Академический Документы
Профессиональный Документы
Культура Документы
E1UR010IF11SE
PROPRIETARY AND CONFIDENTIAL INFORMATION These educational materials (hereinafter referred to as the "Materials") are for the end user's educational purposes only and are subject to change or withdrawal by CA at any time. These Materials may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. These Materials are confidential and proprietary information of CA and protected by the copyright laws of the United States and international treaties. EXCEPT AS OTHERWISE STATED IN THE APPLICABLE AGREEMENT, TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THESE MATERIALS "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THESE MATERIALS, INCLUDING WITHOUT LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED OF SUCH LOSS OR DAMAGE. The use of any software or product referenced in the Materials is governed by the end user's applicable license agreement. The manufacturer of these Materials is CA. Provided with "Restricted Rights." Use, duplication or disclosure by the United States Government is subject to the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7014(b)(3), as applicable, or their successors. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Copyright 2006 CA. All rights reserved.
Call CA technical services for any information not covered in this manual or the related publications. In North America, see your CA Product Support Directory for the appropriate telephone number to call for direct support, or you may call 1-800-645-3042 or 631-342-4683 and your call will be returned as soon as possible. Outside North America, contact your local CA technical support center for assistance.
Table of Contents
Introduction
Welcome . . . . . . . . . . Target Audience . . . . . Learning Path . . . . . . . About This Workbook. . Conventions . . . . . About This Course . . . . Course Length . . . . Prerequisite Skills . Course Agenda . . . Day 1 . . . . . . . . . . Day 2 . . . . . . . . . . Day 3 . . . . . . . . . . Course Objectives . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. x .. x .. x . . xi . xii . xiii . xiii . xiii . xiii . xiii . xiv . xv . xvi
Identify Unicenter DSM Architecture . . . . . . . . . . . . . . . . . . 1-7 Common Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7 Define the Management Database . . . . . . . . . . . . . . . . . . . . 1-9 Common Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9 Asset Centric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-10 Describe Common Asset Registration . . . . . . . . . . . . . . . . 1-11
Deploy the Scalability Server . . . . . . . . . . . . . . . . . . . . . . . 3-15 Deploy a Scalability Server and Validate the Installation . . . . . 3-16 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17
Create Queries
6 Create Queries
Run a Pre-existing Query . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3 Create a New Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6 Create a Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-11
7 Create Groups
Create Static Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3 Create Dynamic Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5 Build Nested Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Create a Dynamic Group of Dell Systems Running Linux . . . . . . 7-9 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-10
9 Deliver Packages
Create a Basic Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4 Register an MSI Package . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 Configure MSI Source Point Resiliency . . . . . . . . . . . . . . . 9-11 Install Packager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-13 Create a Packager Package . . . . . . . . . . . . . . . . . . . . . . . . 9-15 Register a Packager Package . . . . . . . . . . . . . . . . . . . . . . . 9-17 Convert a Packager Package to MSI . . . . . . . . . . . . . . . . . 9-19 Import and Export Software Package . . . . . . . . . . . . . . . . 9-21 7
Create Software Definitions . . . . . . . . . . . . . . . . . . . . . . . . 13-8 Conduct a Heuristic Scan . . . . . . . . . . . . . . . . . . . . . . . . . 13-12 Task Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-15 Conduct a File Collect Task . . . . . . . . . . . . . . . . . . . . . . . 13-16 Create a Combination of a Heuristic and File Collect Task . . . . 13-19 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-20
Create a New Asset Job . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-6 Create a Secure Configuration Files Job . . . . . . . . . . . . . . . . .15-8 Assessments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-9
16 Create Policies
Create an Event-based Policy . . . . . . . . . . . . . . . . . . . . . . 16-3
Create a Query-based Policy . . . . . . . . . . . . . . . . . . . . . . . 16-8 Create a Query-based Policy . . . . . . . . . . . . . . . . . . . . . . . . 16-10 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-11
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-10
Manage Unicenter Remote Control Sessions . . . . . . . . . . . . 18-5 Record, Playback, and Convert Recordings . . . . . . . . . . . . 18-13 Record Unicenter Remote Control Sessions . . . . . . . . . Playback Recorded Unicenter Remote Control Sessions Convert Recorded Unicenter Remote Control Sessions . Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-13 18-15 18-16 18-19
21 Asset Intelligence
Position Asset Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . 21-3 Install PHP: Hypertext Preprocessor . . . . . . . . . . . . . . . . . 21-4 Move the php.ini file . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-5 Uncomment two extensions . . . . . . . . . . . . . . . . . . . . . . . 21-6 Add C:\PHP to the system PATH variable . . . . . . . . . . . . . . 21-7 Update the Web Service extension to allow access to php-cgi.exe 21-8 Install Unicenter Asset Intelligence . . . . . . . . . . . . . . . . . 21-10 Configure Unicenter Asset Intelligence . . . . . . . . . . . . . . 21-13 Employ Unicenter Asset Intelligence . . . . . . . . . . . . . . . . 21-19
10
Asset Intelligence
11
Asset Intelligence
12
Introduction
xi
Introduction
Welcome
Slide 1
Target Audience
Welcome to Unicenter Desktop Management Foundation: Partner Certification training by CA. This course was specifically designed for CA Partner Certification. In your jobs, you are responsible for demonstrating Unicenter Desktop Management. As your client continues to increase the size and complexity of their business, their Enterprise Managementresponsibilities are growing exponentially.
Slide 2
Learning Path
This course will show you how to manage users for all security systems and directories from a single point of control using Unicenter Desktop Management Foundation. To learn about additional training solutions designed for your job role or this software product, visit gems.ca.com/Gemsmarketing/CourseFinder.asp Here you will find links to the Catalog, Learning Paths, Registration, and Locations/ Schedules. Learning Paths will help you determine the best training combination to enhance job performance, learn advanced skills, or become certified.
Notes
xii
Introduction
Interactive Demonstration
Skill Practice
Skill Builder
Notes
xiii
Introduction
Conventions
The following conventions are used throughout your Student Workbook: Convention Use Bold Italics GUI elements New terms Variable values Emphasis Titles of books Example Click OK to continue. ...the Name text box. A dialog is a window that appears to collect information from the user. Enter a range from 0 to n, where n equals the number of tapes. Do not erase the backup tapes. See the Unicenter TNG: Getting Started Guide. Refer to the Special Training Manual by IBM. Quotation Marks Computer Text Computer Text Italics SMALL CAPS Reference to module titles and headings Commands to be typed (exactly as written) Variables to be replaced by the user with real values Names of keys See Administration for more information. At the prompt, type: C:\Program Files\myfolder At the prompt, type: C:\Program Files\foldername To reboot, press CTRL+ALT+DEL.
Notes
xiv
Introduction
Slide 3
Course Length
5 days
Prerequisite Skills
Basic IT skills Successful completion of CA Product Focused Training available on http:// partnercertification.ca.com Microsoft Windows or UNIX skills
Notes
xv
Introduction
Slide 4
Notes
xvi
Introduction
Day 2
Module 6: Create Queries
Task 1: Run a Pre-existing Query Task 2: Create a New Query Task 3: Create an Advanced Argument Query
Notes
xvii
Introduction
Notes
xviii
Introduction
Day 3
Module 12: Configure Inventory Hardware
Task 1: Access Hardware Inventory Task 2: Create a New Hardware Inventory Collect Task
Notes
xix
Introduction
Day 4
Module 17: Administer Unicenter Remote Control
Task 1: Control a Host with Unicenter DSM Explorer Task 2: Define Unicenter Remote Control Manager Policy Task 3: Create a Global Address Book Task 4: Control a Host with the Viewer Task 5: Manage Unicenter Remote Control Sessions Task 6: Record, Play Back, and Convert Recordings
Notes
xx
Introduction
Task 5: Filter a Report Task 6: Schedule and Publish a Report to an Ingres Table Task 7: Create a Report Using Active Directory Information Task 8: Create a Remote Control Report
Day 5
Module 20: Deploy Unicenter Patch Management
Task 1: Install Unicenter Patch Management Task 2: Execute the Patch Management Process Task 3: Create Patch Policy for Production Deployment Task 4: Run Pre-existing Reports Task 5: Customize the User Interface Task 6: Create a Patch Filter
Notes
xxi
Introduction
Notes
xxii
Introduction
Slide 9
Course Objectives
After this course, you will be able to:
Define Unicenter Desktop and Server Management Components Install Unicenter DSM Deploy Unicenter DSM Components Apply Central Configuration Set Security Parameters Create Queries Create Groups Create and Deliver Packages Employ the Web Console Organize the Library to Optimize Delivery Manage the Catalog Configure Inventory Hardware Configure Software Inventory Conduct a Template Inventory Create an Asset Job Create Policies Administer Unicenter Remote Control Produce Common Reports Add an Enterprise Domain Manager Deploy Unicenter Patch Management Manage Data in Unicenter Asset Intelligence
Slide 10
Slide 11
Notes
xxiii
Introduction
Notes
xxiv
1
Define Unicenter Desktop and Server Management Components
1-1
Module Objectives
After this module, you will be able to:
Identify Unicenter DSM Features Identify Unicenter DSM Architecture Describe Common Asset Registration
Module Overview
Unicenter Desktop and Server Management (DSM) helps your client to effectively manage continuous, detailed software and hardware inventory information. With Unicenter DSM, your client can manage software locally and throughout a large organization. The DSM automation process enables you to reduce the risk of error and create a faster job turnaround to improve service levels. In this module, you will be introduced to the common features Unicenter DSM provides for CA management products. These features will help your client save time and money by making inventory processes quicker and more accurate. You will learn about the architecture, management database (MDB), and common asset registration functionality of Unicenter DSM. With this knowledge, you will be able to show your client how to reduce costs by requiring fewer employees to perform inventory tasks.
Notes
1-2
Define Unicenter Desktop and Server Management Components Task 1: Identify Unicenter DSM Features
Slide 1-2
Slide 1-3
Remote installation of software packages Data transport infrastructure Deployment of software packages in various formats Packager Remote deployment of operating systems Software installation tracking
Notes
1-3
Slide 1-5
Remote control of desktops and servers Chat capability Transfer of files to and from remote systems Recording of remote control sessions
Task Summary
You have identified Unicenter DSM features that enable your client to use powerful, easy-to-employ tools that can improve the speed and accuracy of inventory tasks. Managing assets and software with a common interface and MDB enables greater control and reduces the risk of costly errors. In the next task, you will identify the common Unicenter DSM architecture.
Notes
1-4
Define Unicenter Desktop and Server Management Components Task 2: Identify Unicenter DSM Architecture
Slide 1-6
Slide 1-7
Unicenter DSM is recognized as a multitiered architecture comprised of one user interface tier, one scalability tier, and one agent tier. Each manager tier has its own common schema database called the MDB. CA product suites are integrated through the MDB. The MDB is a common Enterprise domain data repository that provides a unified database schema for management data stored by all CA productsmainframe and distributed. Full integration for IT infrastructure management is enabled through the use of the MDB with CA products. The MDB integrates management data from all IT disciplines and CA products. Customers can extend the MDB to include additional IT management data from non-CA software products and tools.
Notes
1-5
Common Architecture
Unicenter DSM r11 introduces a new common architecture. The following components are now common across all products:
Explorer Web Console Database Communication through the CAF Security Model Central Configuration Reporting Web Services Directory Integration Manager (Enterprise and Domain) Scalability Server Agent
Slide 1-9
Notes
1-6
Slide 1-11
Notes
1-7
This graphic represents the relationship between the Unicenter DSM architecture and the MDBs:
Notes
1-8
Slide 1-13
Architecture Components
Domain Manager
A manager is a collection of processes on a computer that comprise the primary interface for the database. A domain manager is the central manager that processes and controls all administrative tasks. It coordinates the work of subordinate scalability servers and agents. In large Enterprise domains, you can appoint several domain managers, which are controlled by one Enterprise domain manager.
Scalability Server
The scalability server provides a buffer point and resilience between end systems, or agents, and the manager. As the name implies, a scalability server provides for massive scalability. Rather than having all individually managed end systems communicating directly with a single manager, the load can be shared across multiple scalability servers. A scalability server is a distributed read-write interface for an agent because an agent does not communicate directly with the database. All communication to and from the scalability server goes through the scalability server API that is shared with the agents.
Engine
The engine is a central communication component operating between scalability servers and the domain database. It reads and writes data from and to a scalability server and replicates the common databases between the local domain and the Enterprise domain.
Notes
1-9
Agent
Agents exist on all managed end systems. Each agent performs tasks such as inventory collection, software package installation, and remote control hosting. Unicenter DSM provides a framework that merges all agent functions of integrated products. It simplifies management and minimizes resource consumption and port usage. The agent uses common components and a common messaging infrastructure.
Common Database
Unicenter DSM uses a common Enterprise domain data repository. The MDB provides a unified structure for the storage of management data from all CA products.
Task Summary
You have identified the common interface and architecture provided by Unicenter DSM for Unicenter Software Delivery, Unicenter Asset Management, and Unicenter Remote Control. This includes the MDB, which is the central, common storage point for all the assets in your clients domain. A complete, upto-date, and easily searchable database can make tasks for inventory control and software deployment easier. In the next task, you will describe common asset registration.
Notes
1-10
Define Unicenter Desktop and Server Management Components Task 3: Describe Common Asset Registration
Slide 1-14
Slide 1-15
An asset (ca_asset table) An asset source Properties that identify the asset
Registration consists of the generation of a unique identifier (UUID) and the population of the necessary tables that are used to track the asset in the system. Registration helps ensure that all common objects entering the system are assigned a UUID and duplicate objects entering the system are identified and grouped together under the correct UUID.
Slide 1-16
When installed, the Unicenter DSM agent registers with the scalability server and an asset or computer is created. External Asset types can be created from Unicenter DSM Explorer. These assets are registered when inventory is collected using the associated MIF file. The asset_uuid can be different for the Enterprise domain and local domain level MDB.
Notes
1-11
Unicenter DSM creates owned assets from the managed discovered asset when a Service Desk ticket is opened for a policy violation or a failed software distribution job. If the asset already exists as owned, Unicenter DSM only links it to the discovered asset, thereby avoiding duplication.
Task Summary
You have examined the way in which common assets are registered. This process is the same for each product in Unicenter DSM, helping ensure that your client can track an asset throughout the organization. All new assets are identified in a uniform way, making them easier to manage. This saves your client time and effort while remaining up to date and competitive.
Notes
1-12
Assessment
1 Which two manager types are available in Unicenter DSM? (Choose two.) a b c d e 2 Singular Domain Remote Scalability Enterprise
What writes data to and from scalability servers? a b c d MDB Agent Engine DSM Explorer
What does the CAF permit? a b c d Optimization of MDB Deployment of agents Sharing of common functionality Deployment of scalability servers
Notes
1-13
Notes
1-14
Slide 1-18
Module Summary
You should now be able to:
Identify Unicenter DSM Features Identify Unicenter DSM Architecture Describe Common Asset Registration
Unicenter DSM brings all the features of Unicenter Software Delivery, Unicenter Asset Management, and Unicenter Remote Control together in a single but powerful configuration. Elements such as the common interface and common MDB make management tasks easier and faster while common asset registration helps ensure the uniformity of asset identification. With Unicenter DSM, your client has single-point control over the inventory and deployment management tasks required to remain competitive. In the next module, you will install Unicenter DSM.
Notes
1-15
Notes
1-16
2
Install Unicenter DSM
2-1
Module Objectives
After this module, you will be able to:
Install Unicenter DSM Install the Unicenter Remote Control Component Open Unicenter DSM Explorer
Module Overview
Your client has expanded their operations to three new locations and this expansion has increased the workload for the IT department. Employees must be able to manage software delivery and asset management activities remotely and to apply consistent procedures and policies throughout the organization. The purchase of Unicenter DSM will help your client achieve these goals. In this module, you will install Unicenter DSM and help ensure that the installation was successful.
Notes
2-2
Slide 2-2
Slide 2-3
Exploration and preparation: During this phase, you specify the installation type (express or custom installation), verify existing software prerequisites or install missing software prerequisites, and select and start the installation of any other product functions included with the Unicenter DSM installation media. Distribution and configuration: During this phase, you provide information required to install Unicenter DSM components and relevant configuration settings required to start the installed components.
You can install and remove product components using the installation wizard. Many installation and configuration parameters and properties can be specified and changed using a command line interface.
Interactive Demonstration
Task Purpose: Install Unicenter DSM. 1 2 3 4 5 On your desktop, open the Windows 2000 Server VMware session and log in using the instructions provided in the dialog. Select Take a snapshot of the virtual machine. Type Pre-Install as the name of the snapshot. In Windows Explorer, in Shared Folders, navigate to the Z:\ClassMedia\UDSM folder. In the UDSM folder, double-click the Setup.exe file. The Desktop and Server Management installation wizard appears.
Notes
2-3
10 In the Select Installation method dialog, select Custom Installation and click Next. 11 Verify that each of the following installation components appears: Explorer Reporter Domain Manager: Infrastructure and Infrastructure Deployment Engine Scalability Server Agent Packaging Tools: OS Image Prepare System Documentation
12 In the Configure Manager dialog, verify that the following information is prefilled: Management Database Server: servername Instance: EI This is the Ingres database instance used by the MDB. EI stands for Embedded Ingres.
Notes
2-4
Username: ca_itrm
Note: This account is the default user for Ingres and will also be created as a local Microsoft Windows user. Password: edu2k Confirm Password: edu2k
13 Click Next. 14 Under Advanced Manager Configuration, click Domain Manager. 15 Select Standalone and click OK. 16 Click Next. 17 Under Advanced Manager Configuration, select Engine. Leave the Engine field blank because you will use the default engine, SystemEngine, created during installation. 18 Click OK. Note: In the Configure Scalability Server window, the Manager field will default to DSM servername. 19 Click Software Delivery. 20 In the Configure Scalability Server window, select Enable support for MSI Administrative installations and click OK. 21 Select Boot Server, accept the defaults and then click OK. 22 Click Next. 23 In the four Configure Agent windows that appear, accept the defaults. 24 Click Next.
Notes
2-5
For support reasons, leaving the default installation folders is best practice. However, if you cannot install to the default location, you can change the settings here. 28 Click OK and Next. The installation begins with the installation of Ingres and the MDB. The Setup Status window shows the status of the installation. 29 Revert to the Pre-Install snapshot prior to completion. You will verify the installation on the physical computer.
Notes
2-6
Task Summary
You have discovered first-hand that the installation of Unicenter DSM is quite simple. Your client can now apply critical configuration to the product that impacts its functionality. In the next task, you will install the Unicenter Remote Control component.
Notes
2-7
Slide 2-5
Home office workers who connect to computers on the corporate network Training and education centers that facilitate classroom and over-thenetwork courses Desk technicians who regularly investigate and solve problems without visiting sites
Slide 2-6
Unicenter Remote Control enables you to access multiple remote desktops with different operating systems concurrently. You can transfer files and chat with other users. Some key remote control features include:
Unicenter Remote Control viewer: This enables you to connect to remote systems. This viewer is fully integrated with the Unicenter DSM Administration interface or Unicenter DSM Explorer. However, it can be installed and run separately. Unicenter Remote Control host: The host function, which is a Unicenter DSM agent plug-in, runs on the computer you want to control. The Unicenter Remote Control viewer connects to the Unicenter Remote Control host and establishes a session. The Unicenter Remote Control host responds to keyboard and mouse input sent from the viewer and, in return, sends a video image of its desktop to the viewer.
Notes
2-8
Unicenter Remote Control replayer: This feature enables you to play back previously recorded host sessions and manage recently recorded or replayed sessions. Unicenter Remote Control Central Management: This feature facilitates central management through Unicenter DSM Explorer and the performance of global address book management, active session monitoring, and session audits. It also permits you to access permissions.
For more information about Unicenter Remote Control, refer to the Inside Remote Control Guide.
Interactive Demonstration
Task Purpose: Install the Unicenter Remote Control component. 1 2 3 4 In Windows Explorer, navigate to the D:\ClassMedia\UDSM folder. In the UDSM folder, double-click the Setup.exe file. The Unicenter Desktop and Server Management installation wizard appears. Select Install Unicenter DSM. On the Installer page, leave Modify selected. Note: If no other Unicenter DSM component is installed, the Modify, Repair, or Remove option page will not appear and the CA Unicenter Desktop and Server Management licensing agreement appears. 5 6 7 8 Click Next. On the Product Functionality page, select Remote Control. Click Next. On the Select Components and Features page, click Next. Unicenter Remote Control will add functionality to the domain manager, scalability server, and agent components.
Notes
2-9
10 Click OK and then click Next. Note: On the Settings Migration page, do not select Migrate Settings. Unicenter Remote Control has detected an earlier version of the agent installed on the Unicenter DSM server. The two versions can coexist. 11 Click Next twice. 12 Click Next again. Unicenter Remote Control begins the installation. You must wait a few minutes before the installation process is complete.
Task Summary
You have installed Unicenter Remote Control. Your client can provide remote access for their IT team to company computers anywhere on the network. This saves your client the expense of having IT personnel travel to remote sites. You are now ready to begin the delivery of Unicenter DSM agents to target computers. In the next task, you will open Unicenter DSM Explorer.
Notes
2-10
Slide 2-7
Interactive Demonstration
Task Purpose: Open Unicenter DSM Explorer. 1 On the Unicenter DSM Server, where Unicenter DSM has already been installed, click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management DSM Explorer. In the left pane of the Unicenter DSM window, under DSM Explorer, expand Domain\Computers and Users. By default, the tutorial window appears. This can be closed for this course. 3 To view the list in the right pane, in the left pane, select All Computers. The right pane shows all computers that have a Unicenter DSM agent connected to the domain. The computer name is listed along with its Unicenter AM Status and Unicenter SD Status. Make sure that Unicenter AM Status and Unicenter SD Status are Operational for the Unicenter DSM Server. By default, installation of a domain manager for Unicenter Asset Management and Unicenter Software Delivery also installs the same agents.
Notes
2-11
Task Summary
You have verified that the installation of Unicenter DSM was successful. Your client can identify any unsuccessful installations immediately and take the steps necessary to enable each computer to have the product installed correctly. Your client can prepare all the computers in the organization to begin accessing the common features Unicenter DSM brings to Unicenter Software Delivery, Unicenter Asset Management, and Unicenter Remote Control.
Notes
2-12
Assessment
1 Which installation method permits the greatest flexibility? a b c d 2 Direct installation Initial installation Custom installation Compact installation
What is the name of the default engine created during installation? a b c d InstallEngine SystemEngine CustomEngine UniSystem Engine
Which asset describes the Remote Control host computer? a b c d The domain manager The Unicenter Remote Control viewer The computer controlling a Unicenter Remote Control session The computer being controlled in a Unicenter Remote Control session
Notes
2-13
Module Summary
You should now be able to:
Install Unicenter DSM Install the Unicenter Remote Control Component Open Unicenter DSM Explorer
Installation of Unicenter DSM has been successful. Your client can now install Unicenter DSM on their computers and verify that the process has been successful. Your client is prepared to deliver software and manage asset activities remotely. Now your client can employ the Unicenter DSM common features to manage their network with Unicenter Asset Management, Unicenter Remote Control, or Unicenter Software Delivery. In the next module, you will deploy the components of Unicenter DSM in preparation for software delivery.
Notes
2-14
3
Deploy Unicenter DSM Components
3-1
Module Objectives
After this module, you will be able to:
Deploy Unicenter DSM Agents Monitor Job Status Validate the Agent Deployment Deploy Agents on Linux
Module Overview
Your client must deploy agents to each of their numerous office locations. These agents will enable your client to use the Unicenter DSM architecture throughout their network. Your clients IT department first installs an agent on all laptops and desktops with which the domain manager communicates. After successfully installing Unicenter DSM, the IT department must deploy agents and scalability servers to complete the Unicenter DSM infrastructure. In this module, you will monitor the deployment of Unicenter DSM agents on other computers and verify that the deployment was successful. You will also have the option of deploying an agent on a Linux system.
Notes
3-2
Slide 3-2
Slide 3-3
The delivery of software to the target computer requires the addition of the Unicenter Software Delivery plug-in. Key Unicenter Software Delivery features include:
A small agent plug-in that resides on all target computers and is responsible for installing, updating, and removing software packages A powerful data transport infrastructure that optimizes network use Existing software packages in a multitude of packaging formats that can be imported to the software package library A powerful scripting language A packager that can be used to create installation images from an installed application Operating system installation management features that enable you to start systems and install entire operating systems in unattended mode Software installation tracking that can identify when, where, how, and by whom the programs were installed
Slide 3-4
Notes
3-3
There are four methods by which the Unicenter Software Delivery agent transfers files to targets for installation of the software packages: 1 Internal-NOS: This is the default method as installed. This means the target connects to a share on the domain manager and starts installing the package directly from the share. Internal-NOS-less: Files are transferred from the manager to the target before installation begins and the agent installs the package from its own subdirectory structure. Checkpoint and restart of file transfer is one of the advantages of this method. DTS-NOS-less: Files are transferred to the agent using Data Transport Service (DTS). The DTS agent must also be installed on the target. DTS has the additional benefits of bandwidth throttling and checkpoint and restart. Offline delivery can be scheduled using a CD-ROM.
4
Slide 3-6
The Unicenter Asset Management agent is located on the asset. The agent communicates with the scalability server to provide information about the asset. The engine on the domain manager collects this information from the scalability server and records it in the domain database. The scalability server also sends requests to the agent for performing tasks on the asset. To report on hardware and software inventory, the Unicenter Asset Management plug-in must be deployed. Infrastructure deployment involves:
Slide 3-7
Interactive manager installation The definition of scalability servers for this manager and the deployment of the scalability servers using the deployment wizard Deployment jobs to deploy agents to target scalability servers with appropriate agent features
Notes
3-4
Slide 3-8
When running Deployment Management (DM), the main steps of the agent deployment process are:
From the administrator computer, the DMClient manager component sends a request through the DMAPI component to the DM manager to install an agent on a target computer. The CAF plug-in component name for the DM manager is DMDeploy. The DM manager checks to see if DMPrimer is already installed on the target computer. If not, DMPrimer will be installed first on the target computer. The DM manager delivers the DMPrimer installer package and, if necessary, the DMBoot component. For example, a Microsoft Windows 9x target system requires the installation of DMPrimer. DMPrimer and the CA Messaging component are installed on the target computer. DMPrimer installation must run with elevated privileges. After DMPrimer is installed and DMDeploy has received the installation complete signal from the target computer, package deployment can be initiated.
Slide 3-9
Deployed: The same version of the package is installed on the target. Deploying: The deployment of this package to the target has already started. Machine Down: The target address has a valid name that can be resolved by the network to address translation but the computer cannot be contacted. Check that the target computer is switched on.
Notes
3-5
Slide 3-10
Machine Up: The address specified is valid and the computer is running. Package Newer: A newer version of the package is present on the target computer. Deployment will not be performed. Package Older: An older version of the package is already installed on the target computer. Deployment will be performed. Ready to Deploy: The address specified is valid and the computer is running. Unknown: The presence of the package on a target cannot be determined. Make sure the device exists.
Interactive Demonstration
Task Purpose: Deploy Unicenter DSM agents. The agent will be deployed to your clients test workstations to validate the process and login credentials. 1 2 3 4 5 Open the Windows 2000 Professional VMware session. Save a snapshot of the session and type Pre-Install for the name. In DSM Explorer, in the left pane, expand Domain\Control Panel\Deployment. Select Deploy DSM Agents or Scalability Servers. In the right pane, the Deployment: Introduction page appears. Click Next. The Job Type page appears. This is a deployment job. Jobs direct agents or engines to perform specific actions. Various types of jobs can be carried out on agents. The default deployment job type is Deploy Software to Target Computers. The deployment job name can be changed.
Notes
3-6
Click Next. The Deployment Payload page appears. You can deploy only one payload or package at a time. Each package is available in two versions, Microsoft Windows or Linux. The packages include plug-ins for Minimum Agent, Asset Management, and Software Delivery. The Microsoft Windows version involves the deployment of a base agent with the plug-in. There is also a package for deploying the Unicenter DSM scalability server.
7 8
From the list of packages, select CA Unicenter DSM Agent+all agent plugins version# Windows_x86 ENU. Click Next. The Target Criteria page appears. The deployment job must now be linked with the specific unit, or group of units, on which the job will be carried out.
10 Type yourcomputername for the Windows 2000 Professional VMware session. 11 Click Next. The Scan Targets page appears. 12 Click Scan. When the scan is complete, a green disk indicates that the computer responded. The computer name, IP address, and state are shown in the Discovered Computers list. 13 Click Next. The Target Selection page appears. The Discovered Computers list is now shown beside an empty Target Computers list. The computers listed in the Discovered Computers list must be moved to the Target Computers list. 14 From the Discovered Computers list, select Windows 2000 Professional yourcomputername and click the right arrow between the two lists. A User Credentials dialog appears.
Notes
3-7
Task Summary
You have delivered a Unicenter DSM agent and can quickly verify that deployment has been successfully initialized. Your client can be sure that each deployment made to their computers is performed accurately. In the next task, you will monitor the deployment job as it takes place.
Notes
3-8
Slide 3-11
Slide 3-12
Unicenter DSM provides monitoring indicators that include the deployment job state, summary, and status for transferring.
Interactive Demonstration
Task Purpose: Monitor the job status. 1 2 3 Expand Deployment Job Status. In the left pane, select the job by date. The right pane shows the status details of the specific job. Select Windows 2000 Professional yourcomputername. The State category shows the status of the deployment, which will progress through Posted, Deploying Primer, Transferring, and Installing to Installed. In the Summary area, the blue disk indicates that the job is Active. The Tasks area shows options for deleting, suspending, resuming, or aborting the job. Description indicates that These are the deployment jobs that currently exist on the deployment manager. Status for Transferring shows the percentage of the deployment job completed. This value keeps changing until it reads 100 percent. When the job is complete, State changes from Transferring to Installing and the disk turns green.
Notes
3-9
Task Summary
The final stages of the deployment process, from transfer to installation, can now be monitored. Your client can check to see that deployment is proceeding with no problems. Any problems that do occur can be addressed immediately, saving your client time by not permitting a faulty deployment to proceed. In the next task, you will validate that the deployment has been completed successfully.
Notes
3-10
Slide 3-13
Interactive Demonstration
Task Purpose: Validate the agent deployment through a diagnostic check. 1 2 3 4 From the Windows 2000 Professional VMware workstation, on your desktop, right-click the Unicenter DSM systray. Choose Common Agent dialog appears. Properties. The Common Agent Properties
Select the General tab, which shows if the agent is registered to the Unicenter DSM server. From your desktop, open the Command Prompt shortcut. Type caf status at the prompt and press ENTER. Make sure that Running DSM services for the agent appears. The list of running Unicenter DSM services will be considerably smaller than the domain manager caf plug-in list. Take a snapshot of the Windows 2000 Professional workstation and type Agent-Installed for the name. On the Unicenter DSM server, in the left pane, expand DSM Explorer\All Computers. Select All Computers. The appearance of the asset in the left pane under All Computers confirms that deployment was successful. All computers in the list have Unicenter DSM installed.
5 6 7
You have validated the agent deployment through a diagnostics check. Next, you will verify the deployment by checking the inventory.
Notes
3-11
Interactive Demonstration
Task Purpose: Validate the agent deployment through an inventory check. 1 2 In the right pane, double-click agentname to see its home page. Select the Inventory tab. This tab lists the basic inventory gathered by the basic Unicenter DSM agent and includes information about the System, Processors, Operating System, System Services, Network Adapters, Video Adapters, Network, TCP/IP, File Systems, Local File Systems, and System Status. Scroll down to see the entire list. 3 4 In the left pane, expand agentname. Expand Inventory and select System Status. Notice that the system hardware scan was completed. This is further validation that the agent installation and subsequent scan were successful. 5 Shut down the Windows 2000 Professional VMware session.
Task Summary
You have confirmed the successful deployment of an agent to a target workstation. Validating the deployment process enables early detection and correction of errors in deployment jobs. Your client can save time by correcting errors before the job continues. In the next task, you will deploy agents on Linux.
Notes
3-12
Slide 3-14
Slide 3-15
A Unicenter DSM agent can be deployed on any Linux system in your clients organization in the same way that it was deployed on a Microsoft Windows operating system.
Interactive Demonstration
Task Purpose: Deploy agents on Linux. 1 2 3 4 5 6 7 8 9 On your desktop, double-click the VMware RHES 4.0 session. Log in to the Linux session using root and password as the credentials. Choose Applications Press ENTER. Scroll through the files and double-click the hosts file. The Gedit utility appears. Replace the word host with yourhostname in the utility. Save and close the file. Close the Gedit utility. File Browser. Type /etc in the Location field.
10 In DSM Explorer, in the left pane, expand Domain\Control Panel\Deployment. 11 Select Deploy DSM Agents or Scalability Servers. In the right pane, the Deployment: Introduction page appears. 12 Click Next. The Job Type page appears. 13 Leave the default selection and click Next.
Notes
3-13
Notes
3-14
26 Click Finish to start the job. Deployment Job Status displays the date of this job, its status as Active, the start time of the job, the number of targets as 1, and if the job is completed, failed, or active. 27 Validate the installation as you did for the Microsoft Windows deployment. Notice that /opt/CA will be the installation location of the files.
Task Summary
You have deployed an agent on a Linux system the same way you have deployed a Microsoft Windows agent. Unicenter DSM provides this convenient flexibility across different operating systems and enables your client to provide Unicenter DSM functionality to all their assets, regardless of their operating system. Unicenter DSM functionality provides greater compatibility between computers using different operating systems.
Notes
3-15
Hint
Using the Deployment Manager, deploy the server to the Windows 2000 Server VMware session.
Notes
3-16
Assessment
1 What is the default deployment job type? a b c d 2 Scalability Server Basic Agent plug-in Stage Software at Scalability Servers Deploy Software to Target Computers
What is the first component to be installed when deploying an agent? a b c d DMPrimer Systray icon Basic inventory Software delivery plug-in
Which two inventory items are gathered by the basic hardware inventory agent? (Choose two.) a b c d Local file systems Boot disk information CPU performance statistics Network adapter information
Notes
3-17
Notes
3-18
Slide 3-16
Module Summary
You should now be able to:
Deploy Unicenter DSM Agents Monitor Job Status Validate the Agent Deployment Deploy Agents on Linux
You have deployed basic Unicenter DSM agents, monitored the deployment job status, and validated that the agent was deployed successfully. Your client can deploy agents to all their locations worldwide and check each deployment job to verify that no errors occurred. Your client can also help ensure compatibility between Microsoft Windows and Linux operating systems by using Unicenter DSM on both. Your client establishes a solid infrastructure across their network when Unicenter DSM is installed on each computer. In the next module, you will apply central configuration.
Notes
3-19
Notes
3-20
4
Apply Central Configuration
4-1
Module Objectives
After this module, you will be able to:
Examine Central Configuration Configure Unicenter Software Delivery Manager Policy Configure Scheduling for the Unicenter Asset Management Agent Apply Manager Configuration Policy to Move an Agent
Module Overview
Your clients scalability server has undergone a hardware upgrade. They must test the server by having double the normal number of agents connect for software installation. Instead of the default 25 agents, the server will handle 50 simultaneous connections. Also, your client has determined that some custom settings must be applied to the Unicenter Software Delivery environment to improve efficiency. If a package is not completed in three days after delivery, it must be removed from the Software Jobs container. For optimal productivity on key business activities, some of your clients employees require the highest level of service for their servers, which cannot be attained when a scalability server is already being used by a large number of computers. The solution is to set up a scalability server with a light load. To direct an agent to report to this new server, you must create and apply a manager configuration policy. In this module, you will create a policy to set the scheduling of a scan for the Unicenter Asset Management agent. You will also change a policy for the Unicenter Software Delivery domain manager.
Notes
4-2
Slide 4-2
Slide 4-3
Policies
Unicenter DSM features central management of policies for managers, agents, and servers. A policy is a tool used to automate tedious maintenance and security tasks. As the administrator, your client can control and enforce the management of such policies throughout the organization with Unicenter DSM Explorer and the default computer policy with its predefined settings. Your client can also create customized policies according to your needs and apply these policies to computers and groups in your organization. All policies available in the domain are shown in the left pane of Unicenter DSM Explorer under Control Panel\Policy. The Unicenter DSM installation creates a default policy under Default Computer Policy\DSM with predefined settings. This policy and its settings act as a template for any new policies you create. Because you can change the default policy, any changes made to the policy or its settings are reflected in the new policy.
Slide 4-4
Configuration
Centrally managed configuration changes are applied using Unicenter DSM Explorer, which is connected to the Unicenter DSM domain manager. The Unicenter DSM domain manager stores configuration property values in the MDB. Configuration policy values from the MDB, stored in csm_* tables, are transmitted using the common configuration CCNF and CSM component plugins of the agents. All values are stored in comstore.xml on the various Unicenter DSM components. The values in the MDB can be set using Microsoft Windows Explorer or through cadsmcmd commands. Changes are transmitted to and applied by a Unicenter DSM agent running on the appropriate end system.
Notes
4-3
Parameters
To simplify the administration of parameters, an arbitrary number of parameters can be grouped together as part of a configuration policy. Instead of assigning single parameters to computers or groups, configuration policies are assigned. One configuration policy can be assigned to multiple computers or groups and one group or computer can have multiple configuration policies assigned to it. There are two types of management modes for the parameters in the default policy:
Slide 4-6
Locally managed parameters are controlled by applications that run on the local computer. Centrally managed parameters are controlled through the manager policies and are read-only for local applications. Centrally managed parameters take precedence over locally managed parameters.
Task Summary
You have examined central configuration. This feature of Unicenter DSM makes configuration much easier for your client and saves valuable time. Manual configuration of each installation of Unicenter DSM would occupy your clients IT staff when they could be performing other necessary tasks in the organization. Central configuration is carried out by the domain manager. In the next task, you will configure Unicenter Software Delivery policy at the domain manager level.
Notes
4-4
Apply Central Configuration Task 2: Configure Unicenter Software Delivery Manager Policy
Slide 4-7
Interactive Demonstration
Task Purpose: Configure Unicenter Software Delivery manager policy.
Notes
4-5
Notes
4-6
24 In the left pane, under Windows 2000 Server VMware\Configuration, right-click Configuration Policy and choose Request configuration report. The policy job will finish when the Windows 2000 server VMware session receives the policy. 25 Refresh the screen. In the right pane, under Reported Configuration, Detail indicates that a request has been received or completed. 26 In the left pane, under Windows 2000 Server VMware\Configuration, right-click Configuration Policy and choose View configuration report.
Task Summary
You can now configure manager policy for your clients server to improve efficiency. The ability to change policy settings helps enable your client to customize and adapt policies according to changing business needs. This saves time and money and keeps your client competitive. In the next task, you will configure scheduling for the Unicenter Asset Management agent.
Notes
4-7
Slide 4-9
A Unicenter DSM policy automates such jobs as scans. This eliminates the time required to perform jobs manually and the assignment of employees to carry out the jobs. Part of the automation capability Unicenter DSM provides is scheduling, which enables the user to select the time a job will be carried out and how frequently the job will occur.
Interactive Demonstration
Task Purpose: Change the scan schedule for the Unicenter Asset Management agent. 1 On the Unicenter DSM server, right-click the Unicenter DSM systray and choose Common Agent Properties. The DSM Properties - Common Agent dialog appears. Select Scheduling. View the schedule for Asset Management. You will modify this schedule using the domain manager. To close the DSM Properties - Common Agent dialog, click OK. In the left pane, right-click Configuration Policy and choose New Policy. Type AM Agent Schedule Policy in the Name field. Click OK. In the left pane, expand Configuration Policy\AM Agent Schedule Policy\DSM\common components\CAF. Select Scheduler. Select AM agent scheduled job.
2 3 4 5 6 7 8 9
Notes
4-8
10 In the right pane, double-click type. The Setting Properties dialog appears. 11 Type hour in the Value field. 12 Click OK. 13 In the left pane, right-click AM Agent Schedule Policy and choose Seal. The DSM Explorer dialog appears. 14 Click OK. 15 In DSM Explorer, apply this new policy to the All Computers group. When you apply this policy, choose Apply policies immediately. 16 Monitor the application of the policy to the DSM server by viewing Configuration\Configuration Jobs. 17 When the new policy has been applied to this computer, open the Unicenter DSM systray Common Agent Properties. 18 Select Schedule and verify the schedule has changed to Hourly.
Task Summary
In this task, you have created a policy to configure scheduling for the Unicenter Asset Management agent. Your client can save time and effort by assigning policies to automate such tasks for computers or groups instead of having employees perform them manually. In the next task, you will apply manager configuration policy.
Notes
4-9
Slide 4-11
When you move an agent to a new domain manager, history and installation records move with the agent. The workstation will be locked until the move is complete. Computers moving between domains can be set in an Enterprise domain environment. The Enterprise domain manager will automatically detect the situation and move the computer appropriately.
Interactive Demonstration
Task Purpose: Apply manager configuration policy to move an agent.
3 4 5
Notes
4-10
7 8 9
In DSM Explorer, in the left pane, expand Domain\Control Panel. Right-click Configuration and choose Explore From. A new Explorer GUI window appears for the Configuration folder. In the left pane, right-click Configuration Policy and choose New Policy. The New Configuration Policy dialog appears.
10 In the Name field, type Chicago Systems Policy and click OK. 11 In the left pane, expand Configuration Policy\Chicago Systems Policy\DSM\Agent\common agent and select common to show its contents in the right pane. Notice that serveraddress is locally managed. 12 Right-click serveraddress and choose Setting Centrally Managed. 13 In the right pane, double-click serveraddress. The Setting Properties dialog appears. 14 In the Value field, type 2000 server VMware name and click OK. 15 In the left pane, right-click Chicago Systems Policy and choose Seal. 16 Click OK. 17 In the left pane, expand Chicago Systems Policy\DSM \Agent\common agent and select common. In the right pane, notice the new value of serveraddress. The only object in this policy is the changed attribute. 18 In the left pane, right-click Chicago Systems Policy and choose Copy.
Notes
4-11
Interactive Demonstration
Task Purpose: Return an agent to the DSM server. 1 2 3 4 5 6 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Configuration Policy. Right-click Chicago Systems Policy and choose Un-Seal. Expand Chicago Systems Policy\Agent\common agent and select common. In the right pane, double-click serveraddress. Change Value to DSM server and click OK. In the left pane, right-click Chicago Systems Policy and choose Seal.
Notes
4-12
7 8 9
Right-click Chicago Systems Policy and choose Copy. In the left pane, expand Domain\Computers and Users\All Computers. Right-click Windows 2000 Professional VM computer and choose Paste Configuration Policies.
10 Select Apply Policies Immediately and click OK. 11 In the left pane, expand Windows 2000 Professional VM computer\Configuration. 12 Right-click Configuration Policy and choose Request configuration report. 13 Refresh the screen. 14 Right-click Configuration Policy and choose View configuration report. 15 In the left pane, expand DSM\Agent\common agent. 16 Select common. The value for serveraddress in the right pane is now the DSM servername.
Task Summary
You used the manager configuration policy to move an agent to a server with a smaller load and reversed that process by returning the agent to its original server. A configuration policy enables your client to assign multiple parameters to multiple computers in the organization, making distribution of parameters faster and more efficient. Distribution time is shortened and control over the distribution is more effective.
Notes
4-13
Hint
Change the Job Run Timeout parameter in the Software Delivery Agent folder.
Notes
4-14
Assessment
1 In which two ways are configuration policies managed in Unicenter DSM? (Choose two.) a b c d 2 Locally Globally Centrally Remotely
Where does the domain manager store configuration property values? a b c d MDB Agent cache MIF files at each agent Program files directory on the Unicenter DSM server
Which property changes when an agent is moved to another scalability server? a b c d agenttarget serveraddress reportingserver scalabilityserver
Notes
4-15
Module Summary
You should now be able to:
Examine Central Configuration Configure Unicenter Software Delivery Manager Policy Configure Scheduling for the Unicenter Asset Management Agent Apply Manager Configuration Policy to Move an Agent
You have created policies for automating tasks, which saves your client time. You have also reconfigured policies to suit the particular needs of your client, which provides flexibility in their operations. Your client can more efficiently use their Unicenter DSM assets by creating and applying a manager configuration policy. Your client can assign agents to scalability servers with light workloads and return other agents to their original servers. They can now increase server reliability and performance for key employees. In the next module, you will enable your client to eliminate any unauthorized use of its Unicenter DSM assets by setting security parameters.
Notes
4-16
5
Set Security Parameters
5-1
Module Objectives
After this module, you will be able to:
Integrate Microsoft Active Directory Structure Configure a Directory Synchronization Schedule Add Security Profiles and Class Permissions Change Permissions at the Object Level
Module Overview
Your client can implement effective security measures with Unicenter DSM to better protect their entire network. By setting security parameters, your client can prevent the unauthorized use of Unicenter DSM and protect trade secret information. In this module, you will integrate Microsoft Active Directory structure, configure a directory synchronization schedule, add security profiles and class permissions, and change permission levels.
Notes
5-2
Slide 5-2
Slide 5-3
Define query groups with a target that matches computers or users held in an organization, organizational unit, container, or group from the directory Target the deployment of the Unicenter DSM agent Authenticate users, including native-mode Microsoft Active Directory Authorize users by mapping security profiles to entities in the directory Produce reports using a hierarchy obtained from the directory
Notes
5-3
Multiple directories can be supported at the same time and the domain manager does not have to be a member of the directory. All directory access for user authentication uses Secure Sockets Layer (SSL) and is read-only. Supported directories include:
Microsoft Active Directory Novell NDS CA eTrust Directory Lightweight Directory Access Protocol (LDAP) Directory (LDAPS if using Secure Protocol)
Interactive Demonstration
Task Purpose: Integrate Microsoft Active Directory to a domain. 1 2 3 4 In DSM Explorer, in the left pane, expand Domain\Control Panel\Directory Integration. Select Add Directory. The Introduction window appears. Click Next. The Directory Name field appears. Type classroomdomainname.ca.com in the Directory Name field. By default, Active Directory is selected as the Directory Type. Leave this value. Click Next. Check that the fully qualified domain name of t2 is populated in the Server Name field. Leave Port as 389. If the domain is not detected, it will be necessary to type the name of the Microsoft Active Directory server. 7 8 Click Next. The Directory Binding window appears. To access the directory after it is added, type the username administratort2@classroomdomainname.ca.com and the administratorpassword for t2.
5 6
Notes
5-4
Click Next. The Base Directory Node window appears. Make sure that dc=classroomdomainname,dc=ca,dc=com is listed in the Base Directory Node field. Again, if the directory is found, this field will automatically prefill.
10 Click Next. The Choose Schema Mapping window appears. Leave the default, CADefaultActiveDirectory, selected in the Schema Maps list. You can select Define new mapping if you would like to create a new schema. 11 Click Next. The Refine/Define Schema Mapping window appears. No changes will be made to the Mapping Table, which lists DSM to Active Directory attribute mappings. 12 Click Next. The Finish window appears. This displays all the details you have chosen to add to the new directory. You can click Back to make any changes. 13 To add to the directory, click Finish. If successful, the Configured Directories window appears showing the added directory name and its description.
Task Summary
You have linked Microsoft Active Directory to the Unicenter DSM domain. This provides your client with the ability to define query groups, target the deployment of the Unicenter DSM agent, authenticate and authorize users, and produce reports based on a hierarchy. In the next task, you will verify that Unicenter DSM is up to date with Active Directory information by configuring a directory synchronization schedule.
Notes
5-5
Slide 5-6
Notes
5-6
When you edit the directory synchronization settings on the GUI, you change the configuration of the default directory synchronization job. You can also create a new directory synchronization job by running cmDirEngJob from the command line interface. When the job runs successfully, an .xml file is created in the Unicenter DSM logs directory. The file maps database users and computers to directory users and computers. The file name is cmDirREPXXX.xml, where XXX is a string that represents the time when the report was created. If you run the synchronization tool from the command line, you can change the name of the report file.
Slide 5-7
Notes
5-7
Interactive Demonstration
Task Purpose: Configure a directory synchronization schedule. Organizations find that their various Microsoft Active Directory structures change regularly. Your client has a synchronization schedule that is updated by default once a week. Your client has found this insufficient and needs to update their Microsoft Active Directory structure more often. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Control Panel\Directory Integration. Select Directory Synchronization. In the right pane, click Configure. The right pane provides the option to set synchronization to occur Once a day, Once a week, or Once a month. The default schedule of Once a week is not sufficient because changes are made daily to the Microsoft Active Directory structure at your clients organization. 4 5 6 7 Select Once a day. Click Save. Synchronization is now scheduled for Once a day. In the left pane, expand Engines\All Engines. Select SystemEngine. The job has a status of Waiting. When the task is complete, it will show OK. The command cmdirengjob will immediately execute a synchronization job.
Notes
5-8
Task Summary
You have configured Microsoft Active Directory synchronization and employed scheduling to improve the efficiency of directory updates. Your client can achieve faster, more efficient updating. In the next task, you will further enhance the security of your clients network by applying strict controls to the level of access users have to Unicenter DSM.
Notes
5-9
Notes
5-10
Slide 5-9
Class-level permissions: This is the default level of permissions. Class permissions are the access rights you specify on the Unicenter DSM object classes. Class permissions are applicable globally to all objects in an object class. Object-level permissions: Only security for computer groups is defined at this level, but each member of the group is affected. You can specify object permissions for each object in the Unicenter DSM system, for example, a computer, a user, or a job. By default, an object inherits the class permissions from its object class. Object-level permissions override classlevel permissions. Group-level permissions: Group permissions can be specified for any usercreated folders in the Unicenter DSM system. Group-level permissions override class- or object-level permissions.
Each secured object is associated with a security profile through an Access Control Entry (ACE). The ACE can be derived from the class-level, the objectlevel, or the group-level. All ACEs associated with an object form the access control list (ACL) for that object.
Slide 5-10
Notes
5-11
Interactive Demonstration
Task Purpose: Add a security profile for a user and then apply class permissions to that profile.
6 7 8 9
Notes
5-12
10 In the left pane, select GIS. 11 In the right pane, right-click yourusername. Choose Properties. 12 Select the Organization tab. Complete the Title, Department, and Company fields using your relevant information. 13 To choose a manager, click Change. 14 Type John in the Enter the object name to select (examples) field. 15 Click Check Names. Choose either of the names that appear and click OK. 16 Click OK. 17 Drag your DSM servercomputer from the Computers Organizational Unit (OU) to the GIS OU. 18 Close the Active Directory Users and Computers and Administrative Tools dialogs. 19 To re-synchronize the Active Directory objects with the Unicenter DSM objects, run cmdirengjob at the command prompt.
Notes
5-13
Skill Practice
Task Purpose: Add Andy Deavis as a WinNT security profile with full control. 1 Use the classroom domain name folder, not the classroomdomain.ca.com folder.
Notes
5-14
Task Summary
You have added a security profile, applied class permissions, and easily differentiated between or among users. These abilities help to maintain tighter security for your clients domains. In the next task, you will further increase your clients security options by changing security permissions at the object level.
Notes
5-15
Interactive Demonstration
Task Purpose: Change permissions at the object level. You must still be connected as Administrator. 1 2 3 4 5 6 7 In the left pane, under Domain\Computers and Users, select All Computers. In the right pane, right-click mglinux.localdomain and choose Permissions. Select Deavis security profile. This will prevent you from taking any action on this computer. Change the object access value to No Access and click OK. In the dialog that appears, click Yes. Right-click DSMservername - Domain and choose Disconnect. Right-click DSMservername - (not connected) and choose Connect as. Log in with Deavis credentials. The username is Deavis, the password is password, and WinNT is the security provider. You can determine as whom you are connected by selecting Unicenter DSM Explorer in the left pane. The connected user appears in the right pane. Notice that Deavis has no access to the mglinux.localdomain computer. 8 9 Right-click DSMservername - Domain and choose Disconnect. Right-click DSMservername - (not connected) and choose Connect as. Log in with administrator credentials. You can now access the mglinux.localdomain computer.
Notes
5-16
Skill Practice
Task Purpose: Add permissions to individual objects. Geraldine Jane is responsible for providing technical support for the CEO. She is the only member of the GIS staff who must have access to the CEO laptop TECRA01. Therefore, you must tighten security on TECRA01 so only Geraldine has rights to fully manage this laptop. 1 2 3 4 Add Geraldine to Security Profiles. Give her Full Control to all object classes. Restrict rights to READ for the GIS group on TECRA01. Give Full rights to Geraldine. To test the security, use Jane as the login for Geraldine and password as the password.
Task Summary
You have changed object-level permissions that had been established and applied. Permissions are a vital part of security control for Unicenter DSM. Being able to alter or correct them at the object level enhances overall security for your client.
Notes
5-17
Assessment
1 What are two advantages of directory integration? (Choose two.) a b c d e Boot from Microsoft Active Directory Create reports based on directory hierarchy Target the deployment of the Unicenter DSM agent Deliver a Unicenter DSM agent to a directory server Update Microsoft Active Directory or NDS directly from Unicenter DSM Explorer
What is the default synchronization schedule for a directory? a b c d Once a day Once a week On restart of the Unicenter DSM server On restart of the Unicenter DSM engine
Which type of permission can override all other types of security permissions? a b c d User Class Group Object
Notes
5-18
Which of these options is used to define role-based security? a b c d ACEs Global address books Security Role Class categories Security Object Class categories
Notes
5-19
Module Summary
You should now be able to:
Integrate Microsoft Active Directory Structure Configure a Directory Synchronization Schedule Add Security Profiles and Class Permissions Change Permissions at the Object Level
Your client can now control not only when and how Unicenter DSM is used, but also who can use Unicenter DSM by integrating Microsoft Active Directory structure, configuring directory synchronization schedules, adding security profiles, and assigning security permissions. By setting specific parameters, your client can prevent unauthorized use of Unicenter DSMa significant security requirement. In the next module, you will create queries for searching the Unicenter DSM database.
Notes
5-20
6
Create Queries
6-1
Create Queries
Module Objectives
Slide 6-1
Module Objectives
After this module, you will be able to:
Run a Pre-existing Query Create a New Query Create an Advanced Argument Query
Module Overview
One of the most beneficial aspects of Unicenter DSM is its ability to place assets in inventory. Your client requires a search of one of their databases for specific inventory data. The Unicenter DSM query function will be used to locate and run a query for the search. When Unicenter DSM is installed, the application not only contains a number of queries for inventory searches, it also provides the option to create customized queries for specific needs. In this module, you will run one of the queries provided with Unicenter DSM. You will also create a new query configured for a different search and create a more specific query that uses an argument.
Notes
6-2
Slide 6-2
Slide 6-3
Queries can be used as a basis for groups or reports. A query task runs a query on the engine if the query is submitted to the engine. It then displays the result under the selected query in the Queries folder.
Interactive Demonstration
Task Purpose: Locate and run a pre-existing query. You must run a query for preview and then submit the query to the engine. This directs processing to the engine rather than to the screen. You will also create a folder for the new query. 1 In DSM Explorer, in the left pane, expand Domain\Queries and select Computers. Note: You can disable the default Expand All in the left pane of DSM Explorer. On the menu bar, choose Tools Explorer GUI Options and then clear Automatically Expand Items on Select. 2 3 4 In the right pane, scroll through the Computers list and right-click Assets with DVD drive installed. Choose Run Query. The Query Preview dialog appears showing the query results. Click Save.
Notes
6-3
Create Queries
Interactive Demonstration 5 6 7 8 9 In the Save Query Result dialog, type DVD Drives as of Current Date in the Result name field. Click OK. From the Computers list, select Assets with DVD drive installed. The saved result appears. To see the list of assets, select DVD Drives as of Current Date. In the left pane, right-click Queries and choose New Folder. The Create New Folder dialog appears. Type My Queries in the Name field and click OK. The empty folder appears in the left and right panes under Queries. This folder can be used to store frequently used pre-existing queries.
10 In the left pane, select Computers. 11 Right-click Assets with DVD drive installed and choose Copy. 12 In the left pane, right-click My Queries and choose Paste. Select My Queries to view its contents. My Queries contains a copy of the Assets with DVD drive installed query. Notice that the saved results data from step 5 does not copy with the query. A move of the query can be accomplished by dragging and dropping the query to the My Queries folder. 13 Scroll through the Computer Queries list and right-click Assets with CA Unicenter Desktop and Server Management installed. 14 Copy this query to the My Queries folder. 15 From the My Queries folder, right-click Copy of Assets with CA Unicenter Desktop and Server Management installed and choose Submit to Engine. The Submit Query: Name dialog appears. 16 In the Name field, type DSM Installed Results and click Next. The Submit Query: Select Engine dialog appears.
Notes
6-4
17 The default engine is First Available. Select System Engine and click Finish. 18 In the right pane, double-click Copy of Assets with Unicenter Desktop and Server Management installed. The Result set of DSM Installed window displays Pending in the Execution Date column. After a few minutes, Pending will change to a date. Now you can double-click Result set of DSM Installed in the left pane to see the systems matching this query.
Task Summary
You have located an existing Unicenter DSM query, run a query for preview, submitted the query to an engine, and saved the query in a new folder. Your client can make effective use of any of the queries supplied with Unicenter DSM. Although there are several queries available, if a query to suit your specific requirements does not exist, you must create a new one. In the next task, you will create a new query.
Notes
6-5
Create Queries
Task 2: Create a New Query
Slide 6-4
Interactive Demonstration
Task Purpose: Create a new query. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, right-click My Queries and choose New. The Select Target dialog appears. From the list of target objects, select Computers and then click OK. The Query Designer dialog appears. In the left pane, from the Insert Argument list, select Inventory and then select Discovered Inventory. The Add Argument dialog appears. From the Add Argument list, expand Information\Inventory\General Inventory\System. Select Model. To close the dialog, from the Value list, select VMware Virtual Platform and click OK. In Query Designer, click Preview. The Query Preview dialog appears listing the results of the query. Click Close. In Query Designer, click View SQL. The SQL View dialog appears. This displays the SQL query used to extract information from the MDB. Scroll through the query to see the entire view. Click Close. In Query Designer, under Boolean Operators, select AND.
10 In Query Designer, in the left pane, select Discovered Inventory. The Add Argument dialog appears.
Notes
6-6
11 Expand Inventory\General Inventory\Operating System and select Operating System. 12 To close the dialog, from the Value list, select Windows 2000 Server and click OK. 13 In Query Designer, click Preview. The Query Preview dialog appears with the results of the query. Click Close. In Query Designer, VMware Virtual Platform and Operating System are listed. 14 Click OK. The Save Query dialog appears. 15 Type 2000 Server-VMware as the query name and click OK. The Query Designer and the Save Query dialog close. In the left pane, 2000 Server-VMware appears in the contents of the My Queries folder. 16 Select 2000 Server-VMware and then select Quick Preview.
Skill Practice
Task Purpose: Create a new query. Your client must determine which systems do not have Microsoft Service Pack 99. Create a new query that shows all computers with the Microsoft Windows operating system that do not have Service Pack 99 installed. 1 2 3 4 Use the NOT operator. Exclude Linux systems from appearing in the query results. To indicate the Service Pack version, type 99 in the list. Type Computers that do not have SP99 installed for the query name.
You have created a new query when no pre-existing query was suitable for your task requirements. Next, you will create a query using another query.
Notes
6-7
Create Queries
Interactive Demonstration
Interactive Demonstration
Task Purpose: Create a query using a directory query. Determine how many computers in the GIS group exist in the Unicenter DSM domain. 1 2 3 4 5 6 7
Slide 6-5
In the left pane, under Queries, right-click My Queries and choose New. The Select Target dialog appears. In the target list, select Computers and then click OK. The Query Designer dialog appears. Under Insert Argument, select Directory Query. In the left pane, expand Available Directories\classroomdomainname.ca.com and select GIS. Click OK. Select Preview. Your DSM servername appears. Click Close. Click OK and type GIS Computers Group for the query name. Click OK.
You can now create a query using a directory query. The Link Query argument in the Query Designer tool enables you to use existing queries to define the arguments for a new query. You can link queries together without having to redefine the criteria in a new query. You can also link a Computer type query with a User Accounts type query. The GIS group wants to determine which user accounts are associated with all GIS computers. Next, you will create another query to determine this using an argument.
Notes
6-8
Interactive Demonstration
Task Purpose: Create a query using a Link Query argument listing all user accounts on computers in the GIS group. 1 2 3 4 5 6 7 8 In the left pane, under Queries, right-click My Queries and choose New. The Select Target dialog appears. In the target list, select User Accounts and click OK. The Query Designer dialog appears. Under Insert Argument, select Link Query. Select the GIS Computers Group query. Click OK. Select Preview. The user accounts that have logged in to the GIS group computers appear. Click Close. Click OK and type GIS Computer Users for the query name. Click OK.
Skill Practice
Task Purpose: Create a query using two linked queries. GIS wants to identify new systems in the Unicenter DSM manager that are not using dynamic IP addresses. Existing queries to use are:
You have created a query using an argument. Next, you will create another query using wildcards for the search.
Notes
6-9
Create Queries
Interactive Demonstration
Interactive Demonstration
Task Purpose: Create a query using wildcards. GIS wants to determine which systems are part of the 192 IP subnet. 1 2 3 4 5 6 7 8 9 In the left pane, under Queries, right-click My Queries and choose New. The Select Target dialog appears. Select Computer Accounts. Click OK. The Query Designer dialog appears. In the left pane, under Insert Argument, expand Inventory\Discovered Inventory. The Add Argument dialog appears. In the Add Argument dialog, expand Inventory\General Inventory\Network. Select IP Address. In the Operator list, select Like. Type 192.* in the Value field. To close the dialog, click OK. In the left pane of Query Designer, select Preview. The Query Preview dialog appears.
10 Click Close and click OK. The Save Query dialog appears. 11 Type 192 Subnet for the query name. 12 Click OK.
Notes
6-10
Skill Practice
Task Purpose: Using Link Query, create a query to list all computers with a 192 Subnet reporting to your scalability server (Unicenter DSM server). The query designer parameter for the scalability server is found in: General Information\Computer\Relationship\Server Relations\Current Server = x
Task Summary
You have configured and created a new query using the Query Designer tool. Your client can use an existing query, a directory query, a Link Argument query, and wildcards. This provides a range of flexible options that enable your client to find the data they need. In the next task, you will create an advanced argument query.
Notes
6-11
Create Queries
Task 3: Create an Advanced Argument Query
Slide 6-6
Slide 6-7
To create this type of query, you must be familiar with the Unicenter DSM database, tables, and field values. Value DATE SECSPERDAY Content The current date Function Determines if the agent has run today
A constant for the number of Determines if the agent has seconds in a day (86400) run in the last n days
SECSPERHOUR A constant for the number of Determines if the agent has seconds in an hour (3600) run in the last n hours
Notes
6-12
Interactive Demonstration
Task Purpose: Create an advanced argument query. Your client must know who has run an agent scan in the last 10 days. You will create a new group for configuration and scheduling. You will then create a new query. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Queries. Right-click My Queries and choose New. The Select Target dialog appears. Select Computers and click OK. The Select Target dialog closes and the Query Designer dialog appears. In the Query Designer dialog, select Advanced Argument. Type Agent has run in the last 10 days in the Pseudo text field. From the Table list, select Module Status. From the <select field> list, select stdate and click the up arrow. Type >( after stdate in the Additional WHERE clause field. From the <select macro> list, select DATE and click the up arrow.
10 Type -(10* in the Additional WHERE clause field. 11 From the <select macro> list, select SECSPERDAY and click the up arrow. 12 Type )) in the Additional WHERE clause field. 13 Click OK. 14 To verify that the query works, in the left pane, select Preview. The workstations that have run during the last 10 days will appear in the Query Preview dialog. 15 Click Close. 16 Click OK. The Save Query dialog appears.
Notes
6-13
Create Queries
Interactive Demonstration 17 Type Agents run in the last 10 days in the Name field. 18 Click OK.
Task Summary
You have created an advanced argument query that can return specific asset inventory information. This enables your client to create detailed, customized asset inventory queries for their future inventory planning. These queries return asset data that enable accurate insights into the hardware and software asset list. Your client can make use of such information in budgeting for the most cost-effective asset upgrades and acquisitions.
Notes
6-14
Assessment
1 When you submit a query, which engine does the system default to? a b c d 2 Query Engine First Available System Engine Replication Engine
Which argument in the Query Designer is used when multiple queries are to be used together? a b c d Directory Inventory Link Query Advanced Argument
Notes
6-15
Create Queries
Module Summary
Slide 6-8
Module Summary
You should now be able to:
Run a Pre-existing Query Create a New Query Create an Advanced Argument Query
You have located existing Unicenter DSM queries and run them to determine asset status. Your client can also create new queries when no pre-existing query meets their specific needs. Your client can maintain correct and accurate inventory data as their asset holdings change. This enables efficient spending for upgrades and addition of assets and the elimination of redundant or unused assets. In the next module, you will simplify the control of assets and users in your clients organization by grouping them.
Notes
6-16
7
Create Groups
7-1
Create Groups
Module Objectives
Slide 7-1
Module Objectives
After this module, you will be able to:
Module Overview
Your client must have more control over their asset inventory. One way to do this is to categorize computers or users into groups. These groups will better enable your client to manage the special requirements of their departments. In this module, you will work with static and dynamic groups and nest groups one inside another.
Notes
7-2
Slide 7-2
Notes
7-3
Create Groups
Task 1: Create Static Groups
Slide 7-3
Interactive Demonstration
Task Purpose: Create static groups. You must create a static group and verify that the creation was successful. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, expand Domain\Computers and Users. Select All Computers. In the right pane, from the All Computers list, select the executive computer names WinME and WXPB while pressing CTRL. Right-click these selections and choose Make Group. The New Group dialog appears. Type Executives in the Name field. Type Executive static group in the Description field. Click OK. In the left pane, select Executives. WinME and WXPB are listed as members of the Executives group. The laptop belonging to the company CEO was missed when the group was originally created. Now it must be added to the group. 9 In the right pane, from the All Computers list, drag the laptop name TECRA01 to the Executives group in the left pane.
10 Select the Executives group and verify that three computers now exist in the group.
Notes
7-4
Task Summary
You have carried out the steps for creating static groups and confirmed that the procedure was successful. Your clients static groups can be manually adjusted quickly when their membership changes. New hires can be added or employees who have left the company can be deleted. In the next task, you will create dynamic groups that change automatically when a query result changes.
Notes
7-5
Create Groups
Task 2: Create Dynamic Groups
Slide 7-4
Slide 7-5
Interactive Demonstration
Task Purpose: Create a dynamic group. 1 2 3 4 In the left pane, right-click Computers and Users and choose New Group. The New Group dialog appears. Type GIS in the Name field. Select the Query tab. From the Associated query list, select the GIS Computers Group query. Note: A query can be built from the dynamic group query dialog by choosing the ellipsis instead of an associated query. 5 From the Evaluated by list, select SystemEngine. This enables you to configure the Evaluation period value. By default, it is set for 1440 minutes or 24 hours. Change the value to 60 minutes. Click OK. In the left pane, right-click GIS and choose Evaluate now. The DSM Explorer dialog appears with the Group Evaluated message. Click OK. Your Unicenter DSM servername appears in the right pane.
6 7 8
Notes
7-6
Skill Practice
Task Purpose: Create a dynamic group based on a query. 1 2 3 4 Assign the name NOSP99 to the new group. Use the computers that do not have the SP99 query. Change the Evaluation period value to 60 minutes. Evaluate the group.
Task Summary
In this task, you created a dynamic group that will automatically change when department membership in your clients organization changes. This is particularly useful where membership in large groups changes frequently. In the next task, you will build nested groups.
Notes
7-7
Create Groups
Task 3: Build Nested Groups
Slide 7-6
Slide 7-7
Interactive Demonstration
Task Purpose: Build a nested group. 1 2 In the left pane, right-click Executives and choose New Group. In the Name field, type Assistants and click OK. Assistants is now a nested group under Executives in the left pane. Each nested group has its own set of group details. In the left pane, expand Assistants\Group Details. Select Members of Groups. In the right pane, Executives appears. In the right pane, from the All Computers list, drag the Windows 2000 Professional VMware workstation to the Assistants group in the left pane.
3 4 5
Task Summary
You have created a nested group for Assistants in the larger defined group of Executives. Creating a nested group facilitates assigning permissions to a separately defined group. Using this process, your client can save the time required to establish and assign permissions to a specific group.
Notes
7-8
Create Groups Skill Builder: Create a Dynamic Group of Dell Systems Running Linux
Hint
Change the Operator value to Like and use a wildcard for Dell. Create the query in the My Queries folder. Use Dell-Linux for the group name.
Notes
7-9
Create Groups
Assessment
Assessment
1 What is required before a dynamic group can be created? a b c d 2 A query A static group A GroupEngine More than one computer in the domain
What is the default evaluation time period for evaluating dynamic groups? a b c d 1 hour 8 hours 24 hours 1 week
Which computers are user permissions configured for? a b c d Any computer Groups of computers Any administrator computer Any Unicenter DSM computer
Notes
7-10
Slide 7-8
Module Summary
You should now be able to:
The ability to easily create groups gives your client flexible control over software delivery and asset inventory. This enhanced control saves your client the time and money that would otherwise have been spent managing inventory and delivering software. Your client has established groups for each department related to the tools, hardware, and skills required to fill individual job roles. In a group, specific roles can be further grouped together. In the next module, you will install the web GUI.
Notes
7-11
Create Groups
Module Summary
Notes
7-12
8
Create and Deliver Packages
8-1
Module Objectives
After this module, you will be able to:
Create a Basic Package Register an MSI Package Configure MSI Source Point Resiliency Create a Software Package with Packager Import and Export a Software Package Import a Linux Package
Module Overview
Your client has acquired new software and must deliver this software to computers throughout the entire organization. Your client can perform this delivery more quickly and efficiently by packaging this software using the Unicenter Software Delivery library. In this module, you will create packages for installation using a simple script and a Microsoft System Installer (MSI) installation file. Your instructor will demonstrate how to install and use the Packager to create SXP installation files, convert SXP files to MSI files, and import and export packages.
Notes
8-2
Slide 8-2
Writing a script such as a batch or command file Writing a C+ or VBScript file Using the Unicenter DSM Software Management Packager Using an MSI installation file
After the installation script or files are created, the installation procedure must be tested before the script or files are registered in the Unicenter Software Delivery library. This will help ensure that any problems in the package can be resolved before software delivery.
Slide 8-3
A package includes the files, procedures, and instructions required to install an application to a target workstation. The package is then registered in the Unicenter Software Delivery library. Packaging a software application for delivery from the library is an integral function of Unicenter Software Delivery. The packaging process bundles software and data together for registration to the library. Optimally, these packages enable remote installation of the product.
Interactive Demonstration
Task Purpose: Create a basic package. You will create a .cmd file that places organizational HTML information on the desktop. 1 2 Start the 2000 Professional VMware session and close all other sessions. Open Notepad.
Notes
8-3
11 Browse to Desktop\ClassFiles\rbcpkg. Notice that the rbcpkg folder appears in the Look In field. Click Choose. The rbcpkg folder and its files are copied to Source, which defaults to the name Setup. 12 Click OK. 13 In the left pane, right-click Procedures and choose New The Register Procedure dialog appears. 14 On the Procedure tab, type Install in the Name field. 15 In the Register Procedure dialog, select the Embedded File tab and type rbcinfo.cmd in the File field. 16 Type rbcpkg as the subpath. 17 From the Parameters list, select the greater than sign (>), select Job Related Macros, and then select $rf Job Response File. Procedure.
Notes
8-4
18 Click OK. This is a Response File parameter and will be used by the batch file as a substitute for the %1 parameter. 19 Right-click RBCInfo 1.0 and choose Seal. The Create New Release dialog appears. 20 Click Cancel. 21 In the left pane, right-click RBCInfo 1.0 and choose Deploy. The Deploy Software Package wizard appears. 22 To proceed to the Targets selection page, click Next and expand All Computers. 23 Select 2000 Professional workstation and click Next. The Finish page appears. 24 You are prompted to Confirm your selection and schedule. In the Job Container field, type Install RBC page and click Finish. 25 In the left pane, expand Jobs\Software Jobs\All Software Jobs. 26 Select the Install RBC page container. This list contains the 2000 Professional workstation job. Monitor the job progress. 27 In the left pane, select 2000 Professional workstation. 28 In the right pane, select 2000 Professional workstation. 29 Select RBCInfo 1.0. The Job Container Target Job Properties dialog appears. On the Computer Job tab, you can view details about the job. 30 Select the Job Output tab. The display indicates 2-file(s) copied. 31 Click OK. Make sure the rbcinfo.htm page appears on the Windows 2000 Professional workstation on the desktop.
Notes
8-5
Task Summary
You have created a basic package and delivered it to a target computer. Your client can create packages for delivery to any of their network assets worldwide. Next, the package must be registered in the Unicenter Software Delivery library so it can be delivered. In the next task, you will register an MSI package.
Notes
8-6
Slide 8-4
Slide 8-5
Version rules Management of shared resources in the system Restoration of the pre-installation state of a computer Command line interface Application standardization method Installation of software that has elevated privileges controlled by the administrator Self-healing Advertising Installation of on-demand features
Slide 8-6
MSI manages the installation of applications on 32-bit Microsoft Windows platforms. These applications are encapsulated in the MSI package, which contains all the information needed by the MSI to run the user interface and install or uninstall the application.
Notes
8-7
Interactive Demonstration
Task Purpose: Register an MSI package. As the software administrator, you have been asked to verify that the Microsoft Visio Viewer application is available on all workstations. You must register this new application in Unicenter Software Delivery to make it available for delivery to new and existing workstations. 1 In the left pane, under Software Package Library, right-click All Software and choose Import MSI-package. The MSI Package Registration wizard appears. Select the default option, Register MSI package to the Software Library. Click Next. To navigate to the application source files, click ... (ellipsis). Navigate to: D:\ClassFiles\Apps\Usd\Packaged\vviewer Select the vviewer.msi file and click Open. In the wizard, click Next. On the CD-options page, click Next.
2 3 4 5 6 7
Notes
8-8
On the Customize page, click Add. If you do not want to add any additional customized procedures, click Next. The application will be registered in the Unicenter Software Delivery library.
10 Type Network Install-RBC: in the Procedure name field. 11 Type Custom RBC in the Procedure description field and click Next. 12 On the Feature Selection page, Microsoft Visio Viewer is already selected. Click Next. 13 On the Properties page, you must define custom properties for the procedure: a b Type ACCEPTEULA in the Property field and 1 in the Value field. Click Add to list. Type ASSOCIATE in the Property field and 1 in the Value field. Click Add to list.
Note: The value ACCEPTEULA must be defined as 1 so the user will not be prompted to accept the license agreement. If you want the selected viewer to be the default viewer for Microsoft Visio documents, the ASSOCIATE property must be defined. Without it, the program will display the first document clicked, but subsequent documents will require the full version of Microsoft Visio Viewer. 14 Click Next. 15 On the User Interface and logging options page, accept the defaults and click Finish. This concludes the procedure creation and the Customize page appears. Click Next.
Notes
8-9
Task Summary
You have defined a new application in Unicenter Software Delivery. An MSI package enables your client to make new applications available to all their employees. In the next task, you will configure MSI source point resiliency, which enables you to locate missing or damaged files at their source.
Notes
8-10
Create and Deliver Packages Task 3: Configure MSI Source Point Resiliency
Slide 8-7
Slide 8-8
HKEY_CLASSES_ROOT\Installer\Products\[GUID]\SourceList\ LastUsedSource In this example, GUID is a unique package ID for the particular product and package build used for installation. Many features of MSI, such as self-healing, are dependent on the installed target having the ability to reconnect to the source administrative installation using the file-sharing protocol Microsoft Server Message Block (SMB).
Interactive Demonstration
Task Purpose: Configure MSI source point resiliency. 1 Install the VViewer Administrative install procedure to the Unicenter DSM server. a b c Verify that the MSILib directory was created. It is located in: C:\Program Files\CA\Unicenter DSM\SD\ASM\MSILIB\[GUID] Install the Network Install-RBC procedure on the Windows 2000 Professional workstation. On the Windows 2000 Professional workstation, in Microsoft Windows Explorer, browse to the Z:\ClassFiles folder. Open the networksetup.vsd file. It is associated with Microsoft Visio Viewer.
Notes
8-11
4 5
Task Summary
MSI source point resiliency can be configured to help ensure that lost or damaged files can be restored from a source and successfully installed. This helps your client ensure that valuable data is not lost. In the next task, your instructor will demonstrate how to create a packager package.
Notes
8-12
Create and Deliver Packages Task 4: Create a Software Package with Packager
Slide 8-9
Slide 8-10
Unicenter Software Management Packager packages software and data to make them available for installation on target computers. It records all the information required for successful installation and packages this information using a format named SXP. SXP packages can be converted to MSI packages. The Packager can create installation images from an installed application. In addition, it captures all the changes that occur after an application has been installed. This information is collected automatically in a software package, which is ready for placement in the software package library.
Demonstration
Task Purpose: Create a package using Unicenter Software Management Packager. When the Unicenter Software Management Packager is first run, Unicenter Software Delivery performs a backup, which might be a lengthy process. 1 From the Windows 2000 Professional VMware session, click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management DSM Software Management Packager. Note: If the Create Product Version dialog does not appear in the Unicenter Software Management Packager, right-click Archive and choose Create Product Version. 2 Click OK and then click Backup.
Notes
8-13
10 Click Install. 11 Clear all selections and click Next. 12 Click Finish. 13 Run and then exit the newly installed software. Skip the product registration. 14 In the Software Management Packager Installation dialog, click Continue twice. 15 Click Finish. Note: If the Reset of Reference dialog appears, click Reboot.
To be distributed through Unicenter Software Delivery, a software program or document must be defined to the enterprise or domain manager library using a process called registration.
Slide 8-11
During the registration process, information about the program or document name, version, source, and installation procedures are defined to the database. After a program or document has been registered, it is ready for distribution or delivery.
Notes
8-14
In the next demonstration, your instructor will demonstrate how to register a Unicenter Software Management Packager package.
Demonstration
Task Purpose: Register packages to the Unicenter Software Delivery library. 1 Click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management Software Delivery Software Management Packager. Click OK. Expand Jasc_Animation_Shop. Right-click 3040 and choose Register Product. From the Manager list, select Search. From the Select a Server list, select DSM servername and click OK. Type Administrator in the User field. In the Security Provider, Authority/Domain field, click the down arrow and select Winnt://DSM servername. In the Password field, type the passwordforthe administratorofyourDSMserver and click Register.
2 3 4 5 6 7 8 9
10 Click OK. You can change the format of a created and registered package to MSI using the Unicenter Software Management Packager. This format increases the ease and speed of movement of packages from one computer to another. Next, your instructor will demonstrate how to convert a Unicenter Software Management Packager package to MSI.
Notes
8-15
Demonstration
Task Purpose: Create an MSI package using the Unicenter Software Management Packager. 1 2 3 4 5 6 7 8 9 Right-click Archive and choose Create Product Version. Type WinZip in the Product name field and type 8100 in the Version field. Click Continue. Navigate to Z:\ClassFiles\Apps\Usd\Source\WinZip 8.1 in Microsoft Windows Explorer. Double-click the WinZip81.exe file. Click Setup. Click OK twice. Click Next. Click Yes and then click Next. Select the WinZip classic version and click Next.
10 Select the Express setup and click Next. 11 Click Finish. 12 Close the WinZip application. 13 In the Software Management Packager installation dialog, click Continue twice. 14 Click Convert and then click OK. 15 Register this package to the Software library. 16 Click Finish. Note: If the Reset of Reference dialog appears, click Reboot.
Notes
8-16
Task Summary
Unicenter Software Management Packager enables your client to package the most recent software versions and software installation files for immediate delivery to their assets. When you create a package using Unicenter Software Management Packager, it is unregistered. You have seen how to register Unicenter Software Management Packager packages to the Unicenter Software Delivery library. This enables your client to store packages in one location for quick and easy access, saving time. When newer versions of software are packaged, outdated packages in the library can be replaced, keeping your clients package inventory up to date. The Unicenter Software Management Packager can also be used to convert a package to MSI format. A registered MSI package is available to all your clients employees and can be sent and received quickly, adding to business performance. In the next task, you will import and export packages.
Notes
8-17
Interactive Demonstration
Task Purpose: Import and export software packages. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library. Right-click All Software and choose Import Software package. The Register Software Package dialog appears. To open the Choose Directory dialog, click Browse. Browse to the D:\ClassFiles\Apps\Usd\Packaged folder. From the Packaged list, select Ad_aware and click Open. Click Choose. The Register Software Package dialog appears. The Path is shown as D:\ClassFiles\Apps\Usd\Packaged\Ad_aware in the Path field. Click OK. In the left pane, expand Software Package Library\All Software. You can drag items from Microsoft Windows Explorer to the software library. 9 In Microsoft Windows Explorer, browse to the D:\ClassFiles\Apps\Usd\Packaged folder.
10 Select each of the package directories using the SHIFT key. 11 Clear Cwordpad and Cnotepad using the CTRL key.
Notes
8-18
12 Drag the selection of directories to the All Software folder in the Unicenter DSM library. 13 When the Software specified is not unique message appears, click OK. This means the package is already registered in the library. 14 Under All Software, right-click RBCInfo 1.0 and choose Export Software package. The Export Software package dialog appears. 15 Click Browse. Browse to the D:\ClassFiles\Apps\Usd\Packaged folder. 16 Click New Folder and type rbcinfo as the name. 17 Select the new folder and then click Open. 18 Click Choose. The Export Software package dialog appears. Now D:\ClassFiles\Apps\Usd\Packaged\rbcinfo is in the Path field. 19 Click OK. 20 In Microsoft Windows Explorer, navigate to the D:\ClassFiles\Apps\Usd\Packaged\rbcinfo folder. The files in this directory can now be imported. Note: If the architecture warrants more than one domain manager, an enterprise domain can be used and packages can be distributed from the enterprise to the local managers.
Task Summary
You have imported or exported a software package in more than one format. This gives your client flexibility with different formats in different geographical locations. Software packages can be imported from software vendors who use different formats than your client. Unicenter Software Delivery also supports other operating systems. In the next task, you will import a Linux package.
Notes
8-19
Slide 8-14
Red Hat package manager (RPM): This is a powerful package management system using the command line. It is capable of installing, uninstalling, verifying, querying, and updating computer software packages. Each software package consists of an archive of files, along with information about the package such as the version and a description. UNIX System V Release 4 PKG: This is the standard packaging format for UNIX systems. Product Interchange Format (PIF): This is the CA standard for packaging and installing software solutions on UNIX and Linux systems. Developers of a CA solution create PIF installation packages using a CA utility named the Unicenter Software Delivery Software Manager Installer for UNIX. This utility can also be identified as the PIF Installer.
Interactive Demonstration
Task Purpose: Import a Linux package. 1 2 3 4 5 6 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library. Right-click All Software and choose Import PKG, PIF, RPM-package. The Register PKG, PIF, RPM-package dialog appears. Browse to the D:\ClassFiles\Apps\Usd\Source\Flex folder. Select the rpm file. Click Open and then click OK. Notice that the flex (Linux) 2.5.4a-26 package appears in the software library. Install flex (Linux) on the Linux server.
Notes
8-20
Task Summary
Unicenter Software Delivery enables a UNIX or Linux package to be imported like any other package. This means your client can use Unicenter Software Delivery to distribute software packages across their network regardless of the operating system that created the package. This improves efficiency and gives the organization a wider choice of software to deploy for their employees.
Notes
8-21
Assessment
1 What is the first requirement for MSI source point resiliency? a b c d Network installation to the agent Local installation to the scalability server Administrative installation to the domain manager Administrative installation to the scalability server to which the agent reports
What is the UNIX or Linux packaging format extension created by the Unicenter Software Delivery Software Manager Installer? a b c d PIF PKG RPM SXP
What does the Software specified is not unique message mean if it appears when importing software packages to the library? a b c d The package has been delivered to a target. The package is already registered in the library. The procedures to be imported exist on a different library package. The package was exported and then deleted and cannot be imported again.
Notes
8-22
Which process involves a software program or document being defined to the enterprise or domain manager library? a b c d Installation Registration Self-healing Substitution
Which MSI feature attempts to re-install damaged or missing files from the source used for the original installation? a b c d Installation Registration Self-healing Substitution
In which format does the Unicenter Software Management Packager record information initially? a b c d MSI MSN SXP HTML
Notes
8-23
Module Summary
You should now be able to:
Create a Basic Package Register an MSI Package Configure MSI Source Point Resiliency Create a Software Package with Packager Import and Export a Software Package Import a Linux Package
The ability to package standard groups of software has enabled your client to share their standardized software packages with locations worldwide. In addition, your clients entire global network of offices can help define the programs the organization chooses to use in the future. Packages are registered in the library, which can become very disorganized. In the next module, you will organize and optimize the library for best performance.
Notes
8-24
9
Employ the Web Console
9-1
Module Objectives
After this module, you will be able to:
Install the Web Console Search for Unicenter DSM Objects Deliver Software
Module Overview
Administrators at your clients organization who travel frequently require access to Unicenter DSM wherever they are. The Web Console is a browser-based user interface for Unicenter DSM, which can be installed on Microsoft Windows and Linux operating systems. The Web Console gives your clients administrators the ability to access Unicenter DSM through the Web and perform the most basic administrative tasks from a remote computer. In this module, you will install and employ the Web Console.
Notes
9-2
Slide 9-2
Slide 9-3
Install software Uninstall software Configure a software installation job Stop and restart a software installation job Run and preview the results of an existing query
Slide 9-4
The Web Console is platform-neutral. It runs on Microsoft Internet Explorer 6.0 or later and Mozilla 1.6 or later with a standard Internet connection. The Web Console on Microsoft Windows supports Microsoft Internet Information Server (IIS) 5.0, 5.1, 6.0, and Apache Web Server 2.0 or later. The Web Console uses Apache Tomcat. The default Apache Tomcat port numbers used are 8080 for startup and 8085 for shutdown. However, if these ports are already in use during installation, different ports will be automatically selected and used.
Notes
9-3
Interactive Demonstration
Task Purpose: Install the Web Console. You will modify the Unicenter DSM installation by adding a Web Console. 1 2 3 4 5 6 7 8 9 Close Unicenter DSM Explorer. In Microsoft Windows Explorer, navigate to the D:\ClassMedia\UDSM folder. Double-click the Setup.exe file. The Unicenter Desktop and Server Management Installation wizard appears. Click Install Unicenter DSM. On the Installer page, leave Modify selected and click Next. On the Select Product Functionality page, click Next. On the Select Components page, expand Domain Manager. Select Web Console. The Web Services option is automatically selected. This is a prerequisite for the installation. Click Next. The Installer Status indicates the current status of the installation.
10 In Installer Status, scroll down to Domain Manager Web Console and Web Services. 11 Verify that their status is INSTALL and click Next. Installation will take a few minutes. 12 Click Next. 13 Click Finish. 14 Close the Web Console.
Notes
9-4
Task Summary
You have installed the Web Console. With this function, your clients administrators can access the database and perform administrative tasks from a remote computer. In the next task, you will run a query using the Web Console.
Notes
9-5
Interactive Demonstration
Task Purpose: Employ the Web Console. You will use the Web Console to search for a group. 1 Click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management Web Console. DSM
2 3 4 5 6 7 8 9
Log in using your domain administrator credentials. The DSM Web Console dialog appears. On the Console Overview tab, in Quick Start, select Go Directly to a Group. In the Console Groups dialog, type GIS* in the Matches field and click GO. Select the GIS group. In the right pane, a list of computers in the GIS group appears in the Overview display. Select the Queries tab. In the Matches field, type 192* and click Go. In the right pane, select Query name. To see results of the query, select the Preview tab.
Notes
9-6
Task Summary
You have used the Web Console to access Unicenter DSM remotely as an administrator. Your clients employees can use the Web Console to work remotely when they are unable to be in the main office due to travel requirements. This enables the organization to operate continuously with no delays attributable to an administrator having no access to a database. In the next task, you will deliver software.
Notes
9-7
Slide 9-7
Interactive Demonstration
Task Purpose: Deliver software using the Web Console. 1 2 3 4 5 6 7 8 9 In the Unicenter DSM Web Console, select the Express Action tab. Under What would you like to do, select Install Software. Under What Software would you like to install, select Show me a complete list of software. Under Select one or more software packages, select Ad_aware (SXP) 1.0/00. Click Next. Under Where would you like to install the software, select Let me search for it. Under Search for computer(s), type us* in the Name field. Click Search. From the list of computers returned from the search, select the 2000 Professional VMware computer. This is the computer to which the software will be delivered.
10 Click Next. You will choose to schedule the delivery date and time and the installation date and time.
Notes
9-8
11 Under When do you want installation to start, select Later. 12 To schedule the date and time for the installation, select Later again. 13 Under Please enter a Date & Time for the Delivery to Start, select the calendar and select the date after this class. 14 Click OK. The calendar closes. 15 Click Next. 16 Under When do you want the installation to start, select Install at a later date. 17 Under Please enter a Date & Time for the Installation to Start, open the calendar and select a date. 18 Click OK. The calendar closes. 19 Click Next. 20 Under Would you like to configure any advanced options, select Yes. 21 Under Please amend the default job options, select Prompt Users (Windows only). 22 Select Execute Job if prompt times out. 23 Click Next. 24 Under Your installation is ready to proceed, type Install from WAC in the Job container name field. 25 Click Finish.
Notes
9-9
Task Summary
You have delivered software remotely using the Web Console. Your client can enable their administrators to employ a browser for immediate remote access to Unicenter Software Delivery data when they are away from their desks. By monitoring software jobs and deliveries while away from the IT department, administrators help to ensure that installation time is not lost because of travel needs. Administrators are more productive and your client saves money.
Notes
9-10
Assessment
1 If ports 8080 and 8085 are already in use, which ports will Apache Tomcat use? a b c d 2 It will use ports 8090 and 8095. It will use ports 8081 and 8086. It will automatically select random ports. It will not be able to install if these ports are unavailable.
Where does the Web Console access Unicenter DSM objects? a b c d MDB UDSM folder Domain manager Scalability server
In addition to the Web Console, which tool enables viewing of a software delivery job? a b c d Domain manager Remote Control Viewer Unicenter DSM Explorer Unicenter DSM Reporter
Notes
9-11
Module Summary
You should now be able to:
Install the Web Console Search for Unicenter DSM Objects Deliver Software
Your client has many employees who travel for business. Through the Web Console, these employees can access Unicenter DSM remotely to perform administrative tasks and retrieve database information. This helps ensure that business can be done from any location. In the next module, you will deliver packages.
Notes
9-12
10
Organize the Library to Optimize Delivery
10-1
Module Objectives
After this module, you will be able to:
Manage a Scalability Server Software Library Create Software Groups Create Procedure Groups Create a Software Policy Archive Packages Apply RAC Policy
Module Overview
Because your client frequently uses Unicenter Software Delivery, a number of software packages accumulate in the Unicenter Software Delivery library. To better manage and optimize the delivery of these packages, your client can create software and procedure groups. Your client can then distribute software packages to the scalability servers closest to the widespread organizational targets. In this module, you will enable easier access to software and efficient delivery of libraries or groups of software by managing the Unicenter Software Delivery library. You will assign software packages to the appropriate scalability server, create groups for software and procedures, create software policies, and archive packages. You will also reinstall packages in accordance with a crash policy.
Notes
10-2
Organize the Library to Optimize Delivery Task 1: Manage a Scalability Server Software Library
Slide 10-2
Slide 10-3
Software packages are created at the domain manager. They are delivered to a scalability server so they can be distributed to targets that are remote from the domain but close to the scalability server. Staging deployment packages to a server reduces network usage when large numbers of agents are being deployed.
Interactive Demonstration
Task Purpose: Manage a scalability server software library. You will stage a software package from the software package library to a scalability server. 1 2 3 4 End the 2000 Professional VMware session and start a session in 2000 Server VMware. In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software. Under the All Software folder, scroll through the list and right-click RBCInfo 1.0. Choose Stage. The Stage Software Package Wizard appears. The Stage Software Package Wizard is used to create a software job that stages software packages on scalability servers attached to the domain. 5 Click Next. The Scalability Servers selection page appears and prompts you to select the scalability server on which this job will be performed.
Notes
10-3
10 To begin the job, click Finish. A Setup Delivery Job dialog appears displaying the Job Container name created by the system. By default, Seal and evaluate Job Container and Activate Job Container are checked. 11 Select the Deliveries tab. Note: Add to library: RBCInfo 1.0 appears in the Job Order box as the software package selected for staging. The precise delivery time for this job is shown on the Job tab. 12 Select the Job Options tab. 13 Change the Job Timeout to 1 day. Note: This means the job will automatically fail if it cannot be delivered to Chicago in 1 day. 14 To close the dialog, click OK. 15 In DSM Explorer, in the left pane, expand Jobs\Software Jobs and select All Software Jobs. 16 In the right pane, double-click Stage RBCInfo to Chicago.
Notes
10-4
17 Double-click 2000 Server. 18 Right-click RBCInfo 1.0 and choose Properties. 19 To display the trace of the Data Transport Service (DTS), select the Delivery Trace tab. Click OK. Note: Agent deployment packages can be staged to scalability servers with the deployment manager.
Notes
10-5
Hint
The software to stage is Ad_Aware.
Notes
10-6
Task Summary
You have staged a software package from the software package library to a scalability server. Now, your clients network traffic can be managed more efficiently. You can verify a trace conducted on a delivery to help ensure the job has been performed properly. In the next task, you will facilitate your clients management of accumulating software packages by organizing these packages into groups.
Notes
10-7
Slide 10-5
The software library initially contains three predefined software groups: All Software, Unicenter DSM Software Packages, and Catalog. The All Software group contains all registered software packages. The Unicenter DSM Software Packages group contains all auto-registered Unicenter Software Delivery packages. The Catalog folder is initially empty; however, catalog groups can be added later. A software group provides a quick and easy way of installing a number of individual software packages by dragging the group to a target. A software group can also be used to organize packages logically. For example, the Office Software group might contain a word processing package, a drawing package, and a spreadsheet package. These packages can be installed together as part of the Office Software installation.
Interactive Demonstration
Task Purpose: Create software groups. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Software. Right-click Software Package Library and choose New Group. Software
Notes
10-8
4 5
Click OK. To add packages to the new software group: a b c In the left pane, expand Software Package Library. Select All Software. From the right pane, drag AboutTime, Iview, and QWS3270 to the Utilities group in the left pane.
Task Summary
You have created a software group and quickly added software packages to it by dragging them to the group. Your client can now create, move, and remove groups when necessary with minimal effort. In the next task, you will further optimize software delivery by creating procedure groups.
Notes
10-9
Slide 10-7
Procedure groups contain links to individual software packages and are used when defining installation jobs. They can be created after all packages have been defined. They also contain the procedures used for installing software packages. Procedures in a procedure group can be ordered so the jobs are run in a particular order.
Interactive Demonstration
Task Purpose: Create a procedure group. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Software. Right-click Software Package Library and choose New Group. The New Procedure Group dialog appears. Click OK. In the left pane, expand Software Package Library\All Software\R_Control. Select Procedures. Under Procedures, drag the Install Package procedure to the Generic Tasks procedure group. In the left pane, expand Screen_Settings. Select Procedures. Procedure
Type Generic Tasks in the Name field. The Comment field is optional.
Notes
10-10
10 Drag the Install Package procedure to the Generic Tasks procedure group. 11 In the left pane, expand Internet_Settings. 12 Select Procedures. 13 Drag the Install Package procedure to the Generic Tasks procedure group. 14 Select Generic Tasks and view its contents in the right pane. 15 In the right pane, right-click the second procedure listed. 16 Choose Re-position Move First.
Task Summary
Procedure groups specifically detail how your clients software packages will be installed and provide greater control over the installation process. Using procedure groups, your clients employees can install software packages for specific needs more productively and efficiently. In the next task, you will create a software policy.
Notes
10-11
Slide 10-9
A software policy group defines and controls which software packages computers will receive. This enables you to determine how jobs are run on computers that meet group membership conditions. Jobs can be set up and run automatically for computers that meet these conditions. They can also be set up and activated for members that do not conform to the policy.
Interactive Demonstration
Task Purpose: Create and define a software policy group. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Policies. Right-click Software Based and choose New Software Policy. The Create Software Policy Wizard appears. Click Next. The Packages and Procedures selection page appears. In the Software Packages and Procedures field, expand All Software\Microsoft Visio Viewer. Select Network Install-RBC and click Next. The Group selection page appears. Select Executives Group and click Next. The Finish page appears. Type Executives always get Visio Viewer in the SW Policy Name field. Select Open advanced Software Policy settings dialog when the Finish button is pressed. Click Finish. The New Software Policy dialog appears.
Notes
10-12
10 Select the Automation tab. 11 In the Degree of automation area, select Set up jobs for members not conforming to the policy. Note: This will create a job container that must be activated.
12 Select the Evaluation tab. 13 Select Enable ad-hoc target evaluation for this group. Note: When new computers are introduced or existing computers are reengaged, it is important for them to reach the appropriate state quickly. Jobs are set up for targets according to their software policy. The evaluation mechanism runs on a scheduled basis and also at target registration time, named ad-hoc. Newly registered targets are evaluated when they are registered without having to consider all other registered targets in the database. Using this approach, the scheduled evaluation frequency can be reduced to avoid heavy evaluation operations during business hours. 14 Click OK. 15 In the left pane, expand Policies\Software Based\Executives always get Visio Viewer. 16 Select Violators. The Violators list might take a few minutes to appear. It lists the workstations that exist in the Executives group that do not already have Visio Viewer. Note: WinME is not listed. It does not have a Unicenter Software Delivery agent and does not show any Installed applications. 17 In the left pane, under Domain, select Jobs.
Notes
10-13
Task Summary
You have created and defined a software policy group. Your clients software packages can now be successfully delivered. Now that packages have been delivered to your clients assets and do not have to be used again for some time, your client can archive them to save library space and provide quick access when they are needed. In the next task, you will archive packages.
Notes
10-14
Slide 10-10
Slide 10-11
Interactive Demonstration
Task Purpose: Archive packages. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software. Right-click QWS3270 and choose Archiving dialog appears. Select Apps. The Directory field contains the D:\ClassFiles\Apps path. Click New Folder and type arc_QWS3270 as the folder name. Select the folder. At the bottom of the Choose Directory dialog, click Choose. The Archive dialog shows the D:\ClassFiles\Apps\arc_QWS3270 path. Click OK. On your desktop, double-click the ClassFiles folder. Expand Apps\arc_QWS3270. Archive. The Archive
Notes
10-15
Task Summary
You have selected a software package from the software package library and archived it in a new folder. Archiving keeps packages not currently needed by your client in one location, makes locating these packages easy and quick, and saves time and effort. In the next task, you will create a policy to reinstall packages in the event of a crash.
Notes
10-16
Slide 10-12
Slide 10-13
The global setting, by default, is Deferred, which means jobs will be created to reinstall packages but will not automatically start. Each computer can have its own RAC policy, which then overrides the Common setting. In addition to Common, there are three other optional parameters that specify the RAC policy of the system: Optional Parameter Disabled Description No job container is set up for the computer. However, the installation records in the installations folder on the Unicenter Software Delivery server will be marked as removed when the Unicenter Software Delivery agent for the computer reports a new operating system installation. A RAC job container is created, which must be activated manually. It can be reviewed and modified. A RAC job container is created and activated, which initiates the delivery of job orders to the computer.
Deferred
Automatic
Notes
10-17
Interactive Demonstration
Task Purpose: Apply the RAC policy. 1 2 3 4 5 6 To verify that the RAC policy is set to Common for the agent, right-click 2000 Professional VMware session and choose Properties. On the Software Delivery tab, confirm the RAC policy value is Common and click OK. Set the Install procedure for RBCInfo 1.0 to Exclude from RAC. Right-click Install Procedure and choose Properties. Select Exclude from RAC and click OK. Revert the 2000 Professional VMware session to Pre-Install. Note: This will simulate a computer that has crashed or has been reimaged after being part of the Unicenter DSM infrastructure. Do not delete the workstation from the Unicenter DSM Explorer. 7 Using the MSI command line method, install the Unicenter Software Delivery plug-in to the Windows 2000 Professional VMware session. At the command prompt, type the following path and press ENTER: Msiexec /i z:\classmedia\UDSM\WindowsProductFiles_x86\AllAgents\AgtSD.ms i l*v C:\dsmsetupagt.log ADDLOCAL=ALL AGENT_SERVER=dsmservername /qn Note: Do not use /qn to install interactively. The MSI property ADDLOCAL=ALL is used for a default installation.
Notes
10-18
In the left pane, select All Computers. The AM Status of the Windows 2000 Professional VMware session is Not Installed, but the SD Status is Locked by RAC. Note: If SD Status is still Not Installed, wait a few minutes.
Expand Jobs\Software Jobs and select All Software Jobs. A RAC job will be ready for evaluation. RAC jobs will be set up for the Windows 2000 Professional VMware session to restore previously installed packages. There will not be a job to restore RBCInfo because it was excluded from the RAC policy.
10 Right-click the RAC job and choose Seal and Evaluate jobs.
11 Right-click the RAC job and choose Activate jobs. When the job is complete, the Windows 2000 Professional VMware session SD Status changes from Locked by RAC to Operational.
Task Summary
The RAC policy is an effective Unicenter Software Delivery emergency option that helps ensure the integrity of your clients computer systems. The IT team can configure the policy so software packages can be installed again if a crash occurs on a computer in your clients domain. The RAC policy enables the computer to return to a fully functional state as quickly as possible and helps ensure there is no downtime.
Notes
10-19
Assessment
1 Why are software packages created at the domain manager and then staged to the scalability server? a b c d They can be archived more easily. Agents do not have to report to the domain manger. They can be distributed to targets from the closest scalability servers. Software delivery job status does not have to be returned to the domain manager.
What occurs if a software group is distributed to a number of computers? a b c d Default procedures will be used. Jobs will be created to reinstall packages. Packages will remove the history of all installations. Procedure groups will be reordered and run in that order.
Which DSM component is used to automatically set up jobs for groups of computers? a b c d Static group Query group Dynamic group Software policy
Notes
10-20
Why is deleting a package not recommended? a b c d It will uninstall the package from the agents. It will remove the history of all failed installations. It will remove any workstations that only have archived software packages installed. It will remove the history of all installations and cause any packages that have dependencies on the deleted package not to work.
What does the RAC parameter Deferred mean? a b c d The newly installed agent will be set to Deferred and then be disabled after seven days. The jobs will be set to reinstall but will be deferred for one week before an automatic start. The newly installed agent status will be deferred until acknowledged by the DSM administrator. The jobs will be created to reinstall packages but will not automatically start until activated by the DSM administrator.
Notes
10-21
Module Summary
You should now be able to:
Manage a Scalability Server Software Library Create Software Groups Create Procedure Groups Create a Software Policy Archive Packages Apply RAC Policy
At your clients organization, creating software and procedure groups has resulted in better management of packages in the growing software library. Packages no longer in use can be conveniently archived. In addition, distributing packages to scalability servers has enabled more reliable delivery of packages to targets. These targets are remote to the domain but close to the scalability servers. Therefore, your client can more effectively manage their network use. Also, your client can rapidly recover from a system crash by using RAC policy to reinstall packages. In the next module, you will further enhance your clients software distribution by managing and configuring the software catalog.
Notes
10-22
11
Manage the Catalog
11-1
Module Objectives
After this module, you will be able to:
Create a Catalog Group Configure a Library Package Procedure to Be Catalog Enabled Populate a Catalog with Library Packages Request Packages from a Catalog
Module Overview
Your client links their computers in a catalog group so the appropriate software can be identified for each user. Your clients users must have access to packages in the software library when required. With this system for remote software delivery in place, your clients help desk and network administrators do not have to respond individually to multiple requests for the most recent versions of approved programs. In this module, you will create a catalog group for your clients computers and catalog a package procedure. You will also place packages in and withdraw them from the catalog.
Notes
11-2
Slide 11-2
Slide 11-3
Catalog groups make software available to groups of users through the catalog user interface. A catalog group must exist before software can be linked to it. After software has been moved or linked to a catalog group, an association is set up between a specific computer group and the catalog group. The catalog group is automatically created with the same name as the computer group.
Interactive Demonstration
Task Purpose: Create a group and assign it as a catalog group. 1 To create a catalog group, use the GIS query you generated in the Create Queries module. Type Open License Products as the group name. Note: 2 3 4 The group is populated with the DSM servername.
In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library. Drag the Open License Products group to the Catalog group. Expand Catalog and notice that the Open License Products group is now a member of the Catalog group.
Notes
11-3
Task Summary
You have created a group and assigned it as a catalog group by dragging it to the Catalog interface. Now, software approved by management at your clients organization is accessible to appropriate groups of users through the catalog interface. In the next task, to make a procedure just as easily accessible for your clients users, you will make it catalog enabled.
Notes
11-4
Manage the Catalog Task 2: Configure a Library Package Procedure to Be Catalog Enabled
Slide 11-4
Interactive Demonstration
Task Purpose: Configure a library package procedure to be catalog enabled. 1 2 3 4 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software\Adobe Acrobat Reader\Procedures. Right-click Install Package and choose Properties. The Properties dialog appears. On the Procedure tab, select Catalog enabled. Click OK. You would follow the same procedure for the Uninstall Package procedure after right-clicking Uninstall Package.
Skill Practice
Task Purpose: Enable the installation, reinstallation, and uninstallation procedures for the Adobe E-Book reader package to be catalog enabled.
Task Summary
All that is required to configure a library package procedure to be catalog enabled is to select only one check box. Your client can now add several packages to a catalog simply by dragging them to the catalog. In the next task, you will populate a catalog with library packages.
Notes
11-5
Interactive Demonstration
Task Purpose: Populate a catalog with library packages. 1 2 3 4 In DSM Explorer, in the left pane, select All Software. In the right pane, select Adobe Acrobat Reader. Drag Adobe Acrobat Reader to the Open License Products group in the left pane. In the right pane, drag Ad_aware to the Open License Products group in the left pane. Note: An error message appears stating that nothing in this transfer is catalog enabled. However, Ad_aware is still added to the group. Later in this module, you will verify that it will not appear in the catalog. 5 Click OK.
You have populated a catalog with library packages. Next, you will create a catalog group and publish software.
Interactive Demonstration
Task Purpose: Create a catalog group and publish software. 1 2 3 Catalog enable the procedures in About_Time. In the left pane, select All Software. In the right pane, right-click About_Time.
Notes
11-6
4 5 6 7
Choose Publish in catalog and click Next. Select GIS and click Next. To name the catalog group, type: GIS Applications Click Finish.
Skill Practice
Task Purpose: Publish the Adobe_EBook_Reader to the Open License Products catalog group.
Task Summary
You have populated software catalogs with available library packages. Your client can create new packages with new versions of software as the need arises and place these packages into the library. Employees will be able to access the packages for use on their computers. Packages must be deployed to target computers from the library. In the next task, you will use the catalog to request the deployment of a package.
Notes
11-7
Interactive Demonstration
Task Purpose: Request packages from a catalog. 1 On the Unicenter DSM server, click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management DSM Software Delivery Catalog. The DSM Software Delivery Catalog window appears. Note: The Unicenter DSM Software Delivery Catalog window can also be accessed from the Unicenter DSM systray. 2 3 Select Add Software. In the right pane, click Next. Notice that Adobe Acrobat Reader, E-Book Reader, and About_Time are listed. These were published in the GIS Applications group and the Open License Products group. Ad_aware is not available because it had no catalog enabled procedure. 4 5 6 7 Select Adobe Acrobat Reader. Click Next. The Select type of installation dialog appears. Select Install Package. Click Next. The Confirm order dialog appears.
Notes
11-8
8 9
Click to confirm that the software you want to order is Adobe Acrobat Reader. Select Notify me before delivery starts.
10 Leave Run as soon as possible selected. Click Finish. The Order in Progress dialog appears. 11 Select Show Order Status. 12 When Unicenter Software Delivery jobcheck appears, click Run. 13 In DSM Explorer, expand Jobs\Software Jobs and select Catalog jobs. The order for Adobe Acrobat Reader appears with Catalog as a prefix. When complete, confirm that Adobe Acrobat Reader has been installed on the Unicenter DSM server. Under the Show Status list, notice the status in the Software catalog display. 14 To update the window, click Refresh.
Task Summary
You have requested packages from a catalog. Your clients employees can now give users the ability to easily request packages that have been created and placed in a catalog if they have the Unicenter Software Delivery catalog installed. Your clients employees can also obtain new software requirements without increasing the workload of the help desk.
Notes
11-9
Hint
Authorized applications include Ad_aware, Filemon, and QuickTime Player. The computers in the Payroll group are the Unicenter DSM server and the Microsoft Windows 2000 Professional VMware computer.
Notes
11-10
Assessment
1 From where does the software catalog get new software packages? a b c d Library Scalability server Unicenter Software Delivery manager Unicenter Software Management Packager
Notes
11-11
Module Summary
You should now be able to:
Create a Catalog Group Configure a Library Package Procedure to Be Catalog Enabled Populate a Catalog with Library Packages Request Packages from a Catalog
You can now assist your client to enable their employees to access the software catalog so they can add, monitor, customize, or remove software with a simple wizard-based user interface. Administrators do not have to waste time performing these tasks and can turn their attention to other important matters. In the next module, you will configure inventory hardware.
Notes
11-12
12
Configure Inventory Hardware
12-1
Module Objectives
After this module, you will be able to:
Module Overview
Hardware inventory represents a challenge for large and constantly changing organizations. Using Unicenter Asset Management, your client can confirm the hardware and hardware attributes used in their organization. Unicenter Asset Management enables your client to manage extensive hardware inventories. In this module, you will access hardware inventory and create a new hardware inventory collect task.
Notes
12-2
Slide 12-2
Slide 12-3
The configuration of inventory detection modules on agents determines the inventory data collected.
Interactive Demonstration
Task Purpose: Access hardware inventory to view hardware attributes and performance data. Managing inventory with Unicenter Asset Management involves identifying the inventory collected by the default module configuration. 1 2 3 4 5 In DSM Explorer, in the left pane, expand Domain\Computers and Users. Select All Computers. In the right pane, double-click DSM Server. In the right pane, select Inventory. Scroll down to view inventory information. In the left pane, expand DSM Server\Inventory.
Notes
12-3
10 In the left pane, under System, select Memory. The Memory Bank values of the attributes appear in the right pane. 11 Double-click DIMM1. The Change Attribute Value dialog appears. The Memory Bank attribute has a value of DIMM1. 12 To close the dialog, click Cancel.
Task Summary
You have accessed basic hardware inventory using the default configuration. Your client can now begin to manage their hardware by viewing hardware attributes and performance inventory. Using Unicenter Asset Management, your client can maintain accurate and up-to-date information about their assets. In the next task, you will create a new hardware inventory collect task with new configuration values to enable your client to collect more specific information about their assets.
Notes
12-4
Configure Inventory Hardware Task 2: Create a New Hardware Inventory Collect Task
Slide 12-4
Slide 12-5
Interactive Demonstration
Task Purpose: Create a new hardware inventory collect task. You will add printer inventory collection to the Unicenter Asset Management scan. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Collect Tasks. Right-click Hardware Inventory and choose New. The Schedule new Collect Task dialog appears. On the General tab, type Printer Inventory in the Name field. Select the Detection Modules tab. Select Printer Inventory WMI and click OK. In the left pane, expand All Collect Tasks. Right-click Printer Inventory and choose Scheduling. The Scheduling Options dialog appears. Select the Conditions tab. Under Periodic dependency, select Run only once a week. The Conditions tab contains the option to run a collect task only on certain days or only in certain date or time ranges.
Notes
12-5
Notes
12-6
17 To open the Action Printer Inventory window, double-click Printer Inventory. Note: The status of DSM server is now OK. The status of the rest of the computers is Waiting. 18 In the left pane, expand All Computers\DSMservername\Inventory\Additional\Printer Inventory (WMI). 19 Select Win32_Printer. The right pane lists all the Additional Inventory Attributes and their values.
Task Summary
You have created a hardware inventory collect task. The task scheduling options can be adjusted so the collect task is run during times that will not create delays in your clients business processes. The organization can maintain an accurate inventory record by running the task regularly. This provides useful information for decision making, for example, determining if printers must be purchased for new staff hires.
Notes
12-7
Skill Builder: Create a New Hardware Inventory Collect Task to Collect User Information
Business Problem
Your client needs a list of local groups and users that are common to all their assets. They will use Unicenter Asset Management to collect this user account inventory. Create a new hardware inventory task to accomplish this.
Notes
12-8
Assessment
1 How does asset data get to the MDB? a b c d The agent scans the network, connects to the MDB, and merges its data. The agent scans the network and connects to the engine. The engine merges the data. The agent scans the network and sends results to the scalability server. The scalability server merges the results to the database. The agent scans the network and sends results to the scalability server. The engine retrieves the results from the scalability server and merges the results to the database.
Which two detection modules are turned on by default? (Choose two.) a b c d WBEM WEEM General Inventory Performance Inventory
Notes
12-9
Module Summary
You should now be able to:
In this module, you have accessed basic hardware inventory and created a new, more specific hardware inventory collect task. Your client can now collect accurate information about their entire hardware inventory. This information keeps the organization up to date about which hardware assets it has and what is on those assets. In the next module, you will configure software inventory.
Notes
12-10
13
Configure Software Inventory
13-1
Module Objectives
After this module, you will be able to:
Configure Proxy Settings for a Software Signature Download Job Access Downloaded Software Signatures Create Software Definitions Conduct a Heuristic Scan Conduct a File Collect Task
Module Overview
At any time, your client might be asked to identify how many installations of a particular software application they have or how many occurrences of a particular file type exist. It is crucial that your client have an accurate method of obtaining their software and file inventory holdings. Unicenter Asset Management has proven scanning methods that help ensure easy, enterprisewide software identification. In this module, you will access software signatures and inventory. In addition, you will create software definitions. You will also schedule and configure a heuristic scan and a file collect task.
Notes
13-2
Configure Software Inventory Task 1: Configure Proxy Settings for a Software Signature Download Job
Slide 13-2
Slide 13-3
The software signatures are added to the database during initial installation of the Unicenter DSM manager. Subsequent updates are downloaded from the CA content server using the Default Software Contents Download engine job. By default, this job is run daily between midnight and 6:00 a.m. However, the proxy server settings for your client must first be configured in the configuration policy to permit this to happen.
Interactive Demonstration
Task Purpose: Configure proxy settings in a default computer policy. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, expand Domain\Control Panel. Right-click Configuration and choose Explore From. A new Explorer GUI window appears with only the Configuration folder. In the left pane, expand Configuration Policy. Right-click Default Computer Policy and choose Un-Seal. Expand the Default Computer Policy\DSM\Manager folders. Select signature download. In the right pane, double-click Proxy Server. The Setting Properties dialog appears. Type usilis03.ca.com in the Value field and click OK. This is the proxy setting in a United States CA learning center.
Notes
13-3
10 In the left pane, right-click Default Computer Policy and choose Seal. Close the window. 11 In DSM Explorer, in the left pane, expand Control Panel\Engines\Engine Tasks\All Engine Tasks. 12 Right-click Default Software Contents download job and choose Scheduling. The Scheduling Options dialog appears. 13 Select the Conditions tab. 14 Clear Run only when within time range and click OK. The Reinitialize Job dialog appears. 15 To reinitialize the status of this job, click Yes. 16 In the left pane, select System Engine and verify that the job runs properly. This job is removed from Unicenter DSM when Unicenter Patch Management is installed.
Task Summary
You have configured proxy server settings to enable the downloading of CA software signature updates. To remain competitive, your client must update their assets as improvements are released. Your client can download software signature updates regularly from CA and verify that the correct updates are used in the organization. This helps ensure your client stays competitive and technically efficient. In the next task, you will gain access to software signatures that have already been downloaded.
Notes
13-4
Slide 13-4
Slide 13-5
Software signatures in Unicenter Asset Management are created as software definitions. A product can contain information about its release date, the patches it contains, the suite to which it belongs, and if it is a suite component. These are software definitions by which the product can be recognized. Discovered or installed software is listed under the software folder for a group or individual computer. Note: You cannot modify signatures provided by CA.
Interactive Demonstration
Task Purpose: Access downloaded software signatures. 1 2 In DSM Explorer, in the left pane, expand Domain\Software\ Definitions\Categories. To view the software definition name and other information, select All Definitions.
Notes
13-5
10 To clear the Manufacturer field, at the bottom of the Filters area, select Clear. 11 Click in the Type field. From the list that appears, select Patch. 12 Click OK. 13 Scroll to the end of the Filters list and select Apply. 14 In the right pane, scroll to the right. Notice the Enable for Discovery column. By default, all signatures provided by CA are enabled for discovery or scan. 15 Right-click 811493-Windows XP Home Edition and choose Disable Scan. 16 Click Yes. Enable for Discovery is now set to No. 17 At the end of the Filters list, select Clear. The list of All Definitions in the right pane returns to its original state.
Notes
13-6
Task Summary
You have accessed predefined software definitions and examined their uses. Your client can use these definitions for quick and accurate scans of organization software and files. Your client can be sure of identifying their software assets using software signatures and maintaining an up-to-date record of these assets. Using predefined software definitions to scan organization software and files can help identify outdated or redundant assets that must be removed or replaced and help in planning for future inventory expansion. In the next task, you will create software definitions.
Notes
13-7
Slide 13-7
You can create the following types of signatures: Signature Product Explanation A product is the basis for a software definition. It is a container component only, comprising releases and suites. A product by itself does not have any significance without these components. For example, Microsoft Outlook 2000 is a product. A product definition only has the version information. A release indicates a specific release of a piece of software. Release definitions can be created for products only. For example, Microsoft Outlook 2000 SP2 is a release. A patch includes the fixes for a release. A patch can be created for releases only. For example, Q303833 is a patch for the Microsoft Outlook 2000 SP2 release. A suite indicates a software suite that comprises various individual and integrated products such as Microsoft Office. A suite definition can be created for products only. A suite component is the individual product in a suite, such as Microsoft Word. This definition can be created for suites only.
Release
Patch
Suite
Suite component
Notes
13-8
Interactive Demonstration
Task Purpose: Create software definitions. You have discovered that some of the installed applications do not appear in the definitions provided by CA. You must create your own definitions so software inventory can be complete. This task demonstrates the creation of software definitions, including scheduling and verification activities. 1 2 3 4 5 6 In DSM Explorer, in the left pane, expand Domain\Software. Right-click Definitions and choose New Product. The Create new Product dialog appears. Type Image Robot in the Name field. Type v1.21 in the Version field. Click OK. The Create Release dialog appears. To create a new release, click Yes. The Create New Release dialog appears. Note: The General tab contains existing information about the product. The Recognition tab enables you to add any known information that can be used to recognize the product. 7 8 Select the Recognition tab. Type irobot.exe in the filename and Usage filename field. Click OK.
Notes
13-9
10 To install the Image Robot program file on the Unicenter DSM Server, double-click jirlalev.exe and follow the prompts. 11 In DSM Explorer, right-click DSM Server and choose Asset Jobs Activate Job Check. The Asset Job Check dialog appears. 12 Select Rescan software inventory. Note: You can also activate a job check from the Quick Start menu. The Asset Job Check dialog selections can be used to Rescan Hardware Inventory or Rescan Software Inventory. 13 When the software inventory scan is complete and the engine collect job has finished, in the Discovered Software list for DSM server, check for Release of Image Robot. 14 Click OK.
Skill Practice
Task Purpose: Create a new software definition. Your client wants to track who has installed Microsoft Pinball on their computer. 1 2 3 Create a software definition for: Microsoft Pinball Use launcher.exe as the .exe file name. To install Microsoft Pinball, go to: D:\ClassFiles\apps\uam\mspinball
Notes
13-10
Task Summary
You have just created software definitions. Your client can initiate a search for specific software that employees might be using. This can identify not only software that is approved, but also software that your client does not want used on their computers. Administrators can control the integrity of computer systems in the organization. In the next task, you will use heuristic scanning.
Notes
13-11
Interactive Demonstration
Task Purpose: Schedule and configure a heuristic scan. This task demonstrates the configuration of a heuristic scan, including scheduling and verification activities. 1 2 3 4 5 6 In DSM Explorer, in the left pane, expand Domain\Computers and Users\All Computers\Group Details\Configuration. Select Collect Tasks. From the Tasks area in the right pane, select New. The Select new Collect Task Type dialog appears. Select Software Discovery and click OK. The Schedule new Collect Task dialog appears. On the General tab, type Heuristic Collect Task in the Name field. Select the Methods tab. From the Method list, select Heuristic Scanning. The Methods tab is used to specify the method for collecting software information. Signature Scanning is the default method. 7 To select sources the agent must scan for software information, click Configure Scanner. The Settings for Heuristic Scanning dialog appears. By default, the settings checked in the dialog are Add/Remove Programs database and Microsoft Software Installer. 8 Select Shortcuts - Desktop.
Notes
13-12
Click OK.
10 In the Schedule new Collect Task dialog, select the General tab. 11 Click Set Scheduling. The Scheduling Options dialog appears. 12 Select the Conditions tab. 13 In the Periodic dependency area, select run only once a Month. 14 In the Day of the week dependency area, check Run only on these days and then check Tuesday, Wednesday, Thursday, and Friday. 15 Select the Pre-Job tab. Check Run job only if user approves. 16 In the Prompt field, type OK to run software scan now? and check Auto-select. Note: Auto-select enables the Yes and after 60 seconds values, which can be adjusted. With these default values, Auto-select will take over after 60 seconds. 17 Select Force execution after. Change the cancellations field value to 2. 18 Click OK. 19 In the Schedule new Collect Task dialog, click OK. 20 In the left pane, expand Collect Tasks. 21 Select Heuristic Collect Task. Note: In the right pane, All Computers show Waiting as the status for this task. This task was created directly under All Computers, so it is automatically assigned to All Computers without dragging it from the main control panel.
Notes
13-13
Task Summary
You have performed a heuristic scan. Your client can use a heuristic scan to detect which software is on their computers by searching local software databases. The scan can be scheduled to perform an inventory collect task at the most convenient time. In the next task, you will configure and schedule a file collect task to gather information on specific files.
Notes
13-14
Slide 13-9
Interactive Demonstration
Task Purpose: Schedule and configure a file collect task. 1 In DSM Explorer, in the left pane, expand DSM servername\Software\File Explorer. Notice that no properties appear in the display. In the left pane, expand All Computers\Group Details\Configuration. Right-click Collect Tasks and choose New. The Select new Collect Task type dialog appears. Select File Scan and click OK. The Schedule new Collect Task dialog appears. On the General tab, type Scan for mp3 files in the Name field. Select the Windows Settings tab. From the Source list, select All Files [*] and click Remove. In the Add list, clear All Files [*] and type: *.mp3 Click Add. Clear the Ignore non executable files check box.
2 3 4 5 6 7 8 9
10 Select the UNIX Settings tab. 11 From the Source list, select All Files [*] and click Remove.
Notes
13-15
Skill Practice
Task Purpose: Create a new file collect task. Create a new file collect task for your client to locate all *.avi files on employee computers. 1 2 Type Scan for *.avi files as the task name. Verify the list of files when the task is complete.
Task Summary
You have scheduled and configured a file collect task. By searching for a specific type of file, your client can now determine the extent to which employees store unnecessary files on the network.
Notes
13-16
Assessment
1 Which information must be provided to download software signatures from CA? a b c d 2 Name of the DSM server List of applications you want to download Proxy server name, port, and password if required Company Support ID provided to CA to obtain an access code
Which two software specifications can be included in a software signature to be scanned by the agent? (Choose two.) a b c d Deletion date Secondary files Main executable file Latest execution date
Which two types of software signatures can you create? (Choose two.) a b c d e MSI Release Product Heuristic Application
Notes
13-17
What is the default run schedule for the Default Software Contents Download engine job? a b c d Once an hour Once every six hours Daily between midnight and noon Daily between midnight and 6:00 am
Notes
13-18
Slide 13-10
Module Summary
You should now be able to:
Configure Proxy Settings for a Software Signature Download Job Access Downloaded Software Signatures Create Software Definitions Conduct a Heuristic Scan Conduct a File Collect Task
In this module, you have accessed downloaded software signatures and software inventory. You have created software definitions and have also scheduled and configured a heuristic scan and a file collect task. Your client now has an accurate method of obtaining their software and file inventory holdings using Unicenter Asset Management scanning methods. These methods provide easy, enterprise-wide software containing identification. Your client now has a tool that helps ensure the organization can maintain control over a large and fluctuating software inventory. This enables your client to respond quickly to software questions during an audit or when allocating resources to a new project. In the next module, you will conduct a template inventory.
Notes
13-19
Notes
13-20
14
Conduct a Template Inventory
14-1
Module Objectives
After this module, you will be able to:
Module Overview
Unicenter Asset Management can provide highly accurate and specific information about your clients hardware and software. The use of customized inventory templates enables your client to gather information not automatically collected by Unicenter Asset Manager. This information can be provided by the user of the asset. One way to do this is to have users provide their telephone numbers when prompted during a Unicenter Asset Management agent scan. After this method has been tried, it is decided that it is better to prompt users for their cellular telephone numbers. In this module, you will create an inventory template module and modify an existing template.
Notes
14-2
Slide 14-2
Slide 14-3
Which information you will want to collect How often you will need to collect this information How this information must be organized with the Unicenter DSM database If this template will require input from the computer users If user responses will need to be in a particular format If users will be required to input an answer To which unit or group this template will apply
Notes
14-3
Interactive Demonstration
Task Purpose: Create a new inventory template. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Collection Modules. Right-click Inventory Template Modules and choose New. The Create new Template dialog appears. In the Name field on the General tab, type: User Telephone Information Note: 4 5 6 7 8 9 Typing information in the Description field is optional.
Click Template Editor. The Create Template dialog appears. In the Name field, type: Telephone Information From the Prompt questions list, select Once. In the Show text before prompting field, type: Please insert your telephone number Click OK. The Template Editor dialog appears. Click New group. The Create new group dialog appears.
10 In the Name field, type: Telephone Numbers 11 Click OK. 12 In the Template Editor dialog, click New attribute. The Create new attribute dialog appears. 13 In the Name field, type: Office Extension Number 14 From the Type list, select String (32).
Notes
14-4
15 From the Access list, select Prompt End User And Force Answer. The <User Defined> type is used to create a list of static values. 16 To close the Create new attribute dialog, click OK. 17 To close the Template Editor dialog, click OK. 18 To close the Create new Template dialog, click OK. 19 In DSM Explorer, in the left pane, expand Computer and User Groups\All Computers\DSM servername\Configuration. 20 Right-click Collect Tasks and choose New. 21 Select Template Inventory and click OK. 22 In the Name field, type: User Telephone Information 23 Click Set Scheduling. 24 Under Conditions, select once a day to schedule the task and click OK. 25 Select Template Modules. 26 Select User Telephone Information. 27 Click OK. Verify that the engine has run before running the agent job check. 28 Run the agent using the system tray. When prompted, type the telephone number provided by your instructor. 29 Click Done. The .mif file will be created in Program Files\CA\Unicenter DSM\Agent\units\00000001\uam and will be converted to an .mnv file when the information is reported to the scalability server. This is the format that the engine uses. 30 After the agent has collected the new information, look under Inventory Additional for your computer to verify that the information has appeared.
Notes
14-5
Task Summary
You have created an inventory template module. Your client can use the inventory template module to customize the information collected from end users. This will help ensure the inventory results are detailed and specific to your clients needs. In the next task, you will modify an existing template.
Notes
14-6
Slide 14-4
Interactive Demonstration
Task Purpose: Modify an existing template. You will locate an existing template and add a group and attribute to it. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Collection Modules. Select Inventory Template modules. In the right pane, right-click User Telephone Information and choose Properties. The Properties for User Telephone Information dialog appears. Click Template Editor. Expand the folders and select Office Extension Number. Click New attribute. The Create new attribute dialog appears. In the Name field, type: Cell Phone In the Type list, select String (32). In the Access list, select Prompt End User. To return to DSM Explorer, click OK three times.
4 5 6 7 8 9
Notes
14-7
Task Summary
Your client can now modify any existing template to suit job requirements. Modifying an existing template is a useful and time-saving alternative to creating a new template. Your client can collect various types of information to help determine specific information about hardware and software asset use.
Notes
14-8
Assessment
1 After creating a template inventory collection module, what is required to present a template to an agent? a b c d Run the agent. Schedule the template collection module. Drag the collection module to the All Computers group. Create a hardware inventory template collect task and link it to the agent or group.
Notes
14-9
Module Summary
You should now be able to:
You have created an inventory template module and modified an existing template. Your client can now use both methods to collect specific information from users. This enables your client to have greater control over who is using which hardware and software assets. In the next module, you will create an asset job to discover which hardware and software assets require updating.
Notes
14-10
15
Create an Asset Job
15-1
Module Objectives
After this module, you will be able to:
Module Overview
Performing and creating asset jobs are important procedures that help your client to maintain hardware and software assets and accurate inventory records. Your client might need to run maintenance jobs such as the chkdsk procedure on C: drives on their computers. Your client might also need to determine which version of Microsoft Windows Installer (.msi) is present on their system. Unicenter Asset Management enables your client to use and configure existing asset jobs or create new ones for specific needs. In this module, you will determine the properties of an existing asset job and create a new one.
Notes
15-2
Slide 15-2
Slide 15-3
Types of asset jobs available include: Asset Jobs Message jobs Job Functions Message jobs can display a message on the asset when the user logs in. The job status indicates when the message was displayed. Message jobs can only be used with Microsoft Windows. Command jobs enable you to run a command file on the selected asset or group. All normal native command-language commands can be used in this file. Synchronization jobs are used to synchronize two directories on the agents. Synchronization involves comparing contents of the target and source directories and making them identical. This job can only be linked to computers in the domain. External utility jobs run an external utility and can be used to run a script written for a management tool other than Unicenter Asset Management. This job can only be linked to computers in the domain.
Command jobs
Synchronization jobs
Notes
15-3
Interactive Demonstration
Task Purpose: Discover properties of an existing job. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Jobs\Asset Jobs. From the Asset Jobs list, select All Asset Jobs. In the right pane, right-click Check C: drive using fast scan. Choose Properties. The Properties for Check C: drive using fast scan dialog appears. Select Description and view the Description job. Select Command file and view the command file. Select Scheduling and view Current scheduling. To close the Properties for Check C: drive using fast scan dialog, click Cancel. In the left pane, in the Asset Jobs list, select Command Jobs.
Notes
15-4
10 Right-click Force AM Agent to rescan software inventory. 11 Choose Properties. The Properties for Force AM Agent to rescan software inventory dialog appears. 12 Select Command File and view the command file. 13 To close the Properties for Force AM Agent to rescan software inventory dialog, click Cancel.
Task Summary
You have viewed the properties of an existing asset job. Any existing asset job can be reconfigured to accommodate an organization's needs. The asset job type viewed in the preceding interactive demonstration enables your client to quickly gather specific information, such as software data, thereby keeping records up to date. This asset job type also enables your client to implement more effective long-term inventory planning. In the next task, you will create a job, assign it to a system, and schedule it to run.
Notes
15-5
Slide 15-5
The Asset Jobs folder contains all the asset jobs created in the domain. You can use this folder to create, manage, and schedule asset jobs. These jobs can be deployed on any asset or group in the domain. Script jobs are used to execute a Unicenter Desktop Management script on an agent computer. You can write the script directly or paste a saved script copied from a file.
Interactive Demonstration
Task Purpose: Create a new asset job. This interactive demonstration involves scheduling the new asset job, assigning it to a system, and verifying the result. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Jobs\Asset Jobs. Right-click Script Jobs and choose New. The New Job Wizard appears. Leave the default job type as Script and click Next. Type Get MSI Version in the Job name field. Click Next. Click Load File. The Load File to the Job Editor dialog appears. Navigate to D:\ClassFiles. Select a *dms file type. Select the MSI.dms file. Click Open.
Notes
15-6
12 In the left pane, expand the Computers and Users folder. 13 Drag the job from the right pane to Computers and Users\All Computers in the left pane. 14 In the left pane, expand All Computers\Jobs. 15 To view the job status, in the right pane, select Asset Jobs. 16 Verify that the engine runs the collect job. 17 Run the agent. Under Additional Inventory for DSM servername, the MSI Version inventory appears.
Skill Practice
Task Purpose: Create a synchronization job. Note: The source and target directories must exist on the computer before you can run a job. 1 2 On the DSM server, synchronize the D:\ClassFiles\solutions (source) directory to the C:\synchtest (target) directory. Leave all the default settings.
Task Summary
You have created a new asset job in only a few steps by using the New Job wizard. Your client can simplify and customize any asset job and schedule it to run at optimal times. This helps ensure that your clients operations are not delayed when a job is run. In this way, time is used most efficiently.
Notes
15-7
Hint
To locate the hosts file, look in the C:\windows\system32\drivers\etc directory. Copy the contents of the active hosts file as your clients standard hosts file.
Notes
15-8
Assessment
1 Which two statements are accurate for a synchronization job? (Choose two.) a b c d The target is made identical to the source directory. The source is made identical to the target directory. The source and target directories must already exist on the computer. The differences between the source and target are reported back to the manager.
Which type of asset job can run native commands? a b c d Script Message Command External utility
Notes
15-9
Module Summary
You should now be able to:
In this module, you have examined an existing asset job to determine configuration properties. You have also created a new asset job. Using these processes, your client can use an existing job function to complete a task and can create a new asset job to fulfill other tasks. Unicenter Asset Management also enables easy job scheduling so company operations are not interrupted. In the next module, you will create policies for Unicenter Asset Management control.
Notes
15-10
16
Create Policies
16-1
Create Policies
Module Objectives
Slide 16-1
Module Objectives
After this module, you will be able to:
Module Overview
Your client must monitor changes in the Hosts file on certain computers. An event-based policy must be created that can help track any changes. Your client also wants to alert any users who do not have service pack 99 installed on their computers to add it to their system. Unicenter DSM permits your client to automate maintenance tasks that perform regular checks on their network. Unicenter DSM can be used to establish alerts notifying the IT team of potential problems. Also, creating policies enables your clients network administrators to determine which users can use or access specific assets. In this module, you will create event-based and query-based policies.
Notes
16-2
Slide 16-2
Slide 16-3
Event-based policies are designed to address possible changes arising on a Unicenter DSM system, such as the addition of new assets or jobs, modified jobs, or new or modified policies. Each of these events has a predefined policy that cannot be deleted. You can also create customized event-based policies for some event areas.
Interactive Demonstration
Task Purpose: Create an event-based policy. You will create an asset file collection event policy, but first, you will configure an email account.
Notes
16-3
Create Policies
Interactive Demonstration
10 In the Display Name field, type: StudentX 11 Click Next. 12 In the E-mail Address field, type: StudentX@YourDomain.ca.com 13 Click Next. 14 In the Incoming mail server (POP3) field, type: ClassroomT2 15 In the Outgoing mail server (SMTP) field, type: ClassroomT2 16 Click Next. 17 In the Account Name field, type: StudentX@YourDomain.ca.com 18 In the Password field, type: password 19 Click Next. 20 To close the Internet Connect Wizard, click Finish. 21 Select Do not import at this time. 22 Click Next and then click Finish. 23 Click Create Mail. 24 In the To field, type: StudentX@YourDomain.ca.com
Notes
16-4
25 In the Subject field, type: test message 26 Click Send and then click Send/Receive. 27 In the navigation pane, under Local Folders, select Inbox. To view the test message in the reading pane, select it in the Inbox.
Notes
16-5
Create Policies
Skill Practice 38 From the Macro list, select Asset and click Add. 39 Type was changed on in the Enter message field. 40 Select the Date macro and click Add. 41 Select the Time macro and click Add. 42 Click OK. 43 To close the Policy Designer dialog, click OK. 44 In DSM Explorer, in the left pane, expand All Computers\Group Details\Software. 45 Select File Collection. 46 In the right pane, under Tasks, select Configure. The Select files to collect dialog appears. 47 From the File list, select %SYSTEMROOT%\SYSTEM32\DRIVERS\ETC\HOSTS and click OK. 48 Verify the engine runs and then run the agent. 49 In DSM Explorer, in the left pane, expand DSM server\Software. 50 Select File Collection. After the Hosts file date and time information appears, edit the Hosts file. 51 Run the agent. The Last Modified date and time changes for the File Collection status. The Hosts file policy is History and an email has been generated and sent to your mailbox.
Skill Practice
Task Purpose: Add an additional action to the hosts file policy. To help ensure the Hosts file asset job runs only on systems that modify their files, unlink the Hosts file asset job from the Unicenter DSM server. 1 2 Add an action to schedule a job. Use the hosts file job.
Notes
16-6
Task Summary
You have created an event-based policy. Your client can now track changes in the Unicenter DSM system. This capability keeps IT personnel updated about the system and helps them make decisions about upgrading and maintaining system assets. In the next task, you will create a policy based on a query.
Notes
16-7
Create Policies
Task 2: Create a Query-based Policy
Slide 16-4
Slide 16-5
A policy based on a specified query can be designed with three severity levels. When the query is encountered, the policy can perform specified actions. The Alarm level indicates that the policy has been violated and this violation has a severe impact. An Alarm policy appears in the Alarm section of the Log Overview. The lower levels of policy severity are Warning and Message.
Interactive Demonstration
Task Purpose: Create and verify a query-based policy. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, expand Policies\Query Based. Right-click Query Based and choose New. The Policy Designer dialog appears. In the Policy Name field, type: Computers w/o SP99 Under Policy Severity, click Alert. From the Query that Policy depends on list, select Computers that do not have SP99 installed. In the left pane, under Policy, select Evaluation. By default, Always evaluate Policy when Sector processing is done is selected. In the left pane, under Add Action, select Send Mail. The Configure Policy Actions dialog appears. Under Enter message, click Add. The macro value $NAME$ appears. The Enter message values will be sent to the email address.
Notes
16-8
After the macro value $NAME$, add a space and type: requires SP99 to be installed
10 From the Macro list, select Date [$DATE$] and click Add. 11 From the Macro list, select Time [$TIME$] and click Add. 12 Click OK. 13 In the Policy Designer dialog, click OK. 14 In DSM Explorer, in the left pane, right-click policyname and choose Evaluate Now. 15 Expand policyname. Select Violators and, in the right pane, verify all Microsoft Windows systems appear. 16 Look in your email inbox for policy violation messages.
Task Summary
You have created a query-based policy. Your client can use a specific query as the basis for configuring a policy. This capability helps define the specific information for which the query searches. Your client can configure the severity level of the policy and the severity message users will see. The policy designer enables quick control of these items.
Notes
16-9
Create Policies
Skill Builder: Create a Query-based Policy
Hint
The query argument should use Jobs, Collect Tasks, and the NOT operator.
Notes
16-10
Assessment
1 Which two types of event-based policies can be created? (Choose two.) a b c d e 2 Queries Query Result Asset File Collection Software Definitions Asset Software Usage
What is the highest level of policy severity? a b c d Alarm Danger Message Warning
Notes
16-11
Create Policies
Module Summary
Slide 16-6
Module Summary
You should now be able to:
In this module, you have created event-based and query-based policies. You can now help your client keep track of their assets without having to monitor them on a regular basis, saving time and money. Now your client can be notified when something is missing or present when it should not be. In the next module, you will administer Unicenter Remote Control.
Notes
16-12
17
Administer Unicenter Remote Control
17-1
Module Objectives
After this module, you will be able to:
Control a Host with Unicenter DSM Explorer Define Unicenter Remote Control Manager Policy Create a Global Address Book Control a Host with the Viewer Manage Unicenter Remote Control Sessions Record, Play Back, and Convert Recordings
Module Overview
Your client needs products that will enable them to address their troubleshooting problems and monitor usage on their remote computers. Unicenter Remote Control will provide the solution to meet your clients needs. Your client can access a remote computer and control functions on it. Your client can then switch between functions on local and remote computers. This will enable quick access, and policy can be defined at the manager level. Additionally, with Unicenter Remote Control, your client can record activity on a remote computer. They can play back this recording at a convenient time to demonstrate the functioning of software for training and verification of help desk activities. Your client can convert recordings from the default file format to a format compatible with computers that differ from the one on which the recording is made. In this module, you will control a host with Unicenter DSM Explorer, define a Unicenter Remote Control Manager Policy, create a global address book, manage Unicenter Remote Control Sessions, and record, play back, and convert recordings.
Notes
17-2
Administer Unicenter Remote Control Task 1: Control a Host with Unicenter DSM Explorer
Slide 17-2
Interactive Demonstration
Task Purpose: Control a host using Unicenter DSM Explorer. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Computers and Users. Select All Computers. In the right pane, double-click the Windows 2000 Professional VMware workstation. In the left pane, expand Windows 2000 Professional VMware workstation. Select Remote Control. In the right pane, select Connect as a different user. Type credentials for the local administrator for the Windows 2000 Professional VMware session. Click Connect. In the right pane, the Windows 2000 Professional VMware Remote Control host appears. In the connected session, move the pointer over the Unicenter Remote Control systray. Notice the Unicenter DSMservername is connected to the session.
10 In DSM Explorer, in the left pane, expand Remote Control\My Sessions. The connected sessions are displayed. 11 Expand the host:tcp:Shared Control session.
Notes
17-3
Task Summary
To assist your client with connecting to remote computers, you have controlled a host and viewed active sessions using Unicenter DSM Explorer. You have also validated the deployment of Unicenter Remote Control agents. In the next task, you will define manager policy.
Notes
17-4
Administer Unicenter Remote Control Task 2: Define Unicenter Remote Control Manager Policy
Slide 17-3
Slide 17-4
When you use centralized security in a centrally managed installation, the Unicenter DSM domain manager verifies the credentials. However, the default for a centrally managed installation is local security. To change the method, you must enable centralized security through the configuration policy manager.
Interactive Demonstration
Task Purpose: Define and assign Unicenter Remote Control manager policy. In this task, you will define custom settings for the GIS Remote Control group. Note: This interactive demonstration is dependent on the GIS group having been created in the Create Groups module. 1 In DSM Explorer, select All Computers. Note the RC Status for DSM server and Windows 2000 Server VMware session is Listening (Local Security). In DSM Explorer, in the left pane, under Control Panel, expand Configuration. In the left pane, right-click Configuration Policy and choose New Policy. The New Configuration Policy dialog appears. Type GIS Remote Control Policy in the Name field.
2 3 4
Notes
17-5
10 Double-click Require local confirmation. Change the value to True. 11 To enable Centralized security, change the value of the configuration policy remote control\Host\Managed\Centralized security to TRUE. Centralized security is required for systems to populate in a global address book. By default, Unicenter Remote Control agents are installed with local security. 12 Right-click GIS Remote Control Policy and choose Seal. 13 Click OK. 14 In the left pane, right-click GIS and choose Paste Policies. The Schedule Policies dialog appears. 15 Check Apply Policies Immediately and click OK. 16 In the left pane, expand GIS\Group Details\Configuration. 17 Select Configuration Policy. Notice the status of the Active and Scheduled Policies. After the policy is applied, verify the policy change at the host. 18 Right-click the Unicenter DSM systray and choose Remote Control Host Properties. The Properties dialog appears. Configuration
Notes
17-6
19 Select Advanced. 20 Scroll down to see that three attributes have been changed to the new configuration policy. Verify the Users tab is no longer available. This indicates Centralized Security is in effect. 21 In DSM Explorer, select All Computers. Note the RC Status for the DSM server is Listening.
Task Summary
You have taken control of customizing remote control functions for your organization by assigning manager policy and defining custom settings for the GIS Unicenter Remote Control group. The flexibility of Unicenter Remote Control enables your client to quickly meet the various requirements of the organizations network. For any job requiring Unicenter Remote Control, your client can adjust the settings to operate most effectively. In the next task, you will create a global address book.
Notes
17-7
Slide 17-6
In this task, you will use the global address book to select and assign remote control permissions to a user who will act as a security principal. This principal will then be able to control access to these computers using Unicenter Remote Control.
Interactive Demonstration
Task Purpose: Assign permissions and security. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Computers and Users\GIS. Expand Group Details and select Remote Control Permissions. In the right pane, in the Tasks area, select Properties. The Address Book Properties dialog appears. Note: Address Book Properties provides information on the only option available, Global address book root group. 4 Select Global address book root group. Inherit Remote Control Permissions from parent group becomes available and is automatically selected. Override Remote Control permissions on derived groups is also available but is not selected. 5 6 Click OK. In the Tasks area, select Add User Permission. The Add User Permission dialog appears.
Notes
17-8
7 8 9
Under Available Directories, expand classroomdomainname. In the left pane, expand GIS. Select yourname and click Add to List. In the List of Security Principals list, yourname appears.
10 Select domain\users\John P. Doexx and click Add to List. 11 Click OK. Users in this Username list have permission to control access to computers in the Remote Control Permissions group using Unicenter Remote Control. 12 Right-click the DSM server systray and choose Remote Control Host Launch Remote Control Viewer. In the left pane, expand Viewer and verify Global Address Books appears. Select GIS and the DSM server appears in the right pane.
Task Summary
You have selected a security principal using the global address book. With this principal in place, your client no longer has to perform as many administrative duties for this group and can devote time to other IT duties. In the next task, you will manage remote control sessions.
Notes
17-9
Slide 17-8
There are six types of Unicenter Remote Control sessions: Type of Session View Stealth View Description The viewer user can see the host computer, but does not have the ability to control it. The viewer user can see the host computer without having to acknowledge that a connection has been made with it. The viewer user and the host user have control of the session. Multiple viewer users can connect to a single host. The host user can pass control to any of the viewer users, or restrict control as required. The mouse and keyboard of the host are disabled. Only the viewer user can control the host computer. The mouse and keyboard of the host are disabled and the host screen is blank.
Exclusive Control
Secure Control
Notes
17-10
Interactive Demonstration
Task Purpose: Establish and view a session with a single host. You can install the Unicenter Remote Control viewer on any workstation or server. It is not necessary to have access to DSM Explorer or the domain manager to control a host. With the viewer, you can use the Quick Connect feature to establish an active session with a host computer. 1 2 3 4 5 6 7 8 9 Start the Windows 2000 Professional VMware session. In DSM Remote Control Viewer, right-click Viewer and choose Quick Connect. The Quick Connect page appears. Type 2000 Professional VMware name in the Address field. Select Connect as a different user. Type host computer user name in the User Name field. Type password for the host computer user in the Password field. Click Connect. Under My Sessions, right-click host:tcp:Shared Control and choose Send Special Keys CTRL+ALT+DELETE. Log in to the Windows 2000 Professional VMware session.
Now you can use the viewer to place data on the host computer.
Notes
17-11
Interactive Demonstration
Task Purpose: Transfer text and graphics between the Unicenter Remote Control viewer and a host. Unicenter Remote Control provides the option to copy and paste contents of the clipboard between the viewer and a host. Text and graphics can be transferred between computers in remote locations. 1 2 3 4 5 6 7 8 On the Unicenter Remote Control viewer computer, click Start and then choose Programs Accessories Notepad. In Notepad, type a line of text. Select the text. Right-click the selected text and choose Copy. Minimize Notepad. In URC viewer, in the left pane, expand My Sessions and select the session. Choose Clipboard Send Clipboard to Host.
On the host computer, click Start and then choose Programs Accessories Notepad. The right pane is the host computer.
Paste.
10 On the viewer and host computers, close Notepad. The ability to use the viewer to transfer data to a host computer goes beyond simple text or graphics. You can also transfer entire files.
Notes
17-12
Interactive Demonstration
Task Purpose: Send and receive files between a viewer and a host. You can use the Unicenter Remote Control Explorer to drag files from the viewer to the host or from the host to the viewer. 1 2 3 4 5 6 7 8 9 In URC viewer, in the left pane, expand My Computer. To view the contents of the viewer computer, in the right pane, select D: (Fixed drive). In the right pane, from the Tasks menu, right-click and choose Create Folder. The Create Folder dialog appears. Type TO_HOST in the Folder Name field. Click OK. From the Unicenter Remote Control viewer, copy D:\ClassFiles\Temp\password.txt to the TO_HOST folder. In the left pane, under 2000 Professional VMware host, expand Drives. From the viewer computer, drag the new folder to the C: (Fixed drive) drive on the host computer. To view the folder you have just created and moved, on the host computer, expand the C: (Fixed drive) drive.
Files and folders can be transferred from a CD-ROM drive, floppy disk drive, or network shares. After you have completed your Unicenter Remote Control session tasks, disconnect the session.
Notes
17-13
Task Summary
In this task, you controlled a host computer remotely using Unicenter Remote Control. You established and viewed a session with a single host. You transferred files between a viewer and a host computer. This enables your clients administrators to provide remote users with computer updates without incurring the cost of a visit to their sites. In the next task, you will manage Unicenter Remote Control sessions.
Notes
17-14
Administer Unicenter Remote Control Task 5: Manage Unicenter Remote Control Sessions
Slide 17-9
Slide 17-10
Interactive Demonstration
Task Purpose: Uninstall a centrally managed host and viewer. 1 2 3 4 5 On the Windows 2000 Professional VMware session, click Start and then choose Settings Control Panel. Double-click Add or Remove Programs. Select CA Unicenter DSM Agent+Remote Control Plugin. Click Remove and then click Yes. When the uninstall program is finished, close all windows.
Now that you have uninstalled the centrally managed host and viewer, your client can control a host with a viewer. Files and folders can be transferred from a CD-ROM drive, floppy disk drive, or network shares. Next, you will install a stand-alone host and viewer.
Interactive Demonstration
Task Purpose: Install a stand-alone host and viewer. 1 2 From Windows Explorer, open the Z:\ClassMedia folder. Navigate to the USDM\WindowsProductFiles\AgentRC folder.
Notes
17-15
10 To start the systray again, click Start and then choose Run. The Run dialog appears. 11 In the Open field, type cfsystray and click OK. Having installed a stand-alone host, you must now designate who will control the viewer sessions. You must also set the locally managed security.
Interactive Demonstration
Task Purpose: Designate who has control of a viewer session. The Unicenter Remote Control host can be used to designate who has control of a viewer session. 1 2 Establish a classroom connection between a viewer and a host. From the viewer, try to use the mouse or keyboard to send commands to the host. Note: The host must enable the viewer to perform any remote control functions. Until this is done, the viewer can only watch the session. 3 From the host computer systray, right-click Remote Control Host.
Notes
17-16
Choose computername\username
Has Control.
The user can now use the mouse and keyboard to send commands to the host. 5 Disconnect the session. Control of the session is no longer open to everyone. You can control who can view the session.
Interactive Demonstration
Task Purpose: Grant viewer access. 1 From the Windows 2000 Professional VMware session Unicenter DSM systray, right-click Unicenter Remote Control Host and choose Properties. The Remote Control Host Properties dialog appears. Select the Host tab. From the Host Features Access group, select Always manually confirm connections and Always encrypt. Click OK. On the viewers computer, establish a session with the host. To accept the connection and grant the viewer access, on the host computer, click Yes. Disconnect the session.
2 3 4 5 6 7
You can also lock and unlock a host computer using the Unicenter Remote Control host.
Notes
17-17
Interactive Demonstration
Task Purpose: Lock and unlock the host. 1 2 3 4 5 6 From the systray, right-click Remote Control Host and choose Properties. The Remote Control Host Properties dialog appears. Select the Advanced tab. Set Host: User can lock and Unlock Host to TRUE and click OK. Right-click the Unicenter DSM systray and choose Remote Control Host Display as Separate Icon. Right-click the new separate icon and choose Lock Host. The host in the systray displays a red X, indicating it is locked. Try to establish a viewer session. You receive a message on the viewer stating Unicenter Remote Control is not currently listening for connections. Right-click Unicenter Remote Control Host and choose Unlock Host. Establish a viewer session. On the host computer, click Yes.
7 8 9
10 Disconnect the session. Security can also be set for a stand-alone environment.
Interactive Demonstration
Task Purpose: Set stand-alone security. 1 From the host computer systray, right-click Remote Control Host and choose Properties. The Remote Control Host Properties dialog appears. Select Users. From the Current Security Provider list, select Local. Click Add. The Add Users dialog appears.
2 3 4
Notes
17-18
5 6
Type yourname in the Users to be added field. Type password in the Password field. Note: Your user name cannot contain any spaces and your password must be six or more characters.
7 8
Click Create and then click OK. From the viewer, establish a Unicenter Remote Control session using the credentials created in the previous task. Note: The host user must click Yes when prompted to permit the session to be established.
10 From the systray, right-click Unicenter Remote Control Host and choose Properties. The Remote Control Host Properties dialog appears. 11 Select the Users tab. 12 Next to Current Security Provider, click Properties. 13 Select Enable Master Password and click OK. The Set Master Password dialog appears. 14 Type newmasterpassword in the New password field. Note: The password must contain at least six characters.
15 To confirm the password, type it again in the Confirm new password field. 16 To set the master password, click OK. 17 To close the Unicenter Remote Control Host Properties dialog, click OK.
Notes
17-19
Task Summary
Your clients employees can now configure a host session, manage a standalone host, and control stand-alone host sessions. With fewer hosts to manage centrally, your clients employees are now available for assignments on other projects. Now, their supervisors can assign them more challenging tasks. In the next task, you will record, play back, and convert recordings.
Notes
17-20
Administer Unicenter Remote Control Task 6: Record, Play Back, and Convert Recordings
Slide 17-11
Slide 17-12
Interactive Demonstration
Task Purpose: Record Unicenter Remote Control sessions from the viewer. 1 Click Start and choose Programs Computer Associates Desktop and Server Management DSM Remote Control Viewer. The DSM Remote Control - DSM Remote Control Viewer window appears. Connect to a host. In the left pane, right-click Session and choose Session Recording Start. The Session dialog appears. Type Using WordPad in the Name field. Click OK. Navigate to WordPad and open it.
2 3 4 5 6
Notes
17-21
Now that you have recorded a session with the viewer, you are ready to control a recording session from the Unicenter Remote Control host.
Interactive Demonstration
Task Purpose: Record Unicenter Remote Control sessions from the host. 1 2 3 4 5 6 7 8 9 On the Unicenter Remote Control host, from the systray, right-click Remote Control. Choose Start Recording. The Session dialog appears. Type CASupport in the Name field. Click OK. Open Microsoft Internet Explorer. If the CA web page does not open, type www.ca.com in the Address field. On the CA homepage, choose Support Select SupportConnect. Choose New User Enroll Now. Close Microsoft Internet Explorer. Technical Support.
Notes
17-22
You will now launch the Replayer and use the controls to replay a Unicenter Remote Control session.
Interactive Demonstration
Task Purpose: Play back Unicenter Remote Control sessions. The Replayer can be started from Unicenter Remote Control Explorer. 1 Click Start and choose Programs Computer Associates Unicenter Desktop and Server Management Remote Control Viewer. The DSM Remote Control - DSM Remote Control Viewer window appears. In the left pane, select Replayer. The Replayer console features appear in the right pane. The Open a Recording task in the Replayer pane causes the Open dialog to appear. From this dialog, you can choose a recorded session by navigating the directory structure or by typing the name of the recorded session you want to replay. 3 4 In the left pane, under Replayer, select Recently Recorded Sessions. Any recently recorded sessions appear in the right pane. In the right pane, double-click Using WordPad. Unicenter Remote Control enables you to set properties for viewing a session. You can right-click Replayer and choose Properties to view and modify property settings. 5 In the left pane, expand Active Replays. Any recordings currently being played back appear in the right pane. You can use various controls from the Unicenter Remote Control Explorer toolbar to control the playback of a recorded session. The controls you need appear in the Unicenter Remote Control Explorer toolbar after the Replayer has been opened.
Notes
17-23
7 8 9
Slide 17-14
Interactive Demonstration
Task Purpose: Convert a Unicenter Remote Control session recording to AVI and play the AVI recording. 1 2 3 4 In Microsoft Windows Explorer, in My Documents, navigate to the Using WordPad.urc file. Right-click the file name and choose Export to Video. The Export to Video dialog appears. Change the format option from wmv to avi. Leave the defaults for video compression and replay.
Notes
17-24
5 6 7 8
To convert the recording, click Start. To play the converted file immediately, select Yes. Follow the prompts to install Windows Media Player. After the recording has finished playing, close Windows Media Player. Note: You can also run C:\Program Files\CA\Unicenter DSM\bin\rcReplayExport.exe and click Browse to open a recording file (.urc extension). Change the format option from wmv to avi, and then determine the options for video compression and replay. When you are ready to change the format, click Start.
Task Summary
You have recorded Unicenter Remote Control sessions from the viewer and have launched the Replayer and used its controls to play a Unicenter Remote Control session. Your clients employees can play back a recorded training session and use various options, such as rewind, fast forward, and slow motion. These capabilities improve session performance and increase organizational efficiency. Finally, you converted a recording to AVI and played it using Unicenter Remote Control. Your client's staff and management can now record and replay employee training sessions whenever it is convenient. This benefits your client by enabling more efficient scheduling of employee time so there is less interruption to the daily work flow.
Notes
17-25
Skill Builder: Assign a New Group and Query with New Security and Assign Permissions
Business Problem
The Accounting group must have custom Unicenter Remote Control settings, but the members of this group require a password for GIS before they are permitted to take control. They also want the host session to close automatically if there is no activity for five minutes. The Windows 2000 Server VMware session is a system in Accounting. You must define and assign manager policy for the new Accounting group. It must also be a global address book.
Hint
You must deploy remote control to the Windows 2000 Server VMware session.
Notes
17-26
Assessment
1 Which recording file format supports the most compression codecs? a b c d 2 AAP AVI TCP WMV
What is the default remote control security setting in a centrally managed installation? a b c d Local security Global security Centralized security Administrative security
Notes
17-27
Module Summary
You should now be able to:
Control a Host with Unicenter DSM Explorer Define Unicenter Remote Control Manager Policy Create a Global Address Book Control a Host with the Viewer Manage Unicenter Remote Control Sessions Record, Play Back, and Convert Recordings
You have created a global address book and defined manager policy. You have also controlled a host with DSM Explorer and managed Unicenter Remote Control sessions. You have recorded, replayed, and converted Remote Control session recordings to help your client distribute previously recorded sessions. This functionality enables your clients supervisors to grant users access to training sessions that they missed or took place before they were employees. With these files on their desktops, new users can benefit from these sessions without spending long periods of time in the classroom. As a result, your clients help desk workload decreases and employees are updated with new information. In the next module, you will produce common reports.
Notes
17-28
18
Produce Common Reports
18-1
Module Objectives
After this module, you will be able to:
Create a New Report Customize a Report Schedule and Publish a Report Create a Query-based Report Filter a Report Schedule and Publish a Report to an Ingres Table Create a Report Using Active Directory Information Create a Remote Control Report
Module Overview
Your client wants a more efficient way to categorize data. One way to do this is to use reports. Unicenter DSM Reporter will provide your client with a wide array of predetermined reports, enable the creation of customized reports, and provide the ability to query and filter reports so that unnecessary information does not appear in the final view. In this module, you will create a new report template using the Unicenter DSM Reporter, schedule a report and export its results, and modify the output of a report by creating a custom view.
Notes
18-2
Slide 18-2
Slide 18-3
However, if an existing report template does not meet your needs, you can create a new template. You can choose your own fields and link the template to your own or existing queries.
Interactive Demonstration
Task Purpose: Create a new report template and run the report. 1 On the DSM Explorer menu bar, choose Tools DSM Reporter window appears. DSM Reporter. The
Note: DSM Reporter can also be launched from the Quick Start menu or by choosing Start Programs. 2 3 4 5 6 In the left pane, right-click Report Templates and choose New Report Template. The Report Template Type dialog appears. Select Asset or User Report and click OK. The New Asset or User Report dialog appears. On the General tab, type General Info in the Name field. Select the Fields tab and click Add. The FieldBrowser dialog appears. Under Category, select Inventory.
Notes
18-3
Skill Practice
Task Purpose: Create a new report template showing the OS and IP address. 1 2 Using Unicenter DSM Reporter, create a new report template. Type OS and IP Report as the name. Include the following fields: Unit name Domain name to which the unit belongs General Inventory/Operating System/Operating System General Inventory/Network/IP Address
Notes
18-4
Task Summary
If an existing report template does not suit specific requirements, your client can easily create and run a new report template. This ability to customize reports provides the organization with access to the specific data it requires. In the next task, you will customize the report by changing the view.
Notes
18-5
Slide 18-5
The output of a report can be adjusted by redefining the view, which then becomes a custom view.
Interactive Demonstration
Task Purpose: Modify the output of a report by creating a custom HTML view. 1 2 3 4 5 6 7 8 9 In the left pane, expand Report Templates\Hardware\Storage\Drive Information. Right-click Local Drives and choose Run Report. Notice the format in the right pane. Right-click Local Drives and choose Properties. The Properties for Local Drives dialog appears. Select the Default View tab. Select Custom HTML View and click Settings. The Properties for HTML View dialog appears. Select the Groups tab and in the Group field, select the group value. From the Based on list, select Name. Click Add. The Add summary dialog appears. From the Field list, select Local File Systems[All] Add. Free and then click
Notes
18-6
11 From the First sort by list, select Local File Systems[All] Point and click OK. 12 To close the Properties for Local Drives dialog, click OK. 13 In the left pane, expand Results. 14 To see the custom view, select Auto History.
Mount
Skill Practice
Task Purpose: Modify the output of the All Network Adapter Information report template. This is found in DSM Reporter\Report Templates\Network\Adapter Information. 1 2 3 Select the Custom HTML View. Select the computer name as the First Group by value. Select the MAC address as the First Sort by value.
Task Summary
You can now change the output of a report by creating a custom view. This is another way your client can run specific reports according to its needs, which can vary from one company location to another. In the next task, you will schedule and publish a report.
Notes
18-7
Drag-and-drop: The easiest way is to drag the report template to the Scheduled Reports folder or any subfolder under Scheduled Reports. Right-click: Right-click the report you want to schedule and choose Schedule Report. Actions item: On the HTML overview page, in the right pane, under Actions, select Schedule Report.
Slide 18-7
In each case, the Scheduling Properties window appears. Here, you can configure the scheduling settings and schedule the reports to run using an engine instead of generating them manually. After you have scheduled a report, you can link it to an engine. This will create a job and link it to the engine to run as scheduled. You can view results in Unicenter DSM Reporter as soon as the engine processes the job. Reports run by scheduling generate result sets that are located in the Result folder. Individual scheduling properties enable you to define how many result sets to keep from each scheduled report.
Interactive Demonstration
Task Purpose: Schedule a report and publish the results. 1 2 In the left pane, expand Report Templates\Network\Adapter Information. Right-click All Network Adapter Information and choose Schedule Report. The Properties for All Network Adapter Information dialog appears. Select the Scheduling tab and click Set Scheduling. The Scheduling properties dialog appears. Select the Conditions tab.
3 4
Notes
18-8
5 6 7 8 9
Under Periodic dependency, change Run only once a day to once a week and click OK. Select the Publishing tab and click Set Publishing. The Publishing properties dialog appears. Type 5 in the Number of result sets to keep field. Select the Export tab. From the Select the type of export list, select HTML File.
10 Click Properties. The Export to HTML File dialog appears. 11 Type C:\allnetworkadapterinformation.html and click OK. 12 To close the Publishing properties dialog, click OK. 13 Select the Job tab. 14 From the The job is currently linked to list, select SystemEngine and click OK. 15 In DSM Explorer, in the left pane, expand Control Panel\Engines\All Engines. 16 Select SystemEngine. The Reporter job appears in the Task List with the status Waiting. 17 To cancel the current task and process this task, under Actions, click the right arrow and select Yes. 18 After the status changes to OK, return to DSM Reporter. 19 In the left pane, expand Scheduled Reports\All Network Adapter Information\Results. 20 From the Results list, to view its report in the right pane, select a result. 21 To show the report on the Web, in Microsoft Windows Explorer, open: C:\all network adapter information.html
Notes
18-9
Skill Practice
Task Purpose: Schedule the basic Hardware Inventory report and export it as a CSV file. 1 2 Look in Report Templates\Hardware for the report. Schedule the basic Hardware Inventory report to run once a week, with the following parameters: a b 3 4 Set Number of results sets to keep to 1 set. Set Field separator according to local use. For example, the United States uses a comma and Germany uses a semicolon.
Select SystemEngine as the schedule engine. View the results of the report.
Task Summary
You can now schedule reports and publish the results. Using Unicenter DSM Reporter, your client can share report details with any of its users in any location and publish reports to the Web. This improves communication in the organization and enables users to keep up to date. To further simplify the process, your client can also schedule the publishing step. In the next task, you will create a report based on a query.
Notes
18-10
Slide 18-8
Interactive Demonstration
Task Purpose: Create a query-based report. You will create a query and then a report. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain. Expand Queries. Right-click My Queries and choose New. The Select Target dialog appears. Select Computers and click OK. The Query Designer dialog appears. In the left pane, select Link Query. The Select Query dialog appears. Select Computers that do not have SP99 and click OK. Select Preview. The results appear in the right pane. In the Query Designer dialog, under Boolean Operators, select AND. Choose General Information Computer Last Agent Run.
10 From the Operator list, select Days Older. 11 In the Date field, type 30 as the value. This will find computers that have not run the agent in 30 days. 12 Click OK. 13 Select Preview. The Query Preview dialog appears. Recently scanned computers no longer appear in the list.
Notes
18-11
Notes
18-12
Interactive Demonstration
Task Purpose: Create a quick query report. Modify the OS and IP report to query computers matching a name or name pattern when running the report. 1 2 3 4 5 6 7 8 Under OS and IP report, select Query. In the right pane, choose Select Query. Under Report Quick Query, expand Assets and select Matching Name. There is a green check mark to the left of Matching Name. Check Ask for argument when running the report. Click OK. Right-click OS and IP report and choose Run report. The Runtime Query dialog appears. Type us% in the text box. This is not case-sensitive. Click Finish. Only systems with us in their name will appear.
Skill Practice
Task Purpose: Create a query-based report. GIS would like to have a report of the systems in the GIS group and publish it to their internal web page. 1 2 3 4 Create a new report template and type GIS Computers as the name. Add Operating System, Service Pack, Serial Number, and Model fields to the GIS Computers query. Define an HTML-based view and sequence the report items by name. Run the report.
Notes
18-13
Task Summary
You can now create query-based reports that will enable your client to determine the conditions for reporting data. In the next task, you will filter a report for specific information.
Notes
18-14
Slide 18-9
Interactive Demonstration
Task Purpose: Filter a report. To prepare for upgrading all Windows 2000 Professional computers to Service Pack 99, a report was created that shows the service pack level for all computers. Computers running Service Pack 3 require additional maintenance to prepare them for the upgrade. You must limit the results of your Service Pack Level report to show only those computers running Service Pack 3. 1 2 3 4 5 6 7 8 9 In DSM Reporter, in the left pane expand Report Templates\OS and IP report. Select Filter. In the Tasks area, select Select Filter. The Properties for OS and IP report dialog appears. On the Filter tab, select Field. A dialog appears. From the dialog, double-click Operating System Select Operator and double-click LIKE. Select Value and double-click Linux. Click OK. In the left pane, select Filter. The Filter equation appears in the right pane. Operating System.
Notes
18-15
Task Summary
You can now obtain more specific results from a report by filtering data. Filtered data enables your client to quickly identify computers that require the service pack installation. This saves the IT team time and effort. In the next task, you will schedule a report and publish it to an Ingres table.
Notes
18-16
Produce Common Reports Task 6: Schedule and Publish a Report to an Ingres Table
Slide 18-10
Slide 18-11
These results can be imported or exported into spreadsheets, budgeting tools, and other applications. Additionally, you can write the results to an Ingres table, an ODBC database table, desktop database files, text files, and Microsoft Excel worksheet files through ODBC drivers. ODBC is a Microsoft standard for accessing client-server databases.
Interactive Demonstration
Task Purpose: Schedule and publish a report to an Ingres table. 1 2 3 4 5 6 7 8 In the left pane of DSM Reporter, drag OS and IP report to Scheduled Reports. The Properties for OS and IP report dialog appears. Select the Scheduling tab and click Set Scheduling. The Scheduling properties dialog appears. Under Day of the week dependency, check Run only on these days and then check Monday, Tuesday, Wednesday, Thursday, and Friday. Under Periodic dependency, leave Run only once a day selected and click OK. In the Properties for OS and IP report dialog, select the Publishing tab and click Set Publishing. The Publishing properties dialog appears. Select the Save tab and check Save auto generated report. Type yourfirstname in the Table Name field and click OK. Select the Job tab.
Notes
18-17
10 In DSM Explorer, in the left pane, expand Control Panel\Engines\All Engines. Select SystemEngine. 11 In the Task List, confirm that Reporter Job - OS and IP report appears. 12 To cancel the current job before you begin processing this job, under Actions, click the right arrow and click Yes. 13 In the left pane, expand Engine Tasks\Reporter Job - Service Pack Level\Results and select your report. The results appear in the OS and IP report - Scheduled - Date pane. This may take several minutes. 14 To verify the table was created in the Ingres database, in the systray, rightclick Ingres and choose Ingres Visual DBA. 15 In the left pane, expand Nodes. 16 Right-click ASSETREG_dsmservername and choose Connect/DOM. 17 In the middle pane, expand Databases\mdb and select Tables. 18 In the right pane, scroll down to Ryourname. Double-click Ryourname. Details about the new table appear. Unicenter DSM automatically adds an R, which stands for Report, to the beginning of the table name. 19 Select the Rows tab. The Rows data appears.
Notes
18-18
Task Summary
You can optimize use of the Unicenter DSM reporting tool to schedule a report to run at specified times that are convenient for your client. This means employees do not need to waste company time running these reports. You now know how to publish a report so your clients external applications can use the information. In addition, you also know how to publish to an Ingres table. In the next task, you will create another report using Active Directory information.
Notes
18-19
Interactive Demonstration
Task Purpose: Create a report using Active Directory information. 1 Create a new user report with the following inventory fields: 2 3 4 5 Name Type Last Agent execution
Use the GIS Computer Users query. Use Active Directory Information as the report name. In the FieldBrowser dialog, select the Directory Synchronization tab. Select the following: company department displayName
Task Summary
With Active Directory integrated into your Unicenter DSM domain, reports linking Active Directory information with your assets are possible. This means your client can access more report data by using Active Directory to encompass other directories. In the next task, you will create a Remote Control report.
Notes
18-20
Slide 18-13
Interactive Demonstration
Task Purpose: Create a Remote Control report. 1 In DSM Reporter, in the left pane, right-click Report Templates and choose New Report Template. The Report Template Type dialog appears. Select Remote Control Sessions and click OK. The New Remote Control Sessions dialog appears. On the General tab, type Disconnected Data in the Name field. Select the Fields tab and click Add. The FieldBrowser dialog appears. Under Category, select Remote Control. On the Sessions tab, expand Session. Double-click Reason session was terminated and click OK. The FieldBrowser dialog closes. To close the New Remote Control Sessions dialog, click OK. In DSM Reporter, in the right pane, in the Templates area, the Disconnected Data session is now listed.
2 3 4 5 6 7 8 9
Notes
18-21
Skill Practice
Task Purpose: Create a new report template showing the connected user and the duration of sessions. 1 2 Using DSM Reporter, create a new report template with Duration as its name. Include the following fields: Remote Control > Duration Remote Control > User Remote Control > Time
Task Summary
In this task, you created a Remote Control report template. Report templates enable your client to create reports that meet the business needs of their organization. When you create report templates, you help ensure that your reports retrieve only relevant data fields and present these in a suitable report layout.
Notes
18-22
Assessment
1 Which is the easiest method to schedule a report? a b c d 2 Create an engine task. Use the DSM Explorer Quick Start menu. Right-click the Scheduled Reports folder and choose New. Drag-and-drop the template to the Scheduled Reports folder.
Where is the information returned after running a report? a b c d The Results folder The Publishing folder The Scheduling folder The Scheduled Report Template folder
Which type of report enables you to specify criteria when running the report? a b c d HTML report Filtered report Scheduled report Quick Query report
Notes
18-23
Notes
18-24
Slide 18-14
Module Summary
You should now be able to:
Create a New Report Customize a Report Schedule and Publish a Report Create a Query-based Report Filter a Report Schedule and Publish a Report to an Ingres Table Create a Report Using Active Directory Information Create a Remote Control Report
Reports enable your client to have up-to-date information on many aspects of their operation. Using Unicenter DSM Reporter, your client can create customized reports or choose from an array of pre-existing reports. Using queries and filtering, they can specify required data and prevent unnecessary information appearing in the final view. Reports enable your client to find the specific data they need. In the next module, you will use the Web Console to perform administrative tasks from a remote computer.
Notes
18-25
Notes
18-26
19
Add an Enterprise Domain Manager
19-1
Module Objectives
After this module, you will be able to:
Browse the Enterprise Domain Join a Domain to the Enterprise Domain Distribute Software from the Enterprise Domain to the Local Domain Replicate Objects from the Enterprise Domain to the Local Domain Deploy Software from the Enterprise Domain
Module Overview
A Unicenter DSM Enterprise domain further enables your client to manage their assets remotely. Your client can not only enforce policies and procedures remotely but also check records consistently throughout the entire organization. A Unicenter DSM Enterprise domain also remotely manages software, groups, and queries throughout your clients networks. Your client can, for example, deploy or distribute software to the local domain level; therefore, your clients network administrators can save time and also reduce help desk requests for new versions of commonly used software.
Notes
19-2
Slide 19-2
Slide 19-3
The instructor has installed the Enterprise domain on the second instructor computer. By opening an additional Unicenter DSM Explorer, it is possible to browse several domains using this method. However, in this task, you will only explore the Enterprise domain.
Interactive Demonstration
Task Purpose: Browse the Enterprise from the domain. 1 2 3 Right-click DSM Explorer and choose Browse Domain. The Browse Domain dialog appears. Type instructorcomputername in the Manager host-name or IPaddress field. Click OK. If authentication is required, a DSM Explorer - Login dialog appears.
Task Summary
You have browsed the Enterprise domain with Unicenter DSM Explorer. Your clients users can explore any domains available through Unicenter DSM Explorer. This enables them to acquire information about the composition of these domains. In the next task, your instructor will demonstrate how to join a domain to the Enterprise domain.
Notes
19-3
Demonstration
Task Purpose: Join a domain to the Enterprise domain. 1 2 3 4 5 6 7 8 9 In the Enterprise DSM Explorer, in the left pane, expand Control Panel. Expand Domains. Right-click All Domains and choose New Domain. The New Domain Wizard dialog appears. Type localDSMservername in the Specify the name or address of a Domain Manager field. Click Next. The Finish page appears with the message that connection to the domain manager was successful. To close the wizard, click Finish. Select All Domains. In the right pane, the newly connected domain appears. In the left pane, expand Domain\Computers and Users. Select All Computers. In the right pane, a list of all computers in the domain appears.
Notes
19-4
10 In the local DSM Explorer, in the left pane, right-click Domain and choose Properties. The Domain Properties dialog appears. 11 Select the Enterprise tab. This tab contains the Enterprise name and the date on which it was created.
Task Summary
You have joined a domain to the Enterprise domain. You clients local domains can be effectively managed as members of a central Enterprise domain. This improves control and uniformity of tasks as software deployment. Local domains throughout the organization can operate at the same level of efficiency and providing your client with faster, more accurate results. In the next task, your instructor will demonstrate how to distribute software from the Enterprise domain to a local domain.
Notes
19-5
Task 3: Distribute Software from the Enterprise Domain to the Local Domain
To help ensure the consistency of registered applications in each local domain, your client can distribute software from the Enterprise domain manager down to the local domains by using orders.
Slide 19-6
Distribution containers contain a limitless number of these orders. The orders can be to perform any of the following actions automatically at the domain:
Register an item or item procedure in a domain software package library Install or uninstall a program Activate or cancel an activation order Deregister and remove programs Fetch files from the domain Register or deregister a software policy on the domain Archive or purge and restore library items
Slide 19-7
These actions occur in the order in which they are listed in the distribution container.
Demonstration
Task Purpose: Distribute software from the Enterprise domain to the local domain. 1 2 3 4 On your desktop, double-click the ClassFiles folder and navigate to Apps\Usd\Packaged. From the folders list, select Cnotepad and Cwordpad using SHIFT. Right-click this group and choose Copy. In the Enterprise DSM Explorer, in the left pane, expand Software/ Software Package Library.
Notes
19-6
5 6 7
Right-click All Software and choose Paste package(s). Select All Software and expand Jobs.
Folder(s) to Import SW
Right-click Software Distributions and choose New Software Staging Distribution Job. The Software Storage Package Wizard dialog appears. Click Next. The Packages selection page appears. From the Software Packages list, expand All Software.
8 9
10 Scroll down and select Cetus_CNotepad (SXP) 3.0/00 and Cetus_CWordpad (SXP) 3.0/00. 11 Click Next. The Domains selection page appears. 12 From the Domains list, select All Domains. 13 Click Next. The Scalability Servers selection page appears. 14 From the Scalability Servers list, select All Scalability Servers. 15 Click Next. The Finish page appears. 16 Click Finish. A prompt appears with the message that you have not entered a job container. To have the system assign a container name, click Yes. 17 In the Enterprise DSM Explorer, in the left pane, expand Software Distributions. 18 Select All Scalability Servers [current date earliest time]. In the right pane, the domains are listed. Monitor the distribution status. After a few minutes, the status is Executed OK. You have distributed software from the Enterprise domain to the local domain. You can confirm that the deployment was successful by looking for the software in the software package library.
Notes
19-7
Demonstration
Task Purpose: Confirm software distribution. 1 In the local DSM Explorer, in the left pane, expand Software\Software Package Library. In the right pane, the list of all software in the domain appears. Verify that CNotepad and CWordpad have been distributed from the Enterprise and are now registered in the local library. Right-click CNotepad and choose Properties. Notice the Filed by field indicates Enterprise Administrator.
When you see Enterprise Administrator, you know that you have successfully distributed software from the Enterprise domain.
Task Summary
You have distributed software from the Enterprise domain. Each of your clients local domains can now be updated uniformly with the applications that the organization requires for the most efficient and productive business practices. The Enterprise domain manager automatically gathers and shares information about newly added domains through replication. In the next task, your instructor will demonstrate how to replicate objects from the Enterprise domain to a local domain.
Notes
19-8
Add an Enterprise Domain Manager Task 4: Replicate Objects from the Enterprise Domain to the Local Domain
Slide 19-8
Task 4: Replicate Objects from the Enterprise Domain to the Local Domain
When a local domain manager is connected to an Enterprise domain manager, a replication job is automatically created and linked to the system engine in the domain manager. The engine runs this job immediately to replicate the data from the local domain manager to the Enterprise domain manager. Data is also replicated from the Enterprise domain manager to the local domain manager. By default, this job is scheduled to run continually. However, by creating a group on the Enterprise domain, you can manually initiate Replication.
Slide 19-9
The following table lists the database objects that are replicated down from the Enterprise domain to the local domain and upward from the local domain to the Enterprise domain: Object Discovered Computers Discovered Users Discovered Computer Users (relations between computer and users) External Assets Definitions External Assets Computers General Inventory External Assets Inventory Query Definitions Group Definitions Replication Direction up up up down up up up down down
Notes
19-9
Object Group Membership Custom Made Software Definitions Computers Software Inventory (found based upon signature scan) Asset Management Jobs Asset Management Job Status Asset Management Modules Asset Management Modules Status
Asset Management Configuration File Definitions down Asset Management Configuration Files Asset Management Template Definitions Asset Management Policy Definitions up down down
Demonstration
Task Purpose: Create a group from the Enterprise domain to initiate the replication of the group definition and membership. 1 In the Enterprise Unicenter DSM Explorer, in the left pane, right-click Computers and Users and choose New Group. The New Group dialog appears. Type Deploy CNotepadyourinitials in the Name field and click OK.
Notes
19-10
3 4
In the left pane, drag-and-drop your Unicenter DSM servername to the new group. In the left pane, select Deploy Notepadyourinitials. After a few minutes, the group and members are replicated down to the local managers.
Task Summary
You have caused the replication of objects by creating a new group. The Enterprise domain manager automatically replicated the name and membership of that group to the local domain managers. This exchange of data between the Enterprise domain manager and the local domain manager means that changes to either domain will be communicated and updated regularly. In the next task, your instructor will demonstrate how to deploy software from the Enterprise domain.
Notes
19-11
Demonstration
Task Purpose: Deploy software from the Enterprise domain. 1 Right-click Software Distributions and choose New Software Deployment Distribution Job. The Deploy Software Package Wizard dialog appears. Click Next. The Packages and Procedures selection page appears. From the Software Packages and Procedures list, expand All Software. Scroll down and select Cetus_CNotepad (SXP) 3.0/00. Click Next. The Domains selection page appears. From the Domains list, select All Domains. Click Next. The Targets selection page appears. From the Targets list, select Deploy CNotepadyourinitials. Click Next. The Finish page appears.
2 3 4 5 6 7 8 9
10 Click Finish. A prompt appears with the message that you have not entered a job container. To have the system assign a container name, click Yes. 11 In DSM Explorer, in the left pane, expand Software Distributions. 12 Under Software Distributions, select Deploy CNotepadyourinitials [current date]. 13 Monitor the distribution and deployment of the job. The job runs on your local domain manager. When prompted to do so, choose Run.
Notes
19-12
Task Summary
You have deployed software from the Enterprise domain. Not only does your client save time and effort, but they can also maintain consistency more efficiently by making such deployments to all local domains in the organization, with the Enterprise domain as the single point of control. Local domains receive uniform software deployments so your client can help ensure that all domains are updated with the most recent and useful applications without frequent, numerous help desk tickets.
Notes
19-13
Assessment
1 To how many Enterprises can a local domain manager report? a b c d 2 One Two Unlimited As many as the number of local domains
How many orders can a distribution container hold? a b c d One Two Unlimited As many as the number of local domains
What determines the order in which actions in the distribution container are carried out? a b c d The size of the Enterprise domain The date on which the action was created The date on which the container was populated The order in which they are listed in the container
Notes
19-14
Which engine runs the replication job? a b c d The local engine in any scalability server The system engine in the domain manager The local engine in the local domain manager The system engine in the Unicenter DSM Reporter
Notes
19-15
Module Summary
You should now be able to:
Browse the Enterprise Domain Join a Domain to the Enterprise Domain Distribute Software from the Enterprise Domain to the Local Domain Replicate Objects from the Enterprise Domain to the Local Domain Deploy Software from the Enterprise Domain
You have browsed the Enterprise domain with Unicenter DSM Explorer and joined a local domain to the Enterprise domain. You have managed local domains with the Enterprise domain by deploying software and replicating objects. Your client can save administrative time and effort by employing a central management point for many local domains in the organization. In the next module, you will deploy Unicenter Patch Management.
Notes
19-16
20
Deploy Unicenter Patch Management
20-1
Module Objectives
After this module, you will be able to:
Install Unicenter Patch Management Execute the Patch Management Process Create Patch Policy for Production Deployment Run Pre-existing Reports Customize the User Interface Create a Patch Filter
Module Overview
Your client requires computers in their organization to be maintained with the most current patches from various vendors. Because patches are released with increasing frequency, being proactive in patch management is crucial for your client to remain current and competitive. Manual patch management is errorprone. Unicenter Patch Management enables your client to avoid costly mistakes. In this module, you will install and deploy Unicenter Patch Management. You will create patch policy and run pre-existing reports. You will also configure the user interface to your specific needs and create a patch filter.
Notes
20-2
Slide 20-2
Slide 20-3
Unicenter Patch Management: This resides on your system and provides a wizard-driven user interface to simplify the patch management process package creation, testing, enterprise deployment, and patch-level assurance. The CA Online Content Service: This checks for available patches, gathers the available patch data, and validates and identifies dependencies. These tasks are performed before publishing and distributing the patch information to the Unicenter Patch Management server.
Notes
20-3
Notes
20-4
Interactive Demonstration
Task Purpose: Install and configure Unicenter Patch Management. Unicenter Patch Management must first be installed from your desktop. 1 2 3 4 5 Navigate to the D:\ClassMedia\UPM folder. Double-click the Setup.exe file. The InstallShield Wizard for Unicenter Patch Management dialog appears. Click Next. The License Agreement page appears. Read the agreement and click I Agree. The Customer Information page appears. Accept the default settings and click Next. The Select Features page appears. By default, Patch Management Application and Product Documentation are selected. Click Next. After the wizard runs a prerequisites check, the MDB Database Configuration page appears. By default, Local is selected. Unicenter Patch Management will connect to a local MDB. 7 Accept the selection and click Next. By default, Ingres is selected as the provider of the database to which Unicenter Patch Management will connect. 8 9 Accept the selection and click Next. The UPMAdmin and UPMUser Passwords page appears. Under Administrator, type edu2k in the Password and Confirm Password fields.
10 Under User, type edu2k in the Password and Confirm Password fields. 11 Click Next. The DSM Webservice Configuration page appears. 12 Type local administrator credentials in the DSM UserID and Password fields.
Notes
20-5
20 Type upm in the Password field and press ENTER. The Unicenter Patch Management window appears. 21 Select the Administration tab. 22 Type usilis03.ca.com in the HTTP Proxy field. 23 Type 80 in the Port field. 24 Click Use Above Proxy Settings For HTTP and FTP. 25 In the No Proxy For field, type the ipaddress;computername;computername.domainname for your Unicenter DSM server. 26 Click Save. 27 Select the Dashboard tab. The Unicenter DSM Service reports Active.
Notes
20-6
Task Summary
You have installed Unicenter Patch Management. As you saw, part of the installation process is configuration. Unicenter Patch Management automates the identification, gathering, packaging, deployment, and ongoing validation of patches and the related software configuration changes throughout the enterprise. Therefore, your clients employees are not required to spend time manually keeping the organizations computers up-to-date with the latest patches. In the next task, you will execute the patch management process.
Notes
20-7
Slide 20-6
The patch management process has a series of steps: 1 2 3 4 5 Review the list of potential patches provided by the CA Online Content Service team. Accept patches to download. Deploy accepted patches to selected targets for testing. Approve the patches that have been successfully tested. Deploy approved patches to additional targets or add to patch policies for automatic deployment to the enterprise or target groups.
Slide 20-7
Microsoft Windows Service Packs for Windows 2000, Windows XP, Windows Server 2003 (English, French, Italian, German, Spanish, Japanese) Full Security Roll-up Packages for Windows 2000, Windows XP, Windows Server 2003 (English) (available Jan/Feb 06 - French, Italian, German, Spanish, Japanese) Individual Security Updates for Windows NT 4.0, Windows 2000, Windows XP, Windows server 2003 (English) Microsoft Internet Explorer 6 Security Updates (English)
Notes
20-8
Deploy Unicenter Patch Management Task 2: Execute the Patch Management Process
Slide 20-8
Microsoft Office 2003 Service Packs (English) CA Unicenter Patch Management r11 Patches
When necessary, Microsoft provides a new security update on the second Tuesday of each month and issues a bulletin announcing the update. These updates are consolidated into CA Hot-Fix Roll-up patches by the CA Content Team and are made available to Unicenter Patch Management subscribers. These roll-up patches enable the Unicenter Patch Management administrators to receive all patches in one package rather than accepting and downloading the patches individually. Unicenter Patch Management identifies superseded patches and all the prerequisites of those patches. If you have created a policy that contains superseded patches, CA will automatically replace those patches with the new ones when the superseding patches are approved. Unicenter Patch Management is a repository for information about patches. It stores information that identifies the affected software, release, and impacted files. It also identifies how a patch relates to other patches and applications. Your client can identify the patches that are most suitable to their environment and can select and accept the patches they require. After a patch has been accepted, Unicenter Patch Management establishes a link to the relevant vendor's website, downloads the patch content from the vendor, and then displays the patch in the Patches Pending Testing portlet. The patch is then deployed to selected targets for testing. When it is verified that the patch functions correctly, it can be approved for deployment to additional targets. For up-to-date information on available Unicenter Patch Management patches, visit the Unicenter Patch Management Information Center at: http://www3.ca.com/udm/upm/
Slide 20-9
Notes
20-9
Interactive Demonstration
Task Purpose: Accept a patch. 1 In the Unicenter Patch Management window, on the Dashboard tab, from the Patches Pending Acceptance list, select a patch provided by your instructor package. The Patch Details window appears. In the left pane, under Detailed Patch Information, select Supersedes. Patches that are superseded by this patch are displayed. In the left pane, select Identification. A list of general details appears. In the right pane, in the General area, the patch Status is Pending User Acceptance. Accept is the default value in the Actions list. Verify this value and click Go. The status changes to Accepted. Click Done. The Dashboard tab appears.
2 3 4
You have accepted the patch. Unicenter Patch Management will now set up groups and software packages for this patch on the Unicenter DSM server. It will then download the patch from the content server. After this occurs, the patch will appear in the Patches Pending Testing portlet. This process can take several minutes depending on the number of files included in the patch. The progress can be monitored by selecting Patches in the left pane and Filter by Accepted or Packaging. Select Files and view the status of the download. Next, the patch must be tested.
Interactive Demonstration
Task Purpose: Test the patch. 1 2 3 On the Dashboard tab, from the Patches Pending Testing list, select the previously accepted patch. The Patch Details window appears. In the left pane, under Advanced Options, select Test Patch. The Deploy Patch: Select Targets window appears. Under Available Targets, from the All Targets list, select the workstation name provided by your instructor.
Notes
20-10
4 5 6 7 8
Click the right arrow. The workstation name provided by your instructor appears in the Selected Targets field. Click Next. The Deploy Patch: Schedule Deployment window appears. Accept the default Deploy Patch Now selection and click Next. The Deploy Patch: Confirm Deployment window appears. Click Finish. The Patch Details window appears. In the left pane, under Advanced Options, select Deployment Status. The Dashboard tab appears. Notice the patch deployment Status is In Progress. Select the Deployment Id.
10 In the left pane, select Targets. In the right pane, a list of target computers appears. 11 In the right pane, select the workstation name provided by your instructor. The Machine details window appears. 12 Click Unicenter AMS. 13 Click UPM. The Deployment window appears. 14 In the left pane, select General. In the right pane, the General Deployment Information appears. 15 Click Done. The Dashboard tab appears. The Unicenter Patch Management group, software package, and software job can be viewed in the Unicenter DSM Explorer. You have tested the patch. Next, you will approve a patch.
Notes
20-11
Interactive Demonstration
Task Purpose: Approve a patch. 1 2 3 4 5 Select the Patches tab. From the Filter By list, select Testing and click Go. From the Patch Name list, select the tested patch. From the Select and list, select Approve and click Go. From the Filter By list, select Approved and click Go.
Skill Practice
Task Purpose: Accept, test, and approve a Microsoft patch for Windows 2000 Professional. 1 2 3 Accept a patch. Test the patch. Approve the patch.
Task Summary
In the patch management process, a patch must be accepted for download, tested, and approved for deployment. Unicenter Patch Management automates the patch management process for your client. This automation reduces the errors that can be caused by manual management processes. Your client saves time that would have been spent correcting these errors. In the next task, you will prepare for deployment by creating a patch policy.
Notes
20-12
Deploy Unicenter Patch Management Task 3: Create Patch Policy for Production Deployment
Slide 20-10
Slide 20-11
Patches must be added to specific patch polices to ensure the patch is distributed to the target computers in the patch policy. When checking for compliance, Unicenter Patch Management identifies noncompliant computers as exceptions. This helps ensure target computers comply with guidelines set out by their corresponding patch policy. Patch policies help ensure that your clients computers are compliant with current and required patches. Your client is protected from the acceptance or deployment of patches that are inappropriate or even dangerous for their computers.
Interactive Demonstration
Task Purpose: Add a patch to a policy. 1 2 3 4 5 6 Select the Policies tab. Click Add. The Policy Detail window appears. Type UPM Patch Policy in the Name field. Click Select. The Software List window appears. From the Filter By list, accept the default Show All and click Go. The window refreshes. From Software with approved patches list, select the software provided by your instructor.
Notes
20-13
10 Click Add Selected. The window refreshes. Above the Patches list, the message Confirmation: The selected patches were added successfully appears. 11 Click OK. The Policy Detail window appears. You have added a patch to a policy. Next, you will identify compliance.
Interactive Demonstration
Task Purpose: Identify compliance to patch policy. 1 In the Policy Detail window, click OK. The Policies tab appears. The status of the UPM Patch Policy is Building. After the policy has finished evaluating, the status is Violation. From the Actions menu for the UPM Patch Policy, select View and then click Go. The Policy Detail window appears. In the left pane, under Advanced Options, select Policy Compliance. The # of Violations column indicates there are violations. Click Details. Computers that do not meet the policy are indicated. Click Done.
2 3 4 5
Skill Practice
Task Purpose: Create patch policy for production deployment of the Microsoft Windows 2000 Professional approved patch. Use this Microsoft patch. 1 2 Add a patch to a policy. Identify compliance to patch policy.
Notes
20-14
Task Summary
You have added a patch to a policy and identified compliance to the patch policy. Patch policies help ensure target computers comply with guidelines set out by their corresponding patch policy. If the computers do not comply, the patches are automatically deployed to those computers. Unicenter Patch Management requires patches that are tested and approved, and protect your client from the acceptance or deployment of patches that are inappropriate or even dangerous for their computers. In the next task, you will run pre-existing reports to gather information about deployed patches.
Notes
20-15
Slide 20-13
Identifies a list of all By patch severity active patches and By patch name groups them by severity Displays computers that are an exception to a patch policy
By software By patch policy within
that software
By computer within
Notes
20-16
Description Displays a list of downloads that have been scheduled, grouped by the date the download was completed Displays a list of downloads that have been scheduled, grouped by the status of the download Displays a list of Unicenter Patch Management events that have occurred, grouped by event type Shows a list of all inactive patches, grouped by severity Displays a list of Unicenter Patch Management events that occurred in the previous day, grouped by event type
Order Displayed
By the completed date
download
By patch severity By patch name By event type By the date and time
Notes
20-17
software
Notes
20-18
Interactive Demonstration
Task Purpose: Run pre-existing reports. 1 2 On the Dashboard tab, select Reports. The Reports list appears. From the Reports list, under Actions for the Active Patches, Listed by Severity report, click View published report Report window appears. 3 4 5 6 To view a chart of the report, select Chart View. Click Done. The Reports list appears. From the Reports list, under Actions for the Active Patches, Listed by Severity report, click Edit report configuration Patches, Listed by Severity window appears. 7 8 .The Report Active . The Generated
Under Schedule, from the Days list, press SHIFT and select Monday, Tuesday, Wednesday, Thursday, and Friday. Click OK. The Reports list appears. To go to the end of the Reports list, at the right side of the window, click the double chevron (). To go to the beginning of the Reports list, at the right side of the window, click the double chevron ().
From the Reports list, under Actions for the Events, Listed by Type report, select View published report. The Generated Report window appears.
10 To view report details, scroll down the Report View list. 11 To view a chart of the report, select Chart View. 12 Click Done.
Notes
20-19
Skill Practice
Task Purpose: Run pre-existing reports. 1 View the downloads listed by Status.
Task Summary
You have run pre-existing reports and have viewed the report details and the related graphs. Reports provide your client a means to view the status of patches, computers, events, and software applications. This enables your client to maintain accurate inventory information related to patches. Time and effort can be saved when this information is needed quickly. In the next task, you will customize the user interface.
Notes
20-20
Slide 20-14
Slide 20-15
You can edit the following aspects of the Unicenter Patch Management user interface:
User Settings Dashboard Summary Portlet Settings Table Settings Filter Settings
Interactive Demonstration
Task Purpose: Create a user. 1 2 3 4 5 6 Select the Administration tab. Select User Management. The Users area appears. Click Add. The User window appears. Type yourname in the User Name field. Type password in the Password and Confirm New Password fields. Click OK. The Users list appears with the user name you created.
Notes
20-21
Interactive Demonstration
Task Purpose: Log in as a user. 1 2 3 4 5 Click Log In. The Log In dialog appears. Type yourname in the User Name field. Type password in the Password field. Click Log In. The AutoComplete dialog appears. Click No. You are logged in to Unicenter Patch Management as yourname. The Dashboard tab appears.
You have logged in. Next, you will change the table settings.
Interactive Demonstration
Task Purpose: Change table settings for patches. 1 2 3 Click My Profile. The My Profile window appears. In the left pane, select Table Settings. In the right pane, from the Tables list, under Action for the Patches table, click Edit table preferences appears. 4 5 6 . The Table Detail window
From the Rows Per Page list, select 20. From the Default Filter list, select Pending User Acceptance. Click OK. The My Profile window appears.
Notes
20-22
Task Summary
You have created a user, logged in as that user, and changed table settings. Customizing the user interface of Unicenter Patch Management enables your client to configure Unicenter Patch Management to meet their specific needs. This flexibility enables fast and accurate completion of patch management tasks. In the next task, you will create a patch filter.
Notes
20-23
Slide 20-17
Slide 20-18
You can further specify the order in which the results are displayedby name, manufacturer, version label, or version number.
Interactive Demonstration
Task Purpose: Create a patch filter. 1 2 3 In the My Profile window, in the left pane, under Filter Settings, select Patches. In the right pane, the Patch Filters list appears. Click Add. The Patch Filter Detail window appears. Type Microsoft XP in the Filter Name field.
Notes
20-24
4 5 6 7 8 9
Type %XP% in the Patch Name Mask field. To select the mask, click the right arrow. %XP% appears in the larger field at the right of the window. Click the Filter By Manufacturers arrow. Type Micro% in the Mask field and click Go. The window refreshes. From the Available list, select Microsoft Corporation. Click the right arrow. Microsoft Corporation appears in the Selected list.
10 Click OK. The My Profile window appears. 11 Click Save. 12 To exit the My Profile window, click Done. The Dashboard tab appears. 13 Select the Patches tab. 14 From the Filter By list, select Microsoft XP and click Go. In the Patches list, the filter results appear.
Skill Practice
Task Purpose: Create a patch filter. 1 2 Create a patch filter for Administrator - CA products with hot in the name. Use the CA Content Team as the manufacturer.
Skill Practice
Task Purpose: Configure table settings. 1 2 3 Change the default filter for the Patches table to Accepted. Save the settings. Verify that the Accepted filter is the default.
Notes
20-25
Task Summary
You have created a patch filter. Other kinds of filters can be created, and each can help your client refine search criteria, saving search time and improving accuracy. Your client can quickly determine what kinds and versions of patches their organization is using at any time. This makes planning for future upgrades and software acquisitions that will require the correct patches more costeffective.
Notes
20-26
Hint
Use the CA Content Team as the manufacturer.
Notes
20-27
Assessment
1 Which two processes does Unicenter Patch Management automate? (Choose two.) a b c d e 2 Deleting Gathering Rebooting Forwarding Identification
Which task must you perform first before executing patch management? a b c d Accept patches. Distribute patches. Approve tested patches. Review a list of potential patches.
Which statement describes patch policies? a b c d Patch policies are groups of patches that must be approved. Patch policies apply to groups of computers to which data must be transferred. Patch policies apply to groups of patches that have been approved and are available for deployment. Patch policies apply to groups of target computers associated with certain software components and related patches.
Notes
20-28
Which statement is accurate about reports? a b c d Reports can be modified and deleted. Reports can be deleted, but not modified. Reports can be scheduled and run manually. Reports can be modified and must be scheduled.
Which aspect of the Unicenter Patch Management user interface can you configure? a b c d Patch settings Policy summary Password settings Dashboard summary
Which two items can you set filters for? (Choose two.) a b c d e Date Patches Software Filter name Manufactures
Notes
20-29
Module Summary
You should now be able to:
Install Unicenter Patch Management Execute the Patch Management Process Create Patch Policy for Production Deployment Run Pre-existing Reports Customize the User Interface Create a Patch Filter
Unicenter Patch Management automates patch management and enables your client to effectively deploy patches and validate resulting software configuration changes throughout the organization. This consistent configuration enables computers to operate effectively and alleviates the burden of IT departments as they no longer need to constantly monitor software patches. Filtering enables quick searches for specific patch information. Your client can now effectively maintain the software on their organizations computers with the most current patches from various vendors. In the next module, you will deploy Unicenter Asset Intelligence.
Notes
20-30
21
Manage Data in Unicenter Asset Intelligence
21-1
Module Objectives
After this module, you will be able to:
Position Unicenter Asset Intelligence Install PHP: Hypertext Preprocessor Install Unicenter Asset Intelligence Configure Unicenter Asset Intelligence Import LDAP Data with the Administrative Console Employ Unicenter Asset Intelligence Customize Unicenter Asset Intelligence
Module Overview
Unicenter Asset Intelligence is an asset management solution that enables your client to identify anomalies, avoid unnecessary expenses, assess risk, and comply with industry regulations. Unicenter Asset Intelligence not only organizes and summarizes data gathered by Unicenter Asset Management, but it also presents the information in the most appropriate fashion for the organization. Unicenter Asset Intelligence enables your client to process changes continually across their enterprise and enables compliance with external and internal policies. Unicenter Asset Intelligence provides technology managers with actionable intelligence, enabling them to make smarter choices. In this module, you will position Unicenter Asset Intelligence, install PHP, install Unicenter Asset Intelligence, import LDAP data with the Administrative Console, employ Unicenter Asset Intelligence, and customize Unicenter Asset Intelligence.
Notes
21-2
Manage Data in Unicenter Asset Intelligence Task 1: Position Unicenter Asset Intelligence
Slide 21-2
Slide 21-3
Managing Risk
Unicenter Asset Intelligence also assists in managing risk by helping ensure compliance with both internal and external policies, regulations, and industry best practices. By analyzing asset information and providing quick answers through an intuitive interface, Unicenter Asset Intelligence enables organizations with the intelligence to manage IT assets in a proactive and decisive manner.
Slide 21-4
What kind of IT assets you have How many IT assets you have Which assets are unmanaged Where these assets are located and which departments are using them Which assets are underused and can be consolidated Which assets are running unsupported operating systems How the enterprise has changed from the previous month
Slide 21-5
Notes
21-3
Task Summary
You have positioned Unicenter Asset Intelligence as a powerful tool that enables the most proactive management and efficient use of your clients IT assets. In the next task, you will install PHP.
Notes
21-4
Manage Data in Unicenter Asset Intelligence Task 2: Install PHP: Hypertext Preprocessor
Slide 21-7
Interactive Demonstration
Task Purpose: Install PHP. 1 2 3 4 5 6 7 8 9 Log out as the Unicenter Asset Intelligence domain administrator and log in as the local administrator. On your desktop, double-click Services. The Services dialog appears. From the Services list, select IIS Admin Service. On the toolbar, click Stop Service. The Stop Other Services dialog appears. To stop the other services listed in the dialog, click Yes. Close the Services dialog. On your desktop, double-click the ClassMedia folder. The D:\ClassMedia dialog appears. Open the PHP folder. Double-click the php=5.0.5=installer.exe file. The installation wizard appears.
10 On the Welcome page, click Next. The license agreement page appears. 11 Click I Agree. The Installation Type page appears.
Notes
21-5
Extract Files
19 In the ClassMedia folder, double-click the php-5.0.5-Win32.zip file. The Winzip - php-5.0.5-Win32.zip dialog appears. 20 Press CTRL and select the php_gd2.dll, php_ldap.dll, ssleay32.dll, libeay32.dll, and php.exe files. 21 Click Extract. The Extract - D:\ClassMedia\PHP\php-5.0.5Win32.zip dialog appears. 22 In the Extract to tree view, expand Local Disk (C)\PHP. Verify that C:\PHP appears in the Extract to field. 23 Clear Use Folder Names. 24 Click Extract. 25 Close the Winzip - php-5.0.5-Win32.zip dialog.
Notes
21-6
31 In the Find what field, type extension=php_gd2 and click Find Next. 32 Place your cursor at ;extension=php_gd2.dll and remove the semicolon. 33 Move down to ;extension=php_ldap.dll and remove the semicolon. 34 Choose File Save and close Notepad. 35 Close the C:\PHP dialog.
Notes
21-7
Notes
21-8
58 In the New Web Service Extension dialog, select Set extension status to Allowed and click OK. The New Web Service Extension dialog closes. 59 Close the Computer Management dialog.
Task Summary
You have installed PHP. This is necessary prior to installing Unicenter Asset Intelligence. You are now able to proceed with the steps required to make Unicenter Asset Intelligence a powerful component of your asset management system. In the next task, you will install Unicenter Asset Intelligence.
Notes
21-9
Slide 21-9
Interactive Demonstration
Task Purpose: Install Unicenter Asset Intelligence. 1 2 3 Create two Microsoft Windows users. Type aiowner and aiuser as their names. In the Create New User dialog, type Un1center as the password. Clear User must change password at next logon. Note: 4 5 These users are only required if they are using an Ingres MDB.
On your desktop, double-click the ClassMedia folder. The D:\ClassMedia dialog appears. Double-click the UAI folder. The contents of the folder appear.
Notes
21-10
6 7 8 9
Double-click the SETUP.BAT file. The Unicenter Asset Intelligence Product Explorer dialog appears. In the tree view, expand Windows. Select Unicenter Asset Intelligence and click Install. The Choose Setup Language dialog appears. Click OK for the appropriate language. The InstallShield Wizard page appears and installation begins. Note: The Unicenter Asset Intelligence - InstallShield Wizard warning dialog might appear, indicating that Microsoft Java drivers have not been found. Click OK. These are required for a Microsoft SQL installation. The Welcome to the InstallShield Wizard for Unicenter Asset Intelligence page appears.
10 Click Next. The licensing agreement page appears. 11 Scroll down to read the agreement and click I Agree. The Customer Information page appears. 12 Accept the default User Name and Company Name values and click Next. The Choose Destination Folder for Asset Intelligence Program Files page appears. 13 Click Next. The Folder does not exist. Create it? prompt appears. 14 Click Yes. The Choose Virtual Directory Path page appears. 15 Click Next. The Folder does not exist. Create it? prompt appears. 16 Click Yes. The Asset Intelligence Web Server Users page appears. 17 Accept the default Domain Name and User Name values and click Next. The Choose Database Management System page appears. 18 Click Next. The Asset Intelligence Database Credentials page appears.
Notes
21-11
Task Summary
You have installed Unicenter Asset Intelligence. Your client can use the features as they exist when Unicenter Asset Intelligence is first installed. Your client can also configure settings to suit their particular needs. In the next task, you will configure Unicenter Asset Intelligence.
Notes
21-12
Manage Data in Unicenter Asset Intelligence Task 4: Configure Unicenter Asset Intelligence
Slide 21-10
Slide 21-11
Interactive Demonstration
Task Purpose: Populate the instructors DSM server with the student workstations. 1 2 Log in to your computer using domain administrator credentials. Right-click the Unicenter DSM systray and choose Common Agent Properties. The DSM Properties - Common Agent dialog appears. Type instructorcomputername in the Registered to server field. To close the dialog, click OK. Right-click the Unicenter DSM systray and choose Common Agent Register. Click Start and choose Log Off administrator. The Log Off Windows dialog appears. Click Log Off. Log in using domain administrator credentials. Right-click the Unicenter DSM systray and choose Asset Management Agent Start Job Check.
3 4 5 6 7 8 9
Notes
21-13
Interactive Demonstration
Task Purpose: Populate data into Unicenter Asset Intelligence. 1 2 3 4 5 6 7 8 9 Open Internet Explorer. Use Windows Internet Explorer Favorites to open the Asset Intelligence Administrative Console link. Type administrator in the User name field. Type administratorpassword in the Password field. The Administrative Console window appears. From the Select Admin Function portlet, select General Settings. The General Settings window appears. In the Asset Intelligence Database portlet, type Un1center in the aiowner Password field. Type Un1center in the Password field. Click Save. In the Add Data Sources portlet, type instructorcomputername in the Server Name field.
10 Type aiowner in the Username field. 11 Type Un1center in the Password field. 12 Click Connect and then click Save. In the Active Data Sources portlet, the source you have just configured appears. 13 Click Done. 14 Return to your desktop. 15 Double-click Services. The Services dialog appears. 16 Select the Standard tab.
Notes
21-14
17 Under Name, double-click CA Unicenter Asset Intelligence. The CA Unicenter Asset Intelligence Properties (Local Computer) dialog appears. 18 Click Stop. 19 Type RunNow in the Start parameters field. 20 Click Start. 21 To close the CA Unicenter Asset Intelligence Properties (Local Computer) dialog, click OK. 22 Close the Services dialog.
Task Summary
You have configured and run the process to populate data from a database source to Unicenter Asset Intelligence. Your client can manually initiate this process at any time. This provides flexibility to make additions to the database without waiting for automatic updates. In the next task, you will import LDAP data with the Administrative Console.
Notes
21-15
Slide 21-13
User ID (samid) First name (fn) Last name (ln) Managers User ID (mgr) Company name Department (dept) Location (office)
Note: By default, the organization designation is based on the value supplied for Company name; however, you can change this to Location or Department through the Admin User Interface. If Unicenter Asset Intelligence is unable to identify the owner of an asset, it allocates this asset to a default organization named No Org.
Slide 21-14
The two methods for importing this information into the database tables are with the Administrative Console and the Command Line Interface (CLI).
Notes
21-16
Interactive Demonstration
Task Purpose: Customize the organization source. 1 On the Administrative Console, select Define and Import Organizations. The Define and Import Organizations window appears. From the Define Organization Source portlet, click Customize. The Advanced LDAP Interface window appears. In the LDAP Bind portlet, type domainname\administratort2 in the User ID field. Type the administratort2 password in the Password field. Click Connect. In the Extract and Import portlet, click Execute. Click Check Log. Verify that a job is submitted and the Extract Job Status is complete. Click Done. The Define and Import Organizations window appears.
2 3 4 5 6 7 8
Import an Organization
9 In the Add Organization portlet, from the Owner list, select John Stevens - Administrator.
10 Click Save. 11 Click Commit. 12 Click Done. The Administrative Console window appears. 13 From the Internet Explorer Address list, select http://localhost/caai. The Unicenter Asset Intelligence user interface appears. 14 Select the Browse Organization tab. 15 In the left pane, select Organization.
Notes
21-17
Skill Practice
Task Purpose: Configure Unicenter Asset Intelligence. 1 2 3 4 Change your administrator login to report to another user. Run the LDAP utility. Commit the new organization with your new manager. Browse the new organization in the Unicenter Asset Intelligence user interface.
Task Summary
You have configured Unicenter Asset Intelligence to import LDAP data with the Administrative Console. Your client can use the web interface to see assets organized according to user and location details. This makes it easier to trace assets of a particular kind or in a particular location for accurate inventory purposes. In the next task, you will employ Unicenter Asset Intelligence to resolve questions about the organizations assets through reports and screen views.
Notes
21-18
Manage Data in Unicenter Asset Intelligence Task 6: Employ Unicenter Asset Intelligence
Slide 21-15
Slide 21-16
Interactive Demonstration
Task Purpose: Create a report of Dell systems in Canada. The service contract for Dell is about to expire for the organizations systems in Canada. The contracts administrator needs to know how many systems will be affected. 1 2 3 4 5 6 7 8 9 In Unicenter Asset Intelligence, select the Hardware tab. In the Hardware portlet, select Server Vendors. The Servers window appears. In the Vendor portlet, under Vendor Name, select VMware, Inc. In the Vendor portlet, click Exclude. The Servers Vendor: Not VMware, Inc. window appears. At the top of the Hardware tab, click Model. In the Model portlet, select Optiplex GX280. In the Model portlet, click Include. The Servers Model: Optiplex GX280+Vendor: Not VMware, Inc. window appears. At the top of the Hardware tab, click Location. In the Location portlet, select Canada.
Notes
21-19
Interactive Demonstration
Task Purpose: Create a CEO computer summary. The assistant to the CEO would like to know which systems belong to the CEOs direct reports. 1 2 3 In Unicenter Asset Intelligence, select the Browse Organization tab. Under Browse Organization, select John Stevens. Click Machine Summary. The All computers in org of Administrator window appears in the Hardware tab.
Notes
21-20
4 5 6
Click Display. The Results window appears. All assets in the Administrator org are listed by computer name. Click Done. Click Reset.
Skill Practice
Task Purpose: Create a report of all systems in Spain. 1 2 Use the Hardware tab. Choose Spain from the Location portlet.
You have determined the systems that belong to the CEOs direct reports. Next, you will list assets without antivirus protection.
Interactive Demonstration
Task Purpose: List assets that do not have the eTrust application. It is a huge security risk to have systems in the environment with no antivirus protection installed. 1 2 3 4 5 6 7 8 In Unicenter Asset Intelligence, select the Software tab. In the Asset Type portlet, click Applications. The All Applications window appears. Select eTrust Antivirus 7.1 Windows NT/2000/XP, CA eTrust Antivirus - Agent 7.1, and CA eTrust Antivirus Client 7.1 (Windows). Click Exclude. The All Applications: NoteTrust window appears. Click Display. The All Applications: complex filter window appears. The summary details are listed by computer name. Click Done. Click Reset.
Notes
21-21
Skill Practice
Task Purpose: List assets not belonging to the classroom domain. 1 2 Use the Hardware tab and the Domain sub-tab. Include only the classroom domain.
You have listed assets excluding the eTrust application. Next, you will list servers by location to determine how many servers are outside the protection of the data center and whether IT security policy is being enforced.
Interactive Demonstration
Task Purpose: List servers by location. The CIO believes there are too many servers outside the protection of the data center and is concerned that IT security policy is not being enforced. The CIO needs a list of all servers to determine the potential scope of the problem. 1 2 3 4 5 6 7 In Unicenter Asset Intelligence, select the Hardware tab. In the Hardware Procurement/Retirement portlet, click Servers by Location. The Servers window appears. In the Location portlet, select Canada, Spain, and Tokyo. In the Location portlet, click Include. The Servers Location: Canada OR Spain OR Tokyo window appears. Click Display. The OS window appears. The assets are listed by computer name and location. Click Done. Click Reset.
Notes
21-22
Skill Practice
Task Purpose: Servers belonging to contractors pose a potential security risk. The IT manager needs to have a report of all 2003 servers that do not belong to CA. 1 2 Use Servers from the Asset View. Select the Organization subtab.
You have listed all the servers in the organization according to location. Next, you will update the report previously generated to ascertain the number of GX280 computers in Canada so that GX280 computers in Spain are also identified.
Interactive Demonstration
Task Purpose: Update a report. The IT manager needs to know the number of GX280 computers in Spain and Canada. Spain must be added as criteria for the GX280 report. 1 2 In Unicenter Asset Intelligence, select the Reports tab. In the Asset Type portlet, click Report: Canada GX280. The Canada GX280 Location:Canada+Model:Optiplex GX 280+Vendor:Not VMware, Inc. window appears. In the Location portlet, select Spain. In the Location portlet, click Include. The Canada GX280 Location:Canada OR Spain+Model:Optiplex GX 280+Vendor:Not VMware, Inc. window appears. Click Commit. Click Save. Click Reset.
3 4
5 6
You have updated a previously generated report to include additional asset information. Next, you will create a new report that lists who has a Dell computer in Tokyo.
Notes
21-23
Interactive Demonstration
Task Purpose: List the users in Tokyo who have a Dell computer. 1 2 3 4 5 6 7 8 9 In Unicenter Asset Intelligence, select the Hardware tab. In the Asset Type portlet, click All Hardware Vendor Summary. The All Computers window appears. In the Vendor portlet, select Dell Inc. and Dell Computer Corporation. In the Vendor portlet, click Include. The All Computers Vendor:Dell Inc. OR Dell Computer Corporation window appears. In the Location portlet, click Tokyo. Click Include. Click Display. Click Done. Click Define Report.
10 Click Save Report. 11 Type Dell Systems in Tokyo in the Name field. You have listed the users in Tokyo who have a Dell computer by generating a new report. Next, you will create an additional report to list the users who have SQL.
Interactive Demonstration
Task Purpose: List the users who have SQL. Your client enforces the installation of SQL on servers only. They must determine where SQL exists and if it is installed on desktop systems. 1 2 3 In Unicenter Asset Intelligence, select the Software tab. In the Software portlet, click Databases. The Database Software window appears. In the Application portlet, select All Microsoft SQL applications.
Notes
21-24
4 5 6
In the Application portlet, click Include. The Database Software: complex filter window appears. Click Display. The results are displayed. Under Machine Name, click Tecra01. The Computer Detail listing window appears. The applications you selected appear in the Application list for Tecra01 Type='Database Software. Click Done twice. Click Reset.
7 8
Skill Practice
Task Purpose: Modify an existing report. You want to reduce costs to help fund new initiatives in the Tokyo office. CA (non-development) people do not need Windows 2003 server machines. You need to revisit the Dell Systems in Tokyo report you created and modify it from a single screen to include:
The Windows 2003 server operating system Departments that are not development departments Select Reports. Edit the Dell Systems in Tokyo report.
Task Summary
You have used Unicenter Asset Intelligence to create various lists that help enable your client to view their assets. In a large organization, this enables your client to plan more efficiently for inventory purposes and be more cost-effective in purchasing software. Your client can also maintain accurate records of asset use in remote locations. This enables better security control. In the next task, you will customize Unicenter Asset Intelligence.
Notes
21-25
Slide 21-18
Interactive Demonstration
Task Purpose: Create a new category. 1 In Unicenter Asset Intelligence, in the Administrative Console, from the Select Admin Function portlet, select Define Categories. The Define Categories window appears. In the Category Description portlet, type eTrust on Servers in the Name field. Click Next. The Enter Primary Rules page appears. From the Hardware Type list, select Server Computers. From the Publishers list, select All Software Publishers. Note: Unicenter Asset Management software definition categories are automatically imported to Unicenter Asset Intelligence as software categories. 6 7 8 Click Next. The Enter Detailed Rules page appears. In the Define Rules for Filter portlet, type %etrust% in the field beside the down arrow. Click the down arrow. Name="%eTrust%" appears in the Rule field.
2 3 4 5
Notes
21-26
Click the right arrow. In the Rules Applied to Current Filter portlet, under Link, Name="etrust" appears.
10 Click Test. Under Content of Category, in the Category Summary portlet, view the results of the test. 11 Click Next. The Enter Link Info page appears. 12 From the Link Group list, select All Applications. 13 Click Next. The Confirm Category page appears. 14 Click Finish. 15 On the toolbar, click Show Desktop. 16 On your desktop, double-click Services. The Services dialog appears. 17 From the list of services, double-click CA Unicenter Asset Intelligence. The CA Unicenter Asset Intelligence Properties (Local Computer) dialog appears. 18 On the General tab, click Stop. 19 Type RunNow in the Start parameters field. 20 Click Start. 21 On the General tab, click OK. The CA Unicenter Asset Intelligence Properties (Local Computer) dialog closes. 22 In Internet Explorer, navigate to http://localhost/caai to open the Unicenter Asset Intelligence user interface. 23 Create a shortcut to this location if one is needed. 24 Select the Software tab. 25 In the Software portlet, under Asset Type, select Applications. The All Applications window appears.
Notes
21-27
Interactive Demonstration
Task Purpose: Customize home page links. 1 2 3 4 5 6 7 8 9 In Unicenter Asset Intelligence, on the admin interface (http:// localhost/caaiadmin), click Customize Global Views. Select Software. Select Right Pane Links. Select Edit for Software Links. Under Link Type, select Enabled. This becomes a list. Under Section Title/Link Legend, type Customers in the Software Links field. Select Edit for Oracle Applications. Under Link Type, from the Oracle Applications list, select Microsoft Office Apps: 2003. Under Section Title/Link Legend, clear the Oracle Applications field and then type Microsoft Office 2003 in the field. Click Save.
10 In Microsoft Internet Explorer, open the Unicenter Asset Intelligence user interface.
Notes
21-28
11 From the Address list, select admin/lenu/adm_go.php?taiadm_ViewTab.inc. The Asset View tab appears. 12 Select the Software tab. In the Customers Software Links portlet, under Asset Type, select Microsoft Office Apps: 2003. The Microsoft Office: 2003 window appears. You have created a customized display of the Level 1 home pages. Next, you will set alert thresholds so that your client will be notified when this information is available.
Interactive Demonstration
Task Purpose: Set alert thresholds. 1 In Unicenter Asset Intelligence, in the Administrative Console, select Customize Global Views. The Customize Global Views window appears. On the Hardware tab, click Left Pane Links. The Customize Global Views window refreshes. Under Section Title/Link Legend for Hardware Utilization, select Edit 4 5 6 7 8 9 .
2 3
Select Enabled for Link Type. For the Storage Section Title, select Customize For Alert 1, select Less Than. Type 2000 in the Value field next to Alert1. Change Type to Critical. .
From the Primary Counter list, select All Storage Free Size.
Notes
21-29
Skill Practice
Task Purpose: Create an alert. Create an alert if more than five databases are installed in the organization. Use Software, Left Pane Links, and Databases.
Task Summary
You have created a new category, customized home page links, and set alert thresholds to customize displays for the Level 1 home pages through the Administrative Console. Your client can now access specific, customized information about their assets more efficiently and more quickly.
Notes
21-30
Assessment
1 Which two components are found in Unicenter Asset Intelligence? (Choose two.) a b c d 2 Web server Database management Scalability server management Unicenter Asset Management Query Designer
By default, when does Unicenter Asset Intelligence populate and refresh data in the database? a b c d Hourly Daily at 3:00 p.m. Daily at 3:00 a.m. Daily at noon and midnight
What are two pieces of information Unicenter Asset Intelligence must provide to display organization context to assets? (Choose two.) a b c d Last name Internet address Managers user ID Managers first name
Notes
21-31
What must you use to modify home page content? a b c d MDB Web Console Administrative Console Administrator privileges
Notes
21-32
Slide 21-19
Module Summary
You should now be able to:
Position Unicenter Asset Intelligence Install PHP: Hypertext Preprocessor Install Unicenter Asset Intelligence Configure Unicenter Asset Intelligence Import LDAP Data with the Administrative Console Employ Unicenter Asset Intelligence Customize Unicenter Asset Intelligence
In this module, you positioned Asset Intelligence, installed PHP and Unicenter Asset Intelligence, imported LDAP data with the Administrative Console, employed Unicenter Asset Intelligence, and customized Unicenter Asset Intelligence. Using Unicenter Asset Management, your client can identify anomalies, avoid unnecessary expenses, assess risk, and comply with industry regulations. Your client can use Unicenter Asset Intelligence to organize and summarize data that is gathered by Unicenter Asset Management and present that data in the most appropriate fashion. Your client can process changes continually across their enterprise and remain compliant with external and internal policies. Technology managers can make smarter choices using actionable intelligence provided by Unicenter Asset Intelligence.
Notes
21-33
Course Summary
You should now be able to:
Define Unicenter Desktop and Server Management Components Install Unicenter DSM Deploy Unicenter DSM Components Apply Central Configuration Set Security Parameters Create Queries Create Groups Create and Deliver Packages Employ the Web Console Organize the Library to Optimize Delivery Manage the Catalog Configure Inventory Hardware Configure Software Inventory Conduct a Template Inventory Create an Asset Job Create Policies Administer Unicenter Remote Control Produce Common Reports Add an Enterprise Domain Manager Deploy Unicenter Patch Management Manage Data in Unicenter Asset Intelligence
Slide 21-21
Slide 21-22
Notes
21-34
Notes
21-35
Notes
21-36
A
Skill Builder and Assessment Solutions
A-1
Skill Builder: Module 3 - Deploy a Scalability Server and Validate the Installation
Business Problem
A scalability server enables geographical scalability for your clients management tasks. This server is the primary interface for local and remote agents. Your client has an office in a remote location. A scalability server must be deployed to balance the load across their systems.
Hint
Using the Deployment Manager, deploy the server to the Windows 2000 Server VMware session.
Software Solution
1 2 3 4 Open the Windows 2000 Server VMware session. In DSM Explorer, in the left pane, expand Domain\Control Panel\Deployment. Select Deploy DSM Agents or Scalability Servers. In the right pane, the Deployment: Introduction page appears. Click Next. The Job Type page appears. This is a deployment job. Jobs direct agents or engines to perform specific actions. Various types of jobs can be carried out on agents. The default deployment job type is Deploy Software to Target Computers. The deployment job name can be changed.
Notes
A-2
Skill Builder and Assessment Solutions Skill Builder: Module 3 - Deploy a Scalability Server and Validate the Installation
Click Next. The Deployment Payload page appears. You can deploy only one payload or package at a time. Each package is available in two versions, Microsoft Windows or Linux. The packages include plug-ins for Minimum SD Agent, Asset Management, and Software Delivery. The Microsoft Windows version involves the deployment of a base select agent with the plug-in. There is also a package for deploying the Unicenter DSM Scalability Server.
6 7
From the list of packages, select CA Unicenter DSM Scalability Server version# Windows_x86 ENU. Click Next. The Target Criteria page appears. The deployment job must now be linked with the specific unit, or group of units, on which the job will be carried out.
8 9
From the Development Type list, select Deploy to Specific Computers. Type yourcomputername for the Windows 2000 Server VMware session.
10 Click Next. The Scan Targets page appears. 11 Click Scan. When the scan is complete, a green disk indicates that the computer responded. The computer name, IP address, and state are shown in the Discovered Computers list. 12 Click Next. The Target Selection page appears. The Discovered Computers list is now shown beside an empty Target Computers list. The computer listing from the Discovered Computers list must be moved to the Target Computers list. 13 In the Discovered Computers list, select 2000 Server yourcomputername and click the right arrow between the two lists. A User Credentials dialog appears. 14 Type administrator in the Username field. 15 Type yourcomputernamecai in the Password field.
Notes
A-3
Notes
A-4
Skill Builder and Assessment Solutions Skill Builder: Module 3 - Deploy a Scalability Server and Validate the Installation
26 Select All Computers. The appearance of the asset in the left pane under All Computers confirms that deployment was successful. All the computers have Unicenter DSM installed.
Notes
A-5
Hint
Change the Job Run Timeout parameter in the Software Delivery Agent folder.
Software Solution
1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Control Panel. Right-click Configuration and choose Explore From. A new Explorer GUI window appears with only the Configuration folder contents. In the left pane, right-click Configuration Policy and choose New Policy. The New Configuration Policy dialog appears. Type SD Agent Parameters in the Name field. Click OK. In the left pane, expand Configuration\Configuration Policy\SD Agent Parameters\DSM\software delivery. Select Agent. In the right pane, select Job Run Timeout. In the Value field, type 600 and click OK. Seal and apply the Agent Parameters policy to the 2000 Professional session.
Notes
A-6
Skill Builder and Assessment Solutions Skill Builder: Module 7 - Create a Dynamic Group of Dell Systems Running Linux
Skill Builder: Module 7 - Create a Dynamic Group of Dell Systems Running Linux
Business Problem
Your client requires all Dell computer systems in their organization to be grouped. One group must include each system that uses the Linux operating system.
Hint
Change the Operator value to Like and use a wildcard for Dell. Create the query in the My Queries folder. Use Dell-Linux for the group name.
Software Solution
1 2 3 4 5 6 7 In DSM Explorer, in the left pane, right-click My Queries and choose New. The Select Target dialog appears. From the list of target objects, select Computers and click OK. The Query Designer dialog appears. In the left pane, from the Insert Argument list, expand Inventory and then select Discovered Inventory. The Add Argument dialog appears. From the Add Argument list, expand Information\Inventory\General Inventory\System. Select Vendor. From the Operator list, select Like. Type dell* in the Value field and click OK.
Notes
A-7
10 In the Query Designer dialog, under Boolean Operators, select AND. 11 In the Query Designer dialog, in the left pane, select Discovered Inventory. The Add Argument dialog appears. 12 Expand Inventory\General Inventory\Operating System. 13 Select Operating System. 14 From the Value list, select Linux. 15 To close the dialog, click OK. 16 In the Query Designer dialog, click Preview. The Query Preview dialog appears with results of the query. 17 Click Close. 18 Click OK. The Save Query dialog appears. 19 Type the query name Dell Systems with Linux OS and click OK. 20 In the left pane, right-click Computers and Users and choose New Group. The New Group dialog appears. 21 Type Dell-Linux in the Name field. 22 Select the Query tab. 23 From the Associated Query list, select the Dell Systems with Linux OS query. 24 From the Evaluated by list, select SystemEngine. This enables you to configure the Evaluation period value. By default, it is set for 1440 minutes or 24 hours. 25 In the Evaluation period field, change the value to 60 minutes and click OK.
Notes
A-8
Skill Builder and Assessment Solutions Skill Builder: Module 7 - Create a Dynamic Group of Dell Systems Running Linux
26 In the left pane, right-click Dell-Linux and choose Evaluate now. The Group Evaluated dialog appears. 27 Click OK. REDHAT01 appears.
Notes
A-9
Hint
The software to stage is Ad_Aware.
Software Solution
1 2 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software. Under the All Software folder, right-click Ad_Aware and choose Stage. The Stage Software Package Wizard dialog appears. Note: The Stage Software Package Wizard is used to create a software job. This job stages software packages on scalability servers attached to the domain. 3 4 Click Next. The Scalability Servers selection page appears and prompts you to select the scalability server on which this job will be performed. Expand All Scalability Servers and select servername 2000 Server.
Notes
A-10
Skill Builder and Assessment Solutions Skill Builder: Module 10 Manage a Scalability Server Software Library
Click Next. The Finish page appears. The Finish page confirms the package and server. Scheduling of the job can be set by date and to the exact minute of that date. You can click Back to make any changes.
6 7 8
Type Stage Ad_Aware to Chicago as the Job Container name. Select Open the advanced job settings dialog when the Finish button is pressed. To begin the job, click Finish. A Setup Delivery Job dialog shows the Job Container name the system has created. By default, Seal and evaluate Job Container and Activate Job Container are checked.
Select the Deliveries tab. The Job Order is displayed as Add to library: Ad_Aware, which is the software package selected for staging. On the Job tab, the precise delivery time is shown for this job.
10 Select the Job Options tab. 11 Change the Job Timeout to 3 days. This means the job will automatically fail if it is not delivered to Chicago in 3 days. 12 Click OK. 13 In the left pane, under Jobs\Software Jobs, select All Software Jobs. 14 In the right pane, double-click Stage Rbcinfo to Chicago. 15 Double-click 2000 Server. 16 Right-click Ad_Aware and choose Properties.
Notes
A-11
Notes
A-12
Skill Builder and Assessment Solutions Skill Builder: Module 11 Manage and Configure a Catalog
Hint
Authorized applications include Ad_aware, Filemon, and QuickTime Player. The computers in the Payroll group are the Unicenter DSM server and the Microsoft Windows 2000 Professional VMware computer.
Software Solution
Create a static group named Payroll and assign the Unicenter DSM server and Windows 2000 Professional VMware computer to the group. 1 2 3 4 5 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library. In the left pane, drag the Payroll group to the Catalog folder. In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software\Ad_aware Reader\Procedures. Right-click Install Package and choose Properties. The Properties dialog appears. On the Procedure tab, select enabled.
Notes
A-13
To verify the catalog choice appears on the Unicenter DSM server and in the Windows 2000 Professional VMware session, open the Unicenter Software Delivery catalog.
Notes
A-14
Skill Builder and Assessment Solutions Skill Builder: Module 12 - Create a New Hardware Inventory Collect Task to Collect User Information
Skill Builder: Module 12 - Create a New Hardware Inventory Collect Task to Collect User Information
Business Problem
Your client needs a list of local groups and users that are common to all of their assets. They will use Unicenter Asset Management to collect this user account inventory. Create a new hardware inventory task to accomplish this.
Software Solution
1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Collect Tasks. Right-click Hardware Inventory and choose New. The Schedule new Collect Task dialog appears. On the General tab, type User Account Inventory in the Name field. Select the Detection Modules tab. Select User Account Inventory and click OK. In the left pane, expand Collect Tasks\All Collect Tasks\User Account\Inventory. Right-click User Account Inventory and choose Scheduling. The Scheduling Options dialog appears. Select the Conditions tab. Under Periodic dependency, select Run only once a week.
10 Click OK.
Notes
A-15
Notes
A-16
Skill Builder and Assessment Solutions Skill Builder: Module 12 - Create a New Hardware Inventory Collect Task to Collect User Information
19 To open the Action User Account Inventory window, double-click User Account Inventory. Notice that DSM server now has an OK status, with the rest of the computers Waiting. 20 To view the data, in the left pane, expand All Computers\DSM servername\Inventory\Additional\User Inventory, select Local Groups, and then select Local User.
Notes
A-17
Hint
To locate the hosts file, look in the C:\windows\system32\drivers\etc directory. Copy the contents of the current hosts file as your clients standard hosts file.
Software Solution
1 2 3 4 5 6 7 8 9 In the right pane, expand Jobs/Asset Jobs. Right-click Secure Configuration File Jobs and choose New. Click Next. Type Hosts File as the job name. Click Next. Browse to C:\windows\system32\drivers\etc where the Hosts file is located. Change Files of type to All files. Select the Hosts file. Click Open.
10 Click Next.
Notes
A-18
Skill Builder and Assessment Solutions Skill Builder: Module 15 Create a Secure Configuration Files Job
11 Click Load File. 12 Browse to C:\windows\system32\drivers\etc where the Hosts file is located. 13 Click Next. 14 Click Finish. 15 Assign this job to the DSM server. 16 Make any change to the Hosts file open in Notepad and save the file. 17 Run the agent and verify that the job runs. Check the hosts file to verify that it has reverted to standard. The status of the asset job should indicate that changes were found and the file was restored.
Notes
A-19
Hint
The query argument should use Jobs, Collect Tasks, and the NOT operator.
Software Solution
Create a Query
1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, right-click My Queries and choose New. The Select Target dialog appears. From the list of target objects, select Computers and click OK. The Query Designer dialog appears. From the Insert Argument status list, select NOT. In the information dialog, select OK. In the Query Designer dialog, select the close parentheses. In the left pane, from the Insert Argument list, select Jobs. Select Collect Tasks. The Add Argument dialog appears. Expand Collect Task Status. Select Current Status.
Notes
A-20
Skill Builder and Assessment Solutions Skill Builder: Module 16 - Create a Query-based Policy
From the Collect Task menu, select User Telephone Information. Leave Status as OK.
10 Click OK. 11 In the Query Designer dialog, click Preview. The Query Preview dialog appears, listing results of the query. Click Close. 12 Click OK. The Save Query dialog appears. 13 Type the query name Telephone Info Task Not OK and click OK.
Create a Policy
17 In DSM Explorer, in the left pane, expand Policies\Query Based. 18 Right-click Query Based and choose New. The Policy Designer dialog appears. 19 Type Telephone Info Task Not OK in the Name field. 20 Under Policy Severity, click Alarm. Alarm indicates the policy needs more attention and has a severe impact when violated. An Alarm Policy appears in the Alarm section of the Log Overview. The lower levels of Policy Severity are Warning and Message. 21 In the Query that Policy depends on list, scroll down and select Telephone Info Task Not OK.
Notes
A-21
Notes
A-22
Skill Builder and Assessment Solutions Skill Builder: Module 17 Assign a New Group and Query with New Security and Assign Permissions
Skill Builder: Module 17 Assign a New Group and Query with New Security and Assign Permissions
Business Problem
The Accounting group must have custom Unicenter Remote Control settings, but the members of this group require a password for GIS before they are permitted to take control. They also want the host session to close automatically if there is no activity for five minutes. The Windows 2000 Server VMware session is a system in Accounting. You must define and assign manager policy for the new Accounting group. It must also be a global address book.
Hint
You must deploy remote control to the Windows 2000 Server VMware session.
Software Solution
1 2 3 4 5 6 7 In DSM Explorer, in the left pane, expand Domain\Computers and Users\All Computers. In the right pane, select the 2000 Server VMware session. Right-click and choose Make Group. The New Group dialog appears. Type Accounting in the Name field. Type Accounting static group in the Description field. Click OK. In DSM Explorer, in the left pane, expand Domain\Computers and Users\All Computers\Accounting.
Notes
A-23
10 Select the Global address book root group. 11 Click OK. 12 In the Tasks area, select Add User Permission. The Add User Permission dialog appears. 13 Under Available Directories, expand classroom domain name. 14 In the left pane, expand GIS. 15 Select your name. Click Add to List. In the List of Security Principals, your name appears. 16 Click OK. 17 Add your Administratorxx login. 18 In the left pane, under Control Panel, right-click Configuration and choose Explore from. The Explorer GUI window appears with the Configuration folder contents. 19 In the left pane of this window, right-click Configuration Policy and choose New Policy. The New Configuration Policy dialog appears. 20 Type Accounting Remote Control Policy in the Name field. 21 Click OK. 22 In the left pane of Explorer GUI, expand Configuration Policy\Accounting Remote Control Policy\DSM\Remote Control\Host. 23 Select General. 24 Double-click Inactivity time out and change the value to 5 minutes. 25 Double-click Local Confirmation Password. Change the value to TRUE.
Notes
A-24
Skill Builder and Assessment Solutions Skill Builder: Module 17 Assign a New Group and Query with New Security and Assign Permissions
26 Select Accounting Remote ControlPolicy\DSM\RemoteControl\Host\Managed. 27 Change Centralized Security to TRUE. 28 Right-click Accounting Remote Control Policy and choose Seal. Click OK. 29 In the left pane, expand Accounting Remote Control Policy\DSM\Remote Control Host. 30 Select General. The three attributes that were changed appear in the right pane. 31 Right-click Accounting Remote Control Policy and choose Copy. 32 Return to the original DSM Explorer window. Right-click the new policy and choose Copy. 33 In the left pane, right-click Accounting group and choose Paste Configuration Policies. The Schedule Policies dialog appears. 34 Select Apply Policies Immediately. Click OK. 35 In the left pane, expand Accounting\Group Details\Configuration. 36 Select Configuration Policy. Notice the status of the Active and Scheduled Policies. After the policy is applied, verify the policy change at the host. 37 Right-click the DSM systray and choose Remote Control Host Properties. The Properties dialog appears. 38 Select Advanced. Scroll to see that the three attributes have been changed to the new configuration policy. 39 Open the Unicenter Remote Control Viewer on the DSM server and verify Accounting group appears as a Global Address Book and the 2000 Server VMware session appears in this book.
Notes
A-25
Hint
Use the CA Content Team as the manufacturer.
Accept a Patch
1 In the Unicenter Patch Management window, on the Dashboard tab, from the Patches Pending Acceptance list, select a patch. The Patch Details window appears. In the right pane, in the General area, the patch Status is Pending User Acceptance. Accept is the default value in the Actions list. 2 3 Confirm this value and click Go. The patch Status has changed to Accepted. Click Done. The Dashboard tab appears.
5 6
Notes
A-26
Skill Builder and Assessment Solutions Skill Builder: Module 20 - Deploy a Microsoft Patch
7 8 9
Click the right arrow. In the Selected Targets field, the target appears. Click Next. The Deploy Patch: Schedule Deployment window appears. Accept the default Deploy Patch Now selection and click Next. The Deploy Patch: Confirm Deployment window appears.
10 Click Finish. The Patch Details window appears. 11 In the left pane, under Advanced Options, select Deployment Status. The Dashboard tab appears. Notice the patch deployment Status is In Progress. 12 Select Deployment Id. 13 In the left pane, select Targets. In the right pane, a list of target computers appears. 14 In the right pane, select your target. The Machine details window appears. 15 Click Unicenter AMS. 16 Click UPM. The Deployment window appears. 17 In the left pane, select General. In the right pane, the General Deployment Information display appears. 18 Click Done. The Dashboard tab appears.
Approve a Patch
19 Select the Patches tab. 20 From the Filter By list, select Testing and click Go. 21 From the Patch Name list, select the tested patch. 22 From the Select and list, select Approve and click Go. 23 From the Filter By list, select Approved and click Go.
Notes
A-27
Assessment Answers
Module 1
Question 1: b and e Question 2: c Question 3: c Question 4: a
Module 2
Question 1: c Question 2: b Question 3: d
Module 3
Question 1: d Question 2: a Question 3: a and d Question 4: d
Notes
A-28
Module 4
Question 1: a and c Question 2: a Question 3: b
Module 5
Question 1: b and c Question 2: b Question 3: c Question 4: d
Module 6
Question 1: b Question 2: c
Module 7
Question 1: a Question 2: c Question 3: b
Notes
A-29
Module 8
Question 1: d Question 2: a Question 3: b Question 4: b Question 5: c Question 6: c
Module 9
Question 1: c Question 2: a Question 3: c
Module 10
Question 1: c Question 2: a Question 3: d Question 4: d Question 5: d
Module 11
Question 1: a
Notes
A-30
Module 12
Question 1: d Question 2: d and e
Module 13
Question 1: c Question 2: b and c Question 3: b and c Question 4: a and d Question 5: d
Module 14
Question 1: d
Module 15
Question 1: a and c Question 2: c
Module 16
Question 1: c and e Question 2: a
Notes
A-31
Module 17
Question 1: b Question 2: a
Module 18
Question 1: d Question 2: a Question 3: d Question 4: a
Module 19
Question 1: a Question 2: c Question 3: d Question 4: b
Module 20
Question 1: b and e Question 2: d Question 3: d Question 4: d Question 5: d Question 6: b and c
Notes
A-32
Module 21
Question 1: a and b Question 2: c Question 3: a and c Question 4: c Question 5: c
Notes
A-33
Notes
A-34
-1
Notes
-2
Notes
-3
Notes
-4
Notes
-5
Notes
-6