Configuration Manager

Vector Software Distribution enables deployment of all PC software from drivers, security patches, Java updates to complete application suites.

Vector Software Distribution Overview

  • Maintain standard desktop software configurations.
  • Deploy OS updates, Java and other security updates.
  • Install applications to accurately targeted groups of PCs.
  • Provide traceability of any software deployments.
  • Uninstall software – typically unused application copies.

Vector Software Distribution enables desktop managers to distribute all types of PC software from driver updates, security patches, Java updates, etc, to complete application suites. Distributions can be targeted to groups of PCs created dynamically through applying sophisticated filters based on configuration and installed software. This capability is an essential element of effective PC desktop management.

Our customers use Software Distribution to distribute any installable software, from drivers, to OS patches, application updates and complete application suites. Software Distribution creates and manages a privileged environment on the target PCs so that software can be installed silently, in the background, with zero user interaction.

Because Vector Software Distribution will execute any valid code (including batch files) it is most commonly used to manage the deployment of silent installation MSI packages, and silent Setup scripts generated with leading packagers such as Installshield™ and Wyse™. Simply use Installshield (for example) to record the installation of the software with the desired options, to generate the distribution kit. Vector Software Distribution does not impose any proprietary packaging methods or demands.

Pre- and post- operations can be executed before and after the main installation process. Administrators can use this for a variety of purposes, such as generating special conditions for the installation, or running a tutorial once the software has been installed.

Central Control. Vector’s Software Distribution uses a combination of push and pull techniques. Copy a distribution kit to your kit server, then from the Console a definition of the software installation (Package Definition in Vector jargon) is transmitted (pushed) to an intermediate shared data repository (‘Offline Area‘). The agent collects (pulls) the Package Definition and executes it in a privileged environment.

Precision Targeting. If an organization has deployed Vector’s foundation PC Hardware Inventory and PC Software Inventory components (both are included in the Asset Manager Pro Solution and the Configuration Manager Pro Solution), there will be a rich set of characteristics on which groups of PCs can be based – such as Department, CPU, OS version, and detail of installed applications. These ‘Dynamic Groups’, which many administrators use heavily, are re-evaluated every time they are used. So administrators can be confident that PCs that have just been added to a Department, for example, will automatically be targeted for an application update for that Department.

Feedack and Audit Trail. For many organizations, a Software Distribution audit trail is needed for reporting under a Service Level Agreement, and the Client Software Distribution service generates progress information, tracking every major stage of the installation process. This information is collected and presented through the Software Distribution Monitor. Overall status is presented for all known Distribution Jobs, and each Job can be expanded into a summary of the stage that each Client last reported. Selecting a particular Client then drills down to a list view of every stage completed and its timestamp.

Highlights

  • Central control.
  • Precision targeting to groups of PCs.
  • Manages privileged install environment on PC with zero user interaction.
  • Installs applications, updates, drivers, OS patches and Service Packs.
  • No proprietary scripting to learn and support. Installs standard MSIs and other installer scripts, batch files – any valid code can be executed.
  • Can execute uninstalls to remove unused applications.
  • Unique step-by-step feedback function provides an audit trail of the progress of the distribution on each target PC.
  • Meets key functionality targets for organizations pursuing ITIL, or ISO 19770-1 best practices.