Why Policies Aren’t Applied at the Group Level
Applying policies at the group level would force all members of that group to inherit the same scheduling behavior, eliminating flexibility. By contrast, assigning policies to computers individually (or via location/client inheritance) means:
- A single group can contain machines with diverse reboot needs (e.g., daily vs. weekly vs. monthly schedules).
- Policies remain decoupled from group logic, allowing you to reuse the same group of machines across multiple policies.
- You're free to dynamically adjust individual policy triggers without impacting the group structure.
So instead of creating multiple groups for each unique policy need (which would multiply complexity), we can support a multitude of policies per group with cleaner logic and less duplication.
Why “Groups” Are Really “Dependency Groups”
These groups aren't meant to enforce scheduling—they're designed to manage execution order and inter-device dependencies. That's why:
- They’re used to coordinate reboot sequencing, not scheduling.
- Each machine's policy determines when a reboot is due; the group determines how it's executed in relation to its peers.
- You can have a group like “SQL Tier” or “Web Layer” where machines are staggered with delays, regardless of their individual reboot policies.
This approach makes reboot logic modular:
Policy controls intent → Group controls execution discipline
This design is what makes Reboot Manager scalable. One consistent, dependency-based group can elegantly manage dozens of machines, each adhering to its own cadence, but rebooting in the right sequence when the time comes.
Want me to help craft messaging around this for users or documentation? I’d be happy to translate it into a client-friendly explanation.
Policies and Group Management
This forum provides the documentation and descriptions of how the Reboot Manager works. Do not post issues in this forum.
Return to “Reboot Manager Documentation”
Jump to
- ConnectWise Automate Support and Integrations
- ↳ General ConnectWise Automate Discussions
- ↳ Scripts
- ↳ Reboot Manager For ConnectWise Automate
- ↳ Reboot Manager Documentation
- ↳ Automate Package Manager
- ↳ Documentation
- ↳ Chocolatey Plugins
- ↳ App Genie
- ↳ Chocolatey For Labtech
- ↳ Chocolatey For Automate
- ↳ ChocolateyForAutomate 3.5 Document Project
- ↳ Chocolatey For Automate 3.6 & 3.7 Document Project
- ↳ Habitat
- ↳ Habitat Documentation Forum
- ↳ BitLocker for Automate
- ↳ BitLocker Documentation Project
- ↳ Patch Remedy 5
- ↳ Documentation Project
- ↳ Patch Remedy for LabTech (Patch Remedy 4) Retired
- ↳ SurfLog for Automate
- ↳ SurfLog Documentation Project
- ↳ SurfLog Browsing Metrics for Labtech
- ↳ Office365 For Automate
- ↳ Office365 For Automate Documentation Forum
- ↳ Office365 for LabTech
- ↳ Defender For Automate
- ↳ Defender Documentation
- ↳ Active Directory UC
- ↳ Active Directory UC Documentation
- ↳ NetGate PFSense Manager Plugin for ConnectWise Automate
- ↳ Documentation Project
- ↳ VMWare ESX Host Health Monitor
- ↳ Silo For Automate
- ↳ Silo Documentation Project
- ↳ Cleaner For LabTech
- ↳ Printer Status Plugin
- ↳ Avast Business Antivirus Plugin
- ↳ Backup Windows Plugin for LabTech
- ↳ Linux Update Manager
- ↳ Linux Update Manager Documentation
- ↳ Magma For LabTech
- ↳ Nagios for LabTech
- ↳ ADMON Administrators Group Monitor plugin
- ↳ Expiry Domain Password Expiration Plugin
- ↳ Map Drives Plugin
- ↳ Announce Maintenance Plugin
- ↳ Agent Status Plugin
- ↳ FileHog File Analyzer Plugin
- ↳ GhostFile Host File Manager Plugin
- ↳ Flue Shot AV Plugin
- ↳ AcceloSync Plugin for LabTech
- ↳ NUT (Network Utilization Tests) Plugin
- ↳ Net Detective plugin
- ↳ PowerShell plugin for Labtech
- ↳ RegHog Registry search plugin
- ↳ SQL Query Analyzer plugin
- ↳ IPBlock Country (region) IP Filter Plugin
- ↳ Go Postal Exchange Report Manager plugin
- ↳ AppassureD Backup Manager Plugin
- ↳ Stalled Agents Detector Plugin
- ↳ APT-GET Package Manager for Linux Plugin
- ↳ PFSense 4 LabTech
- ↳ All other LabTech Plugin Support