A credential is a username and password used to authenticate a user or process's access to a machine or network or some other resource.
Agent Credentials
The VSA maintains a single agent credential with administrator privileges for an agent to use, using the Agent > Manage Agents page.
useCredential()
command in the agent procedure editor requires a an agent credential to run successfully.Blank Credentials
Blank passwords can be used if the managed machine's Local Security Policy allows blank passwords. On the managed machine, open the Local Security Policy tool in Administrative Tools. Navigate to Local Policies - Security Options. Look for a policy named
. The default setting is enabled. Change it to disabled and a credential with a blank password will work.Accounts: Limit local account use of blank passwords to console logon only
Managed Credentials
The VSA maintaines additional credentials at three different levels: by organization, by machine group and by individual machine or device. They are managed using three navigation items in the Audit module:
Once created, use managed credentials:
Note: A managed credential can not overwrite the agent credential maintained using the Agent > Manage Agents directly. The managed credential must be applied to a policy and the policy applied to the machine.
If multiple credentials are defined for a machine, then the most local level defined has precedence: by individual machine, by machine group, or by organization. At any one level, only one managed credential can be designated the source credential for an agent credential for Policy Management
is the organization of the service provider using the VSA. All other organizations in the VSA are second party organizations doing business with myOrg
. The default name of myOrg
, called myOrg
, should be renamed to match the service provider's company or organization name. This name displays at the top of various reports to brand the report. Agents installed to internally managed machines can be assigned to this organization. VSA user logons are typically associated with staff records in the My Organization
myOrg
organization. myOrg
cannot be assigned a parent organization.
An on premises hardware/software installation of the VSA is a maintained by a service provider and typically used only by the service provider. See Software as a Service (SaaS).
The VSA supports three different kinds of business relationships:
The
table is a support table shared by organizations, customers and vendors. Each record in the Org
table is identified by a unique Org
. The orgID
table contains basic information you'd generally need to maintain about any kind of business relationship: mailing address, primary phone number, duns number, yearly revenue, etc. Because the Org
table is shared, you can easily convert:Org
Note: myOrg
is the organization of the service provider using the VSA.
Patch policies contain all active patches for the purpose of approving or denying patches. An active patch is defined as a patch that has been reported by a patch scan by at least one machine in the VSA. Any machine can be made a member of one or more patch policies.
For example, you can create a patch policy named
and assign all your servers to be members of this patch policy and another patch policy named servers
and assign all your workstations to be members of this policy. This way, you can configure patch approvals differently for servers and workstations. workstations
Master
role users can only see patch policies they have created or patch policies that have machine IDs the user is authorized to see based on their scope.Assigning a policy to a view on the Policies page is required to assign a policy using the Organizations/Machine Groups page. This prevents the unintentional assignment of a policy to all machines in the VSA. A policy without a specified view displays as a red scroll icon in the policy tree of the Organizations/Machine Groups page, indicating that it cannot be assigned. A folder with a red exclamation mark icon
displays in the policy tree if it contains at least one policy without a specified view. When assigning an entire folder of policies to an organization or machine group, policies without a specified view are ignored.
A Policy Management policy override condition exists if agent settings for a machine have been set manually, outside of the Policy Management module. For example, making changes to the agent menu of a machine using the Agent Menu page in the Agent module sets up an override condition for that agent machine. Policy Management policies will be ignored from then on. Clearing an override enables applied Policy Management policies to take effect.
-
- The agent settings for this machine match the settings of all policies assigned to this machine. No user action is required.In Compliance
-
- At least one policy assigned to this machine has been changed and is scheduled to be deployed. No user action is required.Marked for Deployment
-
- No applied policies are assigned to this machine. Consider assigning applied policies to this machine. No Policy Attached
-
- At least one agent setting does not match at least one active policy assigned to this machine. Use the Policy Details window to identify the specific policies and settings that are causing the mismatch. Out of Compliance
-
- At least one agent setting does not match at least one active policy assigned to this machine, due to a user override. An override occurs when an agent setting is set manually by any VSA user anywhere in the system. Use the Policy Details window to confirm the override of specific policies and settings are correct. If even an single agent setting is overridden in a policy assigned to a machine, no other agent settings in that policy are enforced on that machine. Other policies assigned to the same machine remain enforced.Overridden
-
- This policy status only displays in the Policy Details window. When multiple policies are assigned to a machine and agent settings conflict, policy assignment rules determine which agent settings are obeyed and which agent settings are ignored. Ignored settings are identified as inactive. A machine can show an Inactive
policy status icon while the Policy Details windows shows specific agent settings in specific policies as In Compliance
. This is expected behavior. No user action is required.Inactive
Sharing the capabilities of a single instance of the VSA is oftentimes called "Software as a Service". Service providers contract to access a VSA hosted and maintained by a VSA tenant manager. Service providers are allocated a unique tenant partition of a shared Kaseya Server and database. Within their assigned partition, service providers can only see their own organizations, machine groups, agents, procedures, reports, tickets, and any other types of user-defined data. Service providers in a tenant partition have full access to most functions of the VSA except system maintenance, which is the responsibility of the VSA tenant manager.
Built-in data objects are provided with the VSA and addon modules. These built-in data objects—also called content—provide users with best-practice solutions for commonly required IT management tasks. In some cases these built-in data objects are organized by System cabinet in a data object tree. Examples include:
You cannot modify a system cabinet policy. To copy a policy, hold down the CTRL key and drag the policy from one folder to another.
To enable multiple organizations to make use of the same built-in, standard policies in Policy Management, placeholder tokens are entered in policy fields requiring an email address. These token values are #patchAlertEmail#
, #sev1AlertEmail#
, #sev2AlertEmail#
, and #sev3AlertEmail#
. The VSA automatically replaces a token in a policy with the appropriate email address for a specific organization when an alert notification is sent out. The organization email addresses referenced by tokens are specified using step 1 of the System Management Configure Wizard. This wizard can be run during setup or anytime afterwards from the System > Orgs/Groups/Depts/Staff > Manage > Systems Management tab. The Policy Management policy categories that include email addresses are Alerts, Monitor Sets and Patch Settings.