. If you reapply a command that has not yet been executed, a second copy of the command is created in the command queue, leaving the original command unchanged. Clicking the Reapply button opens the selected commands command dialog, as described in Commands menu on page 278. This is similar to choosing the Reapply Command command from the context menu.
Search Commands
The Search Commands field lets you quickly restrict the display to commands that contain the search text. The pop-up menu lets you specify whether all columns should be searched or just one particular column. Pressing Return executes the search.
Table columns
The columns displayed in the Commands window are described in Commands on page 561.
518
Commands window
Sidebar
The Commands window contains a sidebar with predefined and custom groups displaying commands by their execution status: Queued Commands: All commands that are pending execution, either because they have been scheduled for a future date or because they have been deferred. History: All commands that have already been completed, successfully or unsuccessfully. Because the history includes the results for each command (in the Command Result Error and Command Error Info columns), it also provides a command log. Failed Commands: All commands that Absolute Manage has attempted to execute but that have failed. (Does not include deferred commands, i.e., commands that could not yet be executed because the target computer is unavailable.) Commands in Last 24 hours: All commands that have been completed, successfully or unsuccessfully, in the last 24 hours.
Any additional smart groups that you define are displayed below these groups.
For information on the rest of the commands in the context menu, see Commands menu on page 278. (The Favorite Commands context menu item corresponds to the Favorites submenu in the Commands menu.)
519
Copy
Copy
The Copy command copies the selected records as tab-delimited text to the clipboard. If multiple records are selected, all are copied. The Copy context menu command has the same effect as the Copy command from the Edit menu described on page 272.
Commands window
You can edit these criteria, add new ones, or delete them as desired before saving the smart group.
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. The available information items are described in Commands on page 561, General on page 525, and Administration on page 562. The second pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
521
The dialog contains these elements: Smart Group Name: The name for the smart group. Contains records which match: When all is chosen from this pop-up menu, records are found that match all specified conditions (Boolean AND). If any is chosen, records are found that match at least one of the specified conditions (Boolean OR). Conditions area: The left-hand pop-up menu lets you choose an information item on which records are to be matched. The available information items are described in Commands on page 561, General on page 525, and Administration on page 562. The second pop-up menu contains the possible comparison operators. The right-hand text field lets you specify the value to compare record values against. The + and buttons let you add new conditions or remove existing ones.
522
Commands window
Scheduling Options
The Scheduling Options command lets you reschedule a pending command. It is not available for commands that are already executing or have been completed. Choosing the command opens the Scheduling Options dialog that is described in Options on page 280, although the Command description field is not available.
Edit Command
The Edit Command command lets you change the settings of a command that has not yet been executed. It is not available for commands that are already executing or have been completed. Choosing the command opens the selected commands command dialog, as described in Commands menu on page 278.
Reapply Command
The Reapply Command command lets you execute a command again. A new copy of the command is created in the command queue. Choosing the command opens the selected commands command dialog, as described in Commands menu on page 278.
Remove Command
The Remove Command command deletes a command from the command table. If the command is pending, it will not be executed. A confirmation message is displayed first. NOTE In the command history, the Remove Command command can be used only by administrators with the Remove History Entry right. See New Administrator on page 471 for details.
523
524
Chapter 24
Information items
Absolute Manage can display numerous aspects of the client computers state and configuration. It does so in information items, which are analogous to database fields. This chapter contains a complete listing of all information items, sorted by subject matter. NOTE If you are looking for an information item by name, please use the Index. Information items cover these areas: Agent Information on page 525 Hardware Information on page 528 Software Information on page 544 Commands on page 561 Server Center on page 562 Agent Deployment Center on page 576 Installed Software Statistics on page 577 Missing OS Patches Statistics on page 577 Compliance Reports on page 578 Mobile Device Information on page 580 Windows Reinstallation Tasks on page 598
Agent Information
Information items in the Agent Information section contain information on the Agent properties and settings. There are three subcategories: General (page 525) Agent Settings (page 526) Custom Fields (page 528)
General
Agent Name
The General category contains information items related to the version and identifying information of Absolute Manage Agent. The name under which the computer on which Absolute Manage Agent is installed is displayed in Absolute Manage.
NOTE If Use Custom Agent Name is Yes this information item is the same , as Custom Agent Name. If Use Custom Agent Name is No it is the , same as Computer Name.
Agent Version
525
Agent Information
The build number of the Absolute Manage Agent. The unique serial number of the Absolute Manage Agent. The IP address that the Absolute Manage Agent used for the last communication with the server. (This is the IP address of the computer, on which Absolute Manage Agent is installed, or one of its IP addresses if it has multiple network adapters.) Whether the computer has sent its last scheduled heartbeat signal. (In the Computers window, this information is indicated by a green or red dot in front of the computers row.) A graphical information on whether the computer has sent its last scheduled heartbeat signal: A green dot indicates that it has; a red dot, that it has not. (This is the same as the online status column in the Computers window.) The time when the last heartbeat signal has been received from this agent.
Computer Online
Last Heartbeat
NOTE The heartbeat is a regular signal by the agent indicating that it is still running.
The time when the record for this computer was created in the server. The Agent Settings category contains information items related to the current settings of Absolute Manage Agents.
Agent Settings
Servers
The Servers subcategory contains information about server-related settings of Absolute Manage Agents. If an agent communicates with multiple servers, one row per server is generated for each agent. Server Address The address of all Absolute Manage Servers with which the Absolute Manage agent is set to communicate, not including any servers that are software distribution or license monitoring servers for the agent but not inventory servers. The port on the Absolute Manage Server with which the Absolute Manage Agent communicates. The unique ID of the Absolute Manage Server with which the Absolute Manage Agent communicates. The ID stays constant even when the servers network address changes. The interval, in minutes, in which the Absolute Manage Agent contacts the server to let it know that its computer is still running.
Server Port
Server Unique ID
Heartbeat Interval
526
Information items
The interval, in minutes, in which the Absolute Manage Agent transmit any changes to the state or parameters of its computer to the server. Whether this server has been configured in the Agent Settings to request only basic inventory information from this agent.
Client Information
The Client Information subcategory contains information about userdefinable information stored on administered computers. Client Information 1 10 The first through tenth of the information fields for user-definable information. The contents of these fields can be any text, as specified by administrators or local users.
NOTE The actual fields may have names that differ from those of these information items, when you have edited the field names in the Server Settings dialog.
Whether the client information fields are locked on this computer. If fields are locked, only administrators can edit their contents, not local users.
Ungrouped fields
Custom Agent Name A custom name for this computer just for use within the Absolute Manage system, as specified in the Agent Settings dialogs General tab. Whether the custom agent name (see above) is to be used to indicate the computer within the Absolute Manage system. The IP address or DNS name of the software distribution server specified for this computer. The port on the software distribution server that is specified for this computer. The unique ID of the software distribution server assigned to this agent. The ID stays constant even when the servers network address changes. The interval, in minutes, in which the Absolute Manage Agent is set to check the software distribution server for new installation packages. The IP address or DNS name of the license monitoring server specified for this computer. The port on the license monitoring server that is specified for this computer.
SD Server Port
SD Server Unique ID
LM Server Port
527
Hardware Information
LM Server Unique ID
The unique ID of the license monitoring server assigned to this agent. The ID stays constant even when the servers network address changes. The interval, in minutes, in which the Absolute Manage Agent checks for changes to the license specifications on the license monitoring server. The local port on which the agent can be reached by the server. The time, in seconds, which the agent waits for responses from the server before it considers a connection attempt to have failed. Whether this agent is set to check for operating system and software patches from Apple or Microsoft and install them using Absolute Manages software distribution feature. This information item displays True if the Use only Absolute Manage for OS updates option in the Agent Settings dialog is checked for the agent, i.e., if the client computer receives operating system updates only through Absolute Manages patch management and not through Software Update (Mac OS X) or Windows Update (Windows), respectively. Is this computer currently being monitored via Absolute Manages computer tracking feature? The Custom Fields category contains all custom information fields for desktop devices that have been defined on the currently connected server. The exact contents of this category and the functions of the individual fields depend entirely on the specific local configuration of the site and cannot be described further here.
Computer Is Tracked
Custom Fields
NOTE Double-clicking a custom information item in the Information Items window lets you edit its specifications.
Hardware Information
Information items in the Hardware Information section contain information on the client computer hardware. There are nine subcategories:
Absolute Manage User Guide
System Information (page 529) Memory Slots (page 537) Volumes (page 538) ATA Devices (page 539) SCSI Devices (page 540) FireWire Devices (page 541) USB Devices (page 541)
528
Information items
System Information
The System Information category contains information on the computer itself (as opposed to installed and peripheral devices.)
CPU Information
The CPU Information subcategory contains processor-related information. Physical Cores The total number of main processor cores installed in the computer.
NOTE Due to a limitation in Windows, Absolute Manage cannot report physical cores that have been disabled during the boot process or in Task Manager.
Active Cores
The number of currently enabled main processor cores in the computer. This number may be lower than Physical Cores, above, when individual cores are disabled, e.g., to lower power consumption.
NOTE Due to a limitation in Windows, Absolute Manage cannot report processors that have been disabled in Task Manager.
Physical Processors
The number of physical main processors installed in the computer. Only physically discrete processors are counted; a processor supporting hyperthreading or multiple cores is counted as one processor.
NOTE Due to a limitation in Windows, Absolute Manage cannot report processors that have been disabled during the boot process or in Task Manager.
Cores per Processor Processor Speed Processor Type Processor Vendor Processor Is 64-bit Processor ID String
How many cores does the main processor have? The processors clock rate. The main processors series and version. The main processors manufacturer. Is the main processor a 64-bit processor. Intel-compatible processors only: The processor type string as reported by the operating system.
529
Hardware Information
Processor Architecture
A string briefly describing the basic processor type (Intel, AMD, or PowerPC) and data word size (32 bit or 64 bit). The size of the processors level 1 cache for data.
Processor L1 Data Cache Processor L1 Instruction Cache Processor L2 Data Cache Processor L2 Instruction Cache Processor L3 Cache Bus Speed Processor Family
The size of the processors level 3 cache. The clock speed the processors front-side bus. The family ID of the main processor, as specified by the manufacturer. This information is not available for PowerPC-based Macintosh computers. The model ID of the main processor within its family, as specified by the manufacturer. This information is not available for PowerPC-based Macintosh computers The stepping ID of the main processor within its model, as specified by the manufacturer. This information is not available for PowerPC-based Macintosh computers Does the processor support the MMX instruction set? Does the processor support the 3DNow instruction set? Does the processor support the SSE instruction set? Does the processor support the SSE2 instruction set? Does the processor support the SSE3 instruction set? Does the processor support hyperthreading?
Processor Model
Processor Stepping
Processor Has MMX Processor Has 3DNow Processor Has SSE Processor Has SSE2 Processor Has SSE3 Processor Supports Hyperthreading Processor Hyperthreading Enabled
NOTE Due to a limitation in Windows, Absolute Manage may misreport hyperthreading to be off when processors have been disabled in Task Manager.
530
Information items
Battery Information
The Battery Information subcategory contains information related to the batteries of administered laptops. AC Charger Connected Laptops only: Is the laptops AC power adapter currently providing mains power? Laptops only: Is the laptops AC power adapter currently charging the laptops battery? Laptops only: Is a battery currently present in this laptop? Laptops only: Is the laptops battery currently reported by the computer as being fully charged? Laptops only: The rated original capacity of the battery in mAh (milliampere-hours). Laptops only: The current maximum capacity of the battery in mAh (milliampere-hours), as reported by the laptops power management. Laptops only: The currently remaining power in the battery in mAh (milliampere-hours), as reported by the laptops power management. Laptops only: The batterys current maximum capacity as a percentage of its original rated capacity. Laptops only: The total number of load cycles of this battery, as reported by the laptops power management. Windows laptops only: The basic type of the laptops battery (e.g., Lithium Ion). Laptops only: The manufacturer of the battery. (This information is not available for PowerPC-based Macs.) Laptops only: The date when the battery was manufactured. (This information is not available for PowerPC-based Macs.) Laptops only: The device name of the battery as provided by the operating system. Laptops only: The serial number of the battery. (This information is not available for PowerPC-based Macs.) Laptops only: The current temperature of the battery in degrees Celsius.
AC Charger Charging
Original Battery Capacity Maximum Battery Capacity Remaining Battery Capacity Battery % of Original Capacity Battery Load Cycles
Battery Type
Battery Manufacturer
Battery Temperature
531
Hardware Information
Power Management
The Power Management subcategory contains information related to the power management settings and capabilities of administered computers. Power-on Avg/Day The average number of hours that the computer has been powered up per day. (The average is calculated for the entire period during which Absolute Manage has monitored this computer.) The average number of hours that the computer has been powered up per week. (The average is calculated for the entire period during which Absolute Manage has monitored this computer.) The average number of hours that the computer has been powered up per month. (The average is calculated for the entire period during which Absolute Manage has monitored this computer. A month is considered to have 30 days.) The average number of hours that the computer has been powered up per year. (The average is calculated for the entire period during which Absolute Manage has monitored this computer. A year is considered to have 365 days.) The average number of hours that the computer has been powered up yesterday. (This information is only available if Absolute Manage has started monitoring this computer before yesterday.) The average number of hours that the computer has been powered up during the last seven calendar days. (This information is only available if Absolute Manage has started monitoring this computer more than seven days ago.) The average number of hours that the computer has been powered up during the last 30 calendar days. (This information is only available if Absolute Manage has started monitoring this computer more than 30 days ago.) The average number of hours that the computer has been powered up during the last 365 calendar days. (This information is only available if Absolute Manage has started monitoring this computer more than 365 days ago.) The date when Absolute Manage has started tracking this computers power management. The number of minutes of inactivity before the administered computer is set to go to sleep. Windows only: The number of minutes of inactivity before the administered computer is set to go into hibernation.
Power-on Avg/Week
Power-on Avg/Month
Power-on Avg/Year
Power-on Yesterday
532
Information items
The number of minutes of inactivity before the administered computer is set to spin down the hard disks. The number of minutes of inactivity before the administered computer is set to turn off the display. The action the administered computer performs when the power button is pressed. This does not apply to Macintosh laptops. Windows only: The action the administered computer performs when the clamshell case is closed. This applies only to laptops. Windows only: The action the administered computer performs when the sleep button is pressed. Is the administered computer set to wake up when the power adapter is connected or disconnected? This applies only to laptops. Is the administered computer set to wake up when its clamshell case is opened? This applies only to laptops. Is the administered computer set to restart automatically after being affected by a power outage? Does the administered computer reduce the screen brightness after a certain period of inactivity, but before going to sleep? Is the display brightness automatically reduced when the computer is on battery power? Mac only: Do activities on remote terminal connections count as activities to reset the sleep timer? The kind of hibernation the computer enters when it goes to sleep. Is a UPS (uninterruptible power supply) connected to the administered computer?
Action on Power Button Action on Clamshell Close Action on Sleep Button Wake on AC Change
Wake on Clamshell Open Automatic Restart on Power Loss Display Sleep Uses Dim Display Reduces Brightness TTYs Keep Awake
NOTE Absolute Manage only detects a UPS when it has properly registered with the operating system.
Mac only: Is the administered computer equipped with a sudden motion sensor?
533
Hardware Information
PM Settings For
The type of power supply (e.g., battery or power adapter) to which the schedule applies. The scheduled action. The trigger for the action. The inactivity period in minutes after the specified action is to be performed. The time at which the specified action is to be performed. Is this scheduled to be performed only when no user is logged in?
The number of the power management schedule rules applied to a computer. If no power management is active on the computer, the value is 0. Note that this information does not apply to power management schedule records (as do the other information items in this subcategory) but to computer records.
Ungrouped fields
Physical Memory Computer Type The amount of actual RAM installed in the computer. For PCs, PC Compatible is displayed. For Macs, the exact model is displayed. The information string from the computers boot ROM. The exact contents and formatting of this string depends on the ROM vendor. The MAC address of the computers current primary network connection. The date and time of the computers internal clock. This information is current as of the last heartbeat contact from the agent with the Absolute Manage Server. It is not updated in real time. You can find out the difference between the clients local clock and the servers clock by comparing the Date & Time and Last Heartbeat information items: Both display the same point in time but the first a measured by the clients clock and the second as measured by the servers. Computer Production Date Computer Production Factory Macs only: The date when the computer was manufactured.
534
Information items
The date and time when the computer was last booted. The time since the computer was last booted, in hours and minutes. This information is current as of the last inventory update. To find out the uptime now, trigger an inventory update using the Gather Inventory Information command.
Computer Age
Macs only: The age of the computer, i.e., the time that has elapsed since its production. Intel-based Macs only: The version number of the computers SMC firmware. Macs only: The official product name Apple uses for this type of Macintosh.
SMC Version
NOTE The content of this information item, same as with the other Apple information items listed below, is downloaded from an Apple server, based on the client computers serial number. It is therefore available only if the client computer had a working Internet connection at least once after Absolute Manage Agent has been installed on it. All Apple information items listed below are updated every ten days as long as the client computer can reach Apples server.
Macs only: The date when the Macintosh was purchased, according to Apples files.
NOTE This information is retrieved from a server of the computers vendor and faces restrictions similar to those noted under Apple Product Name above. In addition, not all vendors provide this information. ,
535
Hardware Information
The date when the warranty for the computer will end. Expired warranties are listed with a value of n/a
NOTE This information is retrieved from a server of the computers vendor and faces restrictions similar to those noted under Apple Product Name above. In addition, not all vendors provide this information. ,
Unique Computer ID
Macs only: A UUID given the computer by Apple that uniquely identifies it. Windows only: The creation date of the computers BIOS, as stored in the BIOS. Windows only: The creator of the computers BIOS. Windows only: The version number of the computers BIOS. Windows only: The version number of the computers System Management BIOS. Windows only: The vendor of the mainboard used in the computer.
BIOS Date
Mainboard Manufacturer Mainboard Product Name Mainboard Serial Number Mainboard Type
Windows only: The type of the mainboard used in the computer, as specified by its vendor. Windows only: The version number of the mainboard used in the computer. Windows only: The asset tag of the computers main board. Windows only: The vendor of the computers case.
Mainboard Version
Mainboard Asset Tag System Enclosure Manufacturer System Enclosure Serial Number System Enclosure Type System Enclosure Version System Enclosure Asset Tag
536
Information items
Computer Manufacturer Computer Version Computer Model Computer Service Tag Computer Express Service Tag (Dell) Swap Space Total Swap Space Used Swap Space Free
Windows only: The version number of the computer system. Windows only: The model name of the computer system. Windows only: The service tag of the computer system. Dell systems only: The express service tag of the computer system.
The size of the swap space that is currently reserved on the hard disk. The current amount of data that has been swapped to disk. The amount of swap space that has been reserved but is currently unused. Macs only: Whether encryption for the swap file has been enabled. The number of slots for RAM on the computers motherboard. The number of RAM modules installed in the computer.
Swap Space Encrypted Memory Slots Memory Module Count Volume Count ATA Device Count
The number of volumes that are mounted on the computer. The number of ATA devices that are connected to the computer and powered on. The number of SCSI devices that are connected to the computer and powered on. The number of FireWire devices that are connected to the computer and powered on. The number of USB devices that are connected to the computer. The number of PCI cards that are installed in the computer. The number of display devices that are connected to the computer and have been recognized by it. The Memory Slots category contains information items related to individual memory slots. The label of the memory slot. The RAM size of the memory module installed in the slot. Macs only: The clock rate with which the memory module is accessed.
Absolute Manage User Guide
Memory Slots
Memory Slot Name Memory Size Memory Speed
537
Hardware Information
Memory Type
The general type of memory installed in the memory slot, such as SDRAM, DDR SDRAM, etc. The Volumes category contains information items related to individual volumes mounted on the administered computer. The name of the volume. (On Windows computers, this may be empty.) The formatted capacity of the volume. (Total space, whether free or used.) The file system with which the volume is formatted NTFS, FAT32, Mac OS Extended, etc. (See also Journaled, below.) The general type of volume hard disk, removable, or server.
Volumes
Volume Name
Size
Format
Volume Type
NOTE On Windows client computers, it is possible to recognize CD-ROMs and RAM disks. This information is not available on Mac OS X clients where these media are listed just as removable .
The unused capacity of the volume in absolute terms. The unused capacity of the volume as a percentage of the total formatted capacity. Windows only: The drive letter that is currently assigned to the volume. Windows only: The serial number of the volume. Macs only: The total number of objects files and folders, visible and invisible on the volume. This information is not available for server volumes. Macs only: The total number of directories both visible and invisible on the volume. This information is not available for server volumes. Macs only: The date and time when the volume was last formatted. Macs only: The date and time when the volume was last modified. Macs only: The date and time when the volume was last backed up. If no backup has yet been made, the date is n/a .
Folder Count
NOTE Not all backup applications set this date when they back up a volume.
538
Information items
Checked Date
Macs only: The date when the hard disk was last checked by a hard disk utility.
NOTE Not all such utilities set this date when they check a volume.
Is this the volume from which the computer has booted? Windows only: Is the data on this volume compressed by the operating system? Macs only: Is this volume journaled? Are file names on this volume case-sensitive? (I.e., would File.txt and file.txt considered to be two different names?) Macs only: Is this volume write-protected through a hardware setting? Macs only: Is this volume write-protected through a software setting?
Journaled Case-sensitive
NOTE Due to a limitation in the Mac OS, volumes that are write-protected by hardware, such as CD-ROMs, may be displayed as being writeprotected by software.
Macs only: The mount point of the volume on the computer. The ATA Devices category contains information items related to individual ATA devices connected to the administered computer. Only devices that are powered on are listed. The number of the ATA bus on which the device is located. The unit number of the ATA device on its bus. The company who has manufactured this ATA device. The model number of the ATA device, as specified by the manufacturer. The general type of the ATA device, such as hard disk, CD-ROM/DVDROM, etc. The serial number of the ATA device, as specified by the manufacturer.
