Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

User's Guide
EZ Unified Device Manager Pro
Provided by Event Zero






The information contained in this document represents the current view of Event Zero on the software discussed as of the date of publication and is subject to change at any time without notice to you. This document and its contents are provided AS IS without warranty of any kind, and should not be interpreted as an offer or commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented. EVENT ZERO MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT.
The descriptions of other companies' products in this document, if any, are provided only as a convenience to you. Any such references should not be considered an endorsement or support by Event Zero. Event Zero cannot guarantee their accuracy, and the products may change over time. Also, the descriptions are intended as brief highlights to aid understanding, rather than as thorough coverage. For authoritative descriptions of these products, please consult their respective manufacturers.
All trademarks are the property of their respective companies.
©2017 Event Zero. All rights reserved.
Event Zero is either registered trademarks or trademarks of Event Zero Pty Ltd. in Australia and/or other countries.
The names of actual companies and products mentioned herein may be the trademarks of their respective owners.

...

The Overview selection, when clicked, takes you to the main dialog page, described in Overview Page.

...

Tags

Tags represent a powerful feature in EZ UDM Pro. The concept of tags is both simple, and potentially difficult, to understand. The reasoning for this seeming contradiction is this:
Tags are simple to understand if you are using just a tag or two to collect like items in hierarchy for ease of management.
Tags become a more complex subject when you start using tags to modify the applied set of features, software, locations, etc., depending on what tags are applied, where they are applied, and how one tag affects another.
Before we get into the actual application of tags, we need to discuss the logic behind the tags.

...

In an Active Directory domain environment, there is a policy called the Default Domain Policy that applies to most (we'll discuss just User and Computer objects for the sake of clarity) objects. The Default Domain Policy sets attributes and values (settings) for those attributes. The policy is then applied to all objects. For example, let's assume that your domain is called contoso.com. In Group Policy Management (the management tool in Windows Server for Group Policy configuration) opening the domain contoso.com shows one policy by default – the Default Domain Policy.
Right-clicking on the Default Domain Policy and selecting Edit opens the Group Policy Management Editor. Using this tool, one can view and modify the Default Domain Policy.

Note! Just for clarity – Microsoft strongly recommends NEVER editing or changing the values of the Default Domain Policy. If you need to change a setting or behavior enforced by the Default Domain Policy, create a new policy that will override the setting in the Default Domain Policy. We're getting ahead of ourselves. Just don't modify the Default Domain Policy if you can avoid it.

In the Group Policy Management Editor note that there are two main nodes – Computer and User. These are the primary object classes that the Group Policy Management Editor can edit. If you were to expand User Configuration > Policies > Administrative Templates, there are a number of sub-nodes. Of these sub-nodes is Desktop, then Desktop. We are going to look at attributes that correlate directly to phone devices and computers – Wallpaper (for the Windows desktop), or a background image (for the phone device.)

By default, the Default Domain Policy contains the attribute "Desktop Wallpaper", and the purpose of the attribute and associated setting is to apply a desktop wallpaper file to each user, and by inference, the computer the user logs onto. The distinction is important; the attribute - because it applies to the user – will apply to any computer that the user logs onto. If the attribute was at the Computer level, it would apply to all Computers that are a part of the domain that this policy applies to. (As a side note, there is no companion attribute at the Computer level. A wallpaper can be applied at the computer level, but it's a less efficient and more complex task and does not gain any additional benefit for the required task.)

The default setting for most attributes in the Default Domain Policy is "Not Configured." Essentially, this setting is ignored because until there is a setting, it's just additional processing by the Group Policy engine that would need to take place. The other options are "Enabled", meaning read and apply the settings in the policy, or "Disabled" meaning that even if there is a setting, do not apply it. This will become important shortly.

Let's assume that we Enable the attribute "Desktop Wallpaper" and set a path to the file \\nas01.contoso.com\assets\company_logo.jpg. We commit this setting. The next time a user logs in, the policy is read, and this attribute changes the desktop wallpaper to the company_logo.jpg. We've set a baseline configuration for all users across the company to use a standard logo for their desktop wallpaper.

Because Contoso is an international company, each country has the permission to personalize the logo in accordance with their country's affinity. Changes are made to the company_logo.jpg by other country branches. Germany, for example, changes the wallpaper to put the logo over the German flag. The German Active Directory (AD) administrator creates a new Group Policy Object (GPO) and places the new GPO into the DE Organizational Unit (OU). The subtle change – setting the same attribute Desktop Wallpaper to \\nas01.de.contoso.com\assets\company_logo_DE.jpg - applies the German-specific company logo desktop wallpaper for users only in the DE OU.

One further change is made. The Sales group petitions for and receives special permission to modify the logo to add their main customer, Tail Spin Toys, logo to the German logo. The new Wallpaper needs to apply to just the Users in the Sales OU in the DE OU. The AD Administrator creates a new GPO and links it to the Sales OU in the DE OU, modifying the attribute Desktop Wallpaper \\nas01.de.contoso.com\assets\company_logo_DE_Sales.jpg. When the users in the Sales OU log in, the desktop wallpaper with the German flag and the company logo, plus the Tail Spin Toys logo, is displayed.

For some who have a passing knowledge of AD and GPO, you might think that creating a Site linked GPO for Germany (assuming, as would be good practice, Germany is defined as a Site) would work. Precedence of GPO policy application potentially works against you here. GPO is applied in the following order: Local System, Site, Domain, then OU, where the policy on the Local System policy is applied first, and then over-written by policy settings that conflict at the Site GPO, then the Domain GPO and finally the OU GPO. If the German logo was applied at the Site level, it would be over-written by the contoso.com Domain-level policy for the "All Company" logo wallpaper.

(There are mitigations and ways to get around the issue outlined with the Site vs. Domain setting. But, it's unimportant to our overall theme on Tags.)

That's it for the Group Policy 101 refresher. Let's look at how tags work in a similar manner to apply settings to your devices.

...

(Lots more on Tags to come… Adding Tags looks to be misbehaving at the moment. Anchor_GoBack_GoBack)

Device Profiles

In Device Profiles, you create new device profiles, and manage existing ones. Device profiles are a collection of attributes that will apply to the devices that this profile is a member of. Assigning a tag to the device profile associates the device profile with a defined set of devices.
For example, you have a location in France that requires that the French flag is displayed. A resource file for an image of the French flag is available in Resources. You configure the device profile to use the image file and apply it to all phones that meet the criteria. The criteria in this case is that the devices are part of a tag group France Office. Adding the XML attributes to use the image file and apply it to the device, plus using the tag France Office applies the French flag as the image displayed on the devices in the France Office.
Note! For assigning a device profile to a tag, see the section Tags. The device profile must exist prior to assigning it to a given tag.

...

You add software to EZ UDM Pro just as you would upload software to any web sitewebsite. All the work to unpackage, process the software, then commit all attributes to the database is done by EZ UDM Pro in the background.
To upload a software package to EZ UDM Pro, do the following.

  1. On the sidebar, click Software
  2. On the right side of the Software page, click Add
  3. On the Upload Software dialog, you have a couple options to upload the software package to EZ UDM Pro
    1. From your computer in a file browser, select the software package to upload, drag and drop it into the dropzone
    2. Click in the dropzone area, and from the resulting file explorer, select the package that you want to upload, then click Open
  4. Note that there is a progress bar indicating that the file is uploading. When the file is uploaded, a notification is displayed at the bottom of the page indicating All files uploaded. Click Dismiss on the notification
  5. If you have more software to upload, repeat Steps 3 and 4. If you are done adding software, click Software in the sidebar and confirm that the software is either in the Processing or Processed state.

Note! If there was a problem in processing, the status of the software will be Error. See the Appendix for information and steps to resolve the Error statusAdd FAQ or TS steps/article for Error status in Processing/Processed.

  1. The software is ready to use when the status is Processed

...

