Вы находитесь на странице: 1из 446

Computer Associates

Unicenter Desktop Management Foundation


Partner Certification Student Workbook UR010IF

E1UR010IF11SE

PROPRIETARY AND CONFIDENTIAL INFORMATION These educational materials (hereinafter referred to as the "Materials") are for the end user's educational purposes only and are subject to change or withdrawal by CA at any time. These Materials may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in part, without the prior written consent of CA. These Materials are confidential and proprietary information of CA and protected by the copyright laws of the United States and international treaties. EXCEPT AS OTHERWISE STATED IN THE APPLICABLE AGREEMENT, TO THE EXTENT PERMITTED BY APPLICABLE LAW, CA PROVIDES THESE MATERIALS "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THESE MATERIALS, INCLUDING WITHOUT LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY ADVISED OF SUCH LOSS OR DAMAGE. The use of any software or product referenced in the Materials is governed by the end user's applicable license agreement. The manufacturer of these Materials is CA. Provided with "Restricted Rights." Use, duplication or disclosure by the United States Government is subject to the restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7014(b)(3), as applicable, or their successors. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Copyright 2006 CA. All rights reserved.

Call CA technical services for any information not covered in this manual or the related publications. In North America, see your CA Product Support Directory for the appropriate telephone number to call for direct support, or you may call 1-800-645-3042 or 631-342-4683 and your call will be returned as soon as possible. Outside North America, contact your local CA technical support center for assistance.

Table of Contents
Introduction
Welcome . . . . . . . . . . Target Audience . . . . . Learning Path . . . . . . . About This Workbook. . Conventions . . . . . About This Course . . . . Course Length . . . . Prerequisite Skills . Course Agenda . . . Day 1 . . . . . . . . . . Day 2 . . . . . . . . . . Day 3 . . . . . . . . . . Course Objectives . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . .. .. .. .. .. .. .. .. .. .. .. .. .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. x .. x .. x . . xi . xii . xiii . xiii . xiii . xiii . xiii . xiv . xv . xvi

1 Position Desktop and Server Management Components


Match Features to Business Needs Components . . . . . . . Domain Manager . . Scalability Server . . Engine . . . . . . . . . Agent . . . . . . . . . . Features and Functions System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-4 1-5 1-5 1-5 1-6 1-6 1-6

Identify Unicenter DSM Architecture . . . . . . . . . . . . . . . . . . 1-7 Common Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-7 Define the Management Database . . . . . . . . . . . . . . . . . . . . 1-9 Common Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-9 Asset Centric . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1-10 Describe Common Asset Registration . . . . . . . . . . . . . . . . 1-11

Install Unicenter Desktop and Server Management

2 Install Unicenter Desktop and Server Management


Install Unicenter Desktop and Server Management . . . . . . . 2-3 Features and Functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3 Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-3 Open the DSM Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9 Common GUI Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-9 Join the Enterprise DSM Domain . . . . . . . . . . . . . . . . . . . . . 2-11 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2-18

3 Deploy Unicenter DSM Components


Deploy Basic Unicenter DSM Agents . . . . . . . . . . . . . . . . . . . 3-3 Deployment Manager Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-4 Monitor Job Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-8 Validate the Agent Deployment . . . . . . . . . . . . . . . . . . . . . 3-10 Deploy Agents on Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-12

Deploy the Scalability Server . . . . . . . . . . . . . . . . . . . . . . . 3-15 Deploy a Scalability Server and Validate the Installation . . . . . 3-16 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3-17

4 Apply Central Configuration


Apply Manager Configuration Policy to Move an Agent . . . . 4-3 Apply Manager Configuration Policy . . . . . . . . . . . . . . . . . . . . . 4-7 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4-9

5 Set Security Parameters


Integrate Microsoft Active Directory Structure . . . . . . . . . . 5-3 Supported Directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-4 Configure a Directory Synchronization Schedule . . . . . . . . . 5-7 Default Directory Synchronization Job . . . . . . . . . . . . . . . . . . . 5-7 Unique Identifiers and URIs . . . . . . . . . . . . . . . . . . . . . . . . . . 5-8 Add Class Permissions to Security Profiles . . . . . . . . . . . . . 5-11 Change Permissions at the Object Level . . . . . . . . . . . . . . . 5-16 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-18

Partner Certification Student Workbook

Create Queries

6 Create Queries
Run a Pre-existing Query . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-3 Create a New Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6-6 Create a Query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-11

Create an Advanced Argument Query . . . . . . . . . . . . . . . . 6-12 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .6-15

7 Create Groups
Create Static Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-3 Create Dynamic Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-5 Build Nested Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7

Create a Dynamic Group of Dell Systems Running Linux . . . . . . 7-9 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7-10

8 Install the Web GUI


Install the Web Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3 Web Browsers Supported . . . . . . . . . . . . . . . . . . . . . . . . . 8-3 Web Servers Supported . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3 Tomcat Port Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-3 Employ the Web Console . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-6 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-8

9 Deliver Packages
Create a Basic Package . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-4 Register an MSI Package . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-7 Configure MSI Source Point Resiliency . . . . . . . . . . . . . . . 9-11 Install Packager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-13 Create a Packager Package . . . . . . . . . . . . . . . . . . . . . . . . 9-15 Register a Packager Package . . . . . . . . . . . . . . . . . . . . . . . 9-17 Convert a Packager Package to MSI . . . . . . . . . . . . . . . . . 9-19 Import and Export Software Package . . . . . . . . . . . . . . . . 9-21 7

Organize the Library to Optimize Delivery

Import a Linux Package . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-24 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9-26

10 Organize the Library to Optimize Delivery


Manage a Scalability Server Software Library . . . . . . . . . . 10-3 Manage a Scalability Server Software Library . . . . . . . . . . . . . 10-5 Create Software Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-6 Create Procedure Groups . . . . . . . . . . . . . . . . . . . . . . . . . . 10-8 Create a Software Policy . . . . . . . . . . . . . . . . . . . . . . . . . . 10-10 Archive Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-13 Create Software Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-15 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10-18

11 Manage the Catalog


Create a Catalog Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-3 Configure a Library Package Procedure to Be Catalog Enabled 11-5 Populate a Catalog with Library Packages . . . . . . . . . . . . . 11-7 Request Packages from a Catalog . . . . . . . . . . . . . . . . . . . . 11-9 Verify Delivery of a Catalog Package . . . . . . . . . . . . . . . . 11-11 Manage and Configure a Catalog . . . . . . . . . . . . . . . . . . . . . 11-12 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11-13

12 Configure Inventory Hardware


Access Hardware Inventory . . . . . . . . . . . . . . . . . . . . . . . . 12-3 Create a New Hardware Inventory Collect Task . . . . . . . . . 12-5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-8 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12-9

13 Configure Software Inventory


Configure Proxy Settings for a Software Signature Download Job 13-3 Access Downloaded Software Signatures . . . . . . . . . . . . . . 13-5

Partner Certification Student Workbook

Conduct a Template Inventory

Create Software Definitions . . . . . . . . . . . . . . . . . . . . . . . . 13-8 Conduct a Heuristic Scan . . . . . . . . . . . . . . . . . . . . . . . . . 13-12 Task Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-15 Conduct a File Collect Task . . . . . . . . . . . . . . . . . . . . . . . 13-16 Create a Combination of a Heuristic and File Collect Task . . . . 13-19 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13-20

14 Conduct a Template Inventory


Create an Inventory Template Module . . . . . . . . . . . . . . . . 14-3 Modify an Existing Template . . . . . . . . . . . . . . . . . . . . . . . 14-7 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14-9

15 Create an Asset Job


Discover Properties of an Existing Job . . . . . . . . . . . . . . . 15-3

Create a New Asset Job . . . . . . . . . . . . . . . . . . . . . . . . . . . 15-6 Create a Secure Configuration Files Job . . . . . . . . . . . . . . . . .15-8 Assessments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15-9

16 Create Policies
Create an Event-based Policy . . . . . . . . . . . . . . . . . . . . . . 16-3

Create a Query-based Policy . . . . . . . . . . . . . . . . . . . . . . . 16-8 Create a Query-based Policy . . . . . . . . . . . . . . . . . . . . . . . . 16-10 Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16-11

17 Establish Security and Policies for Unicenter Remote Control


Configure Permissions for Global Groups . . . . . . . . . . . . . 17-3 Assign a Manager Policy . . . . . . . . . . . . . . . . . . . . . . . . . . 17-6

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17-10

18 Administer Unicenter Remote Control


Control a Host Using Unicenter DSM Explorer . . . . . . . . . . 18-3 9

Produce Common Reports

Manage Unicenter Remote Control Sessions . . . . . . . . . . . . 18-5 Record, Playback, and Convert Recordings . . . . . . . . . . . . 18-13 Record Unicenter Remote Control Sessions . . . . . . . . . Playback Recorded Unicenter Remote Control Sessions Convert Recorded Unicenter Remote Control Sessions . Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18-13 18-15 18-16 18-19

19 Produce Common Reports


Generate a Report Using Templates . . . . . . . . . . . . . . . . . . 19-3 Create a Query-based Report . . . . . . . . . . . . . . . . . . . . . . . 19-5 Filter a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-8 Schedule a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19-10

20 Deploy Unicenter Patch Management


Open the Unicenter Patch Management Browser . . . . . . . . 20-3 Start Unicenter Patch Management . . . . . . . . . . . . . . . . . . 20-4 Execute the Patch Management Life Cycle . . . . . . . . . . . . . 20-6 Test the Patch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20-8 Create Patch Policy for Production Deployment . . . . . . . . 20-11 Run Pre-existing Reports . . . . . . . . . . . . . . . . . . . . . . . . . 20-14 Customize the User Interface . . . . . . . . . . . . . . . . . . . . . . 20-19 Deploy a Microsoft Patch . . . . . . . . . . . . . . . . . . . . . . . . . . 20-23

21 Asset Intelligence
Position Asset Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . 21-3 Install PHP: Hypertext Preprocessor . . . . . . . . . . . . . . . . . 21-4 Move the php.ini file . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21-5 Uncomment two extensions . . . . . . . . . . . . . . . . . . . . . . . 21-6 Add C:\PHP to the system PATH variable . . . . . . . . . . . . . . 21-7 Update the Web Service extension to allow access to php-cgi.exe 21-8 Install Unicenter Asset Intelligence . . . . . . . . . . . . . . . . . 21-10 Configure Unicenter Asset Intelligence . . . . . . . . . . . . . . 21-13 Employ Unicenter Asset Intelligence . . . . . . . . . . . . . . . . 21-19

10

Partner Certification Student Workbook

Asset Intelligence

Customize Unicenter Asset Intelligence . . . . . . . . . . . . . 21-29 Configure Asset Intelligence . . . . . . . . . . . . . . . . . . . . . . . . 21-34

11

Asset Intelligence

12

Partner Certification Student Workbook

Introduction

xi

Introduction

Welcome
Slide 1

Target Audience
Welcome to Unicenter Desktop Management Foundation: Partner Certification training by CA. This course was specifically designed for CA Partner Certification. In your jobs, you are responsible for demonstrating Unicenter Desktop Management. As your client continues to increase the size and complexity of their business, their Enterprise Managementresponsibilities are growing exponentially.

Slide 2

Learning Path
This course will show you how to manage users for all security systems and directories from a single point of control using Unicenter Desktop Management Foundation. To learn about additional training solutions designed for your job role or this software product, visit gems.ca.com/Gemsmarketing/CourseFinder.asp Here you will find links to the Catalog, Learning Paths, Registration, and Locations/ Schedules. Learning Paths will help you determine the best training combination to enhance job performance, learn advanced skills, or become certified.

Notes

xii

Partner Certification Student Workbook

Introduction

About This Workbook


Each task in this course is presented using the following instructional events, which follow a specific sequence: Instructional Event Demonstration Description Due to the limitations of a classroom setting, you will not always be able to perform specific tasks. Instead, you will observe the instructor perform these tasks step-by-step so that you may gain a better understanding of how to handle situations pertinent to your needs. You will follow along on your student computer as your instructor demonstrates each step in a task. Your instructor will use this opportunity to explain the concepts, the conditions that drive which options should be selected, and other supporting information essential for you to understand the purpose of the task. You will practice the task just demonstrated, while your instructor provides coaching. You will build confidence applying the task just learned to real-world business problems written around a fictional scenario, enabling you to understand not just how to perform the task, but why.

Interactive Demonstration

Skill Practice

Skill Builder

Notes

xiii

Introduction

Conventions
The following conventions are used throughout your Student Workbook: Convention Use Bold Italics GUI elements New terms Variable values Emphasis Titles of books Example Click OK to continue. ...the Name text box. A dialog is a window that appears to collect information from the user. Enter a range from 0 to n, where n equals the number of tapes. Do not erase the backup tapes. See the Unicenter TNG: Getting Started Guide. Refer to the Special Training Manual by IBM. Quotation Marks Computer Text Computer Text Italics SMALL CAPS Reference to module titles and headings Commands to be typed (exactly as written) Variables to be replaced by the user with real values Names of keys See Administration for more information. At the prompt, type: C:\Program Files\myfolder At the prompt, type: C:\Program Files\foldername To reboot, press CTRL+ALT+DEL.

Notes

xiv

Partner Certification Student Workbook

Introduction

Slide 3

About This Course


This course will teach you product positioning and basic architecture, implementation, and administrative skills for Unicenter Desktop and Server Management solutions, as well as Unicenter Patch Management and Unicenter Asset Intelligence. Through hands-on activities, you will gain the experience necessary to be self-sufficient in supporting and growing Unicenter Desktop and Server Management solutions, in addition to Unicenter Patch Management and Unicenter Asset Intelligence solutions. This will prepare you for the Partner Certification for Desktop Management Foundation Exam hosted by Thomson Prometric.

Course Length
5 days

Prerequisite Skills

Basic IT skills Successful completion of CA Product Focused Training available on http:// partnercertification.ca.com Microsoft Windows or UNIX skills

Notes

xv

Introduction

Slide 4

Course Agenda Day 1


Module 1: Define Unicenter Desktop and Server Management Components
Task 1: Identify Unicenter DSM Features Task 2: Identify Unicenter DSM Architecture Task 3: Describe Common Asset Registration

Module 2: Install Unicenter DSM


Task 1: Install Unicenter DSM Task 2: Install the Unicenter Remote Control Component Task 3: Open Unicenter DSM Explorer

Module 3: Deploy Unicenter DSM Components


Task 1: Deploy Unicenter DSM Agents Task 2: Monitor Job Status Task 3: Validate the Agent Deployment Task 4: Deploy Agents on Linux

Notes

xvi

Partner Certification Student Workbook

Introduction

Module 4: Apply Central Configuration


Task 1: Examine Central Configuration Task 2: Configure Unicenter Software Delivery Manager Policy Task 3: Configure Scheduling for the Unicenter Asset Management Agent Task 4: Apply Manager Configuration Policy to Move an Agent

Module 5: Set Security Parameters


Task 1: Integrate Microsoft Active Directory Structure Task 2: Configure a Directory Synchronization Schedule Task 3: Add Security Profiles and Class Permissions Task 4: Change Permissions at the Object Level
Slide 5

Day 2
Module 6: Create Queries
Task 1: Run a Pre-existing Query Task 2: Create a New Query Task 3: Create an Advanced Argument Query

Module 7: Create Groups


Task 1: Create Static Groups Task 2: Create Dynamic Groups Task 3: Build Nested Groups

Notes

xvii

Introduction

Module 8: Create and Deliver Packages


Task 1: Create a Basic Package Task 2: Register an MSI Package Task 3: Configure MSI Source Point Resiliency Task 4: Create a Software Package with Packager Task 5: Import and Export a Software Package Task 6: Import a Linux Package

Module 9: Employ the Web Console


Task 1: Install the Web Console Task 2: Search for Unicenter DSM Objects Task 3: Deliver Software

Module 10: Organize the Library to Optimize Delivery


Task 1: Manage a Scalability Server Software Library Task 2: Create Software Groups Task 3: Create Procedure Groups Task 4: Create a Software Policy Task 5: Archive Packages Task 6: Apply RAC Policy

Notes

xviii

Partner Certification Student Workbook

Introduction

Module 11: Manage the Catalog


Task 1: Create a Catalog Group Task 2: Configure a Library Package Procedure to Be Catalog Enabled Task 3: Populate a Catalog with Library Packages Task 4: Request Packages from a Catalog
Slide 6

Day 3
Module 12: Configure Inventory Hardware
Task 1: Access Hardware Inventory Task 2: Create a New Hardware Inventory Collect Task

Module 13: Configure Software Inventory


Task 1: Configure Proxy Settings for a Software Signature Download Job Task 2: Access Downloaded Software Signatures Task 3: Create Software Definitions Task 4: Conduct a Heuristic Scan Task 5: Conduct a File Collect Task

Module 14: Conduct a Template Inventory


Task 1: Create an Inventory Template Module Task 2: Modify an Existing Template

Notes

xix

Introduction

Module 15: Create an Asset Job


Task 1: Discover Properties of an Existing Job Task 2: Create a New Asset Job

Module 16: Create Policies


Task 1: Create an Event-based Policy Task 2: Create a Query-based Policy
Slide 7

Day 4
Module 17: Administer Unicenter Remote Control
Task 1: Control a Host with Unicenter DSM Explorer Task 2: Define Unicenter Remote Control Manager Policy Task 3: Create a Global Address Book Task 4: Control a Host with the Viewer Task 5: Manage Unicenter Remote Control Sessions Task 6: Record, Play Back, and Convert Recordings

Module 18: Produce Common Reports


Task 1: Create a New Report Task 2: Customize a Report Task 3: Schedule and Publish a Report Task 4: Create a Query-based Report

Notes

xx

Partner Certification Student Workbook

Introduction

Task 5: Filter a Report Task 6: Schedule and Publish a Report to an Ingres Table Task 7: Create a Report Using Active Directory Information Task 8: Create a Remote Control Report

Module 19: Add an Enterprise Domain Manager


Task 1: Browse the Enterprise Domain Task 2: Join a Domain to the Enterprise Domain Task 3: Distribute Software from the Enterprise Domain to the Local Domain Task 4: Replicate Objects from the Enterprise Domain to the Local Domain Task 5: Deploy Software from the Enterprise Domain
Slide 8

Day 5
Module 20: Deploy Unicenter Patch Management
Task 1: Install Unicenter Patch Management Task 2: Execute the Patch Management Process Task 3: Create Patch Policy for Production Deployment Task 4: Run Pre-existing Reports Task 5: Customize the User Interface Task 6: Create a Patch Filter

Notes

xxi

Introduction

Module 21: Manage Data in Unicenter Asset Intelligence


Task 1: Position Unicenter Asset Intelligence Task 2: Install PHP: Hypertext Preprocessor Task 3: Install Unicenter Asset Intelligence Task 4: Configure Unicenter Asset Intelligence Task 5: Import LDAP Data with the Administrative Console Task 6: Employ Unicenter Asset Intelligence Task 7: Customize Unicenter Asset Intelligence To gain job competency using Unicenter Desktop Management Foundation: Partner Certification, you will practice these tasks in a business context, as well as have opportunities to solve problems on your own.

Notes

xxii

Partner Certification Student Workbook

Introduction

Slide 9

Course Objectives
After this course, you will be able to:

Define Unicenter Desktop and Server Management Components Install Unicenter DSM Deploy Unicenter DSM Components Apply Central Configuration Set Security Parameters Create Queries Create Groups Create and Deliver Packages Employ the Web Console Organize the Library to Optimize Delivery Manage the Catalog Configure Inventory Hardware Configure Software Inventory Conduct a Template Inventory Create an Asset Job Create Policies Administer Unicenter Remote Control Produce Common Reports Add an Enterprise Domain Manager Deploy Unicenter Patch Management Manage Data in Unicenter Asset Intelligence

Slide 10

Slide 11

Notes

xxiii

Introduction

Notes

xxiv

Partner Certification Student Workbook

1
Define Unicenter Desktop and Server Management Components

1-1

Define Unicenter Desktop and Server Management Components


Module Objectives
Slide 1-1

Module Objectives
After this module, you will be able to:

Identify Unicenter DSM Features Identify Unicenter DSM Architecture Describe Common Asset Registration

Module Overview
Unicenter Desktop and Server Management (DSM) helps your client to effectively manage continuous, detailed software and hardware inventory information. With Unicenter DSM, your client can manage software locally and throughout a large organization. The DSM automation process enables you to reduce the risk of error and create a faster job turnaround to improve service levels. In this module, you will be introduced to the common features Unicenter DSM provides for CA management products. These features will help your client save time and money by making inventory processes quicker and more accurate. You will learn about the architecture, management database (MDB), and common asset registration functionality of Unicenter DSM. With this knowledge, you will be able to show your client how to reduce costs by requiring fewer employees to perform inventory tasks.

Notes

1-2

Partner Certification Student Workbook

Define Unicenter Desktop and Server Management Components Task 1: Identify Unicenter DSM Features

Slide 1-2

Task 1: Identify Unicenter DSM Features


Unicenter DSM r11 provides one common GUI, reporter, and MDB for real-time control of asset inventory. These common features enable your client to automate such critical operational processes as discovery and inventory, deployment, maintenance, and migration. Unicenter DSM also contains common operational and compliance controls, common advanced security, and directory integration. Unicenter DSM also contains improvements that make it easier for your client to implement the product. When a Unicenter DSM component is installed on a computer, the Common Application Framework (CAF) is included. The CAF permits sharing of common functionality, such as a common service controller, security, encryption, compression, tracing, registration, and basic inventory.

Slide 1-3

Unicenter Software Delivery Features


Here are some specific features of Unicenter Software Delivery:

Remote installation of software packages Data transport infrastructure Deployment of software packages in various formats Packager Remote deployment of operating systems Software installation tracking

Notes

1-3

Define Unicenter Desktop and Server Management Components


Unicenter Asset Management Features
Slide 1-4

Unicenter Asset Management Features


Here are some specific features of Unicenter Asset Management:

Hardware Inventory Software Inventory Software Usage Monitoring

Slide 1-5

Unicenter Remote Control Features


Here are some specific features of Unicenter Remote Control:

Remote control of desktops and servers Chat capability Transfer of files to and from remote systems Recording of remote control sessions

Task Summary
You have identified Unicenter DSM features that enable your client to use powerful, easy-to-employ tools that can improve the speed and accuracy of inventory tasks. Managing assets and software with a common interface and MDB enables greater control and reduces the risk of costly errors. In the next task, you will identify the common Unicenter DSM architecture.

Notes

1-4

Partner Certification Student Workbook

Define Unicenter Desktop and Server Management Components Task 2: Identify Unicenter DSM Architecture

Slide 1-6

Task 2: Identify Unicenter DSM Architecture


Unicenter DSM provides a common interface and architecture for Unicenter Software Delivery, Unicenter Asset Management, and Unicenter Remote Control. Key pieces of infrastructure are shared across all three productsfor example, the database, communications, process control, logging, and eventing are the same for each product. The re-engineering and homogenization of these software products have resulted in a powerful set of features and consistent terminology, architecture, data, and capability across all products.

Slide 1-7

Unicenter DSM is recognized as a multitiered architecture comprised of one user interface tier, one scalability tier, and one agent tier. Each manager tier has its own common schema database called the MDB. CA product suites are integrated through the MDB. The MDB is a common Enterprise domain data repository that provides a unified database schema for management data stored by all CA productsmainframe and distributed. Full integration for IT infrastructure management is enabled through the use of the MDB with CA products. The MDB integrates management data from all IT disciplines and CA products. Customers can extend the MDB to include additional IT management data from non-CA software products and tools.

Notes

1-5

Define Unicenter Desktop and Server Management Components


Common Architecture
Slide 1-8

Common Architecture
Unicenter DSM r11 introduces a new common architecture. The following components are now common across all products:

Explorer Web Console Database Communication through the CAF Security Model Central Configuration Reporting Web Services Directory Integration Manager (Enterprise and Domain) Scalability Server Agent

Slide 1-9

Together, they provide for a highly scalable management hierarchy.


Slide 1-10

The architecture comprises a set of consistent and common concepts:


GUI Manager Server Agent

Notes

1-6

Partner Certification Student Workbook

Define Unicenter Desktop and Server Management Components Common Architecture

Slide 1-11

This graphic illustrates the Unicenter DSM architecture:

Notes

1-7

Define Unicenter Desktop and Server Management Components


Common Architecture
Slide 1-12

This graphic represents the relationship between the Unicenter DSM architecture and the MDBs:

Notes

1-8

Partner Certification Student Workbook

Define Unicenter Desktop and Server Management Components Architecture Components

Slide 1-13

Architecture Components
Domain Manager
A manager is a collection of processes on a computer that comprise the primary interface for the database. A domain manager is the central manager that processes and controls all administrative tasks. It coordinates the work of subordinate scalability servers and agents. In large Enterprise domains, you can appoint several domain managers, which are controlled by one Enterprise domain manager.

Scalability Server
The scalability server provides a buffer point and resilience between end systems, or agents, and the manager. As the name implies, a scalability server provides for massive scalability. Rather than having all individually managed end systems communicating directly with a single manager, the load can be shared across multiple scalability servers. A scalability server is a distributed read-write interface for an agent because an agent does not communicate directly with the database. All communication to and from the scalability server goes through the scalability server API that is shared with the agents.

Engine
The engine is a central communication component operating between scalability servers and the domain database. It reads and writes data from and to a scalability server and replicates the common databases between the local domain and the Enterprise domain.

Notes

1-9

Define Unicenter Desktop and Server Management Components


Agent

Agent
Agents exist on all managed end systems. Each agent performs tasks such as inventory collection, software package installation, and remote control hosting. Unicenter DSM provides a framework that merges all agent functions of integrated products. It simplifies management and minimizes resource consumption and port usage. The agent uses common components and a common messaging infrastructure.

Common Database
Unicenter DSM uses a common Enterprise domain data repository. The MDB provides a unified structure for the storage of management data from all CA products.

Task Summary
You have identified the common interface and architecture provided by Unicenter DSM for Unicenter Software Delivery, Unicenter Asset Management, and Unicenter Remote Control. This includes the MDB, which is the central, common storage point for all the assets in your clients domain. A complete, upto-date, and easily searchable database can make tasks for inventory control and software deployment easier. In the next task, you will describe common asset registration.

Notes

1-10

Partner Certification Student Workbook

Define Unicenter Desktop and Server Management Components Task 3: Describe Common Asset Registration

Slide 1-14

Task 3: Describe Common Asset Registration


All Unicenter r11 products use the common MDB schema to store and manage data. The Common Object Registration API (CORA) ensures that asset data flows consistently, thereby supporting the data and referential integrity of the master asset data model of the MDB. CORA is the interface through which assets are registered and is the only source for updating the MDB schema.

Slide 1-15

CORA is designed to provide the functionality for a product to be registered as:


An asset (ca_asset table) An asset source Properties that identify the asset

Registration consists of the generation of a unique identifier (UUID) and the population of the necessary tables that are used to track the asset in the system. Registration helps ensure that all common objects entering the system are assigned a UUID and duplicate objects entering the system are identified and grouped together under the correct UUID.
Slide 1-16

Unicenter DSM assets are registered with the MDB as follows:


When installed, the Unicenter DSM agent registers with the scalability server and an asset or computer is created. External Asset types can be created from Unicenter DSM Explorer. These assets are registered when inventory is collected using the associated MIF file. The asset_uuid can be different for the Enterprise domain and local domain level MDB.

Notes

1-11

Define Unicenter Desktop and Server Management Components


Task 3: Describe Common Asset Registration
Slide 1-17

Unicenter DSM creates owned assets from the managed discovered asset when a Service Desk ticket is opened for a policy violation or a failed software distribution job. If the asset already exists as owned, Unicenter DSM only links it to the discovered asset, thereby avoiding duplication.

Task Summary
You have examined the way in which common assets are registered. This process is the same for each product in Unicenter DSM, helping ensure that your client can track an asset throughout the organization. All new assets are identified in a uniform way, making them easier to manage. This saves your client time and effort while remaining up to date and competitive.

Notes

1-12

Partner Certification Student Workbook

Define Unicenter Desktop and Server Management Components Assessment

Assessment
1 Which two manager types are available in Unicenter DSM? (Choose two.) a b c d e 2 Singular Domain Remote Scalability Enterprise

What writes data to and from scalability servers? a b c d MDB Agent Engine DSM Explorer

What does the CAF permit? a b c d Optimization of MDB Deployment of agents Sharing of common functionality Deployment of scalability servers

Notes

1-13

Define Unicenter Desktop and Server Management Components


Assessment 4 Which component registers an asset into the MDB? a b c d Engine Asset Intelligence Asset Management Common object registration API

Notes

1-14

Partner Certification Student Workbook

Define Unicenter Desktop and Server Management Components Module Summary

Slide 1-18

Module Summary
You should now be able to:

Identify Unicenter DSM Features Identify Unicenter DSM Architecture Describe Common Asset Registration

Unicenter DSM brings all the features of Unicenter Software Delivery, Unicenter Asset Management, and Unicenter Remote Control together in a single but powerful configuration. Elements such as the common interface and common MDB make management tasks easier and faster while common asset registration helps ensure the uniformity of asset identification. With Unicenter DSM, your client has single-point control over the inventory and deployment management tasks required to remain competitive. In the next module, you will install Unicenter DSM.

Notes

1-15

Define Unicenter Desktop and Server Management Components


Module Summary

Notes

1-16

Partner Certification Student Workbook

2
Install Unicenter DSM

2-1

Install Unicenter DSM


Module Objectives
Slide 2-1

Module Objectives
After this module, you will be able to:

Install Unicenter DSM Install the Unicenter Remote Control Component Open Unicenter DSM Explorer

Module Overview
Your client has expanded their operations to three new locations and this expansion has increased the workload for the IT department. Employees must be able to manage software delivery and asset management activities remotely and to apply consistent procedures and policies throughout the organization. The purchase of Unicenter DSM will help your client achieve these goals. In this module, you will install Unicenter DSM and help ensure that the installation was successful.

Notes

2-2

Partner Certification Student Workbook

Install Unicenter DSM Task 1: Install Unicenter DSM

Slide 2-2

Task 1: Install Unicenter DSM


In this task, you will install Unicenter DSM on a virtual session. This virtual session is a visualization of an operating system that simulates the computer on which you would install Unicenter DSM in a real-life situation.

Slide 2-3

The installation of Unicenter DSM consists of two major steps:

Exploration and preparation: During this phase, you specify the installation type (express or custom installation), verify existing software prerequisites or install missing software prerequisites, and select and start the installation of any other product functions included with the Unicenter DSM installation media. Distribution and configuration: During this phase, you provide information required to install Unicenter DSM components and relevant configuration settings required to start the installed components.

You can install and remove product components using the installation wizard. Many installation and configuration parameters and properties can be specified and changed using a command line interface.

Interactive Demonstration
Task Purpose: Install Unicenter DSM. 1 2 3 4 5 On your desktop, open the Windows 2000 Server VMware session and log in using the instructions provided in the dialog. Select Take a snapshot of the virtual machine. Type Pre-Install as the name of the snapshot. In Windows Explorer, in Shared Folders, navigate to the Z:\ClassMedia\UDSM folder. In the UDSM folder, double-click the Setup.exe file. The Desktop and Server Management installation wizard appears.

Notes

2-3

Install Unicenter DSM


Interactive Demonstration 6 7 8 9 Select Install Unicenter DSM. The Installer dialog appears. Click Next. The CA Unicenter Desktop and Server Management licensing agreement appears. At the bottom of the licensing agreement, click I agree. In the Installer dialog, click Next.

10 In the Select Installation method dialog, select Custom Installation and click Next. 11 Verify that each of the following installation components appears: Explorer Reporter Domain Manager: Infrastructure and Infrastructure Deployment Engine Scalability Server Agent Packaging Tools: OS Image Prepare System Documentation

12 In the Configure Manager dialog, verify that the following information is prefilled: Management Database Server: servername Instance: EI This is the Ingres database instance used by the MDB. EI stands for Embedded Ingres.

Notes

2-4

Partner Certification Student Workbook

Install Unicenter DSM Interactive Demonstration

Username: ca_itrm

Note: This account is the default user for Ingres and will also be created as a local Microsoft Windows user. Password: edu2k Confirm Password: edu2k

13 Click Next. 14 Under Advanced Manager Configuration, click Domain Manager. 15 Select Standalone and click OK. 16 Click Next. 17 Under Advanced Manager Configuration, select Engine. Leave the Engine field blank because you will use the default engine, SystemEngine, created during installation. 18 Click OK. Note: In the Configure Scalability Server window, the Manager field will default to DSM servername. 19 Click Software Delivery. 20 In the Configure Scalability Server window, select Enable support for MSI Administrative installations and click OK. 21 Select Boot Server, accept the defaults and then click OK. 22 Click Next. 23 In the four Configure Agent windows that appear, accept the defaults. 24 Click Next.

Notes

2-5

Install Unicenter DSM


Interactive Demonstration 25 In the Configure CA Unicenter Desktop and Server Management window, select Create Start Menu and click Next. 26 In the Installer status window, review the details of your installation selections using the scroll bar and click Advanced. This will enable you to change the installation directory locations. Accept the defaults. 27 In the Choose Destination Location window, view the following folders for each component and click OK. Component Shared Components Scalability Server Database Deployment Packages Software Delivery Library Software Delivery Boot Servers Folder C:\Program Files\CA\SharedComponents\ C:\Program Files\ CA\UnicenterDSM\ServerDB\ C:\Program Files\CA\Unicenter DSM\ C:\Program Files\ CA\Unicenter DSM\SD\ASM\ C:\Program Files\ CA\Unicenter DSM\Server\

For support reasons, leaving the default installation folders is best practice. However, if you cannot install to the default location, you can change the settings here. 28 Click OK and Next. The installation begins with the installation of Ingres and the MDB. The Setup Status window shows the status of the installation. 29 Revert to the Pre-Install snapshot prior to completion. You will verify the installation on the physical computer.

Notes

2-6

Partner Certification Student Workbook

Install Unicenter DSM Task Summary

Task Summary
You have discovered first-hand that the installation of Unicenter DSM is quite simple. Your client can now apply critical configuration to the product that impacts its functionality. In the next task, you will install the Unicenter Remote Control component.

Notes

2-7

Install Unicenter DSM


Task 2: Install the Unicenter Remote Control Component
Slide 2-4

Task 2: Install the Unicenter Remote Control Component


Unicenter Remote Control enables your client to manage desktops and servers remotely. Your client can use Unicenter Remote Control for troubleshooting purposes and for supplying support to any remote user, reducing the strain on network resources.

Slide 2-5

Unicenter Remote Control


Remote control functions can be used for a variety of purposes:

Home office workers who connect to computers on the corporate network Training and education centers that facilitate classroom and over-thenetwork courses Desk technicians who regularly investigate and solve problems without visiting sites

Slide 2-6

Unicenter Remote Control enables you to access multiple remote desktops with different operating systems concurrently. You can transfer files and chat with other users. Some key remote control features include:

Unicenter Remote Control viewer: This enables you to connect to remote systems. This viewer is fully integrated with the Unicenter DSM Administration interface or Unicenter DSM Explorer. However, it can be installed and run separately. Unicenter Remote Control host: The host function, which is a Unicenter DSM agent plug-in, runs on the computer you want to control. The Unicenter Remote Control viewer connects to the Unicenter Remote Control host and establishes a session. The Unicenter Remote Control host responds to keyboard and mouse input sent from the viewer and, in return, sends a video image of its desktop to the viewer.

Notes

2-8

Partner Certification Student Workbook

Install Unicenter DSM Interactive Demonstration

Unicenter Remote Control replayer: This feature enables you to play back previously recorded host sessions and manage recently recorded or replayed sessions. Unicenter Remote Control Central Management: This feature facilitates central management through Unicenter DSM Explorer and the performance of global address book management, active session monitoring, and session audits. It also permits you to access permissions.

For more information about Unicenter Remote Control, refer to the Inside Remote Control Guide.

Interactive Demonstration
Task Purpose: Install the Unicenter Remote Control component. 1 2 3 4 In Windows Explorer, navigate to the D:\ClassMedia\UDSM folder. In the UDSM folder, double-click the Setup.exe file. The Unicenter Desktop and Server Management installation wizard appears. Select Install Unicenter DSM. On the Installer page, leave Modify selected. Note: If no other Unicenter DSM component is installed, the Modify, Repair, or Remove option page will not appear and the CA Unicenter Desktop and Server Management licensing agreement appears. 5 6 7 8 Click Next. On the Product Functionality page, select Remote Control. Click Next. On the Select Components and Features page, click Next. Unicenter Remote Control will add functionality to the domain manager, scalability server, and agent components.

Notes

2-9

Install Unicenter DSM


Interactive Demonstration 9 On the Configure Agent page, click Remote Control. Make sure that the Viewer, Host, and Replayer components are selected. These components are selected by default.

10 Click OK and then click Next. Note: On the Settings Migration page, do not select Migrate Settings. Unicenter Remote Control has detected an earlier version of the agent installed on the Unicenter DSM server. The two versions can coexist. 11 Click Next twice. 12 Click Next again. Unicenter Remote Control begins the installation. You must wait a few minutes before the installation process is complete.

Task Summary
You have installed Unicenter Remote Control. Your client can provide remote access for their IT team to company computers anywhere on the network. This saves your client the expense of having IT personnel travel to remote sites. You are now ready to begin the delivery of Unicenter DSM agents to target computers. In the next task, you will open Unicenter DSM Explorer.

Notes

2-10

Partner Certification Student Workbook

Install Unicenter DSM Task 3: Open Unicenter DSM Explorer

Slide 2-7

Task 3: Open Unicenter DSM Explorer


Opening Unicenter DSM Explorer is one way to verify that the installation has been successful. Unicenter DSM enables your client to manage software delivery and asset management activities remotely and to apply consistent procedures and policies throughout the organization.

Interactive Demonstration
Task Purpose: Open Unicenter DSM Explorer. 1 On the Unicenter DSM Server, where Unicenter DSM has already been installed, click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management DSM Explorer. In the left pane of the Unicenter DSM window, under DSM Explorer, expand Domain\Computers and Users. By default, the tutorial window appears. This can be closed for this course. 3 To view the list in the right pane, in the left pane, select All Computers. The right pane shows all computers that have a Unicenter DSM agent connected to the domain. The computer name is listed along with its Unicenter AM Status and Unicenter SD Status. Make sure that Unicenter AM Status and Unicenter SD Status are Operational for the Unicenter DSM Server. By default, installation of a domain manager for Unicenter Asset Management and Unicenter Software Delivery also installs the same agents.

Notes

2-11

Install Unicenter DSM


Interactive Demonstration 4 In the right pane, from All Computers, double-click DSM Server. In the right pane, a report appears about this computer, which is your classroom computer. In the left pane, the DSM Server appears under All Computers. This is called the Progressive Tree view. The Progress Tree is usually empty. To add systems, double-click the system name in the right pane. If you then choose to empty the Progress Tree, right-click All Computers and choose Empty Progress Tree. 5 To diagnose the computer and verify the installation, in DSM Explorer, select the Instant Diagnostics tab. The diagnosis progress bar appears. When the diagnosis is complete, the Instant Diagnostics tab displays the results under the title Diagnose. 6 Notice the following: The DSM Components list shows the plug-ins on the computer, including the status and version of each. There is a Windows Services list showing the state of each service and its version. There is a list of Miscellaneous items, such as FTP or HTTP, with the state and version of each.

Task Summary
You have verified that the installation of Unicenter DSM was successful. Your client can identify any unsuccessful installations immediately and take the steps necessary to enable each computer to have the product installed correctly. Your client can prepare all the computers in the organization to begin accessing the common features Unicenter DSM brings to Unicenter Software Delivery, Unicenter Asset Management, and Unicenter Remote Control.

Notes

2-12

Partner Certification Student Workbook

Install Unicenter DSM Assessment

Assessment
1 Which installation method permits the greatest flexibility? a b c d 2 Direct installation Initial installation Custom installation Compact installation

What is the name of the default engine created during installation? a b c d InstallEngine SystemEngine CustomEngine UniSystem Engine

Which asset describes the Remote Control host computer? a b c d The domain manager The Unicenter Remote Control viewer The computer controlling a Unicenter Remote Control session The computer being controlled in a Unicenter Remote Control session

Notes

2-13

Install Unicenter DSM


Module Summary
Slide 2-8

Module Summary
You should now be able to:

Install Unicenter DSM Install the Unicenter Remote Control Component Open Unicenter DSM Explorer

Installation of Unicenter DSM has been successful. Your client can now install Unicenter DSM on their computers and verify that the process has been successful. Your client is prepared to deliver software and manage asset activities remotely. Now your client can employ the Unicenter DSM common features to manage their network with Unicenter Asset Management, Unicenter Remote Control, or Unicenter Software Delivery. In the next module, you will deploy the components of Unicenter DSM in preparation for software delivery.

Notes

2-14

Partner Certification Student Workbook

3
Deploy Unicenter DSM Components

3-1

Deploy Unicenter DSM Components


Module Objectives
Slide 3-1

Module Objectives
After this module, you will be able to:

Deploy Unicenter DSM Agents Monitor Job Status Validate the Agent Deployment Deploy Agents on Linux

Module Overview
Your client must deploy agents to each of their numerous office locations. These agents will enable your client to use the Unicenter DSM architecture throughout their network. Your clients IT department first installs an agent on all laptops and desktops with which the domain manager communicates. After successfully installing Unicenter DSM, the IT department must deploy agents and scalability servers to complete the Unicenter DSM infrastructure. In this module, you will monitor the deployment of Unicenter DSM agents on other computers and verify that the deployment was successful. You will also have the option of deploying an agent on a Linux system.

Notes

3-2

Partner Certification Student Workbook

Deploy Unicenter DSM Components Task 1: Deploy Unicenter DSM Agents

Slide 3-2

Task 1: Deploy Unicenter DSM Agents


An agent is a piece of code that resides on the target workstations or servers and communicates to the manager. An agent is also called a client. The basic Unicenter DSM agent collects a small, fixed amount of hardware information, which is then made available to other Unicenter DSM components. This basic hardware inventory is collected regardless if Unicenter Asset Management is installed or not. The inventory lists the hardware installed on managed assets.

Slide 3-3

The delivery of software to the target computer requires the addition of the Unicenter Software Delivery plug-in. Key Unicenter Software Delivery features include:

A small agent plug-in that resides on all target computers and is responsible for installing, updating, and removing software packages A powerful data transport infrastructure that optimizes network use Existing software packages in a multitude of packaging formats that can be imported to the software package library A powerful scripting language A packager that can be used to create installation images from an installed application Operating system installation management features that enable you to start systems and install entire operating systems in unattended mode Software installation tracking that can identify when, where, how, and by whom the programs were installed

Slide 3-4

Notes

3-3

Deploy Unicenter DSM Components


Task 1: Deploy Unicenter DSM Agents
Slide 3-5

There are four methods by which the Unicenter Software Delivery agent transfers files to targets for installation of the software packages: 1 Internal-NOS: This is the default method as installed. This means the target connects to a share on the domain manager and starts installing the package directly from the share. Internal-NOS-less: Files are transferred from the manager to the target before installation begins and the agent installs the package from its own subdirectory structure. Checkpoint and restart of file transfer is one of the advantages of this method. DTS-NOS-less: Files are transferred to the agent using Data Transport Service (DTS). The DTS agent must also be installed on the target. DTS has the additional benefits of bandwidth throttling and checkpoint and restart. Offline delivery can be scheduled using a CD-ROM.

4
Slide 3-6

The Unicenter Asset Management agent is located on the asset. The agent communicates with the scalability server to provide information about the asset. The engine on the domain manager collects this information from the scalability server and records it in the domain database. The scalability server also sends requests to the agent for performing tasks on the asset. To report on hardware and software inventory, the Unicenter Asset Management plug-in must be deployed. Infrastructure deployment involves:

Slide 3-7

Interactive manager installation The definition of scalability servers for this manager and the deployment of the scalability servers using the deployment wizard Deployment jobs to deploy agents to target scalability servers with appropriate agent features

Notes

3-4

Partner Certification Student Workbook

Deploy Unicenter DSM Components Deployment Manager Scan

Slide 3-8

When running Deployment Management (DM), the main steps of the agent deployment process are:

From the administrator computer, the DMClient manager component sends a request through the DMAPI component to the DM manager to install an agent on a target computer. The CAF plug-in component name for the DM manager is DMDeploy. The DM manager checks to see if DMPrimer is already installed on the target computer. If not, DMPrimer will be installed first on the target computer. The DM manager delivers the DMPrimer installer package and, if necessary, the DMBoot component. For example, a Microsoft Windows 9x target system requires the installation of DMPrimer. DMPrimer and the CA Messaging component are installed on the target computer. DMPrimer installation must run with elevated privileges. After DMPrimer is installed and DMDeploy has received the installation complete signal from the target computer, package deployment can be initiated.

Slide 3-9

Deployment Manager Scan


The deployment manager scans or runs a detection mechanism on the target computer to determine if the deployment has been successful. The detection mechanism identifies if the target computers are responding and if the packages are already installed. The scan can return one of the following values:

Deployed: The same version of the package is installed on the target. Deploying: The deployment of this package to the target has already started. Machine Down: The target address has a valid name that can be resolved by the network to address translation but the computer cannot be contacted. Check that the target computer is switched on.

Notes

3-5

Deploy Unicenter DSM Components


Interactive Demonstration

Slide 3-10

Machine Up: The address specified is valid and the computer is running. Package Newer: A newer version of the package is present on the target computer. Deployment will not be performed. Package Older: An older version of the package is already installed on the target computer. Deployment will be performed. Ready to Deploy: The address specified is valid and the computer is running. Unknown: The presence of the package on a target cannot be determined. Make sure the device exists.

Interactive Demonstration
Task Purpose: Deploy Unicenter DSM agents. The agent will be deployed to your clients test workstations to validate the process and login credentials. 1 2 3 4 5 Open the Windows 2000 Professional VMware session. Save a snapshot of the session and type Pre-Install for the name. In DSM Explorer, in the left pane, expand Domain\Control Panel\Deployment. Select Deploy DSM Agents or Scalability Servers. In the right pane, the Deployment: Introduction page appears. Click Next. The Job Type page appears. This is a deployment job. Jobs direct agents or engines to perform specific actions. Various types of jobs can be carried out on agents. The default deployment job type is Deploy Software to Target Computers. The deployment job name can be changed.

Notes

3-6

Partner Certification Student Workbook

Deploy Unicenter DSM Components Interactive Demonstration

Click Next. The Deployment Payload page appears. You can deploy only one payload or package at a time. Each package is available in two versions, Microsoft Windows or Linux. The packages include plug-ins for Minimum Agent, Asset Management, and Software Delivery. The Microsoft Windows version involves the deployment of a base agent with the plug-in. There is also a package for deploying the Unicenter DSM scalability server.

7 8

From the list of packages, select CA Unicenter DSM Agent+all agent plugins version# Windows_x86 ENU. Click Next. The Target Criteria page appears. The deployment job must now be linked with the specific unit, or group of units, on which the job will be carried out.

From the Development Type list, select Deploy to Specific Computers.

10 Type yourcomputername for the Windows 2000 Professional VMware session. 11 Click Next. The Scan Targets page appears. 12 Click Scan. When the scan is complete, a green disk indicates that the computer responded. The computer name, IP address, and state are shown in the Discovered Computers list. 13 Click Next. The Target Selection page appears. The Discovered Computers list is now shown beside an empty Target Computers list. The computers listed in the Discovered Computers list must be moved to the Target Computers list. 14 From the Discovered Computers list, select Windows 2000 Professional yourcomputername and click the right arrow between the two lists. A User Credentials dialog appears.

Notes

3-7

Deploy Unicenter DSM Components


Interactive Demonstration 15 Type the username administrator and the password yourcomputernamecai and then click OK to close the dialog. The computer listing is transferred to the Target Computers list. 16 Click Next. The Agent Configuration page appears. 17 Type the DSM servername in the scalability Server Address to Connect to field. Any additional Microsoft Windows or UNIX installation options can be typed in the Microsoft Windows or UNIX fields and can be found in the Implementation Guide. For example, the Software Delivery catalog is installed by default with the Unicenter Software Delivery agent. 18 Click Next. The Summary page appears. This page displays details of the deployment job. 19 To start the job, click Finish. Deployment Job Status shows the date of this job, its status as Active, the start time of the job, the number of targets as 1, and if the job is completed, failed, or active.

Task Summary
You have delivered a Unicenter DSM agent and can quickly verify that deployment has been successfully initialized. Your client can be sure that each deployment made to their computers is performed accurately. In the next task, you will monitor the deployment job as it takes place.

Notes

3-8

Partner Certification Student Workbook

Deploy Unicenter DSM Components Task 2: Monitor Job Status

Slide 3-11

Task 2: Monitor Job Status


Unicenter DSM agent transfer and final installation follows the Unicenter DSM agent deployment process.

Slide 3-12

Unicenter DSM provides monitoring indicators that include the deployment job state, summary, and status for transferring.

Interactive Demonstration
Task Purpose: Monitor the job status. 1 2 3 Expand Deployment Job Status. In the left pane, select the job by date. The right pane shows the status details of the specific job. Select Windows 2000 Professional yourcomputername. The State category shows the status of the deployment, which will progress through Posted, Deploying Primer, Transferring, and Installing to Installed. In the Summary area, the blue disk indicates that the job is Active. The Tasks area shows options for deleting, suspending, resuming, or aborting the job. Description indicates that These are the deployment jobs that currently exist on the deployment manager. Status for Transferring shows the percentage of the deployment job completed. This value keeps changing until it reads 100 percent. When the job is complete, State changes from Transferring to Installing and the disk turns green.

Notes

3-9

Deploy Unicenter DSM Components


Task Summary

Task Summary
The final stages of the deployment process, from transfer to installation, can now be monitored. Your client can check to see that deployment is proceeding with no problems. Any problems that do occur can be addressed immediately, saving your client time by not permitting a faulty deployment to proceed. In the next task, you will validate that the deployment has been completed successfully.

Notes

3-10

Partner Certification Student Workbook

Deploy Unicenter DSM Components Task 3: Validate the Agent Deployment

Slide 3-13

Task 3: Validate the Agent Deployment


After deployment of the Unicenter DSM agent is complete, several methods can be used to validate that the deployment has been successfully carried out. These include a check of the system diagnostics and an examination of the system inventory to see if the Unicenter DSM agent appears.

Interactive Demonstration
Task Purpose: Validate the agent deployment through a diagnostic check. 1 2 3 4 From the Windows 2000 Professional VMware workstation, on your desktop, right-click the Unicenter DSM systray. Choose Common Agent dialog appears. Properties. The Common Agent Properties

Select the General tab, which shows if the agent is registered to the Unicenter DSM server. From your desktop, open the Command Prompt shortcut. Type caf status at the prompt and press ENTER. Make sure that Running DSM services for the agent appears. The list of running Unicenter DSM services will be considerably smaller than the domain manager caf plug-in list. Take a snapshot of the Windows 2000 Professional workstation and type Agent-Installed for the name. On the Unicenter DSM server, in the left pane, expand DSM Explorer\All Computers. Select All Computers. The appearance of the asset in the left pane under All Computers confirms that deployment was successful. All computers in the list have Unicenter DSM installed.

5 6 7

You have validated the agent deployment through a diagnostics check. Next, you will verify the deployment by checking the inventory.

Notes

3-11

Deploy Unicenter DSM Components


Interactive Demonstration

Interactive Demonstration
Task Purpose: Validate the agent deployment through an inventory check. 1 2 In the right pane, double-click agentname to see its home page. Select the Inventory tab. This tab lists the basic inventory gathered by the basic Unicenter DSM agent and includes information about the System, Processors, Operating System, System Services, Network Adapters, Video Adapters, Network, TCP/IP, File Systems, Local File Systems, and System Status. Scroll down to see the entire list. 3 4 In the left pane, expand agentname. Expand Inventory and select System Status. Notice that the system hardware scan was completed. This is further validation that the agent installation and subsequent scan were successful. 5 Shut down the Windows 2000 Professional VMware session.

Task Summary
You have confirmed the successful deployment of an agent to a target workstation. Validating the deployment process enables early detection and correction of errors in deployment jobs. Your client can save time by correcting errors before the job continues. In the next task, you will deploy agents on Linux.

Notes

3-12

Partner Certification Student Workbook

Deploy Unicenter DSM Components Task 4: Deploy Agents on Linux

Slide 3-14

Task 4: Deploy Agents on Linux


Unicenter DSM is designed with a variety of computer operating systems available in mind. Instead of being restricted to using only one operating system, such as Microsoft Windows, your client can comfortably apply Unicenter DSM to computers with other systems installed, such as Linux.

Slide 3-15

A Unicenter DSM agent can be deployed on any Linux system in your clients organization in the same way that it was deployed on a Microsoft Windows operating system.

Interactive Demonstration
Task Purpose: Deploy agents on Linux. 1 2 3 4 5 6 7 8 9 On your desktop, double-click the VMware RHES 4.0 session. Log in to the Linux session using root and password as the credentials. Choose Applications Press ENTER. Scroll through the files and double-click the hosts file. The Gedit utility appears. Replace the word host with yourhostname in the utility. Save and close the file. Close the Gedit utility. File Browser. Type /etc in the Location field.

10 In DSM Explorer, in the left pane, expand Domain\Control Panel\Deployment. 11 Select Deploy DSM Agents or Scalability Servers. In the right pane, the Deployment: Introduction page appears. 12 Click Next. The Job Type page appears. 13 Leave the default selection and click Next.

Notes

3-13

Deploy Unicenter DSM Components


Interactive Demonstration 14 From the list of packages, select CA Unicenter DSM Agent+all agents plugins version# Linux_x86 ENU. 15 Click Next. The Target Criteria page appears. Link the Job with the Unit or Group 16 From the Development Type list, select Deploy to Specific Computers. 17 Type RHES40 in the Computers: entry field. 18 Click Next. The Scan Targets list appears. 19 Click Scan. When the scan is complete, a green disk indicates that the computer responded. The computer name, IP address, and state are displayed in the Discovered Computers list. 20 Click Next. The Target Selection page appears. The Discovered Computers list now appears beside an empty Target Computers list. The computers listed in the Discovered Computers list must be moved to the Target Computers list. 21 From the Discovered Computers list, select yourcomputername and click the right arrow between the two lists. A User Credentials dialog appears. 22 Type root and password as the credentials. To close the dialog, click OK. The computer listing is transferred to the Target Computers list. 23 Click Next. The Agent Configuration window appears. 24 Type the DSM servername in the scalability Server Address to Connect to field. 25 Click Next. The Summary window appears. This window shows all the details of the deployment job. You can click Back to make changes.

Notes

3-14

Partner Certification Student Workbook

Deploy Unicenter DSM Components Interactive Demonstration

26 Click Finish to start the job. Deployment Job Status displays the date of this job, its status as Active, the start time of the job, the number of targets as 1, and if the job is completed, failed, or active. 27 Validate the installation as you did for the Microsoft Windows deployment. Notice that /opt/CA will be the installation location of the files.

Task Summary
You have deployed an agent on a Linux system the same way you have deployed a Microsoft Windows agent. Unicenter DSM provides this convenient flexibility across different operating systems and enables your client to provide Unicenter DSM functionality to all their assets, regardless of their operating system. Unicenter DSM functionality provides greater compatibility between computers using different operating systems.

Notes

3-15

Deploy Unicenter DSM Components


Skill Builder: Deploy a Scalability Server and Validate the Installation

Skill Builder: Deploy a Scalability Server and Validate the Installation


Business Problem
A scalability server enables geographical scalability for your clients management tasks. This server is the primary interface for local and remote agents. Your client has an office in a remote location. A scalability server must be deployed to balance the load across their systems.

Hint
Using the Deployment Manager, deploy the server to the Windows 2000 Server VMware session.

Notes

3-16

Partner Certification Student Workbook

Deploy Unicenter DSM Components Assessment

Assessment
1 What is the default deployment job type? a b c d 2 Scalability Server Basic Agent plug-in Stage Software at Scalability Servers Deploy Software to Target Computers

What is the first component to be installed when deploying an agent? a b c d DMPrimer Systray icon Basic inventory Software delivery plug-in

Which two inventory items are gathered by the basic hardware inventory agent? (Choose two.) a b c d Local file systems Boot disk information CPU performance statistics Network adapter information

Notes

3-17

Deploy Unicenter DSM Components


Assessment 4 Which feature enables you to access user permissions? a b c d DMPrimer DM Manager Unicenter Remote Control viewer Unicenter Remote Control Central Management

Notes

3-18

Partner Certification Student Workbook

Deploy Unicenter DSM Components Module Summary

Slide 3-16

Module Summary
You should now be able to:

Deploy Unicenter DSM Agents Monitor Job Status Validate the Agent Deployment Deploy Agents on Linux

You have deployed basic Unicenter DSM agents, monitored the deployment job status, and validated that the agent was deployed successfully. Your client can deploy agents to all their locations worldwide and check each deployment job to verify that no errors occurred. Your client can also help ensure compatibility between Microsoft Windows and Linux operating systems by using Unicenter DSM on both. Your client establishes a solid infrastructure across their network when Unicenter DSM is installed on each computer. In the next module, you will apply central configuration.

Notes

3-19

Deploy Unicenter DSM Components


Module Summary

Notes

3-20

Partner Certification Student Workbook

4
Apply Central Configuration

4-1

Apply Central Configuration


Module Objectives
Slide 4-1

Module Objectives
After this module, you will be able to:

Examine Central Configuration Configure Unicenter Software Delivery Manager Policy Configure Scheduling for the Unicenter Asset Management Agent Apply Manager Configuration Policy to Move an Agent

Module Overview
Your clients scalability server has undergone a hardware upgrade. They must test the server by having double the normal number of agents connect for software installation. Instead of the default 25 agents, the server will handle 50 simultaneous connections. Also, your client has determined that some custom settings must be applied to the Unicenter Software Delivery environment to improve efficiency. If a package is not completed in three days after delivery, it must be removed from the Software Jobs container. For optimal productivity on key business activities, some of your clients employees require the highest level of service for their servers, which cannot be attained when a scalability server is already being used by a large number of computers. The solution is to set up a scalability server with a light load. To direct an agent to report to this new server, you must create and apply a manager configuration policy. In this module, you will create a policy to set the scheduling of a scan for the Unicenter Asset Management agent. You will also change a policy for the Unicenter Software Delivery domain manager.

Notes

4-2

Partner Certification Student Workbook

Apply Central Configuration Task 1: Examine Central Configuration

Slide 4-2

Task 1: Examine Central Configuration


The Unicenter DSM infrastructure is centrally configured using common configuration technology; therefore, the need for end-user configuration is dramatically reduced.

Slide 4-3

Policies
Unicenter DSM features central management of policies for managers, agents, and servers. A policy is a tool used to automate tedious maintenance and security tasks. As the administrator, your client can control and enforce the management of such policies throughout the organization with Unicenter DSM Explorer and the default computer policy with its predefined settings. Your client can also create customized policies according to your needs and apply these policies to computers and groups in your organization. All policies available in the domain are shown in the left pane of Unicenter DSM Explorer under Control Panel\Policy. The Unicenter DSM installation creates a default policy under Default Computer Policy\DSM with predefined settings. This policy and its settings act as a template for any new policies you create. Because you can change the default policy, any changes made to the policy or its settings are reflected in the new policy.

Slide 4-4

Configuration
Centrally managed configuration changes are applied using Unicenter DSM Explorer, which is connected to the Unicenter DSM domain manager. The Unicenter DSM domain manager stores configuration property values in the MDB. Configuration policy values from the MDB, stored in csm_* tables, are transmitted using the common configuration CCNF and CSM component plugins of the agents. All values are stored in comstore.xml on the various Unicenter DSM components. The values in the MDB can be set using Microsoft Windows Explorer or through cadsmcmd commands. Changes are transmitted to and applied by a Unicenter DSM agent running on the appropriate end system.

Notes

4-3

Apply Central Configuration


Parameters
Slide 4-5

Parameters
To simplify the administration of parameters, an arbitrary number of parameters can be grouped together as part of a configuration policy. Instead of assigning single parameters to computers or groups, configuration policies are assigned. One configuration policy can be assigned to multiple computers or groups and one group or computer can have multiple configuration policies assigned to it. There are two types of management modes for the parameters in the default policy:

Slide 4-6

Locally managed parameters are controlled by applications that run on the local computer. Centrally managed parameters are controlled through the manager policies and are read-only for local applications. Centrally managed parameters take precedence over locally managed parameters.

The management mode of a parameter can be changed at the manager only.

Task Summary
You have examined central configuration. This feature of Unicenter DSM makes configuration much easier for your client and saves valuable time. Manual configuration of each installation of Unicenter DSM would occupy your clients IT staff when they could be performing other necessary tasks in the organization. Central configuration is carried out by the domain manager. In the next task, you will configure Unicenter Software Delivery policy at the domain manager level.

Notes

4-4

Partner Certification Student Workbook

Apply Central Configuration Task 2: Configure Unicenter Software Delivery Manager Policy

Slide 4-7

Task 2: Configure Unicenter Software Delivery Manager Policy


The Manager policy group contains all Unicenter Software Delivery domain manager policies. Unicenter DSM enables you to create a new policy at the domain manager level and configure it. The policy is then applied to the domain manager. The delivery of the policy can be monitored and verified after it is complete.

Interactive Demonstration
Task Purpose: Configure Unicenter Software Delivery manager policy.

Create the Policy


1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Control Panel. Right-click Configuration and choose Explore From. A new Explorer GUI window appears with only the Configuration folder contents. In the left pane, right-click Configuration Policy and choose New Policy. The New Configuration Policy dialog appears. Type Software Delivery Parameters in the Name field and click OK. In the left pane, expand Configuration Policy\Software Delivery Parameters\DSM\Software Delivery. Select Scalability Server. In the right pane, double-click MaxSimActCheck. The Setting Properties dialog appears. Type 50 in the Value field and click OK. In the left pane, expand Software Delivery Parameters\DSM \Software Delivery.

Notes

4-5

Apply Central Configuration


Interactive Demonstration 10 In the left pane, select Manager. In the right pane, notice that MaxActivationTime is <locally managed>. Configuration parameters can be set to be centrally or locally managed. Centrally managed parameters are policies set from the manager and distributed to the applicable Unicenter DSM component. 11 To change this setting locally, in DSM Explorer, in the left pane, expand Control Panel\Configuration\Software Job Management. 12 Select Job Handling. 13 In the right pane, change Max. job time-out from 7 to 3 days. 14 Click Apply. 15 In the left pane, under Configuration Policy, right-click the Software Delivery Parameters policy and choose Seal. 16 Right-click the Software Delivery Parameters policy and choose Copy.

Apply the Policy


17 Return to the original DSM Explorer window. In the left pane, right-click 2000 Server VMware and choose Paste Configuration Policies. The Schedule Policies dialog appears. 18 Select Apply Policies Immediately and click OK. 19 Close all dialogs. 20 In the left pane, expand 2000 Server VMware\Configuration. 21 Select Configuration Policy. In the right pane, notice the status of the Active and Scheduled policies. 22 In the right pane, under Control Panel\Configuration\Configuration Jobs, monitor the policy delivery. 23 Close any VMware sessions that are running and start the Windows 2000 Server VMware session.

Notes

4-6

Partner Certification Student Workbook

Apply Central Configuration Interactive Demonstration

24 In the left pane, under Windows 2000 Server VMware\Configuration, right-click Configuration Policy and choose Request configuration report. The policy job will finish when the Windows 2000 server VMware session receives the policy. 25 Refresh the screen. In the right pane, under Reported Configuration, Detail indicates that a request has been received or completed. 26 In the left pane, under Windows 2000 Server VMware\Configuration, right-click Configuration Policy and choose View configuration report.

Task Summary
You can now configure manager policy for your clients server to improve efficiency. The ability to change policy settings helps enable your client to customize and adapt policies according to changing business needs. This saves time and money and keeps your client competitive. In the next task, you will configure scheduling for the Unicenter Asset Management agent.

Notes

4-7

Apply Central Configuration


Task 3: Configure Scheduling for the Unicenter Asset Management Agent
Slide 4-8

Task 3: Configure Scheduling for the Unicenter Asset Management Agent


The Unicenter DSM common configuration policy defines settings that can be applied to all of Unicenter DSM. You can modify the Unicenter Asset Management configuration settings to schedule the Unicenter Asset Management agent to run at a different time and frequency.

Slide 4-9

A Unicenter DSM policy automates such jobs as scans. This eliminates the time required to perform jobs manually and the assignment of employees to carry out the jobs. Part of the automation capability Unicenter DSM provides is scheduling, which enables the user to select the time a job will be carried out and how frequently the job will occur.

Interactive Demonstration
Task Purpose: Change the scan schedule for the Unicenter Asset Management agent. 1 On the Unicenter DSM server, right-click the Unicenter DSM systray and choose Common Agent Properties. The DSM Properties - Common Agent dialog appears. Select Scheduling. View the schedule for Asset Management. You will modify this schedule using the domain manager. To close the DSM Properties - Common Agent dialog, click OK. In the left pane, right-click Configuration Policy and choose New Policy. Type AM Agent Schedule Policy in the Name field. Click OK. In the left pane, expand Configuration Policy\AM Agent Schedule Policy\DSM\common components\CAF. Select Scheduler. Select AM agent scheduled job.

2 3 4 5 6 7 8 9

Notes

4-8

Partner Certification Student Workbook

Apply Central Configuration Interactive Demonstration

10 In the right pane, double-click type. The Setting Properties dialog appears. 11 Type hour in the Value field. 12 Click OK. 13 In the left pane, right-click AM Agent Schedule Policy and choose Seal. The DSM Explorer dialog appears. 14 Click OK. 15 In DSM Explorer, apply this new policy to the All Computers group. When you apply this policy, choose Apply policies immediately. 16 Monitor the application of the policy to the DSM server by viewing Configuration\Configuration Jobs. 17 When the new policy has been applied to this computer, open the Unicenter DSM systray Common Agent Properties. 18 Select Schedule and verify the schedule has changed to Hourly.

Task Summary
In this task, you have created a policy to configure scheduling for the Unicenter Asset Management agent. Your client can save time and effort by assigning policies to automate such tasks for computers or groups instead of having employees perform them manually. In the next task, you will apply manager configuration policy.

Notes

4-9

Apply Central Configuration


Task 4: Apply Manager Configuration Policy to Move an Agent
Slide 4-10

Task 4: Apply Manager Configuration Policy to Move an Agent


A policy can be applied to automate such tasks as the movement of an agent. You can schedule the task and verify that it has been successful. The agent can then be moved back to its original location if required.

Slide 4-11

When you move an agent to a new domain manager, history and installation records move with the agent. The workstation will be locked until the move is complete. Computers moving between domains can be set in an Enterprise domain environment. The Enterprise domain manager will automatically detect the situation and move the computer appropriately.

Interactive Demonstration
Task Purpose: Apply manager configuration policy to move an agent.

Create the Policy


1 2 Start the Windows 2000 Professional VMware session and log in. In DSM Explorer, in the left pane, expand Computers and Users\All Computers\Windows 2000 Professional VMware session\Configuration. Under Configuration, right-click Configuration Policy and choose Request configuration report. Refresh the screen. In the right pane, under Reported Configuration, Detail indicates that a request has been received or completed. In the left pane, under Windows 2000 Professional VMware session\Configuration, right-click Configuration Policy and choose View configuration report. In the Reported Settings dialog, expand DSM\Agent\common agent and select common. In the right pane, the DSM server appears as the server address.

3 4 5

Notes

4-10

Partner Certification Student Workbook

Apply Central Configuration Interactive Demonstration

7 8 9

In DSM Explorer, in the left pane, expand Domain\Control Panel. Right-click Configuration and choose Explore From. A new Explorer GUI window appears for the Configuration folder. In the left pane, right-click Configuration Policy and choose New Policy. The New Configuration Policy dialog appears.

10 In the Name field, type Chicago Systems Policy and click OK. 11 In the left pane, expand Configuration Policy\Chicago Systems Policy\DSM\Agent\common agent and select common to show its contents in the right pane. Notice that serveraddress is locally managed. 12 Right-click serveraddress and choose Setting Centrally Managed. 13 In the right pane, double-click serveraddress. The Setting Properties dialog appears. 14 In the Value field, type 2000 server VMware name and click OK. 15 In the left pane, right-click Chicago Systems Policy and choose Seal. 16 Click OK. 17 In the left pane, expand Chicago Systems Policy\DSM \Agent\common agent and select common. In the right pane, notice the new value of serveraddress. The only object in this policy is the changed attribute. 18 In the left pane, right-click Chicago Systems Policy and choose Copy.

Apply the Policy


19 Return to the original DSM Explorer window. Right-click Windows 2000 Professional workstation and choose Paste Configuration Policies. The Schedule Policies dialog appears. 20 Select Apply Policies Immediately and click OK. 21 To close the dialogs, click OK three times.

Notes

4-11

Apply Central Configuration


Interactive Demonstration 22 In the left pane, expand Windows 2000 Professional\Configuration. 23 Select Configuration Policy. In the right pane, notice the status of the Active and Scheduled policies. 24 Under Windows 2000 Professional\Configuration, right-click Configuration Policy and choose Request configuration report. 25 Refresh the screen. In the right pane, under Reported Configuration, Detail indicates that a request has been received or completed. 26 In the left pane, under Windows 2000 Professional\Configuration, right-click Configuration Policy and choose View configuration report. 27 In the Reported Settings dialog, expand DSM\Agent\common agent and select common. In the right pane, the Windows 2000 server VMware session is the server address. 28 Click OK. One agent was moved to Chicago by mistake. You must now move that agent back to its original server.

Interactive Demonstration
Task Purpose: Return an agent to the DSM server. 1 2 3 4 5 6 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Configuration Policy. Right-click Chicago Systems Policy and choose Un-Seal. Expand Chicago Systems Policy\Agent\common agent and select common. In the right pane, double-click serveraddress. Change Value to DSM server and click OK. In the left pane, right-click Chicago Systems Policy and choose Seal.

Notes

4-12

Partner Certification Student Workbook

Apply Central Configuration Interactive Demonstration

7 8 9

Right-click Chicago Systems Policy and choose Copy. In the left pane, expand Domain\Computers and Users\All Computers. Right-click Windows 2000 Professional VM computer and choose Paste Configuration Policies.

10 Select Apply Policies Immediately and click OK. 11 In the left pane, expand Windows 2000 Professional VM computer\Configuration. 12 Right-click Configuration Policy and choose Request configuration report. 13 Refresh the screen. 14 Right-click Configuration Policy and choose View configuration report. 15 In the left pane, expand DSM\Agent\common agent. 16 Select common. The value for serveraddress in the right pane is now the DSM servername.

Task Summary
You used the manager configuration policy to move an agent to a server with a smaller load and reversed that process by returning the agent to its original server. A configuration policy enables your client to assign multiple parameters to multiple computers in the organization, making distribution of parameters faster and more efficient. Distribution time is shortened and control over the distribution is more effective.

Notes

4-13

Apply Central Configuration


Skill Builder: Configure Unicenter Software Delivery Agent Policy

Skill Builder: Configure Unicenter Software Delivery Agent Policy


Business Problem
You must configure an agent policy for packages that can take a long time to install on older computers, such as those using Microsoft Windows 95. If installation exceeds a set amount of time, it is registered as a failed operation. Your client thinks that the default of 5 minutes is not adequate and would like to test 10 minutes.

Hint
Change the Job Run Timeout parameter in the Software Delivery Agent folder.

Notes

4-14

Partner Certification Student Workbook

Apply Central Configuration Assessment

Assessment
1 In which two ways are configuration policies managed in Unicenter DSM? (Choose two.) a b c d 2 Locally Globally Centrally Remotely

Where does the domain manager store configuration property values? a b c d MDB Agent cache MIF files at each agent Program files directory on the Unicenter DSM server

Which property changes when an agent is moved to another scalability server? a b c d agenttarget serveraddress reportingserver scalabilityserver

Notes

4-15

Apply Central Configuration


Module Summary
Slide 4-12

Module Summary
You should now be able to:

Examine Central Configuration Configure Unicenter Software Delivery Manager Policy Configure Scheduling for the Unicenter Asset Management Agent Apply Manager Configuration Policy to Move an Agent

You have created policies for automating tasks, which saves your client time. You have also reconfigured policies to suit the particular needs of your client, which provides flexibility in their operations. Your client can more efficiently use their Unicenter DSM assets by creating and applying a manager configuration policy. Your client can assign agents to scalability servers with light workloads and return other agents to their original servers. They can now increase server reliability and performance for key employees. In the next module, you will enable your client to eliminate any unauthorized use of its Unicenter DSM assets by setting security parameters.

Notes

4-16

Partner Certification Student Workbook

5
Set Security Parameters

5-1

Set Security Parameters


Module Objectives
Slide 5-1

Module Objectives
After this module, you will be able to:

Integrate Microsoft Active Directory Structure Configure a Directory Synchronization Schedule Add Security Profiles and Class Permissions Change Permissions at the Object Level

Module Overview
Your client can implement effective security measures with Unicenter DSM to better protect their entire network. By setting security parameters, your client can prevent the unauthorized use of Unicenter DSM and protect trade secret information. In this module, you will integrate Microsoft Active Directory structure, configure a directory synchronization schedule, add security profiles and class permissions, and change permission levels.

Notes

5-2

Partner Certification Student Workbook

Set Security Parameters Task 1: Integrate Microsoft Active Directory Structure

Slide 5-2

Task 1: Integrate Microsoft Active Directory Structure


Unicenter DSM directory integration enables your client to take advantage of organizational directories. Your client can integrate directories in Unicenter DSM Explorer and use them to define query groups, target agent deployments, authenticate and authorize users, and produce reports. Directory integration provides Unicenter DSM products with read-only access to directories. This includes not only read-only access to all the information the directory holds about an object, but also the capability of finding and searching for objects. A directory reconciliation task links computers and user accounts discovered by Unicenter DSM to the appropriate entities found in an integrated directory. This linked information can then be used throughout Unicenter DSM. For example, you can use linked information in reports and queries and during the deployment of the Unicenter DSM infrastructure. Directories can also be used during user authentication. For example, a directory can authenticate a user when they log in to Unicenter DSM Explorer.

Slide 5-3

Directory integration can be used to:


Define query groups with a target that matches computers or users held in an organization, organizational unit, container, or group from the directory Target the deployment of the Unicenter DSM agent Authenticate users, including native-mode Microsoft Active Directory Authorize users by mapping security profiles to entities in the directory Produce reports using a hierarchy obtained from the directory

Notes

5-3

Set Security Parameters


Interactive Demonstration
Slide 5-4

Multiple directories can be supported at the same time and the domain manager does not have to be a member of the directory. All directory access for user authentication uses Secure Sockets Layer (SSL) and is read-only. Supported directories include:

Microsoft Active Directory Novell NDS CA eTrust Directory Lightweight Directory Access Protocol (LDAP) Directory (LDAPS if using Secure Protocol)

Interactive Demonstration
Task Purpose: Integrate Microsoft Active Directory to a domain. 1 2 3 4 In DSM Explorer, in the left pane, expand Domain\Control Panel\Directory Integration. Select Add Directory. The Introduction window appears. Click Next. The Directory Name field appears. Type classroomdomainname.ca.com in the Directory Name field. By default, Active Directory is selected as the Directory Type. Leave this value. Click Next. Check that the fully qualified domain name of t2 is populated in the Server Name field. Leave Port as 389. If the domain is not detected, it will be necessary to type the name of the Microsoft Active Directory server. 7 8 Click Next. The Directory Binding window appears. To access the directory after it is added, type the username administratort2@classroomdomainname.ca.com and the administratorpassword for t2.

5 6

Notes

5-4

Partner Certification Student Workbook

Set Security Parameters Interactive Demonstration

Click Next. The Base Directory Node window appears. Make sure that dc=classroomdomainname,dc=ca,dc=com is listed in the Base Directory Node field. Again, if the directory is found, this field will automatically prefill.

10 Click Next. The Choose Schema Mapping window appears. Leave the default, CADefaultActiveDirectory, selected in the Schema Maps list. You can select Define new mapping if you would like to create a new schema. 11 Click Next. The Refine/Define Schema Mapping window appears. No changes will be made to the Mapping Table, which lists DSM to Active Directory attribute mappings. 12 Click Next. The Finish window appears. This displays all the details you have chosen to add to the new directory. You can click Back to make any changes. 13 To add to the directory, click Finish. If successful, the Configured Directories window appears showing the added directory name and its description.

Task Summary
You have linked Microsoft Active Directory to the Unicenter DSM domain. This provides your client with the ability to define query groups, target the deployment of the Unicenter DSM agent, authenticate and authorize users, and produce reports based on a hierarchy. In the next task, you will verify that Unicenter DSM is up to date with Active Directory information by configuring a directory synchronization schedule.

Notes

5-5

Set Security Parameters


Task 2: Configure a Directory Synchronization Schedule
Slide 5-5

Task 2: Configure a Directory Synchronization Schedule


When you want to define queries or reports based on data from Unicenter DSM and external directories, Unicenter DSM must be able to maintain a mapping of Unicenter DSM objects to the equivalent directory objects. The default directory synchronization job is used to help ensure that the mapping is valid and that as many Unicenter DSM objects as possible are mapped to directory objects. The Directory Synchronization node is used to configure the order in which the uniform resource identifiers (URIs) of objects in the database are synchronized with the directory URIs. The Directory Synchronization pane shows the current schedule and the order in which the directories are evaluated by the default directory synchronization job. When the directory synchronization job runs successfully, an .xml file is created in the Unicenter DSM logs directory. Before a directory query or report is executed, the directory synchronization job must have run at least once so results can be mapped to Unicenter DSM objects. This must be done when querying or generating reports on external directories only. When executing queries or reports on the operating system native users and groups, such as Microsoft Windows NT or Linux users, the directory synchronization job does not need to be run. The operating system native users and groups do not need to be configured as an external directory to be displayed. They are shown by default.

Slide 5-6

Default Directory Synchronization Job


The Directory Synchronization node can run an engine job to check the URIs of users and computers. The default directory synchronization job has default values and is first run immediately after installation. Note: The default Directory Synchronization Job appears under Control Panel\Engines\Engine Tasks\All Engine Tasks in Unicenter DSM Explorer.

Notes

5-6

Partner Certification Student Workbook

Set Security Parameters Unique Identifiers and URIs

When you edit the directory synchronization settings on the GUI, you change the configuration of the default directory synchronization job. You can also create a new directory synchronization job by running cmDirEngJob from the command line interface. When the job runs successfully, an .xml file is created in the Unicenter DSM logs directory. The file maps database users and computers to directory users and computers. The file name is cmDirREPXXX.xml, where XXX is a string that represents the time when the report was created. If you run the synchronization tool from the command line, you can change the name of the report file.
Slide 5-7

Unique Identifiers and URIs


When the directory synchronization job is run, it must map between Unicenter DSM-discovered objects and external directory objects. This is done using unique identifiers and URIs. Specifically, when a user or computer is discovered, a unique identifier is generated and sent to the Unicenter DSM manager to be inserted into the database. This identifier then becomes the URI for this object. For Microsoft Windows, the URI has the following format: winnt://domain/username For Linux, the URI has the following format: unixl://fully_qualified_dns_name/username The directory synchronization extracts the username from the Unicenter DSM URI and then performs a lookup search for this user in the directory using the username. When mapping users, the following LDAP query is executed: (&(objectClass=userMap)(!(objectClass=computerMap)) (userCn=username) )

Notes

5-7

Set Security Parameters


Interactive Demonstration When mapping computers, the following LDAP query is executed: (&(objectClass=computerMap)(assetCn=name) ) Note: It is important to remember that when a query is executed on a directory, userMap, computerMap, and userCn map to the classes and attributes defined in the schema map for that directory.

Interactive Demonstration
Task Purpose: Configure a directory synchronization schedule. Organizations find that their various Microsoft Active Directory structures change regularly. Your client has a synchronization schedule that is updated by default once a week. Your client has found this insufficient and needs to update their Microsoft Active Directory structure more often. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Control Panel\Directory Integration. Select Directory Synchronization. In the right pane, click Configure. The right pane provides the option to set synchronization to occur Once a day, Once a week, or Once a month. The default schedule of Once a week is not sufficient because changes are made daily to the Microsoft Active Directory structure at your clients organization. 4 5 6 7 Select Once a day. Click Save. Synchronization is now scheduled for Once a day. In the left pane, expand Engines\All Engines. Select SystemEngine. The job has a status of Waiting. When the task is complete, it will show OK. The command cmdirengjob will immediately execute a synchronization job.

Notes

5-8

Partner Certification Student Workbook

Set Security Parameters Task Summary

Task Summary
You have configured Microsoft Active Directory synchronization and employed scheduling to improve the efficiency of directory updates. Your client can achieve faster, more efficient updating. In the next task, you will further enhance the security of your clients network by applying strict controls to the level of access users have to Unicenter DSM.

Notes

5-9

Set Security Parameters


Task 3: Add Security Profiles and Class Permissions
Slide 5-8

Task 3: Add Security Profiles and Class Permissions


Unicenter security features provide a robust and generic security option for Unicenter DSM. A security profile is an operating system user account or group. A local profile is located in the domain manager and a domain profile is located in its network domain. You create security profiles to determine which groups and users can access Unicenter DSM. You can also create security profiles for users in trusted domains. If new users are added to a managed group, they automatically inherit the access rights given to the group and can log in to the system instantly. A user can belong to more than one security profile. Rights are cumulative, with the exception of No Access, which overrides all other rights. You can also establish class permissions, in addition to group and object permissions, and restrict the access of users or user groups to selected folders or objects. The operating system acts as a security provider. Unicenter DSM uses security providers for Windows NT, UNIX, Linux, LDAP, and LDAPS. Functional security in Unicenter DSM is achieved using object classes. Unicenter DSM categorizes all objects in the system into object classes so you can specify the access rights for each one.

Notes

5-10

Partner Certification Student Workbook

Set Security Parameters Predefined Access Types

Slide 5-9

Functional security can be defined on three levels:

Class-level permissions: This is the default level of permissions. Class permissions are the access rights you specify on the Unicenter DSM object classes. Class permissions are applicable globally to all objects in an object class. Object-level permissions: Only security for computer groups is defined at this level, but each member of the group is affected. You can specify object permissions for each object in the Unicenter DSM system, for example, a computer, a user, or a job. By default, an object inherits the class permissions from its object class. Object-level permissions override classlevel permissions. Group-level permissions: Group permissions can be specified for any usercreated folders in the Unicenter DSM system. Group-level permissions override class- or object-level permissions.

Each secured object is associated with a security profile through an Access Control Entry (ACE). The ACE can be derived from the class-level, the objectlevel, or the group-level. All ACEs associated with an object form the access control list (ACL) for that object.
Slide 5-10

Predefined Access Types


Access types denote the rights to access an object or folder. The access type takes one of the following values: Value View Read Manage Change Permissions Permissions to view (V) Permissions to view and read (VR) Permissions to view, read, and execute (VRX) Permissions to view, read, execute, and delete (VRWXD)

Notes

5-11

Set Security Parameters


Interactive Demonstration Value Full Control Permissions Permissions to view, read, execute, delete, change permissions, and take ownership (CVRWXDPO) Any other combination of rights No access to the objects in the object class Note Do not assign this value to the group Owner or Creator. It could completely block access to Unicenter DSM.

Special Access No Access

Interactive Demonstration
Task Purpose: Add a security profile for a user and then apply class permissions to that profile.

Modify Microsoft Active Directory


1 2 3 4 5 Click Start and then choose Settings Double-click Administrative Tools. Double-click Active Directory Users and Computers. The Active Directory Users and Computers dialog appears. In the left pane, expand domain. Right-click GIS and choose New Type your name in the New Object User dialog, and use yourfirstnameinitial plus yourfulllastname for the User logon name. Click Next. In the Password field, type password and confirm it. Clear User must change password at next logon. Click Next and click Finish. User. Control Panel.

6 7 8 9

Notes

5-12

Partner Certification Student Workbook

Set Security Parameters Interactive Demonstration

10 In the left pane, select GIS. 11 In the right pane, right-click yourusername. Choose Properties. 12 Select the Organization tab. Complete the Title, Department, and Company fields using your relevant information. 13 To choose a manager, click Change. 14 Type John in the Enter the object name to select (examples) field. 15 Click Check Names. Choose either of the names that appear and click OK. 16 Click OK. 17 Drag your DSM servercomputer from the Computers Organizational Unit (OU) to the GIS OU. 18 Close the Active Directory Users and Computers and Administrative Tools dialogs. 19 To re-synchronize the Active Directory objects with the Unicenter DSM objects, run cmdirengjob at the command prompt.

Add Security Profiles in Unicenter DSM


20 In DSM Explorer, on the menu bar, choose Security The Security Profiles dialog appears. 21 Click Add. The Add Security Profiles dialog appears. 22 Under Available Directories, expand classroomdomainname.ca.com. 23 From the GIS OU, select yourname. 24 Click Add to List in the right side of the window. Click OK. The Class Permissions dialog appears with a Security Object Classes list. 25 To select All from Category List of Object Classes to, press CTRL+A. 26 From the Class Access list, select Full Control. 27 From the Category list, select Control Panel. Security Profiles.

Notes

5-13

Set Security Parameters


Skill Practice Role-based security can be defined by using the different Security Object Class categories and limiting or permitting access to the appropriate groups in your organization. The Security Object Class categories are Computers and Users, Software, Jobs, Queries and Policies, Control Panel, and Others. 28 Select Deployment Job and change the permission to No Access. This will prevent this security profile from deploying agents. 29 Click OK and close the Security Profiles dialog. This will take a few minutes. 30 Right-click Domain and choose Disconnect. 31 Right-click Domain again and choose Connect as. Use your GIS username@classroomdomainname to log in. 32 Change the security provider to LDAP. 33 After a successful login, verify that you cannot perform a deployment. 34 Right-click DSMservername - Domain and choose Disconnect. 35 Right-click DSMservername - (not connected) and choose Connect as. 36 Log in with administratorxx credentials. 37 Change the security provider to WinNT. Even though this is a domain login, this is a pre-Microsoft Windows 2000 account. Notice that you can now employ the Deployment Manager.

Skill Practice
Task Purpose: Add Andy Deavis as a WinNT security profile with full control. 1 Use the classroom domain name folder, not the classroomdomain.ca.com folder.

Notes

5-14

Partner Certification Student Workbook

Set Security Parameters Task Summary

Task Summary
You have added a security profile, applied class permissions, and easily differentiated between or among users. These abilities help to maintain tighter security for your clients domains. In the next task, you will further increase your clients security options by changing security permissions at the object level.

Notes

5-15

Set Security Parameters


Task 4: Change Permissions at the Object Level
Slide 5-11

Task 4: Change Permissions at the Object Level


After permissions have been established and applied, they can still be changed. You can do this at the object level.

Interactive Demonstration
Task Purpose: Change permissions at the object level. You must still be connected as Administrator. 1 2 3 4 5 6 7 In the left pane, under Domain\Computers and Users, select All Computers. In the right pane, right-click mglinux.localdomain and choose Permissions. Select Deavis security profile. This will prevent you from taking any action on this computer. Change the object access value to No Access and click OK. In the dialog that appears, click Yes. Right-click DSMservername - Domain and choose Disconnect. Right-click DSMservername - (not connected) and choose Connect as. Log in with Deavis credentials. The username is Deavis, the password is password, and WinNT is the security provider. You can determine as whom you are connected by selecting Unicenter DSM Explorer in the left pane. The connected user appears in the right pane. Notice that Deavis has no access to the mglinux.localdomain computer. 8 9 Right-click DSMservername - Domain and choose Disconnect. Right-click DSMservername - (not connected) and choose Connect as. Log in with administrator credentials. You can now access the mglinux.localdomain computer.

Notes

5-16

Partner Certification Student Workbook

Set Security Parameters Skill Practice

Skill Practice
Task Purpose: Add permissions to individual objects. Geraldine Jane is responsible for providing technical support for the CEO. She is the only member of the GIS staff who must have access to the CEO laptop TECRA01. Therefore, you must tighten security on TECRA01 so only Geraldine has rights to fully manage this laptop. 1 2 3 4 Add Geraldine to Security Profiles. Give her Full Control to all object classes. Restrict rights to READ for the GIS group on TECRA01. Give Full rights to Geraldine. To test the security, use Jane as the login for Geraldine and password as the password.

Task Summary
You have changed object-level permissions that had been established and applied. Permissions are a vital part of security control for Unicenter DSM. Being able to alter or correct them at the object level enhances overall security for your client.

Notes

5-17

Set Security Parameters


Assessment

Assessment
1 What are two advantages of directory integration? (Choose two.) a b c d e Boot from Microsoft Active Directory Create reports based on directory hierarchy Target the deployment of the Unicenter DSM agent Deliver a Unicenter DSM agent to a directory server Update Microsoft Active Directory or NDS directly from Unicenter DSM Explorer

What is the default synchronization schedule for a directory? a b c d Once a day Once a week On restart of the Unicenter DSM server On restart of the Unicenter DSM engine

Which type of permission can override all other types of security permissions? a b c d User Class Group Object

Notes

5-18

Partner Certification Student Workbook

Set Security Parameters Assessment

Which of these options is used to define role-based security? a b c d ACEs Global address books Security Role Class categories Security Object Class categories

Notes

5-19

Set Security Parameters


Module Summary
Slide 5-12

Module Summary
You should now be able to:

Integrate Microsoft Active Directory Structure Configure a Directory Synchronization Schedule Add Security Profiles and Class Permissions Change Permissions at the Object Level

Your client can now control not only when and how Unicenter DSM is used, but also who can use Unicenter DSM by integrating Microsoft Active Directory structure, configuring directory synchronization schedules, adding security profiles, and assigning security permissions. By setting specific parameters, your client can prevent unauthorized use of Unicenter DSMa significant security requirement. In the next module, you will create queries for searching the Unicenter DSM database.

Notes

5-20

Partner Certification Student Workbook

6
Create Queries

6-1

Create Queries
Module Objectives
Slide 6-1

Module Objectives
After this module, you will be able to:

Run a Pre-existing Query Create a New Query Create an Advanced Argument Query

Module Overview
One of the most beneficial aspects of Unicenter DSM is its ability to place assets in inventory. Your client requires a search of one of their databases for specific inventory data. The Unicenter DSM query function will be used to locate and run a query for the search. When Unicenter DSM is installed, the application not only contains a number of queries for inventory searches, it also provides the option to create customized queries for specific needs. In this module, you will run one of the queries provided with Unicenter DSM. You will also create a new query configured for a different search and create a more specific query that uses an argument.

Notes

6-2

Partner Certification Student Workbook

Create Queries Task 1: Run a Pre-existing Query

Slide 6-2

Task 1: Run a Pre-existing Query


Queries can be used as a basis for groups or reports. A pre-existing query is a query that is part of the Unicenter DSM package. Preexisting queries are common queries that organizations perform on a regular basis, such as inventory updates. An example is a pre-existing query for a specific occurrence of all laptops of a specific brand.

Slide 6-3

Queries can be used as a basis for groups or reports. A query task runs a query on the engine if the query is submitted to the engine. It then displays the result under the selected query in the Queries folder.

Interactive Demonstration
Task Purpose: Locate and run a pre-existing query. You must run a query for preview and then submit the query to the engine. This directs processing to the engine rather than to the screen. You will also create a folder for the new query. 1 In DSM Explorer, in the left pane, expand Domain\Queries and select Computers. Note: You can disable the default Expand All in the left pane of DSM Explorer. On the menu bar, choose Tools Explorer GUI Options and then clear Automatically Expand Items on Select. 2 3 4 In the right pane, scroll through the Computers list and right-click Assets with DVD drive installed. Choose Run Query. The Query Preview dialog appears showing the query results. Click Save.

Notes

6-3

Create Queries
Interactive Demonstration 5 6 7 8 9 In the Save Query Result dialog, type DVD Drives as of Current Date in the Result name field. Click OK. From the Computers list, select Assets with DVD drive installed. The saved result appears. To see the list of assets, select DVD Drives as of Current Date. In the left pane, right-click Queries and choose New Folder. The Create New Folder dialog appears. Type My Queries in the Name field and click OK. The empty folder appears in the left and right panes under Queries. This folder can be used to store frequently used pre-existing queries.

10 In the left pane, select Computers. 11 Right-click Assets with DVD drive installed and choose Copy. 12 In the left pane, right-click My Queries and choose Paste. Select My Queries to view its contents. My Queries contains a copy of the Assets with DVD drive installed query. Notice that the saved results data from step 5 does not copy with the query. A move of the query can be accomplished by dragging and dropping the query to the My Queries folder. 13 Scroll through the Computer Queries list and right-click Assets with CA Unicenter Desktop and Server Management installed. 14 Copy this query to the My Queries folder. 15 From the My Queries folder, right-click Copy of Assets with CA Unicenter Desktop and Server Management installed and choose Submit to Engine. The Submit Query: Name dialog appears. 16 In the Name field, type DSM Installed Results and click Next. The Submit Query: Select Engine dialog appears.

Notes

6-4

Partner Certification Student Workbook

Create Queries Interactive Demonstration

17 The default engine is First Available. Select System Engine and click Finish. 18 In the right pane, double-click Copy of Assets with Unicenter Desktop and Server Management installed. The Result set of DSM Installed window displays Pending in the Execution Date column. After a few minutes, Pending will change to a date. Now you can double-click Result set of DSM Installed in the left pane to see the systems matching this query.

Task Summary
You have located an existing Unicenter DSM query, run a query for preview, submitted the query to an engine, and saved the query in a new folder. Your client can make effective use of any of the queries supplied with Unicenter DSM. Although there are several queries available, if a query to suit your specific requirements does not exist, you must create a new one. In the next task, you will create a new query.

Notes

6-5

Create Queries
Task 2: Create a New Query
Slide 6-4

Task 2: Create a New Query


In the event that Unicenter DSM has no existing query that can extract the data required, you can create a new query. The queries included with Unicenter DSM are configured to perform specific tasks. However, for new queries, you must determine the configuration.

Interactive Demonstration
Task Purpose: Create a new query. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, right-click My Queries and choose New. The Select Target dialog appears. From the list of target objects, select Computers and then click OK. The Query Designer dialog appears. In the left pane, from the Insert Argument list, select Inventory and then select Discovered Inventory. The Add Argument dialog appears. From the Add Argument list, expand Information\Inventory\General Inventory\System. Select Model. To close the dialog, from the Value list, select VMware Virtual Platform and click OK. In Query Designer, click Preview. The Query Preview dialog appears listing the results of the query. Click Close. In Query Designer, click View SQL. The SQL View dialog appears. This displays the SQL query used to extract information from the MDB. Scroll through the query to see the entire view. Click Close. In Query Designer, under Boolean Operators, select AND.

10 In Query Designer, in the left pane, select Discovered Inventory. The Add Argument dialog appears.

Notes

6-6

Partner Certification Student Workbook

Create Queries Skill Practice

11 Expand Inventory\General Inventory\Operating System and select Operating System. 12 To close the dialog, from the Value list, select Windows 2000 Server and click OK. 13 In Query Designer, click Preview. The Query Preview dialog appears with the results of the query. Click Close. In Query Designer, VMware Virtual Platform and Operating System are listed. 14 Click OK. The Save Query dialog appears. 15 Type 2000 Server-VMware as the query name and click OK. The Query Designer and the Save Query dialog close. In the left pane, 2000 Server-VMware appears in the contents of the My Queries folder. 16 Select 2000 Server-VMware and then select Quick Preview.

Skill Practice
Task Purpose: Create a new query. Your client must determine which systems do not have Microsoft Service Pack 99. Create a new query that shows all computers with the Microsoft Windows operating system that do not have Service Pack 99 installed. 1 2 3 4 Use the NOT operator. Exclude Linux systems from appearing in the query results. To indicate the Service Pack version, type 99 in the list. Type Computers that do not have SP99 installed for the query name.

You have created a new query when no pre-existing query was suitable for your task requirements. Next, you will create a query using another query.

Notes

6-7

Create Queries
Interactive Demonstration

Interactive Demonstration
Task Purpose: Create a query using a directory query. Determine how many computers in the GIS group exist in the Unicenter DSM domain. 1 2 3 4 5 6 7
Slide 6-5

In the left pane, under Queries, right-click My Queries and choose New. The Select Target dialog appears. In the target list, select Computers and then click OK. The Query Designer dialog appears. Under Insert Argument, select Directory Query. In the left pane, expand Available Directories\classroomdomainname.ca.com and select GIS. Click OK. Select Preview. Your DSM servername appears. Click Close. Click OK and type GIS Computers Group for the query name. Click OK.

You can now create a query using a directory query. The Link Query argument in the Query Designer tool enables you to use existing queries to define the arguments for a new query. You can link queries together without having to redefine the criteria in a new query. You can also link a Computer type query with a User Accounts type query. The GIS group wants to determine which user accounts are associated with all GIS computers. Next, you will create another query to determine this using an argument.

Notes

6-8

Partner Certification Student Workbook

Create Queries Interactive Demonstration

Interactive Demonstration
Task Purpose: Create a query using a Link Query argument listing all user accounts on computers in the GIS group. 1 2 3 4 5 6 7 8 In the left pane, under Queries, right-click My Queries and choose New. The Select Target dialog appears. In the target list, select User Accounts and click OK. The Query Designer dialog appears. Under Insert Argument, select Link Query. Select the GIS Computers Group query. Click OK. Select Preview. The user accounts that have logged in to the GIS group computers appear. Click Close. Click OK and type GIS Computer Users for the query name. Click OK.

Skill Practice
Task Purpose: Create a query using two linked queries. GIS wants to identify new systems in the Unicenter DSM manager that are not using dynamic IP addresses. Existing queries to use are:

Assets created in the past week Static IPno DHCP client

You have created a query using an argument. Next, you will create another query using wildcards for the search.

Notes

6-9

Create Queries
Interactive Demonstration

Interactive Demonstration
Task Purpose: Create a query using wildcards. GIS wants to determine which systems are part of the 192 IP subnet. 1 2 3 4 5 6 7 8 9 In the left pane, under Queries, right-click My Queries and choose New. The Select Target dialog appears. Select Computer Accounts. Click OK. The Query Designer dialog appears. In the left pane, under Insert Argument, expand Inventory\Discovered Inventory. The Add Argument dialog appears. In the Add Argument dialog, expand Inventory\General Inventory\Network. Select IP Address. In the Operator list, select Like. Type 192.* in the Value field. To close the dialog, click OK. In the left pane of Query Designer, select Preview. The Query Preview dialog appears.

10 Click Close and click OK. The Save Query dialog appears. 11 Type 192 Subnet for the query name. 12 Click OK.

Notes

6-10

Partner Certification Student Workbook

Create Queries Skill Practice

Skill Practice
Task Purpose: Using Link Query, create a query to list all computers with a 192 Subnet reporting to your scalability server (Unicenter DSM server). The query designer parameter for the scalability server is found in: General Information\Computer\Relationship\Server Relations\Current Server = x

Task Summary
You have configured and created a new query using the Query Designer tool. Your client can use an existing query, a directory query, a Link Argument query, and wildcards. This provides a range of flexible options that enable your client to find the data they need. In the next task, you will create an advanced argument query.

Notes

6-11

Create Queries
Task 3: Create an Advanced Argument Query
Slide 6-6

Task 3: Create an Advanced Argument Query


Creating queries is one way to find information quickly. The built-in query tool in Unicenter DSM gives you great flexibility in creating advanced user-defined queries. Many of the queries you write are based on how recently an event has occurred. Rather than completing a number of complex steps each time you write a time-based query, you can use three built-in macros in the Add Advanced Argument feature of Query Designer. Unicenter DSM uses seconds as the standard unit of time, so these macros compute the number of seconds for you to other units of time.

Slide 6-7

To create this type of query, you must be familiar with the Unicenter DSM database, tables, and field values. Value DATE SECSPERDAY Content The current date Function Determines if the agent has run today

A constant for the number of Determines if the agent has seconds in a day (86400) run in the last n days

SECSPERHOUR A constant for the number of Determines if the agent has seconds in an hour (3600) run in the last n hours

Notes

6-12

Partner Certification Student Workbook

Create Queries Interactive Demonstration

Interactive Demonstration
Task Purpose: Create an advanced argument query. Your client must know who has run an agent scan in the last 10 days. You will create a new group for configuration and scheduling. You will then create a new query. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Queries. Right-click My Queries and choose New. The Select Target dialog appears. Select Computers and click OK. The Select Target dialog closes and the Query Designer dialog appears. In the Query Designer dialog, select Advanced Argument. Type Agent has run in the last 10 days in the Pseudo text field. From the Table list, select Module Status. From the <select field> list, select stdate and click the up arrow. Type >( after stdate in the Additional WHERE clause field. From the <select macro> list, select DATE and click the up arrow.

10 Type -(10* in the Additional WHERE clause field. 11 From the <select macro> list, select SECSPERDAY and click the up arrow. 12 Type )) in the Additional WHERE clause field. 13 Click OK. 14 To verify that the query works, in the left pane, select Preview. The workstations that have run during the last 10 days will appear in the Query Preview dialog. 15 Click Close. 16 Click OK. The Save Query dialog appears.

Notes

6-13

Create Queries
Interactive Demonstration 17 Type Agents run in the last 10 days in the Name field. 18 Click OK.

Task Summary
You have created an advanced argument query that can return specific asset inventory information. This enables your client to create detailed, customized asset inventory queries for their future inventory planning. These queries return asset data that enable accurate insights into the hardware and software asset list. Your client can make use of such information in budgeting for the most cost-effective asset upgrades and acquisitions.

Notes

6-14

Partner Certification Student Workbook

Create Queries Assessment

Assessment
1 When you submit a query, which engine does the system default to? a b c d 2 Query Engine First Available System Engine Replication Engine

Which argument in the Query Designer is used when multiple queries are to be used together? a b c d Directory Inventory Link Query Advanced Argument

Notes

6-15

Create Queries
Module Summary
Slide 6-8

Module Summary
You should now be able to:

Run a Pre-existing Query Create a New Query Create an Advanced Argument Query

You have located existing Unicenter DSM queries and run them to determine asset status. Your client can also create new queries when no pre-existing query meets their specific needs. Your client can maintain correct and accurate inventory data as their asset holdings change. This enables efficient spending for upgrades and addition of assets and the elimination of redundant or unused assets. In the next module, you will simplify the control of assets and users in your clients organization by grouping them.

Notes

6-16

Partner Certification Student Workbook

7
Create Groups

7-1

Create Groups
Module Objectives
Slide 7-1

Module Objectives
After this module, you will be able to:

Create Static Groups Create Dynamic Groups Build Nested Groups

Module Overview
Your client must have more control over their asset inventory. One way to do this is to categorize computers or users into groups. These groups will better enable your client to manage the special requirements of their departments. In this module, you will work with static and dynamic groups and nest groups one inside another.

Notes

7-2

Partner Certification Student Workbook

Create Groups Static and Dynamic Groups

Slide 7-2

Static and Dynamic Groups


A group denotes a number of units defined as a collection, primarily for configuration and scheduling. Groups are subsets of All Computers and actions can be performed on groups separately. A managed asset, such as a user or computer, can belong to one or more groups. The Group Details folder of any group in Unicenter DSM Explorer defines the characteristics or collective inventory of the group members. You can group your assets in an asset group or a scalability server group. An asset group enables you to query a member of the group or specify group level permissions. Asset groups can be static or dynamic.

Notes

7-3

Create Groups
Task 1: Create Static Groups
Slide 7-3

Task 1: Create Static Groups


Assets can be added to or removed from a static group manually when the group membership details change.

Interactive Demonstration
Task Purpose: Create static groups. You must create a static group and verify that the creation was successful. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, expand Domain\Computers and Users. Select All Computers. In the right pane, from the All Computers list, select the executive computer names WinME and WXPB while pressing CTRL. Right-click these selections and choose Make Group. The New Group dialog appears. Type Executives in the Name field. Type Executive static group in the Description field. Click OK. In the left pane, select Executives. WinME and WXPB are listed as members of the Executives group. The laptop belonging to the company CEO was missed when the group was originally created. Now it must be added to the group. 9 In the right pane, from the All Computers list, drag the laptop name TECRA01 to the Executives group in the left pane.

10 Select the Executives group and verify that three computers now exist in the group.

Notes

7-4

Partner Certification Student Workbook

Create Groups Task Summary

Task Summary
You have carried out the steps for creating static groups and confirmed that the procedure was successful. Your clients static groups can be manually adjusted quickly when their membership changes. New hires can be added or employees who have left the company can be deleted. In the next task, you will create dynamic groups that change automatically when a query result changes.

Notes

7-5

Create Groups
Task 2: Create Dynamic Groups
Slide 7-4

Task 2: Create Dynamic Groups


A dynamic group is a group of Unicenter DSM computers or users whose membership is based on the results of a query. Members are dynamically added or removed based on the result.

Slide 7-5

Interactive Demonstration
Task Purpose: Create a dynamic group. 1 2 3 4 In the left pane, right-click Computers and Users and choose New Group. The New Group dialog appears. Type GIS in the Name field. Select the Query tab. From the Associated query list, select the GIS Computers Group query. Note: A query can be built from the dynamic group query dialog by choosing the ellipsis instead of an associated query. 5 From the Evaluated by list, select SystemEngine. This enables you to configure the Evaluation period value. By default, it is set for 1440 minutes or 24 hours. Change the value to 60 minutes. Click OK. In the left pane, right-click GIS and choose Evaluate now. The DSM Explorer dialog appears with the Group Evaluated message. Click OK. Your Unicenter DSM servername appears in the right pane.

6 7 8

Notes

7-6

Partner Certification Student Workbook

Create Groups Skill Practice

Skill Practice
Task Purpose: Create a dynamic group based on a query. 1 2 3 4 Assign the name NOSP99 to the new group. Use the computers that do not have the SP99 query. Change the Evaluation period value to 60 minutes. Evaluate the group.

Task Summary
In this task, you created a dynamic group that will automatically change when department membership in your clients organization changes. This is particularly useful where membership in large groups changes frequently. In the next task, you will build nested groups.

Notes

7-7

Create Groups
Task 3: Build Nested Groups
Slide 7-6

Task 3: Build Nested Groups


A nested group is a subgroup of another group. The nested group is a member of this other group. Nested groups can inherit permissions from a parent asset group. Inherited permissions are visible in the asset group list view. If False appears in this view, the inheritance option is disabled.

Slide 7-7

Interactive Demonstration
Task Purpose: Build a nested group. 1 2 In the left pane, right-click Executives and choose New Group. In the Name field, type Assistants and click OK. Assistants is now a nested group under Executives in the left pane. Each nested group has its own set of group details. In the left pane, expand Assistants\Group Details. Select Members of Groups. In the right pane, Executives appears. In the right pane, from the All Computers list, drag the Windows 2000 Professional VMware workstation to the Assistants group in the left pane.

3 4 5

Task Summary
You have created a nested group for Assistants in the larger defined group of Executives. Creating a nested group facilitates assigning permissions to a separately defined group. Using this process, your client can save the time required to establish and assign permissions to a specific group.

Notes

7-8

Partner Certification Student Workbook

Create Groups Skill Builder: Create a Dynamic Group of Dell Systems Running Linux

Skill Builder: Create a Dynamic Group of Dell Systems Running Linux


Business Problem
Your client requires all Dell computer systems in their organization to be grouped. One group must include each system that uses the Linux operating system.

Hint

Change the Operator value to Like and use a wildcard for Dell. Create the query in the My Queries folder. Use Dell-Linux for the group name.

Notes

7-9

Create Groups
Assessment

Assessment
1 What is required before a dynamic group can be created? a b c d 2 A query A static group A GroupEngine More than one computer in the domain

What is the default evaluation time period for evaluating dynamic groups? a b c d 1 hour 8 hours 24 hours 1 week

Which computers are user permissions configured for? a b c d Any computer Groups of computers Any administrator computer Any Unicenter DSM computer

Notes

7-10

Partner Certification Student Workbook

Create Groups Module Summary

Slide 7-8

Module Summary
You should now be able to:

Create Static Groups Create Dynamic Groups Build Nested Groups

The ability to easily create groups gives your client flexible control over software delivery and asset inventory. This enhanced control saves your client the time and money that would otherwise have been spent managing inventory and delivering software. Your client has established groups for each department related to the tools, hardware, and skills required to fill individual job roles. In a group, specific roles can be further grouped together. In the next module, you will install the web GUI.

Notes

7-11

Create Groups
Module Summary

Notes

7-12

Partner Certification Student Workbook

8
Create and Deliver Packages

8-1

Create and Deliver Packages


Module Objectives
Slide 8-1

Module Objectives
After this module, you will be able to:

Create a Basic Package Register an MSI Package Configure MSI Source Point Resiliency Create a Software Package with Packager Import and Export a Software Package Import a Linux Package

Module Overview
Your client has acquired new software and must deliver this software to computers throughout the entire organization. Your client can perform this delivery more quickly and efficiently by packaging this software using the Unicenter Software Delivery library. In this module, you will create packages for installation using a simple script and a Microsoft System Installer (MSI) installation file. Your instructor will demonstrate how to install and use the Packager to create SXP installation files, convert SXP files to MSI files, and import and export packages.

Notes

8-2

Partner Certification Student Workbook

Create and Deliver Packages Task 1: Create a Basic Package

Slide 8-2

Task 1: Create a Basic Package


Before software can be delivered using the Unicenter Software Delivery library, the software application installation procedures must be created using one of several methods. These include, but are not limited to:

Writing a script such as a batch or command file Writing a C+ or VBScript file Using the Unicenter DSM Software Management Packager Using an MSI installation file

After the installation script or files are created, the installation procedure must be tested before the script or files are registered in the Unicenter Software Delivery library. This will help ensure that any problems in the package can be resolved before software delivery.
Slide 8-3

A package includes the files, procedures, and instructions required to install an application to a target workstation. The package is then registered in the Unicenter Software Delivery library. Packaging a software application for delivery from the library is an integral function of Unicenter Software Delivery. The packaging process bundles software and data together for registration to the library. Optimally, these packages enable remote installation of the product.

Interactive Demonstration
Task Purpose: Create a basic package. You will create a .cmd file that places organizational HTML information on the desktop. 1 2 Start the 2000 Professional VMware session and close all other sessions. Open Notepad.

Notes

8-3

Create and Deliver Packages


Interactive Demonstration 3 In Notepad, type the following as two lines of text: @echo off xcopy RBC.* C:\Documents and Settings\All Users\desktop >>%1 4 5 6 7 8 9 Save the file as rbcinfo.cmd in the D:\ClassFiles\rbcpkg folder. In DSM Explorer, expand Domain\Software\Software Package Library. Right-click All Software and choose New Software package dialog appears. Type RBCInfo in the Name field. Type 1.0 in the Version field and then click OK. In the left pane, expand All Software\RBCInfo1.0. From Directory. Software Package. The New

10 Right-click Source and choose New Volume

11 Browse to Desktop\ClassFiles\rbcpkg. Notice that the rbcpkg folder appears in the Look In field. Click Choose. The rbcpkg folder and its files are copied to Source, which defaults to the name Setup. 12 Click OK. 13 In the left pane, right-click Procedures and choose New The Register Procedure dialog appears. 14 On the Procedure tab, type Install in the Name field. 15 In the Register Procedure dialog, select the Embedded File tab and type rbcinfo.cmd in the File field. 16 Type rbcpkg as the subpath. 17 From the Parameters list, select the greater than sign (>), select Job Related Macros, and then select $rf Job Response File. Procedure.

Notes

8-4

Partner Certification Student Workbook

Create and Deliver Packages Interactive Demonstration

18 Click OK. This is a Response File parameter and will be used by the batch file as a substitute for the %1 parameter. 19 Right-click RBCInfo 1.0 and choose Seal. The Create New Release dialog appears. 20 Click Cancel. 21 In the left pane, right-click RBCInfo 1.0 and choose Deploy. The Deploy Software Package wizard appears. 22 To proceed to the Targets selection page, click Next and expand All Computers. 23 Select 2000 Professional workstation and click Next. The Finish page appears. 24 You are prompted to Confirm your selection and schedule. In the Job Container field, type Install RBC page and click Finish. 25 In the left pane, expand Jobs\Software Jobs\All Software Jobs. 26 Select the Install RBC page container. This list contains the 2000 Professional workstation job. Monitor the job progress. 27 In the left pane, select 2000 Professional workstation. 28 In the right pane, select 2000 Professional workstation. 29 Select RBCInfo 1.0. The Job Container Target Job Properties dialog appears. On the Computer Job tab, you can view details about the job. 30 Select the Job Output tab. The display indicates 2-file(s) copied. 31 Click OK. Make sure the rbcinfo.htm page appears on the Windows 2000 Professional workstation on the desktop.

Notes

8-5

Create and Deliver Packages


Task Summary

Task Summary
You have created a basic package and delivered it to a target computer. Your client can create packages for delivery to any of their network assets worldwide. Next, the package must be registered in the Unicenter Software Delivery library so it can be delivered. In the next task, you will register an MSI package.

Notes

8-6

Partner Certification Student Workbook

Create and Deliver Packages Task 2: Register an MSI Package

Slide 8-4

Task 2: Register an MSI Package


MSI is a base service of the Microsoft Windows operating system that enables you to manage the state of software applications. The managed state of an application includes installation, modification, upgrade, and removal. MSI provides you with consistent and reliable methods to customize installations, update and upgrade applications, and resolve configuration problems. It also manages shared resources, enforces consistent file version rules, and diagnoses and repairs applications at run time.

Slide 8-5

MSI benefits include:


Version rules Management of shared resources in the system Restoration of the pre-installation state of a computer Command line interface Application standardization method Installation of software that has elevated privileges controlled by the administrator Self-healing Advertising Installation of on-demand features

Slide 8-6

MSI manages the installation of applications on 32-bit Microsoft Windows platforms. These applications are encapsulated in the MSI package, which contains all the information needed by the MSI to run the user interface and install or uninstall the application.

Notes

8-7

Create and Deliver Packages


Interactive Demonstration The MSI file contains an installation database, a summary information stream, and data streams for various parts of the installation. A transform is a collection of changes applied to an installation. A cabinet file stores compressed files in a library. The MSI file can also contain one or more transforms, internal source files, and external source files or cabinet files required by the installation process. MSI organizes installations by components and features. Components are the pieces of the application or product to be installed and are usually hidden from the user. Features are visible to the user and are determined by the functionality of the application as seen by the user.

Interactive Demonstration
Task Purpose: Register an MSI package. As the software administrator, you have been asked to verify that the Microsoft Visio Viewer application is available on all workstations. You must register this new application in Unicenter Software Delivery to make it available for delivery to new and existing workstations. 1 In the left pane, under Software Package Library, right-click All Software and choose Import MSI-package. The MSI Package Registration wizard appears. Select the default option, Register MSI package to the Software Library. Click Next. To navigate to the application source files, click ... (ellipsis). Navigate to: D:\ClassFiles\Apps\Usd\Packaged\vviewer Select the vviewer.msi file and click Open. In the wizard, click Next. On the CD-options page, click Next.

2 3 4 5 6 7

Notes

8-8

Partner Certification Student Workbook

Create and Deliver Packages Interactive Demonstration

On the Customize page, click Add. If you do not want to add any additional customized procedures, click Next. The application will be registered in the Unicenter Software Delivery library.

On the Add Procedure page, click Network Install.

10 Type Network Install-RBC: in the Procedure name field. 11 Type Custom RBC in the Procedure description field and click Next. 12 On the Feature Selection page, Microsoft Visio Viewer is already selected. Click Next. 13 On the Properties page, you must define custom properties for the procedure: a b Type ACCEPTEULA in the Property field and 1 in the Value field. Click Add to list. Type ASSOCIATE in the Property field and 1 in the Value field. Click Add to list.

Note: The value ACCEPTEULA must be defined as 1 so the user will not be prompted to accept the license agreement. If you want the selected viewer to be the default viewer for Microsoft Visio documents, the ASSOCIATE property must be defined. Without it, the program will display the first document clicked, but subsequent documents will require the full version of Microsoft Visio Viewer. 14 Click Next. 15 On the User Interface and logging options page, accept the defaults and click Finish. This concludes the procedure creation and the Customize page appears. Click Next.

Notes

8-9

Create and Deliver Packages


Interactive Demonstration 16 To register the product in the Software Delivery library, on the Finish page, click Finish. The Asset Management Software Definition page appears. When a software delivery package is created and Unicenter Asset Management is installed, the software delivery package is integrated automatically. 17 In the Create New Release dialog, click Cancel. Microsoft Visio Viewer is now a package in the software library.

Task Summary
You have defined a new application in Unicenter Software Delivery. An MSI package enables your client to make new applications available to all their employees. In the next task, you will configure MSI source point resiliency, which enables you to locate missing or damaged files at their source.

Notes

8-10

Partner Certification Student Workbook

Create and Deliver Packages Task 3: Configure MSI Source Point Resiliency

Slide 8-7

Task 3: Configure MSI Source Point Resiliency


With the MSI package properly registered and distributed to the necessary Unicenter Software Delivery servers to which the agent reports, distribution to targets can begin. These targets support features like self-healing and source point resiliency. Self-healing attempts to re-install damaged or missing files from the source used for the original installation. If a system is moved, it is automatically redirected to the appropriate MSI shares for self-healing. The path to the source files is stored in the registry during installation under:

Slide 8-8

HKEY_CLASSES_ROOT\Installer\Products\[GUID]\SourceList\ LastUsedSource In this example, GUID is a unique package ID for the particular product and package build used for installation. Many features of MSI, such as self-healing, are dependent on the installed target having the ability to reconnect to the source administrative installation using the file-sharing protocol Microsoft Server Message Block (SMB).

Interactive Demonstration
Task Purpose: Configure MSI source point resiliency. 1 Install the VViewer Administrative install procedure to the Unicenter DSM server. a b c Verify that the MSILib directory was created. It is located in: C:\Program Files\CA\Unicenter DSM\SD\ASM\MSILIB\[GUID] Install the Network Install-RBC procedure on the Windows 2000 Professional workstation. On the Windows 2000 Professional workstation, in Microsoft Windows Explorer, browse to the Z:\ClassFiles folder. Open the networksetup.vsd file. It is associated with Microsoft Visio Viewer.

Notes

8-11

Create and Deliver Packages


Interactive Demonstration 2 On the Windows 2000 Professional workstation, verify that the registry key located in HKEY_CLASSES_ROOT\Installer\Products\[GUID]\SourceList\ LastUsedSource for the MSI source point. Verify that the LastUsedSource path points to the MSILIB on the Unicenter Software Delivery server that the target agent configured for use. In Microsoft Windows Explorer, open the Z:\ClassFiles folder. Notice that the networksetup.vsd file type is Visio Viewer. To complete the installation using the MSI source point for the installation files, double-click the networksetup.vsd file. You will receive an error because the Windows 2000 Professional VMware session administrator account cannot access the sdmsilib share. Your instructor will discuss workarounds for this error.

4 5

Task Summary
MSI source point resiliency can be configured to help ensure that lost or damaged files can be restored from a source and successfully installed. This helps your client ensure that valuable data is not lost. In the next task, your instructor will demonstrate how to create a packager package.

Notes

8-12

Partner Certification Student Workbook

Create and Deliver Packages Task 4: Create a Software Package with Packager

Slide 8-9

Task 4: Create a Software Package with Packager


The Unicenter Software Management Packager, available on Microsoft Windows and Linux operating systems, packages software and data for installation on target computers.

Slide 8-10

Unicenter Software Management Packager packages software and data to make them available for installation on target computers. It records all the information required for successful installation and packages this information using a format named SXP. SXP packages can be converted to MSI packages. The Packager can create installation images from an installed application. In addition, it captures all the changes that occur after an application has been installed. This information is collected automatically in a software package, which is ready for placement in the software package library.

Demonstration
Task Purpose: Create a package using Unicenter Software Management Packager. When the Unicenter Software Management Packager is first run, Unicenter Software Delivery performs a backup, which might be a lengthy process. 1 From the Windows 2000 Professional VMware session, click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management DSM Software Management Packager. Note: If the Create Product Version dialog does not appear in the Unicenter Software Management Packager, right-click Archive and choose Create Product Version. 2 Click OK and then click Backup.

Notes

8-13

Create and Deliver Packages


Demonstration 3 4 5 6 7 8 9 In the Product name field, type Jasc_Animation_Shop and type 3040 in the Version field. Click Continue. Start Microsoft Windows Explorer and navigate to: Z:\ClassFiles\Apps\Usd\Source\Animation Shop Double-click the ans304ev.exe file. Click Next twice. Accept the terms of the license agreement and click Next. Click Next twice.

10 Click Install. 11 Clear all selections and click Next. 12 Click Finish. 13 Run and then exit the newly installed software. Skip the product registration. 14 In the Software Management Packager Installation dialog, click Continue twice. 15 Click Finish. Note: If the Reset of Reference dialog appears, click Reboot.

To be distributed through Unicenter Software Delivery, a software program or document must be defined to the enterprise or domain manager library using a process called registration.
Slide 8-11

During the registration process, information about the program or document name, version, source, and installation procedures are defined to the database. After a program or document has been registered, it is ready for distribution or delivery.

Notes

8-14

Partner Certification Student Workbook

Create and Deliver Packages Demonstration

In the next demonstration, your instructor will demonstrate how to register a Unicenter Software Management Packager package.

Demonstration
Task Purpose: Register packages to the Unicenter Software Delivery library. 1 Click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management Software Delivery Software Management Packager. Click OK. Expand Jasc_Animation_Shop. Right-click 3040 and choose Register Product. From the Manager list, select Search. From the Select a Server list, select DSM servername and click OK. Type Administrator in the User field. In the Security Provider, Authority/Domain field, click the down arrow and select Winnt://DSM servername. In the Password field, type the passwordforthe administratorofyourDSMserver and click Register.

2 3 4 5 6 7 8 9

10 Click OK. You can change the format of a created and registered package to MSI using the Unicenter Software Management Packager. This format increases the ease and speed of movement of packages from one computer to another. Next, your instructor will demonstrate how to convert a Unicenter Software Management Packager package to MSI.

Notes

8-15

Create and Deliver Packages


Demonstration

Demonstration
Task Purpose: Create an MSI package using the Unicenter Software Management Packager. 1 2 3 4 5 6 7 8 9 Right-click Archive and choose Create Product Version. Type WinZip in the Product name field and type 8100 in the Version field. Click Continue. Navigate to Z:\ClassFiles\Apps\Usd\Source\WinZip 8.1 in Microsoft Windows Explorer. Double-click the WinZip81.exe file. Click Setup. Click OK twice. Click Next. Click Yes and then click Next. Select the WinZip classic version and click Next.

10 Select the Express setup and click Next. 11 Click Finish. 12 Close the WinZip application. 13 In the Software Management Packager installation dialog, click Continue twice. 14 Click Convert and then click OK. 15 Register this package to the Software library. 16 Click Finish. Note: If the Reset of Reference dialog appears, click Reboot.

17 Save a VMware snapshot and type Packager as the name.

Notes

8-16

Partner Certification Student Workbook

Create and Deliver Packages Task Summary

Task Summary
Unicenter Software Management Packager enables your client to package the most recent software versions and software installation files for immediate delivery to their assets. When you create a package using Unicenter Software Management Packager, it is unregistered. You have seen how to register Unicenter Software Management Packager packages to the Unicenter Software Delivery library. This enables your client to store packages in one location for quick and easy access, saving time. When newer versions of software are packaged, outdated packages in the library can be replaced, keeping your clients package inventory up to date. The Unicenter Software Management Packager can also be used to convert a package to MSI format. A registered MSI package is available to all your clients employees and can be sent and received quickly, adding to business performance. In the next task, you will import and export packages.

Notes

8-17

Create and Deliver Packages


Task 5: Import and Export a Software Package
Slide 8-12

Task 5: Import and Export a Software Package


Packages created in one domain manager can be moved to or from other domain managers by exporting and importing. Multiple files can be exported simultaneously by selecting them in Unicenter DSM Explorer. Each exported software file or package retains the same structure it has in the software library.

Interactive Demonstration
Task Purpose: Import and export software packages. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library. Right-click All Software and choose Import Software package. The Register Software Package dialog appears. To open the Choose Directory dialog, click Browse. Browse to the D:\ClassFiles\Apps\Usd\Packaged folder. From the Packaged list, select Ad_aware and click Open. Click Choose. The Register Software Package dialog appears. The Path is shown as D:\ClassFiles\Apps\Usd\Packaged\Ad_aware in the Path field. Click OK. In the left pane, expand Software Package Library\All Software. You can drag items from Microsoft Windows Explorer to the software library. 9 In Microsoft Windows Explorer, browse to the D:\ClassFiles\Apps\Usd\Packaged folder.

10 Select each of the package directories using the SHIFT key. 11 Clear Cwordpad and Cnotepad using the CTRL key.

Notes

8-18

Partner Certification Student Workbook

Create and Deliver Packages Interactive Demonstration

12 Drag the selection of directories to the All Software folder in the Unicenter DSM library. 13 When the Software specified is not unique message appears, click OK. This means the package is already registered in the library. 14 Under All Software, right-click RBCInfo 1.0 and choose Export Software package. The Export Software package dialog appears. 15 Click Browse. Browse to the D:\ClassFiles\Apps\Usd\Packaged folder. 16 Click New Folder and type rbcinfo as the name. 17 Select the new folder and then click Open. 18 Click Choose. The Export Software package dialog appears. Now D:\ClassFiles\Apps\Usd\Packaged\rbcinfo is in the Path field. 19 Click OK. 20 In Microsoft Windows Explorer, navigate to the D:\ClassFiles\Apps\Usd\Packaged\rbcinfo folder. The files in this directory can now be imported. Note: If the architecture warrants more than one domain manager, an enterprise domain can be used and packages can be distributed from the enterprise to the local managers.

Task Summary
You have imported or exported a software package in more than one format. This gives your client flexibility with different formats in different geographical locations. Software packages can be imported from software vendors who use different formats than your client. Unicenter Software Delivery also supports other operating systems. In the next task, you will import a Linux package.

Notes

8-19

Create and Deliver Packages


Task 6: Import a Linux Package
Slide 8-13

Task 6: Import a Linux Package


Microsoft Windows packages are not the only types of packages that can be imported using Unicenter DSM. UNIX or Linux packages can also be imported. Three UNIX and Linux package types can be imported:

Slide 8-14

Red Hat package manager (RPM): This is a powerful package management system using the command line. It is capable of installing, uninstalling, verifying, querying, and updating computer software packages. Each software package consists of an archive of files, along with information about the package such as the version and a description. UNIX System V Release 4 PKG: This is the standard packaging format for UNIX systems. Product Interchange Format (PIF): This is the CA standard for packaging and installing software solutions on UNIX and Linux systems. Developers of a CA solution create PIF installation packages using a CA utility named the Unicenter Software Delivery Software Manager Installer for UNIX. This utility can also be identified as the PIF Installer.

Interactive Demonstration
Task Purpose: Import a Linux package. 1 2 3 4 5 6 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library. Right-click All Software and choose Import PKG, PIF, RPM-package. The Register PKG, PIF, RPM-package dialog appears. Browse to the D:\ClassFiles\Apps\Usd\Source\Flex folder. Select the rpm file. Click Open and then click OK. Notice that the flex (Linux) 2.5.4a-26 package appears in the software library. Install flex (Linux) on the Linux server.

Notes

8-20

Partner Certification Student Workbook

Create and Deliver Packages Task Summary

Task Summary
Unicenter Software Delivery enables a UNIX or Linux package to be imported like any other package. This means your client can use Unicenter Software Delivery to distribute software packages across their network regardless of the operating system that created the package. This improves efficiency and gives the organization a wider choice of software to deploy for their employees.

Notes

8-21

Create and Deliver Packages


Assessment

Assessment
1 What is the first requirement for MSI source point resiliency? a b c d Network installation to the agent Local installation to the scalability server Administrative installation to the domain manager Administrative installation to the scalability server to which the agent reports

What is the UNIX or Linux packaging format extension created by the Unicenter Software Delivery Software Manager Installer? a b c d PIF PKG RPM SXP

What does the Software specified is not unique message mean if it appears when importing software packages to the library? a b c d The package has been delivered to a target. The package is already registered in the library. The procedures to be imported exist on a different library package. The package was exported and then deleted and cannot be imported again.

Notes

8-22

Partner Certification Student Workbook

Create and Deliver Packages Assessment

Which process involves a software program or document being defined to the enterprise or domain manager library? a b c d Installation Registration Self-healing Substitution

Which MSI feature attempts to re-install damaged or missing files from the source used for the original installation? a b c d Installation Registration Self-healing Substitution

In which format does the Unicenter Software Management Packager record information initially? a b c d MSI MSN SXP HTML

Notes

8-23

Create and Deliver Packages


Module Summary
Slide 8-15

Module Summary
You should now be able to:

Create a Basic Package Register an MSI Package Configure MSI Source Point Resiliency Create a Software Package with Packager Import and Export a Software Package Import a Linux Package

The ability to package standard groups of software has enabled your client to share their standardized software packages with locations worldwide. In addition, your clients entire global network of offices can help define the programs the organization chooses to use in the future. Packages are registered in the library, which can become very disorganized. In the next module, you will organize and optimize the library for best performance.

Notes

8-24

Partner Certification Student Workbook

9
Employ the Web Console

9-1

Employ the Web Console


Module Objectives
Slide 9-1

Module Objectives
After this module, you will be able to:

Install the Web Console Search for Unicenter DSM Objects Deliver Software

Module Overview
Administrators at your clients organization who travel frequently require access to Unicenter DSM wherever they are. The Web Console is a browser-based user interface for Unicenter DSM, which can be installed on Microsoft Windows and Linux operating systems. The Web Console gives your clients administrators the ability to access Unicenter DSM through the Web and perform the most basic administrative tasks from a remote computer. In this module, you will install and employ the Web Console.

Notes

9-2

Partner Certification Student Workbook

Employ the Web Console Task 1: Install the Web Console

Slide 9-2

Task 1: Install the Web Console


Administrators use a standard web browser to access the web server. Next, they run the Web Console application. The Web Console enables you to navigate to assets using a search interface, which gives access to the complete hierarchy of the Unicenter DSM Explorer tree. Unicenter DSM software does not need to be installed on the administrator workstation.

Slide 9-3

The Web Console enables you to:


Install software Uninstall software Configure a software installation job Stop and restart a software installation job Run and preview the results of an existing query

Slide 9-4

The Web Console is platform-neutral. It runs on Microsoft Internet Explorer 6.0 or later and Mozilla 1.6 or later with a standard Internet connection. The Web Console on Microsoft Windows supports Microsoft Internet Information Server (IIS) 5.0, 5.1, 6.0, and Apache Web Server 2.0 or later. The Web Console uses Apache Tomcat. The default Apache Tomcat port numbers used are 8080 for startup and 8085 for shutdown. However, if these ports are already in use during installation, different ports will be automatically selected and used.

Notes

9-3

Employ the Web Console


Interactive Demonstration

Interactive Demonstration
Task Purpose: Install the Web Console. You will modify the Unicenter DSM installation by adding a Web Console. 1 2 3 4 5 6 7 8 9 Close Unicenter DSM Explorer. In Microsoft Windows Explorer, navigate to the D:\ClassMedia\UDSM folder. Double-click the Setup.exe file. The Unicenter Desktop and Server Management Installation wizard appears. Click Install Unicenter DSM. On the Installer page, leave Modify selected and click Next. On the Select Product Functionality page, click Next. On the Select Components page, expand Domain Manager. Select Web Console. The Web Services option is automatically selected. This is a prerequisite for the installation. Click Next. The Installer Status indicates the current status of the installation.

10 In Installer Status, scroll down to Domain Manager Web Console and Web Services. 11 Verify that their status is INSTALL and click Next. Installation will take a few minutes. 12 Click Next. 13 Click Finish. 14 Close the Web Console.

Notes

9-4

Partner Certification Student Workbook

Employ the Web Console Task Summary

Task Summary
You have installed the Web Console. With this function, your clients administrators can access the database and perform administrative tasks from a remote computer. In the next task, you will run a query using the Web Console.

Notes

9-5

Employ the Web Console


Task 2: Search for Unicenter DSM Objects
Slide 9-5

Task 2: Search for Unicenter DSM Objects


The Web Console is used to access Unicenter DSM objects found in the MDB. When an object has been located, the Web Console provides tabs, portlets, page sections, and navigation links on a browser-based interface.

Interactive Demonstration
Task Purpose: Employ the Web Console. You will use the Web Console to search for a group. 1 Click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management Web Console. DSM

2 3 4 5 6 7 8 9

Log in using your domain administrator credentials. The DSM Web Console dialog appears. On the Console Overview tab, in Quick Start, select Go Directly to a Group. In the Console Groups dialog, type GIS* in the Matches field and click GO. Select the GIS group. In the right pane, a list of computers in the GIS group appears in the Overview display. Select the Queries tab. In the Matches field, type 192* and click Go. In the right pane, select Query name. To see results of the query, select the Preview tab.

10 Log out of the Web Console and close the browser.

Notes

9-6

Partner Certification Student Workbook

Employ the Web Console Task Summary

Task Summary
You have used the Web Console to access Unicenter DSM remotely as an administrator. Your clients employees can use the Web Console to work remotely when they are unable to be in the main office due to travel requirements. This enables the organization to operate continuously with no delays attributable to an administrator having no access to a database. In the next task, you will deliver software.

Notes

9-7

Employ the Web Console


Task 3: Deliver Software
Slide 9-6

Task 3: Deliver Software


The Web Console offers Express Action functionality, which enables administrators to carry out complex tasks in a simple manner. The Express Action interface is similar to a wizard but is not a fixed series of steps. The user is guided through a series of decision points and selections that can vary depending on any previous selections. A Tracker on the left side of the Express Action page displays the options that have been selected.

Slide 9-7

Interactive Demonstration
Task Purpose: Deliver software using the Web Console. 1 2 3 4 5 6 7 8 9 In the Unicenter DSM Web Console, select the Express Action tab. Under What would you like to do, select Install Software. Under What Software would you like to install, select Show me a complete list of software. Under Select one or more software packages, select Ad_aware (SXP) 1.0/00. Click Next. Under Where would you like to install the software, select Let me search for it. Under Search for computer(s), type us* in the Name field. Click Search. From the list of computers returned from the search, select the 2000 Professional VMware computer. This is the computer to which the software will be delivered.

10 Click Next. You will choose to schedule the delivery date and time and the installation date and time.

Notes

9-8

Partner Certification Student Workbook

Employ the Web Console Interactive Demonstration

11 Under When do you want installation to start, select Later. 12 To schedule the date and time for the installation, select Later again. 13 Under Please enter a Date & Time for the Delivery to Start, select the calendar and select the date after this class. 14 Click OK. The calendar closes. 15 Click Next. 16 Under When do you want the installation to start, select Install at a later date. 17 Under Please enter a Date & Time for the Installation to Start, open the calendar and select a date. 18 Click OK. The calendar closes. 19 Click Next. 20 Under Would you like to configure any advanced options, select Yes. 21 Under Please amend the default job options, select Prompt Users (Windows only). 22 Select Execute Job if prompt times out. 23 Click Next. 24 Under Your installation is ready to proceed, type Install from WAC in the Job container name field. 25 Click Finish.

Notes

9-9

Employ the Web Console


Interactive Demonstration 26 Under Congratulations, to check the progress of the job container, select Install from WAC. The Console tab appears. 27 In the right pane of the Console tab, the Job View tab displays the properties of the installation job. This job can also be viewed in the Unicenter DSM Explorer.

Task Summary
You have delivered software remotely using the Web Console. Your client can enable their administrators to employ a browser for immediate remote access to Unicenter Software Delivery data when they are away from their desks. By monitoring software jobs and deliveries while away from the IT department, administrators help to ensure that installation time is not lost because of travel needs. Administrators are more productive and your client saves money.

Notes

9-10

Partner Certification Student Workbook

Employ the Web Console Assessment

Assessment
1 If ports 8080 and 8085 are already in use, which ports will Apache Tomcat use? a b c d 2 It will use ports 8090 and 8095. It will use ports 8081 and 8086. It will automatically select random ports. It will not be able to install if these ports are unavailable.

Where does the Web Console access Unicenter DSM objects? a b c d MDB UDSM folder Domain manager Scalability server

In addition to the Web Console, which tool enables viewing of a software delivery job? a b c d Domain manager Remote Control Viewer Unicenter DSM Explorer Unicenter DSM Reporter

Notes

9-11

Employ the Web Console


Module Summary
Slide 9-8

Module Summary
You should now be able to:

Install the Web Console Search for Unicenter DSM Objects Deliver Software

Your client has many employees who travel for business. Through the Web Console, these employees can access Unicenter DSM remotely to perform administrative tasks and retrieve database information. This helps ensure that business can be done from any location. In the next module, you will deliver packages.

Notes

9-12

Partner Certification Student Workbook

10
Organize the Library to Optimize Delivery

10-1

Organize the Library to Optimize Delivery


Module Objectives
Slide 10-1

Module Objectives
After this module, you will be able to:

Manage a Scalability Server Software Library Create Software Groups Create Procedure Groups Create a Software Policy Archive Packages Apply RAC Policy

Module Overview
Because your client frequently uses Unicenter Software Delivery, a number of software packages accumulate in the Unicenter Software Delivery library. To better manage and optimize the delivery of these packages, your client can create software and procedure groups. Your client can then distribute software packages to the scalability servers closest to the widespread organizational targets. In this module, you will enable easier access to software and efficient delivery of libraries or groups of software by managing the Unicenter Software Delivery library. You will assign software packages to the appropriate scalability server, create groups for software and procedures, create software policies, and archive packages. You will also reinstall packages in accordance with a crash policy.

Notes

10-2

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Task 1: Manage a Scalability Server Software Library

Slide 10-2

Task 1: Manage a Scalability Server Software Library


Rather than having all the managed agents communicating with a single domain manager, the load can be shared across multiple scalability servers. Software packages can be staged on a scalability server before being downloaded to agents.

Slide 10-3

Software packages are created at the domain manager. They are delivered to a scalability server so they can be distributed to targets that are remote from the domain but close to the scalability server. Staging deployment packages to a server reduces network usage when large numbers of agents are being deployed.

Interactive Demonstration
Task Purpose: Manage a scalability server software library. You will stage a software package from the software package library to a scalability server. 1 2 3 4 End the 2000 Professional VMware session and start a session in 2000 Server VMware. In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software. Under the All Software folder, scroll through the list and right-click RBCInfo 1.0. Choose Stage. The Stage Software Package Wizard appears. The Stage Software Package Wizard is used to create a software job that stages software packages on scalability servers attached to the domain. 5 Click Next. The Scalability Servers selection page appears and prompts you to select the scalability server on which this job will be performed.

Notes

10-3

Organize the Library to Optimize Delivery


Interactive Demonstration 6 7 In the Scalability Servers field, expand All Scalability Servers and select the server name 2000 Server. Click Next. The Finish page appears. Note: The Finish page enables the selected package and server to be confirmed. The job scheduling can be set to the minute for a specific date. You can click Back to make any changes. 8 9 Type Stage RBCInfo to Chicago in the Job Container field. Select Open the advanced job settings dialog when Finish is pressed.

10 To begin the job, click Finish. A Setup Delivery Job dialog appears displaying the Job Container name created by the system. By default, Seal and evaluate Job Container and Activate Job Container are checked. 11 Select the Deliveries tab. Note: Add to library: RBCInfo 1.0 appears in the Job Order box as the software package selected for staging. The precise delivery time for this job is shown on the Job tab. 12 Select the Job Options tab. 13 Change the Job Timeout to 1 day. Note: This means the job will automatically fail if it cannot be delivered to Chicago in 1 day. 14 To close the dialog, click OK. 15 In DSM Explorer, in the left pane, expand Jobs\Software Jobs and select All Software Jobs. 16 In the right pane, double-click Stage RBCInfo to Chicago.

Notes

10-4

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Interactive Demonstration

17 Double-click 2000 Server. 18 Right-click RBCInfo 1.0 and choose Properties. 19 To display the trace of the Data Transport Service (DTS), select the Delivery Trace tab. Click OK. Note: Agent deployment packages can be staged to scalability servers with the deployment manager.

Notes

10-5

Organize the Library to Optimize Delivery


Skill Builder: Manage a Scalability Server Software Library

Skill Builder: Manage a Scalability Server Software Library


Business Problem
Your client has added additional software packages that have not been delivered to the Chicago targets. The targets have scalability servers that are remote from the domain. To optimize the delivery time, these packages must be sent to the server closest to the workstations in Chicago.

Hint
The software to stage is Ad_Aware.

Notes

10-6

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Task Summary

Task Summary
You have staged a software package from the software package library to a scalability server. Now, your clients network traffic can be managed more efficiently. You can verify a trace conducted on a delivery to help ensure the job has been performed properly. In the next task, you will facilitate your clients management of accumulating software packages by organizing these packages into groups.

Notes

10-7

Organize the Library to Optimize Delivery


Task 2: Create Software Groups
Slide 10-4

Task 2: Create Software Groups


Software groups are used to bundle software packages in the software library. Each software group can contain individual software packages, installation procedure groups, or other software groupseach of which can be part of one or more software groups. For example, a software package named Word Processing can be part of the Office Software group and the Popular Software group.

Slide 10-5

The software library initially contains three predefined software groups: All Software, Unicenter DSM Software Packages, and Catalog. The All Software group contains all registered software packages. The Unicenter DSM Software Packages group contains all auto-registered Unicenter Software Delivery packages. The Catalog folder is initially empty; however, catalog groups can be added later. A software group provides a quick and easy way of installing a number of individual software packages by dragging the group to a target. A software group can also be used to organize packages logically. For example, the Office Software group might contain a word processing package, a drawing package, and a spreadsheet package. These packages can be installed together as part of the Office Software installation.

Interactive Demonstration
Task Purpose: Create software groups. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Software. Right-click Software Package Library and choose New Group. Software

Type Utilities in the Name field. The Comment field is optional.

Notes

10-8

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Interactive Demonstration

4 5

Click OK. To add packages to the new software group: a b c In the left pane, expand Software Package Library. Select All Software. From the right pane, drag AboutTime, Iview, and QWS3270 to the Utilities group in the left pane.

Task Summary
You have created a software group and quickly added software packages to it by dragging them to the group. Your client can now create, move, and remove groups when necessary with minimal effort. In the next task, you will further optimize software delivery by creating procedure groups.

Notes

10-9

Organize the Library to Optimize Delivery


Task 3: Create Procedure Groups
Slide 10-6

Task 3: Create Procedure Groups


Like software groups, procedure groups provide useful bundles for software distribution. However, unlike software groups, procedure groups contain procedures rather than software packages. If a software group is distributed to a number of computers, the default procedures are used. With procedure groups, any procedure contained in the software package can be used.

Slide 10-7

Procedure groups contain links to individual software packages and are used when defining installation jobs. They can be created after all packages have been defined. They also contain the procedures used for installing software packages. Procedures in a procedure group can be ordered so the jobs are run in a particular order.

Interactive Demonstration
Task Purpose: Create a procedure group. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Software. Right-click Software Package Library and choose New Group. The New Procedure Group dialog appears. Click OK. In the left pane, expand Software Package Library\All Software\R_Control. Select Procedures. Under Procedures, drag the Install Package procedure to the Generic Tasks procedure group. In the left pane, expand Screen_Settings. Select Procedures. Procedure

Type Generic Tasks in the Name field. The Comment field is optional.

Notes

10-10

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Interactive Demonstration

10 Drag the Install Package procedure to the Generic Tasks procedure group. 11 In the left pane, expand Internet_Settings. 12 Select Procedures. 13 Drag the Install Package procedure to the Generic Tasks procedure group. 14 Select Generic Tasks and view its contents in the right pane. 15 In the right pane, right-click the second procedure listed. 16 Choose Re-position Move First.

Task Summary
Procedure groups specifically detail how your clients software packages will be installed and provide greater control over the installation process. Using procedure groups, your clients employees can install software packages for specific needs more productively and efficiently. In the next task, you will create a software policy.

Notes

10-11

Organize the Library to Optimize Delivery


Task 4: Create a Software Policy
Slide 10-8

Task 4: Create a Software Policy


The Create Software Policy Wizard assists you in selecting the packages and procedures to use, selecting the target group to which you link the software policy, and selecting the domains to include in the software policy distribution.

Slide 10-9

A software policy group defines and controls which software packages computers will receive. This enables you to determine how jobs are run on computers that meet group membership conditions. Jobs can be set up and run automatically for computers that meet these conditions. They can also be set up and activated for members that do not conform to the policy.

Interactive Demonstration
Task Purpose: Create and define a software policy group. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Policies. Right-click Software Based and choose New Software Policy. The Create Software Policy Wizard appears. Click Next. The Packages and Procedures selection page appears. In the Software Packages and Procedures field, expand All Software\Microsoft Visio Viewer. Select Network Install-RBC and click Next. The Group selection page appears. Select Executives Group and click Next. The Finish page appears. Type Executives always get Visio Viewer in the SW Policy Name field. Select Open advanced Software Policy settings dialog when the Finish button is pressed. Click Finish. The New Software Policy dialog appears.

Notes

10-12

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Interactive Demonstration

10 Select the Automation tab. 11 In the Degree of automation area, select Set up jobs for members not conforming to the policy. Note: This will create a job container that must be activated.

12 Select the Evaluation tab. 13 Select Enable ad-hoc target evaluation for this group. Note: When new computers are introduced or existing computers are reengaged, it is important for them to reach the appropriate state quickly. Jobs are set up for targets according to their software policy. The evaluation mechanism runs on a scheduled basis and also at target registration time, named ad-hoc. Newly registered targets are evaluated when they are registered without having to consider all other registered targets in the database. Using this approach, the scheduled evaluation frequency can be reduced to avoid heavy evaluation operations during business hours. 14 Click OK. 15 In the left pane, expand Policies\Software Based\Executives always get Visio Viewer. 16 Select Violators. The Violators list might take a few minutes to appear. It lists the workstations that exist in the Executives group that do not already have Visio Viewer. Note: WinME is not listed. It does not have a Unicenter Software Delivery agent and does not show any Installed applications. 17 In the left pane, under Domain, select Jobs.

Notes

10-13

Organize the Library to Optimize Delivery


Interactive Demonstration 18 Select Software Jobs\All Software Jobs. Notice the Executives with jobs waiting to be activated job. This is for violators, which are new members of the Executives group who have not yet received the software. The job searches for this target and then delivers the software automatically. 19 Right-click Job Container and choose Activate jobs.

Task Summary
You have created and defined a software policy group. Your clients software packages can now be successfully delivered. Now that packages have been delivered to your clients assets and do not have to be used again for some time, your client can archive them to save library space and provide quick access when they are needed. In the next task, you will archive packages.

Notes

10-14

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Task 5: Archive Packages

Slide 10-10

Task 5: Archive Packages


Packages no longer being delivered to agents can be archived and stored in another location to save library space. Archiving retains the history of package installations. Deleting a package removes the history of all installations and causes any packages that have dependencies on the deleted package not to work. When archived, packages can later be restored if required.

Slide 10-11

Interactive Demonstration
Task Purpose: Archive packages. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software. Right-click QWS3270 and choose Archiving dialog appears. Select Apps. The Directory field contains the D:\ClassFiles\Apps path. Click New Folder and type arc_QWS3270 as the folder name. Select the folder. At the bottom of the Choose Directory dialog, click Choose. The Archive dialog shows the D:\ClassFiles\Apps\arc_QWS3270 path. Click OK. On your desktop, double-click the ClassFiles folder. Expand Apps\arc_QWS3270. Archive. The Archive

Click Browse. The Choose Directory dialog appears.

10 Close the Archive dialog.

Notes

10-15

Organize the Library to Optimize Delivery


Interactive Demonstration 11 In DSM Explorer, in the left pane, expand Software\All Software and select QWS3270. In the right pane, in the Details area, its Type value is MSI (Archived). 12 In the left pane, right-click QWS3270 and choose Archiving Restore. 13 Verify the QWS3270 package has been restored to the software library.

Task Summary
You have selected a software package from the software package library and archived it in a new folder. Archiving keeps packages not currently needed by your client in one location, makes locating these packages easy and quick, and saves time and effort. In the next task, you will create a policy to reinstall packages in the event of a crash.

Notes

10-16

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Task 6: Apply RAC Policy

Slide 10-12

Task 6: Apply RAC Policy


The Reinstall After Crash (RAC) task is applied only from domain managers. The Common setting is the most commonly used setting for all computers that connect to a domain manager. Common implies that the global setting will apply.

Slide 10-13

The global setting, by default, is Deferred, which means jobs will be created to reinstall packages but will not automatically start. Each computer can have its own RAC policy, which then overrides the Common setting. In addition to Common, there are three other optional parameters that specify the RAC policy of the system: Optional Parameter Disabled Description No job container is set up for the computer. However, the installation records in the installations folder on the Unicenter Software Delivery server will be marked as removed when the Unicenter Software Delivery agent for the computer reports a new operating system installation. A RAC job container is created, which must be activated manually. It can be reviewed and modified. A RAC job container is created and activated, which initiates the delivery of job orders to the computer.

Deferred

Automatic

Notes

10-17

Organize the Library to Optimize Delivery


Interactive Demonstration

Interactive Demonstration
Task Purpose: Apply the RAC policy. 1 2 3 4 5 6 To verify that the RAC policy is set to Common for the agent, right-click 2000 Professional VMware session and choose Properties. On the Software Delivery tab, confirm the RAC policy value is Common and click OK. Set the Install procedure for RBCInfo 1.0 to Exclude from RAC. Right-click Install Procedure and choose Properties. Select Exclude from RAC and click OK. Revert the 2000 Professional VMware session to Pre-Install. Note: This will simulate a computer that has crashed or has been reimaged after being part of the Unicenter DSM infrastructure. Do not delete the workstation from the Unicenter DSM Explorer. 7 Using the MSI command line method, install the Unicenter Software Delivery plug-in to the Windows 2000 Professional VMware session. At the command prompt, type the following path and press ENTER: Msiexec /i z:\classmedia\UDSM\WindowsProductFiles_x86\AllAgents\AgtSD.ms i l*v C:\dsmsetupagt.log ADDLOCAL=ALL AGENT_SERVER=dsmservername /qn Note: Do not use /qn to install interactively. The MSI property ADDLOCAL=ALL is used for a default installation.

Notes

10-18

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Interactive Demonstration

In the left pane, select All Computers. The AM Status of the Windows 2000 Professional VMware session is Not Installed, but the SD Status is Locked by RAC. Note: If SD Status is still Not Installed, wait a few minutes.

Expand Jobs\Software Jobs and select All Software Jobs. A RAC job will be ready for evaluation. RAC jobs will be set up for the Windows 2000 Professional VMware session to restore previously installed packages. There will not be a job to restore RBCInfo because it was excluded from the RAC policy.

10 Right-click the RAC job and choose Seal and Evaluate jobs.

11 Right-click the RAC job and choose Activate jobs. When the job is complete, the Windows 2000 Professional VMware session SD Status changes from Locked by RAC to Operational.

Task Summary
The RAC policy is an effective Unicenter Software Delivery emergency option that helps ensure the integrity of your clients computer systems. The IT team can configure the policy so software packages can be installed again if a crash occurs on a computer in your clients domain. The RAC policy enables the computer to return to a fully functional state as quickly as possible and helps ensure there is no downtime.

Notes

10-19

Organize the Library to Optimize Delivery


Assessment

Assessment
1 Why are software packages created at the domain manager and then staged to the scalability server? a b c d They can be archived more easily. Agents do not have to report to the domain manger. They can be distributed to targets from the closest scalability servers. Software delivery job status does not have to be returned to the domain manager.

What occurs if a software group is distributed to a number of computers? a b c d Default procedures will be used. Jobs will be created to reinstall packages. Packages will remove the history of all installations. Procedure groups will be reordered and run in that order.

Which DSM component is used to automatically set up jobs for groups of computers? a b c d Static group Query group Dynamic group Software policy

Notes

10-20

Partner Certification Student Workbook

Organize the Library to Optimize Delivery Assessment

Why is deleting a package not recommended? a b c d It will uninstall the package from the agents. It will remove the history of all failed installations. It will remove any workstations that only have archived software packages installed. It will remove the history of all installations and cause any packages that have dependencies on the deleted package not to work.

What does the RAC parameter Deferred mean? a b c d The newly installed agent will be set to Deferred and then be disabled after seven days. The jobs will be set to reinstall but will be deferred for one week before an automatic start. The newly installed agent status will be deferred until acknowledged by the DSM administrator. The jobs will be created to reinstall packages but will not automatically start until activated by the DSM administrator.

Notes

10-21

Organize the Library to Optimize Delivery


Module Summary
Slide 10-14

Module Summary
You should now be able to:

Manage a Scalability Server Software Library Create Software Groups Create Procedure Groups Create a Software Policy Archive Packages Apply RAC Policy

At your clients organization, creating software and procedure groups has resulted in better management of packages in the growing software library. Packages no longer in use can be conveniently archived. In addition, distributing packages to scalability servers has enabled more reliable delivery of packages to targets. These targets are remote to the domain but close to the scalability servers. Therefore, your client can more effectively manage their network use. Also, your client can rapidly recover from a system crash by using RAC policy to reinstall packages. In the next module, you will further enhance your clients software distribution by managing and configuring the software catalog.

Notes

10-22

Partner Certification Student Workbook

11
Manage the Catalog

11-1

Manage the Catalog


Module Objectives
Slide 11-1

Module Objectives
After this module, you will be able to:

Create a Catalog Group Configure a Library Package Procedure to Be Catalog Enabled Populate a Catalog with Library Packages Request Packages from a Catalog

Module Overview
Your client links their computers in a catalog group so the appropriate software can be identified for each user. Your clients users must have access to packages in the software library when required. With this system for remote software delivery in place, your clients help desk and network administrators do not have to respond individually to multiple requests for the most recent versions of approved programs. In this module, you will create a catalog group for your clients computers and catalog a package procedure. You will also place packages in and withdraw them from the catalog.

Notes

11-2

Partner Certification Student Workbook

Manage the Catalog Task 1: Create a Catalog Group

Slide 11-2

Task 1: Create a Catalog Group


The software catalog is an agent plug-in that enables users to manage their computer software from a library provided by your clients administrator. A simple wizard-based user interface enables users to add, customize, and remove software. In addition, it enables users to monitor software delivery progress.

Slide 11-3

Catalog groups make software available to groups of users through the catalog user interface. A catalog group must exist before software can be linked to it. After software has been moved or linked to a catalog group, an association is set up between a specific computer group and the catalog group. The catalog group is automatically created with the same name as the computer group.

Interactive Demonstration
Task Purpose: Create a group and assign it as a catalog group. 1 To create a catalog group, use the GIS query you generated in the Create Queries module. Type Open License Products as the group name. Note: 2 3 4 The group is populated with the DSM servername.

In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library. Drag the Open License Products group to the Catalog group. Expand Catalog and notice that the Open License Products group is now a member of the Catalog group.

Notes

11-3

Manage the Catalog


Task Summary

Task Summary
You have created a group and assigned it as a catalog group by dragging it to the Catalog interface. Now, software approved by management at your clients organization is accessible to appropriate groups of users through the catalog interface. In the next task, to make a procedure just as easily accessible for your clients users, you will make it catalog enabled.

Notes

11-4

Partner Certification Student Workbook

Manage the Catalog Task 2: Configure a Library Package Procedure to Be Catalog Enabled

Slide 11-4

Task 2: Configure a Library Package Procedure to Be Catalog Enabled


Procedures that are included in the software catalog must be catalog enabled to be accessible to users. Software is only visible in a workstation software catalog if the workstation is a member of the catalog group and there is a catalog enabled procedure in the catalog.

Interactive Demonstration
Task Purpose: Configure a library package procedure to be catalog enabled. 1 2 3 4 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software\Adobe Acrobat Reader\Procedures. Right-click Install Package and choose Properties. The Properties dialog appears. On the Procedure tab, select Catalog enabled. Click OK. You would follow the same procedure for the Uninstall Package procedure after right-clicking Uninstall Package.

Skill Practice
Task Purpose: Enable the installation, reinstallation, and uninstallation procedures for the Adobe E-Book reader package to be catalog enabled.

Task Summary
All that is required to configure a library package procedure to be catalog enabled is to select only one check box. Your client can now add several packages to a catalog simply by dragging them to the catalog. In the next task, you will populate a catalog with library packages.

Notes

11-5

Manage the Catalog


Task 3: Populate a Catalog with Library Packages
Slide 11-5

Task 3: Populate a Catalog with Library Packages


Library packages are added to the software catalog by moving them from a list of software to the catalog.

Interactive Demonstration
Task Purpose: Populate a catalog with library packages. 1 2 3 4 In DSM Explorer, in the left pane, select All Software. In the right pane, select Adobe Acrobat Reader. Drag Adobe Acrobat Reader to the Open License Products group in the left pane. In the right pane, drag Ad_aware to the Open License Products group in the left pane. Note: An error message appears stating that nothing in this transfer is catalog enabled. However, Ad_aware is still added to the group. Later in this module, you will verify that it will not appear in the catalog. 5 Click OK.

You have populated a catalog with library packages. Next, you will create a catalog group and publish software.

Interactive Demonstration
Task Purpose: Create a catalog group and publish software. 1 2 3 Catalog enable the procedures in About_Time. In the left pane, select All Software. In the right pane, right-click About_Time.

Notes

11-6

Partner Certification Student Workbook

Manage the Catalog Skill Practice

4 5 6 7

Choose Publish in catalog and click Next. Select GIS and click Next. To name the catalog group, type: GIS Applications Click Finish.

Skill Practice
Task Purpose: Publish the Adobe_EBook_Reader to the Open License Products catalog group.

Task Summary
You have populated software catalogs with available library packages. Your client can create new packages with new versions of software as the need arises and place these packages into the library. Employees will be able to access the packages for use on their computers. Packages must be deployed to target computers from the library. In the next task, you will use the catalog to request the deployment of a package.

Notes

11-7

Manage the Catalog


Task 4: Request Packages from a Catalog
Slide 11-6

Task 4: Request Packages from a Catalog


After the packages are added to a catalog group, they are available to target computers. All targets that have the Unicenter Software Delivery catalog installed and are members of the catalog group will have the applications populated to their systems. Users can then open the catalog and request any available software.

Interactive Demonstration
Task Purpose: Request packages from a catalog. 1 On the Unicenter DSM server, click Start and then choose Programs Computer Associates Unicenter Desktop and Server Management DSM Software Delivery Catalog. The DSM Software Delivery Catalog window appears. Note: The Unicenter DSM Software Delivery Catalog window can also be accessed from the Unicenter DSM systray. 2 3 Select Add Software. In the right pane, click Next. Notice that Adobe Acrobat Reader, E-Book Reader, and About_Time are listed. These were published in the GIS Applications group and the Open License Products group. Ad_aware is not available because it had no catalog enabled procedure. 4 5 6 7 Select Adobe Acrobat Reader. Click Next. The Select type of installation dialog appears. Select Install Package. Click Next. The Confirm order dialog appears.

Notes

11-8

Partner Certification Student Workbook

Manage the Catalog Interactive Demonstration

8 9

Click to confirm that the software you want to order is Adobe Acrobat Reader. Select Notify me before delivery starts.

10 Leave Run as soon as possible selected. Click Finish. The Order in Progress dialog appears. 11 Select Show Order Status. 12 When Unicenter Software Delivery jobcheck appears, click Run. 13 In DSM Explorer, expand Jobs\Software Jobs and select Catalog jobs. The order for Adobe Acrobat Reader appears with Catalog as a prefix. When complete, confirm that Adobe Acrobat Reader has been installed on the Unicenter DSM server. Under the Show Status list, notice the status in the Software catalog display. 14 To update the window, click Refresh.

Task Summary
You have requested packages from a catalog. Your clients employees can now give users the ability to easily request packages that have been created and placed in a catalog if they have the Unicenter Software Delivery catalog installed. Your clients employees can also obtain new software requirements without increasing the workload of the help desk.

Notes

11-9

Manage the Catalog


Skill Builder: Manage and Configure a Catalog

Skill Builder: Manage and Configure a Catalog


Business Problem
The Payroll department has asked that some authorized freeware applications be made available to their employees. They do not want to call and make a request each time an employee needs an application installed. Create a catalog group for them and add approved applications to the group.

Hint
Authorized applications include Ad_aware, Filemon, and QuickTime Player. The computers in the Payroll group are the Unicenter DSM server and the Microsoft Windows 2000 Professional VMware computer.

Notes

11-10

Partner Certification Student Workbook

Manage the Catalog Assessment

Assessment
1 From where does the software catalog get new software packages? a b c d Library Scalability server Unicenter Software Delivery manager Unicenter Software Management Packager

Notes

11-11

Manage the Catalog


Module Summary
Slide 11-7

Module Summary
You should now be able to:

Create a Catalog Group Configure a Library Package Procedure to Be Catalog Enabled Populate a Catalog with Library Packages Request Packages from a Catalog

You can now assist your client to enable their employees to access the software catalog so they can add, monitor, customize, or remove software with a simple wizard-based user interface. Administrators do not have to waste time performing these tasks and can turn their attention to other important matters. In the next module, you will configure inventory hardware.

Notes

11-12

Partner Certification Student Workbook

12
Configure Inventory Hardware

12-1

Configure Inventory Hardware


Module Objectives
Slide 12-1

Module Objectives
After this module, you will be able to:

Access Hardware Inventory Create a New Hardware Inventory Collect Task

Module Overview
Hardware inventory represents a challenge for large and constantly changing organizations. Using Unicenter Asset Management, your client can confirm the hardware and hardware attributes used in their organization. Unicenter Asset Management enables your client to manage extensive hardware inventories. In this module, you will access hardware inventory and create a new hardware inventory collect task.

Notes

12-2

Partner Certification Student Workbook

Configure Inventory Hardware Task 1: Access Hardware Inventory

Slide 12-2

Task 1: Access Hardware Inventory


The Unicenter Asset Management hardware inventory scan detects and reports detailed inventory information, such as: Serial numbers CPU information RAM Internal and peripheral disk drives Operating system versions and service packs Network settings Power settings

Slide 12-3

The configuration of inventory detection modules on agents determines the inventory data collected.

Interactive Demonstration
Task Purpose: Access hardware inventory to view hardware attributes and performance data. Managing inventory with Unicenter Asset Management involves identifying the inventory collected by the default module configuration. 1 2 3 4 5 In DSM Explorer, in the left pane, expand Domain\Computers and Users. Select All Computers. In the right pane, double-click DSM Server. In the right pane, select Inventory. Scroll down to view inventory information. In the left pane, expand DSM Server\Inventory.

Notes

12-3

Configure Inventory Hardware


Interactive Demonstration 6 7 8 9 To view the list of basic attributes and their values in the right pane, select System. Expand Additional\Systems Performance. In the left pane, select Performance Summary. The Additional Inventory attributes and values display appears in the right pane. In the left pane, select CPU percent Usage. The Core, Early, and Late usage values appear in the right pane.

10 In the left pane, under System, select Memory. The Memory Bank values of the attributes appear in the right pane. 11 Double-click DIMM1. The Change Attribute Value dialog appears. The Memory Bank attribute has a value of DIMM1. 12 To close the dialog, click Cancel.

Task Summary
You have accessed basic hardware inventory using the default configuration. Your client can now begin to manage their hardware by viewing hardware attributes and performance inventory. Using Unicenter Asset Management, your client can maintain accurate and up-to-date information about their assets. In the next task, you will create a new hardware inventory collect task with new configuration values to enable your client to collect more specific information about their assets.

Notes

12-4

Partner Certification Student Workbook

Configure Inventory Hardware Task 2: Create a New Hardware Inventory Collect Task

Slide 12-4

Task 2: Create a New Hardware Inventory Collect Task


A collect task instructs agents to collect inventory information. A collect task can be applied against an agent, a group of agents, or all agents. From the scalability server, the engine collects files created by collect tasks and merges this new data to the domain database. During installation, a collect task named Inventory Configuration is created. This Inventory Configuration gathers general and performance inventory.

Slide 12-5

Interactive Demonstration
Task Purpose: Create a new hardware inventory collect task. You will add printer inventory collection to the Unicenter Asset Management scan. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Collect Tasks. Right-click Hardware Inventory and choose New. The Schedule new Collect Task dialog appears. On the General tab, type Printer Inventory in the Name field. Select the Detection Modules tab. Select Printer Inventory WMI and click OK. In the left pane, expand All Collect Tasks. Right-click Printer Inventory and choose Scheduling. The Scheduling Options dialog appears. Select the Conditions tab. Under Periodic dependency, select Run only once a week. The Conditions tab contains the option to run a collect task only on certain days or only in certain date or time ranges.

Notes

12-5

Configure Inventory Hardware


Interactive Demonstration 10 Click OK. 11 In the left pane, drag Printer Inventory to the All Computers group. This links the task to a group. 12 Expand All Computers\Group Details\Configuration and select Collect Tasks. In the right pane, the Printer Inventory values are Hardware Inventory, Enabled, 0 percent OK, 100 percent Waiting, 0 percent Error and Linked at All Computers. 13 Double-click Printer Inventory. The individual status of all computers appears. Note: The engine must run the scalability server collect task to disseminate instructions pertaining to new collect tasks to the scalability server. The agent checks the scalability server for new jobs or collect tasks. A job check run before the engine updates the scalability server does not detect that a new collect task has been requested. 14 Right-click the Unicenter DSM systray. Choose Asset Management Agent Start Job Check. This will force a rescan of the inventory by the Unicenter Asset Management agent. 15 In the left pane, expand Control Panel\Engines\All Engines and select System Engine. Note: After a short time, the engine log indicates that the inventory and status information for DSM servername has been updated. This occurs after the Unicenter DSM server collect job has completed. 16 In the left pane, under All Computers\Group Details\Configuration, select Collect Tasks. In the right pane, values for the Printer Inventory task have changed. They now read 7 percent OK and 93 percent Waitingthe same as the other tasks in the list.

Notes

12-6

Partner Certification Student Workbook

Configure Inventory Hardware Interactive Demonstration

17 To open the Action Printer Inventory window, double-click Printer Inventory. Note: The status of DSM server is now OK. The status of the rest of the computers is Waiting. 18 In the left pane, expand All Computers\DSMservername\Inventory\Additional\Printer Inventory (WMI). 19 Select Win32_Printer. The right pane lists all the Additional Inventory Attributes and their values.

Task Summary
You have created a hardware inventory collect task. The task scheduling options can be adjusted so the collect task is run during times that will not create delays in your clients business processes. The organization can maintain an accurate inventory record by running the task regularly. This provides useful information for decision making, for example, determining if printers must be purchased for new staff hires.

Notes

12-7

Configure Inventory Hardware


Skill Builder: Create a New Hardware Inventory Collect Task to Collect User Information

Skill Builder: Create a New Hardware Inventory Collect Task to Collect User Information
Business Problem
Your client needs a list of local groups and users that are common to all their assets. They will use Unicenter Asset Management to collect this user account inventory. Create a new hardware inventory task to accomplish this.

Notes

12-8

Partner Certification Student Workbook

Configure Inventory Hardware Assessment

Assessment
1 How does asset data get to the MDB? a b c d The agent scans the network, connects to the MDB, and merges its data. The agent scans the network and connects to the engine. The engine merges the data. The agent scans the network and sends results to the scalability server. The scalability server merges the results to the database. The agent scans the network and sends results to the scalability server. The engine retrieves the results from the scalability server and merges the results to the database.

Which two detection modules are turned on by default? (Choose two.) a b c d WBEM WEEM General Inventory Performance Inventory

Notes

12-9

Configure Inventory Hardware


Module Summary
Slide 12-6

Module Summary
You should now be able to:

Access Hardware Inventory Create a New Hardware Inventory Collect Task

In this module, you have accessed basic hardware inventory and created a new, more specific hardware inventory collect task. Your client can now collect accurate information about their entire hardware inventory. This information keeps the organization up to date about which hardware assets it has and what is on those assets. In the next module, you will configure software inventory.

Notes

12-10

Partner Certification Student Workbook

13
Configure Software Inventory

13-1

Configure Software Inventory


Module Objectives
Slide 13-1

Module Objectives
After this module, you will be able to:

Configure Proxy Settings for a Software Signature Download Job Access Downloaded Software Signatures Create Software Definitions Conduct a Heuristic Scan Conduct a File Collect Task

Module Overview
At any time, your client might be asked to identify how many installations of a particular software application they have or how many occurrences of a particular file type exist. It is crucial that your client have an accurate method of obtaining their software and file inventory holdings. Unicenter Asset Management has proven scanning methods that help ensure easy, enterprisewide software identification. In this module, you will access software signatures and inventory. In addition, you will create software definitions. You will also schedule and configure a heuristic scan and a file collect task.

Notes

13-2

Partner Certification Student Workbook

Configure Software Inventory Task 1: Configure Proxy Settings for a Software Signature Download Job

Slide 13-2

Task 1: Configure Proxy Settings for a Software Signature Download Job


Software signatures are created by the CA software content team in locations worldwide. Creating and updating signatures is ongoing, 24 hours a day, 7 days a week. At publication, over 30,000 software signatures were in the content database.

Slide 13-3

The software signatures are added to the database during initial installation of the Unicenter DSM manager. Subsequent updates are downloaded from the CA content server using the Default Software Contents Download engine job. By default, this job is run daily between midnight and 6:00 a.m. However, the proxy server settings for your client must first be configured in the configuration policy to permit this to happen.

Interactive Demonstration
Task Purpose: Configure proxy settings in a default computer policy. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, expand Domain\Control Panel. Right-click Configuration and choose Explore From. A new Explorer GUI window appears with only the Configuration folder. In the left pane, expand Configuration Policy. Right-click Default Computer Policy and choose Un-Seal. Expand the Default Computer Policy\DSM\Manager folders. Select signature download. In the right pane, double-click Proxy Server. The Setting Properties dialog appears. Type usilis03.ca.com in the Value field and click OK. This is the proxy setting in a United States CA learning center.

Notes

13-3

Configure Software Inventory


Interactive Demonstration 9 In the right pane, double-click ProxyServerPort, change the Value to 80, and click OK.

10 In the left pane, right-click Default Computer Policy and choose Seal. Close the window. 11 In DSM Explorer, in the left pane, expand Control Panel\Engines\Engine Tasks\All Engine Tasks. 12 Right-click Default Software Contents download job and choose Scheduling. The Scheduling Options dialog appears. 13 Select the Conditions tab. 14 Clear Run only when within time range and click OK. The Reinitialize Job dialog appears. 15 To reinitialize the status of this job, click Yes. 16 In the left pane, select System Engine and verify that the job runs properly. This job is removed from Unicenter DSM when Unicenter Patch Management is installed.

Task Summary
You have configured proxy server settings to enable the downloading of CA software signature updates. To remain competitive, your client must update their assets as improvements are released. Your client can download software signature updates regularly from CA and verify that the correct updates are used in the organization. This helps ensure your client stays competitive and technically efficient. In the next task, you will gain access to software signatures that have already been downloaded.

Notes

13-4

Partner Certification Student Workbook

Configure Software Inventory Task 2: Access Downloaded Software Signatures

Slide 13-4

Task 2: Access Downloaded Software Signatures


Unicenter Asset Management scans a computer and discovers software based on the software signature using a signature database controlled by CA. A software signature uniquely identifies a piece of software. It includes the main executable file name of the software, but it can include other associated files. It can also include the size range, version range, and creation and modification dates of the software. When the agent runs, it scans the computer for the specifications given in the software signature and recognizes the software only if certain specifications are met. Signature scanning is the most comprehensive and accurate method of detecting software, releases, and patches.

Slide 13-5

Software signatures in Unicenter Asset Management are created as software definitions. A product can contain information about its release date, the patches it contains, the suite to which it belongs, and if it is a suite component. These are software definitions by which the product can be recognized. Discovered or installed software is listed under the software folder for a group or individual computer. Note: You cannot modify signatures provided by CA.

Interactive Demonstration
Task Purpose: Access downloaded software signatures. 1 2 In DSM Explorer, in the left pane, expand Domain\Software\ Definitions\Categories. To view the software definition name and other information, select All Definitions.

Notes

13-5

Configure Software Inventory


Interactive Demonstration 3 In the right pane, right-click Overkill and choose Properties. The Properties for Overkill dialog appears. Note: Name, Version, Query Version, and Manufacturer are visible, but they cannot be amended. The Manufacturer is shown as Overkill project. 4 5 6 7 8 9 To close the dialog, click Cancel. In the right pane, scroll to the right. The Source value is CA Provided. Double-click Overkill. Two releases of the product appear. In the left pane, select All Definitions. In the right pane, in the Filters area, type Microsoft* in the Manufacturer field. Press ENTER. All definitions in the database manufactured by Microsoft appear.

10 To clear the Manufacturer field, at the bottom of the Filters area, select Clear. 11 Click in the Type field. From the list that appears, select Patch. 12 Click OK. 13 Scroll to the end of the Filters list and select Apply. 14 In the right pane, scroll to the right. Notice the Enable for Discovery column. By default, all signatures provided by CA are enabled for discovery or scan. 15 Right-click 811493-Windows XP Home Edition and choose Disable Scan. 16 Click Yes. Enable for Discovery is now set to No. 17 At the end of the Filters list, select Clear. The list of All Definitions in the right pane returns to its original state.

Notes

13-6

Partner Certification Student Workbook

Configure Software Inventory Task Summary

Task Summary
You have accessed predefined software definitions and examined their uses. Your client can use these definitions for quick and accurate scans of organization software and files. Your client can be sure of identifying their software assets using software signatures and maintaining an up-to-date record of these assets. Using predefined software definitions to scan organization software and files can help identify outdated or redundant assets that must be removed or replaced and help in planning for future inventory expansion. In the next task, you will create software definitions.

Notes

13-7

Configure Software Inventory


Task 3: Create Software Definitions
Slide 13-6

Task 3: Create Software Definitions


If the predefined software signatures do not meet your clients requirements, new software signatures for discovering licensed software can be created.

Slide 13-7

You can create the following types of signatures: Signature Product Explanation A product is the basis for a software definition. It is a container component only, comprising releases and suites. A product by itself does not have any significance without these components. For example, Microsoft Outlook 2000 is a product. A product definition only has the version information. A release indicates a specific release of a piece of software. Release definitions can be created for products only. For example, Microsoft Outlook 2000 SP2 is a release. A patch includes the fixes for a release. A patch can be created for releases only. For example, Q303833 is a patch for the Microsoft Outlook 2000 SP2 release. A suite indicates a software suite that comprises various individual and integrated products such as Microsoft Office. A suite definition can be created for products only. A suite component is the individual product in a suite, such as Microsoft Word. This definition can be created for suites only.

Release

Patch

Suite

Suite component

Notes

13-8

Partner Certification Student Workbook

Configure Software Inventory Interactive Demonstration

Interactive Demonstration
Task Purpose: Create software definitions. You have discovered that some of the installed applications do not appear in the definitions provided by CA. You must create your own definitions so software inventory can be complete. This task demonstrates the creation of software definitions, including scheduling and verification activities. 1 2 3 4 5 6 In DSM Explorer, in the left pane, expand Domain\Software. Right-click Definitions and choose New Product. The Create new Product dialog appears. Type Image Robot in the Name field. Type v1.21 in the Version field. Click OK. The Create Release dialog appears. To create a new release, click Yes. The Create New Release dialog appears. Note: The General tab contains existing information about the product. The Recognition tab enables you to add any known information that can be used to recognize the product. 7 8 Select the Recognition tab. Type irobot.exe in the filename and Usage filename field. Click OK.

Notes

13-9

Configure Software Inventory


Skill Practice 9 In Microsoft Windows Explorer, to locate the Image Robot program file, navigate to: D:\classfiles\apps\usd\source\Image Robot

10 To install the Image Robot program file on the Unicenter DSM Server, double-click jirlalev.exe and follow the prompts. 11 In DSM Explorer, right-click DSM Server and choose Asset Jobs Activate Job Check. The Asset Job Check dialog appears. 12 Select Rescan software inventory. Note: You can also activate a job check from the Quick Start menu. The Asset Job Check dialog selections can be used to Rescan Hardware Inventory or Rescan Software Inventory. 13 When the software inventory scan is complete and the engine collect job has finished, in the Discovered Software list for DSM server, check for Release of Image Robot. 14 Click OK.

Skill Practice
Task Purpose: Create a new software definition. Your client wants to track who has installed Microsoft Pinball on their computer. 1 2 3 Create a software definition for: Microsoft Pinball Use launcher.exe as the .exe file name. To install Microsoft Pinball, go to: D:\ClassFiles\apps\uam\mspinball

Notes

13-10

Partner Certification Student Workbook

Configure Software Inventory Task Summary

Task Summary
You have just created software definitions. Your client can initiate a search for specific software that employees might be using. This can identify not only software that is approved, but also software that your client does not want used on their computers. Administrators can control the integrity of computer systems in the organization. In the next task, you will use heuristic scanning.

Notes

13-11

Configure Software Inventory


Task 4: Conduct a Heuristic Scan
Slide 13-8

Task 4: Conduct a Heuristic Scan


Unicenter Asset Management can detect software using software signature scanning. Software detection can also be determined through heuristic scanning. Heuristic scanning searches local software databases, such as Registry and MSI, on the agent computer.

Interactive Demonstration
Task Purpose: Schedule and configure a heuristic scan. This task demonstrates the configuration of a heuristic scan, including scheduling and verification activities. 1 2 3 4 5 6 In DSM Explorer, in the left pane, expand Domain\Computers and Users\All Computers\Group Details\Configuration. Select Collect Tasks. From the Tasks area in the right pane, select New. The Select new Collect Task Type dialog appears. Select Software Discovery and click OK. The Schedule new Collect Task dialog appears. On the General tab, type Heuristic Collect Task in the Name field. Select the Methods tab. From the Method list, select Heuristic Scanning. The Methods tab is used to specify the method for collecting software information. Signature Scanning is the default method. 7 To select sources the agent must scan for software information, click Configure Scanner. The Settings for Heuristic Scanning dialog appears. By default, the settings checked in the dialog are Add/Remove Programs database and Microsoft Software Installer. 8 Select Shortcuts - Desktop.

Notes

13-12

Partner Certification Student Workbook

Configure Software Inventory Interactive Demonstration

Click OK.

10 In the Schedule new Collect Task dialog, select the General tab. 11 Click Set Scheduling. The Scheduling Options dialog appears. 12 Select the Conditions tab. 13 In the Periodic dependency area, select run only once a Month. 14 In the Day of the week dependency area, check Run only on these days and then check Tuesday, Wednesday, Thursday, and Friday. 15 Select the Pre-Job tab. Check Run job only if user approves. 16 In the Prompt field, type OK to run software scan now? and check Auto-select. Note: Auto-select enables the Yes and after 60 seconds values, which can be adjusted. With these default values, Auto-select will take over after 60 seconds. 17 Select Force execution after. Change the cancellations field value to 2. 18 Click OK. 19 In the Schedule new Collect Task dialog, click OK. 20 In the left pane, expand Collect Tasks. 21 Select Heuristic Collect Task. Note: In the right pane, All Computers show Waiting as the status for this task. This task was created directly under All Computers, so it is automatically assigned to All Computers without dragging it from the main control panel.

Notes

13-13

Configure Software Inventory


Interactive Demonstration 22 Right-click DSM servername and choose Asset Jobs Activate Job Check. The Asset Job Check dialog appears. The Asset Job Check will send a message to the Asset Management agent requiring the agent to perform its currently scheduled asset jobs and modules. 23 Select Rescan Software Inventory and click OK. 24 In the left pane, under DSM servername, expand Configuration and then select Collect Tasks. The right pane contains Collect Tasks for DSM servername. The Heuristic Collect Task status is Waiting. 25 When the OK to run additional scan at this time? prompt appears, click Yes. 26 In the left pane, under DSM servername, expand Configuration. 27 Select Collect Tasks. Note: It is normal for the Heuristic Collect Task to be Waiting. When the scan is complete at the agent and the engine has collected the results, the Status will change to OK. 28 After the Status changes to OK, in the left pane, under DSM servername, expand Software and select Discovered. 29 In the Filters area, under Filter on Source, clear Custom Created and CA Provided. The list refreshes with all heuristic applications discovered with the heuristic collect task.

Task Summary
You have performed a heuristic scan. Your client can use a heuristic scan to detect which software is on their computers by searching local software databases. The scan can be scheduled to perform an inventory collect task at the most convenient time. In the next task, you will configure and schedule a file collect task to gather information on specific files.

Notes

13-14

Partner Certification Student Workbook

Configure Software Inventory Task 5: Conduct a File Collect Task

Slide 13-9

Task 5: Conduct a File Collect Task


A collect task collects inventory data about managed assets for hardware and software and displays this information in Unicenter DSM Explorer. You have already gathered a software inventory. Now you will schedule and configure a file collect task. This collect task will carry out a search for .mp3 files on the computers of your clients employees.

Interactive Demonstration
Task Purpose: Schedule and configure a file collect task. 1 In DSM Explorer, in the left pane, expand DSM servername\Software\File Explorer. Notice that no properties appear in the display. In the left pane, expand All Computers\Group Details\Configuration. Right-click Collect Tasks and choose New. The Select new Collect Task type dialog appears. Select File Scan and click OK. The Schedule new Collect Task dialog appears. On the General tab, type Scan for mp3 files in the Name field. Select the Windows Settings tab. From the Source list, select All Files [*] and click Remove. In the Add list, clear All Files [*] and type: *.mp3 Click Add. Clear the Ignore non executable files check box.

2 3 4 5 6 7 8 9

10 Select the UNIX Settings tab. 11 From the Source list, select All Files [*] and click Remove.

Notes

13-15

Configure Software Inventory


Skill Practice 12 In the Add list, clear All Files [*] and type: *.mp3 13 Click Add. 14 Clear the Ignore non executable files and Ignore user login directories check boxes and click OK. 15 After the engine completes processing, right-click DSM servername and choose Asset Jobs Activate Job Check. The Asset Job Check dialog appears. 16 Select Rescan Hardware Inventory and click OK. Note: This ignores the Weekly execution condition because you have forced a Job Check and selected Rescan Hardware Inventory. 17 When the File collect task status is OK for DSM servername, in the left pane, expand DSM servername\Software\File Explorer. A list of .mp3 files appears under the D:\Classfiles directory.

Skill Practice
Task Purpose: Create a new file collect task. Create a new file collect task for your client to locate all *.avi files on employee computers. 1 2 Type Scan for *.avi files as the task name. Verify the list of files when the task is complete.

Task Summary
You have scheduled and configured a file collect task. By searching for a specific type of file, your client can now determine the extent to which employees store unnecessary files on the network.

Notes

13-16

Partner Certification Student Workbook

Configure Software Inventory Assessment

Assessment
1 Which information must be provided to download software signatures from CA? a b c d 2 Name of the DSM server List of applications you want to download Proxy server name, port, and password if required Company Support ID provided to CA to obtain an access code

Which two software specifications can be included in a software signature to be scanned by the agent? (Choose two.) a b c d Deletion date Secondary files Main executable file Latest execution date

Which two types of software signatures can you create? (Choose two.) a b c d e MSI Release Product Heuristic Application

Notes

13-17

Configure Software Inventory


Assessment 4 Which two local databases does a heuristic scan search? (Choose two.) a b c d 5 MSI MDB Access Registry

What is the default run schedule for the Default Software Contents Download engine job? a b c d Once an hour Once every six hours Daily between midnight and noon Daily between midnight and 6:00 am

Notes

13-18

Partner Certification Student Workbook

Configure Software Inventory Module Summary

Slide 13-10

Module Summary
You should now be able to:

Configure Proxy Settings for a Software Signature Download Job Access Downloaded Software Signatures Create Software Definitions Conduct a Heuristic Scan Conduct a File Collect Task

In this module, you have accessed downloaded software signatures and software inventory. You have created software definitions and have also scheduled and configured a heuristic scan and a file collect task. Your client now has an accurate method of obtaining their software and file inventory holdings using Unicenter Asset Management scanning methods. These methods provide easy, enterprise-wide software containing identification. Your client now has a tool that helps ensure the organization can maintain control over a large and fluctuating software inventory. This enables your client to respond quickly to software questions during an audit or when allocating resources to a new project. In the next module, you will conduct a template inventory.

Notes

13-19

Configure Software Inventory


Module Summary

Notes

13-20

Partner Certification Student Workbook

14
Conduct a Template Inventory

14-1

Conduct a Template Inventory


Module Objectives
Slide 14-1

Module Objectives
After this module, you will be able to:

Create an Inventory Template Module Modify an Existing Template

Module Overview
Unicenter Asset Management can provide highly accurate and specific information about your clients hardware and software. The use of customized inventory templates enables your client to gather information not automatically collected by Unicenter Asset Manager. This information can be provided by the user of the asset. One way to do this is to have users provide their telephone numbers when prompted during a Unicenter Asset Management agent scan. After this method has been tried, it is decided that it is better to prompt users for their cellular telephone numbers. In this module, you will create an inventory template module and modify an existing template.

Notes

14-2

Partner Certification Student Workbook

Conduct a Template Inventory Task 1: Create an Inventory Template Module

Slide 14-2

Task 1: Create an Inventory Template Module


The template inventory is used to prompt users for additional information and to add additional information types to the inventory system. The agent populates the information to a management information format (MIF) file. You can manage templates through the use of configuration modules, which are similar in function to inventory and software configuration modules. The templates scheduled for a user are carried out when a specific user logs on. Templates that are scheduled for a computer are carried out when the agent scan is run.

Slide 14-3

Factors to consider before creating a template include:


Which information you will want to collect How often you will need to collect this information How this information must be organized with the Unicenter DSM database If this template will require input from the computer users If user responses will need to be in a particular format If users will be required to input an answer To which unit or group this template will apply

Notes

14-3

Conduct a Template Inventory


Interactive Demonstration

Interactive Demonstration
Task Purpose: Create a new inventory template. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Collection Modules. Right-click Inventory Template Modules and choose New. The Create new Template dialog appears. In the Name field on the General tab, type: User Telephone Information Note: 4 5 6 7 8 9 Typing information in the Description field is optional.

Click Template Editor. The Create Template dialog appears. In the Name field, type: Telephone Information From the Prompt questions list, select Once. In the Show text before prompting field, type: Please insert your telephone number Click OK. The Template Editor dialog appears. Click New group. The Create new group dialog appears.

10 In the Name field, type: Telephone Numbers 11 Click OK. 12 In the Template Editor dialog, click New attribute. The Create new attribute dialog appears. 13 In the Name field, type: Office Extension Number 14 From the Type list, select String (32).

Notes

14-4

Partner Certification Student Workbook

Conduct a Template Inventory Interactive Demonstration

15 From the Access list, select Prompt End User And Force Answer. The <User Defined> type is used to create a list of static values. 16 To close the Create new attribute dialog, click OK. 17 To close the Template Editor dialog, click OK. 18 To close the Create new Template dialog, click OK. 19 In DSM Explorer, in the left pane, expand Computer and User Groups\All Computers\DSM servername\Configuration. 20 Right-click Collect Tasks and choose New. 21 Select Template Inventory and click OK. 22 In the Name field, type: User Telephone Information 23 Click Set Scheduling. 24 Under Conditions, select once a day to schedule the task and click OK. 25 Select Template Modules. 26 Select User Telephone Information. 27 Click OK. Verify that the engine has run before running the agent job check. 28 Run the agent using the system tray. When prompted, type the telephone number provided by your instructor. 29 Click Done. The .mif file will be created in Program Files\CA\Unicenter DSM\Agent\units\00000001\uam and will be converted to an .mnv file when the information is reported to the scalability server. This is the format that the engine uses. 30 After the agent has collected the new information, look under Inventory Additional for your computer to verify that the information has appeared.

Notes

14-5

Conduct a Template Inventory


Task Summary

Task Summary
You have created an inventory template module. Your client can use the inventory template module to customize the information collected from end users. This will help ensure the inventory results are detailed and specific to your clients needs. In the next task, you will modify an existing template.

Notes

14-6

Partner Certification Student Workbook

Conduct a Template Inventory Task 2: Modify an Existing Template

Slide 14-4

Task 2: Modify an Existing Template


There is no need to create a new template if one exists that can perform the tasks required. An existing template can also be customized to suit a Unicenter Asset Management job. This customizing is done by changing the template attributes so the user is prompted for any information you want to collect.

Interactive Demonstration
Task Purpose: Modify an existing template. You will locate an existing template and add a group and attribute to it. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Collection Modules. Select Inventory Template modules. In the right pane, right-click User Telephone Information and choose Properties. The Properties for User Telephone Information dialog appears. Click Template Editor. Expand the folders and select Office Extension Number. Click New attribute. The Create new attribute dialog appears. In the Name field, type: Cell Phone In the Type list, select String (32). In the Access list, select Prompt End User. To return to DSM Explorer, click OK three times.

4 5 6 7 8 9

Notes

14-7

Conduct a Template Inventory


Interactive Demonstration 10 To set the schedule, clear run more than once a day for the User Telephone Information collect tasks. Verify that the engine runs. 11 Run the agent and complete the information. Note: Notice the Telephone number field is not shown again because the template properties were set to prompt the user only once. 12 Verify that the information appears in Additional Inventory.

Task Summary
Your client can now modify any existing template to suit job requirements. Modifying an existing template is a useful and time-saving alternative to creating a new template. Your client can collect various types of information to help determine specific information about hardware and software asset use.

Notes

14-8

Partner Certification Student Workbook

Conduct a Template Inventory Assessment

Assessment
1 After creating a template inventory collection module, what is required to present a template to an agent? a b c d Run the agent. Schedule the template collection module. Drag the collection module to the All Computers group. Create a hardware inventory template collect task and link it to the agent or group.

Notes

14-9

Conduct a Template Inventory


Module Summary
Slide 14-5

Module Summary
You should now be able to:

Create an Inventory Template Module Modify an Existing Template

You have created an inventory template module and modified an existing template. Your client can now use both methods to collect specific information from users. This enables your client to have greater control over who is using which hardware and software assets. In the next module, you will create an asset job to discover which hardware and software assets require updating.

Notes

14-10

Partner Certification Student Workbook

15
Create an Asset Job

15-1

Create an Asset Job


Module Objectives
Slide 15-1

Module Objectives
After this module, you will be able to:

Discover Properties of an Existing Job Create a New Asset Job

Module Overview
Performing and creating asset jobs are important procedures that help your client to maintain hardware and software assets and accurate inventory records. Your client might need to run maintenance jobs such as the chkdsk procedure on C: drives on their computers. Your client might also need to determine which version of Microsoft Windows Installer (.msi) is present on their system. Unicenter Asset Management enables your client to use and configure existing asset jobs or create new ones for specific needs. In this module, you will determine the properties of an existing asset job and create a new one.

Notes

15-2

Partner Certification Student Workbook

Create an Asset Job Task 1: Discover Properties of an Existing Job

Slide 15-2

Task 1: Discover Properties of an Existing Job


A job performs an action on an agent computer. Unicenter Asset Management provides various predefined jobs that perform basic and crucial tasks, such as scanning for viruses and checking a disk. You can schedule and run these jobs on any computer. You create new asset jobs in the Jobs folder. After creating a new job, you must link the job with a specific group of units.

Slide 15-3

Types of asset jobs available include: Asset Jobs Message jobs Job Functions Message jobs can display a message on the asset when the user logs in. The job status indicates when the message was displayed. Message jobs can only be used with Microsoft Windows. Command jobs enable you to run a command file on the selected asset or group. All normal native command-language commands can be used in this file. Synchronization jobs are used to synchronize two directories on the agents. Synchronization involves comparing contents of the target and source directories and making them identical. This job can only be linked to computers in the domain. External utility jobs run an external utility and can be used to run a script written for a management tool other than Unicenter Asset Management. This job can only be linked to computers in the domain.

Command jobs

Synchronization jobs

External Utility jobs

Notes

15-3

Create an Asset Job


Interactive Demonstration Asset Jobs Script jobs Job Functions Script jobs can run scripts on assets. Write a new script or open a saved script from a file. This job can only be linked to computers in the Unicenter DSM domain. Secure Configuration File jobs help ensure the specified backup file always contains accurate content. When the agent runs, it checks for modifications in the configuration file. If modifications are found, the secure file is copied to the asset and the modified file is overwritten. This job is applicable only for Microsoft Windows agents.

Secure Configuration File jobs

Interactive Demonstration
Task Purpose: Discover properties of an existing job. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Jobs\Asset Jobs. From the Asset Jobs list, select All Asset Jobs. In the right pane, right-click Check C: drive using fast scan. Choose Properties. The Properties for Check C: drive using fast scan dialog appears. Select Description and view the Description job. Select Command file and view the command file. Select Scheduling and view Current scheduling. To close the Properties for Check C: drive using fast scan dialog, click Cancel. In the left pane, in the Asset Jobs list, select Command Jobs.

Notes

15-4

Partner Certification Student Workbook

Create an Asset Job Interactive Demonstration

10 Right-click Force AM Agent to rescan software inventory. 11 Choose Properties. The Properties for Force AM Agent to rescan software inventory dialog appears. 12 Select Command File and view the command file. 13 To close the Properties for Force AM Agent to rescan software inventory dialog, click Cancel.

Task Summary
You have viewed the properties of an existing asset job. Any existing asset job can be reconfigured to accommodate an organization's needs. The asset job type viewed in the preceding interactive demonstration enables your client to quickly gather specific information, such as software data, thereby keeping records up to date. This asset job type also enables your client to implement more effective long-term inventory planning. In the next task, you will create a job, assign it to a system, and schedule it to run.

Notes

15-5

Create an Asset Job


Task 2: Create a New Asset Job
Slide 15-4

Task 2: Create a New Asset Job


When existing asset jobs do not meet your clients requirements, a new job can be created. Your client can create a new job for individual computers or groups of computers.

Slide 15-5

The Asset Jobs folder contains all the asset jobs created in the domain. You can use this folder to create, manage, and schedule asset jobs. These jobs can be deployed on any asset or group in the domain. Script jobs are used to execute a Unicenter Desktop Management script on an agent computer. You can write the script directly or paste a saved script copied from a file.

Interactive Demonstration
Task Purpose: Create a new asset job. This interactive demonstration involves scheduling the new asset job, assigning it to a system, and verifying the result. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Jobs\Asset Jobs. Right-click Script Jobs and choose New. The New Job Wizard appears. Leave the default job type as Script and click Next. Type Get MSI Version in the Job name field. Click Next. Click Load File. The Load File to the Job Editor dialog appears. Navigate to D:\ClassFiles. Select a *dms file type. Select the MSI.dms file. Click Open.

10 Click Next. 11 Click Finish.

Notes

15-6

Partner Certification Student Workbook

Create an Asset Job Skill Practice

12 In the left pane, expand the Computers and Users folder. 13 Drag the job from the right pane to Computers and Users\All Computers in the left pane. 14 In the left pane, expand All Computers\Jobs. 15 To view the job status, in the right pane, select Asset Jobs. 16 Verify that the engine runs the collect job. 17 Run the agent. Under Additional Inventory for DSM servername, the MSI Version inventory appears.

Skill Practice
Task Purpose: Create a synchronization job. Note: The source and target directories must exist on the computer before you can run a job. 1 2 On the DSM server, synchronize the D:\ClassFiles\solutions (source) directory to the C:\synchtest (target) directory. Leave all the default settings.

Task Summary
You have created a new asset job in only a few steps by using the New Job wizard. Your client can simplify and customize any asset job and schedule it to run at optimal times. This helps ensure that your clients operations are not delayed when a job is run. In this way, time is used most efficiently.

Notes

15-7

Create an Asset Job


Skill Builder: Create a Secure Configuration Files Job

Skill Builder: Create a Secure Configuration Files Job


Business Problem
GIS is concerned that users are updating their own hosts files instead of relying on the Domain Name System (DNS) for network name resolution. When the hosts file is modified, it must be reverted to your clients standard hosts file. Create a Secure Configuration Files job and name it Hosts File.

Hint
To locate the hosts file, look in the C:\windows\system32\drivers\etc directory. Copy the contents of the active hosts file as your clients standard hosts file.

Notes

15-8

Partner Certification Student Workbook

Create an Asset Job Assessment

Assessment
1 Which two statements are accurate for a synchronization job? (Choose two.) a b c d The target is made identical to the source directory. The source is made identical to the target directory. The source and target directories must already exist on the computer. The differences between the source and target are reported back to the manager.

Which type of asset job can run native commands? a b c d Script Message Command External utility

Notes

15-9

Create an Asset Job


Module Summary
Slide 15-6

Module Summary
You should now be able to:

Discover Properties of an Existing Job Create a New Asset Job

In this module, you have examined an existing asset job to determine configuration properties. You have also created a new asset job. Using these processes, your client can use an existing job function to complete a task and can create a new asset job to fulfill other tasks. Unicenter Asset Management also enables easy job scheduling so company operations are not interrupted. In the next module, you will create policies for Unicenter Asset Management control.

Notes

15-10

Partner Certification Student Workbook

16
Create Policies

16-1

Create Policies
Module Objectives
Slide 16-1

Module Objectives
After this module, you will be able to:

Create an Event-based Policy Create a Query-based Policy

Module Overview
Your client must monitor changes in the Hosts file on certain computers. An event-based policy must be created that can help track any changes. Your client also wants to alert any users who do not have service pack 99 installed on their computers to add it to their system. Unicenter DSM permits your client to automate maintenance tasks that perform regular checks on their network. Unicenter DSM can be used to establish alerts notifying the IT team of potential problems. Also, creating policies enables your clients network administrators to determine which users can use or access specific assets. In this module, you will create event-based and query-based policies.

Notes

16-2

Partner Certification Student Workbook

Create Policies Task 1: Create an Event-based Policy

Slide 16-2

Task 1: Create an Event-based Policy


Your client must monitor changes in files on certain computers; this monitoring can be accomplished with an event-based policy. An event is an occurrence in the Unicenter DSM infrastructure. Events can be tracked and reported using event-based policies.

Slide 16-3

Event-based policies are designed to address possible changes arising on a Unicenter DSM system, such as the addition of new assets or jobs, modified jobs, or new or modified policies. Each of these events has a predefined policy that cannot be deleted. You can also create customized event-based policies for some event areas.

Interactive Demonstration
Task Purpose: Create an event-based policy. You will create an asset file collection event policy, but first, you will configure an email account.

Change Default Configuration Policy


1 2 3 4 5 6 7 In DSM Explorer, in the left pane, expand Control Panel\Configuration\Configuration Policy. Right-click Default Computer Policy and choose Un-Seal. Under Default Computer Policy, navigate to DSM\Manager\Integration to emailing system\smtp. Select smtp. In the right pane, double-click Mail Server. The Setting Properties dialog appears. Change the Value from localhost to the instructor2computername. Seal the policy.

Notes

16-3

Create Policies
Interactive Demonstration

Configure an Email Account


8 9 Click Start and then choose Programs Outlook Express. To make Outlook Express the default mail client, click Yes. The Internet Connect Wizard appears.

10 In the Display Name field, type: StudentX 11 Click Next. 12 In the E-mail Address field, type: StudentX@YourDomain.ca.com 13 Click Next. 14 In the Incoming mail server (POP3) field, type: ClassroomT2 15 In the Outgoing mail server (SMTP) field, type: ClassroomT2 16 Click Next. 17 In the Account Name field, type: StudentX@YourDomain.ca.com 18 In the Password field, type: password 19 Click Next. 20 To close the Internet Connect Wizard, click Finish. 21 Select Do not import at this time. 22 Click Next and then click Finish. 23 Click Create Mail. 24 In the To field, type: StudentX@YourDomain.ca.com

Notes

16-4

Partner Certification Student Workbook

Create Policies Interactive Demonstration

25 In the Subject field, type: test message 26 Click Send and then click Send/Receive. 27 In the navigation pane, under Local Folders, select Inbox. To view the test message in the reading pane, select it in the Inbox.

Create the Policy


28 In DSM Explorer, in the left pane, expand Domain\Policies\Event Based. 29 Right-click Asset File Collection and choose New. The Policy Designer dialog appears. 30 In the Policy Name field, type: Hosts File Modified 31 Under Policy Severity, click Warning. Note: The Warning button is the center button. When you mouse-over this button, the word Warning appears. 32 In the left pane of the Policy Designer dialog, under Policy, select File Collection. 33 From the File Collection list, select: %SYSTEMROOT%\SYSTEM32\DRIVERS\ETC\HOSTS 34 In the left pane, under Add Action, select Send Mail. 35 In the Email Addresses field, type: StudentX@YourDomain.ca.com 36 From the Macro list, select Collected File and click Add. 37 In the Enter message field, type: on

Notes

16-5

Create Policies
Skill Practice 38 From the Macro list, select Asset and click Add. 39 Type was changed on in the Enter message field. 40 Select the Date macro and click Add. 41 Select the Time macro and click Add. 42 Click OK. 43 To close the Policy Designer dialog, click OK. 44 In DSM Explorer, in the left pane, expand All Computers\Group Details\Software. 45 Select File Collection. 46 In the right pane, under Tasks, select Configure. The Select files to collect dialog appears. 47 From the File list, select %SYSTEMROOT%\SYSTEM32\DRIVERS\ETC\HOSTS and click OK. 48 Verify the engine runs and then run the agent. 49 In DSM Explorer, in the left pane, expand DSM server\Software. 50 Select File Collection. After the Hosts file date and time information appears, edit the Hosts file. 51 Run the agent. The Last Modified date and time changes for the File Collection status. The Hosts file policy is History and an email has been generated and sent to your mailbox.

Skill Practice
Task Purpose: Add an additional action to the hosts file policy. To help ensure the Hosts file asset job runs only on systems that modify their files, unlink the Hosts file asset job from the Unicenter DSM server. 1 2 Add an action to schedule a job. Use the hosts file job.

Notes

16-6

Partner Certification Student Workbook

Create Policies Task Summary

Task Summary
You have created an event-based policy. Your client can now track changes in the Unicenter DSM system. This capability keeps IT personnel updated about the system and helps them make decisions about upgrading and maintaining system assets. In the next task, you will create a policy based on a query.

Notes

16-7

Create Policies
Task 2: Create a Query-based Policy
Slide 16-4

Task 2: Create a Query-based Policy


Unicenter Asset Management manages the assets connected to it by enforcing certain policies. These policies enable you to focus on critical data when certain threshold values are exceeded. You can create query-based policies and specify the action that must be taken when a policy is violated. Query policy is triggered when the criteria dictated by the query is met.

Slide 16-5

A policy based on a specified query can be designed with three severity levels. When the query is encountered, the policy can perform specified actions. The Alarm level indicates that the policy has been violated and this violation has a severe impact. An Alarm policy appears in the Alarm section of the Log Overview. The lower levels of policy severity are Warning and Message.

Interactive Demonstration
Task Purpose: Create and verify a query-based policy. 1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, expand Policies\Query Based. Right-click Query Based and choose New. The Policy Designer dialog appears. In the Policy Name field, type: Computers w/o SP99 Under Policy Severity, click Alert. From the Query that Policy depends on list, select Computers that do not have SP99 installed. In the left pane, under Policy, select Evaluation. By default, Always evaluate Policy when Sector processing is done is selected. In the left pane, under Add Action, select Send Mail. The Configure Policy Actions dialog appears. Under Enter message, click Add. The macro value $NAME$ appears. The Enter message values will be sent to the email address.

Notes

16-8

Partner Certification Student Workbook

Create Policies Interactive Demonstration

After the macro value $NAME$, add a space and type: requires SP99 to be installed

10 From the Macro list, select Date [$DATE$] and click Add. 11 From the Macro list, select Time [$TIME$] and click Add. 12 Click OK. 13 In the Policy Designer dialog, click OK. 14 In DSM Explorer, in the left pane, right-click policyname and choose Evaluate Now. 15 Expand policyname. Select Violators and, in the right pane, verify all Microsoft Windows systems appear. 16 Look in your email inbox for policy violation messages.

Task Summary
You have created a query-based policy. Your client can use a specific query as the basis for configuring a policy. This capability helps define the specific information for which the query searches. Your client can configure the severity level of the policy and the severity message users will see. The policy designer enables quick control of these items.

Notes

16-9

Create Policies
Skill Builder: Create a Query-based Policy

Skill Builder: Create a Query-based Policy


Business Problem
Your clients organization distributed the User Telephone Information template to All Computers several weeks ago. The GIS group needs a report on how many computers have not run the Template collect task. The report must show that this was because the user was out of the office and the agent did not run on those computers. The violators must be added to a static group named No Telephone Info Reported.

Hint
The query argument should use Jobs, Collect Tasks, and the NOT operator.

Notes

16-10

Partner Certification Student Workbook

Create Policies Assessment

Assessment
1 Which two types of event-based policies can be created? (Choose two.) a b c d e 2 Queries Query Result Asset File Collection Software Definitions Asset Software Usage

What is the highest level of policy severity? a b c d Alarm Danger Message Warning

Notes

16-11

Create Policies
Module Summary
Slide 16-6

Module Summary
You should now be able to:

Create an Event-based Policy Create a Query-based Policy

In this module, you have created event-based and query-based policies. You can now help your client keep track of their assets without having to monitor them on a regular basis, saving time and money. Now your client can be notified when something is missing or present when it should not be. In the next module, you will administer Unicenter Remote Control.

Notes

16-12

Partner Certification Student Workbook

17
Administer Unicenter Remote Control

17-1

Administer Unicenter Remote Control


Module Objectives
Slide 17-1

Module Objectives
After this module, you will be able to:

Control a Host with Unicenter DSM Explorer Define Unicenter Remote Control Manager Policy Create a Global Address Book Control a Host with the Viewer Manage Unicenter Remote Control Sessions Record, Play Back, and Convert Recordings

Module Overview
Your client needs products that will enable them to address their troubleshooting problems and monitor usage on their remote computers. Unicenter Remote Control will provide the solution to meet your clients needs. Your client can access a remote computer and control functions on it. Your client can then switch between functions on local and remote computers. This will enable quick access, and policy can be defined at the manager level. Additionally, with Unicenter Remote Control, your client can record activity on a remote computer. They can play back this recording at a convenient time to demonstrate the functioning of software for training and verification of help desk activities. Your client can convert recordings from the default file format to a format compatible with computers that differ from the one on which the recording is made. In this module, you will control a host with Unicenter DSM Explorer, define a Unicenter Remote Control Manager Policy, create a global address book, manage Unicenter Remote Control Sessions, and record, play back, and convert recordings.

Notes

17-2

Partner Certification Student Workbook

Administer Unicenter Remote Control Task 1: Control a Host with Unicenter DSM Explorer

Slide 17-2

Task 1: Control a Host with Unicenter DSM Explorer


In this task, you will connect to the Unicenter Remote Control host to verify operability and connectivity.

Interactive Demonstration
Task Purpose: Control a host using Unicenter DSM Explorer. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Computers and Users. Select All Computers. In the right pane, double-click the Windows 2000 Professional VMware workstation. In the left pane, expand Windows 2000 Professional VMware workstation. Select Remote Control. In the right pane, select Connect as a different user. Type credentials for the local administrator for the Windows 2000 Professional VMware session. Click Connect. In the right pane, the Windows 2000 Professional VMware Remote Control host appears. In the connected session, move the pointer over the Unicenter Remote Control systray. Notice the Unicenter DSMservername is connected to the session.

10 In DSM Explorer, in the left pane, expand Remote Control\My Sessions. The connected sessions are displayed. 11 Expand the host:tcp:Shared Control session.

Notes

17-3

Administer Unicenter Remote Control


Interactive Demonstration 12 Expand Drives. 13 Select C:(Fixed Drive). The file structure for the host appears in the right pane. The Drives folder also appears in the All Computers\host name\Remote Control list. 14 Under My Sessions, right-click host:tcp:Shared Control session and choose Disconnect. 15 Select Normal. The Disconnect dialog appears. 16 To confirm that you want to disconnect, click Yes. The right pane view returns and the Remote Control Session Disconnected message appears.

Task Summary
To assist your client with connecting to remote computers, you have controlled a host and viewed active sessions using Unicenter DSM Explorer. You have also validated the deployment of Unicenter Remote Control agents. In the next task, you will define manager policy.

Notes

17-4

Partner Certification Student Workbook

Administer Unicenter Remote Control Task 2: Define Unicenter Remote Control Manager Policy

Slide 17-3

Task 2: Define Unicenter Remote Control Manager Policy


Unicenter Remote Control uses two methods to validate your credentials. With local security, the host matches the credentials you enter with a local or domain account. This can be used in a centrally managed or standalone Unicenter Remote Control installation. A host and viewer in a stand-alone Unicenter Remote Control installation are not managed by the Unicenter DSM domain manager.

Slide 17-4

When you use centralized security in a centrally managed installation, the Unicenter DSM domain manager verifies the credentials. However, the default for a centrally managed installation is local security. To change the method, you must enable centralized security through the configuration policy manager.

Interactive Demonstration
Task Purpose: Define and assign Unicenter Remote Control manager policy. In this task, you will define custom settings for the GIS Remote Control group. Note: This interactive demonstration is dependent on the GIS group having been created in the Create Groups module. 1 In DSM Explorer, select All Computers. Note the RC Status for DSM server and Windows 2000 Server VMware session is Listening (Local Security). In DSM Explorer, in the left pane, under Control Panel, expand Configuration. In the left pane, right-click Configuration Policy and choose New Policy. The New Configuration Policy dialog appears. Type GIS Remote Control Policy in the Name field.

2 3 4

Notes

17-5

Administer Unicenter Remote Control


Interactive Demonstration 5 6 7 8 9 Click OK. In the left pane, expand GIS Remote Control Policy\DSM\Remote Control\Host. Select General. In the right pane, double-click Always disable wallpaper and change the value to True. Double-click Inactivity time out and change the value to 30 minutes.

10 Double-click Require local confirmation. Change the value to True. 11 To enable Centralized security, change the value of the configuration policy remote control\Host\Managed\Centralized security to TRUE. Centralized security is required for systems to populate in a global address book. By default, Unicenter Remote Control agents are installed with local security. 12 Right-click GIS Remote Control Policy and choose Seal. 13 Click OK. 14 In the left pane, right-click GIS and choose Paste Policies. The Schedule Policies dialog appears. 15 Check Apply Policies Immediately and click OK. 16 In the left pane, expand GIS\Group Details\Configuration. 17 Select Configuration Policy. Notice the status of the Active and Scheduled Policies. After the policy is applied, verify the policy change at the host. 18 Right-click the Unicenter DSM systray and choose Remote Control Host Properties. The Properties dialog appears. Configuration

Notes

17-6

Partner Certification Student Workbook

Administer Unicenter Remote Control Interactive Demonstration

19 Select Advanced. 20 Scroll down to see that three attributes have been changed to the new configuration policy. Verify the Users tab is no longer available. This indicates Centralized Security is in effect. 21 In DSM Explorer, select All Computers. Note the RC Status for the DSM server is Listening.

Task Summary
You have taken control of customizing remote control functions for your organization by assigning manager policy and defining custom settings for the GIS Unicenter Remote Control group. The flexibility of Unicenter Remote Control enables your client to quickly meet the various requirements of the organizations network. For any job requiring Unicenter Remote Control, your client can adjust the settings to operate most effectively. In the next task, you will create a global address book.

Notes

17-7

Administer Unicenter Remote Control


Task 3: Create a Global Address Book
Slide 17-5

Task 3: Create a Global Address Book


The global address book is a list of computers distributed to Unicenter Remote Control viewers. A global address book enables administrators to define access permissions for an automatic, user-centric view of the computers for which they are responsible.

Slide 17-6

In this task, you will use the global address book to select and assign remote control permissions to a user who will act as a security principal. This principal will then be able to control access to these computers using Unicenter Remote Control.

Interactive Demonstration
Task Purpose: Assign permissions and security. 1 2 3 In DSM Explorer, in the left pane, expand Domain\Computers and Users\GIS. Expand Group Details and select Remote Control Permissions. In the right pane, in the Tasks area, select Properties. The Address Book Properties dialog appears. Note: Address Book Properties provides information on the only option available, Global address book root group. 4 Select Global address book root group. Inherit Remote Control Permissions from parent group becomes available and is automatically selected. Override Remote Control permissions on derived groups is also available but is not selected. 5 6 Click OK. In the Tasks area, select Add User Permission. The Add User Permission dialog appears.

Notes

17-8

Partner Certification Student Workbook

Administer Unicenter Remote Control Interactive Demonstration

7 8 9

Under Available Directories, expand classroomdomainname. In the left pane, expand GIS. Select yourname and click Add to List. In the List of Security Principals list, yourname appears.

10 Select domain\users\John P. Doexx and click Add to List. 11 Click OK. Users in this Username list have permission to control access to computers in the Remote Control Permissions group using Unicenter Remote Control. 12 Right-click the DSM server systray and choose Remote Control Host Launch Remote Control Viewer. In the left pane, expand Viewer and verify Global Address Books appears. Select GIS and the DSM server appears in the right pane.

Task Summary
You have selected a security principal using the global address book. With this principal in place, your client no longer has to perform as many administrative duties for this group and can devote time to other IT duties. In the next task, you will manage remote control sessions.

Notes

17-9

Administer Unicenter Remote Control


Task 4: Control a Host with the Viewer
Slide 17-7

Task 4: Control a Host with the Viewer


A remote control session is established when a user controls a computer from a remote location. Using Unicenter Remote Control, you can establish and view sessions between two or more computers. When a remote connection is established with a computer, the session is placed in the Sessions folder. This folder lists all computers to which you have attempted to connect in Unicenter Remote Control sessions. Successful or failed sessions appear with the most recent connection listed first.

Slide 17-8

There are six types of Unicenter Remote Control sessions: Type of Session View Stealth View Description The viewer user can see the host computer, but does not have the ability to control it. The viewer user can see the host computer without having to acknowledge that a connection has been made with it. The viewer user and the host user have control of the session. Multiple viewer users can connect to a single host. The host user can pass control to any of the viewer users, or restrict control as required. The mouse and keyboard of the host are disabled. Only the viewer user can control the host computer. The mouse and keyboard of the host are disabled and the host screen is blank.

Shared Control Classroom

Exclusive Control

Secure Control

Notes

17-10

Partner Certification Student Workbook

Administer Unicenter Remote Control Interactive Demonstration

Interactive Demonstration
Task Purpose: Establish and view a session with a single host. You can install the Unicenter Remote Control viewer on any workstation or server. It is not necessary to have access to DSM Explorer or the domain manager to control a host. With the viewer, you can use the Quick Connect feature to establish an active session with a host computer. 1 2 3 4 5 6 7 8 9 Start the Windows 2000 Professional VMware session. In DSM Remote Control Viewer, right-click Viewer and choose Quick Connect. The Quick Connect page appears. Type 2000 Professional VMware name in the Address field. Select Connect as a different user. Type host computer user name in the User Name field. Type password for the host computer user in the Password field. Click Connect. Under My Sessions, right-click host:tcp:Shared Control and choose Send Special Keys CTRL+ALT+DELETE. Log in to the Windows 2000 Professional VMware session.

Now you can use the viewer to place data on the host computer.