ATA Devices
ATA Bus Number ATA Unit Number ATA Manufacturer ATA Model
539
Hardware Information
The status of the SMART hard disk monitoring system for the ATA device.
ATA Revision
The revision (version) number of the ATA device, as specified by the manufacturer. The type of ATA protocol used by the computer to communicate with this device. The formatted capacity of the ATA device. For removable drives, the formatted capacity of the current medium is given. In the case of CDs and DVDs, this may be significantly less than the maximum capacity of a medium of this type.
ATA Protocol
ATA Capacity
Macs only: The type of interface by which the ATA device is connected to the computer. Macs only: The name of the drive bay in which the ATA device is located. The SCSI Devices category contains information items related to individual SCSI devices connected to the administered computer. Only devices that are powered on are listed. The number of the SCSI bus on which the device is located. The SCSI ID of the device. The company who has manufactured this SCSI device. The model number of the SCSI device, as specified by the manufacturer. The general type of the SCSI device, such as hard disk, CD-ROM/DVDROM, etc. The revision (version) number of the SCSI device, as specified by the manufacturer. The formatted capacity of the SCSI device. For removable drives, the formatted capacity of the current medium is given. In the case of CDs and DVDs, this may be significantly less than the maximum capacity of a medium of this type.
SCSI Devices
SCSI Bus Number SCSI Unit Number SCSI Manufacturer SCSI Model
SCSI Revision
SCSI Capacity
The width, in bits, of the SCSI bus over which the device is connected.
540
Information items
FireWire Devices
FireWire Manufacturer FireWire Model
The FireWire Devices category contains information items related to individual FireWire devices connected to the administered computer. Only devices that are powered on are listed. The company who has manufactured this FireWire device. The model number of the FireWire device, as specified by the manufacturer. Macs only: The revision (version) number of the FireWire devices firmware, as specified by the manufacturer. Macs only: The version of the core FireWire software that is integrated in the firmware. Macs only: The maximum speed of the FireWire bus over which the device is connected. The formatted capacity of the FireWire device. For removable drives, the formatted capacity of the current medium is given. In the case of CDs and DVDs, this may be significantly less than the maximum capacity of a medium of this type.
FireWire Capacity
The ID number for the vendor of the FireWire device. The ID that the devices vendor has assigned to this type of model. The USB Devices category contains information items related to individual USB devices connected to the administered computer. The company who has manufactured this USB device. The model name of the USB device, as specified by the manufacturer. The serial number of the USB device, as assigned by the manufacturer.
USB Devices
USB Vendor USB Model USB Serial Number
The highest power draw, measured in mA (milliampere), that this device can have.
NOTE This value is taken from the devices firmware. Depending on how accurately the manufacturer specifies this value, the actual peak consumption may exceed this value.
541
Hardware Information
NOTE The device may not actually be able to transfer data at this rated speed.
USB Capacity
Macs only: The nominal data capacity of a USB device. If the device does not store data, its capacity is given as n/a .
NOTE Some data storage devices do not properly announce their capacity, in which case the information item also contains n/a .
Macs only: The ID number for the vendor of the USB device. Macs only: The ID that the devices vendor has assigned to this type of model. The version of the USB product, as specified by the manufacturer. An identifier for the protocol that the USB device uses to communicate with its driver. The meaning of the identifier depends on the USB device. The general type of the USB device, e.g. hub or mouse. An identifier to distinguish different subtypes of one type of USB device. The PCI Devices category contains information items related to individual PCI cards installed in the administered computer. The name of the PCI device, as specified by the manufacturer. The general type of the PCI device, e.g., display (graphics card). Macs only: The label of the PCI slot in which the device is installed. Macs only: The revision (version) of the PCI devices firmware, as specified by the manufacturer. The ID number for the PCI device model. The ID number for the vendor of the PCI device. The revision of the PCI devices firmware. The Displays category contains information items related to individual displays connected to the administered computer. Only displays that have been recognized by the computer are listed.
PCI Devices
PCI Name PCI Type PCI Slot PCI ROM Revision
Displays
542
Information items
Display Type
NOTE This information item may display CRT for LCD displays connected to an analog interface.
Display Vendor Display Product Name Display Manufacture Date Display Serial Number Resolution
The manufacturer of the display. The model name of the display. The date on which the display was produced.
The serial number of the display. The current horizontal and vertical size of the display, in pixels.
NOTE This information item displays the current setting. It does not, e.g., display the natural resolution of an LCD display if it is set to a different resolution.
The color depth to which the display is set, expressed as bits per pixel. The screen refresh rate to which the display is currently set. Is this the computers main display? (On Mac OS X computers, the main display is the one containing the menu bar; on Windows computers it is the one with the Start menu.) Macs only: Is this display currently being mirrored? Whether the frame buffer is connected to a monitor. Whether the display is an internal display, i.e., built into the computer. Macs only: Is Quartz Extreme active for this display? The amount of video RAM being used for this display. Macs only: The internal serial number of the display device. This is usually, but not always, the same number as Display Serial Number, above. Macs only: The ID number for the display model. The model name of the video card to which the display is connected.
Mirror Display Online Display Is Built-in Quartz Extreme VRAM Size Display Serial Number (internal)
543
Software Information
Software Information
Information items in the Hardware Information section contain information on the operating systems on the client computers, their network settings, processes, and files. There are seven subcategories: System Information (page 544) Network Adapters (page 550) Fonts (page 552) Printers (page 552) Startup Items (page 553) Windows Services (page 553) Installed Software (page 554) Missing OS Patches (page 555) Processes (page 555) Files (page 557) Registry Entries (page 559) Computer Tracking (page 560)
System Information
Computer Name Current User Name
The System Information category contains information on the operating system and its settings.
The name of the computer, as defined in the operating system. The full name of the user who is currently logged in on the computer. If no user is logged in, an empty string is displayed. (For example, Jane Doe .) The name of the current users account under which he or she is logged in. (For example, janedoe on a Mac or COMPUTER/ JaneDoe on Windows.) Whether the currently logged-in user has administrator rights on the computer. The name of the account under which the current user is logged in on the computer. If no user is logged in, the name of the account of the last user who was logged in is displayed. The full name of the user who is currently logged in on the computer. If no user is logged in, the name of the user who was last logged in is displayed. The time for which the client computer had been idle when its information was last updated on the Absolute Manage Server. The general type and flavor of the operating system, e.g., Windows XP Professional or Mac OS X. The operating systems version number.
Idle Time
OS Platform
OS Version
544
Information items
The build number of the operating system. Windows only: The latest operating system service pack installed on the computer. The user interface language of the operating system. For singlelanguage operating systems like standard Windows XP installation, this is the installed language. For operating systems that can change the interface language dynamically, like Mac OS X or Windows Vista, this is the currently chosen language. Windows only: The date when this copy of the operating system was installed. Windows only: Whether this copy has already been activated. This information item does not apply to Windows 2000. Windows only: The end of the grace period before which the operating system must be activated. This information item does not apply to Windows 2000. Windows only: The serial number of this copy of the operating system. Windows only: The serial number of the individual copy of the operating system on this computer. This is the ID number that is displayed in the System control panels General tab.
OS Language
OS Installation Date
OS Activated
OS Is VolumeLicensed
Windows only: Whether this copy of the operating system has been activated as part of a volume license. This information item applies to the same operating systems as the OS Activated information item described above. Windows only: The unique ID that Windows generates for use with Active Directory and other security-related purposes. Windows only: The type of virtual machine inside which the agent is running. Absolute Manage can currently identify Parallels, Virtual PC, and VMware. If the agent is not running inside a virtual machine, native is reported. The name of the computer as specified in Active Directory. The name of the Active Directory organizational unit to which the computer belongs. The path of the Active Directory organizational unit to which the computer belongs. The name of the Active Directory organizational unit to which the computers current user belongs.
Security Identifier
Virtual Machine
AD Computer Name AD Computer Organizational Unit AD Computer Organizational Unit Path AD User Organizational Unit
545
Software Information
The path of the Active Directory organizational unit to which the computers current user belongs. The Active Directory groups to which the computers current user belongs. Multiple groups are separated by commas. The Active Directory groups to which the computer belongs. Multiple groups are separated by commas. Is there a NAT router between the computer and the Absolute Manage Server?
NOTE This information item indicates whether the client has a NAT connection as viewed from the Absolute Manage Server, not as viewed from the Internet.
Macs only: The version of Darwin that is part of the operating system. Is daylight-saving time in effect on the computer? The difference between UTC (Universal Time, commonly known as GMT) and the computers clock. Windows only: Is Windows Defender installed on this computer? Windows only: Is Windows Defender currently enabled on this computer? Windows only: Is Windows Defenders real-time protection enabled on this computer? Windows only: Is Windows Defender automatic scanning feature enabled on this computer? Windows only: The version number of the Windows Defender software. Windows only: The version number of the malware definitions used by Windows Defender. Is fast switching between user accounts (i.e., without having to close all applications and logging out before using a different account) enabled on this computer? Is the operating systems built-in firewall enabled on this computer? Macs only: Is Personal File Sharing enabled on the computer? Macs only: Is file sharing for Windows enabled active on the computer?
Defender Real-Time Protection Defender Auto Scan Enabled Defender Engine Version Defender Definition Version Fast User Switching Enabled
546
Information items
Personal Web Sharing Remote Login FTP Access Remote Apple Events
Macs only: Is Personal Web Sharing enabled on the computer? Macs only: Is remote login enabled on the computer? Macs only: Is FTP access enabled on the computer? Macs only: Is the Remote Apple Events service enabled on the computer? Macs only: Is Printer Sharing enabled on the computer? Macs only: Is Apple Remote Desktop remote management access (apart from screen sharing) enabled? Is screen sharing via Apple Remote Desktop or Microsoft Remote Desktop, respectively, enabled on the computer? Can this computer be remotely controlled via Timbuktu? Can this computer be remotely controlled via VNC? Can this computer be remotely controlled via PC Anywhere? Can this computer be remotely controlled via DameWare? Windows only: Is Remote Assistance enabled on this computer?
Remote Desktop Screen Sharing Timbuktu Access VNC Access PC Anywhere Access DameWare Access Allow Remote Assistance Allow Remote Control via Assistance Wake on LAN Enabled
Windows only: Is controlling this computer via Remote Assistance enabled? Macs only: Is Wake on LAN (waking from sleep on administrative network access) enabled on the computer? Macs only: Does this computer support Wake on LAN?
Is the local update utility of the operating system (i.e., Software Update on Macs and Windows Update on Windows computers) enabled on this client? Macs only, Mac OS X 10.5 or later: Whether Time Machine is currently set to make automatic backups. (This is equivalent to the master switch in the Time Machine control panel to be set to On.) Macs only, Mac OS X 10.5 or later: The status idle or performing a backup of Time Machine on this computer. Macs only, Mac OS X 10.5 or later: The name of the volume to which Time Machine is currently set to back up.
547
Software Information
Time Machine Latest Backup Time Machine Oldest Backup Time Machine Snapshot Count
Macs only, Mac OS X 10.5 or later: The time when the most recent Time Machine backup was performed. Macs only, Mac OS X 10.5 or later: The time when the first Time Machine backup was performed. Macs only, Mac OS X 10.5 or later: The number of snapshots in the Time Machine backup on this computer.
NOTE This is not the number of snapshots that Time Machine has taken but only the number of those that are currently retained. For example, Time Machine takes hourly backups but after a day or so discards all of a days backups except for one.
Time Machine Disk Size Time Machine Disk Free Inventory Received
Macs only, Mac OS X 10.5 or later: The formatted capacity of the Time Machine backup disk. Macs only, Mac OS X 10.5 or later: The current unused capacity of the Time Machine backup disk. The time when the most recent contact regarding inventory information was made with this agent. (Note that the contact may also have been a notification by the agent that nothing has changed since the last contact.). The time when the most recent update of the inventory information for this computer was performed on the Absolute Manage Server. The time when the most recent update of the installed font information for this computer was performed on the Absolute Manage Server. The time when the most recent update of the printer information for this computer was performed on the Absolute Manage Server. Macs only: The time when the most recent update of the startup item information for this computer was performed on the Absolute Manage Server. The time when the most recent update of the installed software information for this computer was performed on the Absolute Manage Server. The time when the most recent update of the missing patches information for this computer was performed on the Absolute Manage Server. Windows only: The time when the most recent update of the Windows services information for this computer was performed on the Absolute Manage Server.
Inventory Updated
548
Information items
The time when the most recent update of the computer tracking information for this computer was performed on the Absolute Manage Server. The time when the most recent update of the process information for this computer was performed on the Absolute Manage Server. The time when the most recent update of the custom information items for this computer was performed on the Absolute Manage Server. The number of active network adapters currently of the computer.
The number of fonts installed on the computer that are included in the Fonts table in the Absolute Manage database.
NOTE Collecting or updating font information is not automatic but has to be explicitly triggered by the Gather Inventory Information command with the option Include font information checked.
Printer Count
The number of printers defined on the computer that are included in the Printers table in the Absolute Manage database.
NOTE Collecting or updating printer information is not automatic but has to be explicitly triggered by the Gather Inventory Information command with the option Include printer information checked.
Macs only: The number of startup items on the computer that are included in the Startup Item table in the Absolute Manage database.
NOTE Collecting or updating startup item information is not automatic but has to be explicitly triggered by the Gather Inventory Information command with the option Include startup item information checked.
Windows only: The number of services from this computer that are included in the Absolute Manage database.
NOTE Collecting or updating service information is not automatic but has to be explicitly triggered by the Gather Inventory Information command with the option Include service information checked.
549
Software Information
The number of installed software items from this computer that are included in the Installed Software table in the Absolute Manage database.
NOTE Collecting or updating installed software information is not automatic but has to be explicitly triggered by the Gather Installed Software command.
The number of operating system software patches missing from this computer.
NOTE Collecting or updating information about installed (or missing) patches is not automatic but has to be explicitly triggered by the Gather Installed Software command.
Process Count
The number of processes running on the computer that are included in the Processes table in the Absolute Manage database.
NOTE Collecting or updating process information is not automatic but has to be explicitly triggered by the Gather Process Information command.
File Count
The number of files located on the computer that are included in the Files table in the Absolute Manage database.
NOTE Collecting or updating file information is not automatic but has to be explicitly triggered by the Find File command. Only files found by this command are stored in the Absolute Manage database, not all files on searched target computers.
Network Adapters
Adapter Name Adapter IP Address Adapter Subnet Mask Adapter MAC Address Router Address DHCP Server Address
The Network Adapters category contains information on the active network adapters of a computer. (Active adapters are those currently assigned an IP address.) The label of the network adapter, e.g., Ethernet or AirPort. The IP address assigned to the network adapter. The subnet mask assigned to the network adapter. The MAC address of the network adapter. The IP address of the router assigned to the network adapter. The IP address of the DHCP server, if any, that currently supplies the IP address to the network adapter.
550
Information items
DNS Servers
The IP addresses of all DNS servers which the network adapter is set to contact to resolve names into IP addresses. If multiple DNS servers are specified, their IP addresses are separated by commas. Macs only: The default search domains specified for the network adapter. If multiple domains are specified, they are separated by commas. The way in which the network adapter has been configured, e.g., DHCP or manually. Macs only: The general type of TCP stack in use on the network adapter. Is this the network adapter currently being used as the main IP interface of this computer? The logical name of the network adapter. Whether the network link on this network adapter is up or down. The nominal data rate on this network adapters current connection. Macs only: Is the network adapter currently operating in full duplex mode (as opposed to half duplex)?. Macs only: The MTU (maximum transmission unit) size that is currently specified on the network adapter. The manufacturer of this network adapter. The hardware category of the network adapter. Windows only: The scope ID that is set for this network adapter. Windows only: The TCP domain that is currently assigned to this network adapter. Windows only: The name that is displayed for this computer in the network connected to this network adapter. Windows only: The mode for resolving WINS (Windows Internet Name Service) addresses specified for this network adapter. Windows only: The servers specified on this network adapter for resolving WINS addresses. Windows only: Can this computer use DNS in addition to WINS to resolve network addresses in the network connected to this adapter? Windows only: Can this computer use the LMHOST file to resolve network addresses in the network connected to this adapter?
Search Domains
Configuration Type
TCP Implementation
Primary Interface
MTU
Host
WINS Resolution
WINS Server
551
Software Information
Fonts
The Fonts category contains information on the fonts installed on a computer. NOTE The information items in this category do not list all fonts on administered computers but only those that have explicitly been collected by means of the Gather Inventory Information command with checked option Include font information .
The name of the font. The general font format, such as bitmap, TrueType, PostScript, etc. The type sizes in which this font is available. This is relevant only for bitmap fonts; for vector fonts, All Sizes is displayed. The Printers category contains information on the printers defined on a computer.
Printers
NOTE The information items in this category do not list all printers on administered computers but only those that have explicitly been collected by means of the Gather Inventory Information command with checked option Include printer information .
The name under which the printer is defined. A description of the make and model of the printer. The location of the printer, as specified in the printer definition. If the user did not specify a location, some drivers provide default location information. If the printer is connected to a print server, this is the network name or address of the server. Otherwise, the localhost is displayed. Macs only: The current state of the printer. Is this the default printer on the administered computer? Is this the printer connected via a print server? Macs only: Does this printer support PostScript (Adobe PostScript or an emulation)? Macs only: The version number of the printer driver used for this printer. This information is not available for all printer drivers. Macs only: The uniform resource identifier of the printer. The locally unique ID that the operating system assigns to the printer.
552
Driver Version
URI Printer ID
Absolute Manage User Guide
Information items
Startup Items
The Startup Items category contains information on the startup items specified on a computer. This category applies only to administered Mac OS X computers. NOTE The information items in this category do not list all startup items on administered computers but only those that have explicitly been collected by means of the Gather Inventory Information command with checked option Include startup item information .
Macs only: The file name of the startup item. Macs only: The name of the service that the startup item offers. Macs only: A brief description of the startup item, supplied by the startup items developer in the file. Macs only: The path of the startup items file. Macs only: any other services that this startup item requires. The Windows Services category contains information on the services available on a computer. This category applies only to administered Windows computers.
Windows Services
NOTE The information items in this category do not list all services on administered computers but only those that have explicitly been collected by means of the Gather Inventory Information command with checked option Include service information .
Windows only: The internal name of the service. Windows only: The name of the service as it is displayed to the user. Windows only: A brief description of the service, supplied by the services developer in the file. Windows only: The current operating state of the service (started or stopped). Windows only: The startup type currently set for the service (automatic, manual, or disabled). Windows only: The user account in which the service is running. Windows only: The location on the clients hard disk of the services executable file.
Service Status
553
Software Information
Installed Software
The Installed Software category contains information on installed software that has been found by the Gather Installed Software command. NOTE For summary information on installed software, see Installed Software Statistics on page 577.
Inst. Software Name Inst. Software Company Inst. Software Version String Inst. Software Version Number Inst. Software Size Inst. Software Installation Date Inst. Software Info
The name of the software. Windows only: The name of the company that produced the software.
The version number of the software. This may be n/a if no valid version number can extracted from the version string (see above). The size of the installed software on the disk. The date when the software has been installed on the client computer.
Macs only: Additional information from the softwares version information file. Macs only: The instruction architecture used by the code contained in a file. This information is not available for installed software that has been found using installer receipts. The range of possible values is the same as for the File Architecture information item described on page 558.
Uninstallable
Windows only: Is there an uninstallation entry for the software on the client computer? Windows only: Is this software marked as a hotfix? The method by which Absolute Manage has found this software. The path of the software on the client computer. This information is not available for software that has been identified by its installer receipt. For Mac OS X software this is the softwares bundle identifier. For Windows software, it is the ID noted in the registry. Windows only: The company to which this product has been registered. (Which usually will be the name of your company or organization.) Windows only: The person to which this product has been registered.
Registered Owner
554
Information items
Installed By
Windows only: The name of the user account under which the software has been installed. Windows only: The command string that will be used by the installer for removing the software. (If and when it is so directed by a user.) The identifier of the installer receipt by which the software was identified. This information is available only for software that has been found through its installer receipt. The Missing OS Patches category contains information on operating system patches that are missing on client computers.
Uninstall String
Installer Receipt ID
Missing OS Patches
NOTE The information items in this category list only those missing operating system patches that have been collected by means of the Gather Installed Software command.
Missing Patch Name Missing Patch Version Missing Patch Release Date Missing Patch Install Deadline Missing Patch Is Mandatory Missing Patch Action
The name of the missing patch. The version number of the missing patch. Windows only: The date when Microsoft released this patch.
Windows only: The date recommended by Microsoft by which this patch should be installed. Windows only: Whether Microsoft has marked this patch as mandatory. Windows only: Whether this patch includes an install or an uninstall action. Windows only: Is this patch marked as beta-level software? Windows only: Whether a later patch is available that supersedes this patch. Windows only: The operating system language for which this patch is intended. The Processes category contains information on the processes running on a computer.
Missing Patch Is Beta Missing Patch Superseded by Package Missing Patch Language
Processes
NOTE The information items in this category do not list all processes on administered computers but only those that have explicitly been collected by means of the Gather Process Information command.
555
Software Information
Process Name
The name of the process. The names of zombie processes on Mac OS X are enclosed in parentheses. Macs only: The file type code of the file from which the process has been launched.
NOTE Not all files on Mac OS X computers have file type codes.
Macs only: The file creator code of the file from which the process has been launched.
NOTE Not all files on Mac OS X computers have file creator codes.
The ID number of the process. The ID of the user account from which the process was launched. The name of the user account from which the process was launched. Windows only: The ID of the session to which the process belongs. This applies only to PCs with multiple users. The path the to file from which the process has been launched.