  1. Click Filter and in the text field start typing the name of a software packagespackage, or any item – including the Readme file – Software Details.

Tip! If you are looking for a software packages or package or all packages that contain given text in the readme, start typing the name of that software package, software version, status, or text in the readme file as uploaded. For example, to find only software that applies to a VVX 510 device and the model numbers are referenced in the readme, the software package is returned from the filter. It's important to understand that if you type 'enable' the filter will find enable and enabled, and any other matches that contain 'enable'. This feature is especially powerful given that without this feature, you would need to open and examine each software package detail screen to locate the package that contain contains strings with a given phrase.

...

A function of good management is to delete items that you no longer need. When the last device that is using a given software and is upgraded to a newer or different software the software can be safely deleted.
Note! Deleting software that is in use by devices deletes all references and the source files for the software from EZ UDM Pro. Devices will continue to operate normally. However, you cannot deploy the deleted version of software to other devices without uploading the package into EZ UDM Pro. Due to all references to the software being removed, the software deployed to devices that was deleted
To delete a software package, do the following:

...

Tags, described in the section Tags in this guide, are used in Software to associate a software package with any Location, Device Set, Model, or Bridge. Software can also be associated with the unique Global tag.
Tags are only displayed for reference. All tag management for associations, creation, deletion, and deletion and other management of tags functions is configured in the Tags selection.

...

You add resources to EZ UDM Pro just as you would upload a file to any web sitewebsite. EZ UDM Pro does feature a simple to use drag and drop feature for uploading files, as well as a classic File Explorer interface.
To add new resource files to EZ UDM Pro, you do the following.

...

Tip! If you are looking for a specific file or all files that contain a given string, start typing the name of the file or format. For example, to find all resource files that contain the string 'contoso', type contoso in the text box. Similarly, the filter works for filtering by file size. It's important to understand that if you type 'bob' the filter will find bob and the string 'bob' in the file name, or name or typing the number '1' will find all files that contain '1' and all file sizes that contain '1'.

...

The next four sections – Devices, Device Profiles, Software, Speed Dials – contain no entries to multiple entries, based on the requirements for this device set.

Add Devices

    1. To add a Device to the Device Set, click Add in the Devices section
    2. A list of approved devices is listed by media access control (MAC) address, session initiation protocol uniform resource identifier (SIP URI), IP address, and model. Use the
  1. check boxes
    1. checkboxes on the left to select one or more devices to add to the device set

Tip! Use the Filter to limit your selections by models, IP addresses (or portions of the IP address), or SIP URIs.

...

    1. Click Apply to accept the Device Profiles and add them to the Device set, or Cancel to quit the Add Device Profiles dialog without making changes

Add Software

    1. To add Software to the Device Set, click Add in the Apply Software section
    2. A list of software packages is listed by name, version, and file size. Select from the available software by using the
  1. check boxes
    1. checkboxes on the left to select one or more software packages to add to your device set
    2. Click Apply to accept the software packages and add them to the Device set, or Cancel to quit the Apply Software dialog without making
  2. changes
    1. change

Add Speed Dials

  1. To add a Speed Dial to the Device Set, click Add in the Speed Dials section
  2. A list of Speed Dial entries is listed by name, entries (the number of contacts in the speed dial entry), and tags associated. Select from the available Speed Dials by using the check boxes checkboxes on the left to select one or more Speed Dials to add to your device set

...

The ability to filter your device sets is a handy feature as the number of device sets increase, making it much easier to locate the device sets that you need to reboot, or reboot or delete.
To filter your Device Sets, do the following:

...

Tip! If you are looking for a specific element of a device set that contain contains a given string, start typing the name of the element. For example, to find all contacts in a speed dial that is part of a device set that contain contains the string 'contoso', type contoso in the text box. Similarly, the filter works for filtering by number of devices in a device set. It's important to understand that if you type 'bob' the filter will find bob and the string 'bob' in contact name, or name or typing the number '1' will find all elements contain '1' and all devices sets that contain 1, 10, 21, or any number that contains '1'.

...

In addition to the Filter feature, you can sort device sets on the Name, and Name and Devices columns. To sort a column, ascending or descending, do the following:

  1. To sort the Name, or  or Devices column, click the arrows to the right of the column label
  2. After the first click, you should see a descending list result, items sorted from 0 – 9, A to Z
  3. Click the arrow to change the ascending sort to a descending sort, Z – A, 9 – 0
  4. You do the same on the other columns where ascending is the number 0 to the letter Z, and descending is from the letter Z to the number 0

...

Locations allow for logical grouping of Device Profiles, Software, and Speed Dials to a specific physical location, and a network location. The physical location is defined by Address, City, State, Post Code, Country, Timezone. Additionally, a Contact Name, contact Number, and Contact Email for the location can be configured.
Logical location is defined by the network Subnets. You define the Subnets associated with the physical location by defining the TCP/IP network using classless inter-domain routing (CIDR) notation.
At a minimum, for each location, you should define all fields in the Location section and define at least one network. You add device profiles, software and speed dial entries to apply these elements to devices in the location and subnet.

...

To add a new location, do the following.

      1. Click Locations on the sidebar. On the Locations dialog, click Add.
      2. On the Location – Add New dialog in the Location section
  1. Click the field for Location Name and type a name for this new location
  2. Click the field for Address and fill in the address of the physical location
  3. Click the field City and type the city for this physical location
  4. Click the State field and type the state for this physical location
  5. Click the Postcode field and type the postal code or ZIP code for this physical location
  6. Click the Country field and type the country for this physical location
  7. Click the Timezone field and start typing the time zone this physical location. For example, for US Central, you can type 'cen' and select US/Central or '6' and select 'CST6CDT'
  8. Click the Contact Name field and type the person's name who is the point of contact for this physical location
  9. Click the Contact Number field and type the phone number of SIP URI for the person named in Contact Name for this physical location
  10. Click the Contact Email field and type the email address for the person named in Contact Name for this physical location
      1. To add subnets to this location, Click Add in the Subnets section
  11. Click the field for CIDR and type the network portion of the TCP/IP address. For example, if a network is defined by a netmask of 255.255.255.0, the CIDR definition you would type is 192.168.10.0/24
  12. Click Create to add the subnet to the location, or location or Cancel to discard your changes
      1. To add device profiles to this location, click Add in the Device Profiles section
  13. In the Add Device Profiles dialog, select one or more device profiles by checking the check box associated with the profiles you want to add to the location.
  14. Use the Filter to find a device profile or reduce the number of device profiles and locate the profiles you need
  15. Click Apply to add the selected profiles to the location, or location or Cancel to discard your changes
      1. To add software to this location, click Add in the Software section
  16. In the Apply Software dialog, select one or more software packages by checking the check box associated with the software package(s) you want to add to the location.
  17. Use the Filter to find a software package or reduce the number of software packages and locate the software package(s) you need
  18. Click Apply to add the selected software package(s) to the location, or location or Cancel to discard your changes
      1. To add speed dial sets to this location, click Add in the Speed Dials section
  19. In the Add Speed Dials dialog, select one or more speed dial sets by checking the check box associated with the speed dial set(s) you want to add to the location.
  20. Use the Filter to find a speed dial set or reduce the number of speed dial sets and locate the speed dial set (s) you need
  21. Click Apply to add the selected speed dial set(s) to the location, or location or Cancel to discard your changes
      1. To save the Location configuration, click Save to commit the Location settings, or Cancel to discard the changes
      2. In order to apply your changes to the devices in the newly created Location, you can reboot all devicesThis needs clarification. How can you reboot devices in a location that isn't defined?

Filter Locations

The ability to filter your locations is a handy feature as the number of locations increase, making it much easier to locate the locations that you need to manage.
To filter your Locations, do the following:
Click Filter and in the text field and start typing the name of a location
Tip! If you are looking for a location that contains a given string, start typing the string. For example, to find all locations that contains the contain the string 'contoso', type contoso in the text box.
It's important to understand that if you type 'bob' the filter will find bob and the string 'bob' in the location, or location or number '1' will find all parts of the location that contains contain '1' and all location attributes that contain 1, 10, 21, or any number that contains '1'.

