Symantec ALTIRIS INVENTORY SOLUTION 7.0 SP2 - V1.0 Manual

Hide thumbs Also See for ALTIRIS INVENTORY SOLUTION 7.0 SP2 - V1.0:
Table of Contents

Advertisement

Quick Links

Altiris Inventory Solution
from Symantec User Guide
Version 7.0 SP2

Advertisement

Table of Contents
loading

Summary of Contents for Symantec ALTIRIS INVENTORY SOLUTION 7.0 SP2 - V1.0

  • Page 1 Altiris Inventory Solution from Symantec User Guide Version 7.0 SP2...
  • Page 2: Legal Notice

    Legal Notice Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Altiris, and any Altiris or Symantec trademarks used in the product are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
  • Page 3 Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com...
  • Page 4: Technical Support

    The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
  • Page 5 Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/techsupp/ Customer service Customer service information is available at the following URL: www.symantec.com/techsupp/...
  • Page 6 North America and Latin America supportsolutions@symantec.com Additional enterprise services Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.
  • Page 7: Table Of Contents

    Contents Technical Support ....................4 Chapter 1 Introducing Inventory Solution ........11 About Inventory Solution .............. 11 About Inventory Pack for Servers ............ 12 What s new in this version of Inventory Solution ....... 13 About what you can inventory ............13 Supported Inventory Solution platforms ..........
  • Page 8 Contents Manually creating and modifying inventory policies and tasks ..... 43 Selecting computers and scheduling inventory tasks ......44 Inventory policy options ..............45 Inventory advanced options ............46 Inventory advanced options: Data Classes tab ........47 Inventory advanced options: Files Properties Scan Settings tab .... 47 Inventory advanced options: Run options tab ........
  • Page 9 Contents Metering and denying applications ..........89 Configuring Application Metering policies ........90 Defining applications to meter or deny ..........92 Application metering policy options ..........93 Application definition details ............96 Application metering start, stop, and denial events ......99 About application summary data ...........
  • Page 10 Contents...
  • Page 11: Introducing Inventory Solution

    Chapter Introducing Inventory Solution This chapter includes the following topics: About Inventory Solution About Inventory Pack for Servers What s new in this version of Inventory Solution About what you can inventory Supported Inventory Solution platforms Components of Inventory Solution What you can do with Inventory Solution Methods for gathering inventory Where to get more information...
  • Page 12: About Inventory Pack For Servers

    The policies and tasks are easily configured and managed using a central Web console. The inventory data is stored in the Altiris CMDB database. This CMDB provides a central store of data that is used across the Symantec Management Platform. After you have gathered inventory data or metered applications, you can analyze the data using predefined or custom reports.
  • Page 13: What S New In This Version Of Inventory Solution

    Introducing Inventory Solution What s new in this version of Inventory Solution VMware ESX ORACLE Microsoft SQL Server mySQL Microsoft Exchange Server Microsoft DHCP Server Microsoft DNS Server Microsoft RAS Server Microsoft IIS Apache Network load balancing System DSN For a complete list of supported platforms and versions, see the Inventory Solution Release Notes.
  • Page 14 Basic inventory The data that is gathered when the Altiris Agent is installed on the managed client computer. This inventory is a core function of the Symantec Management Platform and does not require Inventory Solution. Basic inventory gathers information about the computer that the Altiris Agent is installed on.
  • Page 15: Supported Inventory Solution Platforms

    You can also detect the differences between a computer and a reference computer. Additional types of inventory can be gathered using other Symantec products. “Supported Inventory Solution platforms” on page 15.
  • Page 16: Components Of Inventory Solution

    For a complete list of supported platforms and versions, see the Inventory Solution Release Notes. “Where to get more information” on page 20. Additional Symantec products will be available to collect inventory data on additional platforms. You can use the following products: Inventory Pack for Servers Gathers the inventory from server-based software components.
  • Page 17: What You Can Do With Inventory Solution

    107. What you can do with Inventory Solution The Symantec Management Platform gathers basic inventory from managed computers. Inventory Solution adds the ability to gather substantially more data as well as other tools to help you gather and use your inventory data.
  • Page 18: Methods For Gathering Inventory

    Description Basic inventory This method is performed automatically when the Altiris Agent is installed on managed computers. This feature is a core function of the Symantec Management Platform and does not require any additional inventory components. Table 1-1 on page 14.
  • Page 19 (for computers without the Inventory plug-in. These programs are created using configuration pages in the Altiris Agent or connection Symantec Management Console. The programs can be distributed using email, network to a Notification Server) shares, log-in scripts, and so on.
  • Page 20: Where To Get More Information

