PROXY Pro Deployment Tool v10.0. User Guide October 2017

Similar documents
PROXY Pro Web Console Operations v10.0. User Guide October 2017

PROXY Pro Master v10.0. User Guide October 2017

PROXY Pro Web Console Operations Guide v10.1

PROXY Pro Host Manual v10.0. User Guide October 2017

ROCK-POND REPORTING 2.1

SolidWorks Enterprise PDM Installation Guide

Monitoring Windows Systems with WMI

KYOCERA Net Admin User Guide

A guide to configure agents for log collection in Log360

Getting Started Guide. This document provides step-by-step instructions for installing Max Secure Anti-Virus and its prerequisite software.

Remote Process Explorer

Welcome to PDQ Inventory

Jetico Central Manager Administrator Guide

Automating the Windows 2000 Installation

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Reference Book

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Help Contents - December 4, 2012

Aspera Connect Windows XP, 2003, Vista, 2008, 7. Document Version: 1

3.1. Administrator s Guide TNT SOFTWARE. ELM Log Manager. Version

Colligo Manager for Outlook User Guide. User Guide

Print Audit 6. Print Audit 6 Documentation Apr :07. Version: Date:

NetExtender for SSL-VPN

Purpose. Target Audience. Windows Machine Requirements. Windows Server Core (No Desktop) Nagios XI. Monitoring Windows Using WMI

Print Manager Plus 2010 Workgroup Print Tracking and Control

FieldView. Management Suite

Parallels Remote Application Server

Remote Process Explorer

Privileged Remote Access Jump Client Guide

Freshservice Discovery Probe User Guide

The Centrify browser extension

Provisioning the K1000 Agent

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

Remote Support Jump Client Guide: Unattended Access to Systems in Any Network 3. Recommended Steps for Implementing Bomgar Jump Technology 4

Privileged Access Management Administrative Guide 15.1

Quest Privilege Manager for Windows 4.1. Administrator Guide

Windows Server 2003 { Domain Controller Installation and Configuration}

Parallels Remote Application Server

LUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2

Kaseya 2. Installation guide. Version R8. English

Client Installation and User's Guide

Installing the Cisco Unified MeetingPlace Web Server Software

EventTracker Manual Agent Deployment User Manual Version 7.x

OpenLM Agent Installation V and Up

Veriato Recon / 360. Version 9.0.3

IQSweb Installation Instructions Version 5.0

Cisco TelePresence Management Suite Extension for Microsoft Exchange

PAN 802.1x Connector Application Installation Guide

AT&T Core Mobility Integrated Dispatch Console User Guide. Installation Guide. AT&T Integrated Dispatch Console 3.0

Doc-Trak Infor CloudSuite. Installation Manual. The Lake Companies, Inc Walker Drive, Green Bay, WI

Policy Settings for Windows Server 2003 (including SP1) and Windows XP (including SP2)

Privileged Access Jump Client Guide

Getting started with System Center Essentials 2007

Virtual CD TS 1 Introduction... 3

Welcome to PDQ Deploy

Microsoft ISA 2006 Integration. Microsoft Internet Security and Acceleration Server (ISA) Integration Notes Introduction

User Guide. Revised in Nov, enpowermanager. Version Power Management Software

Installing and Configuring vcloud Connector

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

Exchange Pro 4.4. User Guide. March 2017

PI Connector for Ping 1.0. User Guide

3.1. Administrator s Guide TNT SOFTWARE. ELM Enterprise Manager. Version

10ZiG Technology. Thin Desktop Quick Start Guide

Receiver Updater for Windows 3.0

Centrix WorkSpace IQ Installation Guide. Version 4.5

Zimbra Connector for Microsoft Outlook User Guide. Zimbra Collaboration

Phone: Phone: +41-(0) Fax: Fax: +41-(0)

cc: On-Demand Install and User Guide, Version 4.5 R2

Privileged Remote Access 18.3 Access Console User Guide

Deploying Adobe Acrobat or Reader using SyAM Management Utilities

Receiver (Updater) for Windows 2.0

Client Installation and User's Guide

Distributed Processing

1. ECI Hosted Clients Installing Release 6.3 for the First Time (ECI Hosted) Upgrading to Release 6.3SP2 (ECI Hosted)

Team Foundation Server Integration using QTfsListener

Transport Gateway Installation / Registration / Configuration

Access Gateway Client User's Guide

Xton Access Manager GETTING STARTED GUIDE

XIA Links. Administrator's Guide. Version: 3.0. Copyright 2017, CENTREL Solutions

