Inventory AI Metering Remote Tools

Download Report

Transcript Inventory AI Metering Remote Tools

© 2012 Microsoft Corporation. All rights reserved.
Microsoft Confidential
System Center 2012 Configuration Manager
Concepts & Administration
Module 4: Inventory, Asset Intelligence, Software Metering
and Remote Control
Your Name
Premier Field Engineer
Microsoft
Conditions and Terms of Use
Microsoft Confidential
This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software
is provided to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content
and/or software included in such packages is strictly prohibited.
The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind,
whether express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and noninfringement.
Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft
must respond to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and
Microsoft cannot guarantee the accuracy of any information presented after the date of publication. Unless otherwise noted, the companies,
organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no
association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should
be inferred.
Copyright and Trademarks
© 2012 Microsoft Corporation. All rights reserved.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this
document. Except as expressly provided in written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this
document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic,
mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
For more information, see Use of Microsoft Copyrighted Content at
http://www.microsoft.com/about/legal/permissions/
Microsoft®, Internet Explorer®, and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United
States and/or other countries. Other Microsoft products mentioned herein may be either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries. All other trademarks are property of their respective owners.
Overview
Hardware and Software Inventory
Asset Intelligence
Software Metering
Remote Tools
3
Microsoft Confidential
Objective
After completing this Module, you will be able to:
Configure, customize, troubleshoot and report Hardware
and Software Inventory
Configure Asset Intelligence, import an MVLS license
statement and generate Asset Intelligence reports
Configure Software Metering, create rules and generate
reports
Learn what’s new in Remote Control and how to configure
the Remote Tools client
4
Microsoft Confidential
Hardware and Software Inventory
Types of Inventory
Hardware Inventory components and logs
Enabling and customizing Hardware Inventory
Hardware Inventory reporting
Software Inventory components and logs
Enabling and customizing Software Inventory
Software Inventory reporting
5
Microsoft Confidential
Types of Inventory
Hardware Inventory
Queries WMI for hardware data
Can be customized per site or per collection
Customize Hardware Inventory
MOF files can be imported from the console
Inventory Classes can be imported from a local or remote system
Software Inventory
Scans hard drives for file types
Can also collect copies of files during inventory cycle
Can be customized per site or per collection
6
Microsoft Confidential
Hardware Inventory Components and Logs
7
1
2
3
Client
Management Point
Site Server
• Inventory data
generated and
sent to
Management
Point on agent
schedule
• InventoryAgent.
log
• Report received in
MP\outboxes\hinv.
box
• Moved by
Hardware Inventory
Manager to Site
Server
• MP_Hinv.log
• Report received in
Inboxes\auth\dataldr.
box
• Data Loader
processes data
• Dataldr.log
Microsoft Confidential
Database
updated
Enabling and Customizing Hardware Inventory
 Administration Node  Client Settings Default Settings  Hardware Inventory
8
Microsoft Confidential
Enabling and Customizing Hardware Inventory
9
Microsoft Confidential
Enabling and Customizing Hardware Inventory
Assign different settings for Hardware Inventory by
creating custom client device settings
Deploy settings to a collection
If a device is a member of more than one collection with
conflicting device settings, the priority setting determines
which setting is enforced.
Default client settings have a priority of 10,000
Custom device settings have higher priorities
Priorities can be increased or decreased by the
administrator
10
Microsoft Confidential
Creating Custom Device Settings
11
Microsoft Confidential
Creating Custom Device Settings
12
Microsoft Confidential
Deploy Settings to a Collection
13
Microsoft Confidential
Hardware Inventory Reporting
40+ reports for viewing Hardware Inventory results
Hardware – CDROM, Hardware – Disk etc.
Useful reports for troubleshooting Hardware Inventory
Inventory Classes enabled on a specific computer
Inventory Classes assigned to a specific collection
Computers not inventoried recently (in a specified number of days)
14
Microsoft Confidential
Software Inventory Components and Logs
1
2
3
Client
Management Point
Site Server
• Software Inventory
data generated and
sent to
Management Point
on Agent Schedule
• InventoryAgent.log
• Report received in
MP\outboxes\sinv.b
ox
• Moved by Software
Inventory Manager
to Site Server
• MP_Sinv.log
• Report received on
Inboxes\sinvproc.b
ox
• Software Inventory
Processor
processes data
• Sinvproc.log
15
Microsoft Confidential
Database
updated
Enabling and Customizing Software Inventory
 Administration Node  Client Settings Default Settings  Software Inventory
16
Microsoft Confidential
Enabling and Customizing Software Inventory
Assign different settings for Software Inventory by creating
custom client device settings
Deploy settings to a collection
Default client settings have a priority of 10,000
Custom device settings have higher priorities
Priorities can be increased or decreased by the
administrator
17
Microsoft Confidential
Creating Custom Device Settings
18
Microsoft Confidential
Creating Custom Device Settings
19
Microsoft Confidential
Deploy Settings to a Collection
20
Microsoft Confidential
Software Inventory Reporting
40+ reports for viewing Software Inventory results
Look in Software – Company and Products, Software – Files
categories
Useful report for troubleshooting Software inventory
Computers not inventoried recently (in a specified number of days)
21
Microsoft Confidential
Lab: Customizing Hardware and Software Inventory
Scenario
You are the administrator of a new
Configuration Manager 2012 hierarchy.
You need to generate inventory data
from newly-installed clients
Goals
Enable, customize and report
Hardware Inventory
Enable, customize and report
Software Inventory
22
Microsoft Confidential
Lesson Review
Name two differences in enabling and configuring
hardware inventory in System Center 2012 Configuration
Manager from Configuration Manager 2007?
How can different inventory settings be applied to different
groups of clients within a Configuration Manager site?
How does an administrator troubleshoot conflicting
inventory settings applied to a single computer?
23
Microsoft Confidential
Lesson Summary
In this lesson, you learned:
How hardware inventory can be enabled and customized
How software inventory can be enabled and customized
24
Microsoft Confidential
Asset Intelligence Lesson Objectives
In this Lesson you will learn:
What’s new in System Center 2012 Configuration Manager?
How to configure Asset Intelligence
Hardware Inventory and Software Metering Agents
Enabling Asset Intelligence Reporting Classes
Reporting Class dependencies
Installing an Asset Intelligence Synchronization Point
Auditing successful logon events
Importing an MVLS license statement
Asset Intelligence Maintenance Tasks
Asset Intelligence Reporting
25
Microsoft Confidential
What is New in Asset Intelligence
Enable Asset Intelligence reporting classes
Changes to MVLS license statement import process
2 Maintenance Tasks
Check Application Title with Inventory Information - checks that the
software title reported in software inventory is reconciled with the
software title in the Asset Intelligence catalog.
Summarize Installed Software Data - provides the summary
information displayed in the Inventoried Software node under the
Asset Intelligence node.