Process Architecture
Macs only: The instruction architecture used by the process, Intel or PowerPC. Macs only: The ID of the group to which the user account belongs from which the process was launched. Macs only: The name of the group to which the user account belongs from which the process was launched. The ID number of the process that has launched this process. The name of the process that has launched this process. Macs only: The process real user ID, i.e., the ID of the user who launched the process. Macs only: The process real username, i.e., the account name of the user who launched the process. Macs only: The process real group ID, i.e., the ID of the group to which the user belongs who launched the process.
Group ID
Group Name
Real Username
Real Group ID
556
Information items
Macs only: The process real group name, i.e., the name of the group to which the user belongs who launched the process. The date and time when the process was launched. Macs only: Is this process an interfaceless background process? Windows only: The amount of virtual memory that has been allocated to the process. Windows only: The number of threads of which this process consists. Windows only: The number of page faults that this process has generated since it has been launched. Windows only: The priority that the process has on the computer, from 0 through 31. Higher numbers denote higher priorities. The Files category contains information on the files and folders that have been found on a computer.
Process Priority
Files
NOTE The information items in this category do not list all files and folders on administered computers but only those that have explicitly been searched for by means of the Find File command.
The name of the file, including any extensions. The path of the file, including the file name. Macs only: The type code of the file.
NOTE Not all files on Mac OS X computers have file type codes.
File Creator
Macs only: The unique identifying string for the file bundle, if any. (For example: com.apple.systempreferences.)
NOTE Not all files on Mac OS X computers have file creator codes.
The amount of data in the file. The date and time when the file was first created.
557
Software Information
The date and time when the file was last modified. The date and time when the file was last opened. Macs only: The date and time when the file was last backed up.
NOTE Some backup utilities may not set this date when backing up a file.
File Version
NOTE When you use the File Version information item in specifications for smart groups and for other comparison purposes, Absolute Manage uses the comparison string to determine the operating system platform you target: If the version number you specify to compare the information items contents with has fewer than three dots, it is considered a Mac OS X version. With three dots, Absolute Manage assumes it to be a version of a Windows file. It is not possible to specify a search condition that works on both platforms.
Macs only: A textual description of the file version that is available for some files. This information item can sometimes help to differentiate between two different versions with the same version number or provide version information when no proper version number is available. The build number of the file, as stored in the file. Macs only: The instruction architecture used by the code contained in a file. This information is available only for executable files. These values are supported: Universal (Intel, PowerPC) Universal (Intel, PowerPC/64bit) Universal (Intel, PowerPC, PowerPC/64bit) Universal (PowerPC, PowerPC/64bit) Intel PowerPC PowerPC/64bit PowerPC (CFM) Shell Script Classic Unknown
Unix Permissions
Macs only: The read, write and execute permissions set for the file, in both letter and numeric notation. Macs only: The user account who is the files owner. Macs only: The user group to which the file is assigned.
558
Information items
Is Alias Is Application
Is this file an alias (or, on Windows, a shortcut)? Is this file an application file (including Mac OS X application packages)? Macs only: Is this file an application file that must run in the Classic environment? Is this a file (as opposed to a package or a folder)? Macs only: Is this a Unix hard link file? Is this file marked as being invisible? Macs only: Is this file locked against modification? Macs only: Is this file currently open? Macs only: Is this file a Mac OS X package (a folder looking like a file)? Macs only: Is this file marked as stationery? Macs only: Is this a Unix symbolic link file? Macs only: Is this file an application that can be controlled through AppleScript? Macs only: Does this file have a custom icon (an icon for this file only, as opposed to an icon for all files of this type)? Has this file been found during the last update of file information for this computer? The last time that this file record was modified.
Is Classic App
Is File Is Hard Link Is Invisible Is Locked Is Open Is Package Is Stationery Is Symbolic Link Is Scriptable
File Found
Registry Entries
The Registry Entries category contains information on the registry entries that have been found client computers.
NOTE The information items in this category do not list all registry entries on administered computers but only those that have explicitly been searched for by means of the Search Windows Registry command.
Windows only: The name of the found registry entry. Windows only: The data type of the found registry value. For registry keys, this is n/a . Windows only: The data of the found registry value. For registry keys, this is n/a .
Registry Value
559
Software Information
Windows only: The path of the found registry entry in the registry. Windows only: The data of the found registry value if the value has the type Number. Windows only: The data of the found registry value if the value has the type String. Windows only: The data of the found registry value if the value has the type Binary. Windows only: Whether the specified registry entry was actually found on the target computer. When searching registries, it is possible to specify that an entry with the value No in the Registry Entry Found information item is added for a computer on which the specified entry was not found. Windows only: The date and time when this registry record in the Absolute Manage database was last updated. The Computer Tracking category contains information on tracked client computers.
Computer Tracking
Tracked Computer Time Stamp Tracked Computer Address Tracked Computer Router Address Tracked Computer Public Address Tracked Computer GMT Delta Tracked Computer Current User Name Tracked Computer Current User Account Tracked Computer Resolved Address Tracked Computer Resolved Router Address
The date and time (according to the Absolute Manage Servers clock) of the last contact with the tracked computer. The IP address that the tracked computer currently has in the local network in which it is located. The IP address of the router that the tracked computer is currently using. The IP address that the tracked computer currently has in the Internet.
The current time difference between the tracked computers internal clock and universal time (GMT). The name of the current user who is active on the tracked computer. (See Current User Name on page 544.) The full name of the account that is currently active on the tracked computer. (See Current User Account on page 544.) The DNS name that the tracked computer currently has in the local network in which it is located. The DNS name of the router that the tracked computer is currently using.
560
Information items
The DNS name that the tracked computer currently has in the Internet.
The date and time (according to the tracked computers local clock) of the last contact with the tracked computer.
Commands
Information items in the Commands section contain information on related to commands that you have issued to the clients. There are three subcategories: Commands (page 561) Command Queue (page 561) Command History (page 562)
Commands
The Commands category contains information item related to commands sent from Absolute Manage Admin to administered computers. They can be used only in the Commands window. The name of the command. This is the menu item in the Commands menu with which the command is initiated. The description of the command, as entered in the Command description field in the command scheduling dialog. If the command has no individual description, a default description is displayed. Whether this command has been marked as a repeating command in its Options dialog. The interval in which the command is specified to be executed. The unit for the execution interval (see Interval, above). The date and time when the command was entered in the command queue (when the Execute button in the command window was clicked). The Command Queue category contains information items related to commands sent from Absolute Manage Admin to administered computers that have not yet been completed. They can be used only in the Queued Commands view of the Commands window and other smart groups in that window that display queued (not yet completed) commands. The date and time when the command is scheduled to be executed. In the case of deferred commands, this time may lie in the past. The current execution status of the command scheduled, deferred, or executing.
Command Name
Command Description
Command Queue
Scheduled Time
Command Status
561
Server Center
Command History
The Command History category contains information item related to commands sent from Absolute Manage Admin to administered computers that have been completed. They can be used only in the History, Failed Commands, and Commands in Last 24 Hours views of the Commands window as well as in other smart groups in that window that display completed commands. The date and time when the execution of the command has started. The date and time when the execution of the command was completed. The success or otherwise of the command execution.
The error that was generated by the command. If the command was executed successfully, this is No error . Additional information on the nature of the error that is available for some errors.
Server Center
Information items in the Server Center section contain information on software distribution, license monitoring, and administrator accounts. There are three subcategories: Administration (page 562) Software Distribution (page 565) License Monitoring (page 572) Computer Groups (page 575)
Administration
Information items in the Administrators category contain information on the administrators assigned to computers. There are three subcategories: Administrators (page 562) Appointments (page 565) Active Directory Users (page 565)
Administrators
The Administrators category contains information about administrator accounts. They can be used only in the Server Center window. Administrator Name The account name of this administrator account. This information item can also be added to tables that list managed computer or mobile devices. In that case, it lists the administrators that are appointed to manage the devices. Is Superadmin
Absolute Manage User Guide
Information items
Is is possible to manage all administered computers and mobile devices from this administrator account, even those to which the account is not expressly assigned? Can users currently log in to this administrator account? (That is, is the account currently enabled?) Can Absolute Manage Agents be installed and other Agent Deployment Center functions be used by this administrator account? Can the software distribution settings be displayed using this administrator account? Can the license monitoring settings be displayed using this administrator account? Can the administrator settings be displayed using this administrator account? Can custom information field definitions be displayed using this administrator account? Can the server status be displayed using this administrator account? Can the Commands window be opened using this administrator account? Can computer tracking information be displayed using this administrator account? Can screenshots taken as part of the computer tracking be displayed using this administrator account? Can server settings be modified using this administrator account? Can custom information field definitions be modified using this administrator account? Can the contents of custom information fields be edited using this administrator account? Can software packages be edited using this administrator account?
Account Enabled
Deploy Agents
View Software Distribution Settings View License Monitoring Settings View Administrator Settings View Custom Information Fields View Server Status View Commands Window View Computer Tracking Data View Computer Tracking Screenshots Modify Server Settings Modify Custom Information Fields Enter Custom Field Data Modify Software Packages Modify Disk Images
Can disk images for the Software Distribution Center be edited using this administrator account? Can computer groups be edited using this administrator account?
563
Server Center
Reset Software Packages Retry Software Packages Remove SD Log Entries Modify License Specifications Remove License Reports Remove History Commands Change Command History Options
Can software packages be reset (as per the Reset Package command) using this administrator account? Can software packages be retried (as per the Retry Package command) using this administrator account? Can software distribution log entries be deleted using this administrator account? Can license specifications be edited using this administrator account?
Can entries in the reports in the License Monitoring Center be deleted using this administrator account? Can entries in the command history be deleted using this administrator account? Can the options for recording a command in the command history (in the commands Options dialog) be edited using this administrator account? Can computer records be deleted from browser windows using this administrator account? Can inventory data for computers be deleted using this administrator account? Can computer tracking settings be edited from this administrator account? Can making screenshots as part of the computer tracking be enabled from this administrator account? Can remote controlling of administered computers be initiated from this administrator account? Can this administrator change settings for managed mobile devices and send commands to them? Can this administrator create and edit mobile application packages?
Remove Computer Records Remove Inventory Data Change Computer Tracking Enable Computer Tracking Screenshots Remote Control
Manage Mobile Devices Modify Mobile Applications Modify iOS Configuration Profiles Modify Mobile Media
Can this administrator create and edit configuration profiles for iOS devices? Can this administrator create and edit configuration profiles for iOS devices? Can this administrator create and edit policies and smart policies for mobile devices?
564
Information items
Remove Mobile Device Records Remove Mobile Device History Commands View Mobile Device Tracking Data Change Mobile Device Tracking Change Agent General Settings Change Agent Server Settings Change Agent Client Info Settings Change Agent Custom Field Settings Is AD User
Can this administrator remove records for mobile devices from the Absolute Manage database? Can this administrator remove entries in the mobile device command history? Can this administrator see the geolocation information of managed mobile devices? Can this administrator enable and disable mobile device tracking?
Can settings in the General pane of the Agent Settings dialog be edited from this administrator account? Can settings in the Servers pane of the Agent Settings dialog be edited from this administrator account? Can settings in the Client Information pane of the Agent Settings dialog be edited from this administrator account? Can settings in the Custom Fields pane of the Agent Settings dialog be edited from this administrator account? Is this an Active Directory user account? (As opposed to a user account that has been created in Absolute Manage.)
Appointments
The Appointments category contains information about appointment groups. They can be used only in the Server Center window. Appointment Group Name The name of this appointment group.
Software Distribution
565
Server Center
Packages (page 566) Payloads (page 569) Distribution Points (page 570) Disk Images (page 571) Installation Status (page 571)
Packages
The Packages category contains information about software packages and metapackages. They can be used only in the Server Center window, for smart groups displaying software packages. Package Name Executable Payload The name of the software package. The name of the payload in the package that has been specified as being executable. Is this package a metapackage? The size of the installer specified in the package. The command-line options to use for the specified installer. The name of the volume, if any, of the target computers on which the software is to be installed. Whether the installation of this metapackage is to continue even if there is a failure installing one of the contained packages. (This information item applies only to metapackages, not standard packages.) The description of the software package that has been entered in the Software Package dialog. The earliest time when this package can be used for installations, as specified in the package. The general occasion on which this package is to be installed at any time, after the next restart, or after the next login. Is this package to be installed when a user is logged in at install time?
Is Metapackage Executable Size Executable Options Target Installation Volume Continue Installation After Failure
Package Description
Availability Date
Install At
Install When User Is Logged In Install When No User Is Logged In Install Time Start
If the package may be installed only during a certain time of the day, this is the beginning of the specified interval.
NOTE The content of this information item is disregarded when any Install Time Option other than Between has been chosen.
566
Information items
If the package may be installed only during a certain time of the day, this is the end of the specified interval.
NOTE The content of this information item is disregarded when any Install Time Option other than Between has been chosen.
The installation priority of the package. Which distribution point may be used for installing this software package any, preferably servers from the target computers local zone, or exclusively servers from the local zone? The user context in which this package is to be installed. The user account which is to be the context in which this package is to be installed. This information item is relevant only when the installation context is Other user . Does the installation of this software package require administrator privileges on the target computer? Will leave Absolute Manage Agent the downloaded installation files on the target computers hard disk instead of deleting it? Is the package available for pull-installation by the user (instead of the standard push-installation? Is this software package set to install only when there is at least a 100 Mbit/s connection to the target computer? When Absolute Manage is to download the payload to the client computers, before or after displaying any user dialogs. The operating system family Mac OS X or Windows for which this software package is intended. The earliest version of the operating system that supports the software package. The latest version of the operating system that supports the software package. The processor architecture (processor type and bit width) required by the installed software as specified in the software packages specification. The type of involvement by the local users of target computers allowed by the package.
Requires Admin Privileges Keep Package File After Installation Allow On-Demand Installation Dont Install on Slow Network Payload Download Time Target OS Platform
Minimum OS
Maximum OS
Platform Architecture
User Interaction
567
Server Center
The number of minutes after which the installation from the package is started automatically on a client if the notification dialog has not been answered by the user. The number of minutes for which the local user of a target computer can defer this installation.
NOTE If the interval is specified in the package in a unit other than minutes, it is converted to minutes in this information item.
Installation Deadline Display Installation Progress Action after Installation Close Install Notification After
The latest date by which the installation of the package must start. Whether Absolute Manage Agent is to display the progress of this packages installation. Which action, if any, is the agent to take after completing the installation? The time in minutes after Absolute Manage Agent automatically closes the notification dialog on the target computer if the local user does not acknowledge it. Whether Absolute Manage Agent is to display a notification before it restarts the computer after having installed this package. Whether the local user of the target computer can postpone the restart after the end of the installation. The interval in which Absolute Manage Agent is to display a restart notification while the local user of the target computer keeps postponing the restart. Is the local user of the target computer to be warned before the installation of this software package is the network connection is slower than 100 Mbit/s? Whether any conditions have been specified for the package that must be met before installation commences. See Installation Conditions on page 441 for details.
Restart Notification
Whether this package is a software update from Apple that has automatically been turned into a software package by the Software Distribution Center. Whether this package is a software update from Microsoft that has automatically been turned into a software package by the Software Distribution Center.
568
Information items
The version number of this software update. This information applies only to software packages created via the automated patch management. Macs only: Whether Apple recommends installing this software update. (This is equivalent to the update being checkmarked in the Software Update utility.) This information applies only to software packages created via the automated patch management. The operating system versions or subtypes for which this patch is intended (e.g., Mac OS X 10.4 or Windows XP). Windows only: The date when Microsoft released this patch. Windows only: The date recommended by Microsoft by which this patch should be installed. Windows only: Whether Microsoft has marked this patch as mandatory. Windows only: Whether this patch includes an install or an uninstall action. Windows only: Is this patch marked as beta-level software? Windows only: Whether this patch can be uninstalled using the Add/ Remove Software control panel. Windows only: Whether a later patch is available that supersedes this patch. Windows only: The operating system language for which this patch is intended. Windows only: Whether this patch must be installed by itself, i.e., not in one installation process together with other patches.
Patch Is Mandatory
Patch Action
NOTE Absolute Manage automatically handles such needs for exclusiveness; you do not need to do anything about it.
Windows only: Whether this patch must be uninstalled by itself, i.e., not in one uninstallation process together with other patches.
Payloads
The Payloads category contains information about payloads. They can be used only in the Server Center window, for smart groups displaying payloads. Payload Name The name of the payload, as specified in the Payload dialog.
569
Server Center
The name of the file contained in the payload. The download size of the payload contents. The current status of the process of uploading the payload to the distribution point. Whether the payload has been marked as being executable in the Payload dialog. Whether the software package is set to transfer all files from the specified installers folder for installations. The path on your disk of the file contained in the payload. An ID for identifying the payload. The ID is guaranteed to be unique in this installation of Absolute Manage. The notes that have been entered for this payload.
Is Executable
Payload Notes
Distribution Points
The Distribution Points category contains information about distribution points. They can be used only in the Server Center window, for smart groups displaying distribution points. Distribution Point Name Address Port The name of the distribution point, as specified in the Server Center.
The network address of the distribution point. The network port used by the Absolute Manage Agent on this distribution point. The unique ID of the distribution point, which stays constant even if tis renamed. The fingerprint of the certificate validating the identity of the distribution point. If the distribution point is set to provide software packages only to a specific range of IP addresses, this is the lower limit of that range. If the distribution point is set to provide software packages only to a specific range of IP addresses, this is the upper limit of that range. Is this distribution point set to serve only client computers to which it has explicitly assigned (by way of computer groups or IP ranges)? The maximum number of concurrent downloads that this distribution point is to support.
IP Range End
570
Information items
Current Load
The number of concurrent downloads currently in progress on this distribution point. Is this distribution point to support more than the specified maximum number of concurrent downloads if no other distribution points with free capacity are available? Is this distribution point set to be the master distribution point?
The operating system platform installed on the computer on the distribution point is running. The path to the folder containing the software installers on this distribution point. The limit to the download bandwidth that has been specified for this distribution point. If no limit has been set, n/a is displayed. The start time of the mirroring interval specified for this server. If no mirroring time limit has been specified, n/a is displayed. The end time of the mirroring interval specified for this server. If no mirroring time limit has been specified, n/a is displayed.
Download Bandwidth
Mirroring From
Mirroring Until
Disk Images
The Disk Images category contains information about disk image specifications. They can be used only in the Server Center window, for smart groups displaying disk images. Disk Image Name Disk Image Size Disk Image Upload Status Disk Image File Disk Image Distribution Point The name of the disk image specification. The size of the selected disk image file. Whether the disk image file is available on the distribution points.
The path of the selected disk image file. The setting of the Distribution point option in the disk image specification (which specifies from which distribution points the image may be downloaded).
Installation Status
The Installation Status category contains information about the status of installation processes initiated by the software distribution system. Installation Status The current status of the software installation.
571
Server Center
Deferred Until
If the software installation is deferred, the time when the next installation attempt will be made. The result of a completed installation.
The date and time when the log entry was made. Information items in the License Monitoring category contain information on the elements of the license monitoring system. There are five subcategories: License Specification (page 572) Purchase Tracking (page 573) License Status (page 574) License History (page 574) License History Summary (page 574) License Status per Agent (page 575)
License Monitoring
License Specification
The License Specification category contains information items related to license specifications. They can be used only in the Server Center window. License Specification Name Software Identified By Licenses Owned License Type The name of the license specification.
How the software to which the license applies is to be identified. The number of available licenses for this software. The type of license by installation, by concurrent use, or prohibited software. Whether all volumes of a target computer are to be scanned for the licensed software (Yes) or just the boot volume (No). Whether, in addition to the installed software, the running processes are to be checked as well for the licensed software. Whether Absolute Manage Agents are to terminate local copies of the software specified by this license if the number of floating licenses is exceeded. Whether Absolute Manage Agents are to forcefully terminate local copies of the software specified by this license. Whether Absolute Manage Agents are to delete local copies of the software specified by this license.
572
Information items
Whether the specified software is to be listed as missing when it is not found on a computer.
Purchase Tracking
The Purchase Tracking category contains information items related to purchase tracking data. They can be used only in the Server Center window; most of them correspond to items in the Purchase Tracking tab of the License Specification dialog. Purchase Type Purchase Date Purchase Count Purchase Price Purchase Software Version Purchase Order Number Purchase License Owner Purchase Vendor Name Purchase Vendor Reference Purchase Vendor Contact Purchase Vendor Support Purchase Maintenance Available Purchase Maintenance Begin Purchase Maintenance End Purchase Maintenance Price Purchase Maintenance Reference The kind of purchase. The date when the purchase happened. The number of licenses purchased. The price of the license purchase. The version of the software that was purchased.
The contract number or similar identification reference for the maintenance agreement, if any.
573
Server Center
Purchase Notes
Any additional notes that have been entered for the purchase record.
License Status
The License Status category contains information items related to the status of licenses. They can be used only in the Server Center window. Total Install Count The number of client computers on which the licensed software is installed. The number of client computers on which the licensed software is currently running. The overall time, in minutes, that the licensed software has been used on administered computers. The total number of times that the licensed software has been started on administered computers. The last date and time that the licensed software has been started on an administered computer. The current status of this license whether the use is within legal limits or exceeds them. The timestamp for the license status the exact date and time when the status was registered.
Total Launches
License Status
License History
The License History category contains information items related to historical license monitoring data. They can be used only in the Server Center window. Total Install Count The number of client computers on which the licensed software was installed when this license metering was taken. The number of client computers on which the licensed software was running when this license metering was taken. The status of this license whether the use was within legal limits or exceeded them at the time specified by the Status Timestamp information item. The date and time when this license metering was taken.
