Lenovo ThinkPad G40 Administrator's Manual

Ibm system information center administrator's guide
Table of Contents

Advertisement

IBM System Information Center
Administrator's Guide

Advertisement

Table of Contents
loading

Summary of Contents for Lenovo ThinkPad G40

  • Page 1 IBM System Information Center Administrator’s Guide...
  • Page 3 IBM System Information Center Administrator’s Guide...
  • Page 4 Note: Before using this information and the product it supports, read the information in Appendix C, “Notices,” on page 95. First Edition (October 2004) © Copyright International Business Machines Corporation 2004. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
  • Page 5: Table Of Contents

    Contents About this guide ... v Chapter 5. Performing System Information Center advanced functions . 27 Who should read this guide . . vi Additional information . vi Working with tasks . .
  • Page 7: About This Guide

    About this guide ® ™ The IBM System Information Center program is an IBM ThinkVantage Technology aimed at helping enterprises reduce costs by providing efficient ways of managing asset information. With this program, you can effectively manage assets and details regarding each asset without using a large resource-dependent client application.
  • Page 8: Who Should Read This Guide

    Chapter 7, “Getting help and support,” on page 49 explains how to get support for the System Information Center program and describes the scope of the support that is available. Who should read this guide The IBM System Information Center Administrator’s Guide is intended for administrators, system engineers, network administrators, and customer engineers who need a flexible and affordable asset-inventory management tool that does not require a large client application.
  • Page 9: Chapter 1. About The System Information Center Program

    Chapter 1. About the System Information Center program The System Information Center program provides ways for you to efficiently manage asset inventory and details regarding each asset. Asset information is gathered on client computers and delivered to a central built-in database provided with the program.
  • Page 10: Architecture

    The client agent can be permanently installed on a client computer by downloading it from the Web, from the System Information Center program CD, or from the System Information Center program menu structure. Or, it can be temporarily used when a User uploads asset information to the database. The client agent can also be activated from the client using a command-line interface.
  • Page 11: Features

    Features The System Information Center program is cost-effective software that helps you to manage your inventory without significant resources from the client computer. The program provides the following features: v Easy browser accessibility: Because the System Information Center program is Web-based, you can access it using the Microsoft Internet Explorer 6.0 (or higher) Web browser.
  • Page 13: Chapter 2. Installing The System Information Center Program On A Server

    Chapter 2. Installing the System Information Center program on a server The server portion of the System Information Center program is a Java-based Web application. Instead of interacting directly with the operating system, the server portion interacts with components such as Java, the Web application server, and the built-in SQL-compliant database.
  • Page 14: System Information Center Console

    System Information Center console The console uses the System Information Center program GUI to render the information that is stored in the database. Typically, the console is a computer other than the client or the Web server; however, the console can be either of the two. The console has the following requirements: v A Microsoft Windows 2000 or Windows XP operating system v Microsoft Internet Explorer 6.0 (or higher) Web browser...
  • Page 15: Disabling Internet Information Services (Iis)

    Note: Depending on the networking card, video controller, and other hardware devices installed in your computer, you might have to acquire and install updated device drivers. Ensure that all devices are working correctly. When the installation is complete, continue with “Obtaining Windows Server 2003 critical updates and service packs”...
  • Page 16: Quick Installation

    v The JAVA_HOME environment variable is created. v The System Information Center Web application is installed, along with the IBM Cloudscape 5.1 database. v Information is gathered and entered into the ISIC.PROPERTIES file. Note: After you have finished installing the System Information Center program, which produces a customized ISIC.PROPERTIES file, you have the option later of manually changing this file if changes in your environment require it.
  • Page 17: Custom Installation

