When you click Add on the Cron Properties dialog, the Crontab Entry Data dialog opens and allows you to configure a crontab entry.
To configure a crontab entry
Minutes: Enter a number from 0 to 59, a comma-separated list of numbers, or a dash-separated range, such as 15-20,59.
Hours: Enter a number from 0 to 23, a comma-separated list of numbers, or a dash-separated range, such as 18-23,5.
Day of Month: Enter a number from 1 to 31, a comma-separated list of numbers, or a dash-separated range, such as 14-20,31.
Month: Enter a number from 1 to 12, a comma-separated list of numbers, or a dash-separated range, such as 1-6,12.
Day of Week: Enter a number from 0 to 6, a comma-separated list of numbers, or a dash-separated range, such as 6,1-4. Sunday is 0.
The Files policy allows you to add, edit, or remove file settings. You can also edit a specific file listed in the File Path field.
The Files policy allows administrators to specify a list of files to copy to Unix hosts. When you add files to the Files policy, Group Policy copies the specified source files to the GPT on SYSVOL. Unix agents download the files from SYSVOL when they apply policy.
You can specify the target path, ownership, and permissions for each file. File policies provide all of the advantages of Group Policy's built-in undo mechanism. When you unlink or delete file policies, it deletes the associated files on the host or replaces it with the previous file contents, unless you select the Copy Files Permanently option. If no source is specified, the Group Policy agent searches for the target file and sets the specified ownership and permissions. The ownership and permissions are restored when the policy is un-applied.
Files policies can be overridden. If there are multiple policies affecting the same file entry, the permissions, ownership, and contents of the file are dictated by the lowest policy in the hierarchy affecting that file or the highest enforced policy affecting that file in the hierarchy.
Files policy supports non-tattooing, block inheritance, ACL filtering, and enforced settings. Multiple entries with the same target are resolved according to the Group Policy Conflict Resolution rules.
You can configure the Files policy to copy a standard /etc/hosts file to a Unix agent using the Group Policy Object Editor (GPOE).
To configure the Files policy
Ensure that the file is accessible from your Windows computer.
The Files Properties dialog opens.
The File Settings dialog opens.
The path must start with a "/", for example: /etc/hosts
If the user does not exist on the Unix host, this defaults to root.
Note: Typically /etc/hosts is owned by root.
If the group does not exist on the Unix host, this defaults to root (or system on AIX).
Note: If this option is not set, the permissions default to the permissions for the target file on the target machine. If the file does not already exist on the target machine, the permissions on the new file default to read/write for the user.
Note: If this option is not set, the permissions default to the permissions on the existing file. If the file does not exist, the permissions default to none.
Note: If this option is not set, the permissions default to the permissions on the existing file. If the file does not exist, the permissions default to none.
By default, Safeguard Authentication Services removes copied files when the policy no longer applies. If the policy overwrote an existing file, it will be restored when policy is un-applied.
The file you just configured displays in the list of files to copy.
By default, Safeguard Authentication Services removes copied files when the policy no longer applies.
The file you just configured displays in the list of files to copy.
The Text Replacement Macros tab allows policies to be dynamically adjusted as policy is being applied on the Unix host. Any text specified in the policy either directly by the user or in files that are placed on the target system can be aliased to a command or environment variable.
For example, you might have a policy that uses the hostname as part of a policy setting. You can create a Text Replacement Macro called %%HOSTNAME%% and specify that this macro text be replaced by the output of the /bin/hostname command. This makes it possible for a single GPO to serve as a template on a wide range of Unix systems.
© 2024 One Identity LLC. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center