    Introducing Inventory Solution Where to get more information Inventory methods (continued) Table 1-3 Method Description Application metering You can use this method by installing the Application Metering plug-in on your managed computers. You can monitor and record the usage of applications. The advantages are as follows: You can track how often an application is used, not only if it is installed.
  • Page 21 This information is available as an article in Release Notes. the knowledge base. You can also access the Release Notes from the Symantec Management Console. On the Help menu, click Documentation Library. From the Documentation Library page, in the Inventory Solution section, click the Inventory Solution Release Notes link.
  • Page 22 Altiris information resources Table 1-5 Resource Description Location Knowledge base Articles, incidents, and issues about Altiris http://kb.altiris.com/ products. Symantec Connect An online magazine that contains best http://www.symantec.com/connect practices, tips, tricks, forums, and articles /endpoint-management-virtualization (formerly Altiris Juice) for users of this product.
  • Page 23: Using The Inventory Home Page

    The Inventory home page provides some Web parts that let you perform common tasks, view an inventory data summary, and view scheduled inventory policies. You access the home page from the Home menu of the Symantec Management Console. The Edit option lets you customize the Inventory home page to add or remove Web parts.
  • Page 24 Using the Inventory home page About the Inventory home page Inventory home page default Web parts (continued) Table 2-1 Web part Description How current is my computer inventory? This Web part has a graph that shows how current your inventory is. It shows how many computers have and have not reported inventory in the last seven days.
  • Page 25: Preparing Managed Computers For Inventory

    Chapter Preparing managed computers for inventory This chapter includes the following topics: Preparing managed computers for inventory and metering About the Inventory and Application Metering plug-ins Installing the Inventory and Application Metering plug-ins Upgrading the Inventory and Application Metering plug-ins Uninstalling the Inventory and Application Metering plug-ins Preparing managed computers for inventory and metering...
  • Page 26 The Altiris Agent has two versions: one for Windows and one for UNIX, Linux, and Mac. For more information, view topics about the Altiris Agent in the Symantec Management Platform Help. Note: To inventory UNIX, Linux, and Mac computers, you must have the...
  • Page 27: About The Inventory And Application Metering Plug-Ins

    Preparing managed computers for inventory About the Inventory and Application Metering plug-ins Process for preparing managed computers for inventory and Table 3-1 metering (continued) Step Action Description Step 3 Prepare managed computers by To inventory or meter managed installing or upgrading plug-ins. computers, you must install or upgrade the Inventory plug-in or Application Metering plug-in on target computers.
  • Page 28: Installing The Inventory And Application Metering Plug-Ins

    25. To install the Inventory or Application Metering plug-ins In the Symantec Management Console, do one of the following: On the Actions menu, click Agent/Plug-ins > Rollout Agent/Plug-ins. On the Settings menu, click All Settings. In the left pane, click Agent/Plug-ins.
  • Page 29: Upgrading The Inventory And Application Metering Plug-Ins

    Preparing managed computers for inventory Upgrading the Inventory and Application Metering plug-ins Click either Windows or UNIX/Linux/Mac. Click the policy for the plug-in you want to install. On the plug-in install page, turn on the policy. At the upper right of the page, click the colored circle, and then click On. Select the computers to install the plug-in on by clicking Apply to and configure the target computers.
  • Page 30 Preparing managed computers for inventory Uninstalling the Inventory and Application Metering plug-ins...
  • Page 31: Gathering Inventory On Managed Computers

    Chapter Gathering inventory on managed computers This chapter includes the following topics: About gathering inventory on managed computers About inventory policies and tasks About predefined inventory policies About methods for gathering software inventory About using Inventory Solution with the Software Catalog Data Provider How Inventory Solution works with the Software Catalog Data Provider Gathering inventory on managed computers Using predefined inventory policies...
  • Page 32: About Gathering Inventory On Managed Computers

    Gathering inventory on managed computers About gathering inventory on managed computers About targeted software inventory Gathering detailed file inventory Running a targeted software inventory About gathering inventory on managed computers You can gather inventory data by running automated policies and tasks on managed computers.
  • Page 33: About Inventory Policies And Tasks

    42. “Inventory policy options” on page 45. For more information, see topics about cloning policies in the Symantec Management Platform Help. Create your own policies You can create your own policies and configure them to meet your needs.
  • Page 34: About Predefined Inventory Policies

    “Using predefined inventory policies” on page 42. For more information, see topics about cloning policies in the Symantec Management Platform Help. “About inventory policies and tasks ” on page 33.
  • Page 35: About Predefined Inventory Policies

    Gathering inventory on managed computers About predefined inventory policies Predefined inventory policies and tasks Table 4-1 Policy Enabled by Default Default Notes default? schedule target Collect Full Weekly, This policy collects a full inventory. Inventory every computers By default it collects hardware and Monday at with the operating system, software, and file...
  • Page 36: About Methods For Gathering Software Inventory

    Gathering inventory on managed computers About methods for gathering software inventory Predefined inventory policies and tasks (continued) Table 4-1 Policy Enabled by Default Default Notes default? schedule target Collect Full Weekly, This task only exists if the Inventory Server every computers Pack for Servers product is installed.
  • Page 37 (MSI cache). When you select this option, it uses the Software Discovery task. For more information about what Software Discovery task does, see topics about Software Discovery in the Symantec Management Platform Help. When Inventory Solution is installed, it turns off any schedules for the Software Discovery task and instead uses the schedules of the Inventory policies that use it.
  • Page 38: About Using Inventory Solution With The Software Catalog Data Provider

    Software Catalog. This process happens automatically with the default Inventory Policy settings. For more information see the Software Catalog Data Provider User Guide or help. In the Symantec Management Console, see the Documentation library for a link...
  • Page 39: How Inventory Solution Works With The Software Catalog Data Provider

    Software Catalog Data Provider User Guide which is installed with Inventory Solution. To view this guide, in the Symantec Management Console, on the Help menu, click Documentation Library > Software Catalog Data Provider Users Guide. For information on updating the Software Catalog Data Provider data file of known applications, see the Inventory Solution 7.0 SP2 Release...
  • Page 40: How Inventory Solution Works With The Software Catalog Data Provider

    Data provider Summary This summary is the list of known applications that has been imported into the CMDB as software resources. To view this list, from the Symantec Management Console, on the Manage menu, click Software > Data Provider Summary.
  • Page 41: Gathering Inventory On Managed Computers

    By default, if the data matches, the application data is imported into the Software Catalog. This option can be turned off. To view this task, from the Symantec Management Console, on the Settings menu, click All Settings > Software > Data Provider > Software Catalog Data Provider Inventory.
  • Page 42: Using Predefined Inventory Policies

    You can use the predefined policies as they are or modify them. If you want to modify a predefined policy, we recommend that you clone the original policy and then modify the copy. For more information, see topics about cloning policies in the Symantec Management Platform Help. “About predefined inventory policies”...
  • Page 43: Manually Creating And Modifying Inventory Policies And Tasks

    “Inventory policy options” on page 45. To clone (copy) an existing inventory policy In the Symantec Management Console, browse to the item you want to clone. Right-click the item, and click Clone. Give the cloned item a unique name, and click OK.
  • Page 44: Selecting Computers And Scheduling Inventory Tasks

    Gathering inventory on managed computers Selecting computers and scheduling inventory tasks To manually create inventory tasks In the Symantec Management Console, on the Manage menu, click Jobs and Tasks. In the Quick Start - Jobs and Tasks, click Create a new job or task.
  • Page 45: Inventory Policy Options

    Gathering inventory on managed computers Inventory policy options “Manually creating and modifying inventory policies and tasks” on page 43. “Inventory policy options” on page 45. To select computers and schedule inventory tasks In an inventory task, click Task Status > New Schedule. Select an option: Schedule Select the computers to run the task on.
  • Page 46: Inventory Advanced Options

    The targets that the policy is applied to and a result summary. For more information on configuring targets, view topics about using policies and filtering rules in the Symantec Management Platform Help. Inventory advanced options This dialog box lets you configure the advanced options of an inventory task.
  • Page 47: Inventory Advanced Options: Data Classes Tab

    Gathering inventory on managed computers Inventory advanced options: Data Classes tab Software Rules tab (This tab is available only if software inventory is selected.) Software rules let you filter drives, folders, and files when you perform a software inventory scan. “Inventory advanced options: Files Properties Scan Settings tab”...
  • Page 48 Gathering inventory on managed computers Inventory advanced options: Files Properties Scan Settings tab Software Rules tab (continued) Table 4-6 Option Description Folders tab Select the folders that you want to include or exclude in the software inventory scan. When adding a folder to the list, you can either browse to a folder name or enter the name in the text box.
  • Page 49 Gathering inventory on managed computers Inventory advanced options: Files Properties Scan Settings tab Software rules includes and excludes (continued) Table 4-7 Option Description Exclude folder: Ignores the folder from software scan. Starting with Inventory Solution 7.0 SP1, new folders have been added to the list of excludes in order to reduce redundant data.
  • Page 50 Gathering inventory on managed computers Inventory advanced options: Files Properties Scan Settings tab Software inventory behavior for different platforms (continued) Table 4-8 Possible settings Behavior of the Behavior of the Behavior of the on the Software software scan software scan software scan Scan Settings tab agent on Windows...
  • Page 51: Inventory Advanced Options: Run Options Tab