    2. Information in the Web site Settings fields are inserted into e-mails that are automatically generated and sent out by the server. Type the addresses of the following items: v Server name for asset scans: This is the name of the server. Example: http://servername/isic (where servername is the server name).
  • Page 18 v Server name for asset scans: This is the name of the server. Example: http://servername/isic (where servername is the server name). v Administrator’s e-mail address for reporting problems: The e-mail address of the administrator for reporting problems. 4. Click Next. The Action Authority Settings window opens. 5.
  • Page 19 – Create new passwords as expired so that users must change after first logon: Mark this check box to require users to establish their own password after receiving the computer-generated password. – Expire passwords after XX days: Mark this check box and then type the maximum number of days a password is accepted.
  • Page 20: Securing Your Network With Secure Sockets Layer (Ssl) Security

    account password is required. If you mark this option, type information in the Minimum Windows password length and Maximum Windows password age fields. v Required antivirus application*: Mark this check box if you want the System Information Center program to check and verify that the required antivirus application is installed on all client computers each time the asset is revised.
  • Page 21 2. Refer to the Apache Tomcat Web site for detailed instructions on configuring Tomcat to secure your server with SSL. Chapter 2. Installing the System Information Center program on a server...
  • Page 23: Chapter 3. Installing The System Information Gatherer Program

    Chapter 3. Installing the System Information Gatherer program Before using the information in this chapter, you must have a good understanding of how the System Information Gatherer program (also called the client agent) interacts with the System Information Center program. You must already have installed the System Information Center program before the built-in database is populated with information provided by the client agent.
  • Page 24: Considerations For Installing The Client Agent

    System Information Gatherer is installed must have a separate Proof of Entitlement. Your System Information Gatherer license constitutes one (1) System Information Gatherer Proof of Entitlement. Additional System Information Gatherer Proofs of Entitlement for non-IBM systems may be purchased separately from IBM. All IBM PCs automatically include such an authorization.
  • Page 25: Limitations

    installing the client agent from CD, the Web, or the System Information Center GUI, see “Permanently installing the client agent.” v Temporarily running the client agent: Temporarily running the client agent is similar to an attended installation except whenever a user registers an asset or whenever a user uploads an asset scan from an asset, and the client agent is not permanently installed on the client computer, then the client agent is temporarily used on the client computer as it is run directly from the Web application server...
  • Page 26: Temporarily Using The Client Agent

    v If you are using the System Information Gatherer CD, type D:\ISIG_OEM.EXE (where D is the letter of your CD drive). d. Click OK. 2. Follow the instructions on the screen. Installing the client agent from the System Information Center program GUI After the System Information Center program has been installed and is ready to be used, follow this procedure to install the client agent from the System Information...
  • Page 27: Setting Up An Unattended Installation From A Shortcut

    perform an unattended installation from a network drive. Another way is to perform a silent installation from a command line. Note: There are two client agent files that can be prepared to perform a silent installation. The ISIG_OEM.EXE file is intended for IBM and non-IBM computers and can be obtained in the following ways: v From the IBM System Information Center CD v From the IBM System Information Gatherer CD...
  • Page 28 Note: Make sure you include the double-quotes and do not include a / at the end of the servername.
  • Page 29: Chapter 4. Using The System Information Center Program

    Chapter 4. Using the System Information Center program After installing the System Information Center program and the System Information Gatherer program, you can begin creating user accounts, registering assets, and performing other basic functions. The System Information Center program is designed to accommodate three types of user accounts: User, Super-User (User functions +), and Administrator (Super-User functions +).
  • Page 30: Creating Accounts

    Icon User Account Types of Functions User The most limited account; can work with asset information specifically belonging to that user. Typically, most accounts within an enterprise fall in this category. The User account includes the following functions: v Logging on to the Web application v Adding and changing user asset data v Running the client agent v Submitting asset transfer requests...
  • Page 31: Creating The Primary Administrator Account

    Creating the primary Administrator account To create the primary Administrator account after installing the program, complete the following procedure: 1. At the Logon window, type ADMIN in the User ID field and PASSWORD in the Password field. Note: User IDs are NOT case-sensitive, passwords ARE case-sensitive. 2.
  • Page 32: Setting User Account Privileges

