Whether you're new to the platform, exploring new features, or just need a refresher, Kaseya Support TechJams can help you get the most out of the product today!
Kaseya Support Specialists routinely document commonly asked questions, configuration techniques, and troubleshooting steps in knowledge base articles. To enable our customers to get the best from the product, we have brought these resources together to form the foundation of the Kaseya Support TechJam sessions.
Much more than a product demonstration, Kaseya Support TechJams are designed to bridge the gap between the platform user guide and real world scenarios so that you can build upon your knowledge and practical experience of Kaseya.
Kaseya Connect 2012 - POLICY MANAGEMENT BEST PRACTICESKaseya
Automation is the key to a successful Kaseya implementation and in order to achieve the ultimate goal of 100% automation, it all starts with defining proper policies. This session will walk you through some of the key best practices organizations just like yours can do to ensure proper policies are configured and how to evolve your polices to include additional automation steps through this powerful module.
Product Information - Fuse Management Central 1.0.0antonio.carvalho
Fuse Management Central is an administration platform for OpenText Content Suite/Extended ECM, enabling a centralized management of system while monitoring its components.
Due to its architecture, it separate system administration from business administration, introducing a new layer of security on OpenText Content Suite administration.
(ATS6-APP09) ELN configuration management with ADMBIOVIA
(ATS6-APP09) ELN configuration management with ADM
Starting with AELN 6.7, Accelrys ELN administrators have complete control over the timing and distribution of software updates to clients using Accelrys Deployment Manager (ADM). This session provides a quick overview, then dives deep into the technical aspects of ADM. Attendees will leave with a better understanding of how to use ADM to lower the costs associated with managing client updates.
Everything You Need To Know About Oracle Technology LicensingSmartDog Services
This is a comprehensive oracle licensing guide. Are you paying for more licenses than you need? Did your latest technology upgrade affect the requirements for your oracle licenses? Do you want to get compliant before an audit? SmartDog Services shares exactly what goes into technology and database licenses so you can find out how to save money or pass your next audit with flying colors.
Kaseya Connect 2012 - POLICY MANAGEMENT BEST PRACTICESKaseya
Automation is the key to a successful Kaseya implementation and in order to achieve the ultimate goal of 100% automation, it all starts with defining proper policies. This session will walk you through some of the key best practices organizations just like yours can do to ensure proper policies are configured and how to evolve your polices to include additional automation steps through this powerful module.
Product Information - Fuse Management Central 1.0.0antonio.carvalho
Fuse Management Central is an administration platform for OpenText Content Suite/Extended ECM, enabling a centralized management of system while monitoring its components.
Due to its architecture, it separate system administration from business administration, introducing a new layer of security on OpenText Content Suite administration.
(ATS6-APP09) ELN configuration management with ADMBIOVIA
(ATS6-APP09) ELN configuration management with ADM
Starting with AELN 6.7, Accelrys ELN administrators have complete control over the timing and distribution of software updates to clients using Accelrys Deployment Manager (ADM). This session provides a quick overview, then dives deep into the technical aspects of ADM. Attendees will leave with a better understanding of how to use ADM to lower the costs associated with managing client updates.
Everything You Need To Know About Oracle Technology LicensingSmartDog Services
This is a comprehensive oracle licensing guide. Are you paying for more licenses than you need? Did your latest technology upgrade affect the requirements for your oracle licenses? Do you want to get compliant before an audit? SmartDog Services shares exactly what goes into technology and database licenses so you can find out how to save money or pass your next audit with flying colors.
Optimizing Alert Monitoring with Oracle Enterprise ManagerDatavail
Watch this webinar to find out how OEM Grid configuration using Datavail’s Alert Optimizer™ and custom templates helps eliminate unwanted alerts, while enriching actionable alerts, and improving the performance of the entire database system.
These five areas help organize the tuning approach and define the major concerns beyond the architecture, setup, and data model. It also addresses how performance tuning becomes less of a mystery if it can be measured, documented, affected, and improved.
Your data is one of your biggest assets and protecting it is paramount. Xoomworks BI have found that many organisations have inefficient security models that lead to costly overheads and potential security breaches. Designing a flexible, legally compliant Security model to safeguard your data, which has the capacity for easy maintenance and expansion is a must.
