The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
Page 5
Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/techsupp/ Customer service Customer service information is available at the following URL: www.symantec.com/techsupp/...
Page 6
North America and Latin America supportsolutions@symantec.com Additional enterprise services Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.
Contents Technical Support ....................4 Chapter 1 Introducing Inventory Solution ........11 About Inventory Solution .............. 11 About Inventory Pack for Servers ............ 12 What s new in this version of Inventory Solution ....... 13 About what you can inventory ............13 Supported Inventory Solution platforms ..........
Chapter Introducing Inventory Solution This chapter includes the following topics: About Inventory Solution About Inventory Pack for Servers What s new in this version of Inventory Solution About what you can inventory Supported Inventory Solution platforms Components of Inventory Solution What you can do with Inventory Solution Methods for gathering inventory Where to get more information...
The policies and tasks are easily configured and managed using a central Web console. The inventory data is stored in the Altiris CMDB database. This CMDB provides a central store of data that is used across the Symantec Management Platform. After you have gathered inventory data or metered applications, you can analyze the data using predefined or custom reports.
Introducing Inventory Solution What s new in this version of Inventory Solution VMware ESX ORACLE Microsoft SQL Server mySQL Microsoft Exchange Server Microsoft DHCP Server Microsoft DNS Server Microsoft RAS Server Microsoft IIS Apache Network load balancing System DSN For a complete list of supported platforms and versions, see the Inventory Solution Release Notes.
Page 14
Basic inventory The data that is gathered when the Altiris Agent is installed on the managed client computer. This inventory is a core function of the Symantec Management Platform and does not require Inventory Solution. Basic inventory gathers information about the computer that the Altiris Agent is installed on.
You can also detect the differences between a computer and a reference computer. Additional types of inventory can be gathered using other Symantec products. “Supported Inventory Solution platforms” on page 15.
For a complete list of supported platforms and versions, see the Inventory Solution Release Notes. “Where to get more information” on page 20. Additional Symantec products will be available to collect inventory data on additional platforms. You can use the following products: Inventory Pack for Servers Gathers the inventory from server-based software components.
107. What you can do with Inventory Solution The Symantec Management Platform gathers basic inventory from managed computers. Inventory Solution adds the ability to gather substantially more data as well as other tools to help you gather and use your inventory data.
Description Basic inventory This method is performed automatically when the Altiris Agent is installed on managed computers. This feature is a core function of the Symantec Management Platform and does not require any additional inventory components. Table 1-1 on page 14.
Page 19
(for computers without the Inventory plug-in. These programs are created using configuration pages in the Altiris Agent or connection Symantec Management Console. The programs can be distributed using email, network to a Notification Server) shares, log-in scripts, and so on.
Introducing Inventory Solution Where to get more information Inventory methods (continued) Table 1-3 Method Description Application metering You can use this method by installing the Application Metering plug-in on your managed computers. You can monitor and record the usage of applications. The advantages are as follows: You can track how often an application is used, not only if it is installed.
Page 21
This information is available as an article in Release Notes. the knowledge base. You can also access the Release Notes from the Symantec Management Console. On the Help menu, click Documentation Library. From the Documentation Library page, in the Inventory Solution section, click the Inventory Solution Release Notes link.
Page 22
Altiris information resources Table 1-5 Resource Description Location Knowledge base Articles, incidents, and issues about Altiris http://kb.altiris.com/ products. Symantec Connect An online magazine that contains best http://www.symantec.com/connect practices, tips, tricks, forums, and articles /endpoint-management-virtualization (formerly Altiris Juice) for users of this product.
The Inventory home page provides some Web parts that let you perform common tasks, view an inventory data summary, and view scheduled inventory policies. You access the home page from the Home menu of the Symantec Management Console. The Edit option lets you customize the Inventory home page to add or remove Web parts.
Page 24
Using the Inventory home page About the Inventory home page Inventory home page default Web parts (continued) Table 2-1 Web part Description How current is my computer inventory? This Web part has a graph that shows how current your inventory is. It shows how many computers have and have not reported inventory in the last seven days.
Chapter Preparing managed computers for inventory This chapter includes the following topics: Preparing managed computers for inventory and metering About the Inventory and Application Metering plug-ins Installing the Inventory and Application Metering plug-ins Upgrading the Inventory and Application Metering plug-ins Uninstalling the Inventory and Application Metering plug-ins Preparing managed computers for inventory and metering...
