A configuration policy is a set of parameters that determines how a particular component behaves. It is a tool used to automate routine maintenance and security tasks, and it makes possible centrally managed configurations of managers, agents, and servers. A configuration policy is composed of settings that are grouped in nodes or folders in the DSM Explorer.
As an administrator, you can control and enforce the configuration of such policies throughout your enterprise by applying the default computer policy. You can also create customized policies and apply these policies to computers and groups within your enterprise.
All configuration policies available in the domain are shown in the DSM Explorer tree under the Control Panel, Configuration, Configuration Policy node. Upon installation a default policy with predefined settings is created under the Default Computer Policy node. This policy and its settings act as a template for any new policies you create. You can, however, change the default policy; if you do, any changes to the policy or its settings are also reflected in the new policies.
Note: The default computer policy is also used where no policy has been directly applied to a computer.
The Configuration subnodes under any Computers and Users, Group Details node permit you to apply policies to assets and groups. When this node is selected, the right pane of the DSM Explorer displays the active and scheduled policies for this asset or group. The Active Policies portlet shows the policies that have been applied to an asset. This section also indicates when policies are in conflict. Conflicting policy is also flagged in an event log.
Any number of policies can be applied to an asset or group using either the drag-and-drop method or the Copy and Paste, Configuration Policies context menu options. In either case, the Schedule Policies dialog is invoked. Once scheduled for activation, all the policy applications are displayed in the Scheduled Policies portlet of the right pane. Additionally, you can use the New Configuration Job Wizard to assign a configuration policy to a group.
The policy object is protected by common security. You can define which users have permission to modify, create, or delete a policy. The Object Permissions dialog lets you define the owners and permissions of the object.
Note: For more information about common security and permissions, see the Common Security section of the DSM Explorer Help.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|