Client Access License reports have been removed
26
Microsoft Confidential
How to configure Asset Intelligence
Enable Hardware Inventory and Software Metering Agents
Edit Asset Intelligence Hardware Inventory reporting
classes
Install an Asset Intelligence Synchronization Point
Enable auditing of success logon events
Import software license information
Create a general license statement information file for
import
Configure Asset Intelligence Maintenance Tasks
27
Microsoft Confidential
Enable Asset Intelligence Reporting Classes
28
Microsoft Confidential
Reporting Class Dependencies
SMS_Installed_Software
29
Microsoft Confidential
SMS_SystemConsoleUsage
30
Microsoft Confidential
Reporting Class Dependencies
SMS_SystemConsoleUser
SMS_AutoStartSoftware
SMS_BrowserHelperObject
SMS_SoftwareTag
31
Microsoft Confidential
Reporting Class Dependencies
Win32_USBDevice
SMS_InstalledExecutable
This class is not a currently used to support existing AI reports. However, it can be enabled to support
customer reports
SMS_SoftwareShortcut
This class is not a currently used to support existing AI reports. However, it can be enabled to support customer
reports
SoftwareLicensingService
SoftwareLicensingProduct
32
Microsoft Confidential
Reporting Class Dependencies
SoftwareLicensingProduct
33
Microsoft Confidential
Install an Asset Intelligence Synchronization Point
34
Microsoft Confidential
Install an Asset Intelligence Synchronization Point
35
Microsoft Confidential
Install an Asset Intelligence Synchronization Point
36
Microsoft Confidential
Enable Auditing of Successful Logon Events
Required for the following reports
Hardware 3A – Primary Computer Users
Hardware 3B – Computers for a Specific Computer User
Hardware 4A – Shared (multi-user) Computers
Hardware 5A – Console Users on a Specific Computer
Enable the SMS_SystemConsoleUser reporting class
Modify Domain Security Policy
 Security Settings
 Local Policies
 Audit Policy
 Audit Logon Events – select Success check box
37
Microsoft Confidential
Import Software License Information
Import general (non-MVLS) information into the database
Create manually in .csv format with the following headers
Name
Publisher
Version
Language
EffectiveQuantity
PONumber
ResellerName
DateofPurchase
SupportPurchased
SupportExpirationDate
Comments
38
Microsoft Confidential
Importing an MVLS License Statement
39
Microsoft Confidential
Configure Asset Intelligence Maintenance Tasks
40
Microsoft Confidential
Asset Intelligence changes in SP1
Supports the 7 mandatory software identification tags that
are defined in ISO/IEC 19770-2. Software identification tags
provide authoritative information that is used to identify
installed software
ISO/IEC 19770-2 standard specifies the structure and basic usage of software identification)
Added a new AI class SMS_SoftwareTag
Collects inventory of App-V 5 and App-V 4 applications
41
Microsoft Confidential
Lesson Review
What kind of license statements can be imported into
System Center 2012 Configuration Manager?
Name the two new Maintenance Tasks for Asset
Intelligence data in System Center 2012 Configuration
Manager?
42
Microsoft Confidential
Lesson Summary
In this lesson, you learned:
Which components are required to generate successful Asset
Intelligence Reports
How to import MVLS and license statements
Which 2 new Maintenance Tasks have been added to System Center
2012 Configuration Manager for Asset Intelligence
43
Microsoft Confidential
Software Metering
Software Metering components
Enabling and customizing Software Metering
Creating Custom Device Settings
Creating Metering Rules
Software Metering reporting
Client and server troubleshooting
44
Microsoft Confidential
Software Metering Components and Logs
1
2
3
Client
Management Point
Site Server
• Metering data
generated and sent to
MP on Data Collection
Schedule
• Mtrmgr.log
• Swmtrreportgen.log
• Report received in
MP\outboxes\sw
m.box
• Moved by File
Despatch
Manager to Site
Server
• Report received on
Inboxes\swmproc.
box
• Software Metering
Processor
processes data
• Swmproc.log
45
Microsoft Confidential
Database
updated
Enabling and Customizing Software Metering
 Administration Node  Client Settings  Default Settings  Software Metering
46
Microsoft Confidential
Software Metering Components
Software Metering client agent
Mtrmgr.log
Software Metering Processor (Site Server component)
Swmproc.log
Data usage report generation log
SWMTRReportGen.log
47
Microsoft Confidential
Enabling and Customizing Software Metering
Assign different settings for Software Metering by creating
Custom Client Device Settings
Deploy settings to a collection
48
Microsoft Confidential
Creating Custom Device Settings
49
Microsoft Confidential
Creating Custom Device Settings
50
Microsoft Confidential
Creating Metering Rules
Auto-created
51
Microsoft Confidential
Creating Metering Rules
Manually created
52
Microsoft Confidential
Software Metering Administration
Metering rules can be organized in folders
Metering rules can be enabled, disabled, edited or moved.
