{"id":17004,"date":"2021-12-17T16:28:07","date_gmt":"2021-12-17T15:28:07","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/"},"modified":"2021-12-17T16:28:07","modified_gmt":"2021-12-17T15:28:07","slug":"control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/","title":{"rendered":"Control-M \/EM &#8211; How to manage Control-M utility restriction for Remote hosts"},"content":{"rendered":"<p>Hi team,<br \/>\ntoday we will see how to restrict the Control-M utility when using your remote hosts.<br \/>\nwe will perform a quick test to show how it works before the modification , then after.<br \/>\nfirst of all ,we will create two jobs to give an example, each using a control m utility command :<br \/>\nOne using ctmpsm command which allow you to list order and make many actions on your jobs, and the other ctmvar command which help you to list and define your variables.<br \/>\n<a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE1ano.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-53207\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE1ano.png\" alt=\"\" width=\"1104\" height=\"184\" \/><\/a><\/p>\n<ul>\n<li>example of ctmvar output command:<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE-VARano.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-53214\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE-VARano.png\" alt=\"\" width=\"1105\" height=\"350\" \/><\/a><br \/>\nJobs are running\u00a0 fine so now we will update utility authorizations\u00a0 and to do so we will update a specific file named REMOTE_UTILS_LIST<\/p>\n<h3>Update file on Linux<\/h3>\n<ul>\n<li>edit the CONFIG.dat file by updating the line REMOTE_UTILS_LIST with your favorite text editor:<\/li>\n<\/ul>\n<p>Note: by default agent is authorized to run all utilities,in our example we will edit the line and remove the utility we want to restrict to the agent<br \/>\n<a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-53191\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE1.png\" alt=\"\" width=\"1121\" height=\"71\" \/><\/a><br \/>\n<strong>important note:<\/strong><br \/>\nDon&#8217;t forget to check if the line UPLOAD_REMOTE_UTILS to yes &#8220;Y&#8221;<br \/>\n<a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/remote_register_ano2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-53222\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/remote_register_ano2.png\" alt=\"\" width=\"1125\" height=\"90\" \/><\/a><\/p>\n<h3>Update file on Windows<\/h3>\n<ul>\n<li>type regedit in the windows bar<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE1WIN2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-53193\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE1WIN2.png\" alt=\"\" width=\"1104\" height=\"445\" \/><\/a><\/p>\n<ul>\n<li>browse on your agent configuration to the line REMOTE_UTILS_LIST<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/remote_register_ano.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-53210\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/remote_register_ano.png\" alt=\"\" width=\"1122\" height=\"434\" \/><\/a><br \/>\nOnce you have edited the line (removing the utility you want to restrict) you just have to start you jobs and check if you are able to call the utility<br \/>\nNO agent restart is needed<\/p>\n<h3>result expected<\/h3>\n<p>For example by removing ctmpsm utility, the job will fail with error<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1\">ctmpsm: command not found<\/pre>\n<p>At this point, it will no longer be authorized for the agent as it has been disabled in the config file updated earlier , if you want to authorize it again add the command at the appropriate line (make sure to have a backup of the CONFIG.dat in any case).<\/p>\n<h3>Conclusion<\/h3>\n<p>Now you know how to manage your utilities when using your remote hosts on Linux and Windows,feel free to check dbi bloggers and also you can check the excellent BMC site to have tips and tricks to ease your life with Control-M!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hi team, today we will see how to restrict the Control-M utility when using your remote hosts. we will perform a quick test to show how it works before the modification , then after. first of all ,we will create two jobs to give an example, each using a control m utility command : One [&hellip;]<\/p>\n","protected":false},"author":40,"featured_media":17011,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1256],"tags":[],"type_dbi":[],"class_list":["post-17004","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-control-m"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Control-M \/EM - How to manage Control-M utility restriction for Remote hosts - dbi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Control-M \/EM - How to manage Control-M utility restriction for Remote hosts\" \/>\n<meta property=\"og:description\" content=\"Hi team, today we will see how to restrict the Control-M utility when using your remote hosts. we will perform a quick test to show how it works before the modification , then after. first of all ,we will create two jobs to give an example, each using a control m utility command : One [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-17T15:28:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1754\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Middleware Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Middleware Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/\"},\"author\":{\"name\":\"Middleware