Status Timestamp
574
Information items
The smallest number of client computers with the licensed software installed that has been encountered in the license history. The average number of client computers with the licensed software installed throughout the license history. The largest number of client computers with the licensed software installed that has been encountered in the license history. The smallest number of client computers running the licensed software that has been encountered in the license history. The average number of client computers running the licensed software throughout the license history. The largest number of client computers running the licensed software that has been encountered in the license history. The date and time when this licensed software was first found.
The date and time when this licensed software was most recently found.
Running Count
Usage Time
Number of Launches
Report Date
Computer Groups
575
You can use this information item in the Server Center window when the Computer Groups category is selected and in any browser window displaying computer information. Computer Group The name of a computer group. If used in a browser window listing computers, the information item displays the name of a computer group to which the computer belongs.
Connection Status
Agent Port
Agent Status
576
Information items
Inst. Software Stat Name Inst. Software Stat Count Inst. Software Stat Company Inst. Software Stat Size Inst. Software Stat Info
The number of computers on which the installed software has been found. Windows only: The name of the company that produced the software.
The size of the installed software on the disk. Macs only: Additional information from the softwares version information file. Windows only: Is there an uninstallation entry for the software on the client computer? Windows only: Is this software marked as a hotfix?
Inst. Software Stat Uninstallable Inst. Software Stat Is Hotfix Inst. Software Stat Identification Type Inst. Software Stat Installer Receipt ID
The identifier of the installer receipt by which the software was identified. This information is available only for software that has been found through its installer receipt.
577
Compliance Reports
Missing Patch Stat Name Missing Patch Stat Version Missing Patch Stat Count Missing Patch Stat Release Date Missing Patch Stat Install Deadline Missing Patch Stat Superseded by Package Missing Patch Stat Language
The number of computers on which the patch has been found to be missing. Windows only: The date when the patch being summarized was released by Microsoft. Windows only: The date by which the patch being summarized should be installed, according to Microsofts recommendation. Windows only: Is a later patch available that supersedes the patch being summarized? Windows only: The language for which the patch being summarized is intended.
Compliance Reports
The Compliance Reports category contains information from the compliance reports that Absolute Manage has gathered on administered computers. This information is collected by the Gather Compliance Report command. These information items can be used in the Compliance Reports window. There are four subcategories: Reports (page 578) Computer Summary (page 579) Item Summary (page 579) Score Items (page 579)
Reports
Profile Name Compliance Check Start Date Compliance Check Finish Date Benchmark File Report Description
Absolute Manage User Guide
The Reports category contains information on the report parameters. The name of the profile on which the report is based. The date and time when Absolute Manage began gathering the report.
The date and time when Absolute Manage completed gathering the report. The report definition file chosen as the basis for this report. The description of the report from the chosen report definition file.
578
Information items
Computer Summary
Compliant
The Computer Summary category contains information on the overall results of the tested computer.
Whether the computer was found to be compliant, according to the rules in the report. The compliance score the computer achieved in the report. The date when the report was last changed in Absolute Manage Admin. This may be later than the date when the report was created. The name of the user account that was active on the administered computer when the report was compiled. The Item Summary category contains summary information on the score items included in the report. The maximum score that any of the tested computers achieved for this item. The average score achieved by all tested computers for this item.
Item Summary
Max. Achieved Score
The minimum score that any of the tested computers achieved for this item. The maximum score that can be achieved for this item. The number of computers that met the compliance criteria for this item. The number of computers for which the compliance testing for this item returned an error. The number of computers that were found to not meet the compliance criteria of this item. The number of computers that were scored using this report.
Error Count
Failure Count
A list of all individual scoring states that the tested computers achieved for this item. The Score Items category contains information on the individual score item results of each computer. The name of the individual score item from the report. The score the computer achieved in this score item.
Score Items
Score Item Title Score
579
Score State Max. Score Score Item Index Path Score Item Weight Score Item Description XCCDF Item Identifier
The pass or fail state of the report item for this computer. The maximum possible score to be achieved in this score item. The path of the individual score item in the report. The weight of the individual score item within the report. The description of the individual score item, as noted in the report file. The unique identifier of this score item.
Device Information
Mobile Device Name
The Device Information category contains information on the managed mobile devices themselves.
580
Information items
For iOS devices, this is the name that was given to the device in iTunes or the device settings. For Android devices, the name is assigned by Absolute Manage and can be changed as described in Naming Android devices on page 177. Mobile Device Model Mobile Device Model Number Mobile Device OS Version Mobile Device OS Build Number Mobile Device OS Platform Mobile Device Serial Number Mobile Device Phone Number Mobile Device Last Contact Mobile Device IMEI/ MEID Mobile Device Identifier (UDID) Mobile Device Capacity The type of the connected mobile device. The model number the device vendor uses to identify the mobile device in its ordering system. The version number of the operating system installed on the mobile device. The build number of the operating system version installed on the mobile device. The operating system family used on this device.
The time when the last communication from the mobile device was received by the MDM server. The IMEI (GSM) or MEID (CDMA) telephone identification number of the connected mobile device, if any. The target identifier (a unique internal ID) of the connected mobile device. The storage capacity of the mobile device, excluding space required by the operating system. This capacity is usually a few gigabytes below the nominal capacity. (For example, a 32 GB iPhone may have a capacity of 29.33 GB.) For iOS devices, this number is the same as the capacity displayed in iTunes. The free storage on the mobile device. For iOS devices, this number is the same as the free space displayed in iTunes. The MAC address of the mobile devices Bluetooth connection.
Mobile Device Available Capacity Mobile Device Bluetooth MAC Address Mobile Device WiFi MAC Address Mobile Device GPS Capable
Whether the mobile device can locate itself by GPS signals. Note that devices which are not GPS capable may still be able to locate themselves by other means, such as known locations of cell towers or
581
WiFi networks in range. However, these location methods are usually less accurate than GPS location. Mobile Device Production Date iOS devices only: The date when the mobile device was manufactured.
NOTE The content of this information item, same as with the next four information items listed below, is downloaded from an Apple server, based on the devices serial number. It is therefore available only if the iOS device had a working Internet connection at least once after being enrolled in the MDM management. The information is updated every ten days as long as the device continues to have an Internet connection to the Apple server.
iOS devices only: The date when the iOS device was purchased, according to Apples files.
NOTE See the note for Mobile Device Production Date, above.
iOS devices only: The age of the mobile device, i.e., the time that has elapsed since its production.
NOTE See the note for Mobile Device Production Date, above.
NOTE See the note for Mobile Device Production Date, above.
iOS devices only: The date when the warranty for the iOS device will end. Expired warranties are listed with a value of n/a
NOTE See the note for Mobile Device Production Date, above.
The public IPv4 address over which the mobile device was communicating with Absolute Manage at the time of its last contact. This is either the cell IP address or the public address of the NAT router over which the WiFi network is connected to the Internet.
The public IPv6 address over which the mobile device was communicating with Absolute Manage at the time of its last contact. This is either the cell IP address or the public address of the NAT router over which the WiFi network is connected to the Internet.
582
Information items
Mobile Device Cell IP Address Mobile Device WiFi IP Address Mobile Device WiFi IP Address (v6) Mobile Device WiFi Network Mobile Device Is Tablet Mobile Device Display Resolution Mobile Device Battery Level Mobile Device Status
The IP address of the mobile device in the mobile (cellular) network it is currently using (if any). The IPv4 address of the mobile device in the WiFi network it was using at the time of its last contact (if any). The IPv4 address of the mobile device in the WiFi network it was using at the time of its last contact (if any). The name of the WiFi network (if any) to which the mobile device was connected at the time of its last contact. Whether the mobile device is a tablet or not. The screen size of the mobile device, measured in pixels.
The remaining charge level of the mobile devices battery, expressed as a percentage. The management status of the device: Unmanaged: This device is not part of the MDM. Managed and offline: The device is part of the MDM system but has not responded to the last contact request. Managed and online: The device is part of the MDM system and has responded to the last contact request.
Whether the device is managed: The information item contains true if the device is managed and online or managed and offline; it contains false if the device is unmanaged (see above).
Whether the device has been jailbroken, that is, whether it contains modified firmware.
Mobile Device Modem Firmware Version Mobile Device Hardware Encryption Mobile Device Passcode Compliant Mobile Device Passcode Compliant with Profiles
The version number of the modem firmware in the mobile device, if any. The kind of hardware encryption (block level or file level) available on the device. The passcode on the device complies with all applicable requirements, including those of Exchange when applicable. The passcode on the device complies with all active profiles.
583
Mobile Device Passcode Present Mobile Device Is Roaming Mobile Device Data Roaming Enabled Mobile Device Voice Roaming Enabled
Whether the mobile device is currently roaming (connected to a mobile network other than that of the standard provider). Whether the mobile device is set to allow data roaming (exchanging data over mobile networks other than that of the standard provider). iOS devices only: Whether the mobile device is set to allow voice roaming (initiating or receiving voice calls over mobile networks other than that of the standard provider). The standard mobile network of the mobile device.
Mobile Device Home Network Mobile Device Cellular Technology Mobile Device Current Carrier Network Mobile Device Carrier Settings Version
The basic cellular technology that the mobile device is current using to communicate, such as GSM or CDMA. The mobile network into which the mobile device was booked at the time of the last contact. The version number of the carrier settings in the iOS device. Carrier settings include the name of the various available networks and other information. They are provided by Apple and can be updated independently of the iOS software. The mobile country code of the standard mobile network of the mobile device. The mobile network code of the standard mobile network of the mobile device. The mobile country code of the mobile network into which the iOS device was booked at the time of the last contact. The mobile network code of the mobile network into which the iOS device was booked at the time of the last contact. The mobile country code of the SIM installed in the mobile device.
Mobile Device Home Mobile Country Code Mobile Device Home Mobile Network Code Mobile Device Current Mobile Country Code Mobile Device Current Mobile Network Code Mobile Device SIM ICC Identifier Mobile Device Board
The name or type code of the motherboard of the mobile device. Many motherboards used in mobile devices do not have an accessible name or type code.
The brand name of the mobile device as noted in its firmware. This brand is not necessarily the manufacturer; see Mobile Device Manufacturer below. (For example, the brand may also be the carrier , who sold the phone.)
584
Information items
Mobile Device CPU Name Mobile Device CPU Speed Mobile Device Info
Android devices only: Additional information about the mobile device as provided by its manufacturer. Android devices only: The revision number of the software installed on the mobile device, as noted in the devices IMEI. Android devices only: The amount of internal storage for application data in the mobile device that is currently free. Note that some devices partition the built-in storage and declare some to be USB storage. In this case, the internal storage shown by this information item is much smaller than the actual built-in storage. (See Mobile Device SD Card 1 Available below.) ,
Android devices only: The total amount of internal storage for application data available in the mobile device. Note that some devices partition the built-in storage and declare some to be USB storage. In this case, the internal storage shown by this information item is much smaller than the actual built-in storage. (See Mobile Device SD Card 1 Total below.) ,
Android devices only: The version information for the operating system kernel active in the mobile device. The company which produced the mobile device. This is not necessarily the same company under the brand name of which the device was sold; see Mobile Device Brand above. ,
Android devices only: The base technology of the cellular network to which the mobile device is connected. Possible values are none , EDGE GPRS or UMTS , , . Android devices only: The product name of the mobile device, as noted in the devices firmware. This name is usually not the same as the product name printed on the case.
Android devices only: The amount of storage that is currently free on the first SD card in the mobile device. Note that some devices partition the built-in storage and declare some to be USB storage. In this case, some of the internal storage is shown as SD card 1.
585
Android devices only: The amount of storage available on the first SD card in the mobile device. Note that some devices partition the built-in storage and declare some to be USB storage. In this case, some of the internal storage is shown as SD card 1.
Mobile Device SD Card 2 Available Mobile Device SD Card 2 Total Mobile Device System Cache Available Mobile Device System Cache Total Mobile Device System Memory Available Mobile Device System Memory Total Mobile Device System Storage Available Mobile Device System Storage Total Mobile Device AbsoluteApps Version Mobile Device AbsoluteApps Build Number Mobile Device Record Creation Date Mobile Device MDM Profile Up-to-date
Android devices only: The amount of storage that is currently free on the second SD card in the mobile device. Android devices only: The amount of storage available on the second SD card in the mobile device. Android devices only: The amount of cache memory that is currently free on the mobile device. Android devices only: The total amount of cache memory on the mobile device. Android devices only: The amount of RAM in the mobile device that is currently free. Android devices only: The amount of RAM installed in the mobile device. Android devices only: The amount of storage memory, excluding SD cards, that is currently free on the mobile device. Android devices only: The total amount of storage memory, excluding SD cards, on the mobile device. The version number of the copy of AbsoluteApps that is installed on the managed mobile device. The build number of the copy of AbsoluteApps that is installed on the managed mobile device. The time when the record for this mobile device was created in the server. iOS devices only: Whether the MDM access privileges that are set in the MDM profile on the managed device are the same as those currently set on the server. For information on updating MDM profiles, see Updating MDM access rights on enrolled iOS devices on page 61.
The Device User Information category contains Active Directory or Open Directory information on the on the current user of a mobile device.
586
Information items
You can use these information items as substitution variables in configuration profiles, as described in Creating configuration profiles containing variables on page 139. Mobile Device User Display Name Mobile Device User First Name Mobile Device User Last Name Mobile Device User Log-on Name Mobile Device User E-Mail Mobile Device User Phone Number Mobile Device User Department Mobile Device User Company Mobile Device User Street Mobile Device User City Mobile Device User State Mobile Device User ZIP Code Mobile Device User Country Mobile Device User Office Mobile Device User Organizational Unit Path Mobile Device User Organizational Unit The users display name as stored in Active Directory or Open Directory. The users first name as stored in Active Directory or Open Directory.
The account name with which the user can log into Active Directory or Open Directory. The users e-mail address as stored in Active Directory or Open Directory. The users phone number as stored in Active Director or Open Directory.y The users department as stored in Active Directory or Open Directory.
The name of the users company as stored in Active Directory or Open Directory. The users street address as stored in Active Directory or Open Directory. The users city as stored in Active Directory or Open Directory.
The name of the Active Directory or Open Directory organizational unit to which the mobile devices current user belongs The path of the Active Directory or Open Directory organizational unit to which the mobile devices current user belongs
587
The Active Directory or Open Directory groups to which the mobile devices current user belongs. Multiple groups are separated by commas. The username that the user entered when enrolling this device into the MDM server. The domain that the user entered when enrolling this device into the MDM server. The Installed Applications category contains information on the applications that are installed on a mobile device.
Mobile Device User Enrollment Username Mobile Device User Enrollment Domain
Installed Applications
NOTE Applications that are included with the device firmware, such as Camera or Mail on iOS devices, are not listed.
Mobile Device Installed App Name Mobile Device Installed App Version Mobile Device Installed App Build Number
Mobile Device Installed App Version String Mobile Device Installed App Bundle Identifier Mobile Device Installed App Size Mobile Device Installed App Data Size Mobile Device Installed App Data Directory Mobile Device Managed App Status
The amount of storage that the application takes up on the mobile device. iOS devices only: The amount of storage that the data of the application takes up on the mobile device. Android devices only: The directory on the mobile device in which the app stores its data.
iOS devices only: The status of this app on the specific managed device (e.g., Managed or Needs redemption code . This information is not supported for apps on devices running iOS 4.x.
588
Information items
Mobile Device Managed App Prevent Data Backup Mobile Device Managed App Bound to MDM
iOS devices only: Whether backing up of the apps data (through standard system backups) is prevented on this device. iOS devices only: Whether the app will be automatically removed from this device once the device is no longer enrolled in an MDM management server. The Installed Configuration Profiles category contains information about configuration profiles that are installed on administered iOS devices. These information items can be used in the Mobile Devices window. They apply only to iOS devices.
iOS Installed Profile Name iOS Installed Profile Description iOS Installed Profile Organization iOS Installed Profile Identifier iOS Installed Profile UUID iOS Installed Profile Version iOS Installed Profile Encrypted iOS Installed Profile Managed iOS Installed Profile Allow Removal
The optional name of the organization which has provided the profile.
The Installed Provisioning Profiles category contains information about the provisioning profiles that are installed on administered iOS devices. These information items can be used in the Mobile Devices window. They apply only to iOS devices. The name of the provisioning profile.
589
iOS Installed Provisioning Profile Expiry Date iOS Installed Provisioning Profile UUID
Installed Certificates
The Installed Certificates category contains information on the certificates which are installed on the administered mobile devices. These information items can be used in the Mobile Devices window. They apply only to iOS devices.
Mobile Device Installed Certificate Name Mobile Device Installed Certificate Is Identity
The Installed Application Statistics category contains summary information on the installed applications found across all managed mobile devices.
NOTE As with the information items in the Installed Applications category, applications that are included in the device firmware are not listed. Also, applications on ignored devices (see Ignore Devices on page 414) are not included in the statistics. These information items can be used in the Installed Software Statistics smart group in the Mobile Devices window. Mobile Device Inst. App Name Mobile Device Inst. App Count Mobile Device Inst. App Bundle Identifier The name of the application being summarized.
The number of copies of the application being summarized that were found across all mobile devices. The string that uniquely identifies the bundle of the application being summarized. The Installed Configuration Profile Statistics category contains summary information on the configuration profiles installed on the managed iOS devices. These information items can be used in groups in the Mobile Devices window that provide configuration profile statistics. They apply only to iOS devices.
590
Information items
The name of the configuration profile being summarized. The number of copies of the configuration profile being summarized that were found across all managed mobile devices. The number of found copies of the configuration profile that are managed. The description of the configuration profile being summarized.
iOS Inst. Profile Managed Count iOS Inst. Profile Description iOS Inst. Profile Identifier iOS Inst. Profile Organization iOS Inst. Profile UUID
The (locally) unique identifier of the configuration profile being summarized. The organization which has issued the configuration profile being summarized. The globally unique identifier of the configuration profile being summarized. The Installed Provisioning Profile Statistics category contains summary information on the provisioning profiles installed on the managed iOS devices. These information items can be used in groups in the Mobile Devices window that provide provisioning profile statistics. They apply only to iOS devices.
iOS Inst. Prov. Profile Name iOS Inst. Prov. Profile Count iOS Inst. Prov. Profile Max Expiry Date iOS Inst. Prov. Profile Min Expiry Date iOS Inst. Prov. Profile UUID
The number of copies of the provisioning profile being summarized that were found across all managed mobile devices. The latest expiry date found in any of the copies of the provisioning profile being summarized. The earliest expiry date found in any of the copies of the provisioning profile being summarized. The globally unique identifier of the configuration profile being summarized. The Installed Certificate Statistics category contains summary information on the certificates installed on the managed iOS devices. These information items can be used in groups in the Mobile Devices window that provide certificate statistics. They apply only to iOS devices. The name of the certificate being summarized.
591
Mobile Device Inst. Certificate Count Mobile Device Inst. Certificate Identity Count
The number of copies of the certificate being summarized that were found across all managed mobile devices. The number of copies of the certificate being summarized that are used as identity certificates on managed mobile devices.
Device Tracking
The Device Tracking category contains geotracking information on tracked mobile devices. These information items can be used in groups in the Mobile Devices window that list mobile devices.
Mobile Device Tracking Enabled Mobile Device Tracking Interval Mobile Device Tracking Accuracy
The tracking accuracy set for this device. Note that the actual accuracy of a particular location record (see the Mobile Device Location Accuracy information item, below) may be lower than this setting when the desired accuracy is not technically possible at the time of recording the location. The time when the location of the device was determined.
Mobile Device Tracking Time Mobile Device Location Latitude Mobile Device Location Longitude Mobile Device Location Accuracy Mobile Device Location Cell IP Address
The maximum possible distance from the true position with which the device was located. The IP address of the mobile device in the mobile (cellular) network it is currently using (if any). This information is reported only when it changes; otherwise, the information item contains n/a .
The public IP address over which the mobile device is communicating with Absolute Manage. This is either the cell IP address or the public address of the NAT router over which the WiFi network is connected to the Internet. This information is reported only when it changes; otherwise, the information item contains n/a .
592
Information items
The IPv4 address of the mobile device in the WiFi network it is currently using (if any). This information is reported only when it changes; otherwise, the information item contains n/a .
The IPv6 address of the mobile device in the WiFi network it is currently using (if any). This information is reported only when it changes; otherwise, the information item contains n/a .
Mobile Device Location Battery Level Mobile Device Location Battery State
The remaining charge level of the mobile devices battery at the time the location was recorded, expressed as a percentage. The state of the mobile devices battery when the location was recorded: On Battery (Discharging): The device is running on battery power. On Power (Charging): The device is running on mains power. Full: The battery is full
Custom Fields
The Custom Fields category contains all custom information fields for mobile devices that have been defined on the currently connected server. The exact contents of this category and the functions of the individual fields depend entirely on the specific local configuration of the site and cannot be described further here.
NOTE Double-clicking a custom information item in the Information Items window lets you edit its specifications.
The Mobile Application Packages category contains information on the iOS application packages which have been created in Absolute Manage. These information items can be used in the Mobile Devices window, in the In-house Applications group as well as the Allowed In-house Apps and Forbidden In-house Apps groups of policies.
Mobile App Name Mobile App Version Mobile App Build Number Mobile App OS Platform
The name of the application package. The version number of the application contained in the package. The build number of the application contained in the package.
The operating system for which the application contained in the package was written.
593
Mobile App Size Mobile App Is Universal Mobile App Supported Devices Mobile App Min OS Version Mobile App Bundle Identifier Mobile App Short Description Mobile App Long Description Mobile App Update Description Mobile App Prevent Data Backup
The size the app code requires on the iOS device after installation. iOS devices only: Whether this app runs on all three iOS hardware platforms iPhone, iPad, and iPod touch. iOS devices only: A comma-separated list of the hardware platforms (iPhone, iPad, iPod touch) on which this app runs. The minimum version of the mobile operating system that this app requires to run. The unique identifier of the application package.
