SlideShare une entreprise Scribd logo
1  sur  59
Policy Management
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Key Terms
• Cabinet – The highest-level container in a folder tree. A
policy cannot be assigned to a cabinet.
• Folder – Organizational structure within a cabinet
• Policy – A group of defined settings assigned to endpoints
• Policy Object – A single setting group within a policy
• View – Filter used to display/control machines based on
specific criteria (OS, IP range, applications installed, etc.)
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Key Terms (continued)
• Compliance – Determines whether settings
applied to an endpoint are equal to the
settings defined within the applied policies
• Manual Override – Changing a setting within
a module directly where that setting is
defined within an assigned policy
• Combining Policy Objects – When defined in
more than one policy, these objects are all
added to the endpoint
• Conflicting Policy Objects – When defined in
more than one policy, rules dictate which
setting “wins”
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Systems Management Tool
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• The Systems Management tab provides a setup
wizard which enables admins to quickly configure
and apply machine management policies for a
specific organization. Once configured, these
polices are assigned to each machine managed
on behalf of that organization.
• Machine Groups inherit settings of their parent
organization. Therefore, to configure all clients
within a single organization to use the same
settings, you need only define the settings at the
highest level for that organization.
• Customize settings for machine groups within an
organization by completing the wizard for the
individual group(s).
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
If you choose to enable
Workstation Patch and Update
Management, you must define a
credential and password
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
Click Finish to
commit the changes
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Once the wizard completes, the content will be downloaded
(if not already present) from Kaseya to the VSA.
• Installs pre-defined content. To differentiate Content Pack
Views from ones created by VSA admins, all Kaseya-provided
View content has a prefix of “zz[SYS]”:
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Managed Monitor Set content is
visible within the System cabinet on
the Monitor > Monitor Sets page:
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Managed Agent Procedure content is visible
within the System cabinet on the Agent
Procedure > Schedule/Create page:
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Managed Policy content is visible within the
System cabinet on the Policy Management
> Policies page:
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Content within the System cabinet should not
be edited
• To customize System content, copy the
policy, monitor set, or agent procedure to a
Private or Shared folder
• Apply policy based from customized System
content to an individual machine or group to
take precedence over the System content
• Learn more about the Systems Management
Tool:
http://help.kaseya.com/WebHelp/EN/SSP/10
00000/index.htm#11252.htm
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Creating Policies
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Creating and Managing Policies
• Create a manageable folder structure – by function or by
client/org
• Create Views specific to policy
– Specific machine types (i.e., by OS, by application, server v.
workstation, etc.)
– Any changes to Views may impact endpoints – ensure Views
are edited accurately
– Creating Policy-specific Views can help minimize accidental
changes to Views in use by Policy
• Example: ExchangeServer
Policy-ExchangeServer
• Policy Mgmt > Policies > Add Policy
• Select and configure desired policy objects
• Select View to define which endpoint should receive the
policy
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Creating and Managing Policies
Save v. Save and Apply
• Save: Saves the changes to the policy. Policies are
in a pending state. No changes are applied to
endpoints.
– A policy that is saved but NOT applied will appear with
a yellow scroll icon on the Policies page:
– A policy that has no View associated will appear with a
red scroll icon on the Organization/Machine Group
page:
• Save and Apply: Saves changes to the policy and
applies the changes to the endpoints
– Apply Now: Apply the changes to all affected
endpoints immediately. Can cause some performance
issues, depending on overall workload of server.
– Allow scheduler to apply: Changes will be applied at
next deployment interval
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Policy Precedence
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence – Who Wins?
• Multiple policies can be assigned to a
single endpoint
• Some policy objects will be combined
and some will conflict
• Rules determine which policy will
“win” when there is a conflict
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence - Combine
Which policy objects combine?
– Monitor Sets
– Agent Procedures
– Event Log Alerts
– Distribute Files
When more than one policy is applied to
a machine, and each policy defines the
above objects, the endpoint will receive
ALL of the defined combinable objects
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence
Combine Example
PolicyA defines two Agent Procedures:
PolicyB defines different Procedures:
PolicyA and PolicyB are assigned to the
same endpoint, workstation1
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence
Combine Example (continued)
• When the policies are applied to workstation1, all four
Procedures are assigned:
• Note: If the same procedure is scheduled in both policies,
each with different schedules, policy precedent rules will
determine which procedure schedule will be applied to the
endpoint
– For combinable objects, Policy Mgmt will use the same logic as
the module. If the module allows the same object to be
assigned multiple times to the same endpoint, all settings will be
passed to the endpoint. If the module allows only ONE setting
per machine for the selected object, policy precedent rules will
be followed.
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence - Conflict
• Remaining Policy Objects conflict
• When a conflict exists, the winning
object is determined based on
precedence. The more closely the
policy is assigned to the machine level,
the more precedence the policy has.
• Possible layers are: Global, Org,
Parent Group, Child Group (including
nested child groups), Machine
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence - Conflict
• A policy assigned at the Global will apply to all
endpoints
• A policy applied at the org level will apply to all
endpoints within the org. Any conflicting Global objects
will be overwritten with the settings in policies applied
at the Org level
• A policy applied at the Parent Group level will apply to
all endpoints in the group. Any conflicting objects
applied at the Global or Org level will be overwritten
with settings in the policies applied at the Group level
• Child-group policies will overwrite any conflicts from
global, org, or parent group policies
• Policies assigned directly to an endpoint will win over
conflicting settings at the higher levels.
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Handling Conflicts
Credential
Global
Agent Menu
Log History
LAN Cache
Org
Credential
Group Machine Effective Settings
Agent Menu
Patch
Reboot Action
Working
Directory
Working
Directory
Patch
Reboot Action
File Source
Remote Control
X
X
X
X
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policies Assignment Rules
• Multiple policies can be assigned to any organization or machine group or machine.
• A machine with multiple policies assigned to it has conflicting policies when both specify
the same policy type.
– Multiple policies are not in conflict if different policy types are specified.
– The following policy types combine with each other so that no conflicts occur.
• Event log alerts, distribute files, monitor sets, and agent procedures.
• Policies are assigned by organization/machine group using the Organizations/Machine
Groups page.
– Policies assigned to a lower level in an organization hierarchy have precedence over policies assigned to a higher
level in the same organization hierarchy.
– Unless a lower level policy conflicts with it, policies assigned to a level apply to all lower levels.
– When multiple policies are assigned to the same organization or machine group, the assigned policies have
precedence in the order listed.
• Policies can be assigned by machine using the Machines page.
– Policies assigned by machine have precedence over all policies assigned to that machine by organization/machine
group.
– Policies assigned by machine have precedence in the order listed.
• All policy assignments can be overridden by changing agent settings manually throughout the
VSA.
– Manual changes have precedence over all policies assignments.
• A policy can be associated with a view definition in the Policies page.
– When machine is assigned to a policy by organization or by machine group an associated view filters the machines
associated with a policy. If a machine is not a member of the view definition, then the policy will not be propagated
to that machine.
– When a machine is assigned to a policy by machine, then the view associated with a policy is ignored and the policy
will be propagated to that machine.
– Associating a policy with a view does not, by itself, assign a policy to any machine.
• The order of precedence for views depends on the policies they are associated with.
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Assigning Policies by Org/Group
aarentals
Drag folder from
Policy list…
…to an
organization
• Assign policies to organizations or groups by