    7. Click Submit. A progress bar is displayed, indicating that critical hardware and software information is being collected and is being sent to the database. When the operation is compete, the My Assets window opens. Setting user account privileges Only an Administrator account can set the authority for other user accounts. The types of privileges given to a user depends on the types of operations that user needs to accomplish.
  • Page 33: Registering An Asset Connected To The Network

    v Files can be uploaded via the Web interface (additional demographic information included) v Files can be copied directly to the server and processed by executing a ″Process Files″ task (no demographic information included) Uploading through the Web interface By uploading through the Web interface, the asset can be registered by providing the additional demographic information required for the asset.
  • Page 34: Performing Other Basic Functions

    Performing other basic functions Once the System Information Center and System Information Gatherer programs are installed and user accounts are established, users can begin performing functions that coincide with their type of user account. For detailed instructions on how to perform specific functions, see the IBM System Information Center online help system.
  • Page 35: Copyright Ibm Corp

    Chapter 5. Performing System Information Center advanced functions Certain tasks are intended to be performed by an Administrator account and cannot solely be accomplished using the graphical user interface. This chapter provides information about how to perform common and advanced Administrator account tasks.
  • Page 36: Creating A Task

    Creating a task Tasks can be in the form of e-mails or CSV files and can be configured to be sent to individual users or to a group of target users who fulfill certain requirements. Additionally, you can specify tasks to upload asset information, generate and attach reports, and to only target specific user accounts.
  • Page 37 13. (Optional) If you would like to create a menu option that will appear for the selected target users under the Task menu bar item, type a menu name in the ″Menu name for selected users″ field: Target users are identified in Step 14. Type a menu description in the ″Menu description for selected users″...
  • Page 38: Editing A Task

    v If you do not want to execute the task only once, click No. 10. Create the start date and time: Type a start date and time in the StartDate field. You must enter this information in yyyy-mm-dd hh:mm:ss format. A current start date and time is already entered in the StartDate field (based upon when you logged on or when you refreshed the window).
  • Page 39 2. In the System Information Center menu bar, click Tasks. 3. Select the appropriate Tasks menu option. 4. Click the appropriate task. The task will run. To run a task by editing it (if the task is scheduled for a later time and you want it to run sooner, if the task is not scheduled, or if the task is inactive), complete the following procedure: 1.
  • Page 40: Working With Reports

    1. At the Logon window, type your User ID and Password. Click Submit. The System Information Center program is displayed. 2. In the System Information Center menu bar, click Admin and then select Stop Task Scheduler. The Task Scheduler will stop checking for scheduled tasks. If the System Information Center is configured to start the Task Scheduler automatically when the server starts, the Task Scheduler will be started again once the server is restarted.
  • Page 41: Generating A Common Report

    Generating a common report Common reports are those reports that the System Information Center program provides. The following information identifies the reports that are provided with the program, defines each report, and instructs how to generate a common report: All Assets Provides summaries of PC and non-PC assets, assets in transfer, and assets not inventoried within 90 days.
  • Page 42: Creating A Custom Report

    2. In the System Information Center menu bar, select Reports. 3. Click All Reports. A list of available common and custom reports is displayed. 4. Mark the check box to the left of the appropriate custom report you want to run.
  • Page 43: Generating A Custom Report

    Note: There are two primary considerations when selecting a report from which to create a custom report. v You might want to use a comprehensive common report to serve as a basis for your custom report. One option is to click Reports from the System Information Center menu bar, select All Assets then click All Assets.
  • Page 44: Sending A Specialized E-Mail

    6. Click Run. Sending a specialized e-mail A specialized e-mail is an e-mail that contains specific asset or user information for a certain task or has been generated by running either a common or custom report. You can either send an e-mail to all users or to a single user. Sending an e-mail to all users To send an e-mail that contains specific asset or user-related information for a specific task to all users, complete the following procedure:...
  • Page 45: Reprocessing The Database

    Reprocessing the database Reprocessing the database is an advanced function that is useful if a database table becomes corrupt, resulting in missing information. Even in the rare situation when information appears lost from a report, in most cases the information is preserved and can be retrieved.
  • Page 46 accounts with scheduled task results, asset requests, and additional asset information. You can modify the following items: v Enable e-mail functionality: Make e-mail viable for the System Information Center program. v SMTP server name/IP address: The address of the SMTP server you are using for e-mail.
  • Page 47 v Server task scheduling: This configures the server to automatically run reports and send e-mails on a set schedule. The following information is required: – Check for scheduled tasks every ___: The frequency (minutes, hours, or days) that the server should check for scheduled tasks. –...
  • Page 48 – Status: Status of the asset (issued/active or pending transfer). v User Demographics Form: – Address: User’s address. – Country: Country where user lives. – Department: Department where user is located. – E-mail: E-mail of the user. – Employee ID: Employee ID of the user. –...
  • Page 49: Exporting Information Using The System Information Center Program