The application data of this app is not included in standard device backups via iTunes. This is always false for Android apps.
iOS devices only: This application will be automatically removed from the device when the device is no longer managed through an MDM system (i.e., when the MDM profile is deleted from the device). This is always false for Android apps.
Application Packages
The Application Packages category contains information on the mobile applications that an administrator has specified as recommended apps in Absolute Manage. These information items can be used in the Mobile Devices window, in the App Store Applications group and the Recommended Apps groups of policies.
The name of the application package. The category of the application package, as specified by the administrator. The minimum version of the operating system required to use the app. The mobile operating system on which this app runs. The short description of the app.
594
Information items
App Long Description App URL App Supported Devices App Is Universal
The long description of the app. The URL of the apps page in the App Store. iOS devices only: A comma-separated list of the hardware platforms (iPhone, iPad, iPod touch) on which this app runs. iOS devices only: Whether this app runs on all three iOS hardware platforms iPhone, iPad, and iPod touch. iOS devices only: Whether the data of this app on the device is prevented from being included in system backups. This is always false for Android apps.
iOS devices only: Whether this app will be automatically deleted from devices that are no longer enrolled on an MDM server. This is always false for Android apps.
App Store VPP Codes Purchased App Store VPP Codes Redeemed
iOS apps only: The total number of App Store volume purchase program codes that have been imported for this app. iOS apps only: The number of App Store volume purchase program codes that have already been used to install a copy of this app on an administered mobile device. iOS apps only: The remaining number of App Store volume purchase program codes that are available for installing this app on an administered mobile device. iOS apps only: The order number under which the App Store volume purchase program codes were bought. iOS apps only: The App Store user through whose account the App Store volume purchase program codes were bought. The App Store Volume Purchase Codes category contains information about individual purchase codes from the App Store volume purchase program. These information items can be used in the Mobile Devices window, in the App Store Applications group and the Recommended Apps groups of policies. The actual purchase code that must be entered.
The date when the code has been redeemed. If the code has not yet been redeemed, this information item contains n/a .
Absolute Manage User Guide
The iOS Configuration Profile Definitions category contains information on the configuration profiles with have been imported into Absolute Manage. These information items can be used in the Mobile Devices window, in the Apps, Profiles & Media > Configuration Profiles group. The name of the configuration profile. The description of the configuration profile. The organization which has issued the configuration profile.
The unique identifier of the configuration profile, as entered by the creator of the profile. The automatically created globally unique ID of the configuration profile. Whether the profile may be removed from the iOS device by the user. Possible values include, Never Always and With authentication , , . A comma-separated list of variables that are used in this configuration profile. See Creating configuration profiles containing variables on page 139 for more information on variables in configuration profiles.
Assigned iOS Profile Availability Assigned iOS Profile Availability Start Time Assigned iOS Profile Availability End Time
Whether the profile is always available on the devices to which it was assigned or only at certain times. The time when the profile becomes available on the devices to which it was assigned. The time when the profile stops being available on the devices to which it was assigned. The iOS Provisioning Profile Definitions category contains information on the provisioning profiles with have been found on administered iOS devices. These information items can be used in the Mobile Devices window, in the Apps, Profiles & Media > Provisioning Profiles group. The name of the provisioning profile.
596
Information items
Mobile Media
The Mobile Media category contains information on mobile media files that are managed by Absolute Manage. These information items can be used in the Mobile Devices window, in the Apps, Profiles & Media > Media group.
Media Name
The name of the mobile media file, as specified in the Mobile Media File dialog. (See also Media File Name below.) , The description of the mobile media file, as entered in the Mobile Media File dialog. The size (in bytes) of the mobile media file on disk. The file type of the mobile media file. The content category to which the mobile media file has been assigned in the Mobile Media File dialog. Whether the mobile users are permitted to take this file out of AbsoluteSafe, either to view or edit it in another app or to forward it to other devices. Whether the mobile media file can be sent from within AbsoluteSafe to the system mail program for e-mailing to another device. Whether the mobile media file can be printed from within AbsoluteSafe. The date when the mobile media file object (as opposed to the file that it specifies) was last edited. The name of the file specified in the mobile media file object. (See also Media Name, above.) The unique internal modifier of the mobile media file within Absolute Manage. Whether the media file is always available on the devices to which it was assigned or only at certain times. The time when the media file becomes available on the devices to which it was assigned. The time when the media file stops being available on the devices to which it was assigned. The Mobile Device Policies category contains information on the mobile device policies which have been created in Absolute Manage. These information items can be used in the Mobile Devices window, in the Policies section.
Media Description
Media File Can Be E-Mailed Media File Can Be Printed Media File Last Modified Media File Name
Media Unique Identifier Assigned Media Availability Assigned Media Availability Start Time Assigned Media Availability End Time
597
The name of the policy. Whether this policy is a smart policy, i.e., a policy in which mobile devices are included automatically according to rules set in the policy.s The Device Commands category contains information on commands issued to managed mobile devices. These information items can be used in the Mobile Devices window, in the Commands section.
Device Commands
Mobile Device Command Type Mobile Device Command Status Mobile Device Command Time Issued
The date and time when the command was sent by Absolute Manage Admin to Absolute Manage Server. Note that this time is not necessarily the time when the mobile device received the command, as commands are forwarded to the device only when it contacts the push notification server. This can take some time, even days, if the device is, e.g., switched off or overseas with roaming disabled.
Mobile Device Command Error Mobile Device Command Error Info Mobile Device Command Finish Time
The time when the execution of the command finished n the mobile device.
598
Information items
The FOG Reinstallation Tasks category contains information on reinstallation tasks handled by a FOG server. These information items can be used in the Window Reinstallation Tasks window, in the FOG Reinstallation Tasks section. The name of the computer that is being reinstalled. The name of the image on the FOG server that is being used for the reinstallation. The size of the image on the FOG server that is being used for the reinstallation. The date when the image on the FOG server that is being used for the reinstallation was created. The username of the administrator who created the image on the FOG server that is being used for the reinstallation. The name that has been set for the FOG task. Absolute Manage does not set task names, so this information items always displays n/a but FOG tasks enter from other sources, e.g., , through the web interface, may have names.
The current processing state of the reinstallation task, e.g., in progress Note that this information is updated only periodically. You . can refresh the information by right-clicking and choosing Synchronize Records from the context menu. The type of the FOG task displayed. Tasks initiated by Absolute Manage always have the type Push image but tasks from other sources, e.g., FOGs web interface, may have different types. The date and time when the FOG server received the command to execute the task. The amount of data that has been copied to the target computer. Note that this information is updated only periodically. You can refresh the information by right-clicking and choosing Synchronize Records from the context menu. The total amount of data that needs to be copied to the target computer. The ratio of the total data that has already been copied to the target computer. Note that this information is updated only periodically. You can refresh the information by right-clicking and choosing Synchronize Records from the context menu. The length of time that the reinstallation process has been taken so far. Note that this information is updated only periodically. You can refresh
Absolute Manage User Guide
the information by right-clicking and choosing Synchronize Records from the context menu. For completed reinstallations, the total amount of time they have taken is displayed.
AM Reinstallation Tasks
The AM Reinstallation Tasks category contains information on reinstallation tasks handled by a Absolute Manage Server with the support of an Absolute Manage PXE server. These information items can be used in the Window Reinstallation Tasks window, in the AM Reinstallation Tasks section. The current processing state of the reinstallation task, e.g., In progress. The ratio of the total data that has already been copied to the target computer. Note that this information is updated only periodically. You can refresh the information by right-clicking and choosing Synchronize Records from the context menu. Diagnostic info on the reinstallation task, if any.
Reinstallation Task Info Reinstallation Task Data Total Reinstallation Task Data Copied
The total amount of data that needs to be copied to the target computer. The amount of data that has so far been copied to the target computer. Note that this information is updated only periodically. You can refresh the information by right-clicking and choosing Synchronize Records from the context menu. The last time that information about this task was received from the updater process. In effect, this is the record modification date for the reinstallation task description and the date at which all variable fields (like Reinstallation Task Data Copied) were updated.
Whether the computer being reinstalled will automatically join an Active Directory domain afterwards. This information item corresponds to the Join domain after imaging task option in the Reinstall Windows Computer dialog.
The name of the Active Directory domain (if any) that the computer being reinstalled will join after the reinstallation is complete. This information item corresponds to the Domain to join field in the Reinstall Windows Computer dialog.
600
Information items
This information item corresponds to the Computer name option in the Reinstall Windows Computer dialog. Reinstallation Task Hostname to Set The new hostname of the reinstalled computer (if it is not set to keep the previous hostname). This information item corresponds to the Use name field in the Reinstall Windows Computer dialog.
601
Chapter 25
General
The General pane lets local users set the name under which their computer appears in Absolute Manage:
The pane contains this element: Absolute Manage Computer Name: The name that is displayed for the computer in the Absolute Manage system. You can choose to use the name specified for the computer in
602
the local operating system or you can specify a custom name that is only used by Absolute Manage. Note: This setting is available to administrators in the Agent Settings dialogs General pane.
Client Information
The Client Information pane lets local users specify information in up to ten fields:
The pane contains these elements: Client Information n: All ten fields can contain custom text information that the user by default can freely edit. The names of the fields may be set on the server through the Client Info Titles pane of Absolute Manage Admins Server Settings dialog. If a field is renamed, its label in the Absolute Manage Agent control panel changes accordingly. The fields can be locked against changes by local users in the Agent Settings dialogs Client Information pane. In that pane, administrators can also edit the fields contents.
Software Updates
The Software Updates pane lists all software updates that have been installed on the computer using Absolute Manages software distri-
603
bution and patch management systems and allows local users to check for new updates:
The pane contains these elements: Filter field: When text is entered into this field, the display is restricted to only those software installations whose descriptions contain that string. Optionally, the filtering can be restricted to a single column, in which case only software installations containing the string in the specified column are displayed. Table: The table lists all software installations that have been made on this computer by means of Absolute Manages software distribution and patch management systems. In addition to successful software package or patch installations, the table also lists failed and refused installations as well as deferred installations and installations in progress. Columns can be rearranged by dragging their titles. Clicking a title sorts the table by that column; if the title of the current sorting column is clicked, the sort order is reversed. Export as Text File: Clicking this button allows the local user to export the tables currently displayed contents as a tabdelimited text file. Show On-Demand Software: Clicking this button causes the Agent to contact its designated software distribution server for any new software packages that are marked as on-demand downloads. It displays all found packages in the Absolute Manage Software Distribution window. Get New Software: If you hold down the Option key, the Show On-Demand Software button changes to Get New Software.
604
Clicking this button causes the Agent to contact its designated software distribution server for new software packages, downloading any found packages according to the packages settings. Note: This is the same kind of check as that invoked by the Run Software Distribution Check command.
605
AbsoluteApps
Chapter 26
Mobile Apps
Absolute Manage comes with two mobile apps, AbsoluteApps and AbsoluteSafe, that let users of managed mobile devices access distributed software and apps, and that provide reporting, messaging, and other functions to administrators. The apps are described in these sections: AbsoluteApps on page 606 AbsoluteApps for iOS on page 606 AbsoluteApps for Android on page 608 AbsoluteSafe on page 610
AbsoluteApps
AbsoluteApps is the client app for mobile devices that ties them into Absolute Manage: It enables administrators to provide software to mobile device users. It reports on the state and properties of the mobile device. It allows the location of the device to be tracked. It provides a channel for direct distribution of messages for Absolute Manager administrators to mobile device users.
AbsoluteApps is available for iOS and Android: AbsoluteApps for iOS on page 606 AbsoluteApps for Android on page 608
The installation of AbsoluteApps is described in Preparing iOS devices for software installation on page 150.
606
Mobile Apps
Applications
The Applications section lists all applications that have been made available to the mobile device and that are not yet installed on it. (For information on making apps available, see Installing software on mobile devices on page 153.) Tapping one of the listed applications displays details about it. Tapping the Install button in this detail view installs the application on the mobile device. The Filter field at the top of the applications screen allows you to enter a string to filter the displayed apps: Only apps that contain the specified string in their names are displayed.
Updates
The Updates section list all available updates for apps that have been installed on this device via AbsoluteApps. Tapping an update displays details on it. Tapping the Update button in the details view installs the update on the mobile device. Tapping the Update All button in the main Updates section installs all available updates.
App Store
The App Store section is similar to the Applications section but lists recommended apps from Apples App Store instead of in-house applications. This includes apps covered by volume purchases.
607
AbsoluteApps
Messages
The Messages section contains all messages that have been sent from Absolute Manage to this mobile device. Tapping the Clear button removes all messages.
More
The More button opens a screen where additional sections are listed. Tapping the Edit button lets you configure which sections are listed on the main screen. To add a section to the main screen, drag it to the desired position in the button bar at the bottom of the edit screen. Tap Done to return to the More screen.
Profiles
The Profiles section lists all configuration profiles that are available for installation on the iOS device. Tapping a profile displays its description and allows you to install it by tapping the Install button.
About
The About section displays version and copyright information for AbsoluteApps.
The installation of AbsoluteApps for Android is described in Enrolling mobile devices on page 36.
608
Mobile Apps
Applications
The Applications section lists all applications that have been made available to the mobile device and that are not yet installed on it. (For information on making apps available, see Installing software on mobile devices on page 153.) Tapping one of the listed applications displays details about it. Tapping the Install button installs the application on the mobile device. Tapping the Install All Apps button installs all displayed apps. The filter field at the top of the applications screen allows you to enter a string to filter the displayed apps: Only apps that contain the specified string in their names are displayed.
609
AbsoluteSafe
Updates
The Updates section list all available updates for apps that have been installed on this device via AbsoluteApps. Tapping an update displays details on it. Tapping the Update button installs the update on the mobile device. Tapping the Update All Apps button in the main Updates section installs all available updates.
Market
The Market section is similar to the Applications section but lists recommended apps from Android Market instead of in-house applications.
Messages
The Messages section contains all messages that have been sent from Absolute Manage to this mobile device. Tapping the Clear Selected button removes the selected messages; tapping Clear All removes all messages.
About
The About section displays version and copyright information for AbsoluteApps.
AbsoluteSafe
AbsoluteApps is the client app for mobile devices that lets administrators distribute media to mobile users: Media can be distributed selectively based on policies. Access to media can be restricted to specific periods of time. Media can be displayed in the app. For each document, administrators can allow or prohibit transfer to other apps on the mobile device. The app supports text, images, video, and audio documents.
AbsoluteSafe can be downloaded from Apples App Store like any normal app. To make it easier for mobile users, you can specify AbsoluteSafe as a recommended app, as described in Recommending commercial apps on page 160. For your convenience, Absolute Manage ships with AbsoluteSafe predefined (see the Mobile Devices window, Apps, Profiles & Media > Recommended Applications). For the file types that AbsoluteSafe can display, see Distributing media to mobile devices on page 164.
610
Mobile Apps
Home screen
The home screen lists the available media, automatically sorted in folders according to the categories specified for the media files. Tapping a folder displays the files it contains; tapping a file displays it. See Media display screen below, for details. , In the folders, files that you have already downloaded are displayed with solid icons; files that have not yet been downloaded have translucent icons. Files that have been downloaded but for which a newer version is available have a small plus sign overlaid over their icons:
A newer version of this document is available.
The Search field at the top lets you enter part of the name of a file you are looking for. If a string is entered in this field, all files containing the string as part of their names are listed. Tapping the Settings button opens the Settings screen (see below).
611
AbsoluteSafe
Print document
Delete document
The media display screen shows the content of supported file types. For unsupported file types, only the basic document information is shown. You can click the main area to hide or show the controls. The controls let you: Show the basic document information, such as type and size, as well as the description entered by the administrator. Send the document to another app that supports this document type. This button is available only if the document may leave AbsoluteSafe. E-mail the document using Mail. This button is available only if e-mailing was enabled for the document by the administrator. Print the document to a compatible printer. This button is available only if printing was enabled for the document by the administrator. Update the document to the latest version made available by the administrator. This button is available only if a newer version of the document is available. Delete the document. This removes the document from your device. However, you can redownload it when desired.
612
Mobile Apps
Settings screen
The Settings screen: Displays the amount of memory used by AbsoluteSafe. Lets you delete all downloaded files to free up memory. Displays the MDM server to which you are connected. Lets you connect to a different MDM server. Displays version and copyright information.
Tapping Remove Downloaded Files deletes all downloaded files from your device. You can, however, redownload all files as desired. Tapping the Change button lets you connect to a different MDM server.
613
Index
A
About Absolute Manage Admin (menu command) 254 Absolute Apps preparing 150 Absolute Manage administrators explained 8 elements of Absolute Manage explained 3 feature overview 2 installing 1041 introduction to 29 running as a demo 16 superadministrators explained 8, 9 system overview 29 system requirements 11 updating 38 user types explained 8 Absolute Manage Admin basic function 3 changing passwords 51 installing 14 logging in 50 logging out 51 Absolute Manage Admin (menu) 254262 Absolute Manage Admin Help (menu command) 361 Absolute Manage Agent access 43 assigning license monitoring servers to 54 assigning servers to 52 assigning software distribution servers to 54 basic function 3 installing 27 automatically 33 on mobile devices 36 using the Agent Deployment Center 30 Absolute Manage Agents configuring for license monitoring 245 description 602605 information items 525528 Absolute Manage apps 606613 Absolute Manage InstallEase 190 Absolute Manage Server assigning to agents 52 backup 97 basic function 3 choosing a computer 12 configuring for license monitoring 248 creating certificates 18 deleting information 99 initial configuration 15 installing 13 maintenance 97 settings, exporting and importing 64 Absolute Manage SMS Integration 95 Absolute Manage Support (menu command) 361 Absolute Manage Web Site (menu command) 361 AbsoluteApps 150, 606610 Android 608 distributing 152 iOS 606 AbsoluteSafe 610613 AC Charger Charging (information item) 531 AC Charger Connected (information item) 531 access regulations 4365 overview 43 Access Status (information item) 576 Account Enabled (information item) 563 accounts see administrators, accounts Acknowledgements (menu command) 361 Action after Installation (information item) 568 Action on Clamshell Close (information item) 533 Action on Power Button (information item) 533 Action on Sleep Button (information item) 533 Active Cores (information item) 529 Active Directory creating administrator accounts from 47 zones 32 Active Directory integration 44 Active Directory Users (information item category) 565 AD Account Disabled (information item) 565 AD Account Name (information item) 565 AD Computer Is Member Of (information item) 546 AD Computer Name (information item) 545 AD Computer Organizational Unit (information item) 545 AD Computer Organizational Unit Path (information item) 545 AD Display Name (information item) 565 AD Login Name (information item) 565 AD User Is Member Of (information item) 546 AD User Organizational Unit (information item) 545 AD User Organizational Unit Path (information item) 546 Adapter AMC Address (information item) 550 Adapter IP Address (information item) 550 Adapter Name (information item) 550 Adapter Speed (information item) 551 Adapter Subnet Mask (information item) 550 Adapter Vendor (information item) 551 Add. Status Information (information item) 572 Address (information item) 570 admin application see Absolute Manage Admin administered computers see computers administering mobile devices 136178 Administration (information item category) 562565 Administrator Name (information item) 562 administrators account types 43 accounts 45 creating 45 deleting 50 disabling 49 editing 49 enabling 49 from Active Directory users 47 overview 43 switching 51 appointing to devices 55 changing passwords 51 explained 8 information items 562565 logging in 50 logging out 51 privileges 44 removing from devices 58 unappointing 58 viewing assignments 59
614
Administrators (information item category) 562 Adobe CS, installation options 209 Agent Active IP (information item) 526 Agent Build Number (information item) 526 Agent Deployment Center 498515 action menu 501 automatic deployment 33 columns 501 context menu 508 creating zones 32 deleting zones 34 editing zones 34 information items 501 installing Absolute Manage Agent with 3036 predefined zones 32 searching zones 34 toolbar 499 zone definition files 508 zones 501 Agent Deployment Center (information item category) 576577 Agent Deployment Center (menu command) 356 Agent Deployment Settings (dialog) 510 Agent Information (information item category) 525 528 Agent Name (information item) 525 Agent Port (information item) 528, 576 Agent Serial Number (information item) 526 Agent Settings (information item category) 526 Agent Settings (menu command) 282 Agent Status (information item) 576 Agent Version (information item) 525 agents see Absolute Manage Agent aliases, creating 184 Allow More than Max. Downloads (information item) 571 Allow On-Demand Installation (information item) 567 Allow Remote Assistance (information item) 547 Allow Remote Control via Assistance (information item) 547 Allow to Defer For (information item) 568 Allow to Postpone Restart (information item) 568 AM Reinstallation Tasks (information item category) 600 Android devices enrolling 36 installing Android Market apps 160 installing the Agent 36 naming 177 Android Market distributing apps from 160 recommending apps from 160 Android Market Application (dialog) 396 Android MDM see MDM Android, AbsoluteApps for 608 App Category (information item) 594 App Is Universal (information item) 595 App Long Description (information item) 595 App Min OS Version (information item) 594 App Name (information item) 594 App OS Platform (information item) 594 App Prevent Data Backup (information item) 595 App Remove When MDM Is Removed (information item) 595 App Short Description (information item) 594 App Store distributing apps from 160 recommending apps from 160 volume purchasing program 162 App Store Application Packages (information item category) 594
App Store Volume Purchase Codes (information item category) 595 App Store volume purchasing program 162 App Store VPP Codes Purchased (information item) 595 App Store VPP Codes Redeemed (information item) 595 App Store VPP Order Number (information item) 595 App Supported Devices (information item) 595 App URL (information item) 595 Apple Product Name (information item) 535 Apple Purchase Date (information item) 535 Apple Remote Desktop, remote control with 119 AppleScript, executing on administered computers 127 applications executing on administered computers 128 appointing administrators 55 appointment group removing devices 58 Appointment Group Name (information item) 565 appointment groups adding devices automatically 56 manually 56 deleting 58 editing 57 explained 55 setting up 55, 56 Appointments (information item category) 565 Assigned iOS Profile Availability (information item) 596 Assigned iOS Profile Availability End Time (information item) 596 Assigned iOS Profile Availability Start Time (information item) 596 Assigned Media Availability (information item) 597 Assigned Media Availability End Time (information item) 597 Assigned Media Availability Start Time (information item) 597 ASVPP Code Redeemed (information item) 595 ASVPP Redemption Code (information item) 595 ASVPP Redemption Date (information item) 595 ATA Bay Name (information item) 540 ATA Bus Number (information item) 539 ATA Capacity (information item) 540 ATA Device Count (information item) 537 ATA Device Type (information item) 539 ATA Devices (information item category) 539 ATA Manufacturer (information item) 539 ATA Model (information item) 539 ATA Protocol (information item) 540 ATA Revision (information item) 540 ATA Serial Number (information item) 539 ATA SMART Status (information item) 540 ATA Socket Type (information item) 540 ATA Unit Number (information item) 539 Auto Start Installation (information item) 568 automated patch management 224 Automatic Restart on Power Loss (information item) 533 Availability Date (information item) 566 Average Achieved Score (information item) 579 Avg. Install Count (information item) 575 Avg. Running Count (information item) 575
615
B
Background Only (information item) 557 backing up clients, using Time Machine 122 databases 97 server database 488 Backup Date (information item) 538 Basic Inventory Only (information item) 527 batch files see DOS batch files Battery % of Original Capacity (information item) 531 Battery Device Name (information item) 531 Battery Fully Charged (information item) 531 Battery Information (information item category) 531 Battery Installed (information item) 531 Battery Load Cycles (information item) 531 Battery Manufacturer (information item) 531 Battery Manufacturing Date (information item) 531 Battery Serial Number (information item) 531 Battery Temperature (information item) 531 Battery Type (information item) 531 Benchmark File (information item) 578 BIOS Date (information item) 536 BIOS Vendor (information item) 536 BIOS Version (information item) 536 Bonjour zones 32 Boot ROM Information (information item) 534 Boot Volume (information item) 539 Bring All to Front (menu command) 346 browser windows action menu 366 adding columns 101 columns 365 configuring 101 configuring single-computer display 103 configuring the sidebar 100 context menu 369 defined 67 description 362375 drawer 365 explained 100 filtering 107 groups adding computers 108 creating 107 creating smart groups 108 deleting 109 editing 109 removing computers 108 information items 365 new 100 rearranging columns 101 removing columns 101 saving 101 searching in 106 single-computer view 102 smart groups 366 sorting 110 status bar 364 tabs 101 toolbar 363 Bus Speed (information item) 530
C
Can Manage All Devices (information item) 563 Cancel Search (menu command) 506 Case-sensitive (information item) 539 categories, explained 366 category bar 427 certificates see SSL certificates
Change Administrator Password (menu command) 261 Change Agent Client Info Settings (information item) 565 Change Agent Custom Field Settings (information item) 565 Change Agent General Settings (information item) 565 Change Agent Server Settings (information item) 565 Change Command History Options (information item) 564 Change Computer Tracking (information item) 564 Change Mobile Device Tracking (information item) 565 Change Operating State (menu command) 292 Change Server Registration (menu command) 344 Change Services Operation State (menu command) 299 Check Spelling (menu command) 274 Check Spelling as You Type (menu command) 274 Checked Date (information item) 539 Clear Menu (menu command) 264 Client Info Locked (information item) 527 Client Information (information item category) 527 Client Information (information item) 527 client information fields 90 configuring local access 94 editing 91 renaming 93 viewing 92 Close (menu command) 264 Close Install Notification After (information item) 568 Close Tab (menu command) 265 collecting information see information, gathering columns adding to browser windows 101 arranging 101 removing 101 resizing 101 searching in 106 Command Description (information item) 561 Command Error Info (information item) 562 command history 519 Command History (information item category) 562 Command History Status (information item) 562 Command Name (information item) 561 Command Options (dialog) 280 Command Options (menu command) 329 Command Queue (information item category) 561 Command Result Error (information item) 562 Command Status (information item) 561 Command Templates (menu command) 357 Command Templates (window) 357 command windows, toolbar 279 commands devices involved 4 information items 561562 log see command history Commands (information item category) 561562 Commands (information item subcategory) 561 Commands (menu command) 356 Commands (menu) 278337 Commands (window) 516524 action menu 519 columns 518 information items 518 smart groups 519 toolbar 517 Compliance Check Finish Date (information item) 578 Compliance Check Start Date (information item) 578 Compliance Count (information item) 579
616
Compliance Report (window) 376383 action menu 379 columns 378 information items 378 information panel 378 smart groups 378 Compliance Report Date (information item) 579 Compliance Report Logged-In User (information item) 579 compliance reports 77 Compliance Reports (information item category) 578 580 Compliance Reports (menu command) 351 Compliance Reports (window) 351 toolbar 377 Compliance Score (information item) 579 Compliant (information item) 579 Compressed (information item) 539 Computer Age (information item) 535 Computer Boot Time (information item) 535 Computer Express Service Tag (Dell) (information item) 537 Computer Group (information item) 576 computer groups adding and removing computers 220 assigning distribution points 217, 219 assigning software packages 221, 222 editing 220 explained 192 removing 221 setting up 216 Computer Groups (information item category) 575 Computer Is Behind NAT (information item) 546 Computer Is Tracked (information item) 528 Computer Manufacturer (information item) 537 Computer Model (information item) 537 Computer Name (information item) 544, 576 Computer Online (Icon) (information item) 526 Computer Online (information item) 526 Computer Production Date (information item) 534 Computer Production Factory (information item) 534 Computer Serial Number (information item) 535 Computer Service Tag (information item) 537 Computer Summary (information item category) 579 Computer Tracking (information item category) 560 Computer Tracking (menu command) 372 Computer Tracking Info Updated (information item) 549 Computer Type (information item) 534 Computer Uptime (information item) 535 Computer Version (information item) 537 Computer Warranty End (information item) 536 Computer Warranty Info (information item) 535 computers adding to appointment groups automatically 56 manually 56 appointing administrators 55 backing up 122 controlling 112135 executing applications 128 executing files from admin computer 126 local files 129 executing scripts 127 installing Mac OS X 226 Windows 230 putting to sleep 114 remotely controlling 119
computers restarting 114 screen sharing 119 shutting down 114 single-computer information 102 tracking 122 viewing appointed administrators 59 waking up 115 Computers (menu command) 347 Computers (window) 347 configuration profiles Active Directory data in 140 conflicting policies 147 importing 142 installing 141 automatically 144 manually 142 optionally 145 removing automatically 146 manually 144 variables in 139 Configuration Type (information item) 551 Configure Columns (menu command) 275 Connect Timeout (information item) 528 Connection Status (information item) 576 Continue Installation After Failure (information item) 566 controlling computers 112135 Time Machine 122 Copy (menu command) 272 Agent Deployment Center 509 browser windows 370 Commands window 520 Compliance Report window 379 Copy (menu command) Agent Deployment Center 509 browser windows 370 Commands window 520 Compliance Report window 380 Copy File/Folder (menu command) 314 copying files 179 Cores per Processor (information item) 529 CPU Information (information item category) 529 Create Alias (menu command) 317 Create Folder (menu command) 318 Create Placeholder Computer Records (menu command) 342 Creation Date (information item) 538 Creation Time (information item) 561 CSV, export format 266 Current Load (information item) 571 Current User Account (information item) 544 Current User Is Admin (information item) 544 Current User Name (information item) 544 Custom Agent Name (information item) 527 Custom Fields (information item category) for desktop devices 528 for mobile devices 593 Custom Info Items Updated (information item) 549 custom information custom information fields 78 custom information see also client information fields custom information fields assigning 84 defining 79 deleting 83 editing 83 editing manual fields 86
Absolute Manage User Guide
617
custom information fields exporting 64, 89 importing 64, 89 importing data 87, 268, 270 mirroring 83 unassigning 86 using 86 Custom Zone (dialog) 502 Customize Toolbar (menu command) 277 Cut (menu command) 271
D
DameWare Access (information item) 547 DameWare, remote control with 119 Darwin Version (information item) 546 databases backup 97 exporting to 96 maintenance 97 Date & Time (information item) 534 Daylight-Saving Time (information item) 546 Default (information item) 552 Defender Auto Scan Enabled (information item) 546 Defender Definition Version (information item) 546 Defender Enabled (information item) 546 Defender Engine Version (information item) 546 Defender Installed (information item) 546 Defender Real-Time Protection (information item) 546 Deferred Until (information item) 572 Delete (menu command) 272 Delete Application (menu command) 412 Delete File (dialog) 320 Delete File/Folder (menu command) 319 Delete Profile (menu command) 412 Delete Prohibited Apps (information item) 572 deleting files 181 deleting information 99 demo of Absolute Manage 16 Deploy Agents (information item) 563 Deployment Center preferences 256 Deployment Result (information item) 576 Deployment Result Message (information item) 577 Depth (information item) 543 Details (menu command) 275 Device Information (information item category) 580 Device Name (information item) 551 Device Tracking (information item category) 592 Device User Information (information item category) 586 DHCP Server Address (information item) 550 Disk Image (dialog) 457 Disk Image Distribution Point (information item) 571 Disk Image File (information item) 571 Disk Image Name (information item) 571 Disk Image Size (information item) 571 Disk Image Upload Status (information item) 571 disk images creating Mac OS X images 226 creating Windows images using Absolute PXE 231 using FOG 233 reusing Mac OS X images 230 Disk Images (information item category) 571 Disk Sleep Timer (information item) 533 Display All Records (menu command) 276 Display Count (information item) 537 Display Installation Progress (information item) 568 Display Is Built-in (information item) 543 Display Manufacture Date (information item) 543 Display Model ID (information item) 543
Display Online (information item) 543 Display Product Name (information item) 543 Display Reduces Brightness (information item) 533 Display Serial Number (information item) 543 Display Serial Number (internal) (information item) 543 Display Sleep Timer (information item) 533 Display Sleep Uses Dim (information item) 533 Display Type (information item) 543 Display Vendor (information item) 543 displaying information 100 Displays (information item category) 542 distributing iOS software see software, installing Distribution Point (dialog) 455 Distribution Point Certificate Fingerprint (information item) 570 Distribution Point Name (information item) 570 Distribution Point OS Platform (information item) 571 Distribution Point Selection (information item) 567 Distribution Point Unique ID (information item) 570 distribution points assigning to computer groups 217, 219 considerations for designating 193 editing 196 explained 191 master server explained 193 mirror server explained 193 removing 198 setting up 192 switching the master server 196 updating 40 Distribution Points (information item category) 570 DNS Name (information item) 576 DNS Servers (information item) 551 DNS Suffix (information item) 551 Dont Install on Slow Network (information item) 567 DOS batch files, executing on administered computers 127 Download Bandwidth (information item) 571 drawer, in browser windows 365 Drive Letter (information item) 538 Driver Version (information item) 552 Duplicate Application Package (menu command) 397 Duplicate Custom Information Field (menu command) 483 Duplicate Media File (menu command) 403 Duplicate Mobile Application Package (menu command) 417 Duplicate Payload (menu command) 453 Duplicate Software Package (menu command) 451
E
Edit (menu) 271274 Edit Administrator (menu command) 484 Edit Administrator Group (menu command) 484 Edit Appointment Group (menu command) 484 Edit Command (menu command) 330, 523 Edit Configuration Profile (menu command) 417 Edit Custom Field (menu command) 360 Edit Custom Information Field (menu command) 484 Edit Custom Zone (menu command) 505 Edit Disk Image (menu command) 484 Edit Distribution Point (menu command) 484 Edit iOS Configuration Profile (menu command) 406 Edit Item (menu command) 484 Edit License Specification (menu command) 484 Edit Media File (menu command) 419 Edit Mobile Application Package (menu command) 406, 417 Edit Payload (menu command) 484 Edit Smart Group (menu command) 368, 383, 484, 507, 522
618
Edit Software Package (menu command) 484 Edit Windows Registry (menu command) 302 Enable Computer Tracking Screenshots (information item) 564 Enable DNS for WINS Resolution (information item) 551 Enable LMHOST Lookup (information item) 551 enrolling mobile devices 36 Enter Custom Field Data (menu command) 371 Mobile Devices window 413 Enter Custom Fields Data (information item) 563 environment variables 134 for files 134 for the registry 135 erasing mobile devices 138 Error Count (information item) 579 Executable Name (information item) 570 Executable Options (information item) 566 Executable Payload (information item) 566 Executable Size (information item) 566 Executable Source (information item) 570 Execute Command (menu command) 329 Execute Command Now (menu command) 330, 523 Execute Macintosh File (menu command) 305 Execute Script (menu command) 303 Execute Windows File (menu command) 308 executing applications 128 files on administered computers from admin computer 126 local files 129 scripts 127 Exit (menu command) 270 Export (menu command) 266 Export Groups (menu command) 267 Export Selected Fields (menu command) 483 exporting custom information fields 64, 89 export formats 266 groups 267 HTML 95, 266 information 95 ODBC 96 smart groups 267 text 95 to databases 96 XML 95, 266
F
Failure Count (information item) 579 Fast User Switching Enabled (information item) 546 Favorite Commands (submenu) browser windows 369, 379, 519 Server Center 434 Favorites (submenu) 279 configuring 357 FDCC SCAP reports 77 feature overview 2 File (menu) 263270 File Access Date (information item) 558 File Architecture (information item) 558 File Backup Date (information item) 558 File Build Number (information item) 558 File Bundle Identifier (information item) 557 File Count (information item) 550 File Creation Date (information item) 557 File Creator (information item) 557 File Found (information item) 559 File Modification Date (information item) 558 File Name (information item) 557 File Path (information item) 557
619
File Record Modification Date (information item) 559 file servers see also distribution points File Size (information item) 557 File Version (information item) 558 File Version String (information item) 558 files copying 179 creating aliases 184 creating shortcuts 184 deleting 181 executing on administered computers from admin computer 126 local files 129 gathering information 73 moving 179 opening 182 renaming 181 searching for 73 transferring to administered computers 186 viewing 183 working with 179189 Files (information item category) 557 Files (menu command) 347 Files (window) 347 files see also media filtering browser windows 107 Find (menu command) 272 Find (submenu) 272 Find File (menu command) 320 Find Next (menu command) 273 Find Previous (menu command) 273 fingerprints of SSL certificates, displaying 17 Finish Time (information item) 562 Firewall Enabled (information item) 546 FireWire Capacity (information item) 541 FireWire Device Count (information item) 537 FireWire Devices (information item category) 541 FireWire Firmware Revision (information item) 541 FireWire Manufacturer (information item) 541 FireWire Model (information item) 541 FireWire Model ID (information item) 541 FireWire Software Version (information item) 541 FireWire Speed (information item) 541 FireWire Vendor ID (information item) 541 First Status Timestamp (information item) 575 FOG Host Name (information item) 599 FOG Image Created By (information item) 599 FOG Image Creation Date (information item) 599 FOG Image Name (information item) 599 FOG Image Size (information item) 599 FOG Reinstallation Tasks (information item category) 599 FOG Task Creation Date (information item) 599 FOG Task Data Copied (information item) 599 FOG Task Data Total (information item) 599 FOG Task Name (information item) 599 FOG Task Percent Complete (information item) 599 FOG Task State (information item) 599 FOG Task Time Elapsed (information item) 600 FOG Task Type (information item) 599 Folder Count (information item) 538 folders creating 185 Font Count (information item) 549 Font Info Updated (information item) 548 Font Name (information item) 552 Font Type (information item) 552 Fonts (information item category) 552 Fonts (menu command) 347 Fonts (window) 347 fonts, gathering information on 70
Absolute Manage User Guide
Free Space % (information item) 538 Free Space (information item) 538 FTP Access (information item) 547 Full Duplex (information item) 551 Full Registry Path (information item) 560
G
Gather Compliance Report (menu command) 327 Gather Installed Software (dialog) 326 Gather Installed Software (menu command) 326 Gather Inventory (dialog) 325 Gather Inventory Information (menu command) 325 Gather Process Information (menu command) 325 gathering information see information, gathering General (information item category) 525 geolocation see geotracking geotracking 171 displaying information 177 enabling on mobile devices 174 resetting passphrases 174 setting passphrases 172 Get Device Geolocation (menu command) 336 GMT Delta (information item) 546 Group ID (information item) 556 Group Name (information item) 556 groups adding computers 108 as command targets 107 creating 107 deleting 109 editing 109 exporting 267 importing 267 removing computers 108 saving 109
H
Hardware (information item) 551 Hardware Information (information item category) 528543 Has Custom Icon (information item) 559 Has Installation Condition (information item) 568 Heartbeat Interval explained 285 information item 526 Help (menu) 361 Hibernation Mode (information item) 533 Hide Absolute Manage Admin (menu command) 261 Hide Others (menu command) 262 Hide Toolbar (menu command) 276 Historic License Status (information item) 574 history report 467 history summary report 468 Host (information item) 551 HTML export format 266 exporting 95, 266
I
Identification Type (information item) 554 Idle Time (information item) 544 Ignore Devices (menu command) 414 Import Custom Field Data (menu command) Mobile Devices window 413 Import Custom Field Data for Desktop Devices (menu command) 268 Import Custom Field Data for Mobile Devices (menu command) 270 Import Fields (menu command) 483 Import Groups (menu command) 267
