After defining the configuration, the configuration has to be deployed in the target client workstations. The target client workstations have to be defined for the configurations individually. Defining the targets involves selecting various types of targets given below:
The targets must be defined to deploy the Configuration in the machines of the network. When you add a configuration or collection of configurations, you will find a step for Defining Targets. This section explains the procedure to define the target for a configuration or collection of configurations.
To define the targets for deploying the configuration or collection, the targets must be added to the Target List. A target can be added, removed or modified in the Target List.
There are two types of configurations you can deploy in Endpoint Central:
This type of configuration is applied at the system level and affects the computer regardless of which user is logged in. Examples include installing software, deploying patches, or modifying system-level settings.
To add target computers and users from a Active Directory based domain, follow the steps below:
Note: If you wish to deploy the configuration for users/computers in different domains, use the Add More Targets button to add targets from multiple domains.
To add target computers and users from a workgroup, follow the steps below:
Note: If you wish to deploy the configuration for users/computers in different workgroups, use the Add More Targets button to add targets from multiple workgroups.
To add target computers and users from remote offices, follow the steps below:
Note: If you wish to deploy the configuration for users/computers in different remote offices, use the Add More Targets button to add targets from multiple domains.
You can exclude certain parts of the network which does not require the configuration to be deployed. This is optional when defining the targets. Endpoint Central provides the option to exclude the parts of the Windows network. Select the Exclude Target check box to view the available options:
Exclude if Target Type is
The target types can be excluded by selecting the target in the Select the target type and define field. The target types can be excluded which are in lower hierachy to the target selected,meaning select the required domain/remote office. Define the required targets and then define the exclusions. The target type can be excluded using the Browse button. Click the Browse button next to the required targettypesunder the Exclude if Target Type is field to launch Network Browser window. Select the target type to be excluded for configuration deployment and click Select button. This field is mandatory. The target type can be any of the following (varies based on the target options selected):
- Branch - The branch offices to be excluded
- Domain - The domains to be excluded
- Organization Unit - The OUs to be excluded
- Group - The groups to be excluded
- Computer - The computers to be excluded
- IP Address - The IP Addresses to be excluded
- IP Range - The range of IP Addresses to be excluded
- Custom Group - The custom groups to be excluded
Exclude if Operating System is
The targets with specific Windows OS can be excluded for configuration deployment. Select the options under the Exclude if Operating System is field which has to excluded for configuration deployment.
Exclude if Machine Type is
The targets with specific machine type such as Notebook, Tablet PC, Desktop, Member Server, TermServClient, or Domain Controller can be excluded for configuration deployment. Select the options under the Exclude if Machine Type is field which has to excluded for configuration deployment.
This configuration is applied at the user level and is specific to individual user profiles. It comes into effect when the targeted user logs into any computer within the defined scope. Examples include setting desktop wallpaper, configuring Outlook profiles, or configuring desktop shortcuts.
When configuring user-based settings, there may be scenarios where certain computers need to be either excluded from or included in applying these configurations during user login. Endpoint Central allows you to set both computer-based exclusions and inclusions to fine-tune which computers should or should not receive the configurations based on different criteria. The exclusion feature helps prevent configurations from being applied to specific computers, while the inclusion feature ensures that configurations are applied only to the desired systems. This flexibility helps ensure that configurations are precisely applied as intended.
You can filter users using a second-level filter and further include or exclude specific computers for configuration deployment. This will ensure the configuration is applied only when users log in to the included computers, and it will be ignored on excluded computers.
To facilitate this, Second level targets are split into two:
Various scenarios where user and computer filters can be applied are mentioned in table below
To implement computer-based exclusions, there are several configuration scenarios you can use when setting the inclusion and exclusion targets for users and computers. Below are the scenarios in which these exclusions can be applied.
| User Target Include | User Target Exclude | User Target empty | |
|---|---|---|---|
|
Computer Target Include |
If user group u1 in main target mt1 login to computer group c1, apply configuration. |
If any user except for user group u1 in the main target mt1 logs in to computer group c1, apply configuration. |
If any user in main target mt1 logs in to computer group c1, apply configuration |
|
Computer Target Exclude |
If user group u1 in main target mt1 login to all computers except computer group c1, apply configuration. |
If any user except for user group u1 in main target mt1 login to any computers other than computer group c1, apply configuration. |
If any user in main target mt1 login to any computers other than computer group c1, apply configuration |
|
Computer target empty |
If user group u1 in main target mt1 login to any computer, apply configuration. |
If any user except for user group u1 in the main target mt1 logs in to any computer, apply configuration. |
If any user in main target mt1 login to any computers, apply configuration. |
Note for Profession edition: User can be selected as Main Target itself.
To modify targets in a configuration follow the steps given below: