The configuration specific to the upgraded version is created dynamically. The last deployed configuration is deployed automatically to the host. Any changes to configuration assignments always have to be manually deployed.
Configurations are automatically updated to the centrally assigned ones upon software upgrade. Note that local configurations on the hosts are overwritten even if the changes have not yet been reported to the Management Server. Administrators can view the hosts that have local configuration changes known at the time of software deployment in the software installation listing.
Copyright 2014 SSH Communications Security Corporation This software is protected by international copyright laws. All rights reserved. Contact Information
What to read next:
Reduce Secure Shell risk. Get to know the NIST 7966.
The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government. Download now
ISACA Practitioner Guide for SSH
With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community. Download now