dragging individual policies or folders to the org
• When assigning folders, all policies within the
folder will be assigned
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
“Higher” v. “Lower” precedence
• Order the policies/folders based on the
precedence you want applied. The higher in
the list, the higher the precedence.
Precedence determines which policy “wins”
when a conflict is present
aarentals
If a policy in the Global Policies
folder conflicts with a policy in
the Windows Workstation…
Folder, precedence rules
dictate the settings in the
Global Policies folder will
“win” because it appears
higher in the assignment list.
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
“Higher” v. “Lower” precedence
Ordering Policies
• Drag/Drop assigned items to re-order
the list. The lower in the list, the
lesser the precedence With the reordering, all
policies within Windows
Workstation… folder will take
precedence over polices in the
Global Policies folder
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Applying Policies to Machines
• Policy > Machines allows you to assign a
policy to an endpoint directly
• When a policy is assigned directly to an
endpoint, View settings are ignored
• Precedence rules apply
• Policies assigned directly to endpoint will
take precedence over policies applied at
the group, org, or global level
• Machine-assigned policies can be
ordered to determine precedence
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policies are listed in order
of precedence. The higher
in the list, the higher the
precedence.
Use this field to filter by
policy name
Or select the policy from
the cabinet/folder tree
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Matrix Detail
What exactly is applied?
Hover over policy icon to
reveal the matrix detail
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Matrix Detail
Policy Object Status
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Matrix Detail
Machine Effective Policy
Settings
Policy Name Actual ConfigurationSetting
Policy Object name, enabled
on the Policies page
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Unassigning Policies
• Change View settings
• Remove from Org/Machine Group
• Remove from endpoint
• Disable Systems Management Tool
• Unassigning policies does not remove
the setting from the endpoint. It only
disables the centralized management of
settings by policy
• To remove the settings from the
endpoint, visit the individual Module
pages and manually clear settings.
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Settings
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management >
Settings
• Deployment Interval: Frequency to
apply policy settings to endpoints after
changes/edits to policies
– Changes to endpoints based on VIEW
membership occurs via a backend process
that runs once per hour
• Compliance Check: Frequency of
verification of settings assigned to
endpoints as compared to settings
defined by applied policies. Manual
overrides are detected during
compliance checks.
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
New Features in 6.3
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Organization Credentials
• Audit > Manage Credentials
• Define a credential for all machines
within the selected organization
• Created by Systems Management tool (if
Patch function enabled) or can be
manually defined by an admin
• Policy can leverage this credential
• Allows admin to use single policy with
Agent Credential object defined for
multiple organizations/clients
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Using Organization Credentials
• Enable the policy object Credential
• Check “Use organization defaults”
• The credential defined in Audit > Manage
Credentials will be used
• This policy can be shared by multiple orgs
• At this time, Policy is the only function that
leverages the org credential
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
New 6.3 Policy Functions
• Support for add-on modules such as
KAM, KAV, KES, KDPM
• LAN Cache assignment
– LAN Cache must be created on host
machine via Agent > LAN Cache
– LAN Cache Assignment is separate from File
Source. LAN Cache can be used as the patch
file source, but assigning only the LAN cache
policy object will NOT configure the Patch
File Source object.
• Remote Control Session Terminate
messages
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
New 6.3 Policy Functions
• Agent Procedure schedule can be edited
• “Exclude Time” is no longer enabled by
default in scheduler
• Patch schedules will combine if one
policy defines Scan schedule and second
policy defines Update schedule
• Effective Machine Policy Settings
• Audit and Patch schedules can be set to
“None” to prevent schedule settings
from two policies from merging
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
New Policy Object Functions
Merging Schedules
• PolicyA defines Scan schedule:
• PolicyB defines Update schedule:
• If both policies are applied to a single
endpoint, the endpoint will combine
these two functions
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
New Policy Object Functions
Merging Schedules
• To prevent this combining, set the
blank schedule to “None”:
• When PolicyA and PolicyB are
assigned to the endpoint, the Scan
schedule will be left undefined
(provided the policy defined above is
the “winning” policy).
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Additional New Features
Sharing Policy Content
• Cabinet contents can be shared with
variable rights
Right Click on Folder
Then click “Share”
Admin
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Additional New Features
Sharing Policy Content
• When share permissions are granted
on a folder, all contents of the folder
inherit the permissions of the parent
folder
• Permissions can only be granted at
folder levels
• Contents of the System Cabinets are
visible to Master admins only (for SaaS
customers, the equivalent is “System”
role)
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Additional New Features
Access Rights
Action buttons
•Save, Save and Apply, Delete, Edit, etc.
and Policy Objects
•Agent Menu, Agent Procedures, Alerts, etc.
can be controlled via Role Access Rights (System > Roles > Access Rights)
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Troubleshooting
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Effective Machine Policy
Settings
• Leverage Effective Machine Policy
Settings function to:
– Determine which specific setting is
causing an out of compliance notification
– Which policy is “winning” for individual
settings
– Quickly determine all settings applied to
a machine via Policy Management
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Troubleshooting Policies
• Attempt to determine if the issue is with Policy
Management or with the individual Module
– If function is not working via Policy, test configuring
the same setting via the individual module
– If configuring the setting via the module is not
successful, troubleshoot the module first
– If opening a ticket with Kaseya Support, attempting
to determine whether the issue exists in the module
can assist in proper routing of ticket and speed
resolution
• Example Issue: Agent Procedure assigned via Policy does
not run.
• Troubleshooting: Attempt to assign/run the procedure
on the endpoint via the Agent Procedure (AP) module. If
fails in AP, issue likely lies with AP module. If succeeds in
AP but fails when assigned via Policy, issue may lie with
policy.
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Troubleshooting Policies:
Policies not applying
• Patience – policies can take time to apply. Many
functions are not immediate. All functions
should complete within a few hours (often less)
of a change, but few will complete immediately
– Exception: Apply policy and choose “Apply Now”
will begin the application of policy settings to
machines, but time to complete will vary
• Check Policy Mgmt > Settings > Deployment
Interval
– If Manual, policies will not automatically deploy
– If configured other than manual but deployments
are not occurring, change setting > Save, then
restore to desired setting > Save
• Check Policy Mgmt > Dashboard to view pending
events (changes not yet applied)
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Best Practices
• Multiple layered policies are easier to manage
and share across orgs than a few policies with
multiple, broad objects configured
• COPY from System Cabinet and modify within the
Private cabinet
– Assign System content, then use customized policy
with higher precedence to override unnecessary
content settings
• Use manual overrides for exceptions on
individual machines for short-term testing
• Create unique policies applied directly to
endpoint to manage exceptions for longer-term
• Create views specific to policy
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
When will changes occur?
Action Interval
Deployment Interval Configurable - Defined on Policy > Settings page
Compliance Interval Configurable - Defined on Policy > Settings page
New Agent Triggers application of policies based on
Deployment Interval defined
Assignment based on
View changes
Backend process runs once per hour
Defined Schedules
(Agent Procedures,
Patch/Audit
schedules, etc.)
Runs at the first interval after the policy is
applied to the endpoint. Will not run
immediately upon policy assignment to the
endpoint. Past schedules will not run.
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Hotfixes
• At times, hotfixes are necessary to
resolve bugs
• Often, a hotfix to Policy Management
may require that the policies be
reprocessed after the hotfix is applied
to the VSA
– Reprocess policies via Policy
Management > Machines > Reprocess
Policies
Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Thank you
• Slides and recorded presentation will
be available for download at
http://www.kaseya.com/forms/techja
ms.aspx
• Chat-based Q&A session will continue
for a few minutes. Please continue
post questions in the Q&A window.

Contenu connexe

Tendances

Optimizing Alert Monitoring with Oracle Enterprise Manager
Optimizing Alert Monitoring with Oracle Enterprise ManagerOptimizing Alert Monitoring with Oracle Enterprise Manager
Optimizing Alert Monitoring with Oracle Enterprise ManagerDatavail
 
FedRAMP CSP SSP Training
FedRAMP CSP SSP TrainingFedRAMP CSP SSP Training
FedRAMP CSP SSP Training1ECG
 
Database as a Service, Collaborate 2016
Database as a Service, Collaborate 2016Database as a Service, Collaborate 2016
Database as a Service, Collaborate 2016Kellyn Pot'Vin-Gorman
 
SCCM Training Tutorials | SCCM Online Training
SCCM Training Tutorials | SCCM Online Training SCCM Training Tutorials | SCCM Online Training
SCCM Training Tutorials | SCCM Online Training KashifSCCMTrainer
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft AzureMohamed Tawfik
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokiamfrancis
 
Simplifying Application Delivery Infrastructure in Azure for MSP's
Simplifying Application Delivery Infrastructure in Azure for MSP'sSimplifying Application Delivery Infrastructure in Azure for MSP's
Simplifying Application Delivery Infrastructure in Azure for MSP'sKemp
 
Interconnect session 1888: Rational Team Concert Process Customization: What ...
Interconnect session 1888: Rational Team Concert Process Customization: What ...Interconnect session 1888: Rational Team Concert Process Customization: What ...
Interconnect session 1888: Rational Team Concert Process Customization: What ...Rosa Naranjo
 
Solution Manager 7.2 SAP Monitoring - Part 3 - Managed System Configuration
Solution Manager 7.2 SAP Monitoring - Part 3 - Managed System ConfigurationSolution Manager 7.2 SAP Monitoring - Part 3 - Managed System Configuration
Solution Manager 7.2 SAP Monitoring - Part 3 - Managed System ConfigurationLinh Nguyen
 
what is sccm ? sccm online Training
what is sccm ? sccm online Training what is sccm ? sccm online Training
what is sccm ? sccm online Training KashifSCCMTrainer
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations managerBelarmino Tomicha
 
Tech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade MigrateTech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade Migratecrmachado
 

Tendances (20)

MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01MCSA 70-412 Chapter 01
MCSA 70-412 Chapter 01
 
Optimizing Alert Monitoring with Oracle Enterprise Manager
Optimizing Alert Monitoring with Oracle Enterprise ManagerOptimizing Alert Monitoring with Oracle Enterprise Manager
Optimizing Alert Monitoring with Oracle Enterprise Manager
 
FedRAMP CSP SSP Training
FedRAMP CSP SSP TrainingFedRAMP CSP SSP Training
FedRAMP CSP SSP Training
 
Database as a Service, Collaborate 2016
Database as a Service, Collaborate 2016Database as a Service, Collaborate 2016
Database as a Service, Collaborate 2016
 
SAP BusinessObjects Security
SAP BusinessObjects SecuritySAP BusinessObjects Security
SAP BusinessObjects Security
 
SCCM Training Tutorials | SCCM Online Training
SCCM Training Tutorials | SCCM Online Training SCCM Training Tutorials | SCCM Online Training
SCCM Training Tutorials | SCCM Online Training
 
Patterns
Patterns Patterns
Patterns
 
SCCM on Microsoft Azure
SCCM on Microsoft AzureSCCM on Microsoft Azure
SCCM on Microsoft Azure
 
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, NokiaDeployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
Deployment Download and Policy Workstream Update - Gábor Pécsy, Nokia
 
Em13c New Features- One of Two
Em13c New Features- One of TwoEm13c New Features- One of Two
Em13c New Features- One of Two
 
Simplifying Application Delivery Infrastructure in Azure for MSP's
Simplifying Application Delivery Infrastructure in Azure for MSP'sSimplifying Application Delivery Infrastructure in Azure for MSP's
Simplifying Application Delivery Infrastructure in Azure for MSP's
 
Interconnect session 1888: Rational Team Concert Process Customization: What ...
Interconnect session 1888: Rational Team Concert Process Customization: What ...Interconnect session 1888: Rational Team Concert Process Customization: What ...
Interconnect session 1888: Rational Team Concert Process Customization: What ...
 
Sccm 2016 training
Sccm 2016 trainingSccm 2016 training
Sccm 2016 training
 
Solution Manager 7.2 SAP Monitoring - Part 3 - Managed System Configuration
Solution Manager 7.2 SAP Monitoring - Part 3 - Managed System ConfigurationSolution Manager 7.2 SAP Monitoring - Part 3 - Managed System Configuration
Solution Manager 7.2 SAP Monitoring - Part 3 - Managed System Configuration
 
MCSA 70-412 Chapter 08
MCSA 70-412 Chapter 08MCSA 70-412 Chapter 08
MCSA 70-412 Chapter 08
 
what is sccm ? sccm online Training
what is sccm ? sccm online Training what is sccm ? sccm online Training
what is sccm ? sccm online Training
 
MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03MCSA 70-412 Chapter 03
MCSA 70-412 Chapter 03
 
System center 2012 configurations manager
System center 2012 configurations managerSystem center 2012 configurations manager
System center 2012 configurations manager
 
Tech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade MigrateTech Talk Oct 2008 Upgrade Migrate
Tech Talk Oct 2008 Upgrade Migrate
 
Sapuki sig 2013
Sapuki sig 2013Sapuki sig 2013
Sapuki sig 2013
 

Similaire à Kaseya Support Techjam - Policy Management

Datasheet apachepluginforrd
Datasheet apachepluginforrdDatasheet apachepluginforrd
Datasheet apachepluginforrdMidVision
 
Datasheet foldermanagementpluginforrd
Datasheet foldermanagementpluginforrdDatasheet foldermanagementpluginforrd
Datasheet foldermanagementpluginforrdMidVision
 
Datasheet scriptspluginforrd
Datasheet scriptspluginforrdDatasheet scriptspluginforrd
Datasheet scriptspluginforrdMidVision
 
Datasheet datapowerpluginforrd
Datasheet datapowerpluginforrdDatasheet datapowerpluginforrd
Datasheet datapowerpluginforrdMidVision
 
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
Openstack Cloud  Management and Automation Using Red Hat Cloudforms 4.0Openstack Cloud  Management and Automation Using Red Hat Cloudforms 4.0
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0Prasad Mukhedkar
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012JasonCondo
 
Datasheet rationalclearcasepluginforrd
Datasheet rationalclearcasepluginforrdDatasheet rationalclearcasepluginforrd
Datasheet rationalclearcasepluginforrdMidVision
 