Page 26
The Altiris Agent has two versions: one for Windows and one for UNIX, Linux, and Mac. For more information, view topics about the Altiris Agent in the Symantec Management Platform Help. Note: To inventory UNIX, Linux, and Mac computers, you must have the...
Preparing managed computers for inventory About the Inventory and Application Metering plug-ins Process for preparing managed computers for inventory and Table 3-1 metering (continued) Step Action Description Step 3 Prepare managed computers by To inventory or meter managed installing or upgrading plug-ins. computers, you must install or upgrade the Inventory plug-in or Application Metering plug-in on target computers.
25. To install the Inventory or Application Metering plug-ins In the Symantec Management Console, do one of the following: On the Actions menu, click Agent/Plug-ins > Rollout Agent/Plug-ins. On the Settings menu, click All Settings. In the left pane, click Agent/Plug-ins.
Preparing managed computers for inventory Upgrading the Inventory and Application Metering plug-ins Click either Windows or UNIX/Linux/Mac. Click the policy for the plug-in you want to install. On the plug-in install page, turn on the policy. At the upper right of the page, click the colored circle, and then click On. Select the computers to install the plug-in on by clicking Apply to and configure the target computers.
Page 30
Preparing managed computers for inventory Uninstalling the Inventory and Application Metering plug-ins...
Chapter Gathering inventory on managed computers This chapter includes the following topics: About gathering inventory on managed computers About inventory policies and tasks About predefined inventory policies About methods for gathering software inventory About using Inventory Solution with the Software Catalog Data Provider How Inventory Solution works with the Software Catalog Data Provider Gathering inventory on managed computers Using predefined inventory policies...
Gathering inventory on managed computers About gathering inventory on managed computers About targeted software inventory Gathering detailed file inventory Running a targeted software inventory About gathering inventory on managed computers You can gather inventory data by running automated policies and tasks on managed computers.
42. “Inventory policy options” on page 45. For more information, see topics about cloning policies in the Symantec Management Platform Help. Create your own policies You can create your own policies and configure them to meet your needs.
“Using predefined inventory policies” on page 42. For more information, see topics about cloning policies in the Symantec Management Platform Help. “About inventory policies and tasks ” on page 33.
Gathering inventory on managed computers About predefined inventory policies Predefined inventory policies and tasks Table 4-1 Policy Enabled by Default Default Notes default? schedule target Collect Full Weekly, This policy collects a full inventory. Inventory every computers By default it collects hardware and Monday at with the operating system, software, and file...
Gathering inventory on managed computers About methods for gathering software inventory Predefined inventory policies and tasks (continued) Table 4-1 Policy Enabled by Default Default Notes default? schedule target Collect Full Weekly, This task only exists if the Inventory Server every computers Pack for Servers product is installed.
Page 37
(MSI cache). When you select this option, it uses the Software Discovery task. For more information about what Software Discovery task does, see topics about Software Discovery in the Symantec Management Platform Help. When Inventory Solution is installed, it turns off any schedules for the Software Discovery task and instead uses the schedules of the Inventory policies that use it.
Software Catalog. This process happens automatically with the default Inventory Policy settings. For more information see the Software Catalog Data Provider User Guide or help. In the Symantec Management Console, see the Documentation library for a link...
Software Catalog Data Provider User Guide which is installed with Inventory Solution. To view this guide, in the Symantec Management Console, on the Help menu, click Documentation Library > Software Catalog Data Provider Users Guide. For information on updating the Software Catalog Data Provider data file of known applications, see the Inventory Solution 7.0 SP2 Release...
Data provider Summary This summary is the list of known applications that has been imported into the CMDB as software resources. To view this list, from the Symantec Management Console, on the Manage menu, click Software > Data Provider Summary.
By default, if the data matches, the application data is imported into the Software Catalog. This option can be turned off. To view this task, from the Symantec Management Console, on the Settings menu, click All Settings > Software > Data Provider > Software Catalog Data Provider Inventory.
You can use the predefined policies as they are or modify them. If you want to modify a predefined policy, we recommend that you clone the original policy and then modify the copy. For more information, see topics about cloning policies in the Symantec Management Platform Help. “About predefined inventory policies”...
“Inventory policy options” on page 45. To clone (copy) an existing inventory policy In the Symantec Management Console, browse to the item you want to clone. Right-click the item, and click Clone. Give the cloned item a unique name, and click OK.
Gathering inventory on managed computers Selecting computers and scheduling inventory tasks To manually create inventory tasks In the Symantec Management Console, on the Manage menu, click Jobs and Tasks. In the Quick Start - Jobs and Tasks, click Create a new job or task.
Gathering inventory on managed computers Inventory policy options “Manually creating and modifying inventory policies and tasks” on page 43. “Inventory policy options” on page 45. To select computers and schedule inventory tasks In an inventory task, click Task Status > New Schedule. Select an option: Schedule Select the computers to run the task on.
The targets that the policy is applied to and a result summary. For more information on configuring targets, view topics about using policies and filtering rules in the Symantec Management Platform Help. Inventory advanced options This dialog box lets you configure the advanced options of an inventory task.
Gathering inventory on managed computers Inventory advanced options: Data Classes tab Software Rules tab (This tab is available only if software inventory is selected.) Software rules let you filter drives, folders, and files when you perform a software inventory scan. “Inventory advanced options: Files Properties Scan Settings tab”...
Page 48
Gathering inventory on managed computers Inventory advanced options: Files Properties Scan Settings tab Software Rules tab (continued) Table 4-6 Option Description Folders tab Select the folders that you want to include or exclude in the software inventory scan. When adding a folder to the list, you can either browse to a folder name or enter the name in the text box.
Page 49
Gathering inventory on managed computers Inventory advanced options: Files Properties Scan Settings tab Software rules includes and excludes (continued) Table 4-7 Option Description Exclude folder: Ignores the folder from software scan. Starting with Inventory Solution 7.0 SP1, new folders have been added to the list of excludes in order to reduce redundant data.
Page 50
Gathering inventory on managed computers Inventory advanced options: Files Properties Scan Settings tab Software inventory behavior for different platforms (continued) Table 4-8 Possible settings Behavior of the Behavior of the Behavior of the on the Software software scan software scan software scan Scan Settings tab agent on Windows...
Gathering inventory on managed computers Inventory advanced options: Run options tab Software inventory behavior for different platforms (continued) Table 4-8 Possible settings Behavior of the Behavior of the Behavior of the on the Software software scan software scan software scan Scan Settings tab agent on Windows agent on...
Page 52
Gathering inventory on managed computers Inventory advanced options: Run options tab Run Options tab (continued) Table 4-9 Option Description Enable verbose client logging You can select this option to include additional trace information in the client log. Generally, you would use this option to troubleshoot a problem.
Gathering inventory on managed computers About detailed file inventory Run Options tab (continued) Table 4-9 Option Description System Resource Usage You can modify the usage of the target computer's processor and disk usage during an inventory scan. The actual resource utilization during an inventory scan will depend on the target computer's processor type and hard disk speed.
Gathering inventory on managed computers About targeted software inventory You can perform a detailed file inventory in one of two ways: By selecting the Report detailed file inventory immediately option in the inventory policies or tasks. This option is enabled by default. “Inventory advanced options: Run options tab”...
Gathering inventory on managed computers Gathering detailed file inventory Software resource A software resource consists of the meta data that describes a specific instance of a software application. In the Targeted Software Inventory policy, you specify the software that you want to inventory. The software resource s detection rule The detection rule that is associated with a software resource can be used to create a policy to determine if that software resource is installed on a given...
“Inventory advanced options: Files Properties Scan Settings tab” on page 47. To view the Detailed File Inventory task In the Symantec Management Console, on the Manage menu, click Jobs and Tasks. In the left pane, under System Jobs and Tasks, click Discovery and Inventory >...
Page 57
Edit. For more information, see the topic about editing an inventory rule in the Symantec Management Platform Help. On the policy page, expand the Schedule section, and define the schedule on which to check the client computers.
Page 58
Gathering inventory on managed computers Running a targeted software inventory...
One method of gathering inventory data is stand-alone inventory packages. A stand-alone inventory package is an executable file that you create from the Symantec Management Console. You run the package on target computers and gather the inventory data of that computer. This method lets you gather inventory on the target computers that are not managed through the Altiris Agent.