Notes

17-11

Administer Unicenter Remote Control


Interactive Demonstration

Interactive Demonstration
Task Purpose: Transfer text and graphics between the Unicenter Remote Control viewer and a host. Unicenter Remote Control provides the option to copy and paste contents of the clipboard between the viewer and a host. Text and graphics can be transferred between computers in remote locations. 1 2 3 4 5 6 7 8 On the Unicenter Remote Control viewer computer, click Start and then choose Programs Accessories Notepad. In Notepad, type a line of text. Select the text. Right-click the selected text and choose Copy. Minimize Notepad. In URC viewer, in the left pane, expand My Sessions and select the session. Choose Clipboard Send Clipboard to Host.

On the host computer, click Start and then choose Programs Accessories Notepad. The right pane is the host computer.

From the host Notepad, choose Edit

Paste.

10 On the viewer and host computers, close Notepad. The ability to use the viewer to transfer data to a host computer goes beyond simple text or graphics. You can also transfer entire files.

Notes

17-12

Partner Certification Student Workbook

Administer Unicenter Remote Control Interactive Demonstration

Interactive Demonstration
Task Purpose: Send and receive files between a viewer and a host. You can use the Unicenter Remote Control Explorer to drag files from the viewer to the host or from the host to the viewer. 1 2 3 4 5 6 7 8 9 In URC viewer, in the left pane, expand My Computer. To view the contents of the viewer computer, in the right pane, select D: (Fixed drive). In the right pane, from the Tasks menu, right-click and choose Create Folder. The Create Folder dialog appears. Type TO_HOST in the Folder Name field. Click OK. From the Unicenter Remote Control viewer, copy D:\ClassFiles\Temp\password.txt to the TO_HOST folder. In the left pane, under 2000 Professional VMware host, expand Drives. From the viewer computer, drag the new folder to the C: (Fixed drive) drive on the host computer. To view the folder you have just created and moved, on the host computer, expand the C: (Fixed drive) drive.

Files and folders can be transferred from a CD-ROM drive, floppy disk drive, or network shares. After you have completed your Unicenter Remote Control session tasks, disconnect the session.

Notes

17-13

Administer Unicenter Remote Control


Interactive Demonstration

Task Summary
In this task, you controlled a host computer remotely using Unicenter Remote Control. You established and viewed a session with a single host. You transferred files between a viewer and a host computer. This enables your clients administrators to provide remote users with computer updates without incurring the cost of a visit to their sites. In the next task, you will manage Unicenter Remote Control sessions.

Notes

17-14

Partner Certification Student Workbook

Administer Unicenter Remote Control Task 5: Manage Unicenter Remote Control Sessions

Slide 17-9

Task 5: Manage Unicenter Remote Control Sessions


Remote control is used in such situations as remote support and training. The Unicenter Remote Control viewer is the user interface used to connect remote systems. The viewer provides the option to record a remote control session for playback.

Slide 17-10

Interactive Demonstration
Task Purpose: Uninstall a centrally managed host and viewer. 1 2 3 4 5 On the Windows 2000 Professional VMware session, click Start and then choose Settings Control Panel. Double-click Add or Remove Programs. Select CA Unicenter DSM Agent+Remote Control Plugin. Click Remove and then click Yes. When the uninstall program is finished, close all windows.

Now that you have uninstalled the centrally managed host and viewer, your client can control a host with a viewer. Files and folders can be transferred from a CD-ROM drive, floppy disk drive, or network shares. Next, you will install a stand-alone host and viewer.

Interactive Demonstration
Task Purpose: Install a stand-alone host and viewer. 1 2 From Windows Explorer, open the Z:\ClassMedia folder. Navigate to the USDM\WindowsProductFiles\AgentRC folder.

Notes

17-15

Administer Unicenter Remote Control


Interactive Demonstration 3 4 5 6 7 8 9 Double-click the Setup_RC.exe file. The CA Unicenter DSM Agent + Remote Control Plugin - InstallShield Wizard dialog appears. Click Next. The License Agreement appears. After reading the agreement, select I accept the terms in the license agreement. The Destination Folder page appears. Click Next. The Ready to Install the Program page appears. Click Install. The InstallShield Wizard Completed page appears. Click Finish. Right-click the Unicenter DSM systray and choose Exit.

10 To start the systray again, click Start and then choose Run. The Run dialog appears. 11 In the Open field, type cfsystray and click OK. Having installed a stand-alone host, you must now designate who will control the viewer sessions. You must also set the locally managed security.

Interactive Demonstration
Task Purpose: Designate who has control of a viewer session. The Unicenter Remote Control host can be used to designate who has control of a viewer session. 1 2 Establish a classroom connection between a viewer and a host. From the viewer, try to use the mouse or keyboard to send commands to the host. Note: The host must enable the viewer to perform any remote control functions. Until this is done, the viewer can only watch the session. 3 From the host computer systray, right-click Remote Control Host.

Notes

17-16

Partner Certification Student Workbook

Administer Unicenter Remote Control Interactive Demonstration

Choose computername\username

Has Control.

The user can now use the mouse and keyboard to send commands to the host. 5 Disconnect the session. Control of the session is no longer open to everyone. You can control who can view the session.

Interactive Demonstration
Task Purpose: Grant viewer access. 1 From the Windows 2000 Professional VMware session Unicenter DSM systray, right-click Unicenter Remote Control Host and choose Properties. The Remote Control Host Properties dialog appears. Select the Host tab. From the Host Features Access group, select Always manually confirm connections and Always encrypt. Click OK. On the viewers computer, establish a session with the host. To accept the connection and grant the viewer access, on the host computer, click Yes. Disconnect the session.

2 3 4 5 6 7

You can also lock and unlock a host computer using the Unicenter Remote Control host.

Notes

17-17

Administer Unicenter Remote Control


Interactive Demonstration

Interactive Demonstration
Task Purpose: Lock and unlock the host. 1 2 3 4 5 6 From the systray, right-click Remote Control Host and choose Properties. The Remote Control Host Properties dialog appears. Select the Advanced tab. Set Host: User can lock and Unlock Host to TRUE and click OK. Right-click the Unicenter DSM systray and choose Remote Control Host Display as Separate Icon. Right-click the new separate icon and choose Lock Host. The host in the systray displays a red X, indicating it is locked. Try to establish a viewer session. You receive a message on the viewer stating Unicenter Remote Control is not currently listening for connections. Right-click Unicenter Remote Control Host and choose Unlock Host. Establish a viewer session. On the host computer, click Yes.

7 8 9

10 Disconnect the session. Security can also be set for a stand-alone environment.

Interactive Demonstration
Task Purpose: Set stand-alone security. 1 From the host computer systray, right-click Remote Control Host and choose Properties. The Remote Control Host Properties dialog appears. Select Users. From the Current Security Provider list, select Local. Click Add. The Add Users dialog appears.

2 3 4

Notes

17-18

Partner Certification Student Workbook

Administer Unicenter Remote Control Interactive Demonstration

5 6

Type yourname in the Users to be added field. Type password in the Password field. Note: Your user name cannot contain any spaces and your password must be six or more characters.

7 8

Click Create and then click OK. From the viewer, establish a Unicenter Remote Control session using the credentials created in the previous task. Note: The host user must click Yes when prompted to permit the session to be established.

Disconnect the session.

10 From the systray, right-click Unicenter Remote Control Host and choose Properties. The Remote Control Host Properties dialog appears. 11 Select the Users tab. 12 Next to Current Security Provider, click Properties. 13 Select Enable Master Password and click OK. The Set Master Password dialog appears. 14 Type newmasterpassword in the New password field. Note: The password must contain at least six characters.

15 To confirm the password, type it again in the Confirm new password field. 16 To set the master password, click OK. 17 To close the Unicenter Remote Control Host Properties dialog, click OK.

Notes

17-19

Administer Unicenter Remote Control


Interactive Demonstration 18 From the systray, right-click Unicenter Remote Control Host and choose Properties. The Remote Control Host Properties dialog appears again. 19 Select the Users tab. 20 From the Current Security Provider list, select WinNT. 21 Type newmasterpassword in the Password field. 22 Click OK. 23 Right-click Administrators and choose Permissions. 24 Clear the option for Shared Control and select Requires Host Confirmation. 25 Click OK. 26 To close the Unicenter Remote Control Properties dialog, click OK. 27 From the viewer, try to establish a shared control session with the Administrator account. Permission to establish a connection with the Administrator is denied.

Task Summary
Your clients employees can now configure a host session, manage a standalone host, and control stand-alone host sessions. With fewer hosts to manage centrally, your clients employees are now available for assignments on other projects. Now, their supervisors can assign them more challenging tasks. In the next task, you will record, play back, and convert recordings.

Notes

17-20

Partner Certification Student Workbook

Administer Unicenter Remote Control Task 6: Record, Play Back, and Convert Recordings

Slide 17-11

Task 6: Record, Play Back, and Convert Recordings


Your clients management would like to have the ability to view recorded Unicenter Remote Control sessions. The Replayer console is a component of Unicenter Remote Control that makes it possible to record and replay sessions for various purposes. For example, a help desk technician can send recorded training sessions to a user. You will now access and use the Replayer console, including recording, replaying, and converting.

Slide 17-12

Recording Unicenter Remote Control Sessions


You can use the Unicenter Remote Control viewer and host to record a training session such as employing Microsoft WordPad. You can also access and record tutorials from the CA website.

Interactive Demonstration
Task Purpose: Record Unicenter Remote Control sessions from the viewer. 1 Click Start and choose Programs Computer Associates Desktop and Server Management DSM Remote Control Viewer. The DSM Remote Control - DSM Remote Control Viewer window appears. Connect to a host. In the left pane, right-click Session and choose Session Recording Start. The Session dialog appears. Type Using WordPad in the Name field. Click OK. Navigate to WordPad and open it.

2 3 4 5 6

Notes

17-21

Administer Unicenter Remote Control


Interactive Demonstration 7 8 9 Type some text in the Document - WordPad field. Choose File Exit. The WordPad dialog closes. Stop. Right-click Session.

10 Choose Session Recording

Now that you have recorded a session with the viewer, you are ready to control a recording session from the Unicenter Remote Control host.

Interactive Demonstration
Task Purpose: Record Unicenter Remote Control sessions from the host. 1 2 3 4 5 6 7 8 9 On the Unicenter Remote Control host, from the systray, right-click Remote Control. Choose Start Recording. The Session dialog appears. Type CASupport in the Name field. Click OK. Open Microsoft Internet Explorer. If the CA web page does not open, type www.ca.com in the Address field. On the CA homepage, choose Support Select SupportConnect. Choose New User Enroll Now. Close Microsoft Internet Explorer. Technical Support.

10 In the systray, right-click Remote Control and choose Stop Recording.


Slide 17-13

Playback of Recorded Unicenter Remote Control Sessions


The Replayer enables you to play back previously recorded host sessions. It is an optional component that can be included during the installation process. The Replayer console lists recently recorded and replayed sessions. Use it to open a recording and to show active replays.

Notes

17-22

Partner Certification Student Workbook

Administer Unicenter Remote Control Interactive Demonstration

You will now launch the Replayer and use the controls to replay a Unicenter Remote Control session.

Interactive Demonstration
Task Purpose: Play back Unicenter Remote Control sessions. The Replayer can be started from Unicenter Remote Control Explorer. 1 Click Start and choose Programs Computer Associates Unicenter Desktop and Server Management Remote Control Viewer. The DSM Remote Control - DSM Remote Control Viewer window appears. In the left pane, select Replayer. The Replayer console features appear in the right pane. The Open a Recording task in the Replayer pane causes the Open dialog to appear. From this dialog, you can choose a recorded session by navigating the directory structure or by typing the name of the recorded session you want to replay. 3 4 In the left pane, under Replayer, select Recently Recorded Sessions. Any recently recorded sessions appear in the right pane. In the right pane, double-click Using WordPad. Unicenter Remote Control enables you to set properties for viewing a session. You can right-click Replayer and choose Properties to view and modify property settings. 5 In the left pane, expand Active Replays. Any recordings currently being played back appear in the right pane. You can use various controls from the Unicenter Remote Control Explorer toolbar to control the playback of a recorded session. The controls you need appear in the Unicenter Remote Control Explorer toolbar after the Replayer has been opened.

Notes

17-23

Administer Unicenter Remote Control


Conversion of Recorded Unicenter Remote Control Sessions 6 In the right pane, right-click a recorded session and choose Scroll Mode Shrink to fit. In the Unicenter Remote Control Explorer toolbar, the Replayer controls appear. Click Rewind. The recording rewinds to its beginning. Click Slow Motion. The recording plays at half the normal speed. Click Fast Forward. The recording plays at twice the normal speed.

7 8 9
Slide 17-14

Conversion of Recorded Unicenter Remote Control Sessions


Converting a Unicenter Remote Control recording to AVI or Windows Media Video (WMV) enables the recording to be played on a system with the Unicenter Remote Control viewer installed. The main recording conversion parameters are the file format and the video compression codec. The file format defines a container for the compressed video data. A codec is software that compresses and decompresses video data. The compression codec defines how the video data is compressed. WMV and AVI formats are valid for a video file. The newer WMV format is better suited for streaming media downloads. The AVI format, however, supports more compression codecs.

Interactive Demonstration
Task Purpose: Convert a Unicenter Remote Control session recording to AVI and play the AVI recording. 1 2 3 4 In Microsoft Windows Explorer, in My Documents, navigate to the Using WordPad.urc file. Right-click the file name and choose Export to Video. The Export to Video dialog appears. Change the format option from wmv to avi. Leave the defaults for video compression and replay.

Notes

17-24

Partner Certification Student Workbook

Administer Unicenter Remote Control Interactive Demonstration

5 6 7 8

To convert the recording, click Start. To play the converted file immediately, select Yes. Follow the prompts to install Windows Media Player. After the recording has finished playing, close Windows Media Player. Note: You can also run C:\Program Files\CA\Unicenter DSM\bin\rcReplayExport.exe and click Browse to open a recording file (.urc extension). Change the format option from wmv to avi, and then determine the options for video compression and replay. When you are ready to change the format, click Start.

Task Summary
You have recorded Unicenter Remote Control sessions from the viewer and have launched the Replayer and used its controls to play a Unicenter Remote Control session. Your clients employees can play back a recorded training session and use various options, such as rewind, fast forward, and slow motion. These capabilities improve session performance and increase organizational efficiency. Finally, you converted a recording to AVI and played it using Unicenter Remote Control. Your client's staff and management can now record and replay employee training sessions whenever it is convenient. This benefits your client by enabling more efficient scheduling of employee time so there is less interruption to the daily work flow.

Notes

17-25

Administer Unicenter Remote Control


Skill Builder: Assign a New Group and Query with New Security and Assign Permissions

Skill Builder: Assign a New Group and Query with New Security and Assign Permissions
Business Problem
The Accounting group must have custom Unicenter Remote Control settings, but the members of this group require a password for GIS before they are permitted to take control. They also want the host session to close automatically if there is no activity for five minutes. The Windows 2000 Server VMware session is a system in Accounting. You must define and assign manager policy for the new Accounting group. It must also be a global address book.

Hint
You must deploy remote control to the Windows 2000 Server VMware session.

Notes

17-26

Partner Certification Student Workbook

Administer Unicenter Remote Control Assessment

Assessment
1 Which recording file format supports the most compression codecs? a b c d 2 AAP AVI TCP WMV

What is the default remote control security setting in a centrally managed installation? a b c d Local security Global security Centralized security Administrative security

Notes

17-27

Administer Unicenter Remote Control


Module Summary
Slide 17-15

Module Summary
You should now be able to:

Control a Host with Unicenter DSM Explorer Define Unicenter Remote Control Manager Policy Create a Global Address Book Control a Host with the Viewer Manage Unicenter Remote Control Sessions Record, Play Back, and Convert Recordings

You have created a global address book and defined manager policy. You have also controlled a host with DSM Explorer and managed Unicenter Remote Control sessions. You have recorded, replayed, and converted Remote Control session recordings to help your client distribute previously recorded sessions. This functionality enables your clients supervisors to grant users access to training sessions that they missed or took place before they were employees. With these files on their desktops, new users can benefit from these sessions without spending long periods of time in the classroom. As a result, your clients help desk workload decreases and employees are updated with new information. In the next module, you will produce common reports.

Notes

17-28

Partner Certification Student Workbook

18
Produce Common Reports

18-1

Produce Common Reports


Module Objectives
Slide 18-1

Module Objectives
After this module, you will be able to:

Create a New Report Customize a Report Schedule and Publish a Report Create a Query-based Report Filter a Report Schedule and Publish a Report to an Ingres Table Create a Report Using Active Directory Information Create a Remote Control Report

Module Overview
Your client wants a more efficient way to categorize data. One way to do this is to use reports. Unicenter DSM Reporter will provide your client with a wide array of predetermined reports, enable the creation of customized reports, and provide the ability to query and filter reports so that unnecessary information does not appear in the final view. In this module, you will create a new report template using the Unicenter DSM Reporter, schedule a report and export its results, and modify the output of a report by creating a custom view.

Notes

18-2

Partner Certification Student Workbook

Produce Common Reports Task 1: Create a New Report

Slide 18-2

Task 1: Create a New Report


There are numerous types of report templates already created when Unicenter DSM is installed.

Slide 18-3

However, if an existing report template does not meet your needs, you can create a new template. You can choose your own fields and link the template to your own or existing queries.

Interactive Demonstration
Task Purpose: Create a new report template and run the report. 1 On the DSM Explorer menu bar, choose Tools DSM Reporter window appears. DSM Reporter. The

Note: DSM Reporter can also be launched from the Quick Start menu or by choosing Start Programs. 2 3 4 5 6 In the left pane, right-click Report Templates and choose New Report Template. The Report Template Type dialog appears. Select Asset or User Report and click OK. The New Asset or User Report dialog appears. On the General tab, type General Info in the Name field. Select the Fields tab and click Add. The FieldBrowser dialog appears. Under Category, select Inventory.

Notes

18-3

Produce Common Reports


Skill Practice 7 Expand System. Double-click Serial Number and click OK. On the Fields tab of the New Asset or User Report dialog, System Serial Number appears in the Field list. The report will contain this value. Note: If you do not choose all the values, the report will return only the first row of inventory. For example, it will return the first NIC card or IP address and ignore additional values. 8 9 Click OK twice. In the left pane, under Report Templates, General Info is now listed. Select General Info. The right pane displays the Overview, Statistics, Layout, and Tasks details for the General Info report template. 10 Under Tasks, select Run Report. In the right pane, view the results.

Skill Practice
Task Purpose: Create a new report template showing the OS and IP address. 1 2 Using Unicenter DSM Reporter, create a new report template. Type OS and IP Report as the name. Include the following fields: Unit name Domain name to which the unit belongs General Inventory/Operating System/Operating System General Inventory/Network/IP Address

Notes

18-4

Partner Certification Student Workbook

Produce Common Reports Task Summary

Task Summary
If an existing report template does not suit specific requirements, your client can easily create and run a new report template. This ability to customize reports provides the organization with access to the specific data it requires. In the next task, you will customize the report by changing the view.

Notes

18-5

Produce Common Reports


Task 2: Customize a Report
Slide 18-4

Task 2: Customize a Report


The computer report templates include predefined reports about managed computers and their properties. You can view reports about computers based on domains and platforms.

Slide 18-5

The output of a report can be adjusted by redefining the view, which then becomes a custom view.

Interactive Demonstration
Task Purpose: Modify the output of a report by creating a custom HTML view. 1 2 3 4 5 6 7 8 9 In the left pane, expand Report Templates\Hardware\Storage\Drive Information. Right-click Local Drives and choose Run Report. Notice the format in the right pane. Right-click Local Drives and choose Properties. The Properties for Local Drives dialog appears. Select the Default View tab. Select Custom HTML View and click Settings. The Properties for HTML View dialog appears. Select the Groups tab and in the Group field, select the group value. From the Based on list, select Name. Click Add. The Add summary dialog appears. From the Field list, select Local File Systems[All] Add. Free and then click

10 Select the Rows tab.

Notes

18-6

Partner Certification Student Workbook

Produce Common Reports Skill Practice

11 From the First sort by list, select Local File Systems[All] Point and click OK. 12 To close the Properties for Local Drives dialog, click OK. 13 In the left pane, expand Results. 14 To see the custom view, select Auto History.

Mount

Skill Practice
Task Purpose: Modify the output of the All Network Adapter Information report template. This is found in DSM Reporter\Report Templates\Network\Adapter Information. 1 2 3 Select the Custom HTML View. Select the computer name as the First Group by value. Select the MAC address as the First Sort by value.

Task Summary
You can now change the output of a report by creating a custom view. This is another way your client can run specific reports according to its needs, which can vary from one company location to another. In the next task, you will schedule and publish a report.

Notes

18-7

Produce Common Reports


Task 3: Schedule and Publish a Report
Slide 18-6

Task 3: Schedule and Publish a Report


There are three ways to schedule a report:

Drag-and-drop: The easiest way is to drag the report template to the Scheduled Reports folder or any subfolder under Scheduled Reports. Right-click: Right-click the report you want to schedule and choose Schedule Report. Actions item: On the HTML overview page, in the right pane, under Actions, select Schedule Report.

Slide 18-7

In each case, the Scheduling Properties window appears. Here, you can configure the scheduling settings and schedule the reports to run using an engine instead of generating them manually. After you have scheduled a report, you can link it to an engine. This will create a job and link it to the engine to run as scheduled. You can view results in Unicenter DSM Reporter as soon as the engine processes the job. Reports run by scheduling generate result sets that are located in the Result folder. Individual scheduling properties enable you to define how many result sets to keep from each scheduled report.

Interactive Demonstration
Task Purpose: Schedule a report and publish the results. 1 2 In the left pane, expand Report Templates\Network\Adapter Information. Right-click All Network Adapter Information and choose Schedule Report. The Properties for All Network Adapter Information dialog appears. Select the Scheduling tab and click Set Scheduling. The Scheduling properties dialog appears. Select the Conditions tab.

3 4

Notes

18-8

Partner Certification Student Workbook

Produce Common Reports Interactive Demonstration

5 6 7 8 9

Under Periodic dependency, change Run only once a day to once a week and click OK. Select the Publishing tab and click Set Publishing. The Publishing properties dialog appears. Type 5 in the Number of result sets to keep field. Select the Export tab. From the Select the type of export list, select HTML File.

10 Click Properties. The Export to HTML File dialog appears. 11 Type C:\allnetworkadapterinformation.html and click OK. 12 To close the Publishing properties dialog, click OK. 13 Select the Job tab. 14 From the The job is currently linked to list, select SystemEngine and click OK. 15 In DSM Explorer, in the left pane, expand Control Panel\Engines\All Engines. 16 Select SystemEngine. The Reporter job appears in the Task List with the status Waiting. 17 To cancel the current task and process this task, under Actions, click the right arrow and select Yes. 18 After the status changes to OK, return to DSM Reporter. 19 In the left pane, expand Scheduled Reports\All Network Adapter Information\Results. 20 From the Results list, to view its report in the right pane, select a result. 21 To show the report on the Web, in Microsoft Windows Explorer, open: C:\all network adapter information.html

Notes

18-9

Produce Common Reports


Skill Practice

Skill Practice
Task Purpose: Schedule the basic Hardware Inventory report and export it as a CSV file. 1 2 Look in Report Templates\Hardware for the report. Schedule the basic Hardware Inventory report to run once a week, with the following parameters: a b 3 4 Set Number of results sets to keep to 1 set. Set Field separator according to local use. For example, the United States uses a comma and Germany uses a semicolon.

Select SystemEngine as the schedule engine. View the results of the report.

Task Summary
You can now schedule reports and publish the results. Using Unicenter DSM Reporter, your client can share report details with any of its users in any location and publish reports to the Web. This improves communication in the organization and enables users to keep up to date. To further simplify the process, your client can also schedule the publishing step. In the next task, you will create a report based on a query.

Notes

18-10

Partner Certification Student Workbook

Produce Common Reports Task 4: Create a Query-based Report

Slide 18-8

Task 4: Create a Query-based Report


Using Unicenter DSM, you can run an existing report from the Unicenter DSM console, create a new report template using predetermined fields, or create a query-based report. A query-based report enables your client to set criteria for extracting, manipulating, viewing, and reporting data from almost any perspective in a few seconds.

Interactive Demonstration
Task Purpose: Create a query-based report. You will create a query and then a report. 1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain. Expand Queries. Right-click My Queries and choose New. The Select Target dialog appears. Select Computers and click OK. The Query Designer dialog appears. In the left pane, select Link Query. The Select Query dialog appears. Select Computers that do not have SP99 and click OK. Select Preview. The results appear in the right pane. In the Query Designer dialog, under Boolean Operators, select AND. Choose General Information Computer Last Agent Run.

10 From the Operator list, select Days Older. 11 In the Date field, type 30 as the value. This will find computers that have not run the agent in 30 days. 12 Click OK. 13 Select Preview. The Query Preview dialog appears. Recently scanned computers no longer appear in the list.

Notes

18-11

Produce Common Reports


Interactive Demonstration 14 Click OK. The Save Query dialog appears. 15 Type Obsolete Systems with no SP99 in the text box and click OK. The new query is listed in the My Queries pane. 16 In DSM Reporter, in the left pane, select Report Templates. 17 In the right pane, in the Tasks box, select New Report. The Report Template Type dialog appears. 18 Select Asset or User Report and click OK. The New Asset or User Report dialog appears. 19 Type Obsolete Systems with no SP99 in the Name field. 20 Select the Query tab. Expand DSM Query and select Obsolete Systems with no SP99. 21 Select the Fields tab and click Add. The FieldBrowser dialog appears. 22 Select General Information. Double-click Last Agent Execution Date of last agent execution. 23 In the left pane, select Inventory. In the right pane, expand General Inventory\Operating System. 24 Double-click Operating System and then double-click Service Pack to place it in the report. Click OK twice. The report appears in the New Asset or User Report dialog. 25 In DSM Reporter, right-click Obsolete Systems with no SP99 and choose Run Report. 26 Expand Obsolete Systems with no SP99\Results and then select Auto History. Now that you can create a report based on a query, you will create another report in which the criteria is supplied after choosing Run Report.

Notes

18-12

Partner Certification Student Workbook

Produce Common Reports Interactive Demonstration

Interactive Demonstration
Task Purpose: Create a quick query report. Modify the OS and IP report to query computers matching a name or name pattern when running the report. 1 2 3 4 5 6 7 8 Under OS and IP report, select Query. In the right pane, choose Select Query. Under Report Quick Query, expand Assets and select Matching Name. There is a green check mark to the left of Matching Name. Check Ask for argument when running the report. Click OK. Right-click OS and IP report and choose Run report. The Runtime Query dialog appears. Type us% in the text box. This is not case-sensitive. Click Finish. Only systems with us in their name will appear.

Skill Practice
Task Purpose: Create a query-based report. GIS would like to have a report of the systems in the GIS group and publish it to their internal web page. 1 2 3 4 Create a new report template and type GIS Computers as the name. Add Operating System, Service Pack, Serial Number, and Model fields to the GIS Computers query. Define an HTML-based view and sequence the report items by name. Run the report.

Notes

18-13

Produce Common Reports


Task Summary

Task Summary
You can now create query-based reports that will enable your client to determine the conditions for reporting data. In the next task, you will filter a report for specific information.

Notes

18-14

Partner Certification Student Workbook

Produce Common Reports Task 5: Filter a Report

Slide 18-9

Task 5: Filter a Report


After creating a report, you can narrow the results to obtain more specific information. Unicenter DSM Reporter enhances the value of Unicenter DSM data by enabling you to filter individual result sets.

Interactive Demonstration
Task Purpose: Filter a report. To prepare for upgrading all Windows 2000 Professional computers to Service Pack 99, a report was created that shows the service pack level for all computers. Computers running Service Pack 3 require additional maintenance to prepare them for the upgrade. You must limit the results of your Service Pack Level report to show only those computers running Service Pack 3. 1 2 3 4 5 6 7 8 9 In DSM Reporter, in the left pane expand Report Templates\OS and IP report. Select Filter. In the Tasks area, select Select Filter. The Properties for OS and IP report dialog appears. On the Filter tab, select Field. A dialog appears. From the dialog, double-click Operating System Select Operator and double-click LIKE. Select Value and double-click Linux. Click OK. In the left pane, select Filter. The Filter equation appears in the right pane. Operating System.

Notes

18-15

Produce Common Reports


Interactive Demonstration 10 In the left pane, right-click OS and IP report and choose Run Report. The unfiltered results appear in the OS and IP report - Auto History right pane. 11 To filter the report, select Enable filter in the Tasks box. Only Linux systems appear.

Task Summary
You can now obtain more specific results from a report by filtering data. Filtered data enables your client to quickly identify computers that require the service pack installation. This saves the IT team time and effort. In the next task, you will schedule a report and publish it to an Ingres table.

Notes

18-16

Partner Certification Student Workbook

Produce Common Reports Task 6: Schedule and Publish a Report to an Ingres Table

Slide 18-10

Task 6: Schedule and Publish a Report to an Ingres Table


Unicenter DSM enables you to define the properties for the run frequency of a report by setting specific conditions under which a report can run. You can also automatically export the results generated by a scheduled report.

Slide 18-11

These results can be imported or exported into spreadsheets, budgeting tools, and other applications. Additionally, you can write the results to an Ingres table, an ODBC database table, desktop database files, text files, and Microsoft Excel worksheet files through ODBC drivers. ODBC is a Microsoft standard for accessing client-server databases.

Interactive Demonstration
Task Purpose: Schedule and publish a report to an Ingres table. 1 2 3 4 5 6 7 8 In the left pane of DSM Reporter, drag OS and IP report to Scheduled Reports. The Properties for OS and IP report dialog appears. Select the Scheduling tab and click Set Scheduling. The Scheduling properties dialog appears. Under Day of the week dependency, check Run only on these days and then check Monday, Tuesday, Wednesday, Thursday, and Friday. Under Periodic dependency, leave Run only once a day selected and click OK. In the Properties for OS and IP report dialog, select the Publishing tab and click Set Publishing. The Publishing properties dialog appears. Select the Save tab and check Save auto generated report. Type yourfirstname in the Table Name field and click OK. Select the Job tab.

Notes

18-17

Produce Common Reports


Interactive Demonstration 9 From the The job is currently linked to list, select SystemEngine and click OK.

10 In DSM Explorer, in the left pane, expand Control Panel\Engines\All Engines. Select SystemEngine. 11 In the Task List, confirm that Reporter Job - OS and IP report appears. 12 To cancel the current job before you begin processing this job, under Actions, click the right arrow and click Yes. 13 In the left pane, expand Engine Tasks\Reporter Job - Service Pack Level\Results and select your report. The results appear in the OS and IP report - Scheduled - Date pane. This may take several minutes. 14 To verify the table was created in the Ingres database, in the systray, rightclick Ingres and choose Ingres Visual DBA. 15 In the left pane, expand Nodes. 16 Right-click ASSETREG_dsmservername and choose Connect/DOM. 17 In the middle pane, expand Databases\mdb and select Tables. 18 In the right pane, scroll down to Ryourname. Double-click Ryourname. Details about the new table appear. Unicenter DSM automatically adds an R, which stands for Report, to the beginning of the table name. 19 Select the Rows tab. The Rows data appears.

Notes

18-18

Partner Certification Student Workbook

Produce Common Reports Task Summary

Task Summary
You can optimize use of the Unicenter DSM reporting tool to schedule a report to run at specified times that are convenient for your client. This means employees do not need to waste company time running these reports. You now know how to publish a report so your clients external applications can use the information. In addition, you also know how to publish to an Ingres table. In the next task, you will create another report using Active Directory information.

Notes

18-19

Produce Common Reports


Task 7: Create a Report Using Active Directory Information
Slide 18-12

Task 7: Create a Report Using Active Directory Information


You can create specialized reports based on the detailed information in your Active Directory.

Interactive Demonstration
Task Purpose: Create a report using Active Directory information. 1 Create a new user report with the following inventory fields: 2 3 4 5 Name Type Last Agent execution

Use the GIS Computer Users query. Use Active Directory Information as the report name. In the FieldBrowser dialog, select the Directory Synchronization tab. Select the following: company department displayName

Run the report.

Task Summary
With Active Directory integrated into your Unicenter DSM domain, reports linking Active Directory information with your assets are possible. This means your client can access more report data by using Active Directory to encompass other directories. In the next task, you will create a Remote Control report.

Notes

18-20

Partner Certification Student Workbook

Produce Common Reports Task 8: Create a Remote Control Report

Slide 18-13

Task 8: Create a Remote Control Report


Unicenter Remote Control sessions can be examined for specific information after they have been recorded and stored. You can configure a Unicenter DSM Reporter template to create a report on any existing Remote Control session.

Interactive Demonstration
Task Purpose: Create a Remote Control report. 1 In DSM Reporter, in the left pane, right-click Report Templates and choose New Report Template. The Report Template Type dialog appears. Select Remote Control Sessions and click OK. The New Remote Control Sessions dialog appears. On the General tab, type Disconnected Data in the Name field. Select the Fields tab and click Add. The FieldBrowser dialog appears. Under Category, select Remote Control. On the Sessions tab, expand Session. Double-click Reason session was terminated and click OK. The FieldBrowser dialog closes. To close the New Remote Control Sessions dialog, click OK. In DSM Reporter, in the right pane, in the Templates area, the Disconnected Data session is now listed.

2 3 4 5 6 7 8 9

Notes

18-21

Produce Common Reports


Skill Practice 10 Select Disconnected Data. The Overview, Statistics, Layout, and Tasks details for the Disconnected Data report template appear in the right pane. 11 Under Tasks, select Run Report. 12 View the result in the right pane.

Skill Practice
Task Purpose: Create a new report template showing the connected user and the duration of sessions. 1 2 Using DSM Reporter, create a new report template with Duration as its name. Include the following fields: Remote Control > Duration Remote Control > User Remote Control > Time

Task Summary
In this task, you created a Remote Control report template. Report templates enable your client to create reports that meet the business needs of their organization. When you create report templates, you help ensure that your reports retrieve only relevant data fields and present these in a suitable report layout.

Notes

18-22

Partner Certification Student Workbook

Produce Common Reports Assessment

Assessment
1 Which is the easiest method to schedule a report? a b c d 2 Create an engine task. Use the DSM Explorer Quick Start menu. Right-click the Scheduled Reports folder and choose New. Drag-and-drop the template to the Scheduled Reports folder.

Where is the information returned after running a report? a b c d The Results folder The Publishing folder The Scheduling folder The Scheduled Report Template folder

Which type of report enables you to specify criteria when running the report? a b c d HTML report Filtered report Scheduled report Quick Query report

Notes

18-23

Produce Common Reports


Assessment 4 What can you do to an existing report to further narrow the results? a b c d Filter the report. Publish the report using a nested query. Create a subreport with new criteria. Remove fields from the existing report.

Notes

18-24

Partner Certification Student Workbook

Produce Common Reports Module Summary

Slide 18-14

Module Summary
You should now be able to:

Create a New Report Customize a Report Schedule and Publish a Report Create a Query-based Report Filter a Report Schedule and Publish a Report to an Ingres Table Create a Report Using Active Directory Information Create a Remote Control Report

Reports enable your client to have up-to-date information on many aspects of their operation. Using Unicenter DSM Reporter, your client can create customized reports or choose from an array of pre-existing reports. Using queries and filtering, they can specify required data and prevent unnecessary information appearing in the final view. Reports enable your client to find the specific data they need. In the next module, you will use the Web Console to perform administrative tasks from a remote computer.

Notes

18-25

Produce Common Reports


Module Summary

Notes

18-26

Partner Certification Student Workbook

19
Add an Enterprise Domain Manager

19-1

Add an Enterprise Domain Manager


Module Objectives
Slide 19-1

Module Objectives
After this module, you will be able to:

Browse the Enterprise Domain Join a Domain to the Enterprise Domain Distribute Software from the Enterprise Domain to the Local Domain Replicate Objects from the Enterprise Domain to the Local Domain Deploy Software from the Enterprise Domain

Module Overview
A Unicenter DSM Enterprise domain further enables your client to manage their assets remotely. Your client can not only enforce policies and procedures remotely but also check records consistently throughout the entire organization. A Unicenter DSM Enterprise domain also remotely manages software, groups, and queries throughout your clients networks. Your client can, for example, deploy or distribute software to the local domain level; therefore, your clients network administrators can save time and also reduce help desk requests for new versions of commonly used software.

Notes

19-2

Partner Certification Student Workbook

Add an Enterprise Domain Manager Task 1: Browse the Enterprise Domain

Slide 19-2

Task 1: Browse the Enterprise Domain


Unicenter DSM has two management tiers, the local domain and the Enterprise domain. In situations where multiple domains are deployed in an organization, an Enterprise domain can be installed to provide a single point of management. Only one Enterprise domain can exist in a Unicenter DSM environment.

Slide 19-3

The instructor has installed the Enterprise domain on the second instructor computer. By opening an additional Unicenter DSM Explorer, it is possible to browse several domains using this method. However, in this task, you will only explore the Enterprise domain.

Interactive Demonstration
Task Purpose: Browse the Enterprise from the domain. 1 2 3 Right-click DSM Explorer and choose Browse Domain. The Browse Domain dialog appears. Type instructorcomputername in the Manager host-name or IPaddress field. Click OK. If authentication is required, a DSM Explorer - Login dialog appears.

Task Summary
You have browsed the Enterprise domain with Unicenter DSM Explorer. Your clients users can explore any domains available through Unicenter DSM Explorer. This enables them to acquire information about the composition of these domains. In the next task, your instructor will demonstrate how to join a domain to the Enterprise domain.

Notes

19-3

Add an Enterprise Domain Manager


Task 2: Join a Domain to the Enterprise Domain
Slide 19-4

Task 2: Join a Domain to the Enterprise Domain


A Unicenter DSM domain is the central point of management for Unicenter DSM components. To be managed centrally by the Enterprise domain, a local domain must join the Enterprise domain.

Demonstration
Task Purpose: Join a domain to the Enterprise domain. 1 2 3 4 5 6 7 8 9 In the Enterprise DSM Explorer, in the left pane, expand Control Panel. Expand Domains. Right-click All Domains and choose New Domain. The New Domain Wizard dialog appears. Type localDSMservername in the Specify the name or address of a Domain Manager field. Click Next. The Finish page appears with the message that connection to the domain manager was successful. To close the wizard, click Finish. Select All Domains. In the right pane, the newly connected domain appears. In the left pane, expand Domain\Computers and Users. Select All Computers. In the right pane, a list of all computers in the domain appears.

Notes

19-4

Partner Certification Student Workbook

Add an Enterprise Domain Manager Demonstration

10 In the local DSM Explorer, in the left pane, right-click Domain and choose Properties. The Domain Properties dialog appears. 11 Select the Enterprise tab. This tab contains the Enterprise name and the date on which it was created.

Task Summary
You have joined a domain to the Enterprise domain. You clients local domains can be effectively managed as members of a central Enterprise domain. This improves control and uniformity of tasks as software deployment. Local domains throughout the organization can operate at the same level of efficiency and providing your client with faster, more accurate results. In the next task, your instructor will demonstrate how to distribute software from the Enterprise domain to a local domain.

Notes

19-5

Add an Enterprise Domain Manager


Task 3: Distribute Software from the Enterprise Domain to the Local Domain
Slide 19-5

Task 3: Distribute Software from the Enterprise Domain to the Local Domain
To help ensure the consistency of registered applications in each local domain, your client can distribute software from the Enterprise domain manager down to the local domains by using orders.

Slide 19-6

Distribution containers contain a limitless number of these orders. The orders can be to perform any of the following actions automatically at the domain:

Register an item or item procedure in a domain software package library Install or uninstall a program Activate or cancel an activation order Deregister and remove programs Fetch files from the domain Register or deregister a software policy on the domain Archive or purge and restore library items

Slide 19-7

These actions occur in the order in which they are listed in the distribution container.

Demonstration
Task Purpose: Distribute software from the Enterprise domain to the local domain. 1 2 3 4 On your desktop, double-click the ClassFiles folder and navigate to Apps\Usd\Packaged. From the folders list, select Cnotepad and Cwordpad using SHIFT. Right-click this group and choose Copy. In the Enterprise DSM Explorer, in the left pane, expand Software/ Software Package Library.

Notes

19-6

Partner Certification Student Workbook

Add an Enterprise Domain Manager Demonstration

5 6 7

Right-click All Software and choose Paste package(s). Select All Software and expand Jobs.

Folder(s) to Import SW

Right-click Software Distributions and choose New Software Staging Distribution Job. The Software Storage Package Wizard dialog appears. Click Next. The Packages selection page appears. From the Software Packages list, expand All Software.

8 9

10 Scroll down and select Cetus_CNotepad (SXP) 3.0/00 and Cetus_CWordpad (SXP) 3.0/00. 11 Click Next. The Domains selection page appears. 12 From the Domains list, select All Domains. 13 Click Next. The Scalability Servers selection page appears. 14 From the Scalability Servers list, select All Scalability Servers. 15 Click Next. The Finish page appears. 16 Click Finish. A prompt appears with the message that you have not entered a job container. To have the system assign a container name, click Yes. 17 In the Enterprise DSM Explorer, in the left pane, expand Software Distributions. 18 Select All Scalability Servers [current date earliest time]. In the right pane, the domains are listed. Monitor the distribution status. After a few minutes, the status is Executed OK. You have distributed software from the Enterprise domain to the local domain. You can confirm that the deployment was successful by looking for the software in the software package library.

Notes

19-7

Add an Enterprise Domain Manager


Demonstration

Demonstration
Task Purpose: Confirm software distribution. 1 In the local DSM Explorer, in the left pane, expand Software\Software Package Library. In the right pane, the list of all software in the domain appears. Verify that CNotepad and CWordpad have been distributed from the Enterprise and are now registered in the local library. Right-click CNotepad and choose Properties. Notice the Filed by field indicates Enterprise Administrator.

When you see Enterprise Administrator, you know that you have successfully distributed software from the Enterprise domain.

Task Summary
You have distributed software from the Enterprise domain. Each of your clients local domains can now be updated uniformly with the applications that the organization requires for the most efficient and productive business practices. The Enterprise domain manager automatically gathers and shares information about newly added domains through replication. In the next task, your instructor will demonstrate how to replicate objects from the Enterprise domain to a local domain.

Notes

19-8

Partner Certification Student Workbook

Add an Enterprise Domain Manager Task 4: Replicate Objects from the Enterprise Domain to the Local Domain

Slide 19-8

Task 4: Replicate Objects from the Enterprise Domain to the Local Domain
When a local domain manager is connected to an Enterprise domain manager, a replication job is automatically created and linked to the system engine in the domain manager. The engine runs this job immediately to replicate the data from the local domain manager to the Enterprise domain manager. Data is also replicated from the Enterprise domain manager to the local domain manager. By default, this job is scheduled to run continually. However, by creating a group on the Enterprise domain, you can manually initiate Replication.

Slide 19-9

The following table lists the database objects that are replicated down from the Enterprise domain to the local domain and upward from the local domain to the Enterprise domain: Object Discovered Computers Discovered Users Discovered Computer Users (relations between computer and users) External Assets Definitions External Assets Computers General Inventory External Assets Inventory Query Definitions Group Definitions Replication Direction up up up down up up up down down

Notes

19-9

Add an Enterprise Domain Manager


Demonstration Replication Direction down down up down up down up

Object Group Membership Custom Made Software Definitions Computers Software Inventory (found based upon signature scan) Asset Management Jobs Asset Management Job Status Asset Management Modules Asset Management Modules Status

Asset Management Configuration File Definitions down Asset Management Configuration Files Asset Management Template Definitions Asset Management Policy Definitions up down down

Demonstration
Task Purpose: Create a group from the Enterprise domain to initiate the replication of the group definition and membership. 1 In the Enterprise Unicenter DSM Explorer, in the left pane, right-click Computers and Users and choose New Group. The New Group dialog appears. Type Deploy CNotepadyourinitials in the Name field and click OK.

Notes

19-10

Partner Certification Student Workbook

Add an Enterprise Domain Manager Demonstration

3 4

In the left pane, drag-and-drop your Unicenter DSM servername to the new group. In the left pane, select Deploy Notepadyourinitials. After a few minutes, the group and members are replicated down to the local managers.

Task Summary
You have caused the replication of objects by creating a new group. The Enterprise domain manager automatically replicated the name and membership of that group to the local domain managers. This exchange of data between the Enterprise domain manager and the local domain manager means that changes to either domain will be communicated and updated regularly. In the next task, your instructor will demonstrate how to deploy software from the Enterprise domain.

Notes

19-11

Add an Enterprise Domain Manager


Task 5: Deploy Software from the Enterprise Domain
Slide 19-10

Task 5: Deploy Software from the Enterprise Domain


To deploy software from the Enterprise domain to the agents, the software procedure must be sent through groups at the Enterprise domain. This allows a single point of control for installation of applications in the Enterprise domain.

Demonstration
Task Purpose: Deploy software from the Enterprise domain. 1 Right-click Software Distributions and choose New Software Deployment Distribution Job. The Deploy Software Package Wizard dialog appears. Click Next. The Packages and Procedures selection page appears. From the Software Packages and Procedures list, expand All Software. Scroll down and select Cetus_CNotepad (SXP) 3.0/00. Click Next. The Domains selection page appears. From the Domains list, select All Domains. Click Next. The Targets selection page appears. From the Targets list, select Deploy CNotepadyourinitials. Click Next. The Finish page appears.

2 3 4 5 6 7 8 9

10 Click Finish. A prompt appears with the message that you have not entered a job container. To have the system assign a container name, click Yes. 11 In DSM Explorer, in the left pane, expand Software Distributions. 12 Under Software Distributions, select Deploy CNotepadyourinitials [current date]. 13 Monitor the distribution and deployment of the job. The job runs on your local domain manager. When prompted to do so, choose Run.

Notes

19-12

Partner Certification Student Workbook

Add an Enterprise Domain Manager Task Summary

Task Summary
You have deployed software from the Enterprise domain. Not only does your client save time and effort, but they can also maintain consistency more efficiently by making such deployments to all local domains in the organization, with the Enterprise domain as the single point of control. Local domains receive uniform software deployments so your client can help ensure that all domains are updated with the most recent and useful applications without frequent, numerous help desk tickets.

Notes

19-13

Add an Enterprise Domain Manager


Assessment

Assessment
1 To how many Enterprises can a local domain manager report? a b c d 2 One Two Unlimited As many as the number of local domains

How many orders can a distribution container hold? a b c d One Two Unlimited As many as the number of local domains

What determines the order in which actions in the distribution container are carried out? a b c d The size of the Enterprise domain The date on which the action was created The date on which the container was populated The order in which they are listed in the container

Notes

19-14

Partner Certification Student Workbook

Add an Enterprise Domain Manager Assessment

Which engine runs the replication job? a b c d The local engine in any scalability server The system engine in the domain manager The local engine in the local domain manager The system engine in the Unicenter DSM Reporter

Notes

19-15

Add an Enterprise Domain Manager


Module Summary
Slide 19-11

Module Summary
You should now be able to:

Browse the Enterprise Domain Join a Domain to the Enterprise Domain Distribute Software from the Enterprise Domain to the Local Domain Replicate Objects from the Enterprise Domain to the Local Domain Deploy Software from the Enterprise Domain

You have browsed the Enterprise domain with Unicenter DSM Explorer and joined a local domain to the Enterprise domain. You have managed local domains with the Enterprise domain by deploying software and replicating objects. Your client can save administrative time and effort by employing a central management point for many local domains in the organization. In the next module, you will deploy Unicenter Patch Management.

Notes

19-16

Partner Certification Student Workbook

20
Deploy Unicenter Patch Management

20-1

Deploy Unicenter Patch Management


Module Objectives
Slide 20-1

Module Objectives
After this module, you will be able to:

Install Unicenter Patch Management Execute the Patch Management Process Create Patch Policy for Production Deployment Run Pre-existing Reports Customize the User Interface Create a Patch Filter

Module Overview
Your client requires computers in their organization to be maintained with the most current patches from various vendors. Because patches are released with increasing frequency, being proactive in patch management is crucial for your client to remain current and competitive. Manual patch management is errorprone. Unicenter Patch Management enables your client to avoid costly mistakes. In this module, you will install and deploy Unicenter Patch Management. You will create patch policy and run pre-existing reports. You will also configure the user interface to your specific needs and create a patch filter.

Notes

20-2

Partner Certification Student Workbook

Deploy Unicenter Patch Management Task 1: Install Unicenter Patch Management

Slide 20-2

Task 1: Install Unicenter Patch Management


Unicenter Patch Management is a dedicated solution for managing software patches in heterogeneous environments. Unicenter Patch Management uses the capabilities of Unicenter Software Delivery and Unicenter Asset Management or Unicenter DSM. It automates the identification, gathering, packaging, deployment, and ongoing validation of patches and the related software configuration changes throughout the enterprise.

Slide 20-3

There are two primary components of Unicenter Patch Management:

Unicenter Patch Management: This resides on your system and provides a wizard-driven user interface to simplify the patch management process package creation, testing, enterprise deployment, and patch-level assurance. The CA Online Content Service: This checks for available patches, gathers the available patch data, and validates and identifies dependencies. These tasks are performed before publishing and distributing the patch information to the Unicenter Patch Management server.

Notes

20-3

Deploy Unicenter Patch Management


Task 1: Install Unicenter Patch Management This graphic illustrates the relationship among Unicenter Patch Management, Unicenter Software Delivery, and Unicenter Asset Management:
Slide 20-4

Notes

20-4

Partner Certification Student Workbook

Deploy Unicenter Patch Management Interactive Demonstration

Interactive Demonstration
Task Purpose: Install and configure Unicenter Patch Management. Unicenter Patch Management must first be installed from your desktop. 1 2 3 4 5 Navigate to the D:\ClassMedia\UPM folder. Double-click the Setup.exe file. The InstallShield Wizard for Unicenter Patch Management dialog appears. Click Next. The License Agreement page appears. Read the agreement and click I Agree. The Customer Information page appears. Accept the default settings and click Next. The Select Features page appears. By default, Patch Management Application and Product Documentation are selected. Click Next. After the wizard runs a prerequisites check, the MDB Database Configuration page appears. By default, Local is selected. Unicenter Patch Management will connect to a local MDB. 7 Accept the selection and click Next. By default, Ingres is selected as the provider of the database to which Unicenter Patch Management will connect. 8 9 Accept the selection and click Next. The UPMAdmin and UPMUser Passwords page appears. Under Administrator, type edu2k in the Password and Confirm Password fields.

10 Under User, type edu2k in the Password and Confirm Password fields. 11 Click Next. The DSM Webservice Configuration page appears. 12 Type local administrator credentials in the DSM UserID and Password fields.

Notes

20-5

Deploy Unicenter Patch Management


Interactive Demonstration 13 Click Next. The Install Location page appears. 14 Click Next. The Start Installation page appears. 15 Click Install. The installation can take a few minutes. The InstallShield Wizard page appears. 16 Select Yes, I want to restart my computer now. 17 Click Finish.

Configure Unicenter Patch Management


18 After your computer has restarted, click Start and then choose Programs Computer Associates Unicenter Unicenter Patch Management Launch UPM. The Unicenter Patch Management Log In dialog appears. 19 Type Administrator in the User Name field. Note: This is case-sensitive.

20 Type upm in the Password field and press ENTER. The Unicenter Patch Management window appears. 21 Select the Administration tab. 22 Type usilis03.ca.com in the HTTP Proxy field. 23 Type 80 in the Port field. 24 Click Use Above Proxy Settings For HTTP and FTP. 25 In the No Proxy For field, type the ipaddress;computername;computername.domainname for your Unicenter DSM server. 26 Click Save. 27 Select the Dashboard tab. The Unicenter DSM Service reports Active.

Notes

20-6

Partner Certification Student Workbook

Deploy Unicenter Patch Management Task Summary

Task Summary
You have installed Unicenter Patch Management. As you saw, part of the installation process is configuration. Unicenter Patch Management automates the identification, gathering, packaging, deployment, and ongoing validation of patches and the related software configuration changes throughout the enterprise. Therefore, your clients employees are not required to spend time manually keeping the organizations computers up-to-date with the latest patches. In the next task, you will execute the patch management process.

Notes

20-7

Deploy Unicenter Patch Management


Task 2: Execute the Patch Management Process
Slide 20-5

Task 2: Execute the Patch Management Process


The dedicated 24 hours a day, 7 days a week CA Online Content Research team manages a central repository of software patch information. The team monitors the availability of software patches and is responsible for researching and validating those patches before publishing the related patch information to the central software information repository. The resulting patch information and metadata is automatically distributed to Unicenter Patch Management, which enables customers to proactively manage the patch process.

Slide 20-6

The patch management process has a series of steps: 1 2 3 4 5 Review the list of potential patches provided by the CA Online Content Service team. Accept patches to download. Deploy accepted patches to selected targets for testing. Approve the patches that have been successfully tested. Deploy approved patches to additional targets or add to patch policies for automatic deployment to the enterprise or target groups.

Slide 20-7

The CA content teams patches include:


Microsoft Windows Service Packs for Windows 2000, Windows XP, Windows Server 2003 (English, French, Italian, German, Spanish, Japanese) Full Security Roll-up Packages for Windows 2000, Windows XP, Windows Server 2003 (English) (available Jan/Feb 06 - French, Italian, German, Spanish, Japanese) Individual Security Updates for Windows NT 4.0, Windows 2000, Windows XP, Windows server 2003 (English) Microsoft Internet Explorer 6 Security Updates (English)

Notes

20-8

Partner Certification Student Workbook

Deploy Unicenter Patch Management Task 2: Execute the Patch Management Process


Slide 20-8

Microsoft Office 2003 Service Packs (English) CA Unicenter Patch Management r11 Patches

When necessary, Microsoft provides a new security update on the second Tuesday of each month and issues a bulletin announcing the update. These updates are consolidated into CA Hot-Fix Roll-up patches by the CA Content Team and are made available to Unicenter Patch Management subscribers. These roll-up patches enable the Unicenter Patch Management administrators to receive all patches in one package rather than accepting and downloading the patches individually. Unicenter Patch Management identifies superseded patches and all the prerequisites of those patches. If you have created a policy that contains superseded patches, CA will automatically replace those patches with the new ones when the superseding patches are approved. Unicenter Patch Management is a repository for information about patches. It stores information that identifies the affected software, release, and impacted files. It also identifies how a patch relates to other patches and applications. Your client can identify the patches that are most suitable to their environment and can select and accept the patches they require. After a patch has been accepted, Unicenter Patch Management establishes a link to the relevant vendor's website, downloads the patch content from the vendor, and then displays the patch in the Patches Pending Testing portlet. The patch is then deployed to selected targets for testing. When it is verified that the patch functions correctly, it can be approved for deployment to additional targets. For up-to-date information on available Unicenter Patch Management patches, visit the Unicenter Patch Management Information Center at: http://www3.ca.com/udm/upm/

Slide 20-9

Notes

20-9

Deploy Unicenter Patch Management


Interactive Demonstration

Interactive Demonstration
Task Purpose: Accept a patch. 1 In the Unicenter Patch Management window, on the Dashboard tab, from the Patches Pending Acceptance list, select a patch provided by your instructor package. The Patch Details window appears. In the left pane, under Detailed Patch Information, select Supersedes. Patches that are superseded by this patch are displayed. In the left pane, select Identification. A list of general details appears. In the right pane, in the General area, the patch Status is Pending User Acceptance. Accept is the default value in the Actions list. Verify this value and click Go. The status changes to Accepted. Click Done. The Dashboard tab appears.

2 3 4

You have accepted the patch. Unicenter Patch Management will now set up groups and software packages for this patch on the Unicenter DSM server. It will then download the patch from the content server. After this occurs, the patch will appear in the Patches Pending Testing portlet. This process can take several minutes depending on the number of files included in the patch. The progress can be monitored by selecting Patches in the left pane and Filter by Accepted or Packaging. Select Files and view the status of the download. Next, the patch must be tested.

Interactive Demonstration
Task Purpose: Test the patch. 1 2 3 On the Dashboard tab, from the Patches Pending Testing list, select the previously accepted patch. The Patch Details window appears. In the left pane, under Advanced Options, select Test Patch. The Deploy Patch: Select Targets window appears. Under Available Targets, from the All Targets list, select the workstation name provided by your instructor.

Notes

20-10

Partner Certification Student Workbook

Deploy Unicenter Patch Management Interactive Demonstration

4 5 6 7 8

Click the right arrow. The workstation name provided by your instructor appears in the Selected Targets field. Click Next. The Deploy Patch: Schedule Deployment window appears. Accept the default Deploy Patch Now selection and click Next. The Deploy Patch: Confirm Deployment window appears. Click Finish. The Patch Details window appears. In the left pane, under Advanced Options, select Deployment Status. The Dashboard tab appears. Notice the patch deployment Status is In Progress. Select the Deployment Id.

10 In the left pane, select Targets. In the right pane, a list of target computers appears. 11 In the right pane, select the workstation name provided by your instructor. The Machine details window appears. 12 Click Unicenter AMS. 13 Click UPM. The Deployment window appears. 14 In the left pane, select General. In the right pane, the General Deployment Information appears. 15 Click Done. The Dashboard tab appears. The Unicenter Patch Management group, software package, and software job can be viewed in the Unicenter DSM Explorer. You have tested the patch. Next, you will approve a patch.

Notes

20-11

Deploy Unicenter Patch Management


Interactive Demonstration

Interactive Demonstration
Task Purpose: Approve a patch. 1 2 3 4 5 Select the Patches tab. From the Filter By list, select Testing and click Go. From the Patch Name list, select the tested patch. From the Select and list, select Approve and click Go. From the Filter By list, select Approved and click Go.

Skill Practice
Task Purpose: Accept, test, and approve a Microsoft patch for Windows 2000 Professional. 1 2 3 Accept a patch. Test the patch. Approve the patch.

Task Summary
In the patch management process, a patch must be accepted for download, tested, and approved for deployment. Unicenter Patch Management automates the patch management process for your client. This automation reduces the errors that can be caused by manual management processes. Your client saves time that would have been spent correcting these errors. In the next task, you will prepare for deployment by creating a patch policy.

Notes

20-12

Partner Certification Student Workbook

Deploy Unicenter Patch Management Task 3: Create Patch Policy for Production Deployment

Slide 20-10

Task 3: Create Patch Policy for Production Deployment


Patch policies apply to groups of target computers that are associated with certain software components and related patches. Unicenter Patch Management identifies target computers that do not comply with the guidelines set out by their corresponding patch policy. The target computers are checked continuously to ensure they have the indicated patches installed. If not, the patches are automatically deployed to those computers.

Slide 20-11

Patches must be added to specific patch polices to ensure the patch is distributed to the target computers in the patch policy. When checking for compliance, Unicenter Patch Management identifies noncompliant computers as exceptions. This helps ensure target computers comply with guidelines set out by their corresponding patch policy. Patch policies help ensure that your clients computers are compliant with current and required patches. Your client is protected from the acceptance or deployment of patches that are inappropriate or even dangerous for their computers.

Interactive Demonstration
Task Purpose: Add a patch to a policy. 1 2 3 4 5 6 Select the Policies tab. Click Add. The Policy Detail window appears. Type UPM Patch Policy in the Name field. Click Select. The Software List window appears. From the Filter By list, accept the default Show All and click Go. The window refreshes. From Software with approved patches list, select the software provided by your instructor.

Notes

20-13

Deploy Unicenter Patch Management


Interactive Demonstration 7 8 9 Click OK. The Policy Detail window appears. Click Add. The Patches window appears. From the Patches list, select the approved patch.

10 Click Add Selected. The window refreshes. Above the Patches list, the message Confirmation: The selected patches were added successfully appears. 11 Click OK. The Policy Detail window appears. You have added a patch to a policy. Next, you will identify compliance.

Interactive Demonstration
Task Purpose: Identify compliance to patch policy. 1 In the Policy Detail window, click OK. The Policies tab appears. The status of the UPM Patch Policy is Building. After the policy has finished evaluating, the status is Violation. From the Actions menu for the UPM Patch Policy, select View and then click Go. The Policy Detail window appears. In the left pane, under Advanced Options, select Policy Compliance. The # of Violations column indicates there are violations. Click Details. Computers that do not meet the policy are indicated. Click Done.

2 3 4 5

Skill Practice
Task Purpose: Create patch policy for production deployment of the Microsoft Windows 2000 Professional approved patch. Use this Microsoft patch. 1 2 Add a patch to a policy. Identify compliance to patch policy.

Notes

20-14

Partner Certification Student Workbook

Deploy Unicenter Patch Management Task Summary

Task Summary
You have added a patch to a policy and identified compliance to the patch policy. Patch policies help ensure target computers comply with guidelines set out by their corresponding patch policy. If the computers do not comply, the patches are automatically deployed to those computers. Unicenter Patch Management requires patches that are tested and approved, and protect your client from the acceptance or deployment of patches that are inappropriate or even dangerous for their computers. In the next task, you will run pre-existing reports to gather information about deployed patches.

Notes

20-15

Deploy Unicenter Patch Management


Task 4: Run Pre-existing Reports
Slide 20-12

Task 4: Run Pre-existing Reports


Unicenter Patch Management provides predefined reports to obtain detailed information about patch deployment. Reports can be viewed through a browser. All data displayed in a report reflects the status of patch management at the time that report was run. Reports can be modified but not deleted. They must be scheduled and cannot be executed on demand. They can show the status of patches, computers, events, and software applications. This enables your client to maintain accurate inventory information related to patches. The following table identifies the 13 predefined reports: Report Name Active Patches, Listed By Severity Policy Exception Description Order Displayed

Slide 20-13

Identifies a list of all By patch severity active patches and By patch name groups them by severity Displays computers that are an exception to a patch policy
By software By patch policy within

that software

By computer within

that patch policy computer

By patch within that

Deferred Patches, Listed By Severity

Shows a list of all deferred patches

By patch severity By patch name

Notes

20-16

Partner Certification Student Workbook

Deploy Unicenter Patch Management Task 4: Run Pre-existing Reports

Report Name Downloads, Listed By Day

Description Displays a list of downloads that have been scheduled, grouped by the date the download was completed Displays a list of downloads that have been scheduled, grouped by the status of the download Displays a list of Unicenter Patch Management events that have occurred, grouped by event type Shows a list of all inactive patches, grouped by severity Displays a list of Unicenter Patch Management events that occurred in the previous day, grouped by event type

Order Displayed
By the completed date

(in descending order) download file

By the name of the

Downloads, Listed By Status

By the status of the

download

By the date the

download was completed (in descending order)

Events, Listed By Type

By event type By the date and time

the event was posted (in descending order)

Inactive Patches, Listed By Severity Last Day's Events, Listed By Type

By patch severity By patch name By event type By the date and time

the event was posted (in descending order)

Notes

20-17

Deploy Unicenter Patch Management


Task 4: Run Pre-existing Reports Report Name Patches Needed And Patches Applied, Listed By Patch Description Provides a list of current patches and identifies which systems already have the patch installed Provides a list of current patches and identifies how many copies of those patches have been applied Provides a list of current patches and identifies which computers still require the patch to be installed Provides a list of software applications detected and identifies which patches have not been applied for each of those applications Provides a list of current patches and identifies how many copies of those patches have not been applied Order Displayed
By patch name By patch version label By computer name By patch name By patch version label By computer name

Count of Patches Needed and Applied, Listed By Patch

Patches Needed But Not Applied, Listed By Patch

By patch name By patch version label By computer name

Patches Needed But Not Applied, Listed By Software

By software By patch within that

software

Count of Patches Needed And Not Applied, Listed By Patch

By patch name By patch version label By computer name

Notes

20-18

Partner Certification Student Workbook

Deploy Unicenter Patch Management Interactive Demonstration

Interactive Demonstration
Task Purpose: Run pre-existing reports. 1 2 On the Dashboard tab, select Reports. The Reports list appears. From the Reports list, under Actions for the Active Patches, Listed by Severity report, click View published report Report window appears. 3 4 5 6 To view a chart of the report, select Chart View. Click Done. The Reports list appears. From the Reports list, under Actions for the Active Patches, Listed by Severity report, click Edit report configuration Patches, Listed by Severity window appears. 7 8 .The Report Active . The Generated

To view report details, scroll down the Report View list.

Under Schedule, from the Days list, press SHIFT and select Monday, Tuesday, Wednesday, Thursday, and Friday. Click OK. The Reports list appears. To go to the end of the Reports list, at the right side of the window, click the double chevron (). To go to the beginning of the Reports list, at the right side of the window, click the double chevron ().

From the Reports list, under Actions for the Events, Listed by Type report, select View published report. The Generated Report window appears.

10 To view report details, scroll down the Report View list. 11 To view a chart of the report, select Chart View. 12 Click Done.

Notes

20-19

Deploy Unicenter Patch Management


Skill Practice

Skill Practice
Task Purpose: Run pre-existing reports. 1 View the downloads listed by Status.

Task Summary
You have run pre-existing reports and have viewed the report details and the related graphs. Reports provide your client a means to view the status of patches, computers, events, and software applications. This enables your client to maintain accurate inventory information related to patches. Time and effort can be saved when this information is needed quickly. In the next task, you will customize the user interface.

Notes

20-20

Partner Certification Student Workbook

Deploy Unicenter Patch Management Task 5: Customize the User Interface

Slide 20-14

Task 5: Customize the User Interface


Customizing the user interface helps your client to use the full functionality of Unicenter Patch Management to suit their needs. The most frequently used interface settings can be made more accessible for faster task execution.

Slide 20-15

You can edit the following aspects of the Unicenter Patch Management user interface:

User Settings Dashboard Summary Portlet Settings Table Settings Filter Settings

Interactive Demonstration
Task Purpose: Create a user. 1 2 3 4 5 6 Select the Administration tab. Select User Management. The Users area appears. Click Add. The User window appears. Type yourname in the User Name field. Type password in the Password and Confirm New Password fields. Click OK. The Users list appears with the user name you created.

You have created a user. Next, you will log in.

Notes

20-21

Deploy Unicenter Patch Management


Interactive Demonstration

Interactive Demonstration
Task Purpose: Log in as a user. 1 2 3 4 5 Click Log In. The Log In dialog appears. Type yourname in the User Name field. Type password in the Password field. Click Log In. The AutoComplete dialog appears. Click No. You are logged in to Unicenter Patch Management as yourname. The Dashboard tab appears.

You have logged in. Next, you will change the table settings.

Interactive Demonstration
Task Purpose: Change table settings for patches. 1 2 3 Click My Profile. The My Profile window appears. In the left pane, select Table Settings. In the right pane, from the Tables list, under Action for the Patches table, click Edit table preferences appears. 4 5 6 . The Table Detail window

From the Rows Per Page list, select 20. From the Default Filter list, select Pending User Acceptance. Click OK. The My Profile window appears.

Notes

20-22

Partner Certification Student Workbook

Deploy Unicenter Patch Management Task Summary

Task Summary
You have created a user, logged in as that user, and changed table settings. Customizing the user interface of Unicenter Patch Management enables your client to configure Unicenter Patch Management to meet their specific needs. This flexibility enables fast and accurate completion of patch management tasks. In the next task, you will create a patch filter.

Notes

20-23

Deploy Unicenter Patch Management


Task 6: Create a Patch Filter
Slide 20-16

Task 6: Create a Patch Filter


Your client requires the ability to quickly determine what kind and version of patches their organization is using. Filters enable your client to sort a list of items by specific categories. This makes searching and selecting more efficient.

Slide 20-17

You can set filters for:


Software Patches Deployments Policies Groups Computers

Slide 20-18

You can create filters to sort by:


Manufacturer Language Attributes Creation date

You can further specify the order in which the results are displayedby name, manufacturer, version label, or version number.

Interactive Demonstration
Task Purpose: Create a patch filter. 1 2 3 In the My Profile window, in the left pane, under Filter Settings, select Patches. In the right pane, the Patch Filters list appears. Click Add. The Patch Filter Detail window appears. Type Microsoft XP in the Filter Name field.

Notes

20-24

Partner Certification Student Workbook

Deploy Unicenter Patch Management Skill Practice

4 5 6 7 8 9

Type %XP% in the Patch Name Mask field. To select the mask, click the right arrow. %XP% appears in the larger field at the right of the window. Click the Filter By Manufacturers arrow. Type Micro% in the Mask field and click Go. The window refreshes. From the Available list, select Microsoft Corporation. Click the right arrow. Microsoft Corporation appears in the Selected list.

10 Click OK. The My Profile window appears. 11 Click Save. 12 To exit the My Profile window, click Done. The Dashboard tab appears. 13 Select the Patches tab. 14 From the Filter By list, select Microsoft XP and click Go. In the Patches list, the filter results appear.

Skill Practice
Task Purpose: Create a patch filter. 1 2 Create a patch filter for Administrator - CA products with hot in the name. Use the CA Content Team as the manufacturer.

Skill Practice
Task Purpose: Configure table settings. 1 2 3 Change the default filter for the Patches table to Accepted. Save the settings. Verify that the Accepted filter is the default.

Notes

20-25

Deploy Unicenter Patch Management


Task Summary

Task Summary
You have created a patch filter. Other kinds of filters can be created, and each can help your client refine search criteria, saving search time and improving accuracy. Your client can quickly determine what kinds and versions of patches their organization is using at any time. This makes planning for future upgrades and software acquisitions that will require the correct patches more costeffective.

Notes

20-26

Partner Certification Student Workbook

Deploy Unicenter Patch Management Skill Builder: Deploy a Microsoft Patch

Skill Builder: Deploy a Microsoft Patch


Business Problem
A customer has a critical Microsoft patch that must be deployed globally. Assist them in testing this patch using the patch management process.

Hint
Use the CA Content Team as the manufacturer.

Notes

20-27

Deploy Unicenter Patch Management


Assessment

Assessment
1 Which two processes does Unicenter Patch Management automate? (Choose two.) a b c d e 2 Deleting Gathering Rebooting Forwarding Identification

Which task must you perform first before executing patch management? a b c d Accept patches. Distribute patches. Approve tested patches. Review a list of potential patches.

Which statement describes patch policies? a b c d Patch policies are groups of patches that must be approved. Patch policies apply to groups of computers to which data must be transferred. Patch policies apply to groups of patches that have been approved and are available for deployment. Patch policies apply to groups of target computers associated with certain software components and related patches.

Notes

20-28

Partner Certification Student Workbook

Deploy Unicenter Patch Management Assessment

Which statement is accurate about reports? a b c d Reports can be modified and deleted. Reports can be deleted, but not modified. Reports can be scheduled and run manually. Reports can be modified and must be scheduled.

Which aspect of the Unicenter Patch Management user interface can you configure? a b c d Patch settings Policy summary Password settings Dashboard summary

Which two items can you set filters for? (Choose two.) a b c d e Date Patches Software Filter name Manufactures

Notes

20-29

Deploy Unicenter Patch Management


Module Summary
Slide 20-19

Module Summary
You should now be able to:

Install Unicenter Patch Management Execute the Patch Management Process Create Patch Policy for Production Deployment Run Pre-existing Reports Customize the User Interface Create a Patch Filter

Unicenter Patch Management automates patch management and enables your client to effectively deploy patches and validate resulting software configuration changes throughout the organization. This consistent configuration enables computers to operate effectively and alleviates the burden of IT departments as they no longer need to constantly monitor software patches. Filtering enables quick searches for specific patch information. Your client can now effectively maintain the software on their organizations computers with the most current patches from various vendors. In the next module, you will deploy Unicenter Asset Intelligence.

Notes

20-30

Partner Certification Student Workbook

21
Manage Data in Unicenter Asset Intelligence

21-1

Manage Data in Unicenter Asset Intelligence


Module Objectives
Slide 21-1

Module Objectives
After this module, you will be able to:

Position Unicenter Asset Intelligence Install PHP: Hypertext Preprocessor Install Unicenter Asset Intelligence Configure Unicenter Asset Intelligence Import LDAP Data with the Administrative Console Employ Unicenter Asset Intelligence Customize Unicenter Asset Intelligence

Module Overview
Unicenter Asset Intelligence is an asset management solution that enables your client to identify anomalies, avoid unnecessary expenses, assess risk, and comply with industry regulations. Unicenter Asset Intelligence not only organizes and summarizes data gathered by Unicenter Asset Management, but it also presents the information in the most appropriate fashion for the organization. Unicenter Asset Intelligence enables your client to process changes continually across their enterprise and enables compliance with external and internal policies. Unicenter Asset Intelligence provides technology managers with actionable intelligence, enabling them to make smarter choices. In this module, you will position Unicenter Asset Intelligence, install PHP, install Unicenter Asset Intelligence, import LDAP data with the Administrative Console, employ Unicenter Asset Intelligence, and customize Unicenter Asset Intelligence.

Notes

21-2

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Task 1: Position Unicenter Asset Intelligence

Slide 21-2

Task 1: Position Unicenter Asset Intelligence


Unicenter Asset Intelligence automatically converts raw asset data from CA solutions into actionable intelligence so IT executives can quickly and easily make informed business decisions about their IT assets. By providing the necessary executive-level portal view into key performance indicators, Unicenter Asset Intelligence enables busy IT executives to identify opportunities for increased efficiencies and cost savings.

Slide 21-3

Managing Risk
Unicenter Asset Intelligence also assists in managing risk by helping ensure compliance with both internal and external policies, regulations, and industry best practices. By analyzing asset information and providing quick answers through an intuitive interface, Unicenter Asset Intelligence enables organizations with the intelligence to manage IT assets in a proactive and decisive manner.

Slide 21-4

Providing Asset Data


Unicenter Asset Intelligence instantly provides important data such as:

What kind of IT assets you have How many IT assets you have Which assets are unmanaged Where these assets are located and which departments are using them Which assets are underused and can be consolidated Which assets are running unsupported operating systems How the enterprise has changed from the previous month

Slide 21-5

Notes

21-3

Manage Data in Unicenter Asset Intelligence


Providing Asset Data
Slide 21-6

The following graphic illustrates the Unicenter Asset Intelligence architecture:

Task Summary
You have positioned Unicenter Asset Intelligence as a powerful tool that enables the most proactive management and efficient use of your clients IT assets. In the next task, you will install PHP.

Notes

21-4

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Task 2: Install PHP: Hypertext Preprocessor

Slide 21-7

Task 2: Install PHP: Hypertext Preprocessor


PHP is a widely used open source scripting language. PHP is server-side and well suited for web development. It is available on multiple platforms but it is not included in the Unicenter Asset Intelligence installation. The latest release can be downloaded from the www.php.net/ downloads.php website.

Interactive Demonstration
Task Purpose: Install PHP. 1 2 3 4 5 6 7 8 9 Log out as the Unicenter Asset Intelligence domain administrator and log in as the local administrator. On your desktop, double-click Services. The Services dialog appears. From the Services list, select IIS Admin Service. On the toolbar, click Stop Service. The Stop Other Services dialog appears. To stop the other services listed in the dialog, click Yes. Close the Services dialog. On your desktop, double-click the ClassMedia folder. The D:\ClassMedia dialog appears. Open the PHP folder. Double-click the php=5.0.5=installer.exe file. The installation wizard appears.

10 On the Welcome page, click Next. The license agreement page appears. 11 Click I Agree. The Installation Type page appears.

Notes

21-5

Manage Data in Unicenter Asset Intelligence


Interactive Demonstration 12 Accept the default Standard selection and click Next. The Choose Destination Location page appears. 13 Click Next. The Mail Configuration page appears. 14 Click Next. The Server Type page appears. 15 Accept the default Microsoft IIS 4 or higher selection and click Next. The Start Installation page appears. 16 Click Next. The Installing page appears. 17 When the IIS Has been configured dialog appears, click OK. The Installation complete dialog appears. 18 To close the dialog, click OK.

Extract Files
19 In the ClassMedia folder, double-click the php-5.0.5-Win32.zip file. The Winzip - php-5.0.5-Win32.zip dialog appears. 20 Press CTRL and select the php_gd2.dll, php_ldap.dll, ssleay32.dll, libeay32.dll, and php.exe files. 21 Click Extract. The Extract - D:\ClassMedia\PHP\php-5.0.5Win32.zip dialog appears. 22 In the Extract to tree view, expand Local Disk (C)\PHP. Verify that C:\PHP appears in the Extract to field. 23 Clear Use Folder Names. 24 Click Extract. 25 Close the Winzip - php-5.0.5-Win32.zip dialog.

Notes

21-6

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Interactive Demonstration

Move the php.ini File


26 Browse to C:\Windows. 27 Right-click php.ini and choose Cut. 28 Browse to C:\PHP. Paste the php.ini file here.

Uncomment Two Extensions


29 Right-click php.ini and choose Send To Notepad dialog appears. 30 Choose Edit Notepad. The php.ini-

Find. The Find dialog appears.

31 In the Find what field, type extension=php_gd2 and click Find Next. 32 Place your cursor at ;extension=php_gd2.dll and remove the semicolon. 33 Move down to ;extension=php_ldap.dll and remove the semicolon. 34 Choose File Save and close Notepad. 35 Close the C:\PHP dialog.

Add C:\PHP to the System PATH Variable


36 On your desktop, right-click yourcomputername and choose Properties. The System Properties dialog appears. 37 Select the Advanced tab and click Environment Variables. 38 In the System variables list, scroll down and select Path. 39 Click Edit. The Edit System Variable dialog appears. 40 In the Variable value field, place your cursor before C: and type: C:\PHP; 41 Click OK. 42 To close the Environment Variables dialog, click OK.

Notes

21-7

Manage Data in Unicenter Asset Intelligence


Interactive Demonstration 43 To close the System Properties dialog, click OK. 44 On your desktop, open the Command Prompt window. 45 Type path and press ENTER. In the Command Prompt window, the path appears. 46 Close the Command Prompt window.

Update the Web Service Extension to php-cgi.exe


Note: This procedure is required only if installing on a Windows 2003 server. 47 On your desktop, right-click yourcomputername and choose Manage. The Computer Management dialog appears. 48 In the left pane, expand Services and Applications\Internet Information Service. 49 Select Web Service Extensions. 50 In the right pane, under Tasks, select Add a new Web service extension. The New Web Service Extension dialog appears. 51 In the Extension name field, type PHP and then click Add. The Add file dialog appears. 52 Click Browse. The Open dialog appears. 53 From the Look in list, select Local Disk (C). 54 Double-click PHP. 55 From the Files of type list, select CGI exe files (*.exe). 56 Select php-cgi.exe and click Open. The Open dialog closes and the Add file dialog appears. 57 Click OK. The Add file dialog closes.

Notes

21-8

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Interactive Demonstration

58 In the New Web Service Extension dialog, select Set extension status to Allowed and click OK. The New Web Service Extension dialog closes. 59 Close the Computer Management dialog.

Task Summary
You have installed PHP. This is necessary prior to installing Unicenter Asset Intelligence. You are now able to proceed with the steps required to make Unicenter Asset Intelligence a powerful component of your asset management system. In the next task, you will install Unicenter Asset Intelligence.

Notes

21-9

Manage Data in Unicenter Asset Intelligence


Task 3: Install Unicenter Asset Intelligence
Slide 21-8

Task 3: Install Unicenter Asset Intelligence


Unicenter Asset Intelligence comprises a database management component and a web server component. The database management component populates the Unicenter Asset Intelligence tables in the MDB with asset information extracted from your designated data sources. After being added to the Unicenter Asset Intelligence tables in the MDB, user information provides the context needed to map users to the organizational structure. The Unicenter Asset Intelligence web server component provides the means through which the data is accessed. The user performing the installation must belong to the administrator group for the local computer. The Unicenter Asset Intelligence installation is a complete installation. It cannot be applied over an existing Unicenter Asset Intelligence release.

Slide 21-9

Interactive Demonstration
Task Purpose: Install Unicenter Asset Intelligence. 1 2 3 Create two Microsoft Windows users. Type aiowner and aiuser as their names. In the Create New User dialog, type Un1center as the password. Clear User must change password at next logon. Note: 4 5 These users are only required if they are using an Ingres MDB.

On your desktop, double-click the ClassMedia folder. The D:\ClassMedia dialog appears. Double-click the UAI folder. The contents of the folder appear.

Notes

21-10

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Interactive Demonstration

6 7 8 9

Double-click the SETUP.BAT file. The Unicenter Asset Intelligence Product Explorer dialog appears. In the tree view, expand Windows. Select Unicenter Asset Intelligence and click Install. The Choose Setup Language dialog appears. Click OK for the appropriate language. The InstallShield Wizard page appears and installation begins. Note: The Unicenter Asset Intelligence - InstallShield Wizard warning dialog might appear, indicating that Microsoft Java drivers have not been found. Click OK. These are required for a Microsoft SQL installation. The Welcome to the InstallShield Wizard for Unicenter Asset Intelligence page appears.

10 Click Next. The licensing agreement page appears. 11 Scroll down to read the agreement and click I Agree. The Customer Information page appears. 12 Accept the default User Name and Company Name values and click Next. The Choose Destination Folder for Asset Intelligence Program Files page appears. 13 Click Next. The Folder does not exist. Create it? prompt appears. 14 Click Yes. The Choose Virtual Directory Path page appears. 15 Click Next. The Folder does not exist. Create it? prompt appears. 16 Click Yes. The Asset Intelligence Web Server Users page appears. 17 Accept the default Domain Name and User Name values and click Next. The Choose Database Management System page appears. 18 Click Next. The Asset Intelligence Database Credentials page appears.

Notes

21-11

Manage Data in Unicenter Asset Intelligence


Interactive Demonstration 19 Type Un1center in the Password field. 20 Click Test Login. 21 Click Next. The Asset Intelligence MDB Installation Confirmation page appears. 22 Click Next. The Unicenter Asset Intelligence Installation Checklist page appears. 23 Click Next. The Setup Status page appears. Once the installation configuration is complete, the Unicenter Asset Intelligence page appears. 24 To close the wizard, click Finish. 25 To close the Unicenter Asset Intelligence Product Explorer, click Exit. The Exit the Unicenter Asset Intelligence Product Explorer? prompt appears. 26 Click Yes and close the D:\ClassMedia\UAI dialog. 27 Restart the server.

Task Summary
You have installed Unicenter Asset Intelligence. Your client can use the features as they exist when Unicenter Asset Intelligence is first installed. Your client can also configure settings to suit their particular needs. In the next task, you will configure Unicenter Asset Intelligence.

Notes

21-12

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Task 4: Configure Unicenter Asset Intelligence

Slide 21-10

Task 4: Configure Unicenter Asset Intelligence


Unicenter Asset Intelligence collects, reconciles, and aggregates data from one or more Unicenter Asset Management data sources. To use a data source, however, you must identify it through the Administrative Console. The Unicenter Asset Intelligence service will automatically populate and regularly refresh the data in the database. By default, this procedure occurs at 3:00 a.m. daily. However, you can also manually update the database by triggering the Unicenter Asset Management service to run.

Slide 21-11

Interactive Demonstration
Task Purpose: Populate the instructors DSM server with the student workstations. 1 2 Log in to your computer using domain administrator credentials. Right-click the Unicenter DSM systray and choose Common Agent Properties. The DSM Properties - Common Agent dialog appears. Type instructorcomputername in the Registered to server field. To close the dialog, click OK. Right-click the Unicenter DSM systray and choose Common Agent Register. Click Start and choose Log Off administrator. The Log Off Windows dialog appears. Click Log Off. Log in using domain administrator credentials. Right-click the Unicenter DSM systray and choose Asset Management Agent Start Job Check.

3 4 5 6 7 8 9

Notes

21-13

Manage Data in Unicenter Asset Intelligence


Interactive Demonstration You have populated the MDB with asset data on the instructor Unicenter DSM server. Next, you will configure Unicenter Asset Intelligence to use this data.

Interactive Demonstration
Task Purpose: Populate data into Unicenter Asset Intelligence. 1 2 3 4 5 6 7 8 9 Open Internet Explorer. Use Windows Internet Explorer Favorites to open the Asset Intelligence Administrative Console link. Type administrator in the User name field. Type administratorpassword in the Password field. The Administrative Console window appears. From the Select Admin Function portlet, select General Settings. The General Settings window appears. In the Asset Intelligence Database portlet, type Un1center in the aiowner Password field. Type Un1center in the Password field. Click Save. In the Add Data Sources portlet, type instructorcomputername in the Server Name field.

10 Type aiowner in the Username field. 11 Type Un1center in the Password field. 12 Click Connect and then click Save. In the Active Data Sources portlet, the source you have just configured appears. 13 Click Done. 14 Return to your desktop. 15 Double-click Services. The Services dialog appears. 16 Select the Standard tab.

Notes

21-14

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Interactive Demonstration

17 Under Name, double-click CA Unicenter Asset Intelligence. The CA Unicenter Asset Intelligence Properties (Local Computer) dialog appears. 18 Click Stop. 19 Type RunNow in the Start parameters field. 20 Click Start. 21 To close the CA Unicenter Asset Intelligence Properties (Local Computer) dialog, click OK. 22 Close the Services dialog.

Task Summary
You have configured and run the process to populate data from a database source to Unicenter Asset Intelligence. Your client can manually initiate this process at any time. This provides flexibility to make additions to the database without waiting for automatic updates. In the next task, you will import LDAP data with the Administrative Console.

Notes

21-15

Manage Data in Unicenter Asset Intelligence


Task 5: Import LDAP Data with the Administrative Console
Slide 21-12

Task 5: Import LDAP Data with the Administrative Console


Unicenter Asset Intelligence provides user and organizational context to asset details collected by Unicenter Asset Management and displays the results in an easy-to-use web interface. To provide this context, Unicenter Asset Intelligence must obtain the following information:

Slide 21-13

User ID (samid) First name (fn) Last name (ln) Managers User ID (mgr) Company name Department (dept) Location (office)

Note: By default, the organization designation is based on the value supplied for Company name; however, you can change this to Location or Department through the Admin User Interface. If Unicenter Asset Intelligence is unable to identify the owner of an asset, it allocates this asset to a default organization named No Org.
Slide 21-14

The two methods for importing this information into the database tables are with the Administrative Console and the Command Line Interface (CLI).

Notes

21-16

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Interactive Demonstration

Interactive Demonstration
Task Purpose: Customize the organization source. 1 On the Administrative Console, select Define and Import Organizations. The Define and Import Organizations window appears. From the Define Organization Source portlet, click Customize. The Advanced LDAP Interface window appears. In the LDAP Bind portlet, type domainname\administratort2 in the User ID field. Type the administratort2 password in the Password field. Click Connect. In the Extract and Import portlet, click Execute. Click Check Log. Verify that a job is submitted and the Extract Job Status is complete. Click Done. The Define and Import Organizations window appears.

2 3 4 5 6 7 8

Import an Organization
9 In the Add Organization portlet, from the Owner list, select John Stevens - Administrator.

10 Click Save. 11 Click Commit. 12 Click Done. The Administrative Console window appears. 13 From the Internet Explorer Address list, select http://localhost/caai. The Unicenter Asset Intelligence user interface appears. 14 Select the Browse Organization tab. 15 In the left pane, select Organization.

Notes

21-17

Manage Data in Unicenter Asset Intelligence


Skill Practice 16 In the left pane, select John Stevens. 17 In the right pane, click Machine Summary. The All Computers in org of Administrator window appears. 18 Select OS Windows Server 2003, Standard Edition. The OS Windows Server 2003, Standard Edition window appears. 19 Click Done.

Skill Practice
Task Purpose: Configure Unicenter Asset Intelligence. 1 2 3 4 Change your administrator login to report to another user. Run the LDAP utility. Commit the new organization with your new manager. Browse the new organization in the Unicenter Asset Intelligence user interface.

Task Summary
You have configured Unicenter Asset Intelligence to import LDAP data with the Administrative Console. Your client can use the web interface to see assets organized according to user and location details. This makes it easier to trace assets of a particular kind or in a particular location for accurate inventory purposes. In the next task, you will employ Unicenter Asset Intelligence to resolve questions about the organizations assets through reports and screen views.

Notes

21-18

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Task 6: Employ Unicenter Asset Intelligence

Slide 21-15

Task 6: Employ Unicenter Asset Intelligence


With minimal configuration, Unicenter Asset Intelligence can enable you to determine the location of assets and the status of their licenses. Your client can have assets with different applications in various countries, built by various manufacturers. Unicenter Asset Intelligence helps enable your client to view their assets based on meaningful queries for details such as the asset manufacturer.

Slide 21-16

Interactive Demonstration
Task Purpose: Create a report of Dell systems in Canada. The service contract for Dell is about to expire for the organizations systems in Canada. The contracts administrator needs to know how many systems will be affected. 1 2 3 4 5 6 7 8 9 In Unicenter Asset Intelligence, select the Hardware tab. In the Hardware portlet, select Server Vendors. The Servers window appears. In the Vendor portlet, under Vendor Name, select VMware, Inc. In the Vendor portlet, click Exclude. The Servers Vendor: Not VMware, Inc. window appears. At the top of the Hardware tab, click Model. In the Model portlet, select Optiplex GX280. In the Model portlet, click Include. The Servers Model: Optiplex GX280+Vendor: Not VMware, Inc. window appears. At the top of the Hardware tab, click Location. In the Location portlet, select Canada.

Notes

21-19

Manage Data in Unicenter Asset Intelligence


Interactive Demonstration 10 In the Location portlet, click Include. The Servers Location: Canada+Model: Optiplex GX280+Vendor: Not VMware, Inc. window appears. 11 Click Display. 12 Click Define Report. The Define Report window appears. 13 Click Save Report. The Save Report window appears. 14 Type Canada GX280 in the Report Name field. 15 Click Commit. The Hardware tab appears. 16 Select the Reports tab. 17 In the Report Links - User Defined Views portlet, click Report: Canada GX280. The Canada GX280 Location: Canada+Model: Optiplex GX280+Vendor: Not VMware, Inc. window appears. 18 Click Display. The report results appear. 19 Click Done. 20 Click Reset. You have ascertained the number of affected Dell GX280 computers in Canada. Next, you will create a CEO computer summary to determine which systems belong to the CEOs direct reports.

Interactive Demonstration
Task Purpose: Create a CEO computer summary. The assistant to the CEO would like to know which systems belong to the CEOs direct reports. 1 2 3 In Unicenter Asset Intelligence, select the Browse Organization tab. Under Browse Organization, select John Stevens. Click Machine Summary. The All computers in org of Administrator window appears in the Hardware tab.

Notes

21-20

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Skill Practice

4 5 6

Click Display. The Results window appears. All assets in the Administrator org are listed by computer name. Click Done. Click Reset.

Skill Practice
Task Purpose: Create a report of all systems in Spain. 1 2 Use the Hardware tab. Choose Spain from the Location portlet.

You have determined the systems that belong to the CEOs direct reports. Next, you will list assets without antivirus protection.

Interactive Demonstration
Task Purpose: List assets that do not have the eTrust application. It is a huge security risk to have systems in the environment with no antivirus protection installed. 1 2 3 4 5 6 7 8 In Unicenter Asset Intelligence, select the Software tab. In the Asset Type portlet, click Applications. The All Applications window appears. Select eTrust Antivirus 7.1 Windows NT/2000/XP, CA eTrust Antivirus - Agent 7.1, and CA eTrust Antivirus Client 7.1 (Windows). Click Exclude. The All Applications: NoteTrust window appears. Click Display. The All Applications: complex filter window appears. The summary details are listed by computer name. Click Done. Click Reset.

Notes

21-21

Manage Data in Unicenter Asset Intelligence


Skill Practice

Skill Practice
Task Purpose: List assets not belonging to the classroom domain. 1 2 Use the Hardware tab and the Domain sub-tab. Include only the classroom domain.

You have listed assets excluding the eTrust application. Next, you will list servers by location to determine how many servers are outside the protection of the data center and whether IT security policy is being enforced.

Interactive Demonstration
Task Purpose: List servers by location. The CIO believes there are too many servers outside the protection of the data center and is concerned that IT security policy is not being enforced. The CIO needs a list of all servers to determine the potential scope of the problem. 1 2 3 4 5 6 7 In Unicenter Asset Intelligence, select the Hardware tab. In the Hardware Procurement/Retirement portlet, click Servers by Location. The Servers window appears. In the Location portlet, select Canada, Spain, and Tokyo. In the Location portlet, click Include. The Servers Location: Canada OR Spain OR Tokyo window appears. Click Display. The OS window appears. The assets are listed by computer name and location. Click Done. Click Reset.

Notes

21-22

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Skill Practice

Skill Practice
Task Purpose: Servers belonging to contractors pose a potential security risk. The IT manager needs to have a report of all 2003 servers that do not belong to CA. 1 2 Use Servers from the Asset View. Select the Organization subtab.

You have listed all the servers in the organization according to location. Next, you will update the report previously generated to ascertain the number of GX280 computers in Canada so that GX280 computers in Spain are also identified.

Interactive Demonstration
Task Purpose: Update a report. The IT manager needs to know the number of GX280 computers in Spain and Canada. Spain must be added as criteria for the GX280 report. 1 2 In Unicenter Asset Intelligence, select the Reports tab. In the Asset Type portlet, click Report: Canada GX280. The Canada GX280 Location:Canada+Model:Optiplex GX 280+Vendor:Not VMware, Inc. window appears. In the Location portlet, select Spain. In the Location portlet, click Include. The Canada GX280 Location:Canada OR Spain+Model:Optiplex GX 280+Vendor:Not VMware, Inc. window appears. Click Commit. Click Save. Click Reset.

3 4

5 6

You have updated a previously generated report to include additional asset information. Next, you will create a new report that lists who has a Dell computer in Tokyo.

Notes

21-23

Manage Data in Unicenter Asset Intelligence


Interactive Demonstration

Interactive Demonstration
Task Purpose: List the users in Tokyo who have a Dell computer. 1 2 3 4 5 6 7 8 9 In Unicenter Asset Intelligence, select the Hardware tab. In the Asset Type portlet, click All Hardware Vendor Summary. The All Computers window appears. In the Vendor portlet, select Dell Inc. and Dell Computer Corporation. In the Vendor portlet, click Include. The All Computers Vendor:Dell Inc. OR Dell Computer Corporation window appears. In the Location portlet, click Tokyo. Click Include. Click Display. Click Done. Click Define Report.

10 Click Save Report. 11 Type Dell Systems in Tokyo in the Name field. You have listed the users in Tokyo who have a Dell computer by generating a new report. Next, you will create an additional report to list the users who have SQL.

Interactive Demonstration
Task Purpose: List the users who have SQL. Your client enforces the installation of SQL on servers only. They must determine where SQL exists and if it is installed on desktop systems. 1 2 3 In Unicenter Asset Intelligence, select the Software tab. In the Software portlet, click Databases. The Database Software window appears. In the Application portlet, select All Microsoft SQL applications.

Notes

21-24

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Skill Practice

4 5 6

In the Application portlet, click Include. The Database Software: complex filter window appears. Click Display. The results are displayed. Under Machine Name, click Tecra01. The Computer Detail listing window appears. The applications you selected appear in the Application list for Tecra01 Type='Database Software. Click Done twice. Click Reset.

7 8

Skill Practice
Task Purpose: Modify an existing report. You want to reduce costs to help fund new initiatives in the Tokyo office. CA (non-development) people do not need Windows 2003 server machines. You need to revisit the Dell Systems in Tokyo report you created and modify it from a single screen to include:

The Windows 2003 server operating system Departments that are not development departments Select Reports. Edit the Dell Systems in Tokyo report.

Display the updated report. 1 2

Task Summary
You have used Unicenter Asset Intelligence to create various lists that help enable your client to view their assets. In a large organization, this enables your client to plan more efficiently for inventory purposes and be more cost-effective in purchasing software. Your client can also maintain accurate records of asset use in remote locations. This enables better security control. In the next task, you will customize Unicenter Asset Intelligence.

Notes

21-25

Manage Data in Unicenter Asset Intelligence


Task 7: Customize Unicenter Asset Intelligence
Slide 21-17

Task 7: Customize Unicenter Asset Intelligence


The default display settings for the Public User Interface demonstrate the immediate value provided by Unicenter Asset Intelligence. The filtering options provided with this interface permit you to narrow your focus and build custom displays around the information you need to make the right decisions for your business. Filtering options, however, do not apply to the Level 1 home pages. To modify the contents of these pages, you must use the Administrative Console.

Slide 21-18

Interactive Demonstration
Task Purpose: Create a new category. 1 In Unicenter Asset Intelligence, in the Administrative Console, from the Select Admin Function portlet, select Define Categories. The Define Categories window appears. In the Category Description portlet, type eTrust on Servers in the Name field. Click Next. The Enter Primary Rules page appears. From the Hardware Type list, select Server Computers. From the Publishers list, select All Software Publishers. Note: Unicenter Asset Management software definition categories are automatically imported to Unicenter Asset Intelligence as software categories. 6 7 8 Click Next. The Enter Detailed Rules page appears. In the Define Rules for Filter portlet, type %etrust% in the field beside the down arrow. Click the down arrow. Name="%eTrust%" appears in the Rule field.

2 3 4 5

Notes

21-26

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Interactive Demonstration

Click the right arrow. In the Rules Applied to Current Filter portlet, under Link, Name="etrust" appears.

10 Click Test. Under Content of Category, in the Category Summary portlet, view the results of the test. 11 Click Next. The Enter Link Info page appears. 12 From the Link Group list, select All Applications. 13 Click Next. The Confirm Category page appears. 14 Click Finish. 15 On the toolbar, click Show Desktop. 16 On your desktop, double-click Services. The Services dialog appears. 17 From the list of services, double-click CA Unicenter Asset Intelligence. The CA Unicenter Asset Intelligence Properties (Local Computer) dialog appears. 18 On the General tab, click Stop. 19 Type RunNow in the Start parameters field. 20 Click Start. 21 On the General tab, click OK. The CA Unicenter Asset Intelligence Properties (Local Computer) dialog closes. 22 In Internet Explorer, navigate to http://localhost/caai to open the Unicenter Asset Intelligence user interface. 23 Create a shortcut to this location if one is needed. 24 Select the Software tab. 25 In the Software portlet, under Asset Type, select Applications. The All Applications window appears.

Notes

21-27

Manage Data in Unicenter Asset Intelligence


Interactive Demonstration 26 At the top of the tab, click Category. 27 In the Category portlet, click eTrust on Servers. The Category eTrust on Servers window appears. 28 Click Done. You have created a new category to identify only the assets without the eTrust application. Next, you will customize home page links so that only this information displays.

Interactive Demonstration
Task Purpose: Customize home page links. 1 2 3 4 5 6 7 8 9 In Unicenter Asset Intelligence, on the admin interface (http:// localhost/caaiadmin), click Customize Global Views. Select Software. Select Right Pane Links. Select Edit for Software Links. Under Link Type, select Enabled. This becomes a list. Under Section Title/Link Legend, type Customers in the Software Links field. Select Edit for Oracle Applications. Under Link Type, from the Oracle Applications list, select Microsoft Office Apps: 2003. Under Section Title/Link Legend, clear the Oracle Applications field and then type Microsoft Office 2003 in the field. Click Save.

10 In Microsoft Internet Explorer, open the Unicenter Asset Intelligence user interface.

Notes

21-28

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Interactive Demonstration

11 From the Address list, select admin/lenu/adm_go.php?taiadm_ViewTab.inc. The Asset View tab appears. 12 Select the Software tab. In the Customers Software Links portlet, under Asset Type, select Microsoft Office Apps: 2003. The Microsoft Office: 2003 window appears. You have created a customized display of the Level 1 home pages. Next, you will set alert thresholds so that your client will be notified when this information is available.

Interactive Demonstration
Task Purpose: Set alert thresholds. 1 In Unicenter Asset Intelligence, in the Administrative Console, select Customize Global Views. The Customize Global Views window appears. On the Hardware tab, click Left Pane Links. The Customize Global Views window refreshes. Under Section Title/Link Legend for Hardware Utilization, select Edit 4 5 6 7 8 9 .

2 3

Select Enabled for Link Type. For the Storage Section Title, select Customize For Alert 1, select Less Than. Type 2000 in the Value field next to Alert1. Change Type to Critical. .

From the Primary Counter list, select All Storage Free Size.

10 Click Commit. 11 Open the Unicenter Asset Intelligence Administrative Console.

Notes

21-29

Manage Data in Unicenter Asset Intelligence


Skill Practice 12 Click Done. 13 Open the Unicenter Asset Intelligence user interface. 14 Click Hardware. Notice that there is an Alert icon next to Storage. This is because the total free space is less than 2000 GB.

Skill Practice
Task Purpose: Create an alert. Create an alert if more than five databases are installed in the organization. Use Software, Left Pane Links, and Databases.

Task Summary
You have created a new category, customized home page links, and set alert thresholds to customize displays for the Level 1 home pages through the Administrative Console. Your client can now access specific, customized information about their assets more efficiently and more quickly.

Notes

21-30

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Assessment

Assessment
1 Which two components are found in Unicenter Asset Intelligence? (Choose two.) a b c d 2 Web server Database management Scalability server management Unicenter Asset Management Query Designer

By default, when does Unicenter Asset Intelligence populate and refresh data in the database? a b c d Hourly Daily at 3:00 p.m. Daily at 3:00 a.m. Daily at noon and midnight

What are two pieces of information Unicenter Asset Intelligence must provide to display organization context to assets? (Choose two.) a b c d Last name Internet address Managers user ID Managers first name

Notes

21-31

Manage Data in Unicenter Asset Intelligence


Assessment 4 What is one way to import asset information to database tables? a b c d 5 Quick Start Unicenter DSM systray Administrative Console Unicenter DSM Reporter

What must you use to modify home page content? a b c d MDB Web Console Administrative Console Administrator privileges

Notes

21-32

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Module Summary

Slide 21-19

Module Summary
You should now be able to:

Position Unicenter Asset Intelligence Install PHP: Hypertext Preprocessor Install Unicenter Asset Intelligence Configure Unicenter Asset Intelligence Import LDAP Data with the Administrative Console Employ Unicenter Asset Intelligence Customize Unicenter Asset Intelligence

In this module, you positioned Asset Intelligence, installed PHP and Unicenter Asset Intelligence, imported LDAP data with the Administrative Console, employed Unicenter Asset Intelligence, and customized Unicenter Asset Intelligence. Using Unicenter Asset Management, your client can identify anomalies, avoid unnecessary expenses, assess risk, and comply with industry regulations. Your client can use Unicenter Asset Intelligence to organize and summarize data that is gathered by Unicenter Asset Management and present that data in the most appropriate fashion. Your client can process changes continually across their enterprise and remain compliant with external and internal policies. Technology managers can make smarter choices using actionable intelligence provided by Unicenter Asset Intelligence.

Notes

21-33

Manage Data in Unicenter Asset Intelligence


Course Summary
Slide 21-20

Course Summary
You should now be able to:

Define Unicenter Desktop and Server Management Components Install Unicenter DSM Deploy Unicenter DSM Components Apply Central Configuration Set Security Parameters Create Queries Create Groups Create and Deliver Packages Employ the Web Console Organize the Library to Optimize Delivery Manage the Catalog Configure Inventory Hardware Configure Software Inventory Conduct a Template Inventory Create an Asset Job Create Policies Administer Unicenter Remote Control Produce Common Reports Add an Enterprise Domain Manager Deploy Unicenter Patch Management Manage Data in Unicenter Asset Intelligence

Slide 21-21

Slide 21-22

Notes

21-34

Partner Certification Student Workbook

Manage Data in Unicenter Asset Intelligence Course Summary

Notes

21-35

Manage Data in Unicenter Asset Intelligence


Course Summary

Notes

21-36

Partner Certification Student Workbook

A
Skill Builder and Assessment Solutions

A-1

Skill Builder and Assessment Solutions


Skill Builder: Module 3 - Deploy a Scalability Server and Validate the Installation

Skill Builder: Module 3 - Deploy a Scalability Server and Validate the Installation
Business Problem
A scalability server enables geographical scalability for your clients management tasks. This server is the primary interface for local and remote agents. Your client has an office in a remote location. A scalability server must be deployed to balance the load across their systems.

Hint
Using the Deployment Manager, deploy the server to the Windows 2000 Server VMware session.

Software Solution
1 2 3 4 Open the Windows 2000 Server VMware session. In DSM Explorer, in the left pane, expand Domain\Control Panel\Deployment. Select Deploy DSM Agents or Scalability Servers. In the right pane, the Deployment: Introduction page appears. Click Next. The Job Type page appears. This is a deployment job. Jobs direct agents or engines to perform specific actions. Various types of jobs can be carried out on agents. The default deployment job type is Deploy Software to Target Computers. The deployment job name can be changed.

Notes

A-2

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 3 - Deploy a Scalability Server and Validate the Installation

Click Next. The Deployment Payload page appears. You can deploy only one payload or package at a time. Each package is available in two versions, Microsoft Windows or Linux. The packages include plug-ins for Minimum SD Agent, Asset Management, and Software Delivery. The Microsoft Windows version involves the deployment of a base select agent with the plug-in. There is also a package for deploying the Unicenter DSM Scalability Server.

6 7

From the list of packages, select CA Unicenter DSM Scalability Server version# Windows_x86 ENU. Click Next. The Target Criteria page appears. The deployment job must now be linked with the specific unit, or group of units, on which the job will be carried out.

8 9

From the Development Type list, select Deploy to Specific Computers. Type yourcomputername for the Windows 2000 Server VMware session.

10 Click Next. The Scan Targets page appears. 11 Click Scan. When the scan is complete, a green disk indicates that the computer responded. The computer name, IP address, and state are shown in the Discovered Computers list. 12 Click Next. The Target Selection page appears. The Discovered Computers list is now shown beside an empty Target Computers list. The computer listing from the Discovered Computers list must be moved to the Target Computers list. 13 In the Discovered Computers list, select 2000 Server yourcomputername and click the right arrow between the two lists. A User Credentials dialog appears. 14 Type administrator in the Username field. 15 Type yourcomputernamecai in the Password field.

Notes

A-3

Skill Builder and Assessment Solutions


Skill Builder: Module 3 - Deploy a Scalability Server and Validate the Installation 16 To close the dialog, click OK. The computer listing is transferred to the Target Computers list. 17 Click Next. The Agent Configuration page appears. 18 Type the DSM servername in the scalability Server Address to Connect to field. Any additional Microsoft Windows or UNIX installation options can be typed in the Microsoft Windows or Unix fields and can be found in the Implementation Guide. For example, the software delivery catalog is installed by default with the Unicenter Software Delivery agent. 19 Click Next. The Summary page appears. This displays details of the deployment job. 20 To start the job, click Finish. Deployment Job Status shows the date of this job, its status as Active, the start time of the job, the number of targets as 1, and whether the job is completed, failed, or active.

Validate the Scalability Server Deployment Through a Diagnostics Check


21 From the Windows 2000 Server VMware workstation, on your desktop, right-click the DSM systray. 22 Choose Common Agent and select Properties. The Common Agent Properties dialog appears. 23 Select the General tab, which shows if the agent is registered to the Unicenter DSM server. 24 From your desktop, open the command prompt shortcut. Type caf status at the prompt. Make sure that Running DSM services for the agent appears. This list will be considerably smaller than the domain manager caf plug-in list. 25 On the Unicenter DSM server, in the left pane, expand DSM Explorer\All Computers.

Notes

A-4

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 3 - Deploy a Scalability Server and Validate the Installation

26 Select All Computers. The appearance of the asset in the left pane under All Computers confirms that deployment was successful. All the computers have Unicenter DSM installed.

Verify the Deployment by Checking the Inventory


27 In the right pane, double-click the agentname to see its home page. 28 Select the Inventory tab. This tab lists the basic inventory gathered by the basic Unicenter DSM agent and includes information about the System, Processors, Operating System, System Services, Network Adapters, Video Adapters, Network, TCP/IP, File Systems, Local File Systems, and System Status. Scroll through the document. 29 In the left pane, expand the agentname. 30 Expand Inventory and select System Status. Notice that the system hardware scan was completed. This is further validation that the agent installation and subsequent scan were successful. 31 Expand Control Panel and select All Scalability Servers. In the right pane, verify that the 2000 servername appears in the list. 32 Shut down the Windows 2000 Server VMware session.

Notes

A-5

Skill Builder and Assessment Solutions


Skill Builder: Module 4 Configure Unicenter Software Delivery Agent Policy

Skill Builder: Module 4 Configure Unicenter Software Delivery Agent Policy


Business Problem
You must configure an agent policy for packages that can take a long time to install on older computers, such as those using Microsoft Windows 95. If installation exceeds a set amount of time, it is registered as a failed operation. Your client thinks that the default of 5 minutes is not adequate and would like to test 10 minutes.

Hint
Change the Job Run Timeout parameter in the Software Delivery Agent folder.

Software Solution
1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Control Panel. Right-click Configuration and choose Explore From. A new Explorer GUI window appears with only the Configuration folder contents. In the left pane, right-click Configuration Policy and choose New Policy. The New Configuration Policy dialog appears. Type SD Agent Parameters in the Name field. Click OK. In the left pane, expand Configuration\Configuration Policy\SD Agent Parameters\DSM\software delivery. Select Agent. In the right pane, select Job Run Timeout. In the Value field, type 600 and click OK. Seal and apply the Agent Parameters policy to the 2000 Professional session.

Notes

A-6

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 7 - Create a Dynamic Group of Dell Systems Running Linux

Skill Builder: Module 7 - Create a Dynamic Group of Dell Systems Running Linux
Business Problem
Your client requires all Dell computer systems in their organization to be grouped. One group must include each system that uses the Linux operating system.

Hint

Change the Operator value to Like and use a wildcard for Dell. Create the query in the My Queries folder. Use Dell-Linux for the group name.

Software Solution
1 2 3 4 5 6 7 In DSM Explorer, in the left pane, right-click My Queries and choose New. The Select Target dialog appears. From the list of target objects, select Computers and click OK. The Query Designer dialog appears. In the left pane, from the Insert Argument list, expand Inventory and then select Discovered Inventory. The Add Argument dialog appears. From the Add Argument list, expand Information\Inventory\General Inventory\System. Select Vendor. From the Operator list, select Like. Type dell* in the Value field and click OK.

Notes

A-7

Skill Builder and Assessment Solutions


Skill Builder: Module 7 - Create a Dynamic Group of Dell Systems Running Linux 8 9 In the Query Designer dialog, click Preview. The Query Preview dialog appears. Click Close.

10 In the Query Designer dialog, under Boolean Operators, select AND. 11 In the Query Designer dialog, in the left pane, select Discovered Inventory. The Add Argument dialog appears. 12 Expand Inventory\General Inventory\Operating System. 13 Select Operating System. 14 From the Value list, select Linux. 15 To close the dialog, click OK. 16 In the Query Designer dialog, click Preview. The Query Preview dialog appears with results of the query. 17 Click Close. 18 Click OK. The Save Query dialog appears. 19 Type the query name Dell Systems with Linux OS and click OK. 20 In the left pane, right-click Computers and Users and choose New Group. The New Group dialog appears. 21 Type Dell-Linux in the Name field. 22 Select the Query tab. 23 From the Associated Query list, select the Dell Systems with Linux OS query. 24 From the Evaluated by list, select SystemEngine. This enables you to configure the Evaluation period value. By default, it is set for 1440 minutes or 24 hours. 25 In the Evaluation period field, change the value to 60 minutes and click OK.

Notes

A-8

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 7 - Create a Dynamic Group of Dell Systems Running Linux

26 In the left pane, right-click Dell-Linux and choose Evaluate now. The Group Evaluated dialog appears. 27 Click OK. REDHAT01 appears.

Notes

A-9

Skill Builder and Assessment Solutions


Skill Builder: Module 10 Manage a Scalability Server Software Library

Skill Builder: Module 10 Manage a Scalability Server Software Library


Business Problem
Your client has added additional software packages that have not been delivered to the Chicago targets. The targets have scalability servers that are remote from the domain. To optimize the delivery time, these packages must be sent to the server closest to the workstations in Chicago.

Hint
The software to stage is Ad_Aware.

Software Solution
1 2 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software. Under the All Software folder, right-click Ad_Aware and choose Stage. The Stage Software Package Wizard dialog appears. Note: The Stage Software Package Wizard is used to create a software job. This job stages software packages on scalability servers attached to the domain. 3 4 Click Next. The Scalability Servers selection page appears and prompts you to select the scalability server on which this job will be performed. Expand All Scalability Servers and select servername 2000 Server.

Notes

A-10

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 10 Manage a Scalability Server Software Library

Click Next. The Finish page appears. The Finish page confirms the package and server. Scheduling of the job can be set by date and to the exact minute of that date. You can click Back to make any changes.

6 7 8

Type Stage Ad_Aware to Chicago as the Job Container name. Select Open the advanced job settings dialog when the Finish button is pressed. To begin the job, click Finish. A Setup Delivery Job dialog shows the Job Container name the system has created. By default, Seal and evaluate Job Container and Activate Job Container are checked.

Select the Deliveries tab. The Job Order is displayed as Add to library: Ad_Aware, which is the software package selected for staging. On the Job tab, the precise delivery time is shown for this job.

10 Select the Job Options tab. 11 Change the Job Timeout to 3 days. This means the job will automatically fail if it is not delivered to Chicago in 3 days. 12 Click OK. 13 In the left pane, under Jobs\Software Jobs, select All Software Jobs. 14 In the right pane, double-click Stage Rbcinfo to Chicago. 15 Double-click 2000 Server. 16 Right-click Ad_Aware and choose Properties.

Notes

A-11

Skill Builder and Assessment Solutions


Skill Builder: Module 10 Manage a Scalability Server Software Library 17 To view the display trace by the Data Transport Service (DTS), select the Delivery Trace tab. 18 Click OK. Note: DTS is used by default between Unicenter DSM managers.

Notes

A-12

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 11 Manage and Configure a Catalog

Skill Builder: Module 11 Manage and Configure a Catalog


Business Problem
The Payroll department has asked that some authorized freeware applications be made available to their employees. They do not want to call and make a request each time an employee needs an application installed. Create a catalog group for them and add approved applications to the group.

Hint
Authorized applications include Ad_aware, Filemon, and QuickTime Player. The computers in the Payroll group are the Unicenter DSM server and the Microsoft Windows 2000 Professional VMware computer.

Software Solution
Create a static group named Payroll and assign the Unicenter DSM server and Windows 2000 Professional VMware computer to the group. 1 2 3 4 5 In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library. In the left pane, drag the Payroll group to the Catalog folder. In DSM Explorer, in the left pane, expand Domain\Software\Software Package Library\All Software\Ad_aware Reader\Procedures. Right-click Install Package and choose Properties. The Properties dialog appears. On the Procedure tab, select enabled.

Notes

A-13

Skill Builder and Assessment Solutions


Skill Builder: Module 11 Manage and Configure a Catalog 6 Click OK. Note: The same procedure would apply for Uninstall Package. Steps 3 through 7 would be repeated for Filemon and QuickTime Player. 7 8 In DSM Explorer, in the left pane, select All Software. In the right pane, select Ad_aware, Filemon, and QuickTime Player. Drag this group of selections to the Payroll group under Catalog in the left pane. Click OK.

To verify the catalog choice appears on the Unicenter DSM server and in the Windows 2000 Professional VMware session, open the Unicenter Software Delivery catalog.

Notes

A-14

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 12 - Create a New Hardware Inventory Collect Task to Collect User Information

Skill Builder: Module 12 - Create a New Hardware Inventory Collect Task to Collect User Information
Business Problem
Your client needs a list of local groups and users that are common to all of their assets. They will use Unicenter Asset Management to collect this user account inventory. Create a new hardware inventory task to accomplish this.

Software Solution
1 2 3 4 5 6 7 8 9 In DSM Explorer, in the left pane, expand Domain\Control Panel\Configuration\Collect Tasks. Right-click Hardware Inventory and choose New. The Schedule new Collect Task dialog appears. On the General tab, type User Account Inventory in the Name field. Select the Detection Modules tab. Select User Account Inventory and click OK. In the left pane, expand Collect Tasks\All Collect Tasks\User Account\Inventory. Right-click User Account Inventory and choose Scheduling. The Scheduling Options dialog appears. Select the Conditions tab. Under Periodic dependency, select Run only once a week.

10 Click OK.

Notes

A-15

Skill Builder and Assessment Solutions


Skill Builder: Module 12 - Create a New Hardware Inventory Collect Task to Collect User Information 11 In the left pane, drag User Account Inventory to the All Computers group. This links the task to a group. 12 Expand All Computers\Group Details\Configuration and select the Collect Tasks folder. 13 In the right pane, the User Account Inventory Collect Task appears. User Account Inventory is Hardware Inventory, Enabled, 0 percent OK, 100 percent Waiting, 0 percent Error, and Linked at All Computers. 14 Double-click User Account Inventory. The individual status of all computers in the domain appears. 15 On your desktop, right-click the DSM Explorer systray and choose Asset Management Agent Start Job Check. This forces a rescan of the inventory by the Unicenter Asset Management agent. 16 In the left pane, expand Control Panel\Engines\All Engines. 17 Select System Engine. After a short time, the engine log shows that the inventory and status information for DSM servername has been updated. This will occur after the DSM server collect job has completed. 18 In the left pane, expand All Computers\Group Details\Configuration and select Collect Tasks. In the right pane, the values for the User Account Inventory task have changed. They are now 7 percent OK and 93 percent Waiting, the same as the other tasks in the pane.

Notes

A-16

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 12 - Create a New Hardware Inventory Collect Task to Collect User Information

19 To open the Action User Account Inventory window, double-click User Account Inventory. Notice that DSM server now has an OK status, with the rest of the computers Waiting. 20 To view the data, in the left pane, expand All Computers\DSM servername\Inventory\Additional\User Inventory, select Local Groups, and then select Local User.

Notes

A-17

Skill Builder and Assessment Solutions


Skill Builder: Module 15 Create a Secure Configuration Files Job

Skill Builder: Module 15 Create a Secure Configuration Files Job


Business Problem
GIS is concerned that users are updating their own hosts files instead of relying on the DNS for network name resolution. When the hosts file is modified, it must be reverted to your clients standard hosts file. Create a Secure Configuration Files job and name it Hosts File.

Hint
To locate the hosts file, look in the C:\windows\system32\drivers\etc directory. Copy the contents of the current hosts file as your clients standard hosts file.

Software Solution
1 2 3 4 5 6 7 8 9 In the right pane, expand Jobs/Asset Jobs. Right-click Secure Configuration File Jobs and choose New. Click Next. Type Hosts File as the job name. Click Next. Browse to C:\windows\system32\drivers\etc where the Hosts file is located. Change Files of type to All files. Select the Hosts file. Click Open.

10 Click Next.

Notes

A-18

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 15 Create a Secure Configuration Files Job

11 Click Load File. 12 Browse to C:\windows\system32\drivers\etc where the Hosts file is located. 13 Click Next. 14 Click Finish. 15 Assign this job to the DSM server. 16 Make any change to the Hosts file open in Notepad and save the file. 17 Run the agent and verify that the job runs. Check the hosts file to verify that it has reverted to standard. The status of the asset job should indicate that changes were found and the file was restored.

Notes

A-19

Skill Builder and Assessment Solutions


Skill Builder: Module 16 - Create a Query-based Policy

Skill Builder: Module 16 - Create a Querybased Policy


Business Problem
Your clients organization distributed the User Telephone Information template to All Computers several weeks ago. The GIS group needs a report on how many computers have not run the Template collect task. The report must show that this was due to the user being out of the office and the agent not running on those computers. The violators must be added to a static group named No Telephone Info Reported.

Hint
The query argument should use Jobs, Collect Tasks, and the NOT operator.

Software Solution
Create a Query
1 2 3 4 5 6 7 8 In DSM Explorer, in the left pane, right-click My Queries and choose New. The Select Target dialog appears. From the list of target objects, select Computers and click OK. The Query Designer dialog appears. From the Insert Argument status list, select NOT. In the information dialog, select OK. In the Query Designer dialog, select the close parentheses. In the left pane, from the Insert Argument list, select Jobs. Select Collect Tasks. The Add Argument dialog appears. Expand Collect Task Status. Select Current Status.

Notes

A-20

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 16 - Create a Query-based Policy

From the Collect Task menu, select User Telephone Information. Leave Status as OK.

10 Click OK. 11 In the Query Designer dialog, click Preview. The Query Preview dialog appears, listing results of the query. Click Close. 12 Click OK. The Save Query dialog appears. 13 Type the query name Telephone Info Task Not OK and click OK.

Create a Static Group


14 In the left pane, right-click Computers and Users and choose New Group. 15 Type No Telephone Info Reported in the Name field. 16 Click OK.

Create a Policy
17 In DSM Explorer, in the left pane, expand Policies\Query Based. 18 Right-click Query Based and choose New. The Policy Designer dialog appears. 19 Type Telephone Info Task Not OK in the Name field. 20 Under Policy Severity, click Alarm. Alarm indicates the policy needs more attention and has a severe impact when violated. An Alarm Policy appears in the Alarm section of the Log Overview. The lower levels of Policy Severity are Warning and Message. 21 In the Query that Policy depends on list, scroll down and select Telephone Info Task Not OK.

Notes

A-21

Skill Builder and Assessment Solutions


Skill Builder: Module 16 - Create a Query-based Policy 22 Under Policy, select Evaluation. By default, Always evaluate Policy when Sector processing is done is selected. 23 Under Add Action, select Add to Group. The Configure Policy Actions dialog appears. 24 In the Configure Policy Actions list, select the No Telephone Info Reported group. 25 Select Remove from group when policy is no longer met and click OK. 26 In the Policy Designer dialog, click OK. 27 Right-click Telephone Info Task Not OK and choose Evaluate now. 28 Select Telephone Info Task Not OK. 29 Under Telephone Info Task Not OK, select Violators and verify computer systems appear. 30 Verify violators identified by policy are now members of the No Telephone Info Reported group.

Notes

A-22

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 17 Assign a New Group and Query with New Security and Assign Permissions

Skill Builder: Module 17 Assign a New Group and Query with New Security and Assign Permissions
Business Problem
The Accounting group must have custom Unicenter Remote Control settings, but the members of this group require a password for GIS before they are permitted to take control. They also want the host session to close automatically if there is no activity for five minutes. The Windows 2000 Server VMware session is a system in Accounting. You must define and assign manager policy for the new Accounting group. It must also be a global address book.

Hint
You must deploy remote control to the Windows 2000 Server VMware session.

Software Solution
1 2 3 4 5 6 7 In DSM Explorer, in the left pane, expand Domain\Computers and Users\All Computers. In the right pane, select the 2000 Server VMware session. Right-click and choose Make Group. The New Group dialog appears. Type Accounting in the Name field. Type Accounting static group in the Description field. Click OK. In DSM Explorer, in the left pane, expand Domain\Computers and Users\All Computers\Accounting.

Notes

A-23

Skill Builder and Assessment Solutions


Skill Builder: Module 17 Assign a New Group and Query with New Security and Assign Permissions 8 9 In the left pane, expand Group Details. Select Remote Control Permissions. In the right pane, in the Tasks area, select Properties. The Address Book Properties dialog appears.

10 Select the Global address book root group. 11 Click OK. 12 In the Tasks area, select Add User Permission. The Add User Permission dialog appears. 13 Under Available Directories, expand classroom domain name. 14 In the left pane, expand GIS. 15 Select your name. Click Add to List. In the List of Security Principals, your name appears. 16 Click OK. 17 Add your Administratorxx login. 18 In the left pane, under Control Panel, right-click Configuration and choose Explore from. The Explorer GUI window appears with the Configuration folder contents. 19 In the left pane of this window, right-click Configuration Policy and choose New Policy. The New Configuration Policy dialog appears. 20 Type Accounting Remote Control Policy in the Name field. 21 Click OK. 22 In the left pane of Explorer GUI, expand Configuration Policy\Accounting Remote Control Policy\DSM\Remote Control\Host. 23 Select General. 24 Double-click Inactivity time out and change the value to 5 minutes. 25 Double-click Local Confirmation Password. Change the value to TRUE.

Notes

A-24

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 17 Assign a New Group and Query with New Security and Assign Permissions

26 Select Accounting Remote ControlPolicy\DSM\RemoteControl\Host\Managed. 27 Change Centralized Security to TRUE. 28 Right-click Accounting Remote Control Policy and choose Seal. Click OK. 29 In the left pane, expand Accounting Remote Control Policy\DSM\Remote Control Host. 30 Select General. The three attributes that were changed appear in the right pane. 31 Right-click Accounting Remote Control Policy and choose Copy. 32 Return to the original DSM Explorer window. Right-click the new policy and choose Copy. 33 In the left pane, right-click Accounting group and choose Paste Configuration Policies. The Schedule Policies dialog appears. 34 Select Apply Policies Immediately. Click OK. 35 In the left pane, expand Accounting\Group Details\Configuration. 36 Select Configuration Policy. Notice the status of the Active and Scheduled Policies. After the policy is applied, verify the policy change at the host. 37 Right-click the DSM systray and choose Remote Control Host Properties. The Properties dialog appears. 38 Select Advanced. Scroll to see that the three attributes have been changed to the new configuration policy. 39 Open the Unicenter Remote Control Viewer on the DSM server and verify Accounting group appears as a Global Address Book and the 2000 Server VMware session appears in this book.

Notes

A-25

Skill Builder and Assessment Solutions


Skill Builder: Module 20 - Deploy a Microsoft Patch

Skill Builder: Module 20 - Deploy a Microsoft Patch


Business Problem
A customer has a critical Microsoft patch that must be deployed globally. Assist them in testing this patch using the patch management process.

Hint
Use the CA Content Team as the manufacturer.

Accept a Patch
1 In the Unicenter Patch Management window, on the Dashboard tab, from the Patches Pending Acceptance list, select a patch. The Patch Details window appears. In the right pane, in the General area, the patch Status is Pending User Acceptance. Accept is the default value in the Actions list. 2 3 Confirm this value and click Go. The patch Status has changed to Accepted. Click Done. The Dashboard tab appears.

Test the Patch


4 After the patch has downloaded, on the Dashboard tab, scroll down the Patches Pending Testing list and select the newly downloaded patch. The Patch Details window appears. In the left pane, under Advanced Options, select Test Patch. The Deploy Patch: Select Targets window appears. Under Available Targets, from the All Targets list, select an appropriate target.

5 6

Notes

A-26

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Skill Builder: Module 20 - Deploy a Microsoft Patch

7 8 9

Click the right arrow. In the Selected Targets field, the target appears. Click Next. The Deploy Patch: Schedule Deployment window appears. Accept the default Deploy Patch Now selection and click Next. The Deploy Patch: Confirm Deployment window appears.

10 Click Finish. The Patch Details window appears. 11 In the left pane, under Advanced Options, select Deployment Status. The Dashboard tab appears. Notice the patch deployment Status is In Progress. 12 Select Deployment Id. 13 In the left pane, select Targets. In the right pane, a list of target computers appears. 14 In the right pane, select your target. The Machine details window appears. 15 Click Unicenter AMS. 16 Click UPM. The Deployment window appears. 17 In the left pane, select General. In the right pane, the General Deployment Information display appears. 18 Click Done. The Dashboard tab appears.

Approve a Patch
19 Select the Patches tab. 20 From the Filter By list, select Testing and click Go. 21 From the Patch Name list, select the tested patch. 22 From the Select and list, select Approve and click Go. 23 From the Filter By list, select Approved and click Go.

Notes

A-27

Skill Builder and Assessment Solutions


Assessment Answers

Assessment Answers
Module 1
Question 1: b and e Question 2: c Question 3: c Question 4: a

Module 2
Question 1: c Question 2: b Question 3: d

Module 3
Question 1: d Question 2: a Question 3: a and d Question 4: d

Notes

A-28

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Assessment Answers

Module 4
Question 1: a and c Question 2: a Question 3: b

Module 5
Question 1: b and c Question 2: b Question 3: c Question 4: d

Module 6
Question 1: b Question 2: c

Module 7
Question 1: a Question 2: c Question 3: b

Notes

A-29

Skill Builder and Assessment Solutions


Assessment Answers

Module 8
Question 1: d Question 2: a Question 3: b Question 4: b Question 5: c Question 6: c

Module 9
Question 1: c Question 2: a Question 3: c

Module 10
Question 1: c Question 2: a Question 3: d Question 4: d Question 5: d

Module 11
Question 1: a

Notes

A-30

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Assessment Answers

Module 12
Question 1: d Question 2: d and e

Module 13
Question 1: c Question 2: b and c Question 3: b and c Question 4: a and d Question 5: d

Module 14
Question 1: d

Module 15
Question 1: a and c Question 2: c

Module 16
Question 1: c and e Question 2: a

Notes

A-31

Skill Builder and Assessment Solutions


Assessment Answers

Module 17
Question 1: b Question 2: a

Module 18
Question 1: d Question 2: a Question 3: d Question 4: a

Module 19
Question 1: a Question 2: c Question 3: d Question 4: b

Module 20
Question 1: b and e Question 2: d Question 3: d Question 4: d Question 5: d Question 6: b and c

Notes

A-32

Partner Certification Student Workbook

Skill Builder and Assessment Solutions Assessment Answers

Module 21
Question 1: a and b Question 2: c Question 3: a and c Question 4: c Question 5: c

Notes

A-33

Skill Builder and Assessment Solutions


Assessment Answers

Notes

A-34

Partner Certification Student Workbook

-1

Notes

-2

Partner Certification Student Workbook

Notes

-3

Notes

-4

Partner Certification Student Workbook

Notes

-5

Notes

-6

Partner Certification Student Workbook

Вам также может понравиться