Team\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/8d8563acfc6e604cce6507f45bac0ea1\"},\"headline\":\"Control-M \/EM &#8211; How to manage Control-M utility restriction for Remote hosts\",\"datePublished\":\"2021-12-17T15:28:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/\"},\"wordCount\":355,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png\",\"articleSection\":[\"Control-M\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/\",\"name\":\"Control-M \/EM - How to manage Control-M utility restriction for Remote hosts - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png\",\"datePublished\":\"2021-12-17T15:28:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/8d8563acfc6e604cce6507f45bac0ea1\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#primaryimage\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png\",\"contentUrl\":\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png\",\"width\":1754,\"height\":288},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.dbi-services.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Control-M \/EM &#8211; How to manage Control-M utility restriction for Remote hosts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#website\",\"url\":\"https:\/\/www.dbi-services.com\/blog\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/8d8563acfc6e604cce6507f45bac0ea1\",\"name\":\"Middleware Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/ddcae7ba0f9d1a0e7ae707f0e689e4a9c95bb48ec49c8e6d9cc86d43f4121cb6?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ddcae7ba0f9d1a0e7ae707f0e689e4a9c95bb48ec49c8e6d9cc86d43f4121cb6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ddcae7ba0f9d1a0e7ae707f0e689e4a9c95bb48ec49c8e6d9cc86d43f4121cb6?s=96&d=mm&r=g\",\"caption\":\"Middleware Team\"},\"url\":\"https:\/\/www.dbi-services.com\/blog\/author\/middleware-team\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Control-M \/EM - How to manage Control-M utility restriction for Remote hosts - dbi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/","og_locale":"en_US","og_type":"article","og_title":"Control-M \/EM - How to manage Control-M utility restriction for Remote hosts","og_description":"Hi team, today we will see how to restrict the Control-M utility when using your remote hosts. we will perform a quick test to show how it works before the modification , then after. first of all ,we will create two jobs to give an example, each using a control m utility command : One [&hellip;]","og_url":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/","og_site_name":"dbi Blog","article_published_time":"2021-12-17T15:28:07+00:00","og_image":[{"width":1754,"height":288,"url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png","type":"image\/png"}],"author":"Middleware Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Middleware Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/"},"author":{"name":"Middleware Team","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/8d8563acfc6e604cce6507f45bac0ea1"},"headline":"Control-M \/EM &#8211; How to manage Control-M utility restriction for Remote hosts","datePublished":"2021-12-17T15:28:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/"},"wordCount":355,"commentCount":0,"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png","articleSection":["Control-M"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/","url":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/","name":"Control-M \/EM - How to manage Control-M utility restriction for Remote hosts - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#primaryimage"},"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png","datePublished":"2021-12-17T15:28:07+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/8d8563acfc6e604cce6507f45bac0ea1"},"breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#primaryimage","url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png","contentUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2022\/04\/REMOTE3.png","width":1754,"height":288},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/control-m-em-how-to-manage-control-m-utility-restriction-for-remote-hosts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Control-M \/EM &#8211; How to manage Control-M utility restriction for Remote hosts"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/8d8563acfc6e604cce6507f45bac0ea1","name":"Middleware Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ddcae7ba0f9d1a0e7ae707f0e689e4a9c95bb48ec49c8e6d9cc86d43f4121cb6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ddcae7ba0f9d1a0e7ae707f0e689e4a9c95bb48ec49c8e6d9cc86d43f4121cb6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ddcae7ba0f9d1a0e7ae707f0e689e4a9c95bb48ec49c8e6d9cc86d43f4121cb6?s=96&d=mm&r=g","caption":"Middleware Team"},"url":"https:\/\/www.dbi-services.com\/blog\/author\/middleware-team\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/17004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=17004"}],"version-history":[{"count":0,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/17004\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media\/17011"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=17004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=17004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=17004"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=17004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}