    Exporting information using the System Information Center program With the System Information Center program you can generate reports and export them so that they are compatible with any SQL-compliant database. This advanced function (which is typically performed by either a Super-User or an Administrator account is useful when you need to transfer asset information from one database to another.
  • Page 50: Performing Other Advanced Functions

    5. When the task executes, the custom report is executed and the results are saved as a CSV file. Note: The first line of the CSV will contain the header row. The actual values will start with the second line. 6.
  • Page 51 v Uploading files to the server: You can upload files to a pre-configured folder on the server. The folder, as well as the password required to perform the action, is configured in the ISIC.PROPERTIES file. v Processing configured files: You can use a predefined task to process .EG2 files located in a directory specified in the ISIC.PROPERTIES file.
  • Page 53: Chapter 6. Problem Solving

    Chapter 6. Problem solving This section is intended to help you solve problems that might occur when installing or using the System Information Center program. Recovering when the System Information Center program is not running The following five symptoms can all be resolved in the same way, as described in the action that follows.
  • Page 54: Viewing The Server Status To Solve A Problem

    program and includes user information, asset information, and transaction date and time. You can click the Output icon to create a .CSV file or to generate a printer-friendly view to simplify printing the log. v If you want to troubleshoot tasks, complete the following procedure to view the Task Logs: 1.
  • Page 55: What You Need Before Calling Ibm

    f. Under the Actions menu, click on the appropriate menu item to perform the desired action. In this example, it would be Stop. 2. Open the (Install Directory)\ISIC\WEB\WEB-INF\web.xml file using a text editor. 3. Locate the section containing the following text: <session-config>...
  • Page 57: Chapter 7. Getting Help And Support

    Chapter 7. Getting help and support The System Information Center program is supported by IBM. If you have a problem with the System Information Center program or have questions about a specific feature, a variety of sources are available to help you including documentation, an integrated help system, Web pages, and Web-based technical support.
  • Page 58: Contacting A System Information Center Technical Expert

    Contacting a System Information Center technical expert Technical assistance for the System Information Center is available through the System Information Center Web site. You can contact an System Information Center technical expert through the e-mail service provided on the System Information Center Web site.
  • Page 59: Appendix A. Modifying The Isic.properties File

    Appendix A. Modifying the ISIC.PROPERTIES file This appendix describes the architecture of the ISIC.PROPERTIES file. This file is composed of information, some of which you can modify and some of which you should not modify. In order for you to best respond to your enterprise’s data needs, you need to understand the purpose of each modifiable field and what values are available to you.
  • Page 60 index.title= version.number= version.date= application.log.file= application.resources= schema= datasource.context= THE FOLLOWING LINES CAN BE EDITED FOR YOUR ENVIRONMENT: Category Description: E-mail Settings email.enabled=no Modifiable Field email.enabled Field Description Enable e-mail functionality for the System Information Center program. Possible Values Yes/No If ″Yes,″ e-mail will be enabled; if ″No,″ e-mail will Value Definition not be enabled smtp.server=...
  • Page 61 Modifiable Field file.email.name Field Description Default filename used when a report is mailed out. The report will be exported into a CSV file with this filename and attached to the e-mail. Possible Values User-defined Value Definition User-defined; must not be blank and must only contain characters valid for a filename.
  • Page 62 Field Description The e-mail address to which users respond after receiving e-mail requests; in some cases, this might be the same as the administrator’s e-mail address. Possible Values User-defined Value Definition User-defined email.admin= Modifiable Field email.admin Field Description The e-mail address of the administrator for reporting problems.
  • Page 63 If the value is ″1″, the processing of the XML will be Value Definition queued as a background task and will be processed as the server gets to it. If the value is ″0″, the XML from the upload request will not be processed. The XML file may be stored in the FILESTORE table if need in the future depending on the upload.save.xmlfile property described below.
  • Page 64 upload.save.userxml = Modifiable Field upload.save.userxml Field Description Whether userxml file is saved to the FILESTORE table. Possible Values 1 / 0 If ″1,″ then userxml file is saved to the FILESTORE Value Definition table; if ″0,″ then userxml file is not saved to the FILESTORE table.
  • Page 65 file.upload.password = Modifiable Field file.upload.password Field Description Password used when an administrator uses the ″Upload File to Server″ function. Possible Values User-defined Value Definition User-defined file.upload.directory = Modifiable Field file.upload.directory Field Description Specifies the location on the System Information Center server where files can be copied. This could be set to the same directory that is used by the ″Process Files in Configured Folder″...
  • Page 66 Possible Values True / False If ″True,″ the assettag field will be used to identify Value Definition assets; if ″False,″ the assettag will not be used. queue.processors = Modifiable Field queue.processors Field Description Number of processors (CPUs) in the system running the System Information Center server.
  • Page 67 query.non.ibm.pc.asset.count= query.non.pc.asset.count= query.processed.pc.asset.revision.count= query.unprocessed.pc.asset.revision.count= query.processed.pc.asset.count= query.unprocessed.pc.asset.count= query.selected.task= query.all.xml.revisions= query.users.assets= query.user.queries= query.asset.queries= query.unknown.pc.serial= query.uploads.in.period.defined= query.average.upload.time= query.callhomes.in.period.defined= query.callhomes.accepted.in.period.defined= query.callhomes.refused.in.period.defined= query.callhomes.refused.as.busy.in.period.defined= query.unprocessed.security.assets= query.new.assets.in.period.defined= query.average.process.time= query.processed.in.period.defined= query.selected.user.custom.query= query.all.custom.query= query.selected.users.groups= THE FOLLOWING LINES CAN BE EDITED FOR YOUR ENVIRONMENT: search.limit.results = Modifiable Field search.limit.results Field Description Determines whether or not search results should be limited.
  • Page 68 update.details.auth=A Modifiable Field update.details Field Description Grant the minimal user account authority level for updating user details. Possible Values U / S / A ″U″ is ″user,″ ″S″ is ″super-user,″ ″A″ is Value Definition ″administrator″ change.asset.owner.auth=A Modifiable Field change.asset.owner Field Description Grant the minimal user account authority level for changing an asset owner.
  • Page 69 ″U″ is ″user,″ ″S″ is ″super-user,″ ″A″ is Value Definition ″administrator″ reprocess.auth=S Modifiable Field reprocess.auth Field Description Grant the minimal user account authority level for reprocessing scanned asset files. Possible Values U / S / A ″U″ is ″user,″ ″S″ is ″super-user,″ ″A″ is Value Definition ″administrator″...
  • Page 70 If ″True,″ the client agent will automatically upload Value Definition revisions of asset information; if ″False,″ the client agent will not automatically upload revisions of asset information. scheduled.upload.interval= Modifiable Field scheduled.upload.interval Field Description The number of days for the interval between automatic uploads of asset information by the client agent.
  • Page 71 Modifiable Field scheduled.interval.period Field Description The unit of time in which the server should check for scheduled tasks. Possible Values Mins/Hours/Days Value Definition Minutes/Hours/Days scheduled.task.period= Modifiable Field scheduled.task.period Field Description The interval units to be used when scheduling tasks. Possible Values Mins/Hours/Days Value Definition Minutes/Hours/Days...
  • Page 72 Category Description: Password Settings password.encrypt= Modifiable Field password.encrypt Field Description Whether passwords will be encrypted in the database. Possible Values Yes/No If ″Yes,″ passwords will be encrypted in the database; Value Definition if ″No,″ passwords will not be encrypted in the database.
  • Page 73 Possible Values User-defined Value Definition User-defined password.check= Modifiable Field password.check Field Description Whether to enable password rule checking. Possible Values True/False If ″True,″ creation of passwords must follow certain Value Definition rules; if ″False,″ creation of passwords does not have to follow rules.
  • Page 74 Field Description Maximum length of a password. Possible Values User-defined Value Definition User-defined password.max.matching.sequential.chars= Modifiable Field password.max.matching.sequential.chars Field Description Maximum number of sequential password characters that can match. Possible Values User-defined Value Definition User-defined password.max.previous.chars= Modifiable Field password.max.previous.chars Field Description Maximum number of sequential password characters that can be reused in a new password.
  • Page 75 Field Description Whether the Asset Type field is required to be completed in order for an asset to be successfully added to the database. Possible Values True/False If ″True,″ the Asset Type field is required to be Value Definition completed in order for an asset to be successfully added to the database;...
  • Page 76 Field Description Whether the Location field is required to be completed in order for an asset to be successfully added to the database. Possible Values True/False If ″True,″ the Location field is required to be Value Definition completed in order for an asset to be successfully added to the database;...
  • Page 77 Field Description Whether the Serial field is required to be completed in order for an asset to be successfully added to the database. Possible Values True/False If ″True,″ the Serial field is required to be completed Value Definition in order for an asset to be successfully added to the database;...
  • Page 78 Field Description Whether the UserID field is required to be completed in order for a user to be successfully added to the database. Possible Values True/False If ″True,″ the UserID field is required to be completed Value Definition in order for a user to be successfully added to the database;...
  • Page 79 Field Description Whether the Postal Code field is required to be completed in order for a user to be successfully added to the database. Possible Values True/False If ″True,″ the Postal Code field is required to be Value Definition completed in order for a user to be successfully added to the database;...
  • Page 80 Field Description Whether the Employee ID field is required to be completed in order for a user to be successfully added to the database. Possible Values True/False If ″True,″ the Employee ID field is required to be Value Definition completed in order for a user to be successfully added to the database;...
  • Page 81 Field Description During a security audit task the IBM System Information Center program checks and verifies that the power-on for all client computers is password-protected. Possible Values 1 / 0 If ″1,″ during a security audit task the System Value Definition Information Center program checks and verifies that the power-on for all client computers is password-protected;...
  • Page 82 If ″1,″ during a security audit task the System Value Definition Information Center program checks and verifies that Windows screen savers on all client computers are password-protected; if ″0,″ during a security audit task he System Information Center program does not check and verify that Windows screen savers on all client computers are password-protected.
  • Page 83 Field Description If your security protocol requires a GINA other than default Windows GINA (such as IBM Client Security), then set to check for the other security GINA. (It is important to note that other GINAs work if you do not set it to check.
  • Page 84 Field Description During a security audit task the System Information Center program checks and verifies that the required antivirus application (must appear in Windows Control Panel Add/Remove Programs list) is installed on all client computers. Possible Values User-defined/blank User-defined; if ″blank,″ during a security audit task Value Definition the System Information Center program does not check and verify that the required antivirus...
  • Page 85 User-defined; if ″blank,″ during a security audit task Value Definition the System Information Center program does not check and verify that the version number of the required firewall application is installed on all client computers. app.firewall.name.2= Modifiable Field app.firewall.name.2 Field Description During a security audit task the System Information Center program checks and verifies that the required firewall application (must appear in Windows...
  • Page 87: Appendix B. Using Database Information

    Appendix B. Using database information The System Information Center program comes with a built-in database. By default, the IBM Cloudscape database provides several tables that can contain a variety of asset and user information. Understanding the information provided with this database can help you perform advanced functions such as exporting information from the database or creating a custom report.
  • Page 88 Table 2. Table: Asset.Asset_Info (continued) Column Name Type Name Length Nulls ROOM VARCHAR ADDRESS_1 VARCHAR ADDRESS_2 VARCHAR TOWN VARCHAR POSTCODE VARCHAR COUNTRY VARCHAR STATE VARCHAR ASSETTAG VARCHAR ASSETTYPE VARCHAR STATUS VARCHAR CUSTOM1 VARCHAR CUSTOM2 VARCHAR CUSTOM3 VARCHAR CUSTOM4 VARCHAR CUSTOM5 VARCHAR CUSTOM6 VARCHAR...
  • Page 89 Table 4. Table: Asset.Drivers (continued) Column Name Type Name Length Nulls FILE_SIZE INTEGER Table 5. Table: Asset.Email_Template Column Name Type Name Length Nulls EMAILKEY INTEGER LOCALE CHARACTER NAME VARCHAR DESCRIPTION VARCHAR EMAIL_FROM VARCHAR TITLE VARCHAR CONTENT VARCHAR 2000 CREATOR VARCHAR CREATED TIMESTAMP Table 6.
  • Page 90 Table 9. Table: Asset.HW_Security (continued) Column Name Type Name Length Nulls REVISION INTEGER POWER_ON_PW_STATUS VARCHAR KEYBOARD_PW_STATUS VARCHAR ADMIN_PASSWORD_STATUS VARCHAR FRONT_PANEL_RESET_STATUS VARCHAR Table 10. Table: Asset.IBM_Rapid_Restore Column Name Type Name Length Nulls HWKEY INTEGER REVISION INTEGER SCHEDULE_FREQUENCY VARCHAR SCHEDULE_TIME VARCHAR BACKUP_COUNT INTEGER RESTORE_COUNT INTEGER...
  • Page 91 Table 13. Table: Asset.Lotus_Notes (continued) Column Name Type Name Length Nulls LAST_USER VARCHAR ID_FILE VARCHAR SERVER VARCHAR Table 14. Table: Asset.Memory Column Name Type Name Length Nulls HWKEY INTEGER REVISION INTEGER TYPE VARCHAR LOAD VARCHAR TOTAL BIGINT FREE BIGINT USED BIGINT Table 15.
  • Page 92 Table 17. Table: Asset.Op_Sys (continued) Column Name Type Name Length Nulls OS_VENDOR VARCHAR OS_NAME VARCHAR OS_VERSION VARCHAR OS_BUILD VARCHAR OS_CSD VARCHAR DATETIME TIMESTAMP Table 18. Table: Asset.PCI Column Name Type Name Length Nulls HWKEY INTEGER REVISION INTEGER INTEGER INTEGER FUNC INTEGER SLOT VARCHAR...
  • Page 93 Table 20. Table: Asset.PW_Policy (continued) Column Name Type Name Length Nulls MAX_PW_AGE INTEGER MIN_PW_AGE INTEGER HISTORY_LENGTH INTEGER FORCE_LOGOFF_MINS INTEGER Table 21. Table: Asset.Revisions Column Name Type Name Length Nulls HWKEY INTEGER REVISION INTEGER PROCESSED CHARACTER DATETIME TIMESTAMP Table 22. Table: Asset.Screensavers Column Name Type Name Length...
  • Page 94 Table 24. Table: Asset.Transfers (continued) Column Name Type Name Length Nulls COMMENT VARCHAR REASON VARCHAR CREATED TIMESTAMP PROCESSED TIMESTAMP Table 25. Table: Asset.TVT_Schedule Column Name Type Name Length Nulls HWKEY INTEGER REVISION INTEGER TASK VARCHAR PROGRAM_FILE VARCHAR PARAMETERS VARCHAR FREQUENCY VARCHAR SCH_TIME VARCHAR...
  • Page 95 Table 27. Table: Asset.User_Accounts (continued) Column Name Type Name Length Nulls DISABLED VARCHAR PW_NOT_REQUIRED VARCHAR CANNOT_CHANGE_PW VARCHAR LOCKED_OUT VARCHAR PW_NEVER_EXPIRES VARCHAR PW_EXPIRED VARCHAR Table 28. Table: Asset.User_Info Column Name Type Name Length Nulls USERKEY INTEGER CUSTOM1 VARCHAR CUSTOM2 VARCHAR CUSTOM3 VARCHAR CUSTOM4 VARCHAR...
  • Page 96: Internal System Tables

