null User guide

null  User guide
Symantec™ Client
Management Suite 7.6
powered by Altiris™
technology User Guide
Symantec™ Client Management Suite powered by
Altiris™ technology User Guide
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Documentation version: 7.6
Legal Notice
Copyright © 2015 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo, the Checkmark Logo and Altiris, and any Altiris or Symantec
trademarks used in the product are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
This Symantec product may contain third party software for which Symantec is required to
provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs
are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under those
open source or free software licenses. Please see the Third Party Legal Notice Appendix to
this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Symantec as on premises
or hosted services. Any use, modification, reproduction release, performance, display or
disclosure of the Licensed Software and Documentation by the U.S. Government shall be
solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical Support’s
primary role is to respond to specific queries about product features and functionality.
The Technical Support group also creates content for our online Knowledge Base.
The Technical Support group works collaboratively with the other functional areas
within Symantec to answer your questions in a timely fashion. For example, the
Technical Support group works with Product Engineering and Symantec Security
Response to provide alerting services and virus definition updates.
Symantec’s support offerings include the following:
■
A range of support options that give you the flexibility to select the right amount
of service for any size organization
■
Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
■
Upgrade assurance that delivers software upgrades
■
Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
■
Premium service offerings that include Account Management Services
For information about Symantec’s support offerings, you can visit our website at
the following URL:
www.symantec.com/business/support/
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Contacting Technical Support
Customers with a current support agreement may access Technical Support
information at the following URL:
www.symantec.com/business/support/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be at
the computer on which the problem occurred, in case it is necessary to replicate
the problem.
When you contact Technical Support, please have the following information
available:
■
Product release level
■
Hardware information
■
Available memory, disk space, and NIC information
■
Operating system
■
Version and patch level
■
Network topology
■
Router, gateway, and IP address information
■
Problem description:
■
Error messages and log files
■
Troubleshooting that was performed before contacting Symantec
■
Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical
support Web page at the following URL:
www.symantec.com/business/support/
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
■
Questions regarding product licensing or serialization
■
Product registration updates, such as address or name changes
■
General product information (features, language availability, local dealers)
■
Latest information about product updates and upgrades
■
Information about upgrade assurance and support contracts
■
Information about the Symantec Buying Programs
■
Advice about Symantec's technical support options
■
Nontechnical presales questions
■
Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact Symantec regarding an existing support agreement, please
contact the support agreement administration team for your region as follows:
Asia-Pacific and Japan
[email protected]
Europe, Middle-East, and Africa
[email protected]
North America and Latin America
[email protected]
Contents
Technical Support ............................................................................................... 4
Chapter 1
Introducing Client Management Suite ............................ 10
About Client Management Suite ......................................................
Components of Client Management Suite .........................................
What's new in this release ..............................................................
What's new in Client Management Suite .....................................
What's new in Symantec Management Platform ...........................
What's new in ITMS Management Views .....................................
What's new in Symantec Management Agent ...............................
Where to get more information ........................................................
Chapter 2
10
11
15
16
16
17
20
20
Implementing Client Management Suite ....................... 23
About installing Client Management Suite .......................................... 23
About upgrading Client Management Suite ........................................ 23
Removal of pcAnywhere Solution after an upgrade to IT Management
Suite 7.6 ............................................................................... 26
Chapter 3
Getting started with Client Management Suite ............ 28
Preparing managed computers for evaluating Client Management
Suite ....................................................................................
Symantec Management Agent for Windows installation
prerequisites ...................................................................
Installing the Symantec Management Agent for Windows with a
manual push ...................................................................
Configuring the Symantec Management Agent settings for
evaluation use .................................................................
Installing the Inventory and Application Metering plug-ins ...............
Installing or upgrading the Software Management Solution
plug-in ...........................................................................
28
30
31
32
33
35
Contents
Chapter 4
Metering application usage and creating custom
reports ............................................................................. 37
Metering application usage and creating custom reports .......................
Gathering inventory with predefined inventory policies .........................
Enabling application usage metering for Adobe applications ..................
Creating a custom audit report for Adobe using plain-text SQL ...............
Creating a custom audit report for Adobe using Query Builder ...............
Creating a drill-down computer report ...............................................
Other methods of viewing software usage data ...................................
Chapter 5
Harvesting underutilized software from
endpoints ........................................................................ 60
Harvesting underutilized software from client computers .......................
Manually creating the managed software products ..............................
Tracking usage of the managed software products ..............................
Creating a licensed software product ................................................
Tracking the software license compliance ..........................................
Saving computers with underutilized software in a custom filter ..............
Adding exclusions to the static filter ..................................................
Uninstalling underutilized managed software products .........................
Chapter 6
60
64
65
67
68
69
71
71
Delivering a new version of software using Software
Workspace Virtualization ............................................ 74
Delivering a new version of software using Software Workspace
Virtualization .........................................................................
About Workspace Virtualization .......................................................
Installing the Workspace Virtualization Agent ....................................
Delivering Mozilla Firefox 11 software into a virtual layer .......................
Creating a task that toggles layers ...................................................
Delivering Firefox 12 and toggling the layers ......................................
Viewing delivery reports .................................................................
Chapter 7
37
39
41
42
45
53
57
74
76
77
78
81
83
85
Managing power scheme settings ................................... 86
About managing power scheme settings ...........................................
Preparing target computers for power scheme management .................
Installing the Power Scheme Task Plug-in .........................................
Upgrading the Power Scheme Task Plug-in .......................................
Uninstalling the Power Scheme Task Plug-in ......................................
Collecting power scheme inventory data ...........................................
Creating a Power Scheme Task .......................................................
86
88
88
89
89
90
90
8
Contents
Editing and deploying power scheme settings .................................... 91
Viewing power scheme inventory data .............................................. 92
Chapter 8
Symantec Remote Access Connector .............................. 93
About Symantec Remote Access Connector ......................................
Symantec Remote Access Connector configuration file ........................
Creating the Remote Access Connector configuration file
template ...............................................................................
Importing the Remote Access Connector configuration file ....................
Enabling right-click menu to use the Remote Access Connector
options .................................................................................
Index
93
94
95
96
97
.................................................................................................................... 98
9
Chapter
1
Introducing Client
Management Suite
This chapter includes the following topics:
■
About Client Management Suite
■
Components of Client Management Suite
■
What's new in this release
■
Where to get more information
About Client Management Suite
Client Management Suite combines the tools that help you deploy, manage, secure,
and troubleshoot your desktop and laptop client computers.
Client Management Suite is a collection of solutions that run on the Symantec
Management Platform. The platform and solutions of the Client Management Suite
provide the following key features:
■
Discovery and inventory
The suite lets you gather inventory of all hardware and software on your client
computers.
■
Imaging and deployment
The suite lets you deploy standardized and hardware-independent images on
your client computers.
■
Software distribution and patch management
The suite lets you control the software configurations of your client computers.
The automated policies for software and patch management help you distribute
the latest software and operating system updates. You can ensure that the
Introducing Client Management Suite
Components of Client Management Suite
required software remains installed, is in a working state, and is correctly
configured on the client computers.
■
Remote Management
The suite lets you troubleshoot and remediate client computers remotely. You
can integrate a third-party remote tool and control your client computers remotely,
or use Real-Time System Manager to fix the problems that the users have.
See “Components of Client Management Suite ” on page 11.
See “Where to get more information” on page 20.
Components of Client Management Suite
Client Management Suite is a collection of solutions that run on the Symantec
Management Platform. The following table lists all the solutions in Client
Management Suite and also provides a short description of each.
See “About Client Management Suite” on page 10.
11
Introducing Client Management Suite
Components of Client Management Suite
Table 1-1
Components of Client Management Suite
Component
Description
Symantec
Management
Platform
Symantec Management Platform provides a set of services that DOC7978
IT-related solutions can leverage. By leveraging these services,
the solutions that are built on the platform can focus on their unique
tasks. They also can take advantage of the more general services
that the platform provides. The platform services also provide a
high degree of consistency between the solutions, so that users
do not need to learn multiple product interfaces.
Symantec Management Platform provides the following services:
■
Role-based security
■
Client communications and management
■
Execution of scheduled or event-triggered tasks and policies
■
Package deployment and installation
■
Reporting
■
Centralized management through a single, common interface
Symantec Management Platform includes the following
components:
■
Configuration Management Database (CMDB)
■
Notification Server
■
Symantec Management Console
■
Symantec Management Agent for Windows
■
Symantec Management Agent for UNIX, Linux, and Mac
■
Network Discovery
■
Software Management Framework
Link to User Guide
12
Introducing Client Management Suite
Components of Client Management Suite
Table 1-1
Components of Client Management Suite (continued)
Component
Description
Link to User Guide
Deployment
Solution
Deployment Solution helps to reduce the cost of deploying and
DOC8027
managing servers, desktops, and notebooks from a centralized
location in your environment. It offers operating system
deployment, configuration, personality migration of computers,
and software deployment across different hardware platforms and
operating systems.
Deployment Solution 7.1 provides integrated provisioning, disk
imaging, and personality migration from the Symantec
Management Console. Using Symantec Ghost™, you can perform
initial computer deployment using standard images and migrate
user data and application settings to new computers.
Deployment Solution 6.9 SP3, which is a Windows application, is
not included in the Client Management Suite installation. However,
Client Management Suite includes a license to run Deployment
Solution 6.9 or later. You can download and install the Deployment
Solution component separately. Go to the page
https://www4.symantec.com/Vrt/offer?a_id=55149, accept the
export restrictions, and then log on with your Symantec account
credentials. After you ensure that your profile information is correct,
all of the available versions of Deployment Solution are listed on
the Software Download: Deployment Solution page. Choose the
version that you want to download, and then click Download Now.
You can then complete the installation process.
For the Deployment Solution 7.6 release notes, see the link at the
following URL:
http://www.symantec.com/docs/DOC8035
Inventory Solution Inventory Solution lets you gather inventory data about the
computers, users, operating systems, and installed software
applications in your environment. You can collect inventory data
from the computers that run Windows, UNIX, Linux, and Mac.
DOC7967
After you gather inventory data, you can analyze it using predefined
or custom reports.
Inventory for
Network Devices
Inventory for Network Devices gathers inventory data from the
DOC7966
devices that are not managed through the Symantec Management
Agent.
You can gather inventory on the devices that are already
discovered and exist as resources in the CMDB.
13
Introducing Client Management Suite
Components of Client Management Suite
Table 1-1
Components of Client Management Suite (continued)
Component
Description
Link to User Guide
IT Analytics
IT Analytics Solution software complements and expands upon Client Server Management
the traditional reporting that is offered in most Altiris solutions. It content pack:
brings exciting new features and capabilities to Notification Server
DOC7975
because it incorporates multi-dimensional analysis and robust
graphical reporting and distribution features.
This functionality allows users to explore data on their own, without
advanced knowledge of databases or third-party reporting tools.
It empowers users to ask and answer their own questions quickly,
easily, and effectively.
Patch
Management
Solution
Patch Management Solution for Linux lets you scan Red Hat and ■
Novell Linux computers for security vulnerabilities. The solution
then reports on the findings and lets you automate the download
and distribution of needed errata, or software updates. The solution ■
downloads the required patches and provides wizards to help you
deploy them.
Patch Management Solution for Mac lets you scan Mac computers ■
for the updates that they require. The solution then reports on the
findings and lets you automate the downloading and distribution
of needed updates. You can distribute all or some of the updates.
Patch Management
Solution for Linux:
DOC7968
Patch Management
Solution for Mac:
DOC7969
Patch Management
Solution for Windows:
DOC7970
Patch Management Solution for Windows lets you scan Windows
computers for the updates that they require, and view the results
of the scan. The system lets you automate the download and
distribution of software updates. You can create filters of the
computers and apply the patch to the computers that need it.
Symantec Remote Symantec Remote Access Connector is an IT Management Suite See “Symantec Remote
Access Connector 7.6 functionality that lets you configure and integrate a third-party Access Connector”
remote connection tool such as Microsoft® Remote Desktop
on page 93.
Connection or Bomgar™ Remote Support Solution with IT
Management Suite.
Real-Time System Real-Time System Manager provides you detailed real-time
Manager
information about a managed computer, and lets you remotely
perform different administrative tasks in real time.
Real-Time System Manager also lets you run some of the
management tasks on a collection of computers. You can run the
tasks immediately, or on a schedule.
DOC8051
14
Introducing Client Management Suite
What's new in this release
Table 1-1
Components of Client Management Suite (continued)
Component
Description
Link to User Guide
Software
Management
Solution
Software Management Solution provides intelligent and
DOC8052
bandwidth-sensitive distribution and management of software from
a central Web console. It leverages the Software Catalog and
Software Library to ensure that the required software gets installed,
remains installed, and runs without interference from other
software.
Software Management Solution supports software virtualization
technology, which lets you install software into a virtual layer on
the client computer.
Software Management Solution also lets users directly download
and install approved software or request other software.
Workflow Solution
Symantec Workflow is a security process development framework DOC8047
that you can use to create both automated business processes
and security processes. These processes provide for increased
repeatability, control, and accountability while reducing overall
workload.
The Symantec Workflow framework also lets you create Workflow
processes that integrate Symantec tools into your organization's
unique business processes. Once deployed, Workflow processes
can respond automatically to environmental variables. Workflow
processes can also allow for human interface points when a
process calls for someone to make a decision with accountability.
For the Workflow Solution release notes, see the link at the
following URL:
http://www.symantec.com/docs/DOC8049
What's new in this release
In Client Management Suite 7.6 release, new features can be categorized into
general enhancements in Symantec Management Platform, enhancements in ITMS
Management Views (previously known as Enhanced Console View), and
enhancements in the Client Management Suite solutions.
General enhancements and new features of Symantec Management Platform and
the solutions of Client Management Suite 7.6 are as follows:
■
Client Management Suite 7.6
See “What's new in Client Management Suite” on page 16.
■
Symantec Management Platform 7.6
15
Introducing Client Management Suite
What's new in this release
See “What's new in Symantec Management Platform” on page 16.
■
ITMS Management Views (previously known as Enhanced Console Views)
See “What's new in ITMS Management Views” on page 17.
■
Symantec Management Agent
See “What's new in Symantec Management Agent” on page 20.
What's new in Client Management Suite
In Client Management Suite 7.6, the following new features are introduced:
List of new features
Table 1-2
Feature
Description
Symantec Remote Access Connector
Symantec Remote Access Connector is a Client Management Suite 7.6
functionality that lets you configure and integrate a third-party remote
connection tool such as Microsoft® Remote Desktop Connection or Bomgar™
Remote Support Solution with IT Management Suite.
See “Symantec Remote Access Connector” on page 93.
What's new in Symantec Management Platform
In the Symantec Management Platform 7.6, the following new features are
introduced:
List of new features
Table 1-3
Feature
Description
Expanded list of supported platforms.
The following version(s) of Microsoft SQL Server are now supported for the
Configuration Management Database (CMDB):
■
Microsoft SQL Server 2014
The following operating systems are now supported for the installation of
the Symantec Management Agent:
■
Windows 8.1 U1/U2
■
Windows Server 2012 R2
■
OS X 10.10
■
■
RHEL 6.5, RHEL 7 (except for Deployment Solution and Patch
Management Solution)
SLES 11 SP3
■
Solaris 11
16
Introducing Client Management Suite
What's new in this release
List of new features (continued)
Table 1-3
Feature
Description
Cloud-enabled Management
enhancements.
■
Cloud-enabled Management is now available for Mac client computers.
■
3rd party certificates are now supported.
Communication profiles feature is
introduced.
The communication profiles feature gives you an overview of the connections
that the Symantec Management Agents use to communicate with Notification
Servers or site servers. Communication profile defines the information that
the Symantec Management Agents require to establish connection to
Notification Server or site server.
Note: Communication profiles feature is only supported by Windows Agents.
Usability of the reports is improved.
The report engine performance and usability have been improved. The
parameters selection section now detects and indicates the state of the
current selection being out of sync with shown results.
Report's automatic execution can now be disabled separately for each report,
improving usability for time-consuming executions.
SSL connection to SMTP server is now Symantec Management Platform now supports SSL connection to SMTP
supported.
server.
It is possible to export the filter data into You can now export the data of your default or custom filters into a
a file.
spreadsheet or HTML file. Depending on your needs, you can export all data,
selected items, or filtered items.
The logged on user is now informed that Symantec Management Console requires cookies to function properly. In
the cookies are disabled in browser and earlier versions, if the cookies were disabled, certain pages didn't work but
some functionality may not be available. no error was displayed for the user. Now, if the cookies are disabled in
browser, a warning appears.
Data Connector import rules allow
replacing the existing resource
association information.
In earlier versions, Data Connector import rules only allowed adding resource
association information to the existing resources. Now it is also possible to
replace the existing resource association information.
What's new in ITMS Management Views
In ITMS Management Views 7.6, the following new features are introduced:
17
Introducing Client Management Suite
What's new in this release
List of new features
Table 1-4
Feature
Description
Folders in the Targets tree.
On the Computers View page, the targets are now arranged in folders.
By default, the following folders are displayed:
■
■
Favorites
This folder stores the most commonly used targets. Each user can create
their own list of commonly used targets.
System
This folder stores all the system targets grouped according to the solutions
that they belong to.
You can edit, remove, or create new target folders.
The system of target folders is also supported by the Quick apply
functionality. When, on a policy page, you click Apply to > Quick apply, a
dialog box opens, in which you can choose target folders and select the
targets to apply to the policy.
Filter/Target Results reporting
You can now compile custom reports and view detailed information about
the current state of client computers and software.
You can configure a detailed report for a computer filter, target, or a software
filter as follows:
■
Select associations.
■
Select data classes.
■
Add or remove columns.
You can export the report results to an Excel file.
18
Introducing Client Management Suite
What's new in this release
List of new features (continued)
Table 1-4
Feature
Description
Software filters
In the Software Management View, you can now see a list of software filters.
In the Software Filters tree, you can do the following:
■
Search for software filters by the name.
■
Manage the folders and filters through the right-click menu (for example,
rename, delete, clone, move, add to, or remove the filter from the
Favorites folder).
Drag and drop filters or folders to other folders.
■
■
■
Choose which filters to display. Right-click the filter tree, and then click
Show/Hide Filters. The selected configuration is saved for each individual
user.
Create new folders and software filters.
You can create new software filters for the following types of software:
New Manage Filter Criteria box
■
Software product
■
Software component
■
Software release
■
Software service pack
■
Software update
In the Manage Filter Criteria dialog box, you can now choose the filter
parameters to add to the search criteria. The list of displayed criteria depends
on the type of resource that you have chosen for this particular filter.
You can choose associations, data classes, and columns.
When you select a data class in the navigation pane, a list of data class
columns appears in the content pane. You can add a data class column to
the list of filter criteria.
The new parameters appear in the Add Filter Criteria drop-down list.
19
Introducing Client Management Suite
Where to get more information
List of new features (continued)
Table 1-4
Feature
Description
Agent Health status
You can now see the overall status of Symantec Management Agents that
run on your client computers.
The Agent status can be set to one of the following:
■
Healthy
■
Needs attention
■
Untracked
■
Unmanaged
You can filter the client computers according to Agent health status.
The overall Agent health is indicated as follows:
■
On the Computers View page, in the content pane, next to the name of
the client computer.
On the Agent Health page, in the computer details flipbook.
■
On the Agent Health summary page, in the Summary View flipbook.
■
You can configure the way the Agent health status is evaluated.
What's new in Symantec Management Agent
In the Symantec Management Agent 7.6, the following new features are introduced:
Table 1-5
List of new features
Feature
Description
Localization support
Symantec Management Agent for Mac now supports localization for 18
languages.
Where to get more information
Use the following documentation resources to learn about and use this product.
20
Introducing Client Management Suite
Where to get more information
Table 1-6
Documentation resources
Document
Description
Location
Release Notes
Information about new
features and important
issues.
The Supported Products A-Z page, which is available at the following
URL:
http://www.symantec.com/business/support/index?page=products
Open your product's support page, and then under Common Topics,
click Release Notes.
User Guide
Information about how to ■
use this product,
including detailed
■
technical information and
instructions for
performing common
tasks.
The Documentation Library, which is available in the Symantec
Management Console on the Help menu.
The Supported Products A-Z page, which is available at the
following URL:
http://www.symantec.com/business/support/index?page=products
Open your product's support page, and then under Common Topics,
click Documentation.
Help
Information about how to
use this product,
including detailed
technical information and
instructions for
performing common
tasks.
The Documentation Library, which is available in the Symantec
Management Console on the Help menu.
■
Click the page and then press the F1 key.
Help is available at the
solution level and at the
suite level.
■
Use the Context command, which is available in the Symantec
Management Console on the Help menu.
Context-sensitive help is available for most screens in the Symantec
Management Console.
You can open context-sensitive help in the following ways:
This information is
available in HTML help
format.
In addition to the product documentation, you can use the following resources to
learn about Symantec products.
Table 1-7
Resource
Description
SymWISE
Articles, incidents, and
Support
issues about Symantec
Knowledgebase products.
Symantec product information resources
Location
http://www.symantec.com/business/theme.jsp?themeid=support-knowledgebase
21
Introducing Client Management Suite
Where to get more information
Table 1-7
Resource
Description
Symantec product information resources (continued)
Location
Cloud Symantec All available IT
http://help.symantec.com/Welcome?locale=EN_US&context=itms7.6
Help Center
Management Suite and
solution guides are
accessible from this
Symantec Help Center
that is launched on cloud.
Symantec
Connect
An online resource that
contains forums, articles,
blogs, downloads,
events, videos, groups,
and ideas for users of
Symantec products.
http://www.symantec.com/connect/endpoint-management/forums/
endpoint-management-documentation
Here is the list of links to various groups on Connect:
■
■
■
■
■
■
■
■
■
■
■
Deployment and Imaging
http://www.symantec.com/connect/groups/deployment-and-imaging
Discovery and Inventory
http://www.symantec.com/connect/groups/discovery-and-inventory
ITMS Administrator
http://www.symantec.com/connect/groups/itms-administrator
Mac Management
http://www.symantec.com/connect/groups/mac-management
Monitor Solution and Server Health
http://www.symantec.com/connect/groups/monitor-solution-and-server-health
Patch Management
http://www.symantec.com/connect/groups/patch-management
Reporting
http://www.symantec.com/connect/groups/reporting
ServiceDesk and Workflow
http://www.symantec.com/connect/workflow-servicedesk
Software Management
http://www.symantec.com/connect/groups/software-management
Server Management
http://www.symantec.com/connect/groups/server-management
Workspace Virtualization and Streaming
http://www.symantec.com/connect/groups/
workspace-virtualization-and-streaming
22
Chapter
2
Implementing Client
Management Suite
This chapter includes the following topics:
■
About installing Client Management Suite
■
About upgrading Client Management Suite
■
Removal of pcAnywhere Solution after an upgrade to IT Management Suite 7.6
About installing Client Management Suite
To install Client Management Suite, you use Symantec Installation Manager. You
can download the installation files directly to your server or you can create offline
installation packages.
For more information, see the Installing IT Management Suite chapter in the IT
Management Suite 7.6 Planning for Implementation Guide at the following URL:
http://www.symantec.com/docs/DOC8038
After you install the Suite, refer to the individual solution documentation for
information on how to configure and use it.
See “Components of Client Management Suite ” on page 11.
About upgrading Client Management Suite
You can upgrade from the previous versions of Client Management Suite to the
latest version using Symantec Installation Manager.
The supported upgrade paths are as follows:
■
7.1 SP2 MP1.1 v11
Implementing Client Management Suite
About upgrading Client Management Suite
■
7.5 SP1 HF5
To upgrade from Symantec Management Platform 7.1 or later versions, in the
Symantec Installation Manager, click Upgrade installed products, and then select
the product to install. Symantec recommends that you upgrade all the installed
products to the latest version. The easiest way to upgrade to latest version is to
choose to install a suite. If you use hierarchy, you must disable hierarchy replication
and upgrade all products to the latest version on each of the Notification Server
computers.
For more information on how to install, configure, and upgrade the product, see the
Upgrading to IT Management Suite 7.6 chapter in the IT Management Suite 7.6
Installation and Upgrade Guide at the following URL:
http://www.symantec.com/docs/DOC8039
After you upgrade Client Management Suite, you must upgrade the Symantec
Management Agent and the plug-ins that are installed on the managed computers.
Symantec recommends that you do the following:
Upgrade the Symantec Management Agent, site servers, and
solution plug-ins
After upgrade to SMP 7.6, you can upgrade the Symantec Management Agent
(SMA) on the client computers to SMA 7.6. Additionally, you must also upgrade the
solution plug-ins to the latest version. An older version of SMA can communicate
with a latest version of SMP using the Legacy Agent Communication (LAC) mode,
but Symantec recommends that you upgrade the SMA and the solution plug-ins to
the latest version.
To upgrade to Symantec Management Agent, site servers, and solution plug-ins
1
In the Symantec Management Console, on the Actions menu, click
Agents/Plug-ins > Rollout Agents/Plug-ins.
2
Under Symantec Management Agent, locate and turn on the upgrade policies
for the Symantec Management Agent.
3
In the Symantec Management Console, on the Settings menu, click All
Settings.
4
In the left pane, expand Notification Server > Site Server Settings, and then
locate and turn on the upgrade policies for various site server plug-ins.
5
In the Symantec Management Console, on the Actions menu, click
Agents/Plug-ins > Rollout Agents/Plug-ins.
6
In the left pane, locate and turn on the upgrade policies for various plug-ins
Symantec recommends that you configure a schedule for these policies; the default
Run once ASAP option may not trigger the policy if this is not the first time you
24
Implementing Client Management Suite
About upgrading Client Management Suite
perform an upgrade. Also, to speed up the upgrade process, consider temporarily
changing the Download new configuration every setting on the Targeted Agent
Settings page to a lower value.
Migration to Symantec Management Platform 7.6 and the Client
Management Suite 7.6 solutions
If you use Notification Server 6.x or IT Management Suite 7.0 and want to migrate
to Symantec Management Platform 7.6 and Client Management Suite 7.6, you can
use either of the following paths:
■
Migrate from Notification Server 6.x or IT Management Suite 7.0 to Client
Management Suite 7.1 SP2 and then upgrade first to CMS 7.1 SP2 MP1.1
followed by upgrading to CMS 7.6.
■
Migrate from Notification Server 6.x or IT Management Suite 7.0 to Client
Management Suite 7.5 and then first upgrade to CMS 7.5 HF6 followed by
upgrading to CMS 7.6.
For detailed instructions on migrating from Notification Server 6.x or IT Management
Suite 7.0 to Client Management Suite 7.1 SP2, see the following documentation
resources:
■
IT Management Suite Migration Guide version 6.x to 7.1 SP2 at the following
URL:
http://www.symantec.com/docs/DOC4742
■
IT Management Suite Migration Guide version 7.0 to 7.1 SP2 at the following
URL:
http://www.symantec.com/docs/DOC4743
For detailed instructions on migrating from Notification Server 6.x or IT Management
Suite 7.0 to Client Management Suite 7.5, see the following documentation
resources:
■
IT Management Suite Migration Guide version 6.x to 7.5 at the following URL:
http://www.symantec.com/docs/DOC5668
■
IT Management Suite Migration Guide version 7.0 to 7.5 at the following URL:
http://www.symantec.com/docs/DOC5669
For detailed instructions on migrating Notifications Server from a Windows Server
2008 R2 computer to Notifications Server 7.5 SP1 on a Windows Server 2012 R2,
see the Migrating Notification Server data from Windows Server 2008 R2 to Windows
Server 2012 R2 topic in the IT Management Suite 7.5 SP1 Installation and Upgrade
Guide at the following URL:
http://www.symantec.com/docs/DOC6847
25
Implementing Client Management Suite
Removal of pcAnywhere Solution after an upgrade to IT Management Suite 7.6
For detailed instructions on upgrading from Client Management Suite 7.1 SP2
MP1.1 v11 or 7.5 SP1 HF5 to Client Management Suite 7.6, see the Upgrading
to IT Management Suite 7.6 chapter in the IT Management Suite 7.6 Installation
and Upgrade Guide at the following URL:
http://www.symantec.com/docs/DOC8039
Removal of pcAnywhere Solution after an upgrade to
IT Management Suite 7.6
If you have pcAnywhere Solution and you upgrade to IT Management suite 7.6,
pcAnywhere Solution is removed from the server. During installation, you will get
the following warning:
"Starting with IT Management Suite 7.6, pcAnywhere Solution is not supported.
Proceeding with this installation will remove the ability to manage pcAnywhere
components. However, pcAnywhere can still be launched from the pcAnywhere
Manager on Notification Server and from Quick Connect. Host installations will
remain with their current configuration."
After upgrading to IT Management Suite 7.6, an entry for Symantec pcAnywhere
Solution Remover is seen in Symantec Installation Manager (SIM).
Note: Symantec pcAnywhere Solution Remover is not installed when you do a fresh
installation of IT Management Suite 7.6.
After the upgrade to IT Management Suite 7.6 the following options are available
to you:
Table 2-1
pcAnywhere Solution removal in IT Management Suite 7.6
Options for
You CANNOT do the following actions You CAN do the following actions
Symantec Management
Console
■
Use the pcAnywhere Solution options ■
from Symantec Management Console.
The Actions > Remote Management
> Remote Control option is not
available from the console.
Manually launch pcAnywhere Manager
that is already installed on the server
and connect to the pcAnywhere host.
26
Implementing Client Management Suite
Removal of pcAnywhere Solution after an upgrade to IT Management Suite 7.6
Table 2-1
Options for
pcAnywhere Solution removal in IT Management Suite 7.6
(continued)
You CANNOT do the following actions You CAN do the following actions
pcAnywhere Solution policies ■
■
Use the pcAnywhere Solution host
■
installation policies for Windows, Mac,
and Linux.
Use the pcAnywhere Solution host
upgrade policies for Windows, Mac,
and Linux.
Use the pcAnywhere Solution host
uninstall policies for Windows, Mac,
and Linux.
The following policy will be available:
pcAnywhere plug-in for Windows /
Mac / Linux - Uninstall
The following policies won’t be available:
You can manually select the target as All
pcAnywhere plug-in for Windows / Mac Windows/Mac/Linux computers and then
run the uninstallation policy to remove the
/ Linux - Install
pcAnywhere components
pcAnywhere plug-in for Windows / Mac
For Windows host machines, the Windows
/ Linux - Upgrade
computers with pcAnywhere Solution
plug-in target filter can be used. After you
use this filter and run the uninstallation
policy, you must run the Inventory Software
tasks to display the filter results
immediately.
The Inventory tasks can be found in
console at Manage > Jobs and Tasks >
Discovery and Inventory.
You can also use pcAnywhere Manager to
validate that pcAnywhere host is removed
from the client computers.
Other pcAnywhere Solution
options
■
View the pcAnywhere Solution host
configuration views.
The pcAnywhere plug-in – Settings
policy is not available.
■
View the pcAnywhere reports table in
CMDB.
In IT Management Suite 7.6, you can use a third-party remote connection tool to
connect to a client computer with the help of Symantec Remote Access Connector.
See “About Symantec Remote Access Connector” on page 93.
27
Chapter
3
Getting started with Client
Management Suite
This chapter includes the following topics:
■
Preparing managed computers for evaluating Client Management Suite
Preparing managed computers for evaluating Client
Management Suite
The following is the process to prepare the computers in your environment for
evaluating Client Management Suite.
Symantec recommends that you evaluate Client Management Suite on an isolated
group of computers in a lab environment.
Table 3-1
Process for preparing target computers for evaluating Client
Management Suite
Step
Action
Description
Step 1
(Optional) Discover computers in
your environment.
You can discover the computers that are not yet managed by
Symantec Management Agent. If you know the host names or the
IP addresses of the computers on which you want to evaluate
Client Management Suite, the discovery is optional.
For more information about discovering computers, see the IT
Management Suite Administration Guide at the following URL:
http://www.symantec.com/docs/DOC7978
Getting started with Client Management Suite
Preparing managed computers for evaluating Client Management Suite
Table 3-1
Process for preparing target computers for evaluating Client
Management Suite (continued)
Step
Action
Description
Step 2
Configure your Windows
computers to allow Symantec
Management Agent to push
installation.
You can configure computers manually for evaluation. You can
also use a group policy to configure the firewall and other settings
on all or a group of computers in your network.
Install Symantec Management
Agent
Symantec Management Agent establishes communication between
Notification Server and the computers in your network. Notification
Server interacts with Symantec Management Agent and lets you
monitor and manage each computer from the Symantec
Management Console.
Step 3
See “Symantec Management Agent for Windows installation
prerequisites” on page 30.
See “Installing the Symantec Management Agent for Windows
with a manual push” on page 31.
http://www.symantec.com/docs/DOC7978
For evaluation, you can also use another method of installing
Symantec Management Agent, such as pull install.
For more information on the methods of installing the Symantec
Management Agent, see the IT Management Suite Administration
Guide at the following URL:
http://www.symantec.com/docs/DOC7978
Step 4
(Optional) Configure the Symantec To ease the configuration and evaluation of Client Management
Management Agent settings for
Suite, make Symantec Management Agent request the
evaluation use.
configuration from Notification Server more frequently.
See “Configuring the Symantec Management Agent settings for
evaluation use” on page 32.
Step 5
Install or upgrade the plug-ins.
In the Symantec Management Console, on the Actions menu,
click Agents/Plug-ins > Rollout Agents/Plug-ins.
In the left pane, under Agents/Plug-ins, locate and turn on the
installation or upgrade policies for the plug-ins, according to your
needs.
See “Installing the Inventory and Application Metering plug-ins”
on page 33.
See “Installing or upgrading the Software Management Solution
plug-in” on page 35.
After you prepare the client computers, you can do the following:
29
Getting started with Client Management Suite
Preparing managed computers for evaluating Client Management Suite
■
Collect application usage data and create custom reports to view the collected
data.
See “Metering application usage and creating custom reports” on page 37.
■
Enable software usage tracking, and then uninstall the software from the
managed computers that do not use it.
See “Harvesting underutilized software from client computers” on page 60.
■
Install software into a virtual layer with the Software Workspace Virtualization
technology.
See “Delivering a new version of software using Software Workspace
Virtualization” on page 74.
■
Deploy the required plug-ins, and then run tasks to collect inventory information
and change power scheme settings on the managed computers.
See “About managing power scheme settings” on page 86.
Symantec Management Agent for Windows installation prerequisites
Before you can install Symantec Management Agent, you need to configure the
computers and verify that they meet the installation prerequisites.
This task is a step in the processes for installing Symantec Management Agent
manually on Windows computers.
Table 3-2
Symantec Management Agent for Windows installation prerequisites
Prerequisite
Description
Operating system
Any of the following:
■
Windows 2003 SP2 (x86, x64)
■
Windows 2003 R2 and higher (x86, x64)
■
Windows XP Professional SP2 (x64)
■
Windows XP Professional SP3 (x86)
■
Windows Vista SP2 and higher (x86, x64)
■
Windows 2008 and higher (x86, x64)
■
Windows 2008 R2 and higher (x86, x64)
■
Windows 7 and higher (x86, x64)
Hard disk space
60 MB minimum
RAM
64 MB minimum (128 MB recommended)
Internet Explorer
Version 6.0 or later
Access rights
Local administrator rights
30
Getting started with Client Management Suite
Preparing managed computers for evaluating Client Management Suite
Table 3-2
Symantec Management Agent for Windows installation prerequisites
(continued)
Prerequisite
Description
Firewall
The computer must be able to communicate with Symantec
Management Platform through the computer’s firewall.
Perform any of the following:
■
Enable File and Printer Sharing in the firewall settings.
■
Add port UDP 138, TCP 445, TCP 80 (or TCP 443 for
HTTPS) and ICMP type 8 as inbound port exceptions.
You can add the ports by using a group policy.
Turn off the firewall.
■
Simple file sharing (Windows For non-domain client computers running Windows XP, you
XP in non-domain only)
must also disable Use simple file sharing in Folder Options
in Windows XP.
UAC (Windows Vista and
Windows 7 in non-domain
only)
For non-domain client computers running Windows Vista or
Windows 7, you must also turn off the User Access Control
(UAC).
Installing the Symantec Management Agent for Windows with a
manual push
You can push Symantec Management Agent to any Windows computers. Before
you can manually install or uninstall Symantec Management Agent from the
Symantec Management Agent Install page, you need to choose the target
computers. You can enter the computer names manually, choose the computers
that have been discovered with resource discovery, or import the computers from
a CSV file. The CSV file is a comma-delimited text file. The file includes the DNS
names or the IP addresses of the client computers on which you want to install
Symantec Management Agent. For Windows computers, the CSV file is a list of
computer names or IP addresses that are imported into the Symantec Management
Agent Install page. Items are interpreted as the names of computers or the IP
addresses of computers (for the entries that are in the appropriate format). No
spaces are allowed: any item that contains a space is ignored.
Note: You can manually install Symantec Management Agent only on the computers
that were discovered using Domain Resource Discovery or Network Discovery.
This task is a step in the processes for installing the Symantec Management Agent
on Windows computers.
31
Getting started with Client Management Suite
Preparing managed computers for evaluating Client Management Suite
To install the Symantec Management Agent for Windows with a manual push
1
In the Symantec Management Console, on the Actions menu, click
Agents/Plug-ins > Push Symantec Management Agent.
2
On the Symantec Management Agent Install page, on the Install Agent tab,
under Rollout Agent to Computers, choose the computers on which to install
Symantec Management Agent, and then click Install.
To manually add a computer In the text box, type the computer name (which must
be a DNS-resolvable name) or IP address, and then
click Add.
To choose from the available 1
computers
To import computers from a
CSV file
3
Click Select Computers.
2
In the Select Computers dialog box, add the
appropriate computers from the Available
computers list to the Selected computers list,
and then click OK.
1
Under Rollout Agent to Computers, on the
toolbar, click the Import computers from a
selected file symbol.
2
In the Select file to import dialog box, choose the
appropriate CSV file, and then click Open.
In the Symantec Management Agent Installation Options dialog box,
configure the installation settings according to your needs, and then click
Proceed With Install.
For more information, click the page and then press F1.
On the Symantec Management Agent Install page, under Rollout Agent to
Computers, in the computer list, the Status column shows the success or
failure of the installation on each computer. Note that the newly installed
Symantec Management Agent reports its status back to the originating
Notification Server, even if it is going to be managed by another Notification
Server.
Configuring the Symantec Management Agent settings for evaluation
use
(Optional)
By default, Symantec Management Agent requests new configuration from
Notification Server once per hour. This means that it can take up to one hour for a
rollout policy to reach the target computer.
32
Getting started with Client Management Suite
Preparing managed computers for evaluating Client Management Suite
If you are evaluating this solution in a lab environment, you can change the
configuration request interval to speed up the evaluation process.
The next time Symantec Management Agent downloads configuration information,
these settings take effect. If you used the default agent configuration settings before
the change, updates can take up to one hour before these changes are effective.
To configure the Symantec Management Agent for evaluation use
1
In the Symantec Management Console, on the Settings menu, click
Agents/Plug-ins > Targeted Agent Settings.
2
In the left pane, under Policy Name, click the policy that you want to configure.
3
In the right pane, on the General tab, in the Download new configuration
every box, change the value to 5 minutes.
This forces the agent to check for changes more frequently.
4
In the Upload basic inventory every box, change the value to 15 minutes.
This forces inventory data to be sent more frequently.
5
Click Save changes.
Installing the Inventory and Application Metering plug-ins
To gather inventory data on managed computers, you must install Inventory Plug-in
on them.
To meter applications on managed computers, you must install Application Metering
Plug-in. These plug-ins work with Symantec Management Agent to perform tasks
on the managed computers and communicate with Notification Server.
If you have Inventory Pack for Servers, you can also use the Inventory Pack for
Servers Plug-in.
Note: Software-based usage tracking and application metering are Windows-only
features and are supported on Windows XP and above managed computers only.
Software-based usage tracking and application metering are not supported on
Windows servers.
To install a plug-in, you configure the policy that installs the plug-in on managed
computers. You choose the group of computers on which the policy runs, and when
it runs. If you choose a group that contains a computer that already has the plug-in
installed, the task is ignored on that computer. When you turn on the policy, the
plug-in is automatically installed on any new computer that is a member of the target
group.
33
Getting started with Client Management Suite
Preparing managed computers for evaluating Client Management Suite
By default, no plug-in installation policies are turned on. If you install Inventory
Solution for the first time, you must manually turn on the policies to install the
Inventory and Application Metering plug-ins.
You can install Inventory plug-in and Application Metering plug-in separately.
However, if only Application Metering plug-in is installed on the client computer,
but the Inventory plug-in is not, there are the following limitations:
■
You cannot gather information about installed software and files using Inventory
policies and tasks.
■
For MSI-based software, the dynamic association of files and components does
not work properly until the information about file properties is gathered.
■
The Underutilized Software report only shows the information about client
computers on which metered software has been recognized as installed.
Before you perform this task, you must install Symantec Management Agent on
target computers.
This task is a step in the process for preparing managed computers for inventory
and metering.
To install the Inventory or Application Metering plug-ins
1
In the Symantec Management Console, on the Actions menu, click
Agents/Plug-ins > Rollout Agents/Plug-ins.
2
In the left pane, under Agents/Plug-ins, expand Discovery and Inventory >
Windows/UNIX/Linux/Mac, and then click the policy for the plug-in that you
want to install.
3
In the right pane, on the toolbar, click Apply to to choose the computers on
which you want to install the plug-in.
For more information, see the topics about specifying the targets of a policy
and specifying filtering rules in the IT Management Suite 7.6 Administration
Guide at the following URL:
http://www.symantec.com/docs/DOC7978
4
Under Schedule, on the toolbar, click Schedule, and then schedule the policy
to run on managed computers.
5
On the plug-in install page, turn on the policy.
At the upper right of the page, click the colored circle, and then click On.
6
Click Save changes.
The next step is to gather inventory on your client computers.
See “Gathering inventory with predefined inventory policies” on page 39.
34
Getting started with Client Management Suite
Preparing managed computers for evaluating Client Management Suite
Installing or upgrading the Software Management Solution plug-in
Before you can deliver or manage software on client computers with Software
Management Solution, you must install the Software Management Solution plug-in
on those computers.
If you upgraded from a 7.x version of Software Management Solution, you must
upgrade the Software Management Solution plug-in that is installed on the managed
computers.
Upgrade from a 6.x version of Software Management Solution plug-in is not
supported. You must upgrade Symantec Management Agent first, and then use
the Software Management Solution Plug-in Install policy to install the plug-in.
For more information about upgrade and data migration, see the IT Management
Suite 7.6 Installation and Upgrade Guide at the following URL:
http://www.symantec.com/docs/DOC8039
You install the Software Management Solution plug-in to Windows and non-Windows
computers using the Software Management Solution Plug-in Install policy.
This task is a step in the process for implementing Software Management Solution.
To install or upgrade the Software Management Solution plug-in
1
In the Symantec Management Console, on the Settings menu, click
Agents/Plug-ins > All Agents/Plug-ins.
2
In the left pane, under Agents/Plug-ins, expand Software > Software
Management, and then click one of the following policies:
3
■
Software Management Solution Plug-in Install
Click if it is a new installation or if you upgraded from the 6.x version of the
product.
■
Software Management Solution Plug-in Upgrade
Click if you upgraded from the 7.x version of the product.
In the right pane, check or uncheck Enable Verbose Reporting of Status
Events according to your needs.
This option records the detailed events that are related to the installation and
posts them to the Notification Server computer.
4
Under Applied to, on the toolbar, click Apply to, and then choose where to
install the agent.
For more information, see the IT Management Suite 7.6 Administration Guideat
the following URL:
http://www.symantec.com/docs/DOC7978
35
Getting started with Client Management Suite
Preparing managed computers for evaluating Client Management Suite
5
Under Schedule, on the toolbar, click Schedule, and then configure the
schedule for the policy.
Note that if you turn off and then turn on the policy, it cannot run on the same
computer again. To run a policy on the same computer again, you must
configure it to run on a schedule.
6
(Optional) Under Extra schedule options, configure following options:
Run once ASAP Lets you run the policy as soon as possible, and only once.
Note that if you turn off and then turn on the policy, it cannot run on
the same computer again. To run a policy on the same computer
again, you must configure it to run on a schedule.
User can run
Allows the user on the client computer to run the policy manually.
Notify user
when the task
is available
Displays a message to notify the user that new software is available.
When the user clicks the message, the New Software is Available
dialog box opens. The user can start, dismiss, or defer the policy. If
you do not choose to prompt the user, the New Software is
Available dialog box does not appear.
The New Software is Available dialog box appears only if Show
popup notifications is checked.
This option does not apply to UNIX and Linux.
Warn before
running
Displays the Starting Task dialog box to notifiy the user before the
policy runs.
Unless you let the user defer the policy, the policy starts 60 seconds
after the Starting Task dialog box appears. A progress bar shows
the amount of time that remains. The user can dismiss the Starting
Task dialog box but cannot cancel the policy unless you checked
User can run.
The Starting Task dialog box appears only if the Show popup
notifications is checked in the client computer’s Symantec
Management Agent settings.
This option does not apply to UNIX or Linux.
7
Turn on the policy.
At the upper right of the page, click the colored circle and then click On.
8
Click Save changes.
36
Chapter
4
Metering application usage
and creating custom
reports
This chapter includes the following topics:
■
Metering application usage and creating custom reports
■
Gathering inventory with predefined inventory policies
■
Enabling application usage metering for Adobe applications
■
Creating a custom audit report for Adobe using plain-text SQL
■
Creating a custom audit report for Adobe using Query Builder
■
Creating a drill-down computer report
■
Other methods of viewing software usage data
Metering application usage and creating custom
reports
Client Management Suite lets you collect various data from the managed computers,
store the data in the Configuration Management Database (CMDB), and then create
custom reports that display that data.
Below is a sample process for creating a custom report that displays the collected
Adobe software inventory and usage data. You can use this report for a software
audit or to determine the computers on which the software in not used. You can
Metering application usage and creating custom reports
Metering application usage and creating custom reports
then use Software Management Solution to uninstall the software from these
computers and reclaim licenses.
In the following example, you use Inventory Solution to collect data about installed
Adobe software, and then track the software usage with the application metering
feature of Inventory Solution.
Note: Application metering is supported for Windows only. The software usage
information is limited to Windows XP and above.
Table 4-1
Process for application usage metering and creating custom reports
Step
Action
Description
Step 1
Meet the prerequisites.
You must have Symantec Management Agent installed on the
client computers.
See “Preparing managed computers for evaluating Client
Management Suite” on page 28.
Step 2
Install the Inventory and
Application Metering plug-ins.
See “Installing the Inventory and Application Metering plug-ins”
on page 33.
For more detailed information, see the Preparing managed
computers for inventory and metering topic in the Inventory
Solution User Guide at the following URL:
http://www.symantec.com/docs/DOC7967
Note that you use policies to install the plug-ins on the client
computers. If you use default settings, it can take up to one hour
for Symantec Management Agent to request the configuration
update, receive the policy and install the plug-in. You can request
configuration manually from the Symantec Management Agent
GUI, or by running the Update Client Configuration client task
Step 3
Collect full inventory.
The predefined inventory policies are enabled by default and
configured to run ASAP on every computer with the Inventory
plug-in installed. Then, policies run daily , weekly or monthly to
send the updated inventory information to Notification Server.
For example, the Collect Full Inventory policy is set by default
to run once on every computer ASAP, and then every Monday at
18:00.
You can configure the policy schedule according to your needs.
See “Gathering inventory with predefined inventory policies”
on page 39.
38
Metering application usage and creating custom reports
Gathering inventory with predefined inventory policies
Table 4-1
Process for application usage metering and creating custom reports
(continued)
Step
Action
Description
Step 4
Create an application metering
policy for the software.
The application metering policy records application start and stop
events, and sends the application usage data to Notification Server.
See “Enabling application usage metering for Adobe applications”
on page 41.
Step 5
Create a custom audit report and
view inventory data.
You create a report that displays data about the number of software
components that are installed on the client computers and the
number of times the software has been used.
You can use the following methods to create a custom report:
■
■
Plain text SQL
See “Creating a custom audit report for Adobe using plain-text
SQL” on page 42.
The Symantec Management Console Query Builder
See “Creating a custom audit report for Adobe using Query
Builder” on page 45.
Using plain text SQL gives you more flexibility, but if you don't
have extensive SQL language knowledge, you can use Query
Builder to build a custom report. However, using Query Builder
requires the knowledge of the CMDB tables and the data that they
contain.
Step 6
(Optional) Create a drill-down
report.
You can create a drill-down report. For example, you can create
reports that show the list of computers on which a particular
software product is installed.
See “Creating a drill-down computer report” on page 53.
Step 7
(Optional) Use other methods to
view software inventory and
application metering data.
Client Management Suite provides reports and dashboards that
let you view software inventory, application metering data, and
other types of data.
See “Other methods of viewing software usage data” on page 57.
Gathering inventory with predefined inventory
policies
You can gather inventory data from managed computers with predefined inventory
policies. You can also configure the predefined policies to meet your needs. If you
want to configure a predefined policy, Symantec recommends that you clone it, and
then configure the copy.
39
Metering application usage and creating custom reports
Gathering inventory with predefined inventory policies
Note: You can manually run an original or modified predefined inventory policy on
the managed Windows computers. You can do it after the policy automatically runs
on the computer at least once.
Before you perform these steps, ensure that you have prepared the managed
computers for inventory.
To turn on predefined inventory policies
1
In the Symantec Management Console, on the Manage menu, click Policies.
2
In the left pane, expand Discovery and Inventory > Inventory, and then click
the predefined inventory policy that you want to use.
3
(Optional) To gather full inventory for Microsoft SQL Server 2012 with the
predefined Collect Full Server Inventory policy, you need to configure the
predefined policy run options by performing the following steps in order:
4
■
On the inventory policy page, click Advanced.
■
In the Advanced Options dialog box, click Run options, and under Run
Inventory as, select the type of account.
The scope of collected inventory information depends on the account
permissions. For example, if a particular user account does not have
permission to access a file, the information about this file is not collected.
Also, the information about some inventory and server inventory data classes
(Task Scheduler Windows, File Share Windows, etc.) cannot be collected
if the user does not have administrator rights.
■
Click OK.
On the inventory policy page, turn on the policy.
At the upper right of the page, click the colored circle, and then click On.
5
Click Save changes.
To clone and configure predefined inventory policies
1
In the Symantec Management Console, browse to the predefined inventory
policy that you want to clone.
2
Right-click the policy, and then click Clone.
3
Give the cloned policy a unique name, and then click OK.
4
On the inventory policy page, configure the policy options according to your
needs.
For more information about the options, click the page, and then press the F1
key.
40
Metering application usage and creating custom reports
Enabling application usage metering for Adobe applications
5
(Optional) Click Advanced to configure the data classes, policy run options,
or the software inventory rules, and then click OK.
Note that to gather full inventory for Microsoft SQL Server 2012 with the
predefined Collect Full Server Inventory policy, you need to select the
advanced policy option Logged in user at Advanced Options > Run Options.
For more information about the options in the Advanced Options dialog box,
click the box, and then press the F1 key.
6
On the inventory policy page, turn on the policy.
At the upper right of the page, click the colored circle, and then click On.
7
Click Save changes.
The next step is to wait for the client computers to receive the new policy and report
the inventory results, and then view the data that is stored in the Configuration
Management Database (CMDB).
Enabling application usage metering for Adobe
applications
To meter application usage, you create an application metering policy. On the policy
page, you create application definitions for the software that you want to meter. For
each metering policy, you can define one or more software components. Application
metering functionality is a component of the Client Management Suite.
Inventory Solution also lets you track software usage on the software product level.
In the example below, you create an application metering policy that monitors start
events for the executables with the file properties containing "Adobe".
Note: Depending on how you configure the application metering policy, it can take
some time for the application usage data to arrive to Notification Server and be
stored in the Configuration Management Database (CMDB).
To enable usage metering for Adobe applications
1
In the Symantec Management Console, on the Manage menu, click Policies.
2
In the left pane, expand Software, right-click Application metering, and then
click New > Application metering policy.
3
On the New Application metering policy page, give the policy a unique name
and description.
4
On the policy page, on the Software tab, on the toolbar, click Add > Rule.
41
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using plain-text SQL
5
In the Application Definition Details dialog box, in the Definition name box,
type Adobe. In the Product name box, type *Adobe*, and then click OK.
6
On the Options tab, check Record usage events, and then, in the drop-down
lists on the right, click Start and Daily.
These settings instruct the policy to record application startup events and send
the summary data to Notification Server daily.
7
Click Save changes.
The following is the procedure for testing the application metering rule.
To test the application metering rule
1
On client computer that belongs to the Windows Computers with Application
Metering Plug-in targets, open the Symantec Management Agent GUI.
For example, double-click the Symantec Management Agent icon on the
taskbar.
2
In the Symantec Management Agent GUI, on the toolbar, click Settings, and
then click Update to request configuration policies from Notification Server.
3
Verify that the new application metering policy has arrived to the client computer.
If the policy arrived, you can see the name of the policy in the client
configuration policy XML file at the following location: C:\Program
Files\Altiris\Altiris Agent\Client Policies.
In this example, look for Adobe.
4
Run an Adobe application.
5
View captured application usage information.
The application usage information is stored in a binary file at the following
location: C:\Program Files\Altiris\Altiris Agent\Queue. Some of the
recorded data can be viewed using the Notepad application.
This data is then sent to the Notification Server computer according to the
interval that you specified for the Record usage events option.
In this example, the data is sent to the Notification Server daily.
Creating a custom audit report for Adobe using
plain-text SQL
After you enable application metering, you can create a custom report using a
plain-text SQL query. You can also add parameters to an SQL query-based report.
42
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using plain-text SQL
You can use the Symantec Management Console Query Builder to create custom
reports.
See “Creating a custom audit report for Adobe using Query Builder” on page 45.
Note: Symantec recommends that you save the report regularly while making
changes to the report. This reduces the chances of the Symantec Management
Console timing out and losing your changes. To save the changes you made to the
report, you can click either Save Changes or Apply. To return to the report, click
Edit.
The query that you use in this example is as follows:
SELECT
ifd.DisplayName,
ifd.Publisher,
COUNT(DISTINCT ifd._ResourceGuid) AS 'Installed',
COUNT(DISTINCT cm.Metered) AS 'Metered',
COUNT(DISTINCT eas._ResourceGuid) AS 'Used'
FROM ( SELECT DISTINCT _ResourceGuid, DisplayName, Publisher,
ParentResourceGuid, ChildResourceGuid FROM Inv_AddRemoveProgram iarp
JOIN ResourceAssociation ra ON iarp._SoftwareComponentGuid =
ra.ParentResourceGuid WHERE Publisher LIKE '%adobe%' ) ifd
LEFT JOIN ( SELECT DISTINCT ResourceGuid AS Metered FROM
CollectionMembership WHERE CollectionGuid =
'f5758af1-eb77-436f-b63f-e75473cf3c09' ) cm ON cm.Metered =
ifd._ResourceGuid
LEFT JOIN ( SELECT DISTINCT _ResourceGuid, FileResourceGuid FROM
Evt_Application_Start ) eas ON eas.FileResourceGuid =
ifd.ChildResourceGuid AND eas._ResourceGuid = ifd._ResourceGuid
GROUP BY
ifd.Publisher,
ifd.DisplayName
ORDER BY
Used DESC,
Publisher ASC
43
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using plain-text SQL
This query selects all software resources that display Adobe as the publisher in the
Windows Add/Remove Program dialog box (WHERE Publisher LIKE '%adobe%').
The count of computers with this software will be displayed in the Installed column.
You will replace the %Adobe% substring with a report parameter later in the process.
In the LEFT JOIN statement that follows, the query gets the count of computers that
can be metered. Inventory Solution can collect inventory from both server and
workstation operating systems, but application metering is available for workstations
only. When you run the report, the count of workstations with this software is
displayed in the Metered column. This particular example uses the collection that
is used by the default application metering policy. Note that if you use a non-default
target to meter Adobe software, the data in the Metered column will be inaccurate.
If the data is inaccurate, you can further customize the report.
The last LEFT JOIN statement gets the count of computers on which an application
from Adobe was executed and displays it as Used.
Note: This is a simplified query and it does not let you specify a time interval for
which to display metering data. You can add these parameters later.
To create a custom audit report for Adobe using plain-text SQL
1
In the Symantec Management Console, on the Reports menu, click All
Reports.
2
In the left pane, under Reports, expand Discovery and Inventory > Inventory
> Cross-platform > Software/Applications.
3
Under Software/Applications, right-click the Software folder, and then click
New > Report > SQL Report.
4
On New SQL Report page, rename the report.
For example, rename the report to Adobe audit (SQL).
5
Click the Parameterised Query tab, and then, in the text box, delete all the
default query text.
6
Copy the SQL query that is provided in this topic and paste it into the text box.
7
Click Save Changes.
To add a parameter to the plain-text SQL report
1
On the report page, click the Report Parameters tab.
2
On the toolbar, click Add > New Parameter.
44
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using Query Builder
3
In the Editing Parameter dialog box, configure the following settings:
Name
Type Publisher.
Description
Type Publisher.
Default Value
Type %.
Test Value
Type %Adobe%.
4
Under Value Provider, in the Name drop-down list, click Basic Parameter
Value Edit Control, and then, under Configuration, in the Label Text box,
type Publisher.
5
Click OK.
6
On the report page, click the Data Source tab, and then click the Query
Parameters tab.
7
On the toolbar, click Add > Publisher.
8
Click the Parameterised Query tab.
9
In the text box, before the query, add the following lines:
DECLARE @v3_Publisher nvarchar(max)
SET @v3_Publisher = N'%Publisher%'
10 In the SQL query, locate the following string:
LIKE '%adobe%'
and replace it with the following:
LIKE @v3_Publisher
11 Click Save Changes.
To test the report, you can type %oracle% in the Publisher box. Then refresh
the report, and see if it displays the list of Oracle software that is discovered
by Inventory Solution.
See “Creating a drill-down computer report” on page 53.
Creating a custom audit report for Adobe using Query
Builder
After you enable application metering, you can use Query Builder to create a custom
report in the Symantec Management Console.
45
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using Query Builder
You can also build a custom report using a plain-text SQL query.
See “Creating a custom audit report for Adobe using plain-text SQL” on page 42.
For more information, see the topics about creating custom Notification Server
reports in the IT Management Suite Administration Guide.
Note: Symantec recommends that you save the report regularly while making
changes to the report. This reduces the chances of the Symantec Management
Console timing out and losing your changes. To save the changes you made to the
report, you can click either Save Changes or Apply. To return to the report, click
Edit.
To create a new report and add tables and associations
1
In the Symantec Management Console, on the Reports menu, click All
Reports.
2
In the left pane, expand Discovery and Inventory > Inventory >
Cross-platform > Software/Applications.
3
Under Software/Applications, right-click Software, and then click New >
Report > Computer Report.
4
On the New Computer Report page, type a new name for this report.
For example, type Adobe audit (Query Builder).
5
On the Query tab, click Base Query, and then, on the right, in the Base
Resource Type drop-down list, click Software Component.
When a dialog box opens, click OK.
6
On the Query tab, under Base Query, click Software Component, and then,
under Actions, click Create Joins.
46
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using Query Builder
7
In the Joins dialog box, create a table join as follows:
Inner join Inv_AddRemoveProgram on [Software Component].[Guid] =
_SoftwareComponentGuid.
Click OK.
8
On the Query tab, under Base Query, click Software Component, and then,
on the right, under Actions, click Use Resource Type Associations.
9
In the Resource Type Associations dialog box, in the drop-down list, click
[Software Component Contains File] to [File], and then click OK.
10 On the Query tab, under Software Component Contains, click File, and then,
on the right, under Actions, click Create Joins.
11 In the Joins dialog box, create a table join as follows:
Left Outer join Inv_Monthly_summary on [File].[Guid] = FileResourceGuid.
Click OK.
12 On the Query tab, under Software Component Contains, click File, and then,
on the right, under Actions, click Create Joins.
47
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using Query Builder
13 In the Joins dialog box, create a table join as follows:
LeftOuter join Inv_Software_Execution on [File].[Guid] = _ResourceGuid.
Click OK.
14 Click Save Changes.
Next, add the third table, which will be used to get the count of computers that can
be metered. You must then add a filter expression that lets you exclude the operating
systems that are not supported by the Application Metering Plug-in.
In this example, you filter the results by GUID
f5758af1-eb77-436f-b63f-e75473cf3c09, which is a GUID of the Windows
Computers with Application Metering plug-in.
To join the CollectionMembership table and add a filter expression
1
On the Query tab, under Base Query, click Inv_AddRemoveProgram, and
then, in the right pane, under Actions, click Create Joins.
2
In the Joins dialog box, create a table join as follows:
Left Outer join CollectionMembership on
[Inv_AddRemoveProgram].[_ResourceGuid] = ResourceGuid.
Click OK.
3
On the Filter Expressions tab, click Switch to Advanced Mode.
4
In the left pane, click [CollectionMembership] Join Filters.
48
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using Query Builder
5
In the right pane, in the drop-down list, click Equals.
When a dialog box opens, click OK.
6
For the first filter operand, under Filter Expression Operands, in the {0}::
drop-down list, click Field, and then, in the right drop-down list, click
[CollectionMembership].[CollectionGuid].
For the second operand, under Filter Expression Operands, in the {1}::
drop-down list, click Text, and then, to the text box on the right, paste the
following GUID:
f5758af1-eb77-436f-b63f-e75473cf3c09
7
In the left pane, click [Inv_Software_Execution] Join Filters.
8
In the right pane, in the drop-down list, click Equals.
When a dialog box opens, click OK.
9
For the first filter operand, under Filter Expression Operands, in the {0}:
drop-down list, click Field, and then, in the right drop-down list, click
[Inv_Software_Execution].[IsMetered].
49
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using Query Builder
10 For the second operand, under Filter Expression Operands, in the {1}:
drop-down list, click Integer, and then, to the text box on the right, type 1.
Note that after you change the Alias for [Inv_Software_Execution].[IsMetered]
to IsMetred on the Field tab, [Inv_Software_Execution].[IsMetered] will
automatically change to [IsMetered].
11 Click Save changes.
In the next step, you choose the table fields that will appear in the report. You also
aggregate data and choose the sort order.
The following list shows the fields that you must add to the report when you perform
the next procedure.
[Inv_AddRemoveProgram].[DisplayName]
Displays the software name, as shown in the
Windows Add/Remove Programs window.
In the Alias box, type Name.
[Inv_AddRemoveProgram].[Publisher]
Displays the software publisher, as shown in
the Windows Add/Remove Programs window.
In the Alias box, type Publisher.
50
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using Query Builder
[Inv_AddRemoveProgram].[_ResourceGuid] Displays the count of computers (both servers
and workstations) with this software installed.
In the Alias box, type Installed. In the
Aggregate drop-down list, click Count
Distinct.
[Inv_Software_Execution].[IsMetered]
Displays the count of workstations with this
software installed.
In the Alias box, type IsMetered.
In the Aggregate drop-down list, click Count
Distinct.
[Inv_Monthly_Summary].[_ResourceGuid]
Displays the count of workstations on which
the software has been run.
In the Alias box, type Used.
In the Aggregate drop-down list, click Count
Distinct.
(Optional) In the Sort Direction drop-down
list, click Descending.
To add fields to the report
1
Open the report that you want to edit, and then click the Fields tab.
2
On the Fields tab, on the toolbar, click the Add symbol, and then add the fields
that are shown in the left column in the table on the Fields tab.
Note: You can add fields one by one. You can also check Select Multiple
Fields, and then add multiple fields from the drop-down list.
After you add the fields, you can configure them as shown in the table below.
51
Metering application usage and creating custom reports
Creating a custom audit report for Adobe using Query Builder
3
On the Fields tab, remove all other fields except for
[CollectionMembership].[CollectionGuid] that are not part of this list. Click
a row, and then, on the toolbar, click the Delete symbol.
4
Click Save changes.
Note: [CollectionMembership].[CollectionGuid] is a required hidden field in this
example, and it cannot be removed.
You can add a parameter to the report that lets you filter the results by the software
publisher. First, you add a new parameter text box to the report, and then you
configure the report query.
To add a parameter using Query Builder
1
Open the report you want to edit, and then click the Report Parameters tab.
2
On the Report Parameters tab, on the toolbar, click Add > New Parameter.
3
In the Editing Parameter dialog box, fill in the following text boxes:
Name
Type Publisher.
Descrpiption
Type Publisher.
Default Value
Type %.
Test Value
Type %Adobe%.
4
Under Value Provider, in the Name drop-down list, click Basic Parameter
Value Edit Control, and then, in the Label Text box, type Publisher.
5
Click OK.
6
Click the Data Source tab, and then click the Query Parameters tab.
7
On the Query Parameters tab, on the toolbar, click Add > Publisher.
8
On the Filter Expressions tab, in the left pane, click
[Inv_AddRemoveProgram] Join Filters.
9
In the right pane, in the drop-down list, click Like.
When a dialog box opens, click OK to confirm.
52
Metering application usage and creating custom reports
Creating a drill-down computer report
10 For the first filter operand, in the {0}: drop-down list, click Field and then, in
the right drop-down list, click [Publisher].
For the second operand, in the {1}: drop-down list, click Parameter, and then,
in the right drop-down list, click Publisher.
11 Click Save changes.
See “Creating a drill-down computer report” on page 53.
Creating a drill-down computer report
You can create a custom drill-down report and add it as a right-click menu action
to the audit report that you created.
The following is an example of how to create a drill-down report that shows the list
of computers that have the software installed. You can create any other report
according to your needs.
To create a drill-down computer report
1
In the Symantec Management Platform, on the Reports menu, click All
Reports.
2
In the left pane, under Reports, expand Discovery and Inventory > Inventory
> Cross-platform > Software /Applications, right-click Software, and then
click New > Report > Computer Report.
53
Metering application usage and creating custom reports
Creating a drill-down computer report
3
On the New Computer Report page, click the report name and type a new
name.
For example, type Drilldown: Installed.
4
On the Query tab, under Base Query, click Computer, and then, in the left
pane, under Actions, click Create Joins.
5
In the Joins dialog box, create a table join as follows:
6
■
In the Join drop-down list, click Inner.
■
In the middle drop-down list, click Inv_AddRemoveProgram.
■
In the bottom drop-down lists, click the following:
On [Computer].[Guid] = _ResourceGuid.
■
Click OK.
On the Fields tab, on the toolbar, click the Add symbol, and then add the fields
that are shown below.
Configure the fields as shown.
7
On the Report Parameters tab, on the toolbar, click Add > New Paramater,
and then, in the Editing Parameter dialog box, configure the parameter as
follows:
■
In the Name box, type SWguid.
■
In the Description box, type Software Guid.
■
In the Type drop-down list, click Basic GUID Parameter.
■
Check Parameter Required.
■
Under Value Provider, in the Name drop-down list, click Basic Parameter
Value Edit Control.
■
In the Label Text box, type Software Resource Guid.
■
Click OK.
54
Metering application usage and creating custom reports
Creating a drill-down computer report
8
On the Data Source tab, click the Query Parameters tab, and then, on the
toolbar, click Add > Software Guid.
9
On the Filter Expressions tab, in the left pane, click
[Inv_AddRemoveProgram] Join Filters.
10 In the right pane, do the following:
■
In the top drop-down list, click Equals.
When a dialog box opens, click OK.
■
Under Filter Expression Operands, for the first filter operand, in the {0}:
drop-down list, click Field and then, in the right drop-down list, click
[swguid].
■
For the second filter operand, in the {1}: drop-down list, click Parameter,
and then, in the right drop-down list, click SWguid.
11 Click Save Changes.
To create a right-click drill-down menu
1
Open the report that you created with Query Builder.
2
Add a new [Inv_AddRemoveProgram].[_SoftwareComponentGuid] field to
the report, and make it invisible.
3
On the Drilldowns tab, click Remove to remove the default ShowContextMenu
drilldown.
4
Click Add.
5
In the Name box, type Show Installed.
55
Metering application usage and creating custom reports
Creating a drill-down computer report
6
In the Performs drop-down list, click Drilldown To Report.
7
Under Action Configuration, click No report selected, and then search for
and select the drill-down report that you created.
8
Under Passing Parameter, click the Add symbol.
9
In the Pass Drilldown Parameter dialog box, configure the fields as follows:
Pass from source
Click Data field, and then, in the
drop-down list below, click
_SoftwareComponentGuid.
Name at destination
Type SWguid.
This string must match the input parameter
name of the drill-down report.
Transform to type
Click Basic GUID Parameter.
10 Click OK.
11 Click Add.
12 Create a new drill-down as follows:
Name
Type ContextMenu.
Available On
Click DefaultDataView.
Event
Click Right-click.
Performs
Click Show context menu.
Action Configuration
Skip and do not configure.
Passing Parameters
Skip and do not configure.
13 Click Save changes.
The right-click action that you created is not available in the right-click menu by
default. You must edit the source of the report manually, as follows:
To enable the custom right-click menu
1
In the left pane, right-click the Adobe audit (Query Builder) report, click
Export, and then save the file.
2
Open the saved XML file in a text editor.
56
Metering application usage and creating custom reports
Other methods of viewing software usage data
3
In the XML file, under <viewingControl>, in the <link> element with the
name="ContextMenu" attribute, locate the following string:
<action id="ContextMenu" />
4
Replace this string with the following text:
<action id="ContextMenu">
<arguments>
<argument name="MenuFactories" list="true">
<value>LinkMenu</value>
</argument>
</arguments>
</action>
Also, add the visible="false" attribute to the link element.
5
Save and close the file.
6
In the Symantec Management Console, right-click the folder in which your
report is located (in this example, Software), click Import, then and import the
report back into the CMDB.
The right-click menu is now available. Test the report. To go back to the parent
report, use the breadcrumb bar above of the right pane.
7
(Optional) To hide the drill-down report from the left pane, in the XML, replace
<itemAttributes>Normal</itemAttributes> with
<itemAttributes>Hidden</itemAttributes>.
Other methods of viewing software usage data
The software usage data appears in reports and views after you collect full inventory,
enable usage tracking or create application metering policies, and after the usage
information is sent to Notification Server by the Application Metering plug-in.
57
Metering application usage and creating custom reports
Other methods of viewing software usage data
Software view
To access the Software view, in the Symantec Management Console,
on the Manage menu, click Software.
In the left pane, under Metered Software, click Usage Tracking. Then
view the usage data in the right pane.
This data can be displayed only for the software that is defined in the
Software Catalog and is added to the list of managed software products.
You must also enable tracking for the software that you want to appear
in this view.
For more information about Software Catalog and managed software,
see the Software Management Solution User Guide at the following URL:
http://www.symantec.com/docs/DOC8052
The following reports are available for software product-level usage
tracking:
■
Underutilized Software
For more information about tracking software usage, see the Inventory
Solution User Guide at the following URL:
http://www.symantec.com/docs/DOC7967
Application
metering reports
To view application metering reports, in the Symantec Management
Console, on the Reports menu, click All Reports, and then, in the left
pane, under Reports, expand Software > Application Metering.
The following reports and several others are available for file-level
application metering:
■
Executable Usage
For more information about application metering, see the Inventory
Solution User Guide at the following URL:
http://www.symantec.com/docs/DOC7967
58
Metering application usage and creating custom reports
Other methods of viewing software usage data
Installed software To view the installed software reports, in the Symantec Management
reports
Console, on the Reports menu, click All Reports, and then, in the left
pane, under Reports, expand Discovery and Inventory > Inventory
> Cross-platform > Software/Applications.
The following reports and several others are available:
■
Audit Software Search report
■
Installed Software
■
Disk Usage by File Extension
For more information about viewing inventory data in reports, see the
Inventory Solution User Guide at the following URL:
http://www.symantec.com/docs/DOC7967
Resource
Manager
Resource Manager lets you view information and perform numerous
tasks on a Configuration Management Database (CMDB) resource. A
CMDB resource can be a computer, software, network device, and so
on.
You can access Resource Manager if you double-click a resource in the
Symantec Management Console.
For more information about viewing inventory data in Resource Manager,
see the Inventory Solution User Guide at the following URL:
http://www.symantec.com/docs/DOC7967
59
Chapter
5
Harvesting underutilized
software from endpoints
This chapter includes the following topics:
■
Harvesting underutilized software from client computers
■
Manually creating the managed software products
■
Tracking usage of the managed software products
■
Creating a licensed software product
■
Tracking the software license compliance
■
Saving computers with underutilized software in a custom filter
■
Adding exclusions to the static filter
■
Uninstalling underutilized managed software products
Harvesting underutilized software from client
computers
Client Management Suite lets you define software products, deliver them, collect
information about installed software, and track software usage. To define, install,
or uninstall software you use the Software Management Solution. You can track
software usage with Inventory Solution.
You can use the features of Asset Management Suite to manage purchased software
licenses and view license compliance. Asset Management Suite combines licensing
data with software usage tracking data. This lets you discover overdeployed licensed
Harvesting underutilized software from endpoints
Harvesting underutilized software from client computers
software and identify the computers from which the software can be uninstalled to
reclaim licenses.
Note: The software usage tracking functionality of Inventory Solution supports
Windows workstation operating systems only. The software usage information is
limited to Windows XP and above.
After you uninstall the software, you can use Software Management Solution from
Symantec to deliver an alternative application to the same computers. For example,
you may want to uninstall Microsoft Visio and replace it with Visio Viewer.
Table 5-1
Process for harvesting underutilized software from client computers
Step
Action
Description
Step 1
Meet the prerequisites.
You must have Symantec Management Agent installed on the
client computers. The client computers must be registered with
Notification Server.
See “Preparing managed computers for evaluating Client
Management Suite” on page 28.
Step 2
Install the Inventory and
Application Metering plug-ins.
See “Installing the Inventory and Application Metering plug-ins”
on page 33.
For more detailed information, see the Preparing managed
computers for inventory and metering topic in the Inventory
Solution User Guide:
http://www.symantec.com/docs/DOC7967
Note that the plug-ins are delivered to the client computers by
policies, so that the time when a plug-in gets installed depends
on the Symantec Management Agent's configuration request
interval, which is one hour by default. It can take up to one hour
for Symantec Management Agent to receive the policy and install
the plug-in. You can request configuration manually from the
Symantec Management Agent GUI, or by running the Update
Client Configuration client task.
Step 3
Install the Software Management
Solution plug-in
This plug-in lets you deliver and manage software, and check
compliance on client computers.
See “Installing or upgrading the Software Management Solution
plug-in” on page 35.
61
Harvesting underutilized software from endpoints
Harvesting underutilized software from client computers
Table 5-1
Process for harvesting underutilized software from client computers
(continued)
Step
Action
Description
Step 4
Collect full inventory.
The predefined inventory policies are enabled by default and
configured to run ASAP on every computer with the Inventory
plug-in installed. Then, policies run daily or weekly to send the
updated inventory information to Notification Server.
For example, the Collect Full Inventory policy is configured to
run once on every computer as soon as possible, and then every
Monday at 18:00.
You might already have the software and the file inventory
collected from the client computers and stored in the Configuration
Management Database (CMDB). If the data is not yet available,
turn on the policies and modify the schedules according to your
needs.
See “Gathering inventory with predefined inventory policies”
on page 39.
Step 5
Define managed software and
enable usage tracking.
To prepare for software usage tracking, collect software inventory,
define manageable software products, and then enable usage
tracking for the software according to your needs.
See “Manually creating the managed software products”
on page 64.
See “Tracking usage of the managed software products”
on page 65.
62
Harvesting underutilized software from endpoints
Harvesting underutilized software from client computers
Table 5-1
Process for harvesting underutilized software from client computers
(continued)
Step
Action
Description
Step 6
(Optional) Add licensing
information.
If you installed IT Management Suite, use Asset Management
Suite to track licenses for the software.
See “Creating a licensed software product” on page 67.
When you add licensing information, you can use reports and
dashboards to view how many of the licensed software installations
are used. Based on this information, you can uninstall software
from the client computers that do not use it.
In this example, Symantec recommends that you view the
summary software product licensing compliance on the Software
Licensing dashboard.
To view the compliance and usage data for a particular software
product, in the Symantec Management Console, on the Manage
menu, click Software.
See “Tracking the software license compliance” on page 68.
For more information about managing licenses, see the Asset
Management Suite User Guide:
http://www.symantec.com/docs/DOC8031
Step 7
View the Underutilized Software Decide which software you want to uninstall to reclaim licenses,
report and create a static filter for and then open the Underutilized Software report.
the computers from which you want
You create a static filter, and then use this filter for the Quick
to uninstall the software.
Delivery task that uninstalls the software.
See “Saving computers with underutilized software in a custom
filter” on page 69.
Step 8
(Optional) Configure additional
filtering criteria.
You can add an exclusion to your static filter. For example, you
can include a large number of computers in your static filter, and
then add filters to exclude computers from a particular
organizational group, computers that are used by managers, and
so on.
See “Adding exclusions to the static filter” on page 71.
Step 9
Uninstall underutilized software.
You can use the wizards that are provided by Software
Management Solution to uninstall software.
See “Uninstalling underutilized managed software products”
on page 71.
63
Harvesting underutilized software from endpoints
Manually creating the managed software products
Manually creating the managed software products
Software management is only available on Windows computers.
You can track usage of a software product only if the software product is managed
in the Software Catalog. Inventory Solution provides the list of predefined software
products. If the software product that you want to manage is in the list, the task
NS.Nightly schedule to associate Software component to software product
automatically moves the relevant predefined software product to the Software
Catalog, to the Managed software products list.
If the software component that you want to track does not match filtering rules of
any predefined software product, you can manually create a managed software
product for this software component.
This task is a step in the process for tracking usage of the managed software
products.
To manually create the managed software products
1
In the Symantec Management Console, on the Manage menu, click Software.
2
In the Software pane, under Installed Software, click Newly Discovered
Software.
3
In the Newly Discovered Software pane, select the software component for
which you want to create a software product.
4
In the right pane, under New Software, click Manage this software.
5
In the Software Product dialog box, view or edit the name, company, and
version of the software product.
6
(Optional) On the Identify inventory tab, perform the following actions:
■
To edit filtering inventory rules, enter new criteria in the Software name,
Company, or Version filters.
The filtering inventory rules define the software product and the software
components that can be associated to it. The filtering inventory rules are
dynamic. Any software component that comes into your environment and
matches these rules is automatically associated to this software product.
For example, you can change the Software name from Adobe Reader to
Adobe, and the details in the Identify inventory tab change to display
software components for all Adobe products.
Note that when using the Company filter, you must first enter criteria in the
Software name filter. Otherwise, the Company filter does not work.
■
To include the software components that are associated with other software
products, check Include components associated with other products.
64
Harvesting underutilized software from endpoints
Tracking usage of the managed software products
The components that are associated with other software products are
highlighted yellow.
7
Click OK.
The next step is to track the usage of the managed software products.
See “Tracking usage of the managed software products” on page 65.
Tracking usage of the managed software products
Software usage tracking is only available on Windows computers.
Inventory Solution provides the software-based usage tracking option to help you
track application usage and prepare for managing software licenses.
You enable the software-based usage tracking option for the managed software
products and view gathered usage tracking data in the Symantec Management
Console Software views.
You can track usage of a managed software product only if at least one software
component in the software product has the association with one or more key program
files. Otherwise, when you try to enable the software-based usage tracking option
by checking Turn on metering / usage tracking for this software product in the
Software Product dialog box, you get the following error message:
"Associate at least one program to meter / track usage."
The key program files that are installed with an MSI-based installer get automatically
associated with the relevant software components.
For the following program files, you create associations manually when you enable
the software-based usage tracking option in the Software Product dialog box:
■
The program files that are installed with non-MSI-based installers.
■
The program files that are not determined as key program files and have no
component-to-file association.
■
The program files that do not match any key program files that are already
associated with the software component of a metered software product.
When you associate key program files to software components of the software
product, the best practice is to use a more granular approach to usage tracking.
To use this method, each software component must be associated with the correct
key program file. The version of the associated key program file should correspond
to the version of the relevant software component. As a result, you can view the
usage of all components and versions of the metered software product.
65
Harvesting underutilized software from endpoints
Tracking usage of the managed software products
For example, in the software product Adobe Reader 9, you add the program file
AcroRd32.exe with the version 9.5.0.270 to the software component Adobe Reader
9.5.0 English with the version 9.5.0. You add the program file AcroRd32.exe with
the version 9.0.0.2008061200. to the software component Adobe Reader 9 English
with the version 9.0.0.
This task is a step in the process for tracking usage of the managed software
products.
Before you perform this step, ensure that the managed software product that you
want to track has the software components that are associated to it.
See “Manually creating the managed software products” on page 64.
To track usage of the managed software products
1
In the Symantec Management Console, on the Manage menu, click Software.
2
In the Software pane, under Installed Software, click Installed Products.
3
In the Installed Products pane, double-click the software product that you
want to track.
4
In the Software Product dialog box, click the Meter / track usage tab.
5
On the Meter / track usage tab, perform one or both of the following actions:
■
To add a key program file to the software component with no associations
to any program files, click Add Program next to the relevant software
component.
■
To add a new key program file to the software component that already has
associations to program files, click any associated program file next to the
relevant software component.
6
In the Add Program dialog box, under Available programs, type the name
of the program file that you want to track to filter the results.
7
In the Available programs list, select the program file that you want to track,
click the arrow to move the selected program file to the Associated programs
list, and then click OK.
8
On the Meter / track usage tab, in the Count software as used if run in the
last ... days box, type the number of days.
9
Check Turn on metering / usage tracking for this software product.
10 Click OK.
The next step is to wait for the client computers to report the specified software
usage, and then view the data that is stored in the Configuration Management
Database (CMDB).
66
Harvesting underutilized software from endpoints
Creating a licensed software product
Creating a licensed software product
A software product lets you record the details that are associated with the software
in your environment. For example, you can create the software product items that
represent the software programs, such as Norton Ghost 15.0, Microsoft Windows
Server 2003 Enterprise Edition, and Adobe Photoshop CS4.
Note: Software products are linked to one or more software resources. The purpose
and benefit of a software product is not fully realized until Asset Management Suite
is installed. Installation of Asset Management Suite is a pre-requisite for creating
a licensed software product.
The software products have a package or a command line associated to them, and
they are available for delivery to network resources. In the Software view, the
licensed software products that you create appear under the Licensed, Adobe, or
Microsoft saved search.
This task is a step in the process for managing your software license compliance
using the Software view.
To create a licensed software product
1
In the Symantec Management Console, on the Manage menu, click Software.
2
In the navigation pane, under Favorites, click Discovered Unreviewed
Software.
3
In the list pane, select the software component for which you want to create a
licensed software product.
4
In the software details pane, click Manage this software.
5
In the Software Product dialog box, on the Identify inventory tab, specify
the filter rules that define the software product .
For more information, click the page and then press F1.
6
In the Software Product dialog box, on the Licenses tab, make sure that
Licensable product is checked, and then click Add License Purchase.
7
In the Add License Purchase dialog box, enter software license and software
purchase information, and then click Add.
8
In the Add Software Product dialog box, click OK.
After you save a software product with its associated software purchase and
software license information, the options to see and edit the full records of
software license and software purchase within the Asset Management Suite
pages become available.
67
Harvesting underutilized software from endpoints
Tracking the software license compliance
Tracking the software license compliance
After you insert all necessary data and create the associations, you can track the
software license compliance in your environment.
Note: Software products are linked to one or more software resources. The purpose
and benefit of a software product is not fully realized until Asset Management Suite
is installed. Installation of Asset Management Suite is a pre-requisite for creating
a licensed software product.
You can use the Software view or Resource Manager to check the software license
compliance of a single software. In the Licensing Reports Web Part, on the
Software Product Licensing Compliance tab, you can view the software license
compliance report for all your software.
To see the most accurate data in Resource Manager and in the Software Licensing
portal, the Software Product Licensing Recalculation Operation Task must run.
By default, this task is scheduled to run during off-peak hours. You can access the
task on the Jobs / Tasks page, under Jobs and Tasks > System Jobs and Tasks
> Service and Asset Management > Contract Management.
This task is a step in the process for managing your software license compliance
using the Software view.
You can also track the software license compliance by location using the Software
Product Licensing Compliance By Location report. To view the report, ensure
that the installation location is associated with the software purchase and the
computers. Ensure that you run the Software Product Licensing Recalculation
Operation Task before generating the report to get the updated data.
To track your software license compliance in the Software view
1
In the Symantec Management Console, on the Manage menu, click Software.
2
In the navigation pane, under Licensed Software, click Licensed, and then
select a software product in the list pane.
3
In the software details pane, you can view the information about software usage
and software licenses.
For more information, click the page and then press F1.
Note that the software license compliance graphic does not include
non-inventoried, borrowed, or upgraded licenses. It only shows the count of
purchased licenses as compared to the count of software product installs
detected in the environment.
68
Harvesting underutilized software from endpoints
Saving computers with underutilized software in a custom filter
To track your software license compliance in Resource Manager
1
In the Symantec Management Console, on the Home menu, click Service and
Asset Management > Software Licensing.
2
In the left pane, click Software Product.
3
In the Software Product list, right-click the software product, and then click
Resource Manager.
4
In Resource Manager, on the Summaries menu, click Software Product
Licensing Summary.
To track your software license compliance in the Software Licensing portal
1
In the Symantec Management Console, on the Home menu, click Service and
Asset Management > Software Licensing.
2
In the right pane, in the Licensing Reports Web Part, click the Software
Product Licensing Compliance tab.
To track your software license compliance by location in the Software Licensing
portal
1
In the Symantec Management Console, on the Reports menu, click All reports.
2
In the Reports pane on the left, click Service and Asset Management >
Contract Management > Software Licensing > Software Product Licensing
Compliance By Location to view the software license compliance by location
report.
Alternatively, on the Home menu, click Service and Asset Management >
Software Licensing. In the left pane, click Service and Asset Management
Reports > Contract Management > Software Licensing > Software Product
Licensing Compliance By Location.
Alternatively, on the Home menu, click Service and Asset Management >
Manage Configuration Items. In the left pane, click Service and Asset
Management Reports > Contract Management > Software Licensing >
Software Product Licensing Compliance By Location.
Saving computers with underutilized software in a
custom filter
Reports in the Symantec Management Console let you save a selection of computers
as a static filter. You can then use this filter in a task or a policy.
When you create a static filter, it is saved under Manage > Filters > Report Based
Filters.
69
Harvesting underutilized software from endpoints
Saving computers with underutilized software in a custom filter
Note: Static filters are not based on a SQL query and do not change their
membership — computers are not added to or removed from the filter automatically.
The Underutilized Software report lets you view the usage information of the
managed software products. In this example, you use this report to find the client
computers on which the software is rarely or never used, and then you uninstall
the software from these computers.
Note: The software usage information is sent to the Notification Server computer
daily or weekly, depending on the settings. The usage data does not appear in the
Symantec Management Console immediately after you use the software.
In the Used column you can see the following status messages:
Yes
The software is metered and is used on this
computer.
No
The software is metered but is not used on this
computer.
Unsupported
The computer's operating system is not supported,
and software cannot be metered.
Normally this status is displayed for the server
operating systems.
Application Metering plug-in not
installed
The operating system is supported, but the plug-in
is not installed.
The computers that display No are suitable for license harvesting. Save the
computers from which you want licensed software to be uninstalled into a static
filter.
This task is a step in the process for harvesting underutilized software from the
endpoints.
See “Harvesting underutilized software from client computers” on page 60.
To save computers with underutilized software in a custom filter
1
In the Symantec Management Console, on the Reports menu, click All
Reports.
2
In the left pane, expand Software > Application Metering, and click
Underutilized Software.
3
In the right pane, right-click the application that you want to uninstall, and then
click Drill down to computers with underutilized software.
70
Harvesting underutilized software from endpoints
Adding exclusions to the static filter
4
(Optional) Sort the drill-down report by the Used column.
5
Choose the computers for which No is displayed in the Used column.
6
On the toolbar, click Save As > Static Filter.
7
Type a name for the new filter.
For example, type Adobe Acrobat Professional Uninstall Filter.
8
Click Save.
Adding exclusions to the static filter
(Optional)
You can configure additional filtering criteria for your static filter.
For example, you can exclude some organizational groups from the static filter.
This way, the software uninstallation task does not run on the excluded computers.
This task is a step in the process for harvesting underutilized software from the
endpoints.
See “Harvesting underutilized software from client computers” on page 60.
To add exclusions to the static filter
1
In the Symantec Management Console, on the Manage menu, click Filters.
2
Expand Report Based Filters, and then click your static filter.
For example, click Adobe Acrobat Professional Uninstall Filter.
3
In the right pane, click Edit.
4
Under Exclusions, click Select a filter, add the filter that you want to exclude
from your static filter, and then click OK.
5
(Optional) To view the updated list of computers, under Filter Membership,
click Update membership.
6
Click Save changes.
Uninstalling underutilized managed software
products
A software product that you want to uninstall can be defined as a deliverable product
in the Software Library. In this case, a package and a command line to uninstall
the software may already be present. The Software Library can generate installation
and uninstallation command lines for known executable types. You can also add a
71
Harvesting underutilized software from endpoints
Uninstalling underutilized managed software products
command line manually. Use a Quick Delivery task to uninstall software using the
static filter that you created.
Also, you can create a new Run Script task and excute an uninstall command using
this task.
If you want the software to get automatically uninstalled when not used over an
extended period of time, create a dynamic filter using a plain-text SQL query or
Query Builder, and then assign a managed software delivery policy to that filter.
For more information, see the topics about reports in the IT Management Suite
Administration Guide and the topics about managed software delivery in the Altiris
Software Management Solution from Symantec User Guide.
See “Metering application usage and creating custom reports” on page 37.
This task is a step in the process for harvesting underutilized software from the
endpoints.
See “Harvesting underutilized software from client computers” on page 60.
To uninstall underutilized software using a Quick Delivery task
1
In the Symantec Management Console, on the Manage menu, click Software.
2
In the left pane, under Metered Software, click Usage Tracking.
3
In the Usage Tracking pane, right-click a deliverable software resource, and
then click Actions > Quick Delivery Task.
If the menu option is not available, then a command line is not created for this
product. Double-click the software product to edit and add the uninstall
command line.
4
In the Quick Delivery Task dialog box, in the Command line box, specify the
uninstall command line.
5
Under Destination resources, click Add > Targets.
6
In the Select a resource target dialog box, click Build target, and then click
Add rule.
7
Configure the rule as follows:
8
■
Check exclude resources not in.
■
Click Filter.
■
Click your static filter name.
In this example, click Adobe Acrobat Professional Uninstall Filter.
Click Update results , and verify that only the resources from which you want
to uninstall the software are displayed.
72
Harvesting underutilized software from endpoints
Uninstalling underutilized managed software products
9
(Optional) To save your target, click Save as, and then complete the steps in
the dialog box that opens.
10 Click OK.
11 In the Select a resource target dialog box, in the left pane, locate your target,
move it to the right pane, and then click OK.
12 In the Quick Delivery Task dialog box, click OK.
13 (Optional) To monitor the task progress, in the Symantec Management Console,
on the Manage menu, click Jobs and Tasks, and then, in the left pane, under
Job and Tasks, click System Jobs and Tasks > Software > Quick Delivery.
To uninstall an underutilized software product that is not deliverable
1
In the Symantec Management Console, on the Manage menu, click Jobs and
Tasks.
2
In the left pane, navigate to the folder in which you want to create a new task.
For example, expand System Jobs and Tasks > Software > Quick Delivery.
3
Right-click Quick Delivery, and then click New > Task.
4
In the Create New Task dialog box, in the left pane, click Run Script.
5
In the right pane, type a new task name.
For example, type Adobe Professional Quick Uninstall.
6
Under Script Details, type a script or a command line that uninstalls the
software product. Configure other options according to your needs.
For more information, click the page and then press F1.
7
Run the task on the computers from the static filter that you created.
For more information on how to run tasks, see the IT Management Suite
Administration Guide.
73
Chapter
6
Delivering a new version of
software using Software
Workspace Virtualization
This chapter includes the following topics:
■
Delivering a new version of software using Software Workspace Virtualization
■
About Workspace Virtualization
■
Installing the Workspace Virtualization Agent
■
Delivering Mozilla Firefox 11 software into a virtual layer
■
Creating a task that toggles layers
■
Delivering Firefox 12 and toggling the layers
■
Viewing delivery reports
Delivering a new version of software using Software
Workspace Virtualization
Client Management Suite lets you remotely deliver software into virtual layers. You
can achieve this by using the functionality that is provided by Software Management
Solution and the Symantec Workspace Virtualization software.
Software Management Solution provides intelligent and bandwidth-sensitive
distribution and management of software from a central Web console. Software
Management Solution lets you make sure that the correct software gets installed,
remains installed, and runs without interference from other software.
Delivering a new version of software using Software Workspace Virtualization
Delivering a new version of software using Software Workspace Virtualization
For more information, see the Altiris Software Management Solution from Symantec
User Guide.
The Symantec Workspace Virtualization software lets you place applications and
data into managed units, called Virtual Software Layers. It lets you instantly activate,
deactivate, or reset virtual layers together with the applications that are installed in
them.
Client Management Suite integrates Software Management Solution with Symantec
Workspace Virtualization and lets you perform managed software deliveries into
virtual layers using the Symantec Management Console.
You can deliver a newer version of software into a new virtual layer and then swap
the layers on the next computer restart. Mozilla Firefox is used as the example
here. Firefox has a built-in auto-update feature, so it may not be necessary to update
this kind of software using Client Management Suite. However, the automatic
updates may be disabled by an administrator. Also, the autoupdate feature is not
available to non-administrative users. In this case, you can update Firefox in the
production environment.
Symantec recommends to first perform this process in a test environment.
Warning: Make sure that Mozilla Firefox is not already installed on the client
computer. Installing another version of Firefox in a virtual layer may conflict with
this software installation. If you cannot uninstall Firefox, choose a different software
for this procedure.
The following procedure introduces the functionality that is available in Client
Management Suite. If unexpected issues occur, please ignore them if possible.
Table 6-1
Process for delivering a new version of a software using Software
Workspace Virtualization
Step
Action
Description
Step 1
Meet the prerequisites.
You must have Symantec Management Agent installed on the
client computers. The client computers must be registered with
Notification Server.
See “Preparing managed computers for evaluating Client
Management Suite” on page 28.
Step 2
Learn about Workspace
Virtualization.
Symantec Workspace Virtualization software lets you install
software into virtual layers then enable, disable, and reset the
layers.
See “About Workspace Virtualization” on page 76.
75
Delivering a new version of software using Software Workspace Virtualization
About Workspace Virtualization
Table 6-1
Process for delivering a new version of a software using Software
Workspace Virtualization (continued)
Step
Action
Description
Step 3
Install the Software Management
Solution plug-in.
This plug-in lets you deliver and manage software, and it lets you
check compliance on the endpoints.
See “Installing or upgrading the Software Management Solution
plug-in” on page 35.
Step 4
Step 5
Install the Symantec Workspace
Virtualization Agent.
This agent lets you create and manage virtual layers.
Deliver Firefox 11.
For the sample procedure, deliver Mozilla Firefox 11 to your test
computers. After that, you upgrade this software with a newer
version.
See “Installing the Workspace Virtualization Agent ” on page 77.
See “Delivering Mozilla Firefox 11 software into a virtual layer”
on page 78.
Step 6
Create a task that toggles the
layers.
You can use the SVSCmd.exe command-line tool to manage
virtual layers. Create a command script task that uses this tool to
toggle virtual layers.
See “Creating a task that toggles layers” on page 81.
Step 7
Deliver Firefox 12 and toggle the
layers.
Use managed delivery policy to deliver a newer version of Firefox
into a new virtual layer and then toggle the layers on next computer
restart.
See “Delivering Firefox 12 and toggling the layers” on page 83.
Step 8
View delivery reports.
Software Management Solution provides reports that let you view
the managed software delivery results.
See “Viewing delivery reports” on page 85.
About Workspace Virtualization
Workspace Virtualization places applications and data into managed units, called
Virtual Software Layers. This lets you activate, deactivate, or reset applications.
You can also completely avoid conflicts between applications without altering the
base Windows installation.
Symantec's application virtualization technologies integrate virtualized applications
to preserve the user experience. Virtualized applications act like normal applications,
ensuring normal behavior and full functionality.
Workspace Virtualization also lets you do the following:
76
Delivering a new version of software using Software Workspace Virtualization
Installing the Workspace Virtualization Agent
■
Reset the damaged applications to a known state and instantly repair them.
■
Run two versions of the same program side by side.
■
Add and remove software with zero impact on the underlying operating system.
■
Turn applications on and off instantly.
Workspace Virtualization is based on Symantec's patented core technology,
Symantec WorkspaceVirtualization (SWV) File System Filter driver. An application
or set of data is virtualized by using a capture process that creates a Virtual Software
Package (VSP). A VSP contains all the files and registry settings of the application
or data. It can be used on a client computer that has the Workspace Virtualization
Agent. After the VSP is activated through the Workspace Virtualization Agent, the
application becomes visible along with its files, folders, and settings.
Installing the Workspace Virtualization Agent
To virtualize software on the endpoints, you install the Symantec Workspace
Virtualization Agent. By default, only the command-line tool is installed. Symantec
recommends that you also install the Admin tool on the client computers. The Admin
tool lets you view and manage layers using the GUI program, and verify the changes
that you make to the layers. You can install the Admin tool in the following ways:
■
In the Symantec Management Console, modify the command line in the Install
SWV agents managed delivery policy before you install the Workspace
Virtualization Agent.
■
Install additional components using the Programs and Features dialog box on
the Control Panel on the client computer. For example, you can use this method
if the Workspace Virtualization Agent is already installed on a client computer.
■
Install the SWV agent manually, and choose to install Admin tool in the Wizard.
For more information on this method, see the Symantec Workspace Virtualization
User Guide.
This task is a step in the process for installing software into a virtual layer.
See “Delivering a new version of software using Software Workspace Virtualization”
on page 74.
To modify the Workspace Virtualization Agent installation command line
1
In the Symantec Management Console, on the Manage menu, click Software.
2
In the left pane, under Deliverable Software, click Software Releases, and
then, in the middle pane, double-click Symantec Workspace Virtualization
agent 6.1 SP8 (32 bit).
77
Delivering a new version of software using Software Workspace Virtualization
Delivering Mozilla Firefox 11 software into a virtual layer
3
In the dialog box that opens, on the Package tab, under Command lines,
double-click Install - no UI.
4
In the Add or Edit Command Line dialog box, in the Command line box, add
,SVS_Admin at the end of the command line as follows:
Symantec_Workspace_Virtualization.exe /s
SWV.ADDLOCAL=Altiris_NS,SVS_Admin
5
Click OK.
6
Click OK.
7
Repeat the steps and do the same for the Symantec Workspace Virtualization
agent 6.1 SP8 (64 bit) software release.
To install the Workspace Virtualization Agent using the Symantec Management
Console
1
In the Symantec Management Console, on the Actions menu, click
Agents/Plug-ins > Rollout Agents/Plug-ins.
2
In the left pane, expand Software > Software Management > Workspace
Virtualization, and then click Install SWV agents.
3
(Optional) In the right pane, configure the settings according to your needs.
For example, under Schedule, you can modify the compliance check schedule
so that the agent is deployed sooner; and under Applied to, you can change
the target so that the agent is deployed only to the computers in your test
environment or a pilot group.
4
Turn on the policy.
At the upper right of the page, click the colored circle, and then click On.
5
Click Save changes.
To run the Symantec Workspace Virtualization admin tool
◆
To access the Workspace Virtualization admin tool, on the computer with the
Symantec Workspace Virtualization Agent installed, click the Windows Start
button, and then click All Programs > Symantec > Workspace > Virtualization
> Symantec Workspace Virtualization Admin.
Delivering Mozilla Firefox 11 software into a virtual
layer
The following is an example of how to deliver Mozilla Firefox 11 to the client
computers and install this software into a virtual layer. First, you create a new
78
Delivering a new version of software using Software Workspace Virtualization
Delivering Mozilla Firefox 11 software into a virtual layer
software resource in the Software Catalog, and then you use Software Management
Solution to create a managed delivery policy for this software resource. Software
Management Solution is a component of Client Management Suite.
This is an optional step in the production environment if you already have the
software that you want to update installed on the endpoints.
Before performing this task, download the Mozilla Firefox 11 setup file (Firefox
Setup 11.0.exe) from the following URL:
ftp://ftp.mozilla.org/pub/firefox/releases/11.0/win32/en-US/
This task is a step in the process for installing software into a virtual layer.
See “Delivering a new version of software using Software Workspace Virtualization”
on page 74.
To create a new software resource for Mozilla Firefox 11
1
In the Symantec Management Console, on the Manage menu, click Software
Catalog.
2
In the Software Catalog dialog box, on the toolbar, click Import.
3
In the Import Software: Specify Software dialog box, in the Software type
drop-down list, click Software release, and then use one of the four available
methods to import the software.
For more information on the methods, click the dialog box and then press F1.
If more than one file is in the package source, make sure that you set the
installation file. The installation file is highlighted with bold font. To do this, click
the file, and then, on the toolbar, click Set installation file.
4
Click Next.
5
In the Import Software: Software Details dialog box, choose to create a new
software resource for Firefox 11.
6
Click OK.
7
In the dialog box that opens, on the Package tab, under Command lines,
double-click Install.
79
Delivering a new version of software using Software Workspace Virtualization
Delivering Mozilla Firefox 11 software into a virtual layer
8
In the Add or Edit Command Line dialog box, in the Command line box,
replace
"Firefox_Setup_11.0.exe"
with
"Firefox_Setup_11.0.exe" -ms
The -ms switch lets you install Firefox so that the installation wizard will not be
displayed on the client computer at the time of installation.
9
(Optional) In a production environment, configure a detection rule on the Rules
tab. The detection rule ensures that the managed delivery policy does not run
on the computers where the software is already installed.
For example, create a smart Static File Expression detection rule that checks
if the mozilla firefox\firefox.exe file version equals or is larger than 11.
10 Click OK.
11 Click OK.
12 Click Close.
To deliver Mozilla Firefox 11 into a virtual layer
1
In the Symantec Management Console, on the Manage menu, click Software.
2
Under Deliverable Software, click Software Releases.
3
In the middle pane, right-click Firefox 11, and then click Actions > Managed
Software Delivery.
4
In the Managed Software Delivery Wizard, on the Select software page,
under Additional delivery options, check Install this policy's software into
a virtual layer.
5
In the Layer Name box, type firefox11.
6
Click Next.
7
On the Select destinations page, specify the computers to which you want
to deliver Firefox 11.
Symantec recommends that you first perform this task in a test environment.
You can choose one of the existing targets or groups, or you can build a new
resource target. For help, click the page on which you want to get more
information, and then press F1.
8
Click Next.
80
Delivering a new version of software using Software Workspace Virtualization
Creating a task that toggles layers
9
On the Schedule delivery page, under Choose when to check the
compliance, on the toolbar, click Add schedule > Scheduled time, and then
configure a schedule. For example, set a schedule 10 minutes ahead of current
time.
Note that by default, Symantec Management Agent requests new configuration
from Notification Server once every hour. If you set a schedule only 10 minutes
ahead of the current time, you must then use the Symantec Management Agent
GUI on the client computer to request configuration soon after you complete
this wizard. You can also run the managed delivery policy manually from the
Symantec Management Agent GUI.
10 Click Next, and then, on the Specify dependencies and updates page, click
Deliver software.
You can view and edit the managed delivery policy that you just created at
Manage > Policies > Software > Managed Software Delivery.
To verify that Firefox 11 is installed in a virtual layer
1
On the client computer to which you want to deliver the software, open the
Symantec Management Agent GUI.
You can use the Start button to launch this program.
2
Ensure the Firefox 11 - Install managed delivery policy has arrived to the
client computert and has run successfully.
If necessary, update the configuration manually. You can run the managed
delivery policy manually from the Symantec Management Agent GUI.
3
Run the Symantec Workspace Virtualization admin tool using Start > All
Programs > Symantec > Workspace > Virtualization > Symantec
Workspace Virtualization Admin.
4
Make sure that the firefox11 layer appears in the Symantec Workspace
Virtualization admin tool.
If necessary, click View > Refresh to refresh the window.
5
(Optional) In the Symantec Workspace Virtualization admin window, click
firefox11, and then click Layer > Activate on system startup.
Creating a task that toggles layers
After you install a newer version of Firefox, you must disable the old layer and
activate the new one. To toggle layers at the next computer restart, you must change
the Activate on system startup option. To do this remotely from the Symantec
81
Delivering a new version of software using Software Workspace Virtualization
Creating a task that toggles layers
Management Console, create a new Run script task with the following
command-line script:
SET exitcode=0
cd "%programfiles%\Symantec\Workspace Virtualization"
:: Check if layer is already activated
SVSCmd.exe firefox12 P -v | findstr /R /c:"Active on start:.*No"
goto %errorlevel%
:0
echo not active
:: Deactivate new layer until next startup
SVSCmd.exe firefox12 D
:: Turn off autostart for old layer
SVSCmd.exe firefox11 AUTO -N
:: Turn on autostart for new layer
SVSCmd.exe firefox12 AUTO -Y
SET exitcode=%errorlevel%
:1
echo active
:: For testing purposes sleep 10 seconds before closing the command
window
ping 1.1.1.1 -n 1 -w 10000 > nul
:: Exit
exit /b %exitcode%
This script uses the SVSCmd.exe command-line utility to modify settings. First, this
script checks if the new layer exists and is already configured to activate on startup.
The follow-up tasks in managed delivery policies always run, regardless of the
compliance check results. This check is required to make sure the script does not
run in case the managed delivery policy is executed again by mistake.
Then the script disables the autostart option for the firefox11 layer and enables it
for the new firefox12 layer. When the computer is restarted, the firefox12 layer is
activated.
82
Delivering a new version of software using Software Workspace Virtualization
Delivering Firefox 12 and toggling the layers
For more information on the SVSCmd.exe command line parameters, see the
Symantec Workspace Virtualization User Guide or run the SVSCmd.exe utility from
the command-line prompt.
Do not run the Run script task after you create it. Instead, run it as part of the
managed delivery policy in the next step of this tutorial.
This task is a step in the process for installing software into a virtual layer.
See “Delivering a new version of software using Software Workspace Virtualization”
on page 74.
To create a task that toggles layers
1
In the Symantec Management Console, on the Manage menu, click Jobs and
Tasks.
2
In the left pane, right-click any folder, and then click New > Task.
For example, right-click System Jobs and Tasks.
3
In the Create New Task dialog box, in the left pane, click Run Script.
4
In the right pane, type a name for the task.
For example, type Toggle layers.
5
Under Script Details, in the Script type drop-down list, click Command Script,
and then copy and paste the script sample from this topic into the text box.
6
Click OK.
Delivering Firefox 12 and toggling the layers
You can deliver Mozilla Firefox 12 to the client computers and install this software
into a new virtual layer. You create a new software resource in the Software Catalog
for Mozilla Firefox 12. Then, you use Software Management Solution to create a
managed delivery policy that delivers the software and then runs the Toggle layers
task that you created earlier.
Before performing this task, download the Mozilla Firefox 12 setup file (Firefox
Setup 12.0.exe) from the following URL:
ftp://ftp.mozilla.org/pub/firefox/releases/12.0/win32/en-US/
This task is a step in the process for installing software into a virtual layer.
See “Delivering a new version of software using Software Workspace Virtualization”
on page 74.
83
Delivering a new version of software using Software Workspace Virtualization
Delivering Firefox 12 and toggling the layers
To deliver Firefox 12 and toggle layers
1
Create a new software resource for Mozilla Firefox 12.
Use the instructions that are provided for Firefox 11, but type 12 instead of 11
where appropriate.
See “Delivering Mozilla Firefox 11 software into a virtual layer” on page 78.
2
In the Symantec Management Console, on the Manage menu, click Software.
3
In the left pane, under Deliverable Software, click Software Releases.
4
In the middle pane, right-click Firefox 12, and then click Actions > Managed
Software Delivery.
5
In the Managed Software Delivery Wizard, on the Select software page,
under Additional delivery options, check Install this policy's software into
a virtual layer.
6
In the Layer Name box, type firefox12, and then click Next.
7
On the Select destinations page, specify the computers to which you want
to deliver Firefox 12, and then click Next.
Symantec recommends that you first perform this task in a test environment.
You can choose one of the existing targets or groups, or you can build a new
resource target. For help, click the page on which you want to get more
information, and then press F1.
8
On the Schedule delivery page, specify when to check for compliance.
For example, click Add schedule > Scheduled time, and then specify a
schedule. You can specify a schedule 10 minutes ahead of the current time.
Click Next.
Note that by default, Symantec Management Agent requests a new
configuration from Notification Server once every hour. If you set a schedule
only 10 minutes ahead of the current time, you must then use the Symantec
Management Agent GUI on the client computer to request configuration soon
after you complete this Wizard. You can also run the managed delivery policy
manually.
9
On the Specify dependencies and updates page, configure the settings
according to your needs, and then click Deliver software.
10 In the Symantec Management Console, on the Manage menu, click Policies.
11 In the left pane, click Software > Managed Software Delivery > Firefox 12
- Install.
12 On the Firefox 12 - Install page, on the Software tab, on the toolbar, click
Add > Task.
84
Delivering a new version of software using Software Workspace Virtualization
Viewing delivery reports
13 In the Select Task dialog box, click the Toggle layers task that you created
earlier.
14 Click OK.
After the managed delivery policy runs, and you restart the client computer,
you should see that firefox11 is disabled and firefox12 is enabled. Verify that
when you launch Firefox from the Start menu, browser version 12 is launched.
Viewing delivery reports
You can view the managed delivery policies compliance and remediation information
in the Software Management Solution compliance reports.
This task is a step in the process for installing software into a virtual layer.
See “Delivering a new version of software using Software Workspace Virtualization”
on page 74.
To view delivery reports
1
In the Symantec Management Console, on the Reports menu, click All
Reports.
2
In the left pane, expand Software > Compliance.
3
Click a report.
85
Chapter
7
Managing power scheme
settings
This chapter includes the following topics:
■
About managing power scheme settings
■
Preparing target computers for power scheme management
■
Installing the Power Scheme Task Plug-in
■
Upgrading the Power Scheme Task Plug-in
■
Uninstalling the Power Scheme Task Plug-in
■
Collecting power scheme inventory data
■
Creating a Power Scheme Task
■
Editing and deploying power scheme settings
■
Viewing power scheme inventory data
About managing power scheme settings
Power scheme is a collection of settings that manage the power usage of the
computer. The settings define after what period of inactivity to turn off the computer
display and hard drives to save power, put the computer to standby, in hibernation,
or shut the computer down.
The Altiris Power Scheme Task component helps you discover and remotely
configure the power scheme settings of your Windows computers. The Power
Scheme Task component is installed when you choose to install Client Management
Managing power scheme settings
About managing power scheme settings
Suite in the Symantec Installation Manager. It is not installed if you install individual
solutions.
The Power Scheme Task component includes a Power Scheme Inventory task
and a collection of predefined tasks with different power scheme settings. According
to your requirements, you can configure the settings of the predefined tasks
according to your needs or create custom power scheme management tasks.
The Power Scheme Task that you run does not change the power schemes that
Windows or other applications install. It creates and activates the Altiris Power
Scheme with the power scheme settings that you specify.
See “Preparing target computers for power scheme management” on page 88.
Table 7-1
Power Scheme Task features
Feature
Description
Edit and deploy power schemes.
You can edit and deploy different predefined power
schemes.
See “Editing and deploying power scheme settings”
on page 91.
The Power Scheme Task that you run does not
change the power schemes that Windows or other
applications install. It creates the Altiris Power
Scheme with the power scheme settings that you
specify.
Create power scheme management
tasks.
You can create custom power scheme
management tasks, and you can specify the power
scheme settings according to your requirements.
See “Creating a Power Scheme Task” on page 90.
Inventory power schemes on client
computers.
You can collect information about the power
scheme settings that are currently active on your
Windows computers.
See “Collecting power scheme inventory data”
on page 90.
View power schemes data.
You can use a predefined report to see the power
scheme settings that are currently active on your
Windows computers.
See “Viewing power scheme inventory data”
on page 92.
87
Managing power scheme settings
Preparing target computers for power scheme management
Preparing target computers for power scheme
management
To run the power scheme management tasks, you must install or upgrade the Power
Scheme Task Plug-in on the target computers.
See “Installing the Power Scheme Task Plug-in” on page 88.
See “Upgrading the Power Scheme Task Plug-in” on page 89.
The Power Scheme Task Plug-in works with Symantec Management Agent to
perform the power scheme management tasks. The Power Scheme Task Plug-in
lets you configure the power scheme settings on your managed Windows computers.
The Power Scheme Task Plug-in also lets you collect information about the power
scheme settings that are currently in use on the managed computers.
See “About managing power scheme settings” on page 86.
Installing the Power Scheme Task Plug-in
The Power Scheme Task Plug-in lets you configure the power scheme settings on
your managed Windows computers. The agent installation process can take some
time to start, depending on the update intervals that you set for Symantec
Management Agent.
To install the Power Scheme Task Plug-in
1
In the Symantec Management Console, on the Actions menu, click
Agents/Plug-ins > Rollout Agents/Plug-ins.
2
In the left pane, under Agents/Plug-ins, click Power Scheme > Power
Scheme Task Plug-in Install.
3
In the right pane, configure the installation policy according to your needs.
For more information about policy configuration options, click the page and
then press F1.
4
Turn on the policy.
At the upper right of the page, click the colored circle, and then click On.
5
Click Save changes.
See “About managing power scheme settings” on page 86.
88
Managing power scheme settings
Upgrading the Power Scheme Task Plug-in
Upgrading the Power Scheme Task Plug-in
If you upgrade from a previous version of the Client Management Suite, you must
also upgrade the Power Scheme Task Plug-in to the latest version. To upgrade the
Power Scheme Task Plug-in, you must turn on the upgrade policy.
To upgrade the Power Scheme Task Plug-in
1
In the Symantec Management Console, on the Actions menu, click
Agents/Plug-ins > Rollout Agents/Plug-ins.
2
In the left pane, under Agents/Plug-ins, click Power Scheme > Power
Scheme Task Plug-in Upgrade.
3
In the right pane, configure the upgrade policy according to your needs.
For more information about policy configuration options, click the page and
then press F1.
4
Turn on the policy.
At the upper right of the page, click the colored circle, and then click On.
5
Click Save changes.
See “About managing power scheme settings” on page 86.
Uninstalling the Power Scheme Task Plug-in
If you do not perform the power scheme management tasks on your computers
over an extended period of time, you can uninstall the Power Scheme to lessen
the unnecessary network traffic. To uninstall the Power Scheme Task Plug-in, you
must turn on the uninstall policy.
Note: Before you uninstall the Power Scheme Task Plug-in, make sure that you
turn off the Power Scheme Task Plug-in Install policy.
See “Installing the Power Scheme Task Plug-in” on page 88.
To uninstall the Power Scheme Task Plug-in
1
In the Symantec Management Console, on the Actions menu, click
Agents/Plug-ins > Rollout Agents/Plug-ins.
2
In the left pane, under Agents/Plug-ins, click Power Scheme > Power
Scheme Task Plug-in Uninstall.
89
Managing power scheme settings
Collecting power scheme inventory data
3
In the right pane, configure the uninstall policy according to your needs.
For more information about policy configuration options, click the page and
then press F1.
4
Turn on the policy.
At the upper right of the page, click the colored circle, and then click On.
5
Click Save changes.
See “About managing power scheme settings” on page 86.
Collecting power scheme inventory data
The Power Scheme Inventory task lets you collect power scheme settings inventory
from managed computers.
To perform this task, you must install the Power Scheme Task Plug-in on the target
computers.
See “Preparing target computers for power scheme management” on page 88.
After you run the inventory task, you can view the collected power scheme settings
data in a predefined report.
See “Viewing power scheme inventory data” on page 92.
To collect power scheme inventory data
1
In the Symantec Management Console, on the Manage menu, click Jobs and
Tasks.
2
In the left pane, under Jobs and Tasks, click System Jobs and Tasks >
Power Scheme Tasks > Power Scheme Inventory.
3
On the Power Scheme Inventory page, configure the task according to your
needs.
See “About managing power scheme settings” on page 86.
Creating a Power Scheme Task
You can create custom power scheme management tasks and specify the power
scheme settings according to your requirements.
For more information, see the topic about creating a task in the IT Management
Suite Administration Guide.
90
Managing power scheme settings
Editing and deploying power scheme settings
To create a Power Scheme Task
1
In the Symantec Management Console, on the Manage menu, click Jobs and
Tasks.
2
In the left pane, under Jobs and Tasks, click System Jobs and Tasks,
right-click Power Scheme Tasks, and then click New > Task.
3
In the Create New Task dialog box, in the left pane, click Power Scheme
Settings Task.
4
In the right pane, configure the task according to your needs.
5
Click Ok.
See “About managing power scheme settings” on page 86.
Editing and deploying power scheme settings
Power Scheme Tasks let you create and activate different power scheme settings
on your managed Windows computers.
To perform the power scheme management tasks, you must install the Power
Scheme Task Plug-in on target computers.
See “Preparing target computers for power scheme management” on page 88.
Note that only one power scheme can be active on a computer at a time. When
you run more than one Power Scheme Task on a target computer, the task that
runs last sets the active power scheme. For example, you may run the Always On
Power Scheme task on all your computers. Later, you can run the Portable/Laptop
Power Scheme task on your notebook computers.
Note: The power scheme that the specified Power Scheme Task creates and
activates, is always named Altiris Power Scheme on the target computers. For
example, when you run Always On Power Scheme task, the created and activated
power scheme is named Altiris Power Scheme on the target computers.
To edit and deploy power scheme settings
1
In the Symantec Management Console, on the Manage menu, click Jobs and
Tasks.
2
In the left pane, under Jobs and Tasks, click System Jobs and Tasks >
Power Scheme Tasks.
91
Managing power scheme settings
Viewing power scheme inventory data
3
In the right pane, click a Power Scheme Task that you want to run and configure
the task settings according to your needs.
4
Click Save changes.
See “About managing power scheme settings” on page 86.
Viewing power scheme inventory data
You can use a predefined report to view the power scheme inventory data. The
report lets you see the power scheme settings that are active on the client
computers.
To collect the power scheme inventory data, you must run the Power Scheme
Inventory task on target computers.
See “Collecting power scheme inventory data” on page 90.
To view power scheme inventory data
1
In the Symantec Management Console, on the Reports menu, click All
Reports.
2
In the left pane, under Reports, click Power Scheme > Power Scheme
Settings.
See “About managing power scheme settings” on page 86.
92
Chapter
8
Symantec Remote Access
Connector
This chapter includes the following topics:
■
About Symantec Remote Access Connector
■
Symantec Remote Access Connector configuration file
■
Creating the Remote Access Connector configuration file template
■
Importing the Remote Access Connector configuration file
■
Enabling right-click menu to use the Remote Access Connector options
About Symantec Remote Access Connector
Symantec Remote Access Connector is an IT Management Suite 7.6 application
that lets you configure and integrate a third-party remote connection tool such as
Microsoft® Remote Desktop Connection or Bomgar™ Remote Support Solution
with IT Management Suite. You can then use the third-party tool to connect to a
client computer.
The Remote Access Connector tool has the following highlights:
■
You do not require a license to use the Remote Access Connector tool. However,
you do require a license for the third-party remote connection tool that you want
to integrate with IT Management Suite.
■
You can integrate more than one remote connection tool. The multiple tools can
be accessed from the right-click option in Symantec Management Console.
See “Enabling right-click menu to use the Remote Access Connector options”
on page 97.
Symantec Remote Access Connector
Symantec Remote Access Connector configuration file
■
94
You can install Remote Access Connector individually or as a part of Client
Management Suite.
For the first-time user
As a first-time user, you must perform the following actions to use the Remote
Access Connector:
Table 8-1
Options for the first-time Remote Access Connector user
Actions
Topics
Create a configuration file based on the suggested
template or modify the default file as per your
requirements.
1
See “Symantec Remote Access Connector
configuration file” on page 94.
2
See “Creating the Remote Access Connector
configuration file template” on page 95.
Import the updated configuration file to enable the
right-click menu options in the Symantec Management
Console.
1
See “Importing the Remote Access Connector
configuration file” on page 96.
2
See “Enabling right-click menu to use the Remote
Access Connector options” on page 97.
See “Symantec Remote Access Connector configuration file” on page 94.
See “Creating the Remote Access Connector configuration file template” on page 95.
See “Importing the Remote Access Connector configuration file” on page 96.
See “Enabling right-click menu to use the Remote Access Connector options”
on page 97.
Symantec Remote Access Connector configuration
file
The Symantec Remote Access Connector configuration file lets you add or modify
the configuration details to enable the use of a third-party remote connection tool.
The configuration file is an XML-based file that has the following configuration
details:
<?xml version="1.0" encoding="utf-8" ?>
<remoteTools>
<remoteTool Name="Bomgar">
<API type="HTTP">
<URL>https://support.example.com/api/client_script?type=rep&
operation=generate&action=start_pinned_client_session&search_string=</URL>
Symantec Remote Access Connector
Creating the Remote Access Connector configuration file template
</API>
</remoteTool>
<remoteTool Name="MSRDP">
<API type="EXE">
<exeFullPath>>%windir%\system32\mstsc.exe</exeFullPath>
</API>
</remoteTool>
<remoteTools>
Table 8-2
The following table lists the tags used in the configuration file
Attributes
Description
remoteTool Name
You can provide a short name of the remote tool. The short name is seen in the
right-click menu option when you try to access the remote tool from the Symantec
Management Console.
Warning: If this attribute is not present or the value is empty, the system will not import
the configuration file and display an error.
API type
This tag describes the type of API connection. The values can be HTTP or EXE. For
the HTTP type, you must provide the API URL for the third-party tool. If you update
the third-party tool, you must verify the URL.
For Bomgar API URL, refer to the Bomgar API Programmer's Guide at the following
location:
https://www.bomgar.com/docs/content/integrations/api/index.htm
For the EXE type, you must provide the full path of the remote tool that is available on
the Notification Server computer. You can also add the path as an environment variable
for ease of use. If you access Symantec Management Console from a different
computer, ensure that the remote tool is installed on the computer.
The default file contains configuration for Microsoft® Remote Desktop Connection
application.
Warning: If this attribute is not present or the value is empty, the system will not import
the configuration file and display an error.
See “Creating the Remote Access Connector configuration file template” on page 95.
Creating the Remote Access Connector configuration
file template
The default Remote Access Connector configuration file is available to you when
you install IT Management Suite 7.6. The location of the default file is <install
directory>:\Program Files\Altiris\Notification
95
Symantec Remote Access Connector
Importing the Remote Access Connector configuration file
Server\NSCap\bin\Win32\X86\RemoteTemplate. However, if required, you can
recreate the default configuration file template and save it at another location.
The default file contains configuration for Microsoft® Remote Desktop Connection
application.
To create the configuration file template
1
From the Symantec Management Console, open Settings > Console > Remote
Tool Integration and click Create Template Configuration.
2
Save the RemoteToolTemplate.config file at an accessible location.
See “Symantec Remote Access Connector configuration file” on page 94.
See “Importing the Remote Access Connector configuration file” on page 96.
Importing the Remote Access Connector configuration
file
You can customize the default configuration file template if required and import the
modified file to access the third-party remote connection tool.
To import the remote access connector configuration file
1
From the Symantec Management Console, open Settings > Console > Remote
Tool Integration and click Import Configuration.
2
In the Import configuration of remote tool dialog box, click Choose File,
select and open the modified .config file, and then click Import.
Warning: If the configuration file size exceeds 4 MB, then the application
displays an error.
XML validation checks while importing the file
Symantec Remote Access Connector does the following validation checks while
importing the configuration file:
■
The <remoteTools> and <remoteTool> nodes are present.
■
The <remoteTool> attribute Name is present and the value is not empty.
■
The <API> node is present.
■
The <API> attribute <type> is present and the value is either HTTP or EXE.
96
Symantec Remote Access Connector
Enabling right-click menu to use the Remote Access Connector options
■
If the <API> attribute <type> is HTTP, then the child node <URL> is present and
the value is not empty.
■
If the <API> attribute <type> is EXE, then the child node <exeFullPath> is
present and the value is not empty.
■
If the <API> attribute <type> is EXE, then the second child node is
<parameteres>.
See “About Symantec Remote Access Connector” on page 93.
See “Symantec Remote Access Connector configuration file” on page 94.
See “Enabling right-click menu to use the Remote Access Connector options”
on page 97.
Enabling right-click menu to use the Remote Access
Connector options
When you install IT Management Suite 7.6 and Symantec Remote Access Connector
7.6, you must import the configuration file to enable the right-click menu in the
Symantec Management Console for remote access.
To use a remote connection tool from Symantec Management Console
1
Click Manage > Computers.
2
To launch a remote session with a computer, right-click the computer and
select Remote Access and then the tool of your choice. For example, select
MS RDP or Bomgar.
3
Save the file on Notification Server to start using the remote connection tool.
This .bat file contains the information that Notification Server requires to access
the third-party remote tool.
See “Importing the Remote Access Connector configuration file” on page 96.
97
Index
A
M
Application Metering Plug-in
installing 33
managed software
metering and usage tracking 65
managed software installed with a non-MSI-based
installer
metering and usage tracking 65
managed software products
creating manually 64
metering
managed software products 65
C
Client Management Suite
about 10
components 11
Release Notes 11
User Guides 11
computer
prerequisites for installing Symantec Management
Agent 30
pushing Symantec Management Agent 31
selecting for Symantec Management Agent
installation 31
configuring
Symantec Management Agent 32
context-sensitive help 20
CSV file
importing computers 31
D
documentation 20
H
help
context-sensitive 20
I
installing
Software management solution plug-in 35
Inventory Plug-in
installing 33
inventory policies
predefined 39
P
power scheme management
preparing managed computers 88
power scheme settings
deploying 91
editing 91
inventory 90
inventory data 92
report 92
Power Scheme Task
about 86
creating 90
features 86
Power Scheme Task Plug-in 88
settings 91
Power Scheme Task Plug-in
installing 88
uninstalling 89
upgrading 89
predefined inventory policies
cloning 39
using 39
prerequisites
Symantec Management Agent installation 30
R
Release Notes 20
Index
S
software
managing 67
software components to software products
associating 64
software license compliance
tracking 68
software licenses
tracking 68
Software management solution plug-in
installing 35
upgrading 35
software product
creating 67
software view
creating software product 67
Symantec Management Agent
configuration request interval 32
configuring 32
importing computers from CSV file 31
installation requirements 30
installing on selected Windows computers 31
prerequisites 30
pushing to Windows computers 31
selecting computers for installation 31
Symantec Management Agent for Windows
importing computers from CSV file 31
selecting computers for installation 31
Symantec Management Agent manual installation
selecting computers 31
T
tracking usage
of managed software products 65
of managed software products installed with a
non-MSI-based installer 65
U
upgrading
Software management solution plug-in 35
usage tracking
component and version level 65
software-based 65
99
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement