Novell ZENworks Configuration Management 11 Standard Edition review

We test the latest version of the best known network management suite to see how it stacks up.

Novell ZENworks integrates with your normal network authentication scheme. As long as your Novell password is kept synchronised with your network password (this happens automatically unless there's a problem) the user is automatically logged into the ZENworks management zone when they log into their workstation in the normal way. So any settings you apply in ZENworks will be applied at logon (or when the user agent refreshes its connection to the server).

The range of things you can use ZENworks for is impressively comprehensive. As well as discovering your devices, you can remotely control or view clients without the user knowing what you're up to, if you want (though you'd need a pretty good reason, of course). As you'd expect with this kind of support tool, you can also transfer files, inventory the software installed on your clients (automatically checking it for compliance against licensing information) and even create and push system images.

Using the policies tool, you can create configuration and security policies. Configuration policies can be applied to both Windows and, as long as you use either SuSe or Red Hat, Linux too. From the ZENworks console you can among other things - specify clients' power management settings, printer access, remote management policies and even Windows Group Policy. However, if you want to specify Group Policy on the whole domain, as opposed to local policy, you'll need to import policies from Active Directory. You can't create or edit AD Group Policy using ZENworks.

Featured Resources

The ultimate law enforcement agency guide to going mobile

Best practices for implementing a mobile device program

Free download

The business value of Red Hat OpenShift

Platform cost savings, ROI, and the challenges and opportunities of Red Hat OpenShift

Free download

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security

Free download

Digital remote monitoring and dispatch services’ impact on edge computing and data centres

Seven trends redefining remote monitoring and field service dispatch service requirements

Free download

Recommended

16 ways to speed up your laptop
Laptops

16 ways to speed up your laptop

15 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
NSA and CISA offer new security guidance for VPNs
virtual private network (VPN)

NSA and CISA offer new security guidance for VPNs

29 Sep 2021
Tektronix updates its asset management software
asset management

Tektronix updates its asset management software

10 Sep 2021

Most Popular

Best Linux distros 2021
operating systems

Best Linux distros 2021

11 Oct 2021
Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans
Laptops

Apple MacBook Pro 15in vs Dell XPS 15: Clash of the titans

11 Oct 2021
Windows 11 has problems with Oracle VirtualBox
Microsoft Windows

Windows 11 has problems with Oracle VirtualBox

5 Oct 2021