Import Zones File (menu command) 508 importing custom information field data 87 custom information fields 64, 89 importing groups 267 importing text information 268, 270 Included in Patch Management (information item) 528 information client information fields 90 compliance reports 77 custom information 78 see also client information fields deleting 99 displaying 100 displaying via URL 104 exporting 95 FDCC SCAP reports 77 files 73 fonts 70 gathering 66111 automatically 68 manually 70 installed software 71 managing 66111 manually edited information 90 on single computers 102 printers 70 processes 71 registry 75 startup items 70 storing 95 information items adding to browser windows 101 Administration 562565 Agent Deployment Center 576577 Agent Information 525528 Commands 561562 custom information fields 78 defined 67 Hardware Information 528543 License Monitoring 572575 searching in 106 Server Center 562576 Software Distribution 565572 Software Information 544561 Information Items (menu command) 359 Information Items (window) 359 information panel 378 Inst. Software Company (information item) 554 Inst. Software File Architecture (information item) 554 Inst. Software Info (information item) 554 Inst. Software Installation Date (information item) 554 Inst. Software Name (information item) 554 Inst. Software Product ID (information item) 554 Inst. Software Size (information item) 554 Inst. Software Stat Company (information item) 577 Inst. Software Stat Count (information item) 577 Inst. Software Stat Identification Type (information item) 577 Inst. Software Stat Info (information item) 577 Inst. Software Stat Installer Receipt ID (information item) 577 Inst. Software Stat Is Hotfix (information item) 577 Inst. Software Stat Name (information item) 577 Inst. Software Stat Size (information item) 577 Inst. Software Stat Uninstallable (information item) 577 Inst. Software Version Number (information item) 554 Inst. Software Version String (information item) 554
620
Install Agent (menu command) 509 Install Application (dialog) 332 Install Application (menu command) 332 Install At (information item) 566 Install Configuration Profile (dialog) 331 Install Configuration Profile (menu command) 331 Install Count (information item) 575 Install Location (information item) 554 Install Provisioning Profile (dialog) 332 Install Provisioning Profile (menu command) 332 Install Selected Software Packages (menu command) 486 Install Software Packages (menu command) 310 Install Time End (information item) 567 Install Time Start (information item) 566 Install When No User Is Logged In (information item) 566 Install When User Is Logged In (information item) 566 Installation Context (information item) 567 Installation Context User (information item) 567 Installation Deadline (information item) 568 Installation Result Error (information item) 572 Installation Status (information item category) 571 Installation Status (information item) 571 Installed Agent Build Number (information item) 576 Installed Agent Version (information item) 576 Installed Application Statistics (information item category) 590 Installed Applications (information item category) 588 Installed Certificate Statistics (information item category) 591 Installed Certificates (information item category) 590 Installed Configuration Profile Statistics (information item category) 590 Installed Configuration Profiles (information item category) 589 Installed Provisioning Profile Statistics (information item category) 591 Installed Provisioning Profiles (information item category) 589 installed software gathering information 71 Installed Software (information item category) 554 Installed Software (menu command) 348 Installed Software (window) 348 Installed Software Count (information item) 550 Installed Software Info Updated (information item) 548 Installed Software Statistics (information item category) 577 installer packages, creating 190 Installer Receipt ID (information item) 555 installing Absolute Manage 1041 preparation 10 Absolute Manage Admin 14 Absolute Manage Agent 27 automatically 33 manually on Mac OS X 27 manually on Windows 30 using the Agent Deployment Center 30 Absolute Manage Server 13 choosing a computer 12 initial configuration 15 configuration profiles 141 MDM 23 provisioning profiles 147, 148
installing software 190236 ad hoc 222 App Store apps 160 configuring agents 192 manually 190 on mobile devices 153 overview 191 performing installations 221 preparing iOS devices 150 setup 192 Windows reinstallation support 19 see also reinstalling Interval (information item) 561 Interval Unit (information item) 561 introduction to Absolute Manage 29 Inventory Push Interval (information item) 527 Inventory Received (information item) 548 Inventory Server (information item) 576 Inventory Server Properties (dialog) 513, 514 inventory servers explained 52 Inventory Updated (information item) 548 iOS AbsoluteApps for 606 iOS App Store Application (dialog) 394 iOS Configuration Profile (dialog) 399 iOS Configuration Profile Definitions (information item category) 596 iOS devices disabling software 159 enrolling 36 geotracking 171 installing App Store apps 160 installing configuration profiles 141 installing provisioning profiles 147, 148 installing the Agent 36 MDM access rights 59 policies 168 preparing for software installation 150 preparing software 154 re-enrolling 61 removing software 159 updating MDM privileges 61 iOS devices see also mobile devices iOS Inst. Profile Count (information item) 591 iOS Inst. Profile Description (information item) 591 iOS Inst. Profile Identifier (information item) 591 iOS Inst. Profile Managed Count (information item) 591 iOS Inst. Profile Name (information item) 591 iOS Inst. Profile Organization (information item) 591 iOS Inst. Profile UUID (information item) 591 iOS Inst. Prov. Profile Count (information item) 591 iOS Inst. Prov. Profile Max Expiry Date (information item) 591 iOS Inst. Prov. Profile Min Expiry Date (information item) 591 iOS Inst. Prov. Profile Name (information item) 591 iOS Inst. Prov. Profile UUID (information item) 591 iOS Installed Profile Allow Removal (information item) 589 iOS Installed Profile Description (information item) 589 iOS Installed Profile Encrypted (information item) 589 iOS Installed Profile Identifier (information item) 589 iOS Installed Profile Managed (information item) 589 iOS Installed Profile Name (information item) 589 iOS Installed Profile Organization (information item) 589 iOS Installed Profile UUID (information item) 589
621
iOS Installed Profile Version (information item) 589 iOS Installed Provisioning Profile Expiry Date (information item) 590 iOS Installed Provisioning Profile Name (information item) 589 iOS Installed Provisioning Profile UUID (information item) 590 iOS MDM see MDM iOS policies see policies iOS Profile Allow Removal (information item) 596 iOS Profile Description (information item) 596 iOS Profile Identifier (information item) 596 iOS Profile Name (information item) 596 iOS Profile Organization (information item) 596 iOS Profile UUID (information item) 596 iOS Profile Variables Used (information item) 596 iOS Provisioning Profile Definitions (information item category) 596 iOS Provisioning Profile Expiry Date (information item) 596 iOS Provisioning Profile Name (information item) 596 iOS Provisioning Profile UUID (information item) 596 IP Address (information item) 576 IP Range End (information item) 570 IP Range Start (information item) 570 Is AD User (information item) 565 Is Alias (information item) 559 Is Application (information item) 559 Is Classic App (information item) 559 Is Executable (information item) 570 Is File (information item) 559 Is Hard Link (information item) 559 Is Hotfix (information item) 554 Is Invisible (information item) 559 Is Locked (information item) 559 Is Mac OS Software Update (information item) 568 Is Master Distribution Point (information item) 571 Is Metapackage (information item) 566 Is Open (information item) 559 Is Package (information item) 559 Is Repeating Command (information item) 561 Is Scriptable (information item) 559 Is Smart Policy (information item) 598 Is Stationery (information item) 559 Is Superadmin (information item) 562 Is Symbolic Link (information item) 559 Is Windows Software Update (information item) 568 Issue Clear Passcode (menu command) 333 Issue Device Lock (menu command) 333 Issue Remote Erase (menu command) 334 Item Summary (information item category) 579
License History Summary (information item category) 574 License Monitoring (information item category) 572 575 License Monitoring Center checking licenses 249 computer groups 245 configuring agents 245 configuring servers 248 license specifications 238 maintenance agreement information 243 purchase information 243 reports 250 license monitoring servers assigning to agents 54 License Specification (information item category) 572 License Specification Name (information item) 572 license specifications, setting up 238 License Status (information item category) 574 License Status (information item) 574 License Status Log Date (information item) 574 License Status per Agent (information item category) 575 licenses checking 249 maintenance agreement information 243 monitoring 237252 overview 237 purchase information 243 Licenses Owned (information item) 572 Licenses Type (information item) 572 Link Status (information item) 551 LM Server Address (information item) 527 LM Server Check Interval (information item) 528 LM Server Port (information item) 527 LM Server Unique ID (information item) 528 Local OS Updating Disabled (information item) 528 Locate My Mobile Device see geotracking locating mobile devices see geotracking Location (information item) 552 Locked by Hardware (information item) 539 Locked by Software (information item) 539 locking mobile devices 137 log see command history logging in 50 logging out 51 Login (dialog) 260, 274
M
Mac OS X Screen Sharing, remote control with 119 Mac OS X patch management 224 Main Display (information item) 543 Mainboard Asset Tag (information item) 536 Mainboard Manufacturer (information item) 536 Mainboard Product Name (information item) 536 Mainboard Serial Number (information item) 536 Mainboard Type (information item) 536 Mainboard Version (information item) 536 maintaining databases 97 server database 488 maintenance agreement information, recording 243 Make Group from Selected Computers (menu command) 370 Manage Mobile Devices (information item) 564 master distribution points explained 193 switching 196 Max. Achieved Score (information item) 579 Max. Downloads (information item) 570 Max. Install Count (information item) 575
J
Journaled (information item) 539 Jump to Selection (menu command) 273
K
Keep Package File After Installation (information item) 567 keys in the registry, working with 133
L
laptops tracking 122 Last Heartbeat (information item) 526 Last Launch Date (information item) 574, 575 Last User Account (information item) 544 Last User Name (information item) 544 Latest Status Timestamp (information item) 575 Launch Date (information item) 557 License History (information item category) 574
622
Max. Item Score (information item) 579 Max. Running Count (information item) 575 Max. Score (information item) 580 Maximum Battery Capacity (information item) 531 Maximum OS (information item) 567 MDM iOS access rights 59 MDM Server, basic function 3 MDM, installing support for 23 media distributing 164 importing 165 making available to mobile devices 166 specifying in policies 171 supported file types 164 Media Category (information item) 597 Media Description (information item) 597 Media File Can Be E-Mailed (information item) 597 Media File Can Be Printed (information item) 597 Media File Can Leave App (information item) 597 Media File Last Modified (information item) 597 Media File Name (information item) 597 Media File Size (information item) 597 media files see media Media Name (information item) 597 Media Type (information item) 597 Media Unique Identifier (information item) 597 Memory Module Count (information item) 537 Memory Size (information item) 537 Memory Slot Name (information item) 537 Memory Slots (information item category) 537 Memory Slots (information item) 537 Memory Speed (information item) 537 Memory Type (information item) 538 messages, sending 112 to mobile devices 136 Metapackage (dialog) 444 metapackages conflicting settings 210 editing 216 removing 216 setting up 210 Meter App Usage (information item) 572 Microsoft SMS 95 Min. Achieved Score (information item) 579 Min. Install Count (information item) 575 Min. Running Count (information item) 575 Minimize (menu command) 346 Minimum OS (information item) 567 Mirror (information item) 543 mirror distribution points, explained 193 mirroring custom information fields 83 Mirroring From (information item) 571 Mirroring Until (information item) 571 Missing Operating System Patches (menu command) 349 Missing Operating System Patches (window) 349 Missing OS Patches (information item category) 555 Missing OS Patches Count (information item) 550 Missing OS Patches Statistics (information item category) 577 Missing Patch Action (information item) 555 Missing Patch Install Deadline (information item) 555 Missing Patch Is Beta (information item) 555 Missing Patch Is Mandatory (information item) 555 Missing Patch Language (information item) 555 Missing Patch Name (information item) 555 Missing Patch Release Date (information item) 555 Missing Patch Stat Count (information item) 578 Missing Patch Stat Deadline (information item) 578 Missing Patch Stat Language (information item) 578 Missing Patch Stat Name (information item) 578
Missing Patch Stat Release Date (information item) 578 Missing Patch Stat Superseded by Package (information item) 578 Missing Patch Stat Version (information item) 578 Missing Patch Superseded by Package (information item) 555 Missing Patch Version (information item) 555 Missing Patches Info Updated (information item) 548 missing software report 468 Mobile App Build Number (information item) 593 Mobile App Bundle Identifier (information item) 594 Mobile App Is Universal (information item) 594 Mobile App Long Description (information item) 594 Mobile App Min OS Version (information item) 594 Mobile App Name (information item) 593 Mobile App OS Platform (information item) 593 Mobile App Prevent Data Backup (information item) 594 Mobile App Remove When MDM Is Removed (information item) 594 Mobile App Short Description (information item) 594 Mobile App Size (information item) 594 Mobile App Supported Devices (information item) 594 Mobile App Update Description (information item) 594 Mobile App Version (information item) 593 Mobile Application (dialog) 393 Mobile Application Packages (information item category) 593 Mobile Device AbsoluteApps Build Number (information item) 586 Mobile Device AbsoluteApps Version (information item) 586 Mobile Device Age (information item) 582 Mobile Device Available Capacity (information item) 581 Mobile Device Battery Level (information item) 583 Mobile Device Bluetooth MAC Address (information item) 581 Mobile Device Board (information item) 584 Mobile Device Brand (information item) 584 Mobile Device Capacity (information item) 581 Mobile Device Carrier Settings Version (information item) 584 Mobile Device Cell IP Address (information item) 583 Mobile Device Cellular Technology (information item) 584 Mobile Device Command Error (information item) 598 Mobile Device Command Error Info (information item) 598 Mobile Device Command Finish Time (information item) 598 Mobile Device Command Status (information item) 598 Mobile Device Command Time Issued (information item) 598 Mobile Device Command Type (information item) 598 Mobile Device Commands (information item category) 598 Mobile Device CPU Name (information item) 585 Mobile Device CPU Speed (information item) 585 Mobile Device Current Carrier Network (information item) 584 Mobile Device Current Mobile Country Code (information item) 584 Mobile Device Current Mobile Network Code (information item) 584 Mobile Device Data Roaming Enabled (information item) 584 Mobile Device Display Resolution (information item) 583
623
Mobile Device GPS Capable (information item) 581 Mobile Device Hardware Encryption (information item) 583 Mobile Device Home Mobile Country Code (information item) 584 Mobile Device Home Mobile Network Code (information item) 584 Mobile Device Home Network (information item) 584 Mobile Device Identifier (UDID) (information item) 581 Mobile Device IMEI/MEID (information item) 581 Mobile Device IMEISV (information item) 585 Mobile Device Info (information item) 585 Mobile Device Information (information item category) 580598 Mobile Device Inst. App Bundle Identifier (information item) 590 Mobile Device Inst. App Count (information item) 590 Mobile Device Inst. App Name (information item) 590 Mobile Device Inst. Certificate Count (information item) 592 Mobile Device Inst. Certificate Identity Count (information item) 592 Mobile Device Inst. Certificate Name (information item) 591 Mobile Device Installed App Build Number (information item) 588 Mobile Device Installed App Bundle Identifier (information item) 588 Mobile Device Installed App Data Directory (information item) 588 Mobile Device Installed App Data Size (information item) 588 Mobile Device Installed App Name (information item) 588 Mobile Device Installed App Size (information item) 588 Mobile Device Installed App Version (information item) 588 Mobile Device Installed App Version String (information item) 588 Mobile Device Installed Certificate Is Identity (information item) 590 Mobile Device Installed Certificate Name (information item) 590 Mobile Device Internal Storage Available (information item) 585 Mobile Device Internal Storage Total (information item) 585 Mobile Device Is Roaming (information item) 584 Mobile Device Jailbroken (information item) 583 Mobile Device Kernel Version (information item) 585 Mobile Device Last Contact (information item) 581 Mobile Device Location Accuracy (information item) 592 Mobile Device Location Battery Level (information item) 593 Mobile Device Location Battery State (information item) 593 Mobile Device Location Cell IP Address (information item) 592 Mobile Device Location Latitude (information item) 592 Mobile Device Location Longitude (information item) 592 Mobile Device Location Public IP Address (information item) 592 Mobile Device Location WiFi IP Address (information item) 593 Mobile Device Location WiFi IP Address (v6) (information item) 593 Mobile Device Managed (information item) 583
Mobile Device Managed App Bound to MDM (information item) 589 Mobile Device Managed App Prevent Data Backup (information item) 589 Mobile Device Managed App Status (information item) 588 mobile device management see MDM Mobile Device Manufacturer (information item) 585 Mobile Device MDM Profile Up-to-date (information item) 586 Mobile Device Model (information item) 581 Mobile Device Model Number (information item) 581 Mobile Device Modem Firmware Version (information item) 583 Mobile Device Name (information item) 580 Mobile Device Network Type (information item) 585 Mobile Device OS Number (information item) 581 Mobile Device OS Version (information item) 581 Mobile Device Passcode Compliant (information item) 583 Mobile Device Passcode Compliant with Profiles (information item) 583 Mobile Device Passcode Present (information item) 584 Mobile Device Phone Number (information item) 581 Mobile Device Policies (information item category) 597 mobile device policies see policies Mobile Device Product Name (information item) 585 Mobile Device Production Date (information item) 582 Mobile Device Public IP Address (information item) 582 Mobile Device Public IP Address (v6) (information item) 582 Mobile Device Purchase Date (information item) 582 Mobile Device Record Creation Date (information item) 586 Mobile Device SD Card 1 Available (information item) 585 Mobile Device SD Card 1 Total (information item) 586 Mobile Device SD Card 2 Available (information item) 586 Mobile Device SD Card 2 Total (information item) 586 Mobile Device Serial Number (information item) 581 Mobile Device SIM ICC Identifier (information item) 584 Mobile Device Status (information item) 583 Mobile Device System Cache Available (information item) 586 Mobile Device System Cache Total (information item) 586 Mobile Device System Memory Available (information item) 586 Mobile Device System Memory Total (information item) 586 Mobile Device System Storage Available (information item) 586 Mobile Device System Storage Total (information item) 586 Mobile Device Tracking (dialog) 335 Mobile Device Tracking Accuracy (information item) 592 Mobile Device Tracking Enabled (information item) 592 Mobile Device Tracking Interval (information item) 592 Mobile Device Tracking Time (information item) 592 Mobile Device User City (information item) 587 Mobile Device User Company (information item) 587 Mobile Device User Country (information item) 587 Mobile Device User Department (information item) 587 Mobile Device User Display Name (information item) 587
624
Mobile Device User E-Mail (information item) 587 Mobile Device User Enrollment Domain (information item) 588 Mobile Device User Enrollment Username (information item) 588 Mobile Device User First Name (information item) 587 Mobile Device User Is Member Of (information item) 588 Mobile Device User Last Name (information item) 587 Mobile Device User Log-on Name (information item) 587 Mobile Device User Office (information item) 587 Mobile Device User Organizational Unit (information item) 587 Mobile Device User Organizational Unit Path (information item) 587 Mobile Device User Phone Number (information item) 587 Mobile Device User State (information item) 587 Mobile Device User Street (information item) 587 Mobile Device User ZIP Code (information item) 587 Mobile Device Voice Roaming Enabled (information item) 584 Mobile Device Warranty End (information item) 582 Mobile Device Warranty Info (information item) 582 Mobile Device WiFi IP Address (information item) 583 Mobile Device WiFi IP Address (v6) (information item) 583 Mobile Device WiFi MAC Address (information item) 581 Mobile Device WiFi Network (information item) 583 mobile devices 606613 adding to appointment groups automatically 56 manually 56 administering 136178 appointing administrators 55 configuration profiles with variables 139 enabling geotracking 174 enrolling 36 erasing 138 installing commercial apps 160 installing configuration profiles 141 installing provisioning profiles 147, 148 installing software 153 installing the Agent 36 locking and unlocking 137 making media available 166 making software available 157 sending messages 136 server contact interval 495 showing location 177 viewing appointed administrators 59 Mobile Devices (menu command) 355 Mobile Devices (window) 384420 action menu 391, 406 columns 389 information items 389 smart groups 389 toolbar 387 Mobile Media (information item category) 597 Modification Date (information item) 538 Modify Computer Groups (information item) 563 Modify Custom Information Fields (information item) 563 Modify Disk Images (information item) 563 Modify Distribution Points (information item) 563 Modify iOS Configuration Profiles (information item) 564
625
Modify License Specifications (information item) 564 Modify Mobile Applications (information item) 564 Modify Mobile Device Policies (information item) 564 Modify Mobile Media (information item) 564 Modify Server Settings (information item) 563 Modify Software Packages (information item) 563 monitoring licenses, overview 237 Move File/Folder (menu command) 321 moving files 179 MS Remote Assistance, remote control with 119 MS Remote Desktop, remote control with 119 MTU (information item) 551
N
naming Android devices 177 files 181 Network Adapter Count (information item) 549 Network Adapters (information item category) 550 New (menu command) 263 New Administrator (menu command) 471 New Administrator Group (menu command) 474 New Android Market Application Package (menu command) 396, 417 New Category (menu command) 368, 382 New Command History Smart Group from (menu command) 410 New Command Queue Smart Group from (menu command) 410 New Computer Appointment Group (menu command) 475 New Computer Group (menu command) 468 New Configuration Profile (menu command) 417 New Custom Information Field (menu command) 478 New Custom Zone (menu command) 502 New Disk Image (menu command) 457 New Distribution Point (menu command) 454 New Group Mobile Devices (menu command) 405 New Group (menu command) 367 New History Report (menu command) 467 New History Summary Report (menu command) 468 New In-house Application Package (menu command) 393 New iOS App Store Application Package (menu command) 394, 416 New iOS Configuration Profile (menu command) 399 New License Specification (menu command) 460 New License Status Report (menu command) 467 New Media File (menu command) 402, 419 New Metapackage (menu command) 444 New Missing Mac OS Patches Smart Group (menu command) 350 New Missing Mac OS Patches Statistics Smart Group (menu command) 350 New Missing Microsoft Patches Smart Group (menu command) 350 New Missing Software Packages Group (menu command) 459 New Missing Software Report (menu command) 468 New Missing Windows Patches Statistics Smart Group (menu command) 350 New Mobile Application Package (menu command) 416 New Mobile Devices Appointment Group (menu command) 476 New Payload (menu command) 452 New Policy (menu command) 404 New Policy with Selected Devices (menu command) 411 New Smart Administrator Group (menu command) 477
New Smart Application Group from (menu command) 408 New Smart Command History Group (menu command) 521 New Smart Command History Group from (menu command) 520 New Smart Command Queue Group (menu command) 521 New Smart Command Queue Group from (menu command) 520 New Smart Computer Appointment Group (menu command) 475 New Smart Computer Group (menu command) 469 New Smart Configuration Profiles Group from (menu command) 409 New Smart Disk Image Group (menu command) 458 New Smart Distribution Points Group (menu command) 456 New Smart Group App Store Application Packages (menu command) 397 Command History (menu command) 405 Command Queue (menu command) 405 In-house Application Packages (menu command) 397 Installed Application Statistics (menu command) 398 Installed Applications (menu command) 398 Installed Certificates (menu command) 401 Installed Certificates Statistics (menu command) 401 Installed iOS Configuration Profiles (menu command) 401 Installed iOS Configuration Profiles Statistics (menu command) 401 Installed iOS Provisioning Profiles (menu command) 398 Installed iOS Provisioning Profiles Statistics (menu command) 398 iOS Configuration Profiles (menu command) 400 iOS Provisioning Profiles (menu command) 397 Media Files (menu command) 404 Mobile Devices (menu command) 405 Mobile Devices by Installed Certificates (menu command) 402 Mobile Devices by Installed iOS Configuration Profiles (menu command) 401 Mobile Devices by Installed iOS Provisioning Profiles (menu command) 399 Mobile Devices by Installed Software (menu command) 398 New Smart Group (menu command) 367, 506 New Smart Group from (menu command) Agent Deployment Center 509 browser windows 370 New Smart Installation Status Group (menu command) 459 New Smart License Specification Group (menu command) 466 New Smart Media Files Group from (menu command) 409 New Smart Mobile Device Group from (menu command) 408 New Smart Mobile Devices Appointment Group (menu command) 476 New Smart Payload Group (menu command) 454