53
Microsoft Confidential
Software Metering Reporting
Reports rely on metering data being sent from the client –
default is every 7 days
Schedule data collection for Software Metering in Default Client
Settings
Some reports rely on summarization
Summarize Software Metering File Usage Data
Summarize Software Metering Monthly Usage Data
The following reports require the Software Metering Agent
to be enabled:Software 07A - Recently Used Executables by Number of Computers
Software 07B - Computers that Recently Used a Specified Executable
Software 07C - Recently Used Executables on a Specific Computer
Software 08A - Recently Used Executables by Number of Users
Software 08B - Users that Recently Used a Specified Executable
Software 08C - Recently Used Executables by a Specified User
54
Microsoft Confidential
Software Metering Reports
55
Microsoft Confidential
Lab: Customizing Software Metering
Scenario
You are the administrator of the
Contoso System Center 2012
Configuration Manager hierarchy. You
wish to create new Software Metering
rules for a Configuration Manager site
Goals
Enable Software Metering
Create a new software metering rule
Generate a software metering report
56
Microsoft Confidential
Lesson Review
What is the name of the client log that shows metering
rules being checked when an executable is run?
Name the two ways to create a metering rule?
57
Microsoft Confidential
Lesson Summary
In this Lesson, you learned:
How to enable and configure the Software Metering Agent
How to create rules automatically and manually
58
Microsoft Confidential
Lesson Objectives Remote Control
What’s new in System Center 2012 Configuration Manager?
What’s new with Remote Control, Remote Desktop, Remote
Assistance
How to configuring the Remote Tools Client
59
Microsoft Confidential
What’s New in Configuration Manager
Supported Operating Systems for Remote Control Viewer
Windows 7 (32 bit and 64 bit)
Windows XP SP3 32-bit, Vista 32-bit, Vista 64-bit
 Install the Remote Desktop Connection (RDC) client update 7.0
(KB969084)
No support for the Remote Control Viewer on Windows XP
(64 bit), Windows Server 2003 (32 or 64 bit), Windows
Server 2008 or R2 (64 bit) operating systems
60
Microsoft Confidential
What’s New in Configuration Manager?
Pass CTRL+ALT+DEL to client
Disable client mouse and keyboard during remote control
session
Remote Tools are configured in the Default Client Settings
or in Custom Device Settings linked to a collection
61
Microsoft Confidential
What’s New in Configuration Manager? (continued)
Start Remote Control Viewer from a command line
<Configuration Manager Installation
Folder>\AdminConsole\Bin\i386\CmRcViewer.exe
Supported Switches
File – Connect
File - Disconnect
File - Exit
View - Full Screen
View - Scale to Fit
View - Status Bar
Action - Send Ctrl+Alt+Del Key
Action - Enable Clipboard Sharing
Action - Lock Remote Keyboard and Mouse
62
Microsoft Confidential
Configuring the Remote Tools Client
Client can be used to configure Remote Control, Remote
Assistance and Remote Desktop
Remote Assistance and Remote Desktop settings are
applied as local policy, so can be over-written by domainbased Group Policy
Remote Assistance and Remote Desktop needs to be
enabled on the client before settings for these features are
effective
Remote Assistance feature must be installed on the
machine initiating the connection
63
Microsoft Confidential
Remote Control Client Settings
64
Microsoft Confidential
Demo: Remote Control in Configuration Manager
Scenario
You are the administrator of a
Configuration Manager hierarchy. You
need to use the Remote Tools client to
remotely control a Windows 7 client
Goals
Enable and configure the Remote Tools
Client
Start a Remote Tools session from the
command line
66
Microsoft Confidential
Lesson Review
Name one new feature of the Remote Tools Client?
How can you start the Remote Control viewer from a
command line?
67
Microsoft Confidential
Lesson Summary
In this lesson, you learned:
What’s new in Configuration Manager for the Remote Tools Client
How to enable and configure the Remote Tools Client Agent
68
Microsoft Confidential