Endpoint Security Client 4.0 Installation
69
no
vd
ocx
(e
n)
17
Sep
te
m
be
r 20
09
9.2.5 Distributing a Policy with the MSI Package
The default policy included at MSI installation can be replaced with an enterprise-configured policy.
To push down a specific policy with the MSI image:
1
Create a policy to be distributed to all users through the Management Console (see the
ZENworks Endpoint Security Management Administration Guide
for details on Policy
Creation).
2
Export the policy, then rename it to be
policy.sen
.
All policies distributed in this manner (unmanaged) must be named
policy.sen
in order for
the Endpoint Security Client 4.0 to accept them. Policies not named
policy.sen
are not
implemented by the Endpoint Security Client 4.0.
3
Open the folder the policy was exported into and copy the
policy.sen
and
setup.sen
files.
STRBR=ReallySuppress
No reboot after the install completes. Security enforcement and client self
defense are not fully functional until
after the first reboot.
STUPGRADE=1
Upgrade the Endpoint Security Client
4.0.
Upgrades the Endpoint Security
Client 4.0.
STUNINSTALL=1
Uninstall the Endpoint Security Client
4.0.
Uninstalls the Endpoint Security
Client 4.0.
For detailed uninstall instructions, see
“
Uninstalling the Endpoint Security
Client 3.5
” in the
ZENworks Endpoint
Security Management Administration
Guide
.
STUIP=password
Uninstall with password
Use this variable when an uninstall
password is active.
STNMS=”MS Name”
Change the Management Service
name.
Changes the Management Service
name for the Endpoint Security Client
4.0.
POLICYTYPE=1
Change Endpoint Security Client 4.0
to machine-based policies.
Changes MSI-installed Endpoint
Security Clients to accept machine-
based policies instead of user-based
policies.
POLICYTYPE=2
Change Endpoint Security Client 4.0
to user-based policies.
Changes MSI-installed ZENworks
Security 4.0 Clients for Vista to
accept user-based policies instead of
machine-based policies.
STVA=”Adapter name”
Add a virtual adapter.
Activates policy control over a virtual
adapter
/L*v c:\log.txt
Turn on logging.
Activates logging at installation. If you
do not use this variable, logging must
be done through the Endpoint
Security Client Diagnostics tools.
Command Line Variable
Description
Notes
Summary of Contents for ZENWORKS ENDPOINT SECURITY MANAGEMENT 3.5
Page 4: ...4 ZENworks Endpoint Security Management Installation Guide novdocx en 17 September 2009 ...
Page 8: ...8 ZENworks Endpoint Security Management Installation Guide novdocx en 17 September 2009 ...
Page 12: ...12 ZENworks Endpoint Security Management Installation Guide novdocx en 17 September 2009 ...
Page 22: ...22 ZENworks Endpoint Security Management Installation Guide novdocx en 17 September 2009 ...
Page 24: ...24 ZENworks Endpoint Security Management Installation Guide novdocx en 17 September 2009 ...
Page 44: ...44 ZENworks Endpoint Security Management Installation Guide novdocx en 17 September 2009 ...
Page 74: ...74 ZENworks Endpoint Security Management Installation Guide novdocx en 17 September 2009 ...
Page 76: ...76 ZENworks Endpoint Security Management Installation Guide novdocx en 17 September 2009 ...