New Smart Policy Mobile Devices (menu command) 404 Mobile Devices by Installed Applications (menu command) 404 Mobile Devices by Installed iOS Configuration Profiles (menu command) 405 New Smart Policy from (menu command) 408 New Smart Provisioning Profiles Group from (menu command) 409 New Smart Report Details Group (menu command) 381 New Smart Report Item Summary Group (menu command) 381 New Smart Report Summary Group (menu command) 380 New Smart Software Package Group (menu command) 451 New Software Package (menu command) 434 New Software Usage Report (menu command) 467 New Tab (menu command) 263 Number of Launches (information item) 575
O
Object Count (information item) 538 ODBC, exporting to 96 Only Use Distribution Point When Assigned (information item) 570 Open (menu command) 264 Open Directory integration 44 Open File (menu command) 322 Open in Preview (menu command) 374 Open Recent (submenu) 264 opening files 182 Original Battery Capacity (information item) 531 OS Activated (information item) 545 OS Activation Grace Period (information item) 545 OS Build Number (information item) 545 OS Installation Date (information item) 545 OS Is Volume-Licensed (information item) 545 OS Language (information item) 545 OS Platform (information item) 544 OS Product ID (information item) 545 OS Serial Number (information item) 545 OS Service Pack (information item) 545 OS Update Utility Enabled (information item) 547 OS Version (information item) 544
P
Package Name (information item) 566 Packages (information item category) 566 Packages Root Path (information item) 571 Page Faults (information item) 557 Page Setup (menu command) 270 Parent Process ID (information item) 556 Parent Process Name (information item) 556 passphrases resetting 174 setting 172 passwords, changing 51 Paste (menu command) 272 Patch Action (information item) 569 Patch Can Be Uninstalled (information item) 569 Patch Install Deadline (information item) 569 Patch Is Beta (information item) 569 Patch Is Mandatory (information item) 569 Patch Language (information item) 569 patch management 224 Patch Release Date (information item) 569 Path (information item) 553 Payload Download Time (information item) 567 Payload Name (information item) 569 Payload Notes (information item) 570
626
Payload Size (information item) 570 Payload Unique ID (information item) 570 payloads editing 200 removing 200 setting up 199 PC Anywhere Access (information item) 547 PC Anywhere, remote control with 119 PCI Device Count (information item) 537 PCI Device ID (information item) 542 PCI Devices (information item category) 542 PCI Name (information item) 542 PCI Revision ID (information item) 542 PCI ROM Revision (information item) 542 PCI Slot (information item) 542 PCI Type (information item) 542 PCI Vendor ID (information item) 542 Personal File Sharing (information item) 546 Personal Web Sharing (information item) 547 Physical Cores (information item) 529 Physical Memory (information item) 534 Physical Processors (information item) 529 placeholder records creating 62 deleting 63 explained 62 Platform Architecture (information item) 567 PM Action (information item) 534 PM Inactivity Timer (information item) 534 PM Only When No User Logged In (information item) 534 PM Schedule Count (information item) 534 PM Schedule Name (information item) 533 PM Settings For (information item) 534 PM Time (information item) 534 PM Trigger (information item) 534 policies adding and removing mobile devices 169 conflicting settings for configuration profiles 147 creating 168 explained 168 specifying applications 170 specifying configuration profiles 170 specifying media 171 Policy Name (information item) 598 Port (information item) 570 position of mobile devices 171 positions of mobile devices see geotracking PostScript (information item) 552 Power Management (information item category) 532 power management schedules 115 creating 116 Power Management Schedules (information item category) 533 Power Management Settings (menu command) 288 power usage reports 118 Power Usage Reports (menu command) 352 Power Usage Reports (window) 352 Power-on Avg/Day (information item) 532 Power-on Avg/Month (information item) 532 Power-on Avg/Week (information item) 532 Power-on Avg/Year (information item) 532 Power-on Last 30 Days (information item) 532 Power-on Last 365 Days (information item) 532 Power-on Last 7 Days (information item) 532 Power-on Tracking Start (information item) 532 Power-on Yesterday (information item) 532 PowerShell scripts, executing on administered computers 127 Preferences (menu command) 254 Primary Interface (information item) 551 Primary MAC Address (information item) 534
Print (menu command) 270 Printer Count (information item) 549 Printer Host Name (information item) 552 Printer ID (information item) 552 Printer Info Updated (information item) 548 Printer Model (information item) 552 Printer Name (information item) 552 Printer Sharing (information item) 547 Printer State (information item) 552 Printers (information item category) 552 printers, gathering information 70 Priority (information item) 567 Process Architecture (information item) 556 Process Count (information item) 550 Process Executable Path (information item) 556 Process File Creator (information item) 556 Process File Type (information item) 556 Process ID (information item) 556 Process Info Updated (information item) 549 Process Name (information item) 556 Process Priority (information item) 557 processes gathering information 71 terminating 130 Processes (information item category) 555 Processes (menu command) 347 Processes (window) 347 Processor Architecture (information item) 530 Processor Family (information item) 530 Processor Has 3DNow (information item) 530 Processor Has MMX (information item) 530 Processor Has SSE (information item) 530 Processor Has SSE2 (information item) 530 Processor Has SSE3 (information item) 530 Processor Hyperthreading Enabled (information item) 530 Processor ID String (information item) 529 Processor Is 64-bit (information item) 529 Processor L1 Data Cache (information item) 530 Processor L1 Instruction Cache (information item) 530 Processor L2 Data Cache (information item) 530 Processor L2 Instruction Cache (information item) 530 Processor L3 Cache (information item) 530 Processor Model (information item) 530 Processor Speed (information item) 529 Processor Stepping (information item) 530 Processor Supports Hyperthreading (information item) 530 Processor Type (information item) 529 Processor Vendor (information item) 529 Profile Name (information item) 578 prohibited software, monitoring 238 Protocol (information item) 576 Provides (information item) 553 provisioning profiles installing 147, 148 removing 149 Purchase Count (information item) 573 Purchase Date (information item) 573 purchase information, recording 243 Purchase License Owner (information item) 573 Purchase Maintenance Available (information item) 573 Purchase Maintenance Begin (information item) 573 Purchase Maintenance End (information item) 573 Purchase Maintenance Price (information item) 573 Purchase Maintenance Reference (information item) 573 Purchase Notes (information item) 574 Purchase Order Number (information item) 573 Purchase Price (information item) 573
627
Purchase Software Version (information item) 573 Purchase Tracking (information item category) 573 Purchase Type (information item) 573 Purchase Vendor Contact (information item) 573 Purchase Vendor Name (information item) 573 Purchase Vendor Reference (information item) 573 Purchase Vendor Support (information item) 573 putting to sleep administered computers 114
Q
Quartz Extreme (information item) 543 Quit Absolute Manage Admin (menu command) 262
R
RAM, information items 537 Read Administrator Info (menu command) 340 Read Distribution and Licensing Info (menu command) 340 Real Group ID (information item) 556, 557 Real User ID (information item) 556 Real Username (information item) 556 Reapply Command (menu command) 330, 523 Record Creation Date (information item) 526 Redo (menu command) 271 re-enrolling iOS devices 61 Refresh (menu command) 478, 506 Refresh Rate (information item) 543 Refresh Status (menu command) 514 Registered Company (information item) 554, 555 Registered Owner (information item) 554 Registration (dialog) 344 registry gathering information 75 searching for entries 75 Registry Entries (information item category) 559 Registry Entries (menu command) 351 Registry Entries (window) 351 Registry Entry Found (information item) 560 Registry Name (information item) 559 Registry Record Modification Date (information item) 560 Registry Value (information item) 559 Registry Value Binary (information item) 560 Registry Value Number (information item) 560 Registry Value String (information item) 560 Registry Value Type (information item) 559 registry, editing 133 Reinstall Mac OS X Computer (menu command) 294 Reinstall Windows Computer (menu command) 297 Reinstallation Task Data Copied (information item) 600 Reinstallation Task Data Total (information item) 600 Reinstallation Task Domain to Join (information item) 600 Reinstallation Task Hostname to Set (information item) 600, 601 Reinstallation Task Info (information item) 600 Reinstallation Task Join AD Domain (information item) 600 Reinstallation Task Last Update (information item) 600 Reinstallation Task Percent Complete (information item) 600 Reinstallation Task State (information item) 600 reinstalling Mac OS X 226 Windows 230 Reinstalling Windows computers installing support for 19 Reload All Tables (menu command) 338 Reload Selected Records (menu command) 339 Remaining Battery Capacity (information item) 531 Remote (information item) 552
Remote Apple Events (information item) 547 Remote Control (information item) 564 Remote Control (menu command) 373 Remote Desktop Screen Sharing (information item) 547 Remote Desktop, remote control with 119 Remote Login (information item) 547 Remote Management (information item) 547 remotely controlling computers 119 via URLs 121 Remove Administrator (menu command) 484 Remove Administrator from Group (menu command) 474 Remove Administrator Group (menu command) 484 Remove Agent (menu command) 511 Remove All Group Members (menu command) 470 Remove Appointment Group (menu command) 484 Remove Category (menu command) 369, 383, 406 Remove Command (menu command) 523 Remove Computer Records (information item) 564 Remove Configuration Profile (menu command) 418 Remove Configuration Profile from Policy (menu command) 418 Remove Custom Information Field (menu command) 484 Remove Custom Zone (menu command) 505 Remove Disk Image (menu command) 484 Remove Distribution Point (menu command) 484 Remove form Policy (menu command) 414 Remove from Group (menu command) 369, 373 Remove from Server (menu command) 372 Remove Group (menu command) 369 Remove History Commands (information item) 564 Remove Inventory Data (information item) 564 Remove Inventory Data (menu command) 372 Remove iOS Configuration Profile (menu command) 406 Remove Item (menu command) 484 Remove License Reports (information item) 564 Remove License Specification (menu command) 484 Remove Media File (menu command) 419 Remove Mobile Application Package (menu command) 406, 417 Remove Mobile Device History Commands (information item) 565 Remove Mobile Device Records (information item) 565 Remove Payload (menu command) 484 Remove Policy (menu command) 420 Remove SD Log Entries (information item) 564 Remove Smart Group (menu command) 383, 484, 507, 522 Remove Software Package (menu command) 484 Remove Template (menu command) 358 removing configuration profiles automatically 146 manually 144 provisioning profiles 149 software (iOS) 159 Rename Category (menu command) 368, 382 Rename File (dialog) 323 Rename File/Folder (menu command) 323 Rename Group (menu command) 368, 382 Rename Tab (menu command) 264 renaming files 181 Repeat Restart Notification (information item) 568 Repeat Selected Installations (menu command) 486 Report Date (information item) 575 Report Description (information item) 578 Reports (information item category) 578 reports on licensed software 250 Requires Admin Privileges (information item) 567
628
Requires Exclusive Install (information item) 569 Requires Exclusive Uninstall (information item) 569 Reset All Ignored Devices (menu command) 414 Reset Current Server Load (menu command) 486 Reset Package (menu command) 485 Reset Software Packages (information item) 564 Reset Tracking Passphrase (menu command) 336 Resolution (information item) 543 Restart Notification (information item) 568 restarting administered computers 114 Restore All Settings (menu command) 342 Restore Custom Information Fields (menu command) 340 Restore Server Settings (menu command) 341 Retrieve Payloads (menu command) 484 Retry All Failed Profiles (menu command) 414 Retry Package (menu command) 485 Retry Software Packages (information item) 564 roaming options, setting 149 Router Address (information item) 550 Run License Monitoring Scan (menu command) 329 Run Software Distribution Check (menu command) 329 Running Count (information item) 575
S
Save (menu command) 265 Save Administrator Info (menu command) 340 Save All Settings (menu command) 342 Save As (menu command) 265 Save Custom Information Fields (menu command) 340 Save Distribution and Licensing Info (menu command) 339 Save Server Settings (menu command) 341 Save Template (dialog) 282 Scan All Volumes (information item) 572 Scheduled Time (information item) 561 Scheduling Options (menu command) 523 scheduling power management events 115 Scope ID (information item) 551 Score (information item) 579 Score Item Description (information item) 580 Score Item Index Path (information item) 580 Score Item Title (information item) 579 Score Item Weight (information item) 580 Score Items (information item category) 579 Score State (information item) 580 Scored Computer Count (information item) 579 Scoring States (information item) 579 screen sharing 119 scripts executing on administered computers 127 in custom information fields 82 SCSI Bus Number (information item) 540 SCSI Capacity (information item) 540 SCSI Device Count (information item) 537 SCSI Device Type (information item) 540 SCSI Devices (information item category) 540 SCSI Manufacturer (information item) 540 SCSI Model (information item) 540 SCSI Revision (information item) 540 SCSI Transfer Width (information item) 540 SCSI Unit Number (information item) 540 SD Server Address (information item) 527 SD Server Check Interval (information item) 527 SD Server Port (information item) 527 SD Server Unique ID (information item) 527 Search Domains (information item) 551 Search Windows Registry (menu command) 301 Search Zone (menu command) 506
searching files 73 for network devices 34 in browser windows 106 in columns 106 registry 75 zones in the Agent Deployment Center 34 Security Identifier (information item) 545 Select All (menu command) 272 Select Container (menu command) 275 Send Message (menu command) 291 Send Message to Device (menu command) 335 Send Re-enrollment Message to Device (menu command) 416 sending messages 112 to mobile devices 136 Server (menu) 338345 Server Address (information item) 526 Server Center 421497 action menu 433 category bar 427 columns 428 computer groups 216 information items 428 smart groups 428 status bar 428 toolbar 422 Server Center (information item category) 562576 Server Center (menu command) 355 Server Monitor (category) 496 Server Port (information item) 526 Server Properties (dialog) 505 Server Settings (category) 486 Server Unique ID (information item) 526 servers mirroring custom information fields 83 servers see Absolute Manage Server Servers (information item category) 526 Service Description (information item) 553 Service Display Name (information item) 553 Service Executable Path (information item) 553 Service Log On As (information item) 553 Service Name (information item) 553 Service Startup Type (information item) 553 Service Status (information item) 553 services starting 132 startup status 131 stopping 132 Services (submenu) 261 Session ID (information item) 556 Set Availability Time (menu command) 418 Set Device Name (menu command) 412 Set Inventory Server (menu command) 512 Set Roaming Options (menu command) 334 shell scripts, executing on administered computers 127 shell variables see environment variables shortcuts, creating 184 Show All (menu command) 262 Show Command Result (menu command) 524 Show Computer Detail View (menu command) 359 Show Configuration Profile Details (menu command) 417 Show Detail View (menu command) 371, 413 Show Details for This Computer (menu command) 380 Show Details for This Scoring Item (menu command) 380 Show Location on Bing Maps (menu command) 415
629
Show Location on Google Maps (menu command) 415 Show Media File Details (menu command) 418 Show Mobile Application Package Details (menu command) 416 Show Policy Members (menu command) 420 Show Provisioning Profile Details (menu command) 418 Show Release Notes (menu command) 361 Show Report Details (menu command) 352 Show Toolbar (menu command) 276 Show/Hide Target List (menu command) 331 shutting down administered computers 114 Size (information item) 538 Sizes (information item) 552 sleep putting to sleep administered computers 114 waking up administered computers 115 Smart Group (dialog) 367 Agent Deployment Center 507 command history 522 command queue 521 compliance report details 382 compliance report summary 380 compliance score item summary 381 distribution points 456 installation status 459 license history 467 license history summary 468 license specifications 466 license status 467 missing software 468 missing software packages 459 payloads 454 software packages 452, 458 software usage 467 smart groups browser windows 366 Commands window 519 Compliance Report window 378 creating 108 deleting 109 editing 109 exporting 267 importing 267 Mobile Devices window 389 saving 109 Server Center 428 SMBIOS Version (information item) 536 SMC Version (information item) 535 software App Store volume purchasing program 162 importing into Absolute Manage 155 information on installed software 71 installing 190236 ad hoc 222 App Store apps 160 configuring agents 192 manually 190 on mobile devices 153 overview 191 performing installations 221 preparing iOS devices 150 setup 192 making available to mobile devices 157 monitoring prohibited software 238 preparing for iOS devices 154
software recommending commercial apps 160 removing (iOS) 159 Software Distribution (information item category) 565572 Software Distribution Center 190236 distribution points 192 metapackages 210 patch management 224 payloads 199 performing ad hoc installations 222 performing installations 221 reinstalling Mac OS X computers 226 reinstalling Windows computers 230 software packages 201 updating 40 Software Distribution Package (dialog) 434 software distribution servers assigning to agents 54 Software Identified By (information item) 572 Software Information (information item category) 544561 Software License Specification (dialog) 460 software packages ad hoc installations 222 Adobe CS 209 assigning to computer groups 221 conflicting settings 210 editing 209 explained 192 removing 210 setting up 201 updating 41 Software Patch Recommended (information item) 569 Software Patch Version (information item) 569 sort order 111 sorting browser windows 110 sorting columns 110 Special Characters (menu command) 274 Spelling (menu command) 274 Spelling (submenu) 273 SSH Port (information item) 576 SSL certificates displaying 17 exporting 18, 488 staging servers see distribution points Start Time (information item) 562 starting services 132 Startup Item Count (information item) 549 Startup Item Description (information item) 553 Startup Item Info Updated (information item) 548 Startup Item Name (information item) 553 startup items gathering information 70 Startup Items (information item category) 553 startup status of services 131 status bar browser windows 364 Server Center 428 Status Timestamp (information item) 574 stolen computers, tracking 122 stopping services 132 storing information 95 Sudden Motion Sensor (information item) 533 superadministrators explained 9, 43 Superseded by Package (information item) 569 Supported Operating Systems (information item) 569 Swap Space Free (information item) 537 Swap Space Total (information item) 537
630
Swap Space Used (information item) 537 Switch Administrator and Server (menu command) 260 switching administrator accounts 51 Synchronize All Tables (menu command) 338 Synchronize Custom Information Fields (menu command) 341 Synchronize Records (menu command) 371 in the Windows Reinstallation Tasks window 359 Synchronize Selected Records (menu command) 339 Synchronize Server Settings (menu command) 341 System Enclosure Asset Tag (information item) 536 System Enclosure Manufacturer (information item) 536 System Enclosure Serial Number (information item) 536 System Enclosure Type (information item) 536 System Enclosure Version (information item) 536 System Hibernate Timer (information item) 532 System Information (information item category) hardware 529 software 544 System Management Server 95 system overview 29 system requirements of Absolute Manage 11 System Sleep Timer (information item) 532
T
tab-delimited text, export format 267 tabs closing 102 new 101 renaming 102 Target Installation Volume (information item) 566 Target OS Platform (information item) 567 TCP Implementation (information item) 551 Terminate App If License Exceeded (information item) 572 Terminate Process (menu command) 293 Terminate Prohibited Apps (information item) 572 terminating processes 130 services 132 text export format 266 exporting 95, 266 text file display window 184 TheftTrack 122 Threads (information item) 557 Timbuktu Access (information item) 547 Timbuktu, remote control with 119 Time Machine (menu command) 300 Time Machine Auto Backup Enabled (information item) 547 Time Machine Backup Disk (information item) 547 Time Machine Disk Free (information item) 548 Time Machine Disk Size (information item) 548 Time Machine Latest Backup (information item) 548 Time Machine Oldest Backup (information item) 548 Time Machine Snapshot Count (information item) 548 Time Machine Status (information item) 547 Time Machine, controlling 122 toolbar Agent Deployment Center 499 browser windows 363 command windows 279 Commands window 517 Compliance Reports window 377 Mobile Devices window 387 Server Center 422 Total Install Count (information item) 574
Total Launches (information item) 574 Total Running Count (information item) 574 Total Usage Time (information item) 574 Track as Missing Software (information item) 573 Track Device (menu command) 335 Tracked Computer Address (information item) 560 Tracked Computer Current User Account (information item) 560 Tracked Computer Current User Name (information item) 560 Tracked Computer GMT Delta (information item) 560 Tracked Computer Public Address (information item) 560 Tracked Computer Resolved Address (information item) 560 Tracked Computer Resolved Public Address (information item) 561 Tracked Computer Resolved Router Address (information item) 560 Tracked Computer Router Address (information item) 560 Tracked Computer Time (information item) 561 Tracked Computer Time Stamp (information item) 560 tracking computers 122 license purchases 243 Transfer All Files in Folder (information item) 570 Transfer File/Folder (menu command) 311 transferring files to administered computers 186 TTYs Keep Awake (information item) 533
U
unappointing administrators 58 Undo (menu command) 271 Uninstall String (information item) 555 Uninstallable (information item) 554 Unique Computer ID (information item) 536 Unix Group (information item) 558 Unix Mount Point (information item) 539 Unix Owner (information item) 558 Unix Permissions (information item) 558 Unix shell scripts see shell scripts unlocking mobile devices 137 unsorting browser windows 111 Update Device Info (menu command) 335 Update Installed Application Statistics (menu command) 416 updating Absolute Manage 38 distribution points 40 Software Distribution Center 40 software packages 41 Upload Status (information item) 570 UPS Installed (information item) 533 URI (information item) 552 URLs displaying information 104 launching remote control sessions 121 Usage Time (information item) 575 USB Device Class (information item) 542 USB Device Count (information item) 537 USB Device Protocol (information item) 542 USB Device Speed (information item) 542 USB Device Subclass (information item) 542 USB Devices (information item category) 541 USB Max. Power (information item) 541, 542 USB Model (information item) 541 USB Product ID (information item) 542 USB Product Version (information item) 542 USB Vendor (information item) 541 USB Vendor ID (information item) 542 Use Custom Agent Name (information item) 527
631
Use Selection for Find (menu command) 273 Use Template (menu command) 357 User ID (information item) 556 user information fields see client information fields User Interaction (information item) 567 Username (information item) 556 users, Absolute Manage user types explained 8 Uses (information item) 553
W
Wake on AC Change (information item) 533 Wake on Clamshell Open (information item) 533 Wake on LAN Enabled (information item) 547 Wake on LAN Supported (information item) 547 Wake Up (menu command) 293 waking up administered computers 115 Warn About Slow Network (information item) 568 warning messages, suppressing and reactivating 256 Window (menu) 346360 Windows Reinstallation Tasks (information item category) 598601 Windows Reinstallation Tasks (menu command) 358 Windows Reinstallation Tasks (window) 358 Windows Service Count (information item) 549 Windows Services (information item category) 553 Windows Services Info Updated (information item) 548 WINS Resolution (information item) 551 WINS Server (information item) 551
V
values in the registry, working with 133 variables environment variables 134 environment variables for files 134 environment variables for the registry 135 in configuration profiles 139 defining 140 using 140 Video Card Model (information item) 543 View (menu) 275277 View Administrator Settings (information item) 563 View Commands Window (information item) 563 View Computer Tracking Data (information item) 563 View Computer Tracking Screenshots (information item) 563 View Custom Information Fields (information item) 563 View in Separate Window (menu command) 374 View License Monitoring Settings (information item) 563 View Mobile Device Tracking Data (information item) 565 View Server Status (information item) 563 View Software Distribution Settings (information item) 563 View Text File (dialog) 324 View Text File (menu command) 324 viewing files 183 Virtual Memory (information item) 557 Visual Basic scripts, executing on administered computers 127 VNC Access (information item) 547 VNC, remote control with 119 Volume Count (information item) 537 Volume Name (information item) 538 Volume Serial Number (information item) 538 Volume Type (information item) 538 Volumes (information item category) 538 VRAM Size (information item) 543
X
XCCDF Item Identifier (information item) 580 XML export format 267 exporting 95, 266
Z
zone definition files 508 zones, in the Agent Deployment Center 501 creating 32 deleting 34 editing 34 searching 34 Zoom (menu command) 346
632