This presentation covers how to build and maintain a flexible Security Model, the problems that could arise from improper management, as well as the different types of Authentication in an Enterprise Environment, including using the Security Token service to your benefit
Simplifying Application Delivery Infrastructure in Azure for MSP'sKemp
Managed Service Providers (MSPs) are becoming more integral to today’s business environment, as enterprises shift away from managing their own IT infrastructure. Simplifying application delivery for MSP’s is critical to their effectiveness. KEMP 360 is a streamlined framework that offers a single point for control, monitoring and diagnosis of published applications and services, enabling MSPs to operate with greater efficiency with improved visibility, centralized management, and reduced time to resolution.
Interconnect session 1888: Rational Team Concert Process Customization: What ...Rosa Naranjo
Process customization, especially around work items, has always been a major hotspot in Rational Team Concert (RTC) adoption. Experience also shows that a lot of the requirements in process customization are driven by process problems and the desire to avoid having to fix the process by customizing the tools instead. This presentation shows the process customization capabilities available in RTC. It also shows examples for requirements that are hard or impossible to implement in RTC and it shows requirements that might indicate that you should consider fixing the process rather than the tool.
Optimizing Alert Monitoring with Oracle Enterprise ManagerDatavail
Watch this webinar to find out how OEM Grid configuration using Datavail’s Alert Optimizer™ and custom templates helps eliminate unwanted alerts, while enriching actionable alerts, and improving the performance of the entire database system.
These five areas help organize the tuning approach and define the major concerns beyond the architecture, setup, and data model. It also addresses how performance tuning becomes less of a mystery if it can be measured, documented, affected, and improved.
Your data is one of your biggest assets and protecting it is paramount. Xoomworks BI have found that many organisations have inefficient security models that lead to costly overheads and potential security breaches. Designing a flexible, legally compliant Security model to safeguard your data, which has the capacity for easy maintenance and expansion is a must.
This presentation covers how to build and maintain a flexible Security Model, the problems that could arise from improper management, as well as the different types of Authentication in an Enterprise Environment, including using the Security Token service to your benefit
Simplifying Application Delivery Infrastructure in Azure for MSP'sKemp
Managed Service Providers (MSPs) are becoming more integral to today’s business environment, as enterprises shift away from managing their own IT infrastructure. Simplifying application delivery for MSP’s is critical to their effectiveness. KEMP 360 is a streamlined framework that offers a single point for control, monitoring and diagnosis of published applications and services, enabling MSPs to operate with greater efficiency with improved visibility, centralized management, and reduced time to resolution.
Interconnect session 1888: Rational Team Concert Process Customization: What ...Rosa Naranjo
Process customization, especially around work items, has always been a major hotspot in Rational Team Concert (RTC) adoption. Experience also shows that a lot of the requirements in process customization are driven by process problems and the desire to avoid having to fix the process by customizing the tools instead. This presentation shows the process customization capabilities available in RTC. It also shows examples for requirements that are hard or impossible to implement in RTC and it shows requirements that might indicate that you should consider fixing the process rather than the tool.
Openstack Cloud Management and Automation Using Red Hat Cloudforms 4.0Prasad Mukhedkar
To success in Private Cloud, You have to have develop management and automation
strategy. Cloudforms is CPM (Cloud Platform Management) software that provides framework to develop management and automation strategy with its flaxible automation
module
Automation Desk II: Policy-Driven Automation and a Glimpse into the Future of...Kaseya
Do you spend a lot of time manually on-boarding new devices? As devices move, and assume new roles, are you chasing behind making manual settings to reflect the changes? Are you often left wondering if all of these manual settings were made consistently and completely? Let Policy Management do the work for you. Policy Management is tightly woven into your existing Kaseya solution, and if you have not yet unleashed its power to drive automation, then attend this session to see what is possible. We will also share a big-picture glimpse of the future of Kaseya automation, and how Policy Management, Service Desk, and Procedures will evolve to make IT service automation easier, and more powerful than ever before.
Managing Updates with System Center Configuration Manager 2012JasonCondo
From the Dogfood Conference 2014 in Columbus Ohio (www.dogfoodcon.com). Learn how the SUP role works in ConfigMgr 2012, how to implement a security risk process and how to manage updates in ConfigMgr 2012.