...

Unlike other components in EZ UDM Pro, Bridges are not added by using the user interface. Bridges are added by installing the EZ UDM Pro Bridge software on a server on your local network. When installed, the bridge software registers with the target EZ UDM Pro server.
The bridge, once registered with the EZ UDM Pro server, cannot have a dialog with the command and control portion of EZ UDM Pro until the EZ UDM Pro administrator approves the bridge. This is a security measure, preventing rogue bridges (or computers that look like bridges) from accessing your system. Once approved, devices that connect to the bridge are can receive data and report back information to EZ UDM Pro.
To add a bridge, do the following. (Complete details are presented in the accompanying Installation Guide.)

  1. On the server that will serve as a provisioning bridge, launch the EZ UDM Pro Bridge installer as an administrator. On the Welcome dialog, click Next.
  2. In the dialog "Select Installation folder", accept the default location (C:\Program Files\Event Zero\EZ UDM Pro Bridge) for the bridge files. Alternatively, Browse and select or type a location that you want to install the files to. Click Next.
  3. In the dialog Settings, enter the https uniform resource locator (URL) for your EZ UDM Pro tenant (cloud-based) or server (on-premises). If you use Automatic for Bridge Registration Type, click Next.

If you want to provide unique identifiers, select Manual. Two fields are revealed that you then supply your identifier information.
Bridge ID is universally a universally unique identifier (UUID) field for use as an absolute identifier and is a feature to be used for future purposes.
Bridge API Key is a feature to be used for future purposes.
Click Next.Unsure of this, but hey – it's the best I have right now.

  1. Click Install to begin the installation of the bridge. 
  2. Monitor the installation process as it proceeds. 
  3. When finished, click Finish on the Completed screen.

Approve Bridges

Installing the EZ UDM Pro Bridge software on your local server registers the bridge with EZ UDM Pro. You, as an Administrator on EZ UDM Pro, must approve the bridge to allow it to communicate and establish a full dialog with the application. To approve a bridge, do the following.

  1. In EZ UDM Pro, select Bridges from the sidebar.
  2. On the Bridges dialog page, scroll through the list or filter the list of registered bridges. Look for the name of the newly registered bridge or look for bridges that have a status of "Bridge awaiting approval", indicated by a yellow triangle.
  3. Under Actions, click the Approve bridge for provisioning icon on the right.
  4. On the Confirmation dialog, click Approve or click Cancel to discard your changes.
  5. Successful approval of the bridge will result in the yellow triangle changing to a green check mark.

Manage Bridges

To view details on the status of a bridge and configure what a bridge will offer to connected devices, locate the bridge in the list of bridges and select the bridge by clicking the link.

...

  • Bridge Name – A read-only field indicating the name that the bridge registered as. This is the hostname of the server as it is registered
  • Note – A text field allowing the EZ UDM Pro administrator to add notes to the bridge entry
  • Devices Connected – The number of devices that have registered with this bridge
  • First Seen – The amount of time that has passed since this bridge was first seen, typically when the bridge registered with EZ UDM Pro
  • Last Seen – The amount of time since the bridge last communicated with EZ UDM Pro. Bridges communicate and query with EZ UDM Pro occasionally to receive updates and new software or configurations assigned to it. An extended period since 'Last Seen' suggests that there is a possible problem with the bridge, or bridge or the network that the bridge is on.

Details on troubleshooting a bridge that might be experiencing problems can be found in the Appendix of this guide.
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right, or right or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.

...

Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right, or right or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.

...