Managing and supporting PowerApps & Flow at scale by Daniel Laskewitz
Managing and supporting PowerApps & Flow at scale by Daniel LaskewitzManaging and supporting PowerApps & Flow at scale by Daniel Laskewitz
Managing and supporting PowerApps & Flow at scale by Daniel LaskewitzDaniel Laskewitz
 
Aws pluginfor rd
Aws pluginfor rdAws pluginfor rd
Aws pluginfor rdMidVision
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Juan Carlos Gonzalez
 
Datasheet was pluginforrd
Datasheet was pluginforrdDatasheet was pluginforrd
Datasheet was pluginforrdMidVision
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2Rafel Ivgi
 
Datasheet ssh pluginforrd
Datasheet ssh pluginforrdDatasheet ssh pluginforrd
Datasheet ssh pluginforrdMidVision
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy ADsentmery5
 
Datasheet j bosspluginforrd
Datasheet j bosspluginforrdDatasheet j bosspluginforrd
Datasheet j bosspluginforrdMidVision
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesAdi Gazit Blecher
 
Policy as Code: IT Governance With HashiCorp Sentinel
Policy as Code: IT Governance With HashiCorp SentinelPolicy as Code: IT Governance With HashiCorp Sentinel
Policy as Code: IT Governance With HashiCorp SentinelMitchell Pronschinske
 

Similaire à Kaseya Support Techjam - Policy Management (20)

Datasheet apachepluginforrd
Datasheet apachepluginforrdDatasheet apachepluginforrd
Datasheet apachepluginforrd
 
Datasheet foldermanagementpluginforrd
Datasheet foldermanagementpluginforrdDatasheet foldermanagementpluginforrd
Datasheet foldermanagementpluginforrd
 
Datasheet scriptspluginforrd
Datasheet scriptspluginforrdDatasheet scriptspluginforrd
Datasheet scriptspluginforrd
 
Datasheet datapowerpluginforrd
Datasheet datapowerpluginforrdDatasheet datapowerpluginforrd
Datasheet datapowerpluginforrd
 
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
Openstack Cloud  Management and Automation Using Red Hat Cloudforms 4.0Openstack Cloud  Management and Automation Using Red Hat Cloudforms 4.0
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0
 
Ch29
Ch29Ch29
Ch29
 
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...
 
Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012Managing Updates with System Center Configuration Manager 2012
Managing Updates with System Center Configuration Manager 2012
 
Datasheet rationalclearcasepluginforrd
Datasheet rationalclearcasepluginforrdDatasheet rationalclearcasepluginforrd
Datasheet rationalclearcasepluginforrd
 
Fs And Self Service
Fs And Self ServiceFs And Self Service
Fs And Self Service
 
Managing and supporting PowerApps & Flow at scale by Daniel Laskewitz
Managing and supporting PowerApps & Flow at scale by Daniel LaskewitzManaging and supporting PowerApps & Flow at scale by Daniel Laskewitz
Managing and supporting PowerApps & Flow at scale by Daniel Laskewitz
 
Aws pluginfor rd
Aws pluginfor rdAws pluginfor rd
Aws pluginfor rd
 
Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?Governance in SharePoint Premium:What's in the box?
Governance in SharePoint Premium:What's in the box?
 
Datasheet was pluginforrd
Datasheet was pluginforrdDatasheet was pluginforrd
Datasheet was pluginforrd
 
Implementing and auditing security controls part 2
Implementing and auditing security controls   part 2Implementing and auditing security controls   part 2
Implementing and auditing security controls part 2
 
Datasheet ssh pluginforrd
Datasheet ssh pluginforrdDatasheet ssh pluginforrd
Datasheet ssh pluginforrd
 
Window 2003 server group policy AD
Window 2003 server group policy ADWindow 2003 server group policy AD
Window 2003 server group policy AD
 
Datasheet j bosspluginforrd
Datasheet j bosspluginforrdDatasheet j bosspluginforrd
Datasheet j bosspluginforrd
 
Best Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change ProcessesBest Practics for Automating Next Generation Firewall Change Processes
Best Practics for Automating Next Generation Firewall Change Processes
 
Policy as Code: IT Governance With HashiCorp Sentinel
Policy as Code: IT Governance With HashiCorp SentinelPolicy as Code: IT Governance With HashiCorp Sentinel
Policy as Code: IT Governance With HashiCorp Sentinel
 

Plus de Kaseya

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365Kaseya
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365Kaseya
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementKaseya
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseKaseya
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteKaseya
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionKaseya
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureKaseya
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorKaseya
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya
 

Plus de Kaseya (20)

Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 
Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)Enterprise Mobility Management I: What's Next for Management (MDM)
Enterprise Mobility Management I: What's Next for Management (MDM)
 
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesEnterprise Mobility Management II: BYOD Tips, Tricks and Techniques
Enterprise Mobility Management II: BYOD Tips, Tricks and Techniques
 
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...
 
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA ReportingReporting and Dashboards: The Present and Future Direction of VSA Reporting
Reporting and Dashboards: The Present and Future Direction of VSA Reporting
 
365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365365 Command: Managing SharePoint in Office 365
365 Command: Managing SharePoint in Office 365
 
365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365365 Command: Managing Exchange in Office 365
365 Command: Managing Exchange in Office 365
 
Advanced Administration: Mobile Device Management
Advanced Administration: Mobile Device ManagementAdvanced Administration: Mobile Device Management
Advanced Administration: Mobile Device Management
 
Advanced Administration: Kaseya Traverse
Advanced Administration: Kaseya TraverseAdvanced Administration: Kaseya Traverse
Advanced Administration: Kaseya Traverse
 
Advanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD SuiteAdvanced Administration: Kaseya BYOD Suite
Advanced Administration: Kaseya BYOD Suite
 
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...
 