Step Action Description Step 1 Create a stand-alone inventory You create stand-alone inventory package. packages from the Symantec Management Console. “Creating and editing stand-alone inventory packages” on page 60. Step 2 Run the Stand-alone Inventory You run the stand-alone packages on package on the target computers.
“Gathering inventory using stand-alone packages” on page 60. To create or edit a stand-alone inventory package In the Symantec Management Console, on the Settings menu, click All settings. In the left pane, click Discovery and Inventory > Inventory Solution >...
Page 62
Gathering inventory using stand-alone packages Stand-alone inventory package options page Stand-alone inventory package options Table 5-2 Setting Description Inventory data classes You can select the type of inventory data to gather. You can select a whole category or expand it and select a detailed set of data.
Page 63
Gathering inventory using stand-alone packages Stand-alone inventory package options page Stand-alone inventory package options (continued) Table 5-2 Setting Description Send inventory data to: This option lets you configure where the inventory data is stored after it is gathered. You can choose from the following options. Notification Server URL If target computers can communicate with the Notification Server computer using HTTP (port 80 open)
Gathering inventory using stand-alone packages Running stand-alone inventory packages on target computers Stand-alone inventory package options (continued) Table 5-2 Setting Description Advanced (Software inventory only) You can configure software inventory rules for software inventory. “Inventory advanced options” on page 46. Running stand-alone inventory packages on target computers After you have created stand-alone inventory packages on Notification Server,...
Page 65
Gathering inventory using stand-alone packages Running stand-alone inventory packages on target computers When you run a stand-alone inventory package, you can use command-line switches to modify default behavior. “Stand-alone inventory package command-line switches” on page 66. If you had enabled the verbose logging or if any errors occur when running stand-alone inventory, you can view the inventory events in a log.
Gathering inventory using stand-alone packages Stand-alone inventory package command-line switches Stand-alone inventory package command-line switches When you run a stand-alone inventory package, the package uses the options that are selected when the package was created. When you run a package, you can use command-line switches to modify default behavior.
Gathering inventory using stand-alone packages Manually reporting stand-alone inventory data Stand-alone inventory package command-line switches (continued) Table 5-4 Command-line switch Description Use this switch to override the value for the "Send Inventory /SendInventoryTo to" option that is specified in the stand-alone package. destination The destination can be either an http(s) link to the Notification Server computer or a folder path.
Chapter Gathering custom inventory This chapter includes the following topics: About gathering custom inventory Gathering custom inventory Creating and customizing the data class Creating a custom inventory script task About creation interfaces Viewing custom inventory data About gathering custom inventory You can use custom inventory to extend the type of inventory you gather by adding new data classes that are not included by default.
Page 70
Gathering custom inventory About gathering custom inventory A data class is a table in the database. For example, the Processor_Ex data class in the Inv_Processor_Ex database. Each data class has a set of attributes that define its properties. You can create and customize a data class by adding, editing, and deleting the attributes.
Gathering custom inventory Gathering custom inventory “About creation interfaces” on page 76. You can change a custom data class in following ways if it is saved in the CMDB and is empty: You can add nullable, non-nullable, key, non-key attributes You can delete an attribute You can change the properties of an attribute You cannot modify the data class in any of these ways if it has data.
Creating and customizing the data class Creating and customizing the data class From the Symantec Management Console, you can create a custom data class. You can add, edit, and delete attributes of the data class. You can also find the GUID and view the data in the data class.
Page 73
To view the data of the custom data class In the Symantec Management Console, click Manage > Computers. In the right pane, double-click a computer. In the Resource Manager page, select View > Inventory.
You can also clone a task. Cloning a task refers to creating an identical copy of a task. To access a sample custom inventory script task In the Symantec Management Console, select Manage > Jobs and Tasks. In the left pane, click Samples > Discovery and Inventory > Inventory samples > Custom.
Page 75
Creating a custom inventory script task To create and schedule a new custom inventory task In the Symantec Management Console, select Manage > Jobs and Tasks. Click Create a new job or task. In the list of task types, click Run Script.