In Device Profiles, you view existing Device Profiles assigned to the bridge for use by devices connected. Columns in Device Profiles are Name, Attributes (number), and Tags (number). You Add a device profile to the Device Profiles section by clicking Add.
When you click Add, you select one or more previously configured Device Profiles from a pick list of device profiles.
To remove a Device Profile from the bridge, click Delete (a trash can icon) to remove the device profile.
You can filter device profiles by clicking Filter and typing the name of a device profile or attributes used in the device profile. This is a powerful feature, allowing you to determine which device profiles include a given attribute. You can type a part of an attribute or the entire attribute name.
You can sort the columns in Device Profiles by clicking the arrows to the right of the column label. After the first click, you should see a descending list result, items sorted from 0 – 9, A to Z. Click the arrow to change the ascending sort to a descending sort, Z – A, 9 – 0. You do the same on the other columns where ascending is the number 0 to the letter Z, and descending is from the letter Z to the number 0.
Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right, or right or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.

...

The speed dials section of the bridge configuration assigns speed dials to the bridge for provisioning. Columns in Speed Dials are Name, Entries (number), and Tags (number). Click Add in the Speed Dials section to add a speed dial set.


When you click Add, you select one or more previously created speed dial sets from a pick list of available speed dials. Click Apply to add the speed dial(s) to your bridge.


To remove a speed dial set from the bridge, click Delete (a trash can icon) to remove the speed dial entry.


You can filter speed dials by clicking Filter and typing the name of a speed dial name. This is a powerful feature, allowing you to type a part of a speed dial to limit the selection criteria.


You can sort the columns in Speed Dials by clicking the arrows to the right of the column label. After the first click, you should see a descending list result, items sorted from 0 – 9, A to Z. Click the arrow to change the ascending sort to a descending sort, Z – A, 9 – 0. You do the same on the other columns where ascending is the number 0 to the letter Z, and descending is from the letter Z to the number 0.


Any changes, additions or deletions in this section requires you to save your changes by clicking Save in the upper right, or Cancel to discard your changes (handy if you find you've made a mistake or have made changes to the wrong section). A pop-up on the bottom of the screen will confirm the save was committed, and clicking Cancel will warn that you will discard your changes. Click Proceed to continue with the cancel, or click Cancel to confirm that you did not intend to Cancel.

...

The ability to filter your bridges is a handy feature as the number of bridges increase, making it much easier to locate the bridges that you need to manage.
To filter your Bridges, do the following:

  1. Click Filter and in the text field and start typing the name of a bridge, typically a string from the Bridge Name column.

    Tip!

...

  1.  If you are looking for a bridge

...

  1. that contains a given string, start typing the string. For example, to find all bridges that contains the string '2012',

...

  1. type 2012

...

  1.  in the

...

  1. textbox. 
    It's important to understand that if you type '20' the filter will

...

  1. find 20

...

  1.  and the string '20' in the bridge name. The filter also returns bridge names that contain 20, such as 201, 1020, or any string that contains '20'.

  2. Note that the list of bridges is dynamically reduced the more you type
  3. Select the bridge that you need to manage by clicking the name of the bridge, click the Refresh or No Refresh icon (Approve bridge for provisioning, Prevent bridge from provisioning, respectively) or click the Trash Can icon to delete the location
  4. To clear your filter criteria, click the 'X' at the right side of the text field

Sorting Bridges

In addition to the Filter feature, you can sort bridges on the Bridge Name, Devices, or Last Seen columns. To sort a column, ascending or descending, do the following:

...

  1. Click the Prevent bridge from provisioning icon associated with the bridge you intend to delete. This action stops the bridge from responding to all devices associated with this bridge.

    Note!

...

  1.  If you need to remove the server from service temporarily and intend to return it to

...

  1. service but are not changing servers, you would

...

  1. use Prevent bridge from provisioning

...

  1.  to prevent it from responding to devices. You then can maintain the server and later

...

  1. click Approve bridge for provisioning

...

  1.  to return it to service and managing devices.

  2. Give the bridge five minutes to quiesce and finish any outstanding operations that might be in queue.
  3. Click Delete (trash can icon) to remove the bridge from the Bridges listing.
  4. The server where the EZ UDM Provisioning Bridge software is installed is now available to have the bridge software removed and the server repurposed or retired.

...