    Gathering inventory on managed computers Inventory advanced options: Run options tab Software inventory behavior for different platforms (continued) Table 4-8 Possible settings Behavior of the Behavior of the Behavior of the on the Software software scan software scan software scan Scan Settings tab agent on Windows agent on...
  • Page 52 Gathering inventory on managed computers Inventory advanced options: Run options tab Run Options tab (continued) Table 4-9 Option Description Enable verbose client logging You can select this option to include additional trace information in the client log. Generally, you would use this option to troubleshoot a problem.
  • Page 53: About Detailed File Inventory

    Gathering inventory on managed computers About detailed file inventory Run Options tab (continued) Table 4-9 Option Description System Resource Usage You can modify the usage of the target computer's processor and disk usage during an inventory scan. The actual resource utilization during an inventory scan will depend on the target computer's processor type and hard disk speed.
  • Page 54: About Targeted Software Inventory

    Gathering inventory on managed computers About targeted software inventory You can perform a detailed file inventory in one of two ways: By selecting the Report detailed file inventory immediately option in the inventory policies or tasks. This option is enabled by default. “Inventory advanced options: Run options tab”...
  • Page 55: Gathering Detailed File Inventory

    Gathering inventory on managed computers Gathering detailed file inventory Software resource A software resource consists of the meta data that describes a specific instance of a software application. In the Targeted Software Inventory policy, you specify the software that you want to inventory. The software resource s detection rule The detection rule that is associated with a software resource can be used to create a policy to determine if that software resource is installed on a given...
  • Page 56: Running A Targeted Software Inventory

    “Inventory advanced options: Files Properties Scan Settings tab” on page 47. To view the Detailed File Inventory task In the Symantec Management Console, on the Manage menu, click Jobs and Tasks. In the left pane, under System Jobs and Tasks, click Discovery and Inventory >...
  • Page 57 Edit. For more information, see the topic about editing an inventory rule in the Symantec Management Platform Help. On the policy page, expand the Schedule section, and define the schedule on which to check the client computers.
  • Page 58 Gathering inventory on managed computers Running a targeted software inventory...
  • Page 59: Gathering Inventory Using Stand-Alone

    One method of gathering inventory data is stand-alone inventory packages. A stand-alone inventory package is an executable file that you create from the Symantec Management Console. You run the package on target computers and gather the inventory data of that computer. This method lets you gather inventory on the target computers that are not managed through the Altiris Agent.
  • Page 60: Gathering Inventory Using Stand-Alone Packages

    Step Action Description Step 1 Create a stand-alone inventory You create stand-alone inventory package. packages from the Symantec Management Console. “Creating and editing stand-alone inventory packages” on page 60. Step 2 Run the Stand-alone Inventory You run the stand-alone packages on package on the target computers.
  • Page 61: Stand-Alone Inventory Package Options Page

    “Gathering inventory using stand-alone packages” on page 60. To create or edit a stand-alone inventory package In the Symantec Management Console, on the Settings menu, click All settings. In the left pane, click Discovery and Inventory > Inventory Solution >...
  • Page 62 Gathering inventory using stand-alone packages Stand-alone inventory package options page Stand-alone inventory package options Table 5-2 Setting Description Inventory data classes You can select the type of inventory data to gather. You can select a whole category or expand it and select a detailed set of data.
  • Page 63 Gathering inventory using stand-alone packages Stand-alone inventory package options page Stand-alone inventory package options (continued) Table 5-2 Setting Description Send inventory data to: This option lets you configure where the inventory data is stored after it is gathered. You can choose from the following options. Notification Server URL If target computers can communicate with the Notification Server computer using HTTP (port 80 open)
  • Page 64: Running Stand-Alone Inventory Packages On Target Computers

    Gathering inventory using stand-alone packages Running stand-alone inventory packages on target computers Stand-alone inventory package options (continued) Table 5-2 Setting Description Advanced (Software inventory only) You can configure software inventory rules for software inventory. “Inventory advanced options” on page 46. Running stand-alone inventory packages on target computers After you have created stand-alone inventory packages on Notification Server,...
  • Page 65 Gathering inventory using stand-alone packages Running stand-alone inventory packages on target computers When you run a stand-alone inventory package, you can use command-line switches to modify default behavior. “Stand-alone inventory package command-line switches” on page 66. If you had enabled the verbose logging or if any errors occur when running stand-alone inventory, you can view the inventory events in a log.
  • Page 66: Stand-Alone Inventory Package Command-Line Switches

    Gathering inventory using stand-alone packages Stand-alone inventory package command-line switches Stand-alone inventory package command-line switches When you run a stand-alone inventory package, the package uses the options that are selected when the package was created. When you run a package, you can use command-line switches to modify default behavior.
  • Page 67: Manually Reporting Stand-Alone Inventory Data

    Gathering inventory using stand-alone packages Manually reporting stand-alone inventory data Stand-alone inventory package command-line switches (continued) Table 5-4 Command-line switch Description Use this switch to override the value for the "Send Inventory /SendInventoryTo to" option that is specified in the stand-alone package. destination The destination can be either an http(s) link to the Notification Server computer or a folder path.
  • Page 68 Gathering inventory using stand-alone packages Manually reporting stand-alone inventory data...
  • Page 69: Gathering Custom Inventory

    Chapter Gathering custom inventory This chapter includes the following topics: About gathering custom inventory Gathering custom inventory Creating and customizing the data class Creating a custom inventory script task About creation interfaces Viewing custom inventory data About gathering custom inventory You can use custom inventory to extend the type of inventory you gather by adding new data classes that are not included by default.
  • Page 70 Gathering custom inventory About gathering custom inventory A data class is a table in the database. For example, the Processor_Ex data class in the Inv_Processor_Ex database. Each data class has a set of attributes that define its properties. You can create and customize a data class by adding, editing, and deleting the attributes.
  • Page 71: Gathering Custom Inventory

    Gathering custom inventory Gathering custom inventory “About creation interfaces” on page 76. You can change a custom data class in following ways if it is saved in the CMDB and is empty: You can add nullable, non-nullable, key, non-key attributes You can delete an attribute You can change the properties of an attribute You cannot modify the data class in any of these ways if it has data.
  • Page 72: Creating And Customizing The Data Class

    Creating and customizing the data class Creating and customizing the data class From the Symantec Management Console, you can create a custom data class. You can add, edit, and delete attributes of the data class. You can also find the GUID and view the data in the data class.
  • Page 73 To view the data of the custom data class In the Symantec Management Console, click Manage > Computers. In the right pane, double-click a computer. In the Resource Manager page, select View > Inventory.
  • Page 74: Creating A Custom Inventory Script Task

    You can also clone a task. Cloning a task refers to creating an identical copy of a task. To access a sample custom inventory script task In the Symantec Management Console, select Manage > Jobs and Tasks. In the left pane, click Samples > Discovery and Inventory > Inventory samples > Custom.
  • Page 75 Creating a custom inventory script task To create and schedule a new custom inventory task In the Symantec Management Console, select Manage > Jobs and Tasks. Click Create a new job or task. In the list of task types, click Run Script.
  • Page 76: About Creation Interfaces

    Run. To schedule the task, click New Schedule. Select the schedule options for the task. For more information, view topics about running tasks in the Symantec Management Platform Help. About creation interfaces You store gathered custom inventory in an NSE (Notification Server Event) and send the NSE to CMDB.
  • Page 77: About Creation Interfaces

    Gathering custom inventory About creation interfaces ' Set the header data of the NSE ' Please don't modify this GUID nse.To = "{1592B913-72F3-4C36-91D2-D4EDA21D2F96}" nse.Priority = 1 'Create Inventory data block. Here assumption is that the data class with below guid is already configured on server dim objDCInstance set objDCInstance = nse.AddDataClass ("{e8220123-4987-4b5e-bc39- ec6eaea312ef}")
  • Page 78 Gathering custom inventory About creation interfaces Set objCIMObj = objWMIService.ExecQuery("select * from CIM_processor") 2. Create NSE objects for the custom data class GUID: 'Create instance of Altiris NSE component dim nse set nse = WScript.CreateObject ("Altiris.AeXNSEvent") ' Set the header data of the NSE ' Please don't modify the following GUID.
  • Page 79: Viewing Custom Inventory Data

    When inventory data is gathered, it is stored in the CMDB. You can use the Resource Manager to view custom inventory that is gathered from a computer. For more information about using the Resource Manager, see the Symantec Management Platform Help.
  • Page 80 Gathering custom inventory Viewing custom inventory data...
  • Page 81: Viewing Inventory Data And Reports