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...
 
Security and Backup II: Vision and Direction
Security and Backup II: Vision and DirectionSecurity and Backup II: Vision and Direction
Security and Backup II: Vision and Direction
 
Security and Backup I: OEM Architecture
Security and Backup I: OEM ArchitectureSecurity and Backup I: OEM Architecture
Security and Backup I: OEM Architecture
 
Kaseya Monitoring Suite Overview
Kaseya Monitoring Suite OverviewKaseya Monitoring Suite Overview
Kaseya Monitoring Suite Overview
 
Kaseya Asset Discovery Overview
Kaseya Asset Discovery OverviewKaseya Asset Discovery Overview
Kaseya Asset Discovery Overview
 
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationAutomation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
Automation Desk I: Leveraging Service Desk as a Hub for Advanced Automation
 
Kaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner LandscapeKaseya Technology Alliance Partner Landscape
Kaseya Technology Alliance Partner Landscape
 
Advanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual AdministratorAdvanced Administration: Kaseya Virtual Administrator
Advanced Administration: Kaseya Virtual Administrator
 
Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014Kaseya Corporate Update and Roadmap Q1 2014
Kaseya Corporate Update and Roadmap Q1 2014
 

Dernier

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Dernier (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

Kaseya Support Techjam - Policy Management

  • 2. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Key Terms • Cabinet – The highest-level container in a folder tree. A policy cannot be assigned to a cabinet. • Folder – Organizational structure within a cabinet • Policy – A group of defined settings assigned to endpoints • Policy Object – A single setting group within a policy • View – Filter used to display/control machines based on specific criteria (OS, IP range, applications installed, etc.)
  • 3. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Key Terms (continued) • Compliance – Determines whether settings applied to an endpoint are equal to the settings defined within the applied policies • Manual Override – Changing a setting within a module directly where that setting is defined within an assigned policy • Combining Policy Objects – When defined in more than one policy, these objects are all added to the endpoint • Conflicting Policy Objects – When defined in more than one policy, rules dictate which setting “wins”
  • 4. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Management: Systems Management Tool
  • 5. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool • The Systems Management tab provides a setup wizard which enables admins to quickly configure and apply machine management policies for a specific organization. Once configured, these polices are assigned to each machine managed on behalf of that organization. • Machine Groups inherit settings of their parent organization. Therefore, to configure all clients within a single organization to use the same settings, you need only define the settings at the highest level for that organization. • Customize settings for machine groups within an organization by completing the wizard for the individual group(s).
  • 6. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool
  • 7. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool
  • 8. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool
  • 9. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool
  • 10. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool
  • 11. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool If you choose to enable Workstation Patch and Update Management, you must define a credential and password
  • 12. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool Click Finish to commit the changes
  • 13. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool • Once the wizard completes, the content will be downloaded (if not already present) from Kaseya to the VSA. • Installs pre-defined content. To differentiate Content Pack Views from ones created by VSA admins, all Kaseya-provided View content has a prefix of “zz[SYS]”:
  • 14. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool • Managed Monitor Set content is visible within the System cabinet on the Monitor > Monitor Sets page:
  • 15. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool • Managed Agent Procedure content is visible within the System cabinet on the Agent Procedure > Schedule/Create page:
  • 16. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool • Managed Policy content is visible within the System cabinet on the Policy Management > Policies page:
  • 17. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Systems Management Tool • Content within the System cabinet should not be edited • To customize System content, copy the policy, monitor set, or agent procedure to a Private or Shared folder • Apply policy based from customized System content to an individual machine or group to take precedence over the System content • Learn more about the Systems Management Tool: http://help.kaseya.com/WebHelp/EN/SSP/10 00000/index.htm#11252.htm
  • 18. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Management: Creating Policies
  • 19. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Creating and Managing Policies • Create a manageable folder structure – by function or by client/org • Create Views specific to policy – Specific machine types (i.e., by OS, by application, server v. workstation, etc.) – Any changes to Views may impact endpoints – ensure Views are edited accurately – Creating Policy-specific Views can help minimize accidental changes to Views in use by Policy • Example: ExchangeServer Policy-ExchangeServer • Policy Mgmt > Policies > Add Policy • Select and configure desired policy objects • Select View to define which endpoint should receive the policy
  • 20. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Creating and Managing Policies Save v. Save and Apply • Save: Saves the changes to the policy. Policies are in a pending state. No changes are applied to endpoints. – A policy that is saved but NOT applied will appear with a yellow scroll icon on the Policies page: – A policy that has no View associated will appear with a red scroll icon on the Organization/Machine Group page: • Save and Apply: Saves changes to the policy and applies the changes to the endpoints – Apply Now: Apply the changes to all affected endpoints immediately. Can cause some performance issues, depending on overall workload of server. – Allow scheduler to apply: Changes will be applied at next deployment interval
  • 21. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Management: Policy Precedence
  • 22. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Precedence – Who Wins? • Multiple policies can be assigned to a single endpoint • Some policy objects will be combined and some will conflict • Rules determine which policy will “win” when there is a conflict
  • 23. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Precedence - Combine Which policy objects combine? – Monitor Sets – Agent Procedures – Event Log Alerts – Distribute Files When more than one policy is applied to a machine, and each policy defines the above objects, the endpoint will receive ALL of the defined combinable objects
  • 24. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Precedence Combine Example PolicyA defines two Agent Procedures: PolicyB defines different Procedures: PolicyA and PolicyB are assigned to the same endpoint, workstation1
  • 25. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Precedence Combine Example (continued) • When the policies are applied to workstation1, all four Procedures are assigned: • Note: If the same procedure is scheduled in both policies, each with different schedules, policy precedent rules will determine which procedure schedule will be applied to the endpoint – For combinable objects, Policy Mgmt will use the same logic as the module. If the module allows the same object to be assigned multiple times to the same endpoint, all settings will be passed to the endpoint. If the module allows only ONE setting per machine for the selected object, policy precedent rules will be followed.
  • 26. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Precedence - Conflict • Remaining Policy Objects conflict • When a conflict exists, the winning object is determined based on precedence. The more closely the policy is assigned to the machine level, the more precedence the policy has. • Possible layers are: Global, Org, Parent Group, Child Group (including nested child groups), Machine
  • 27. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Precedence - Conflict • A policy assigned at the Global will apply to all endpoints • A policy applied at the org level will apply to all endpoints within the org. Any conflicting Global objects will be overwritten with the settings in policies applied at the Org level • A policy applied at the Parent Group level will apply to all endpoints in the group. Any conflicting objects applied at the Global or Org level will be overwritten with settings in the policies applied at the Group level • Child-group policies will overwrite any conflicts from global, org, or parent group policies • Policies assigned directly to an endpoint will win over conflicting settings at the higher levels.
  • 28. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Handling Conflicts Credential Global Agent Menu Log History LAN Cache Org Credential Group Machine Effective Settings Agent Menu Patch Reboot Action Working Directory Working Directory Patch Reboot Action File Source Remote Control X X X X
  • 29. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policies Assignment Rules • Multiple policies can be assigned to any organization or machine group or machine. • A machine with multiple policies assigned to it has conflicting policies when both specify the same policy type. – Multiple policies are not in conflict if different policy types are specified. – The following policy types combine with each other so that no conflicts occur. • Event log alerts, distribute files, monitor sets, and agent procedures. • Policies are assigned by organization/machine group using the Organizations/Machine Groups page. – Policies assigned to a lower level in an organization hierarchy have precedence over policies assigned to a higher level in the same organization hierarchy. – Unless a lower level policy conflicts with it, policies assigned to a level apply to all lower levels. – When multiple policies are assigned to the same organization or machine group, the assigned policies have precedence in the order listed. • Policies can be assigned by machine using the Machines page. – Policies assigned by machine have precedence over all policies assigned to that machine by organization/machine group. – Policies assigned by machine have precedence in the order listed. • All policy assignments can be overridden by changing agent settings manually throughout the VSA. – Manual changes have precedence over all policies assignments. • A policy can be associated with a view definition in the Policies page. – When machine is assigned to a policy by organization or by machine group an associated view filters the machines associated with a policy. If a machine is not a member of the view definition, then the policy will not be propagated to that machine. – When a machine is assigned to a policy by machine, then the view associated with a policy is ignored and the policy will be propagated to that machine. – Associating a policy with a view does not, by itself, assign a policy to any machine. • The order of precedence for views depends on the policies they are associated with.
  • 30. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Assigning Policies by Org/Group aarentals Drag folder from Policy list… …to an organization • Assign policies to organizations or groups by dragging individual policies or folders to the org • When assigning folders, all policies within the folder will be assigned
  • 31. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx “Higher” v. “Lower” precedence • Order the policies/folders based on the precedence you want applied. The higher in the list, the higher the precedence. Precedence determines which policy “wins” when a conflict is present aarentals If a policy in the Global Policies folder conflicts with a policy in the Windows Workstation… Folder, precedence rules dictate the settings in the Global Policies folder will “win” because it appears higher in the assignment list.
  • 32. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx “Higher” v. “Lower” precedence Ordering Policies • Drag/Drop assigned items to re-order the list. The lower in the list, the lesser the precedence With the reordering, all policies within Windows Workstation… folder will take precedence over polices in the Global Policies folder
  • 33. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Applying Policies to Machines • Policy > Machines allows you to assign a policy to an endpoint directly • When a policy is assigned directly to an endpoint, View settings are ignored • Precedence rules apply • Policies assigned directly to endpoint will take precedence over policies applied at the group, org, or global level • Machine-assigned policies can be ordered to determine precedence
  • 34. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policies are listed in order of precedence. The higher in the list, the higher the precedence. Use this field to filter by policy name Or select the policy from the cabinet/folder tree
  • 35. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx
  • 36. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Matrix Detail What exactly is applied? Hover over policy icon to reveal the matrix detail
  • 37. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Matrix Detail Policy Object Status
  • 38. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Matrix Detail Machine Effective Policy Settings Policy Name Actual ConfigurationSetting Policy Object name, enabled on the Policies page
  • 39. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Unassigning Policies • Change View settings • Remove from Org/Machine Group • Remove from endpoint • Disable Systems Management Tool • Unassigning policies does not remove the setting from the endpoint. It only disables the centralized management of settings by policy • To remove the settings from the endpoint, visit the individual Module pages and manually clear settings.
  • 40. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Management: Settings
  • 41. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Management > Settings • Deployment Interval: Frequency to apply policy settings to endpoints after changes/edits to policies – Changes to endpoints based on VIEW membership occurs via a backend process that runs once per hour • Compliance Check: Frequency of verification of settings assigned to endpoints as compared to settings defined by applied policies. Manual overrides are detected during compliance checks.
  • 42. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Management: New Features in 6.3
  • 43. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Organization Credentials • Audit > Manage Credentials • Define a credential for all machines within the selected organization • Created by Systems Management tool (if Patch function enabled) or can be manually defined by an admin • Policy can leverage this credential • Allows admin to use single policy with Agent Credential object defined for multiple organizations/clients
  • 44. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Using Organization Credentials • Enable the policy object Credential • Check “Use organization defaults” • The credential defined in Audit > Manage Credentials will be used • This policy can be shared by multiple orgs • At this time, Policy is the only function that leverages the org credential
  • 45. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx New 6.3 Policy Functions • Support for add-on modules such as KAM, KAV, KES, KDPM • LAN Cache assignment – LAN Cache must be created on host machine via Agent > LAN Cache – LAN Cache Assignment is separate from File Source. LAN Cache can be used as the patch file source, but assigning only the LAN cache policy object will NOT configure the Patch File Source object. • Remote Control Session Terminate messages
  • 46. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx New 6.3 Policy Functions • Agent Procedure schedule can be edited • “Exclude Time” is no longer enabled by default in scheduler • Patch schedules will combine if one policy defines Scan schedule and second policy defines Update schedule • Effective Machine Policy Settings • Audit and Patch schedules can be set to “None” to prevent schedule settings from two policies from merging
  • 47. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx New Policy Object Functions Merging Schedules • PolicyA defines Scan schedule: • PolicyB defines Update schedule: • If both policies are applied to a single endpoint, the endpoint will combine these two functions
  • 48. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx New Policy Object Functions Merging Schedules • To prevent this combining, set the blank schedule to “None”: • When PolicyA and PolicyB are assigned to the endpoint, the Scan schedule will be left undefined (provided the policy defined above is the “winning” policy).
  • 49. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Additional New Features Sharing Policy Content • Cabinet contents can be shared with variable rights Right Click on Folder Then click “Share” Admin
  • 50. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Additional New Features Sharing Policy Content • When share permissions are granted on a folder, all contents of the folder inherit the permissions of the parent folder • Permissions can only be granted at folder levels • Contents of the System Cabinets are visible to Master admins only (for SaaS customers, the equivalent is “System” role)
  • 51. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Additional New Features Access Rights Action buttons •Save, Save and Apply, Delete, Edit, etc. and Policy Objects •Agent Menu, Agent Procedures, Alerts, etc. can be controlled via Role Access Rights (System > Roles > Access Rights)
  • 52. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Management: Troubleshooting
  • 53. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Effective Machine Policy Settings • Leverage Effective Machine Policy Settings function to: – Determine which specific setting is causing an out of compliance notification – Which policy is “winning” for individual settings – Quickly determine all settings applied to a machine via Policy Management
  • 54. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Troubleshooting Policies • Attempt to determine if the issue is with Policy Management or with the individual Module – If function is not working via Policy, test configuring the same setting via the individual module – If configuring the setting via the module is not successful, troubleshoot the module first – If opening a ticket with Kaseya Support, attempting to determine whether the issue exists in the module can assist in proper routing of ticket and speed resolution • Example Issue: Agent Procedure assigned via Policy does not run. • Troubleshooting: Attempt to assign/run the procedure on the endpoint via the Agent Procedure (AP) module. If fails in AP, issue likely lies with AP module. If succeeds in AP but fails when assigned via Policy, issue may lie with policy.
  • 55. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Troubleshooting Policies: Policies not applying • Patience – policies can take time to apply. Many functions are not immediate. All functions should complete within a few hours (often less) of a change, but few will complete immediately – Exception: Apply policy and choose “Apply Now” will begin the application of policy settings to machines, but time to complete will vary • Check Policy Mgmt > Settings > Deployment Interval – If Manual, policies will not automatically deploy – If configured other than manual but deployments are not occurring, change setting > Save, then restore to desired setting > Save • Check Policy Mgmt > Dashboard to view pending events (changes not yet applied)
  • 56. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Best Practices • Multiple layered policies are easier to manage and share across orgs than a few policies with multiple, broad objects configured • COPY from System Cabinet and modify within the Private cabinet – Assign System content, then use customized policy with higher precedence to override unnecessary content settings • Use manual overrides for exceptions on individual machines for short-term testing • Create unique policies applied directly to endpoint to manage exceptions for longer-term • Create views specific to policy
  • 57. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx When will changes occur? Action Interval Deployment Interval Configurable - Defined on Policy > Settings page Compliance Interval Configurable - Defined on Policy > Settings page New Agent Triggers application of policies based on Deployment Interval defined Assignment based on View changes Backend process runs once per hour Defined Schedules (Agent Procedures, Patch/Audit schedules, etc.) Runs at the first interval after the policy is applied to the endpoint. Will not run immediately upon policy assignment to the endpoint. Past schedules will not run.
  • 58. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Policy Hotfixes • At times, hotfixes are necessary to resolve bugs • Often, a hotfix to Policy Management may require that the policies be reprocessed after the hotfix is applied to the VSA – Reprocess policies via Policy Management > Machines > Reprocess Policies
  • 59. Presentation will be available for download at http://www.kaseya.com/forms/techjams.aspx Thank you • Slides and recorded presentation will be available for download at http://www.kaseya.com/forms/techja ms.aspx • Chat-based Q&A session will continue for a few minutes. Please continue post questions in the Q&A window.

Notes de l'éditeur

  1. log: C:\\Windows