Slides of the session about Governance features in SharePoint Premium that I delivered at the Modern Workplace Conference Paris 2024. In the session I demonstrated those governance features in key four areas: Security Controls | Content Lifecycle Management | Site Actions & Data Acces Governance
Best Practics for Automating Next Generation Firewall Change ProcessesAdi Gazit Blecher
Hear how AlgoSec seamlessly integrates with Palo Alto Networks NGFWs to simply and intelligently automate App-ID and User-ID security policy change workflows, business application connectivity mapping and compliance reporting across on-premise and cloud environments.
Get an updated 2019 introduction to Sentinel, HashiCorp's policy as code framework. See demos of Sentinel policies inside Terraform, Consul, Nomad, and Vault, and learn about upcoming features.
Similar to Kaseya Support Techjam - Policy Management (20)
Join Kaseya and guest cybersecurity expert from Kaspersky, Cynthia James, to hear how companies like Target, eBay, and Home Depot are losing data, and how you can protect your company from suffering the same fate.
• The latest cybersecurity threats and vectors putting organizations at risk
• How your organization can avoid falling victim to a data breach
• Additional strategies to secure your organization and its data
Enterprise Mobility Management I: What's Next for Management (MDM)Kaseya
Mobility is an ever-changing target for organizations, forcing them to continually advance their capabilities in order to secure and manage corporate data. In this session we will preview the enhancements coming up in Kaseya’s May 2014 release. Focusing on application management and how to best use it, we will cover this new capability in depth. Along with details on additional policy and agent enhancements, we will share the direction we are taking for Enterprise Mobility Management in 2014 so you can plan your adoption strategy for mobile.
Enterprise Mobility Management II: BYOD Tips, Tricks and TechniquesKaseya
The BYOD phenomenon is impacting all organizations. It is no longer a choice whether to ‘allow’ BYOD within the organization – it is happening, and organizations need to figure out how to manage it – fast. With the recent release of Kaseya BYOD Suite, we want to share with you the many ways organizations can harness BYOD to not only secure and manage corporate data, but to drive new value for the organization. We will cover many ways to use the full power of this using examples from actual customer deployments. Come to learn how you can get up and running in minutes and solving this critical IT service need.
Remote Control Architecture: How We Are Building The World’s Fastest Remote C...Kaseya
Signaling, encryption, messaging, video codec, dynamic buffering, P2P, PsuedoTCP and Relay are all various pieces of technology needed to create a remote control session. We have rebuilt the entire remote control solution from the ground up with a focus on speed, performance, and reliability. Come listen as we talk about the next generation of Kaseya remote control and why it will be the fastest in the world.
Reporting and Dashboards: The Present and Future Direction of VSA ReportingKaseya
Analytics and data visualization is becoming a pivotal part of our lives. Good data visualization can showcase never before seen patterns, drive process change, or identify problem areas across organizations. Come hear our vision for the next generation of analytics and data visualization in VSA for servers, computers, applications, users, and more.
365 Command: Managing SharePoint in Office 365Kaseya
In this session you’ll learn how to use 365 Command to maximize your Office 365 SharePoint Online capabilities. From running reports on inactive sites, determining the sizes of sites, and running other common administrative reports, you can do it all with 365 Command. We’ll also spend some time going over the how to find the most active users in your SharePoint Online environment.
365 Command: Managing Exchange in Office 365Kaseya
In this session you’ll learn how to use 365 Command to maximize your Office 365 Exchange Online capabilities. From creating mailbox templates, enabling reporting, and performing other common administrative tasks, we’ve got you covered. Additionally, we’ll spend extra time going over the features that are most valuable for MSPs.
Advanced Administration: Mobile Device ManagementKaseya
Enhance the management of your corporate mobile assets with increased visibility and control across device types, applications and configuration. In this session, you will learn about new ways to leverage the MDM capabilities in Kaseya to provide multiple layers of security for the mobile context. From advanced OS-specific profiles, to strategies for managing applications and network settings, you will gain insights into how to get the most out of the MDM services at your disposal in Kaseya Virtual System Administrator (VSA).
Kaseya Traverse is a new addition to Kaseya's IT management suite and focuses on advanced cloud and network monitoring capabilities. In this session we will cover advanced topics for managing your Kaseya Traverse instance. You will learn how to setup SLA measurements for business critical services, perform baseline analysis to automatically adjust alarm thresholds, effectively use templates to facilitate faster rollout, and utilize the query tool for common administrative tasks. While geared towards administrators responsible for day-to-day management of Kaseya Traverse instances, this session will also highlight advanced capabilities that regular users can take advantage of. For attendees not familiar with Kaseya Traverse, the "Kaseya Monitoring Suite Overview" session is a recommended pre-requisite.
It is a fact of life for companies large and small today – employees are using their personal devices to access corporate resources. Addressing BYOD enterprise mobile access is no longer a nice to have, it is an imperative. This session will cover the advanced capabilities available in the Kaseya BYOD suite, including support for multiple document data sources, partitioning access based on AD group membership and other advanced administration topics. With a focus on addressing real-world needs, you will learn how to extract the maximum value from this innovative solution.
The MSP of the Future: Key Trends and Opportunities for Growing Your Revenue ...Kaseya
The market for today’s MSPs is rapidly changing. Attend this session to learn how CodeBlue, a successful MSP that has grown to 125 staff members and over $25m in revenue, is thinking strategically about the future for MSPs. During this session, Founder and CEO of CodeBlue, Ken Davis, will share an analysis of the key trends affecting MSPs today, some of the real world lessons CodeBlue has learned, and how they are building new annuity based revenue streams that will take their company into a successful future.
Boost Your Managed Services and Profits by Adding Disaster Recovery to any Ac...Kaseya
Adding cloud backup and disaster recovery capabilities to your Acronis installed base gives you powerful new ways to ensure uptime and resiliency for your clients and their critical infrastructure. Cloud based DR is also a big money maker, driving recurring revenue and cash flow for partners focused on managed services. eFolder is pleased to announce the general availability of eFolder BDR for Acronis, a new cloud disaster recovery service that marries the power of Acronis software with the massive storage and recovery capabilities of the eFolder Cloud. Join Ted Hulsy as he reviews the features, benefits, uses cases and special partner pricing for this exciting new service.
Security and Backup II: Vision and DirectionKaseya
Backup and Security solutions are critical for today's IT environments. Having a robust and easily managed data protection tool can ensure the recoverability of your IT infrastructure. Complete, reliable endpoint security is key to protect your IT systems against dangerous attacks and malicious software. This session will provide you with an opportunity to learn about Kaseya‘s vision for its Security and Backup solutions: future developments, improvements to the existing solutions, and long-term strategy.
What sets Kaseya’s software platform apart from stand-alone solutions is the embedded integration approach. Kaseya’s VSA embeds industry-leading Security and Backup solutions from OEM partners, providing complete endpoint protection from malicious software and easy data protection and recovery, all managed from the central Kaseya web-based console. This session will provide you with a thorough understanding of the OEM architecture design and the integration of these key elements in Kaseya’s single-pane of glass.
Monitoring and alerting is an important aspect of IT operations management and Kaseya provides comprehensive coverage across the infrastructure. In this session, we will explore how Kaseya’s solution provides end-to-end monitoring using both agent-based as well as agentless technology. We will walk through common use cases and highlight how proactive monitoring and alerting can reduce downtime and ensure user satisfaction. You will learn about the differences between monitoring capabilities in Kaseya Virtual System Administrator (VSA) and Kaseya Traverse. We will also highlight the recently integrated capabilities of Kaseya Network Monitor into Kaseya VSA.
Accurate and efficient asset discovery is an integral part of IT operations management. Key concepts of successful asset discovery, either by scanning the network or Active Directory, will be the key topic of discussion in this session. You will also learn about advanced fingerprinting techniques used within Kaseya Virtual System Administrator (VSA) and Kaseya Traverse to present key performance indicators for monitoring. Finally, we will explore how asset discovery is not only limited to servers and workstations, but expanding into mobile devices and applications in the highly distributed and cloud-enabled networks.
Automation Desk I: Leveraging Service Desk as a Hub for Advanced AutomationKaseya
Kaseya’s automation is a hallmark of the platform, and Service Desk was designed to take service automation to the next level. Don’t take our word for it - hear it straight from one of your peers and see concrete examples of how he has used Service Desk to drive automated remediation, automated ticket processing, event-based escalations, and more. Already using a 3rd party PSA solution? No problem -- learn how Service Desk can be leveraged as a powerful service automation engine and see how it can be fully integrated to your existing PSA. Don’t have an existing solution and want an embedded Service Desk solution via Kaseya’s single pane of glass? Service Desk can deliver that as well. Come to this session and learn how you can tap into the power of Service Desk to take automation to the next level.
Getting the most out of Kaseya means using it as a true platform, leveraging rich integrations that take advantage of our extensive Web Service APIs and modules that are fully incorporated into the Kaseya management interface. This session will give you an overview of the Technology Alliance Program, reviewing solutions available to you today and sharing how you can encourage your favorite vendors to deliver their own Kaseya integrations in the future.
Get the most out of your Kaseya implementation! Kaseya Virtual System Administrator -- It’s what you live and breathe -- the core set of functionality commonly called the “VSA.” This session will focus on sharing tips and tricks from several areas of the product that will drive new value for both new Kaseya users and veterans alike.
Please join us for a quarterly update call with the Kaseya Management Team. The team will discuss our progress towards our goals, what our near term deliverables are, and our key strategic directions for this quarter and beyond. Ample time will be allotted to answer your questions.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
2. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Key Terms
• Cabinet – The highest-level container in a folder tree. A
policy cannot be assigned to a cabinet.
• Folder – Organizational structure within a cabinet
• Policy – A group of defined settings assigned to endpoints
• Policy Object – A single setting group within a policy
• View – Filter used to display/control machines based on
specific criteria (OS, IP range, applications installed, etc.)
3. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Key Terms (continued)
• Compliance – Determines whether settings
applied to an endpoint are equal to the
settings defined within the applied policies
• Manual Override – Changing a setting within
a module directly where that setting is
defined within an assigned policy
• Combining Policy Objects – When defined in
more than one policy, these objects are all
added to the endpoint
• Conflicting Policy Objects – When defined in
more than one policy, rules dictate which
setting “wins”
4. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Systems Management Tool
5. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• The Systems Management tab provides a setup
wizard which enables admins to quickly configure
and apply machine management policies for a
specific organization. Once configured, these
polices are assigned to each machine managed
on behalf of that organization.
• Machine Groups inherit settings of their parent
organization. Therefore, to configure all clients
within a single organization to use the same
settings, you need only define the settings at the
highest level for that organization.
• Customize settings for machine groups within an
organization by completing the wizard for the
individual group(s).
6. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
7. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
8. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
9. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
10. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
11. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
If you choose to enable
Workstation Patch and Update
Management, you must define a
credential and password
12. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
Click Finish to
commit the changes
13. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Once the wizard completes, the content will be downloaded
(if not already present) from Kaseya to the VSA.
• Installs pre-defined content. To differentiate Content Pack
Views from ones created by VSA admins, all Kaseya-provided
View content has a prefix of “zz[SYS]”:
14. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Managed Monitor Set content is
visible within the System cabinet on
the Monitor > Monitor Sets page:
15. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Managed Agent Procedure content is visible
within the System cabinet on the Agent
Procedure > Schedule/Create page:
16. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Managed Policy content is visible within the
System cabinet on the Policy Management
> Policies page:
17. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Systems Management Tool
• Content within the System cabinet should not
be edited
• To customize System content, copy the
policy, monitor set, or agent procedure to a
Private or Shared folder
• Apply policy based from customized System
content to an individual machine or group to
take precedence over the System content
• Learn more about the Systems Management
Tool:
http://help.kaseya.com/WebHelp/EN/SSP/10
00000/index.htm#11252.htm
18. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Creating Policies
19. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Creating and Managing Policies
• Create a manageable folder structure – by function or by
client/org
• Create Views specific to policy
– Specific machine types (i.e., by OS, by application, server v.
workstation, etc.)
– Any changes to Views may impact endpoints – ensure Views
are edited accurately
– Creating Policy-specific Views can help minimize accidental
changes to Views in use by Policy
• Example: ExchangeServer
Policy-ExchangeServer
• Policy Mgmt > Policies > Add Policy
• Select and configure desired policy objects
• Select View to define which endpoint should receive the
policy
20. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Creating and Managing Policies
Save v. Save and Apply
• Save: Saves the changes to the policy. Policies are
in a pending state. No changes are applied to
endpoints.
– A policy that is saved but NOT applied will appear with
a yellow scroll icon on the Policies page:
– A policy that has no View associated will appear with a
red scroll icon on the Organization/Machine Group
page:
• Save and Apply: Saves changes to the policy and
applies the changes to the endpoints
– Apply Now: Apply the changes to all affected
endpoints immediately. Can cause some performance
issues, depending on overall workload of server.
– Allow scheduler to apply: Changes will be applied at
next deployment interval
21. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Policy Precedence
22. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence – Who Wins?
• Multiple policies can be assigned to a
single endpoint
• Some policy objects will be combined
and some will conflict
• Rules determine which policy will
“win” when there is a conflict
23. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence - Combine
Which policy objects combine?
– Monitor Sets
– Agent Procedures
– Event Log Alerts
– Distribute Files
When more than one policy is applied to
a machine, and each policy defines the
above objects, the endpoint will receive
ALL of the defined combinable objects
24. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence
Combine Example
PolicyA defines two Agent Procedures:
PolicyB defines different Procedures:
PolicyA and PolicyB are assigned to the
same endpoint, workstation1
25. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence
Combine Example (continued)
• When the policies are applied to workstation1, all four
Procedures are assigned:
• Note: If the same procedure is scheduled in both policies,
each with different schedules, policy precedent rules will
determine which procedure schedule will be applied to the
endpoint
– For combinable objects, Policy Mgmt will use the same logic as
the module. If the module allows the same object to be
assigned multiple times to the same endpoint, all settings will be
passed to the endpoint. If the module allows only ONE setting
per machine for the selected object, policy precedent rules will
be followed.
26. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence - Conflict
• Remaining Policy Objects conflict
• When a conflict exists, the winning
object is determined based on
precedence. The more closely the
policy is assigned to the machine level,
the more precedence the policy has.
• Possible layers are: Global, Org,
Parent Group, Child Group (including
nested child groups), Machine
27. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Precedence - Conflict
• A policy assigned at the Global will apply to all
endpoints
• A policy applied at the org level will apply to all
endpoints within the org. Any conflicting Global objects
will be overwritten with the settings in policies applied
at the Org level
• A policy applied at the Parent Group level will apply to
all endpoints in the group. Any conflicting objects
applied at the Global or Org level will be overwritten
with settings in the policies applied at the Group level
• Child-group policies will overwrite any conflicts from
global, org, or parent group policies
• Policies assigned directly to an endpoint will win over
conflicting settings at the higher levels.
28. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Handling Conflicts
Credential
Global
Agent Menu
Log History
LAN Cache
Org
Credential
Group Machine Effective Settings
Agent Menu
Patch
Reboot Action
Working
Directory
Working
Directory
Patch
Reboot Action
File Source
Remote Control
X
X
X
X
29. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policies Assignment Rules
• Multiple policies can be assigned to any organization or machine group or machine.
• A machine with multiple policies assigned to it has conflicting policies when both specify
the same policy type.
– Multiple policies are not in conflict if different policy types are specified.
– The following policy types combine with each other so that no conflicts occur.
• Event log alerts, distribute files, monitor sets, and agent procedures.
• Policies are assigned by organization/machine group using the Organizations/Machine
Groups page.
– Policies assigned to a lower level in an organization hierarchy have precedence over policies assigned to a higher
level in the same organization hierarchy.
– Unless a lower level policy conflicts with it, policies assigned to a level apply to all lower levels.
– When multiple policies are assigned to the same organization or machine group, the assigned policies have
precedence in the order listed.
• Policies can be assigned by machine using the Machines page.
– Policies assigned by machine have precedence over all policies assigned to that machine by organization/machine
group.
– Policies assigned by machine have precedence in the order listed.
• All policy assignments can be overridden by changing agent settings manually throughout the
VSA.
– Manual changes have precedence over all policies assignments.
• A policy can be associated with a view definition in the Policies page.
– When machine is assigned to a policy by organization or by machine group an associated view filters the machines
associated with a policy. If a machine is not a member of the view definition, then the policy will not be propagated
to that machine.
– When a machine is assigned to a policy by machine, then the view associated with a policy is ignored and the policy
will be propagated to that machine.
– Associating a policy with a view does not, by itself, assign a policy to any machine.
• The order of precedence for views depends on the policies they are associated with.
30. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Assigning Policies by Org/Group
aarentals
Drag folder from
Policy list…
…to an
organization
• Assign policies to organizations or groups by
dragging individual policies or folders to the org
• When assigning folders, all policies within the
folder will be assigned
31. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
“Higher” v. “Lower” precedence
• Order the policies/folders based on the
precedence you want applied. The higher in
the list, the higher the precedence.
Precedence determines which policy “wins”
when a conflict is present
aarentals
If a policy in the Global Policies
folder conflicts with a policy in
the Windows Workstation…
Folder, precedence rules
dictate the settings in the
Global Policies folder will
“win” because it appears
higher in the assignment list.
32. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
“Higher” v. “Lower” precedence
Ordering Policies
• Drag/Drop assigned items to re-order
the list. The lower in the list, the
lesser the precedence With the reordering, all
policies within Windows
Workstation… folder will take
precedence over polices in the
Global Policies folder
33. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Applying Policies to Machines
• Policy > Machines allows you to assign a
policy to an endpoint directly
• When a policy is assigned directly to an
endpoint, View settings are ignored
• Precedence rules apply
• Policies assigned directly to endpoint will
take precedence over policies applied at
the group, org, or global level
• Machine-assigned policies can be
ordered to determine precedence
34. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policies are listed in order
of precedence. The higher
in the list, the higher the
precedence.
Use this field to filter by
policy name
Or select the policy from
the cabinet/folder tree
35. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
36. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Matrix Detail
What exactly is applied?
Hover over policy icon to
reveal the matrix detail
37. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Matrix Detail
Policy Object Status
38. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Matrix Detail
Machine Effective Policy
Settings
Policy Name Actual ConfigurationSetting
Policy Object name, enabled
on the Policies page
39. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Unassigning Policies
• Change View settings
• Remove from Org/Machine Group
• Remove from endpoint
• Disable Systems Management Tool
• Unassigning policies does not remove
the setting from the endpoint. It only
disables the centralized management of
settings by policy
• To remove the settings from the
endpoint, visit the individual Module
pages and manually clear settings.
40. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Settings
41. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management >
Settings
• Deployment Interval: Frequency to
apply policy settings to endpoints after
changes/edits to policies
– Changes to endpoints based on VIEW
membership occurs via a backend process
that runs once per hour
• Compliance Check: Frequency of
verification of settings assigned to
endpoints as compared to settings
defined by applied policies. Manual
overrides are detected during
compliance checks.
42. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
New Features in 6.3
43. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Organization Credentials
• Audit > Manage Credentials
• Define a credential for all machines
within the selected organization
• Created by Systems Management tool (if
Patch function enabled) or can be
manually defined by an admin
• Policy can leverage this credential
• Allows admin to use single policy with
Agent Credential object defined for
multiple organizations/clients
44. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Using Organization Credentials
• Enable the policy object Credential
• Check “Use organization defaults”
• The credential defined in Audit > Manage
Credentials will be used
• This policy can be shared by multiple orgs
• At this time, Policy is the only function that
leverages the org credential
45. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
New 6.3 Policy Functions
• Support for add-on modules such as
KAM, KAV, KES, KDPM
• LAN Cache assignment
– LAN Cache must be created on host
machine via Agent > LAN Cache
– LAN Cache Assignment is separate from File
Source. LAN Cache can be used as the patch
file source, but assigning only the LAN cache
policy object will NOT configure the Patch
File Source object.
• Remote Control Session Terminate
messages
46. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
New 6.3 Policy Functions
• Agent Procedure schedule can be edited
• “Exclude Time” is no longer enabled by
default in scheduler
• Patch schedules will combine if one
policy defines Scan schedule and second
policy defines Update schedule
• Effective Machine Policy Settings
• Audit and Patch schedules can be set to
“None” to prevent schedule settings
from two policies from merging
47. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
New Policy Object Functions
Merging Schedules
• PolicyA defines Scan schedule:
• PolicyB defines Update schedule:
• If both policies are applied to a single
endpoint, the endpoint will combine
these two functions
48. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
New Policy Object Functions
Merging Schedules
• To prevent this combining, set the
blank schedule to “None”:
• When PolicyA and PolicyB are
assigned to the endpoint, the Scan
schedule will be left undefined
(provided the policy defined above is
the “winning” policy).
49. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Additional New Features
Sharing Policy Content
• Cabinet contents can be shared with
variable rights
Right Click on Folder
Then click “Share”
Admin
50. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Additional New Features
Sharing Policy Content
• When share permissions are granted
on a folder, all contents of the folder
inherit the permissions of the parent
folder
• Permissions can only be granted at
folder levels
• Contents of the System Cabinets are
visible to Master admins only (for SaaS
customers, the equivalent is “System”
role)
51. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Additional New Features
Access Rights
Action buttons
•Save, Save and Apply, Delete, Edit, etc.
and Policy Objects
•Agent Menu, Agent Procedures, Alerts, etc.
can be controlled via Role Access Rights (System > Roles > Access Rights)
52. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Management:
Troubleshooting
53. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Effective Machine Policy
Settings
• Leverage Effective Machine Policy
Settings function to:
– Determine which specific setting is
causing an out of compliance notification
– Which policy is “winning” for individual
settings
– Quickly determine all settings applied to
a machine via Policy Management
54. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Troubleshooting Policies
• Attempt to determine if the issue is with Policy
Management or with the individual Module
– If function is not working via Policy, test configuring
the same setting via the individual module
– If configuring the setting via the module is not
successful, troubleshoot the module first
– If opening a ticket with Kaseya Support, attempting
to determine whether the issue exists in the module
can assist in proper routing of ticket and speed
resolution
• Example Issue: Agent Procedure assigned via Policy does
not run.
• Troubleshooting: Attempt to assign/run the procedure
on the endpoint via the Agent Procedure (AP) module. If
fails in AP, issue likely lies with AP module. If succeeds in
AP but fails when assigned via Policy, issue may lie with
policy.
55. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Troubleshooting Policies:
Policies not applying
• Patience – policies can take time to apply. Many
functions are not immediate. All functions
should complete within a few hours (often less)
of a change, but few will complete immediately
– Exception: Apply policy and choose “Apply Now”
will begin the application of policy settings to
machines, but time to complete will vary
• Check Policy Mgmt > Settings > Deployment
Interval
– If Manual, policies will not automatically deploy
– If configured other than manual but deployments
are not occurring, change setting > Save, then
restore to desired setting > Save
• Check Policy Mgmt > Dashboard to view pending
events (changes not yet applied)
56. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Best Practices
• Multiple layered policies are easier to manage
and share across orgs than a few policies with
multiple, broad objects configured
• COPY from System Cabinet and modify within the
Private cabinet
– Assign System content, then use customized policy
with higher precedence to override unnecessary
content settings
• Use manual overrides for exceptions on
individual machines for short-term testing
• Create unique policies applied directly to
endpoint to manage exceptions for longer-term
• Create views specific to policy
57. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
When will changes occur?
Action Interval
Deployment Interval Configurable - Defined on Policy > Settings page
Compliance Interval Configurable - Defined on Policy > Settings page
New Agent Triggers application of policies based on
Deployment Interval defined
Assignment based on
View changes
Backend process runs once per hour
Defined Schedules
(Agent Procedures,
Patch/Audit
schedules, etc.)
Runs at the first interval after the policy is
applied to the endpoint. Will not run
immediately upon policy assignment to the
endpoint. Past schedules will not run.
58. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Policy Hotfixes
• At times, hotfixes are necessary to
resolve bugs
• Often, a hotfix to Policy Management
may require that the policies be
reprocessed after the hotfix is applied
to the VSA
– Reprocess policies via Policy
Management > Machines > Reprocess
Policies
59. Presentation will be available for download at
http://www.kaseya.com/forms/techjams.aspx
Thank you
• Slides and recorded presentation will
be available for download at
http://www.kaseya.com/forms/techja
ms.aspx
• Chat-based Q&A session will continue
for a few minutes. Please continue
post questions in the Q&A window.