Home » Endpoint Central Configurations
 

Endpoint Central configurations

Introduction to configurations

Endpoint Central (formerly known as Desktop Central) offers configurations that help administrators manage applications, system settings, desktop settings, and security policies. These are extremely helpful in baselining systems and targets can be selected at user or system level. A group of configurations can also be applied together using the collection feature. The selected settings comes into action either during user logon or computer startup (depending on the type of configuration applied) to minimize the loss of productivity. Status of the applied configurations can also be tracked anytime.

Standardize configurations across your network by applying:

Refer the below-mentioned documents for further insights on configurations:

  • User configurations: This section provides information about various user-based configurations that you can deploy using the product and the steps to define them.
  • Computer configurations: This section provides information about various computer-based configurations that you can deploy using the product and the steps to define them.
  • Collections: This section provides information about defining a collection of configurations and steps required to deploy them simultaneously to several users or computers.
  • Defining targets: This section provides information about defining targets to which you want to deploy configurations or collections.
  • Configuring execution settings: This section provides information about configuring execution settings while defining a configuration. Endpoint Central enables you to automate the redeployment process through the Execution Settings option.
  • Managing configurations and collections: This section provides information about managing defined configurations. It gives you information about the following:
    • Various configuration statuses displayed on the Endpoint Central server
    • Modifying configurations or collections
    • Viewing the status of the defined configurations or collections
    • Suspending deployment
    • Resuming suspended deployments
  • Configuration reports: This section provides information about viewing a detailed report about configurations that you define and deploy using Endpoint Central. You can also view the status of each configuration in this report.

Defining Configurations

Configurations can be defined for computers or users. You can define a configuration from scratch or use predefined configuration templates. You can also create a group of configurations and deploy them as a collection.

Defining configurations is a four-step process. It comprises of the following steps:

  • Enter a name and description for the configuration
  • Defining the configuration includes the following:
    • Package settings
    • Deployment settings
  • Define a target
  • Configure execution settings

After you define a configuration, you must apply it to specific targets (computers/users) in your network.

Applying Configurations

When you deploy a configuration using Endpoint Central, the configuration settings along with the required files will be stored in the Endpoint Central server. Endpoint Central agents, which are installed in the client computers in your network, will contact the Endpoint Central server to collect this information and apply the configurations to specific client computers. The agents will contact the server during the following intervals to collect the required information:

  • User-specific configurations: When a user logs on and every 90 minutes thereafter till the user logs out of the domain
  • Computer-specific configurations: When a computer is started and every 90 minutes thereafter till the system is shut down

Re-applying Failed Configurations

When you deploy a configuration to client computers, the deployment could fail in a few computers due to various reasons. In such cases, you can re-deploy the configuration. Endpoint Central enables you to automate the redeployment process through the Execution Settings option. This option enables you to do the following:

  • Specify whether you want the agent to retry applying this configuration in the computers in which the deployment of the configuration failed
  • Choose the number of times you want the agent to try deploying a configuration. You can also specify how many times, out of the number of times that you have specified, you want the configuration to be deployed when:
    • Users log on
    • Computers complete the 90-minute refresh cycle

Based on the specified input, configurations will be re-deployed on the computers on which the deployment failed till  either of the following takes place:

  • Deployment is successful
  • Maximum retry count is reached

Reverting Configurations

Reverting Configurations for macOS

To remove restrictions or configurations applied to macOS devices based on MDM Profile Support, you can simply move the configurations to the trash by following these steps:

  1. Navigate to All Configurations under the Configurations tab.
  2. Select the configurations you wish to delete.
  3. Click the Move to Trash button located near the Create Configuration action.

Other configurations such as Software Deployment, Patch Installation, Custom Scripts, and similar settings are more permanent. To revert these, you can create the configuration again with your preferred settings and redeploy them. For example: If you have previously installed software that you now want to remove, you can select the Install/Uninstall Software configuration and change the operation type to Uninstall to revert the configuration.

Reverting Configurations for Windows

The Secure USB settings configuration is the only one that can be reverted by moving it to the trash. For all other configurations, modifications and redeployment are required. Here’s how you can modify configurations in some common scenarios:

Reverting Software Deployment

If you have deployed a configuration to install a software application, you can revert it by modifying the configuration to enable uninstallation. To do this, change the following:

  • Update the Operation Type from Install to Uninstall.
  • Adjust the Type of Package.
  • Ensure the package includes an uninstall string.

Reverting Security Policies

For configurations related to security policies, modify the settings as needed before redeploying. For instance, if you initially disabled the ability to change the desktop wallpaper, you can adjust the configuration to re-enable this option before redeploying the updated policy.

  1. Mac Configuration Enhanced Workflow