Avalanche Remote Control User Guide. Version 4.1

ForeScout Extended Module for Advanced Compliance

Embarcadero AppWave Browser

GSS Administration and Troubleshooting

Installing and Configuring vcenter Multi-Hypervisor Manager

CTC BIM Suites Installation and Configuration Guide

Version 6.3 Upgrade Guide

Welcome to PDQ Deploy

ConfigMgr Client Troubleshooting

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition

Contents. Override Default Preferences Pre-Configure Preferences with Transform Files (.MST) Install MSI for current user...

Installation Guide. for 6.5 and all add-on modules

Ekran System High Availability Deployment Guide

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Scribe Insight Installation Guide. Version August 10, 2011

IBM Aspera Connect User Guide 3.8.0

ELM Server Exchange Edition ArchiveWeb version 5.5

Administrative Guide Standard Licensing

8.0 Help for Community Managers Release Notes System Requirements Administering Jive for Office... 6

Copyright and Trademarks

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Silk Performance Manager Installation and Setup Help

Transcription:

PROXY Pro Deployment Tool v10.0 User Guide October 2017

Table of contents 1. System Requirements...3 2. Target Computer Requirements...4 3. Deployment Tool Operation...5 3.1 Loading a Host Install File...6 3.2 Loading a Master Install File...7 3.3 Creating a new Configuration Template...8 3.4 Creating a Transform File...9 3.5 Deploying!...10 4. Changing Host Configuration Settings...11 5. Using MSIEXEC with Group Policy and/or SCCM...12 6. Settings Breakdown for Master and Host...13 6.1 PROXY Pro Master Settings...14 6.2 PROXY Pro Host Settings...15 7. Additional Resources...17 8. Import and Export Settings...18 9. Troubleshooting...19 2

1. System Requirements The PROXY Pro Deployment Tool is supported on the following Microsoft Windows operating systems: Windows Vista, 7, 8, 8.1, 10 Windows Server 2008, 2008 R2, 2012, 2012 R2, 2016 Hardware Requirements Minimum requirements Same as those specified by Microsoft for the respective operating system. Recommended requirements Same as those specified by Microsoft for the respective operating system. The following additional requirements are required or recommended for installation of PROXY Pro Deployment Tool: Windows Installer 3.1 or later. Adobe Reader - Required for documentation. Microsoft Management Console 3.0 is recommended Local Administrator access rights Required for the user who is installing PROXY Pro Deployment Tool on the machine. Microsoft Core XML Services (MSXML) 6.0 Required. If the Deployment Tool cannot find the redistributable MSXML6 system component, an error message will appear and the navigation tree will be restricted to the single root node. In this case, you must install Deployment Tool Installation MSXML6 and restart the Deployment Tool. See http://www.microsoft.com for more information about the redistributable msxml6.msi package. NOTE: These prerequisites are met by the supported platforms, and therefore they are not included in the PROXY Pro software distribution packages. Operating Requirements The following requirements are recommended for operation of PROXY Pro Deployment Tool: Domain Administrator access rights - Because the PROXY Pro Deployment Tool accesses other computers on the network, the tool should be operated with domain administrator credentials. This provides the access rights to manage all of the computers within the domain. If the PROXY Pro Deployment Tool is run from an account that does not have access rights to a computer in your network, a password prompt will appear. PROXY Pro Deployment Too. Microsoft Management Console requirements PROXY Pro Deployment Tool uses the Microsoft Management Console (MMC). PROXY Pro Deployment Tool stores state information, such as the list of paths to the installation files, product configurations, the network places hierarchy, and the reports, via MMC. NOTE: In MMC v2.0, different users of the console file do not share state data. State information is preserved if the PROXY Pro Deployment Tool is uninstalled and later reinstalled. Adding the Deployment Tool to the MMC 1. Click Add and select PROXY Pro Deployment Tool from the list that appears. 2. Click Add and then Close. 3. Click OK to close the remaining dialog and complete the process. Deployment Tool Installation 3

