130 likes | 373 Views
Speakers. Sam Tessier ZENworks Category Specialist North East, USA Novell, Inc. Mark Schouls ZENworks Product Manager Product Evangelist Novell, Inc.. Session Structure. Agenda. PackagingDistribution options and featuresPre-installImaging add-onCachingOutside the firewall operationsUninstall optionsDemonstration.
E N D
1. Novell ZENworks®Advanced Application Management
2. Speakers Sam TessierZENworks Category SpecialistNorth East, USANovell, Inc.
Mark SchoulsZENworks Product ManagerProduct EvangelistNovell, Inc.
3. Session Structure NSG
NSG
4. Agenda Packaging
Distribution options and features
Pre-install
Imaging add-on
Caching
Outside the firewall operations
Uninstall options
Demonstration
5. ZENworks® Desktop ManagementAdvanced application features
6. Packaging SnAppShot
Prepare the workstation
Use Standard, Custom or Express Options
Modify and test the application
7. Packaging InstallShield AdminStudio ZENworks® Edition
Repackager
Repackages and convert legacy setups into Windows Installer packages
Tuner
Build Windows Installer transforms for changing features or adding files
Distribution Wizard
Prepare packages for distribution through ZENworks
8. Microsoft Windows Installer Provides the following basic functions:
Transactional operations
Self-healing
Installation on demand
Installation in locked-down environments
State management Provides the following basic functions:
•Transactional operations. All installation operations are transactional. For each operation that Windows Installer performs, it generates an equivalent undo operation that would undo the change made to the system. If a failure occurs during the middle of an installation, Windows Installer can roll back the machine to its original state.
•Self-healing. Windows Installer supports "self-healing" abilities for applications. Applications can detect common installation problems at launch, like missing files or registry keys, and automatically repair themselves.
•Installation on demand. Windows Installer supports on-demand installations of application features. For example, the spelling checker in Microsoft Office Word may not be installed by default, but a user can trigger an on-demand installation of this feature.
•Installation in locked-down environments. In fully locked-down environments, users don't generally have permission or the ability to install applications. In most cases, they don't have write-access to the Program Files folder of their computers or to the HKEY_LOCAL_MACHINE registry location. If an administrator approves an installation package by means of Group Policy, for instance, Windows Installer can perform an installation on the user's behalf.
•State management. Windows Installer provides a set of standard Win32® application programming interfaces (APIs) and automation interfaces for applications and administrators to use for querying the installation state on the machine. The APIs allow querying of the current state, verification of the existing state, repair of a corrupted state, and transition from one state to another.
There other items that MSI can do with regard to logging and security.
Provides the following basic functions:
•Transactional operations. All installation operations are transactional. For each operation that Windows Installer performs, it generates an equivalent undo operation that would undo the change made to the system. If a failure occurs during the middle of an installation, Windows Installer can roll back the machine to its original state.
•Self-healing. Windows Installer supports "self-healing" abilities for applications. Applications can detect common installation problems at launch, like missing files or registry keys, and automatically repair themselves.
•Installation on demand. Windows Installer supports on-demand installations of application features. For example, the spelling checker in Microsoft Office Word may not be installed by default, but a user can trigger an on-demand installation of this feature.
•Installation in locked-down environments. In fully locked-down environments, users don't generally have permission or the ability to install applications. In most cases, they don't have write-access to the Program Files folder of their computers or to the HKEY_LOCAL_MACHINE registry location. If an administrator approves an installation package by means of Group Policy, for instance, Windows Installer can perform an installation on the user's behalf.
•State management. Windows Installer provides a set of standard Win32® application programming interfaces (APIs) and automation interfaces for applications and administrators to use for querying the installation state on the machine. The APIs allow querying of the current state, verification of the existing state, repair of a corrupted state, and transition from one state to another.
There other items that MSI can do with regard to logging and security.
9. Distribution Options Pre-Install
Distributes portions of an application to a workstation before a user launches the application the first time
Image add on
Create an image file for the application
Caching
Hidden directory
Used to display, launch, install, fix and uninstall when the user or workstation is disconnected from eDirectory™
10. Outside Firewall Operations Remote Connection Detection
Prompt, network id or max interface speed
Checkpoint Restart
Download resumes from last termination point
Alternate Applications
Launching an alternate applicable application for a remote connection
Disabling Applications for Remote Connections
11. Uninstall operations Application Uninstall Options
User enabled or disabled
Control files, registry, ini settings to be removed
Uninstall after unused time frame
Uninstall after user disassociation
12. Demonstration
14. Unpublished Work of Novell, Inc. All Rights Reserved.
This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability.
General Disclaimer
This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Novell, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.