    When inventory data is gathered, it is stored in the CMDB. You can view information in the CMDB using reports and the Resource Manager. Both of these are functions of the Symantec Management Platform. “Using inventory reports” on page 81.
  • Page 82: About Using The Resource Manager To View Inventory Data

    About using the Resource Manager to view inventory data report to view computers in a certain domain. You can also filter the list of computers by using wildcards. For more information about using reports, see the Symantec Management Platform Help.. To access inventory reports In the Symantec Management Console, click Reports >...
  • Page 83 Viewing inventory data and reports About using the Resource Manager to view inventory data Hardware inventory summary page Table 7-1 Section Description Agent This section lists the agents that are installed on the resource, the version number, the date they were first discovered, the date when the last inventory was collected, and so on.
  • Page 84: Using The Resource Manager To View Inventory Data

    82. To view the inventory data of a computer using the Resource Manager In the Symantec Management Console, click Manage > Computers. In the right pane, double-click a computer. To view the hardware summary, click Summaries > Hardware Summary.
  • Page 85: Metering And Denying Applications

    Chapter Metering and denying applications This chapter includes the following topics: About metering and denying applications About how application metering works About blacklisting applications About configuring applications for metering Metering and denying applications Configuring Application Metering policies Defining applications to meter or deny Application metering policy options Application definition details Application metering start, stop, and denial events...
  • Page 86 Metering and denying applications About metering and denying applications Monitor the use of applications on managed computers. Control the availability of applications on managed computers. Note: Application metering is a Windows-only feature. This feature requires the Altiris Agent and an Application Metering plug-in be installed on target computers.
  • Page 87 Metering and denying applications About metering and denying applications Application metering functions (continued) Table 8-1 Function Description Denying You can control the availability of an application with the following applications options: Allow an application to run at all times. Deny an application from running at all times. Deny an application from running at specified times or on specified days.
  • Page 88: About How Application Metering Works

    Metering and denying applications About how application metering works Caution: When you use Application Metering policies, it is possible for multiple policies to monitor the same application. This situation might cause erroneous data in reports or trigger duplicate notification policy actions. About how application metering works The rules for metering applications are controlled through Notification Server polices.
  • Page 89: About Configuring Applications For Metering

    Metering and denying applications About configuring applications for metering Otherwise it displays “The following software cannot be blacklisted because it is not associated with any executable files.” “Configuring Application Metering policies” on page 90. About configuring applications for metering When you configure an Application Metering policy, you define the applications you want to meter by creating application definitions.
  • Page 90: Configuring Application Metering Policies

    Metering and denying applications Configuring Application Metering policies “About metering and denying applications” on page 85. “Preparing managed computers for inventory and metering” on page 25. Process for metering and denying applications Table 8-3 Step Action Description Step 1 Prepare computers for metering. Target computers must be managed and have the Application Metering plug-in installed.
  • Page 91 88. To access predefined Application Metering policies In the Symantec Management Console, on the Manage menu, click Policies. In the left pane, click Software > Application metering. You can use an existing policy or clone an existing policy to create a new one.
  • Page 92: Defining Applications To Meter Or Deny

    Metering and denying applications Defining applications to meter or deny Click Apply to, and select the resources to apply the policy to. For more information, view topics about using policies in the Symantec Management Platform Help. Click Save changes. Defining applications to meter or deny When you configure an Application Metering policy, you define the applications you want to meter by creating application definitions.
  • Page 93: Application Metering Policy Options

    Metering and denying applications Application metering policy options Select a method to enter definition details for an application:. Software If you select Software, you can choose applications from a list of known software. This list is the software programs that are defined in the Software Catalog.
  • Page 94 Metering and denying applications Application metering policy options “Configuring Application Metering policies” on page 90. “Defining applications to meter or deny” on page 92. Application metering policy options Table 8-4 Option Description Metering options You can configure if and when the applications in this policy can run. You can select the following options: Allow: This option lets the application run at any time.
  • Page 95 Metering and denying applications Application metering policy options Application metering policy options (continued) Table 8-4 Option Description Record usage You can enable application event tracking. This option lets you track events the usage events of the applications that are defined in the policy. When a selected event occurs, a record of the event is sent to the CMDB.
  • Page 96: Application Definition Details

    You can select the target computers to apply this Application Metering group of policy to. computers or For more information, view topics about using policies in the Symantec user. Management Platform Help. Application definition details When configuring an Application Metering policy, use the Application Definition Details dialog.
  • Page 97: Application Definition Details