2. Target Computer Requirements There are a few target computer pre-requisites that must be met in order for the Deployment Tool to communicate with them: The PROXY Pro Deployment Tool can be used to install or uninstall PROXY Pro software (usually PROXY Pro Host) on target computers that meet the following requirements: Windows Management Instrumentation (WMI) must be installed and the service must be running. Microsoft Windows Networking must be installed and enabled Remote Procedure Call (RPC) must be enabled on target computers (i.e. standard administrative shares IPC$ and ADMIN$ must be accessible). Your target computers must support authentication of remote users. On computers that are not members of the domain, there is a local security policy that may prevent this. See Sharing and security requirements for Windows below for more information. Sharing and security requirements: Follow this procedure to set up a sharing and security policy for local accounts: Select Control Panel > Administrative Tools > Local Security Policy. Under Security Settings > Local Policies > Security Options > Network access: Sharing and security model for local accounts, set the value to Classic - local users authenticate as themselves. 4

3. Deployment Tool Operation After installing PROXY Pro Deployment Tool, it can be started by selecting Start > Programs > Proxy Networks > PROXY Pro Deployment Tool. The PROXY Pro Deployment Tool window appears! The PROXY Pro Deployment Tool has five main options, which are represented in the left-hand side navigation window: Installation Files, for loading PROXY Pro Host, PROXY Pro Gateway, or PROXY Pro Master installer files to distribute via the Deployment Tool Product Configurations, for creating Windows Installer Transform.mst files with custom configuration changes that you wish to push out to remote computers via the Deployment Tool Network Places, for specifying target computers within your network on which to install or uninstall software on (as well as to remotely rebooting any network computer) using NetBIOS commands Active Directory Domains, for discovering remote computers and OUs in your domain, and for installing new PROXY Pro software or upgrading older versions of existing PROXY Pro software Reports, for viewing results of product deployment activities via the Deployment Tool PROXY Pro Deployment Tool The general process for loading and distributing software via the Deployment Tool is described in the results pane. 5

3.1 Loading a Host Install File 1. Right-click on Installation Files in navigation tree and select New > Installation File. 2. Navigate to the directory containing the original product installer (.msi) file for the PROXY Pro Host, being either Host.msi for 32-bit systems or Host-x64.msi for 64-bit systems 3. Select the file(s), and click Open. The selected file will be loaded into the Deployment Tool and details will appear in results pane on the right-hand side. Deployment Tool Operation 6

3.2 Loading a Master Install File 1. Right-click on Installation Files in navigation tree and select New > Installation File. 2. Navigate to the directory containing the original product installer (.msi) file for the PROXY Pro Master, being Master.msi. Select the file, and click Open. 3. The selected file will be loaded into the Deployment Tool and details will appear in results pane on the righthand side. 7

3.3 Creating a new Configuration Template 1. Right-click on the Product (Host or Master) listed under Product Configurations for which you intend to create a default configuration, and select New Configuration. 2. Enter a name for the configuration and click OK. 3. A new node for this named configuration appears in the left-hand navigation tree under the Product that you selected, which can be generated into a transform file. 8

3.4 Creating a Transform File 1. Right-click on a Product Configuration file in the navigation tree and select New > Transform File. 2. In the first dropdown box, find the original PROXY Pro Installer (.msi) file corresponding to the type of Product Configuration file you selected in the left-hand navigation box (this should have been loaded in the first step of this process (see "Installation Files"). 3. Input a filename for the new Windows Installer Transform file and click OK to create new Windows Installer Transform file. 4. The new Windows Installer Transform file will appear in the left-hand navigation under Installation File. Note that configuration settings that have been changed will show new setting in the Value column and Default flag will be set to "No". Generally, customers create two tranform files (ex. Host32.mst & Host64.mst), one for each architecture. 9

3.5 Deploying! 1. Right-click "Active Directory Domains" Scan the network for domains and workgroups, then scan a domain or workgroup for computers. This allows the Deployment Tool to remember information about each computer that it gets details on, including what version of PROXY Pro software is installed on that computer, and whether we have access to deploy software to it. Note that unlike the Windows Explorer, the PROXY Pro Deployment Tool does not automatically refresh the "Network Places" collection; you need to manually refresh this list or use Active Directory to locate domains, organizational units and computers. 2. Right-click on a domain or workgroup name under Network Places, and pick Refresh Computer List, in order to enumerate the computers in the domain or workgroup -or- right-click on a domain under Active Directory and pick Refresh Organizational Units and Computers to enumerate the domain. 3. Select the domain, workgroup, or org unit, select one or more computers in the list in the result pane, then right-click and pick Install Software... to begin the software deployment process. 4. Choose the installation file, select the corresponding transform file, suppress the otherwise automatic reboot and click OK - the results of each Deployment Tool task will be available in a report under the Reports node. 10

4. Changing Host Configuration Settings Using the Deployment Tool's "Update Host Settings" capability 1. Expand "Active Directory Domains" to locate machines within your OUs, and right-click. 2. Instead of clicking "Install Software" context menu, click "Update Host Settings" and a drop-down with each configured Product Configuration template appears. 3. Select the deisred template and click OK - your configuration template will be applied immediately. 4. The Deployment Tool will attempt the update as the logged-in user (or the user running the tool) so providing a password in the box is required only if the machines are configured to accept connections with Simple Password. Using PhSetup.exe Built into the installation directory of each Host is a command-line configuration utility called "PhSetup.exe" and it's used to make changes to Host Settings. The Deployment Tool is now capable of generating PhSetup syntax strings for you. Right-click your Host Configuration template -> All Tasks -> Copy command string to clipboard. For more information on PhSetup and a complete list of arguments please see the Host manual. 11

5. Using MSIEXEC with Group Policy and/or SCCM We welcome customers to perform the actual deployment of PROXY Pro via their own preferred means. For those utilizing an enterprise-class solution like SCCM, Altiris, Kace (etc), Proxy can be deployed like any other.msi package. While you are welcome to perform the actual deployment using these means, it is highly recommended that you generate the transform file (containing the Host settings) with the PROXY Pro Deployment Tool. Once generated, please reference the below baseline msiexec installation command. It installs the 64-bit Host silently, with no interface, and suppresses the otherwise automatic reboot: msiexec /qn /I Host.msi TRANSFORMS="Host32.mst" /norestart msiexec /qn /I Host-x64.msi TRANSFORMS="Host64.mst" /norestart 12

6. Settings Breakdown for Master and Host Both the PROXY Pro Master and PROXY Pro Host can be installed with a variety of settings and/or options configured and this section highlights each. 13

6.1 PROXY Pro Master Settings The PROXY Pro Master can be deployed with a number of pre-configured settings and below is a summary of the options. Gateways: Define one or more Gateways PROXY Pro Master connects to. This helps make PROXY Pro Master ready to run immediately upon installation, for those users who connect to Hosts via PROXY Pro Gateway. Add/Remove in Control Panel: Set this option to Disable to prevent users from modifying the PROXY Pro Master configuration. Installation Directory: Specify an installation directory other than the default. License: Specify your product license here. Note that the Master does not use a version upgrade license, so only one license key is required your full product or subscription upgrade key. Keys from previous versions are not accepted by the Master, and should not be entered. Organization: Change the organization name that is shown when you select Help > About PROXY Pro Master. Restart after Installation: After installing with PROXY Pro Deployment Tool, PROXY Pro Master reboots only if necessary. If a reboot is required, it occurs without any prompts. You can suppress the automatic reboot without prompting by selecting Use this value and the Reallysuppress option. User Name: Change the licensee name from the default (Windows) user name with this option. This is the registered user name that is displayed when you select Help > About PROXY Pro Master. Components to Install: Select which components will be installed with this package. "Master with all features" is the default installation, with the Master and Remote Printing support. "Master without Remote Printing support" installs the Master only. NOTE: PROXY Pro Master follows these rules when a set of Gateway configurations are pushed via Deployment Tool, whether at install time or via the Update Master Settings function: New settings take effect only after Master is exited and restarted. Gateways pushed via Deployment Tool are marked read only and cannot be modified by the end-user. Gateways pushed via Deployment Tool apply to all users of the machine, but do not affect any user-defined Gateways. Any previously pushed Gateway that does not appear in the new list will be deleted. Gateways are matched by protocol, address and station specifier. Pushing an empty list will delete all previously pushed Gateways, provided the Remove all gateways from settings? checkbox is checked. Otherwise, pushing an empty list will have no effect. Gateways are pushed without username or password settings, so the first time a pre-defined Gateway is used, if the logged in user does not have sufficient rights to connect to that Gateway, he or she will be prompted by PROXY Pro Master to enter a set of credentials that allow him or her to connect. 14

6.2 PROXY Pro Host Settings Most of the configuration options in the PROXY Pro Host Control Panel window can be modified. These options are related to the PhSetup commands that you execute from a command line. For more information, see the PROXY Pro Host Guide. Modify the following configuration options for PROXY Pro Host: Access tab Access Restrictions: Specify the remote access policy: Select Permit connection to permit remote connections from authenticated PROXY Pro Master users to your Host computer. Select Lock out connection to prevent any remote connections from PROXY Pro Master users to your Host computer. Select Lock out or Permit connection based on time zone to permit or refuse remote connections to your Host computer based on the day of the week and the time of day. You can specify permitted access by time when you click Time Zone Settings. Connection Permissions You can optionally specify that you require or allow the Host computer operator to grant remote access permission to the Host computer. If you require this feature, you can change the Grant Permission Time. If you allow for this feature, you change the Request Permission Time. Select No permission required (default) to allow remote connection to your Host computer from anyone who satisfies restrictions you specify as authentication security settings. Select Permission must be granted by Host if you want to know when a remote user attempts a connection. From the Host s user must respond within list, select the time within which you must accept or reject a request. When a remote connection is requested, the Request Permission for Remote Desktop Window appears. You can accept or reject the request. If you do not respond within the specified time, the request is rejected automatically. Select Permission requested from Host if you want to know when a remote user attempts a connection. From the connection continues after list, select the time after which the connection will be made. When a remote connection is requested, the Request Permission for Remote Desktop Window appears. You can accept or reject the request. If you do not respond within the specified time, the request is accepted automatically. Select Lock workstation if permission not explicitly granted if you want the Host to lock the workstation prior to beginning a new remote control connection (if user is bypassing Host permission). This prevents the new user from "hijacking" the logged-in user's session unless he/she knows the credentials to unlock it. Do not prompt for permission on logon or lock screen: If Yes, suppress any Permission for Connection dialogs when the Host console is displaying a logon or lock screen, accepting the default action. This can facilitate providing the Master access when the machine is unattended. Grant Permission Time: Specify the period before the time-out when you require the Host computer operator to grant remote access permission to the Host computer. Lock Workstation on Default: If "Yes", the workstation is locked if the "Permission to connect" dialog times out. The workstation is not locked if the console user responds to the dialog. If "No", the workstation is never locked. Request Permission Time: Specify the period before the time-out when you allow the Host computer operator to grant remote access permission to the Host computer. Time Zone: Specify the period for remote access. Effects tab Manage Visual Effects: Specify the how visual effects features are remotely controlled. Effects: Sets the flags for the management of visual effects. Checking a box for a category causes that category of effects to be disabled during a connection. Gateways tab Gateways: List the Gateways to which this Host computer reports. These PROXY Pro Gateways must already be deployed in your network. 15

Require Gateway: Require that all remote connections through this Host computer be conducted through the listed PROXY Pro Gateway or servers. Deployment Tool Operation Require Gateway for Admin: Require that all remote administration and remote management connections to this Host computer be conducted through the listed PROXY Pro Gateway or servers. General tab Beep on Connect/Disconnect: Request to hear a quick series of three tones rising in pitch whenever a remote connection succeeds. With this option, you also hear a series of tones falling in pitch when the remote connection is terminated. Beep While Connected? Request to hear a short tone periodically, throughout the duration of any remote connection. You can set the interval between beeps from 0 to 9999 seconds. If you set this field to 0, then it turns the beeping off completely. Extension Tags: Displays any name/value pairs specifying custom information for this Host. Host Notifications: Sets the flags for enabling/disabling host notification popups. Checking a box enables that class of notifications. Unchecking a box disables that class of notifications. Show icon while connected?: Display (or hide) the PROXY Pro Host tray icon when the service is running and there is an active remote connection. Show icon while idle?: Display (or hide) the PROXY Pro Host tray icon when the service is running but there is no active remote connection. Station Name: Modify the name by which your Host computer identifies itself to PROXY Pro Gateways or PROXY Pro Master users. Host station name macros are now supported. The Host station name can include strings in the form %MACRO%, and these macros are substituted at runtime for the correct values. This complements the $MACRO$ feature in PHSETUP, which provides a one-time substitution at PHSETUP runtime. List of PROXY Pro Host Station Name Values %NAME% - Host computer machine name (DELL-XPS-123) %USER% - Logged in user at the Host machine console (DOMAIN\username) %USERNAME% - Logged in user at the Host machine console in <username> only format (username) %VER% - Host software version number (e.g. v9.0.1.3003 ) %INTVER% - Internal Host software version number %PID% - Process ID of the Host service %PLATFORM% - Host operating system platform (e.g. Win2012 ) %PROT% - Network protocol (e.g. IP or TCP ) %ADDR% - Network address (e.g. 192.168.0.15 ) %PORT% - Network port (e.g. 1505 ) 16

7. Additional Resources Our Deployment Tool Walk Through video highlights the steps to use the tool to create a package and deploy the Host: https://www.youtube.com/watch?v=lwvm6gycv_c Please find a summary of Host Settings suggestions upon skimming our Proxy Host Settings Checklist: http:// proxynetworks.com/sites/default/files/proxy-host-settings-checklist.pdf For fine-tuning screen capture settings and optimizing the overall experience, here's what to keep in mind: https://www.youtube.com/watch?v=t8z9ju7eu1y 17

8. Import and Export Settings Newly available for PROXY Pro v9, the Deployment Tool allows users to create a backup of their configuration templates to be exported/imported. This is especially helpful when multiple members of an organization manage implementations of PROXY Pro. Right-click Proxy Deployment Tool at the top of the window and access the additional functions Import Settings from JSON File and Export Settings to JSON File. 18

9. Troubleshooting The Deployment Tool generates errors when operations like deployments fail, and below you'll find a list of common errors and how to resolve them. 0x80070005 - This is Microsoft's generic message for "permission denied". Try authenticating to the target machine as MACHINENAME\Administrator. 0x800706ba - The RPC server is unavailable, OnWorkXXX. The Deployment Tool talks to target machines outbound on TCP port 135 and below are a couple commands that will configure the target machine to allow communications. This command must be run as Administrator and from C:\windows\system32. The output should indicate that 8 rules were updated as a result of the first command, and 4 for the second. Try deploying again. 0xc004c001 - There was no response from the target adderss on the Host's listening port and protocol. This is Proxy's closest equivalent to Microsoft's "ping failed". netsh advfirewall firewall set rule group="windows Management Instrumentation (wmi)" new enable=yes netsh advfirewall firewall set rule group="windows Remote Management" new enable=yes 19