NETWORK WORLD NEWSLETTER: NEAL WEINBERG ON PRODUCT REVIEWS
11/16/04
Today's focus:  Configuresoft

Dear [EMAIL PROTECTED],

In this issue:

* Configuresoft's latest version of Enterprise Configuration 
��Manager
* Links related to Product Reviews
* Featured reader resource
_______________________________________________________________
This newsletter is sponsored by Intel 
IT Productivity; Increasing ROI 

Learn how to effectively measure employee productivity, manage 
IT investments and reduce the Total Cost of Ownership in 
enterprise data management.  Visit Intel's IT Productivity 
center.  Click here to download white papers, books and IDC 
Research. 
http://www.fattail.com/redir/redirect.asp?CID=88385
_______________________________________________________________
IT SECURITY JOBS TO EXPLODE 

With an annual compound rate of nearly 14% from now until 2008, 
information security jobs are far outpacing IT jobs in general. 
For more results from this recent survey conducted by IDC of 
full-time security pros in 80 counties worldwide, click here: 
http://www.fattail.com/redir/redirect.asp?CID=88282
_______________________________________________________________

Today's focus:  Configuresoft

By Neal Weinberg

It's not easy managing a Windows-centric network, which is why 
we like Configuresoft's latest version of Enterprise 
Configuration Manager.

While its roots are in traditional desktop configuration, ECM 
now hones in on policy management and compliance by collecting 
and correlating information from servers and workstations and 
taking action when they are out of compliance with the defined 
policy.

ECM employs an agent-based collection mechanism.  The agents for 
which are pushed out to the Windows machines via a simple 
process facilitated by the management console.

The three-tier ECM server architecture is made up of the 
Collector, a database, and the console. The Collector is the 
mid-tier application that manages the jobs of gathering and 
analyzing the data collected from the systems. The database is 
the central repository for data.

The console is a four-module, Web-based management program that 
provides access to all of ECM features. The Console module 
provides access to the raw data collected from the managed 
systems. The Compliance module shows the rules and reports 
supported for setting policy. The Reports module provides 
templates to view system information, driven by a Crystal 
Reports engine. The Administration module provides all the ECM 
configuration settings, such as agent installation, user 
management, etc.

Installing the agent software out to the managed systems is a 
simple process that takes only a few mouse clicks. Once the 
agents are installed and data collected, ECM is ready for use. 
By default, ECM uses DCOM for agent communications. HTTP 
communication is a second option.  If you opt for HTTP, an HTTP 
service (a mini Web server) is installed on the remote system to 
facilitate that. We would like to see Configuresoft upgrade 
these communications to support more secure protocols like 
HTTPS.

Using the Console module, administrators can directly change 
configuration settings for individual systems or across a whole 
group. A few of the settings managed by ECM include Windows 
users and groups, NTFS audit settings, NTFS directory 
permissions, installed Microsoft hot fixes and registry key 
permissions.

One of the best features of ECM is its auto compliance 
functionality. With this feature, administrators can set a 
baseline configuration that all systems must follow. If a system 
comes online out of compliance, or if someone makes a manual 
change while it's on-line, ECM automatically enforces the 
required settings, leaving a full audit trail. ECM gets very 
granular in its ability to look at registry key permissions, 
file permissions, password settings and patch levels, and then 
take corrective action if the administrator has set it to do 
that.

While ECM offers automatic compliance makes configuration 
changes, if you want to tie in patch deployment, you need to use 
Configuresoft's Security Update Manager (SUM) add-on. 

ECM's polish lies in its Web Console. The layout, color scheme, 
icons, and workflow all work together to make the user 
experience one of the best we have seen across our tests of 
security management products.

ECM's reporting is flexible, customizable, and granular. Reports 
can be generated that show which systems are not in compliance 
with a single setting, a pre-defined template, or custom policy. 
You can also generate reports on what remediation actions have 
been taken to enforce policy settings.

For managing Windows systems configuration and automating policy 
enforcement, we have not found a better product. The ease-of-use 
and flexibility of ECM provide administrators with the means to 
deploy a secure, self-sustaining Windows infrastructure.

For the full report, go to: 
<http://www.nwfusion.com/reviews/2004/110104rev.html>

RELATED EDITORIAL LINKS

Configuration management tool reaches for mobile clients
Network World, 04/05/04
http://www.nwfusion.com/news/2004/0405configuresoft.html

Opnet tackles configuration management
Network World, 09/06/04
http://www.nwfusion.com/news/2004/090604opnet.html
_______________________________________________________________
To contact: Neal Weinberg

Neal Weinberg is features editor at Network World, in charge of 
product reviews, Buyer's Guides, technology primers, how-tos, 
issue-oriented feature stories and the Technology Insider 
series. You can reach him at <mailto:[EMAIL PROTECTED]>.
_______________________________________________________________
This newsletter is sponsored by Intel 
IT Productivity; Increasing ROI 

Learn how to effectively measure employee productivity, manage 
IT investments and reduce the Total Cost of Ownership in 
enterprise data management.  Visit Intel's IT Productivity 
center.  Click here to download white papers, books and IDC 
Research. 
http://www.fattail.com/redir/redirect.asp?CID=88384
_______________________________________________________________
ARCHIVE LINKS

Reviews archive:
http://www.nwfusion.com/reviews/index.html
_______________________________________________________________
FEATURED READER RESOURCE
NEW! Website dedicated to Networking for Small Business now 
available

The editors of NW Fusion and PC World have combined all their 
expert advice, authority, and know-how into a powerful new tool 
for small businesses, the new Networking for Small Business 
website. Get news, how-to's, product reviews, and expert advice 
specifically tailored to your small business needs. Find help 
with Security, Broadband, Networking, Hardware, Software, and 
Wireless & Mobile technology at:
<http://www.networkingsmallbusiness.com/>
_______________________________________________________________
May We Send You a Free Print Subscription? 
You've got the technology snapshot of your choice delivered 
at your fingertips each day. Now, extend your knowledge by 
receiving 51 FREE issues to our print publication. Apply 
today at http://www.subscribenw.com/nl2

International subscribers click here: 
http://nww1.com/go/circ_promo.html
_______________________________________________________________
SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World e-mail 
newsletters, go to: 
<http://www.nwwsubscribe.com/Changes.aspx> 

To unsubscribe from promotional e-mail go to: 
<http://www.nwwsubscribe.com/Preferences.aspx> 

To change your e-mail address, go to: 
<http://www.nwwsubscribe.com/ChangeMail.aspx> 

Subscription questions? Contact Customer Service by replying to 
this message.

This message was sent to: [EMAIL PROTECTED] 
Please use this address when modifying your subscription. 
_______________________________________________________________

Have editorial comments? Write Jeff Caruso, Newsletter Editor, 
at: <mailto:[EMAIL PROTECTED]> 

Inquiries to: NL Customer Service, Network World, Inc., 118 
Turnpike Road, Southborough, MA 01772

For advertising information, write Kevin Normandeau, V.P. of 
Online Development, at: <mailto:[EMAIL PROTECTED]> 

Copyright Network World, Inc., 2004

------------------------
This message was sent to:  [EMAIL PROTECTED]

Reply via email to