Run. To schedule the task, click New Schedule. Select the schedule options for the task. For more information, view topics about running tasks in the Symantec Management Platform Help. About creation interfaces You store gathered custom inventory in an NSE (Notification Server Event) and send the NSE to CMDB.
Gathering custom inventory About creation interfaces ' Set the header data of the NSE ' Please don't modify this GUID nse.To = "{1592B913-72F3-4C36-91D2-D4EDA21D2F96}" nse.Priority = 1 'Create Inventory data block. Here assumption is that the data class with below guid is already configured on server dim objDCInstance set objDCInstance = nse.AddDataClass ("{e8220123-4987-4b5e-bc39- ec6eaea312ef}")
Page 78
Gathering custom inventory About creation interfaces Set objCIMObj = objWMIService.ExecQuery("select * from CIM_processor") 2. Create NSE objects for the custom data class GUID: 'Create instance of Altiris NSE component dim nse set nse = WScript.CreateObject ("Altiris.AeXNSEvent") ' Set the header data of the NSE ' Please don't modify the following GUID.
When inventory data is gathered, it is stored in the CMDB. You can use the Resource Manager to view custom inventory that is gathered from a computer. For more information about using the Resource Manager, see the Symantec Management Platform Help.
When inventory data is gathered, it is stored in the CMDB. You can view information in the CMDB using reports and the Resource Manager. Both of these are functions of the Symantec Management Platform. “Using inventory reports” on page 81.
About using the Resource Manager to view inventory data report to view computers in a certain domain. You can also filter the list of computers by using wildcards. For more information about using reports, see the Symantec Management Platform Help.. To access inventory reports In the Symantec Management Console, click Reports >...
Page 83
Viewing inventory data and reports About using the Resource Manager to view inventory data Hardware inventory summary page Table 7-1 Section Description Agent This section lists the agents that are installed on the resource, the version number, the date they were first discovered, the date when the last inventory was collected, and so on.
82. To view the inventory data of a computer using the Resource Manager In the Symantec Management Console, click Manage > Computers. In the right pane, double-click a computer. To view the hardware summary, click Summaries > Hardware Summary.
Chapter Metering and denying applications This chapter includes the following topics: About metering and denying applications About how application metering works About blacklisting applications About configuring applications for metering Metering and denying applications Configuring Application Metering policies Defining applications to meter or deny Application metering policy options Application definition details Application metering start, stop, and denial events...
Page 86
Metering and denying applications About metering and denying applications Monitor the use of applications on managed computers. Control the availability of applications on managed computers. Note: Application metering is a Windows-only feature. This feature requires the Altiris Agent and an Application Metering plug-in be installed on target computers.
Page 87
Metering and denying applications About metering and denying applications Application metering functions (continued) Table 8-1 Function Description Denying You can control the availability of an application with the following applications options: Allow an application to run at all times. Deny an application from running at all times. Deny an application from running at specified times or on specified days.
Metering and denying applications About how application metering works Caution: When you use Application Metering policies, it is possible for multiple policies to monitor the same application. This situation might cause erroneous data in reports or trigger duplicate notification policy actions. About how application metering works The rules for metering applications are controlled through Notification Server polices.
Metering and denying applications About configuring applications for metering Otherwise it displays “The following software cannot be blacklisted because it is not associated with any executable files.” “Configuring Application Metering policies” on page 90. About configuring applications for metering When you configure an Application Metering policy, you define the applications you want to meter by creating application definitions.
Metering and denying applications Configuring Application Metering policies “About metering and denying applications” on page 85. “Preparing managed computers for inventory and metering” on page 25. Process for metering and denying applications Table 8-3 Step Action Description Step 1 Prepare computers for metering. Target computers must be managed and have the Application Metering plug-in installed.
Page 91
88. To access predefined Application Metering policies In the Symantec Management Console, on the Manage menu, click Policies. In the left pane, click Software > Application metering. You can use an existing policy or clone an existing policy to create a new one.
Metering and denying applications Defining applications to meter or deny Click Apply to, and select the resources to apply the policy to. For more information, view topics about using policies in the Symantec Management Platform Help. Click Save changes. Defining applications to meter or deny When you configure an Application Metering policy, you define the applications you want to meter by creating application definitions.
Metering and denying applications Application metering policy options Select a method to enter definition details for an application:. Software If you select Software, you can choose applications from a list of known software. This list is the software programs that are defined in the Software Catalog.
Page 94
Metering and denying applications Application metering policy options “Configuring Application Metering policies” on page 90. “Defining applications to meter or deny” on page 92. Application metering policy options Table 8-4 Option Description Metering options You can configure if and when the applications in this policy can run. You can select the following options: Allow: This option lets the application run at any time.
Page 95
Metering and denying applications Application metering policy options Application metering policy options (continued) Table 8-4 Option Description Record usage You can enable application event tracking. This option lets you track events the usage events of the applications that are defined in the policy. When a selected event occurs, a record of the event is sent to the CMDB.
You can select the target computers to apply this Application Metering group of policy to. computers or For more information, view topics about using policies in the Symantec user. Management Platform Help. Application definition details When configuring an Application Metering policy, use the Application Definition Details dialog.
Metering and denying applications Application definition details Guidelines for specifying application definition details Table 8-5 Item Description All fields must be met For an application to be monitored, it must meet the criteria of all the fields. For example, if you specify the File name and File version, only the applications that meet both of these criteria are monitored.
Page 98
Metering and denying applications Application definition details Guidelines for specifying application definition details (continued) Table 8-5 Item Description File and product versions When you specify application definitions, it is important to note that they may be version-specific. You can have a definition with a specific version or you cannot use a version at all.
Metering and denying applications Application metering start, stop, and denial events Guidelines for specifying application definition details (continued) Table 8-5 Item Description Command line The Command line field contains the command line that the application must use to be monitored. Include an * before and after the command-line text to ensure that the entire command line is included.
Page 100
Metering and denying applications Application metering start, stop, and denial events Application metering start events data (continued) Table 8-6 Field Description Example UserGuid Resource guid that is {493435F7-3B17-4C4C-B07F- generated for a specific user C23E7AB7781F} on a domain. Processor ID of the managed computer that is running the application.
Metering and denying applications About application summary data Application metering stop events data (continued) Table 8-7 Field Description Example Total Run Time Time Total amount of time 188714 in seconds that the application was used during the monitoring period . When the application is monitored, this value is updated every 30 seconds.
Page 102
Metering and denying applications About application summary data Application metering records data for each monitored application in the order in which it is stored in the data file. Application Summary Data Table 8-8 Field Description Example FileResourceGUID Resource guid that is {018B191B-47AE-4180-9FCD- generated by using various 7F3CEA4F1E12}...
Page 103
Metering and denying applications About application summary data Application Summary Data (continued) Table 8-8 Field Description Example Average CPU Average CPU usage by the 0.7652 application during the monitoring period, where 100 equals 100 percent usage. When the application is monitored, this value is updated every 30 seconds.
Metering and denying applications About how application metering summary is sent Application Summary Data (continued) Table 8-8 Field Description Example Average CPU Average CPU usage by the 0.7652 application during the monitoring period, where 100 equals 100 percent usage. When the application is monitored, this value is updated every 30 seconds.
Configuration page. “About application summary data” on page 101. To configure application metering options In the Symantec Management Console, on the Settings menu, click All Settings. In the left pane, click Discovery and Inventory > Inventory Solution > Application Metering Configuration.
Page 106
For more information, view topics about using reports in the Symantec Management Platform Help. In the Symantec Management Console, on the Reports menu, click All Reports. In the left pane, click Software > Application Metering. In the left pane, click Inventory > Reports > Application metering.
Gathering baseline inventory About baseline files Baseline inventory reports newly added files, missing files, registry keys, and version mismatch. It also reports duplicate files with the version change. You can use the baseline management features for the following purposes: Track files and registry deviations from the corporate standards. Verify the accuracy of rollout and upgrades.
Gathering baseline inventory Compiling a file baseline snapshot and so on. You can use the default configuration file, edit it, or create one or more custom configuration files. Configuration files for registry baselines are in .INI format. By default, it is AexRegScan.ini. Configuration files for file baselines are in .INI format, but have extension .BLS.
121. To create a File Baseline task In the Symantec Management Console, click Manage > Jobs and Tasks. In the Jobs and Tasks Portal, click Create a new job or task. In the Create New Task dialog page, in the Discovery and Inventory folder, click File Baseline.
Page 111
Gathering baseline inventory File baseline task options File Baseline task options (continued) Table 9-1 Option Description Compile a baseline snapshot You can capture and set the captured file settings as the file baseline. This option helps you to create a new file baseline setup. You can use the following options: Use local baseline configuration.
Gathering baseline inventory File Configuration Editor dialog box File Baseline task options (continued) Table 9-1 Option Description Compare with a baseline snapshot This option compares the target with the baseline. You can use the following options: Compare with a baseline snapshot Select this option to compare the computer s present state with the local baseline snapshot, local_master.bls that is on the client...
Page 113
Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options Table 9-2 Setting Description General This tab identifies the baseline file and tracks the information in the compliance scan output. Baseline name The name for the baseline file. You can enter a maximum 175 characters in this field.
Page 114
Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Extensions This tab can be used to specify the file extensions to locate during the baseline scan. Extension The extension of the files to locate during the baseline scan.
Page 115
Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Duplicates This tab can be used to determine how the compliance scan finds and reports duplicate files. The duplicate file names must be the same. The compliance scan output indicates if the duplicate files have the same or a different version.
Page 116
Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Directories You can select this tab to specify the directories to scan for a baseline snapshot. It checks whether the compliance scan uses the same directories as the baseline scan.
Page 117
Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description You can enter a drive or a directory name you want to exclude during the File Compliance Scan in this field and click Add. The drive or the directory name is added to the Exclude these directories list.
Page 118
Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Known As You can select this tab to specify a known as alias that replaces a file s product name in the compliance scan output.
Page 119
Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Manufacturer Select this tab to specify a known as Known As alias that replaces a manufacturer s company name in the compliance scan output.
Page 120
Gathering baseline inventory File Configuration Editor dialog box File Configuration Editor options (continued) Table 9-2 Setting Description Exclusion Filters Select this tab to specify the files to be excluded from the scan based on the rules that consist of sets of file properties.
Gathering baseline inventory File Snapshot Editor options File Configuration Editor options (continued) Table 9-2 Setting Description Advanced Select this tab to override the default values used to generate data for the output files. You can maintain multiple snapshots on a single system by customizing these settings.
Page 122
Gathering baseline inventory File Snapshot Editor options File Configuration Editor options Table 9-3 Setting Description Settings Reference System The name of the computer on which the baseline snapshot was created. The file compliance scan includes this information in the snapshot file. Baseline name The name for the baseline file.
128. To create a Registry Baseline task In the Symantec Management Console, click Manage > Jobs and Tasks. In the Jobs and Tasks Portal, click Create a new job or task. In the Create New Task dialog page, in the Discovery and Inventory folder, click Registry Baseline.
Page 124
Gathering baseline inventory Registry Baseline Task page Registry Baseline task options Table 9-4 Option Description Name Enter a name for the task you want to roll out to the target folder. This name helps you identify the task. By default, the task name is Registry Baseline.
Gathering baseline inventory Registry Configuration Editor options Registry Baseline task options (continued) Table 9-4 Option Description Compare with a baseline snapshot Select this option to compare the target with the baseline. Choose from the following options: Compare with local baseline snapshot Compare with custom baseline snapshot You can browse for an existing baseline configuration or baseline snapshot file or...
Page 126
Gathering baseline inventory Registry Configuration Editor options Registry Configuration Editor options Table 9-5 Setting Description Include Keys Select this tab to specify the registry keys to be included in the scan. The number of registry keys in the original baseline configuration affects the run time of baseline snapshot scans.
Page 127
Gathering baseline inventory Registry Configuration Editor options Registry Configuration Editor options (continued) Table 9-5 Setting Description Remote Computers Select this tab to specify the remote computers to be included in the scan. To add a computer, specify a computer in Remote Computer by browsing the network, and then click Add.
Gathering baseline inventory Registry Snapshot Editor options Registry Snapshot Editor options A baseline snapshot file (.RBL) contains a record of the registry settings on a computer at a given time. This data is gathered during an initial baseline scan, which is based on options in a baseline configuration file. “Creating a Registry Baseline Snapshot task”...
Need help?
Do you have a question about the ALTIRIS INVENTORY SOLUTION 7.0 SP2 - V1.0 and is the answer not in the manual?
Questions and answers