    Table 29. Table: Asset.Users (continued) Column Name Type Name Length Nulls ADDRESS_2 VARCHAR TOWN VARCHAR POSTCODE VARCHAR COUNTRY VARCHAR STATE VARCHAR TEL_NO VARCHAR MOB_NO VARCHAR AUTHORITY CHARACTER LOCALE VARCHAR PASSWORD VARCHAR EXPIRED CHARACTER PASSWORD_CHANGED TIMESTAMP LAST_UPDATE TIMESTAMP CREATED TIMESTAMP Table 30. Table: Asset.WST Column Name Type Name Length...
  • Page 97 Table 31. Table: Asset.Custom_Query (continued) Column Name Type Name Length Nulls DESCRIPTION VARCHAR SQL_DATA LONG VARCHAR CREATOR INTEGER CREATED TIMESTAMP Table 32. Table: Asset.Custom_Query_Group_Access Column Name Type Name Length Nulls CUSTOM_QUERYKEY INTEGER GROUPKEY INTEGER Table 33. Table: Asset.Custom_Query_User_Access Column Name Type Name Length Nulls...
  • Page 98 Table 36. Table: Asset.Menu_Links Column Name Type Name Length Nulls QUERYKEY INTEGER MENU VARCHAR COL1 VARCHAR COL2 VARCHAR COL3 VARCHAR COL4 VARCHAR QUERYKEY2 INTEGER Table 37. Table: Asset.Passwords Column Name Type Name Length Nulls USERKEY INTEGER PASSWORD VARCHAR UPDATED TIMESTAMP Table 38.
  • Page 99 Table 40. Table: Asset.Query_Col_Info Column Name Type Name Length Nulls QUERYKEY INTEGER NAME VARCHAR DISPLAYCOL INTEGER DISPLAYDATA INTEGER ALIAS VARCHAR ACTION1 VARCHAR ACTION2 VARCHAR ACTION3 VARCHAR ACTION_LOGO VARCHAR ACTION_LOGO2 VARCHAR ACTION_LOGO3 VARCHAR ACTION_POPUP VARCHAR ACTION_POPUP2 VARCHAR ACTION_POPUP3 VARCHAR COLOUR VARCHAR ALIGN VARCHAR SUMMARY...
  • Page 100 Table 42. Table: Asset.Task (continued) Column Name Type Name Length Nulls USERLIST VARCHAR QUERY INTEGER MAIL_TEMPLATE INTEGER CREATOR VARCHAR CREATED TIMESTAMP Table 43. Table: Asset.Task_Log Column Name Type Name Length Nulls TASKKEY INTEGER USERKEY INTEGER USER_LIST VARCHAR 2000 COMMENT VARCHAR DATETIME TIMESTAMP Table 44.
  • Page 101 Table 48. Table: Asset.User_Preference Column Name Type Name Length Nulls USERKEY INTEGER ATTRIBUTE VARCHAR VALUE VARCHAR Table 49. Table: Asset.XML_Lookup Column Name Type Name Length Nulls SCHEMA_NAME VARCHAR TABLE_NAME VARCHAR COLUMN_NAME VARCHAR TEXT INTEGER FILETYPE VARCHAR VERSION VARCHAR XPATH VARCHAR NODETYPE VARCHAR ISKEY...
  • Page 103: Appendix C. Notices

    Appendix C. Notices IBM may not offer the products, services, or features discussed in this document in all countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service might be used.
  • Page 104: Trademarks

    vary significantly. Some measurements may have been made on developmental-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.
  • Page 105: Index

    Index advanced tasks features Java SDK 5 exporting information 41 central management system 3 working with the ISIC.PROPERTIES easy browser accessibility 3 file 37 generating, e-mailing, and exporting Apache Tomcat reports 3 license 49 downloading 8 minimal resource on client limitations Web site 13 computer 3...
  • Page 106 scans unattended installation administrator-initiated 2 System Information Gatherer 18 user initiated 2 user accounts schedules creating the primary Administrator creating 2 account 23 SMTP server 9 creating user accounts 22 disabling 7 creating user accounts by registering software licenses an asset 23 System Information Gatherer 15 understanding user accounts and specialized e-mails...
  • Page 108 Printed in USA...

Table of Contents