    Metering and denying applications Application definition details Guidelines for specifying application definition details Table 8-5 Item Description All fields must be met For an application to be monitored, it must meet the criteria of all the fields. For example, if you specify the File name and File version, only the applications that meet both of these criteria are monitored.
  • Page 98 Metering and denying applications Application definition details Guidelines for specifying application definition details (continued) Table 8-5 Item Description File and product versions When you specify application definitions, it is important to note that they may be version-specific. You can have a definition with a specific version or you cannot use a version at all.
  • Page 99: Application Metering Start, Stop, And Denial Events

    Metering and denying applications Application metering start, stop, and denial events Guidelines for specifying application definition details (continued) Table 8-5 Item Description Command line The Command line field contains the command line that the application must use to be monitored. Include an * before and after the command-line text to ensure that the entire command line is included.
  • Page 100 Metering and denying applications Application metering start, stop, and denial events Application metering start events data (continued) Table 8-6 Field Description Example UserGuid Resource guid that is {493435F7-3B17-4C4C-B07F- generated for a specific user C23E7AB7781F} on a domain. Processor ID of the managed computer that is running the application.
  • Page 101: About Application Summary Data

    Metering and denying applications About application summary data Application metering stop events data (continued) Table 8-7 Field Description Example Total Run Time Time Total amount of time 188714 in seconds that the application was used during the monitoring period . When the application is monitored, this value is updated every 30 seconds.
  • Page 102 Metering and denying applications About application summary data Application metering records data for each monitored application in the order in which it is stored in the data file. Application Summary Data Table 8-8 Field Description Example FileResourceGUID Resource guid that is {018B191B-47AE-4180-9FCD- generated by using various 7F3CEA4F1E12}...
  • Page 103 Metering and denying applications About application summary data Application Summary Data (continued) Table 8-8 Field Description Example Average CPU Average CPU usage by the 0.7652 application during the monitoring period, where 100 equals 100 percent usage. When the application is monitored, this value is updated every 30 seconds.
  • Page 104: About How Application Metering Summary Is Sent

    Metering and denying applications About how application metering summary is sent Application Summary Data (continued) Table 8-8 Field Description Example Average CPU Average CPU usage by the 0.7652 application during the monitoring period, where 100 equals 100 percent usage. When the application is monitored, this value is updated every 30 seconds.
  • Page 105: Managing Application Metering Data

    Configuration page. “About application summary data” on page 101. To configure application metering options In the Symantec Management Console, on the Settings menu, click All Settings. In the left pane, click Discovery and Inventory > Inventory Solution > Application Metering Configuration.
  • Page 106 For more information, view topics about using reports in the Symantec Management Platform Help. In the Symantec Management Console, on the Reports menu, click All Reports. In the left pane, click Software > Application Metering. In the left pane, click Inventory > Reports > Application metering.
  • Page 107: Gathering Baseline Inventory

    Chapter Gathering baseline inventory This chapter includes the following topics: About baseline inventory About baseline files Compiling a file baseline snapshot File baseline task options File Configuration Editor dialog box File Snapshot Editor options Creating a Registry Baseline Snapshot task Registry Baseline Task page Registry Configuration Editor options Registry Snapshot Editor options...
  • Page 108: About Baseline Files

    Gathering baseline inventory About baseline files Baseline inventory reports newly added files, missing files, registry keys, and version mismatch. It also reports duplicate files with the version change. You can use the baseline management features for the following purposes: Track files and registry deviations from the corporate standards. Verify the accuracy of rollout and upgrades.
  • Page 109: Compiling A File Baseline Snapshot

    Gathering baseline inventory Compiling a file baseline snapshot and so on. You can use the default configuration file, edit it, or create one or more custom configuration files. Configuration files for registry baselines are in .INI format. By default, it is AexRegScan.ini. Configuration files for file baselines are in .INI format, but have extension .BLS.
  • Page 110: File Baseline Task Options

    121. To create a File Baseline task In the Symantec Management Console, click Manage > Jobs and Tasks. In the Jobs and Tasks Portal, click Create a new job or task. In the Create New Task dialog page, in the Discovery and Inventory folder, click File Baseline.
  • Page 111 Gathering baseline inventory File baseline task options File Baseline task options (continued) Table 9-1 Option Description Compile a baseline snapshot You can capture and set the captured file settings as the file baseline. This option helps you to create a new file baseline setup. You can use the following options: Use local baseline configuration.
  • Page 112: File Configuration Editor Dialog Box

    Gathering baseline inventory File Configuration Editor dialog box File Baseline task options (continued) Table 9-1 Option Description Compare with a baseline snapshot This option compares the target with the baseline. You can use the following options: Compare with a baseline snapshot Select this option to compare the computer s present state with the local baseline snapshot, local_master.bls that is on the client...
  • Page 113 Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options Table 9-2 Setting Description General This tab identifies the baseline file and tracks the information in the compliance scan output. Baseline name The name for the baseline file. You can enter a maximum 175 characters in this field.
  • Page 114 Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Extensions This tab can be used to specify the file extensions to locate during the baseline scan. Extension The extension of the files to locate during the baseline scan.
  • Page 115 Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Duplicates This tab can be used to determine how the compliance scan finds and reports duplicate files. The duplicate file names must be the same. The compliance scan output indicates if the duplicate files have the same or a different version.
  • Page 116 Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Directories You can select this tab to specify the directories to scan for a baseline snapshot. It checks whether the compliance scan uses the same directories as the baseline scan.
  • Page 117 Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description You can enter a drive or a directory name you want to exclude during the File Compliance Scan in this field and click Add. The drive or the directory name is added to the Exclude these directories list.
  • Page 118 Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Known As You can select this tab to specify a known as alias that replaces a file s product name in the compliance scan output.
  • Page 119 Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Manufacturer Select this tab to specify a known as Known As alias that replaces a manufacturer s company name in the compliance scan output.
  • Page 120 Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Exclusion Filters Select this tab to specify the files to be excluded from the scan based on the rules that consist of sets of file properties.
  • Page 121: File Snapshot Editor Options

    Gathering baseline inventory File Snapshot Editor options File Configuration Editor options (continued) Table 9-2 Setting Description Advanced Select this tab to override the default values used to generate data for the output files. You can maintain multiple snapshots on a single system by customizing these settings.
  • Page 122 Gathering baseline inventory File Snapshot Editor options File Configuration Editor options Table 9-3 Setting Description Settings Reference System The name of the computer on which the baseline snapshot was created. The file compliance scan includes this information in the snapshot file. Baseline name The name for the baseline file.
  • Page 123: Creating A Registry Baseline Snapshot Task

    128. To create a Registry Baseline task In the Symantec Management Console, click Manage > Jobs and Tasks. In the Jobs and Tasks Portal, click Create a new job or task. In the Create New Task dialog page, in the Discovery and Inventory folder, click Registry Baseline.
  • Page 124 Gathering baseline inventory Registry Baseline Task page Registry Baseline task options Table 9-4 Option Description Name Enter a name for the task you want to roll out to the target folder. This name helps you identify the task. By default, the task name is Registry Baseline.
  • Page 125: Registry Configuration Editor Options

    Gathering baseline inventory Registry Configuration Editor options Registry Baseline task options (continued) Table 9-4 Option Description Compare with a baseline snapshot Select this option to compare the target with the baseline. Choose from the following options: Compare with local baseline snapshot Compare with custom baseline snapshot You can browse for an existing baseline configuration or baseline snapshot file or...
  • Page 126 Gathering baseline inventory Registry Configuration Editor options Registry Configuration Editor options Table 9-5 Setting Description Include Keys Select this tab to specify the registry keys to be included in the scan. The number of registry keys in the original baseline configuration affects the run time of baseline snapshot scans.
  • Page 127 Gathering baseline inventory Registry Configuration Editor options Registry Configuration Editor options (continued) Table 9-5 Setting Description Remote Computers Select this tab to specify the remote computers to be included in the scan. To add a computer, specify a computer in Remote Computer by browsing the network, and then click Add.
  • Page 128: Registry Snapshot Editor Options

    Gathering baseline inventory Registry Snapshot Editor options Registry Snapshot Editor options A baseline snapshot file (.RBL) contains a record of the registry settings on a computer at a given time. This data is gathered during an initial baseline scan, which is based on options in a baseline configuration file. “Creating a Registry Baseline Snapshot task”...
  • Page 129: Index

    Index agent-based inventory 19 Inventory application denying 20, 86 scheduling 33–34, 42, 45 reports 106 inventory application metering 20, 86, 89 agent-based 19 policy 89 agentless 19 reports 106 basic 18 Application Metering plug-in 27 cloning stand-alone packages 60 installing 28 creating stand-alone packages 60 uninstalling 29 custom 69...
  • Page 130 Index Inventory Task (continued) tasks software rules 47 inventory 33 inventory task accessing UNIX, Linux, and Mac network files 52 creating 41, 43 location 44 modifying 43–44 reporting changes only 51 user context options 53 verbose client logging 52 inventory tasks 33 Inventory wizard 41 metering applications 20, 86, 89 reports 106...

Table of Contents