Previous Topic: Modify the Admin Approval ModeNext Topic: SSH Device Connection Information


Windows Endpoint Configuration Tool

The Windows endpoint configuration tool is a utility that configures the Windows operating system. The configuration enables SAM to manage the SAM endpoints.

The Windows endpoint configuration tool can be deployed with any Software Distribution Tool. This helps to configure many endpoints by eliminating potential errors.

The Endpoint Configuration Tool is supplied with the Enterprise Management Server. The tool is at the following location:

<AccessControlServer>\Tools

The Windows endpoint configuration tool performs the following functions:

Note: Verify that the file and printer sharing is enabled. You cannot open the computer manager on the remote computer if the file and printer sharing is disabled.

The command has the following format:

EndpointConfig [-uac] [-firewall] [-log <log_file_name>] [-help]
-uac

Specifies User Account Control remote administration for local accounts.

-firewall

Specifies to disable the Windows firewall.

-log

Specifies the location where the utility output is logged.

Note: If the filename is not specified, the log is displayed in the console.

-help

Specifies to display the help.

Example: Run the Windows Endpoint Configuration Tool

This example displays the command to run the Windows endpoint configuration tool:

C:\>EndpointConfig.exe —uac —firewall

The previous command allows User Account Control remote administration for local accounts and disables the Windows firewall.

Example: Windows Endpoint Configuration Tool Output

The following output is a snippet of the tool output:

CA Access Control EndpointConfig 12.61.0186 — Windows endpoint configuration for PUPM readiness
Copyright (c) 2010 CA. All rights reserved.


WindowsMachine—w7—x64\Admin is configuring Windows system at: 12/16/11 19:55:25

Disable UAC restriction for remote administration

Disabling Windows Firewall

__________________________________

Configuring Windows Firewall

Executed “C:\Windows\system32\netsh.exe” advfirewall set AllProfiles state off successfully for diabling Windows Firewall


Configuring User Access Control for remote administration

Remote administration for local accounts was allowed successfully


Configuring RemoteRegistry Windows service

RemoteRegistry Windows service was started successfully

RemoteRegistry Windows service was configured to start automatically successfully


Configuring ADs Namespaces Object COM object

Appld value within {233664B0—036?—1ÍCF—ABC4—02608C9E?553) CLSID registry was configured successfully (32 bit)
DllSurrogate value within C233664U0—036?—11CF—ABC4—02608C9E?553) AppID registry was configured successfully (32 bit)
Appld value within {233664B0—036?—1ÍCF—ABC4—02608C9E?553) CLSID registry was configured successfully (64 bit)
DllSurrogate value within {233664U0—036?—11CF—ABC4—02608C9E?553) AppID registry is already configured (64 bit)


Configuring WBEM Scripting Locator COM object

Appld value within {?6A64158—CB41—1ÍD1—8B02—00600806D9B6) CLSID registry was configured successfully (32 bit)
DllSurrogate value within <?6A64158—CU41—L1DL—8U02—00600806D9B6) AppID registry was configured successfully (32 bit)
Appld value within {?6A64158—CB41—11D1—8B02—00600806D9B6) CLSID registry was configured successfully (64 bit)
DllSurrogate value within <?6A64158—CU41—11DL—8B02—00600806D9B6) AppID registry is already configured (64 bit)

In the previous example, the following tasks took place: