BMC FootPrints Asset Core - Asset Discovery. Version 11.7

Size: px
Start display at page:

Download "BMC FootPrints Asset Core - Asset Discovery. Version 11.7"

Transcription

1 BMC FootPrints Asset Core - Asset Discovery Version 11.7

2 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other BMC trademarks, service marks, and logos may be registered or pending registration in the U.S. or in other countries. All other trademarks or registered trademarks are the property of their respective owners. FootPrints is the exclusive property of Numara Software, Inc. and is registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other Numara Software trademarks, service marks, and logos may be registered or pending registration in the U.S. or in other countries. All other trademarks or registered trademarks are the property of their respective owners. Cisco and Cisco NAC are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. IBM and IBM Domino are registered trademarks or trademarks of International Business Machines Corporation in the United States, other countries, or both. IT Infrastructure Library is a registered trademark of the Office of Government Commerce and is used here by BMC Software, Inc., under license from and with the permission of OGC. ITIL is a Registered Trade Mark of the Office of Government Commerce in the United Kingdom and other countries. Linux is the registered trademark of Linus Torvalds. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. UNIX is the registered trademark of The Open Group in the US and other countries. The information included in this documentation is the proprietary and confidential information of BMC Software, Inc., its affiliates, or licensors. Your use of this information is subject to the terms and conditions of the applicable End User License agreement for the product and to the proprietary and restricted rights notices included in the product documentation. Restricted rights legend U.S. Government Restricted Rights to Computer Software. UNPUBLISHED RIGHTS RESERVED UNDER THE COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any data and computer software by the U.S. Government is subject to restrictions, as applicable, set forth in FAR Section , DFARS , DFARS , DFARS , and DFARS , as amended from time to time. Contractor/Manufacturer is BMC SOFTWARE INC, 2101 CITYWEST BLVD, HOUSTON TX , USA. Any contract notices should be sent to this address. BMC Software, Inc CityWest Blvd, Houston TX , USA Customer Support: (United States and Canada) or contact your local support center

3 BMC FootPrints Asset Core - Asset Discovery TOC 3 Contents Introduction...4 Formatting Conventions...4 What you have to know about Asset Discovery... 6 Asset Discovery Configuration...6 Defining an Asset Discovery Scanner... 7 Device...7 Defining a Scanner... 7 Configuring an Asset Discovery Scanner...7 Asset Discovery Module Configuration... 8 Configuring the Module Parameters... 8 Credentials...8 Asset Discovery Object Configuration... 9 Scan Configurations... 9 Target Lists... 9 Scanners...10 Defining a Scanner Asset Discovery Scanner...11 Assigned Scans Schedule Details...12 Discovered Devices Purge Agent Rollout Discovered Device Inventory Asset Discovery Scan...16 Scan Configuration...16 Assign Scan Configuration...16 Target Lists Assign Target List...17 Assigned Schedule Sessions...18 Discovering the Assets via the Wizard...19 Discovery Type Executing an Automatic Scan Defining a Configurable Discovery Defining the Scanner Selecting the Scan Configuration...20 Defining a New Scan Configuration...20 Defining the Scan...20 Protocols...21 Defining the Target List Configuring a New Target List...21 Scheduling the Scan...22

4 4 BMC FootPrints Asset Core - Asset Discovery Introduction Introduction The BMC FootPrints Asset Core - Inventory Manager - Asset Discovery manual is a comprehensive guide to the Asset Discovery functionality of BMC FootPrints Asset Core. It provides you with detailed information about the different aspects, components and possibilities of discovering all your assets in your environment: Configurations Scanners Scans Discovered Devices Formatting Conventions Throughout this manual you will encounter elements that stand out in different ways. These elements each have a specific intention and are used consistently, so when you see such an element you immediately know what kind of information to expect. The following table explains the different formatting conventions: What you see (Examples) 1. Select Click... What it means Ordered list of instructions. Execute the steps in the given order. Option 1 Option 2 Enumeration of different options/scenarios to choose from. Operational Rules Properties You need write access to the immediate parent, from which the device or device group is being deleted.. The Properties dialog box appears on the screen. The new status has been saved and applied to the selected group. MyDevice1,MyDevice1.com, ,"James Kirk",... MyDevice2,MyDevice2.com, ,"First Spy",... Item of the Graphical User Interface of the software. Title of a dialog box/popup window Before a task. Informs you about the prerequisites for the following task. After a step. Informs you about the immediate result of a step. After a set of instructions. Informs you about the final result of the task. Lines of code. The new patch group will have the same members as the selected device group. Additional useful information.

5 BMC FootPrints Asset Core - Asset Discovery Introduction 5 What you see (Examples) To scan every day at 01:00 AM, from the at drop-down list select 01:00. What it means Example or recommendation from BMC Software for best practice. Note You can only use ISO-Latin characters even if you are using a Japanese, Greek or Arabic localization. Simple note or piece of advice. Remember If you manage your group through a directory server you may not manually create or add objects to this group anymore. What you are about to do will affect the system behaviour. IMPORTANT When deleting an administrator you loose all capabilities and access rights accorded to this administrator as well. What you are about to do will lead to loss of data or settings. AT TENTION If the original group or "OU" on the directory server was renamed, moved or deleted, the Asset Core group cannot be resynchronized with this group. An error message will be displayed instead. What you are about to do will lead to partial or entire system failure.

6 6 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery What you have to know about Asset Discovery Devices that are connected to the network but on which no Asset Core agent is installed may be remotely inventoried by any Asset Core agent, which will collect the software and hardware inventory of these devices. Unmanaged devices in BMC FootPrints Asset Core - Inventory Manager are devices of your infrastructure that are never connected to the network or do not have a Asset Core agent installed. Nevertheless, Asset Core provides possibilities to inventory (hardware and software) these devices and include the generated inventories in the Asset Core database. The custom inventory for unmanaged devices may only be created directly in the Asset Core Console. The Asset Discovery functionality of the BMC FootPrints Asset Core - Inventory Manager allows you to scan your network or parts of your network for all existing assets. It will find all types of assets, PCs, printers, routers, etc., with and without Asset Core agent installed. The discovery will also scan the devices for their basic information such as operating system and inventories and will display these in the console window. Components Asset Discovery in the BMC FootPrints Asset Core - Inventory Manager is done via a number of different components and objects listed below, and on which you will find detailed information in the following sections and chapters: Asset Discovery Scanner The Asset Discovery Scanner is any device in your network, defined as the scanner. It is responsible for the whole scanning process. By default the master is pre-specified as the Scanner, but any other device with a reasonably strong configuration fitting the above mentioned requirements may take over this role. Discovered Device Inventory The discovered device inventory for a device or a group is an extraction of the inventories available and generated by the Asset Core agent, that is, it generates the discovered hardware, software and parts of the security inventory for all discovered assets as well as the connectivity inventory, that is, the actual physical connections between the devices. Asset Discovery Wizards BMC FootPrints Asset Core - Inventory Manager also has a wizard that guides you through the different options of scanning your network devices and launching the scans. Prerequisites The following prerequisites must be fulfilled for asset discovery to be operable: The operating system of the scanner device must be Windows XP, Windows 2003, Workstation and Server for all versions, Windows Vista Business and Ultimate, 64 bit Windows, Windows 2008, Windows 2008 R2 64 bit, Windows 8, Windows 8.1, Windows 2012 R2 64 bit or Linux AS/ES 3 and 4, CentOS and SUSE. The master/scanner should have a permanent internet connection, preferably via Ethernet, it MUST NOT use a wireless connection. Asset Discovery Configuration The configuration of the Asset Discovery functionality of BMC FootPrints Asset Core - Inventory Manager is done in the following different steps: 1. The Scanner must be defined. You may skip this step if you are using the master as your Scanner as it is predefined as such.

7 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 7 2. Each scanner has a specific configuration, which is to be defined under the scanner s node. 3. The Asset Discovery module disposes of a number of parameters defining its general behavior which my be adapted to comply with company policies. It must be configured individually either directly in the Agent Configuration node of the respective device or via the respective operational rule for all members of a device group. You may also configure it directly through the respective configuration file (AssetDiscovery.ini) in the [InstallDir]/ config directory. 4. The configuration of the asset discovery objects, such as the scan configurations and target lists are defined directly under the Asset Discovery Configuration node. Defining an Asset Discovery Scanner A scanner is a device of your network that is capable of scanning other devices for their assets. Contrary to the scanned devices the scanner must have a Asset Core agent installed and have the asset discovery module loaded. Any device with a Windows 2003, Windows XP, Windows Vista Business and Ultimate, 64 Bit Windows or Linux Red Hat 9, AS/ES 3 and 4 and SUSE operating system may be defined as a scanner. A device may be configured as a scanner in the following different locations: Device Any device may be defined as a Scanner either via the Device Topology or the device group node of which the device is a member. In both locations, proceed as follows: 1. Select the Device Topology or the Device Groups node, of which the desired device is a member in the left window pane. 2. Select the device to become a Scanner. 3. Select Edit > Properties in the icon bar. The Properties pop-up menu will appear on the screen. 4. Go down to the lower part of the window and check the box next to the Vulnerability Scanner option. For devices which do not have the required operating system, this option is not accessible. 5. Click OK to confirm and close the window. The device will be added to the table of Scanners and it will appear in the list of Scanners under the main Asset Discovery node. Defining a Scanner You may directly add a device as a Scanner under the Scanners node. Any device that fulfils the predefined requirements can be a scanner in BMC FootPrints Asset Core - Inventory Manager. The master is a scanner by default. To define a device as a scanner, proceed as follows: 1. Select the Asset Discovery node and then go to the Scanners node in the left window pane. 2. Click Edit > Add Device. The Add a Scanner pop-up menu will appear on the screen displaying the list of all devices, that may be a scanner because of their operating system. 3. Select the device to be added from one of the list boxes. 4. Click OK to confirm and close the window. The device will be added to the table of Scanners and its configuration parameter will be updated. Configuring an Asset Discovery Scanner Each scanner can be defined differently for the asset discoveries it is to execute. To define the a scanner, proceed as follows:

8 8 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 1. Select the Scanners > Your Scanner node in the left window pane. 2. Select a row in the table to the right. 3. Click Edit > Properties. The Properties window is displayed on the screen. 4. Make changes to the proposed default values as required. 5. Click OK to confirm and close the window. Asset Discovery Module Configuration The configuration of the Asset Discovery module is done via the Asset Discovery subnode of the Agent Configuration > Module Configuration node, or directly under the defined Scanner s Module Configuration node under the main Asset Discovery node. It provides the possibility to modify the configuration parameters for the module and adapt its behavior to company policies and requirements. The module is configured in the following two steps: General - configuration of the general parameters of the module Credentials - definition of the access identifications for the different scan methods Configuring the Module Parameters This tab displays the list of parameters that must be defined for the Asset Discovery module and its general behavior. To modify the settings of the module, proceed as follows: 1. Select any line in the table in the right window pane. 2. Click Edit > Properties. The Properties pop-up menu will appear on the screen. 3. Make the appropriate modifications to the individual values. 4. Click OK to confirm the modifications and close the window. The new module settings will be taken into account immediately. Credentials This tab displays the credentials that are defined for the remote inventory process. These values must be defined and assigned via an operational rule, they may not be added or modified in this view. The table provides the following information: Parameter Protocol Login Description This field displays the protocol for which the account is defined, possible protocols are smb, ssh and snmp. The login name for the respective protocol. It has either one of the following formats: [domain name]/[user login] [local host name]/[user login] If the login concerns the SNMP protocol this field contains the name of the community.

9 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 9 Asset Discovery Object Configuration The Configuration node of the Asset Discovery provides access to the configuration of the objects required by the asset scan: Scan Configurations Target Lists Scan Configurations scan configurations define the actual scanning parameters. Depending to your network features these may vary considerably and you may select the most suitable to scan your environment or system. Scan configuration folders are created as organizational containers for the different scan configurations. They may contain any number of scan configurations for the execution of vulnerability scans of your system. Create Scan Configuration To create a new scan configuration, proceed as follows: 1. Select Edit > Create Scan Configuration. The Properties dialog box opens on the screen. 2. Define the basic settings of the new scan configuration. 3. Click OK to add it and close the window. Scan Configuration Scan configurations contain all the basic information for a scan, which it is to execute. It defines which protocols to use on the target devices to find the available asset information via the Active Protocols tab. Active Protocols The Active Protocols tab allows you to configure the parameters for the protocols used by the scan. It allows you to define the following settings: Parameter Name Activated Description User Account Description The fields in this column display the list of protocols available for scanning. The symbol in these fields indicate if the respective protocol is defined for scanning or not. This field displays the long name of the protocol abbreviation. These fields display if user authentication is not required for the scanning of this protocol and the number of user accounts/communities entered as authentication for the respective protocol. Target Lists Targets are all devices for which an asset discovery is to be executed by the scanner. As the BMC FootPrints Asset Core - Inventory Manager may scan not only devices which have a Asset Core agent installed but also those without, using device groups for target scanning would have been incomplete and the concept of targets or target lists was used instead. Note These target lists may be used for asset discovery scans and for vulnerability scans and may be modified in both Console locations. If you use the same lists for both types of scan, make sure they have not been modified before using them!

10 10 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery Target list folders are created as organizational containers for the different target lists. They may contain any number of target lists for the execution of vulnerability scans of your system. Target List Targets are all devices on which an asset discovery is to be executed by the scanner. As the BMC FootPrints Asset Core - Inventory Manager may scan not only devices which have a Asset Core agent installed but also those without, these lists can contain individual devices with or without a Asset Core agent installed and all the members of already existing device groups. Create Target List To create a new target list, proceed as follows: Targets 1. Select Edit > Create Target List. The Properties pop-up menu will appear on the screen. 2. Enter a name for the target list into the name field. 3. Click OK to confirm and close the window. The new target list will automatically be created and displayed in the right window pane. The Targets tab lists all targets which are members of the currently selected target list. Schedule Details This tab provides more detailed information about each of the assigned scans: Parameter Name Status Last Status Update Time Activation Schedule Termination Time of Assignment Description This column displays the list of names of all scans created for the currently selected scanner. The fields of this column display the status of the each scan. This time value indicates at which date and time the status displayed above was updated by the target s agent for the last time. This field shows the condition on which the scan will start executing on the targets. The fields of this column display the frequency with which the scan will be executed on the assigned device. This field displays when the scan execution is scheduled to be terminated, that is, when the scan is to be run for the definitely last time of the current scheduling cycle. This field displays the date and time at which the assignment between the objects was created in the database. Scanners Any device in your network may be a scanner, it only must be declared as such and have the required asset discovery module loaded. A scanner executes scans on individual devices or groups of devices, called targets or target lists. It accesses the targets via different protocols to retrieve all available asset information. This view provides the following information about the defined scanners:

11 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 11 Parameter Name IP Address Operating System Description The name of the scanner. The IP address of the scanner. The operating system running on the scanner. After a scanner is declared and configured as such, it will appear in the list of Scanners under the Asset Discovery node. For each of the scanners listed you may then create the asset scans it is to execute.do not forget to configure them as explained in paragraph Configure Asset Discovery Scanner of this manual. Defining a Scanner You may directly add a device as a Scanner under the Scanners node. Any device that fulfils the predefined requirements can be a scanner in BMC FootPrints Asset Core - Inventory Manager. The master is a scanner by default. To define a device as a scanner, proceed as follows: 1. Select the Asset Discovery node and then go to the Scanners node in the left window pane. 2. Click Edit > Add Device. The Add a Scanner pop-up menu will appear on the screen displaying the list of all devices, that may be a scanner because of their operating system. 3. Select the device to be added from one of the list boxes. 4. Click OK to confirm and close the window. The device will be added to the table of Scanners and its configuration parameter will be updated. Asset Discovery Scanner After a scanner is declared and set up as such, it will appear in the list of Scanners under the Asset Discovery node. For each of the scanners listed you may then create the scans it is to execute or run autodiscoveries. Before launching any scans make sure in via the Update node that your scanner is up to date on all its components. The Asset Discovery Scanner node has the following subnodes: Module Configuration Assigned Scans Assigned Scans This node provides information about all scans that are defined and scheduled for the currently selected scanner. Scan folders are created as organisational containers for the different scans. They may contain any number of scans for execution on your system. Create Scan To create a new scan by individually defining its components, proceed as follows: 1. Click Edit > Create Scan. The Properties dialog box is displayed on the screen. 2. Enter the desired data into the respective fields. 3. Click OK at the bottom of the window to confirm the data for the new scan or click Cancel to abandon without modifications and to close the window. The new scan will automatically be created and be displayed in the right window pane.

12 12 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery Asset Discovery Wizard You may also define a new scan via the Asset Discovery Wizard which allows to define all required components and parameters at the same time. For more information about this subject refer to chapter Asset Discovery via Wizard of this manual. Schedule Details This tab provides more detailed information about each of the assigned scans: Parameter Name Status Last Status Update Time Activation Schedule Termination Time of Assignment Description This column displays the list of names of all scans created for the currently selected scanner. The fields of this column display the status of the each scan. This time value indicates at which date and time the status displayed above was updated by the target s agent for the last time. This field shows the condition on which the scan will start executing on the targets. The fields of this column display the frequency with which the scan will be executed on the assigned device. This field displays when the scan execution is scheduled to be terminated, that is, when the scan is to be run for the definitely last time of the current scheduling cycle. This field displays the date and time at which the assignment between the objects was created in the database. Reassign Scan If you have made modifications to a scan which is already assigned for execution it must be reassigned. To reassign, proceed as follows: Start Scan 1. Select the scan which is to be reassigned in the table in the right window pane. 2. Click Edit > Reassign Scan. The reassignment process of the scan will be launched. You may manually start an existing scan to launch it immediately. To do so, proceed as follows: 1. Select the scan which is to be launched in the table in the right window pane. 2. Select Edit > Start Scan. Activate Scan The scan will be launched immediately. Depending on the choice of activation the scan may be deactivated. To activate, proceed as follows: Cancel Scan 1. Select the entry to activate in the table in the right window pane. 2. Click Edit > Activate Scan. The scan will be automatically activated. To cancel a currently executing scan proceed as follows:

13 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 13 Pause Scan 1. Select the scan to stop in the table in the right window pane. 2. Click Edit > Cancel Scan. The scan will be stopped. If for example an urgent demand is displayed to run a scan on a specific device and too many scans are already executing, you may pause a scan to run the urgent one. Pausing a scan will pause all sessions connected to this scan. To pause a scan, proceed as follows: 1. Select the scan to pause in the table in the right window pane. 2. Click Edit > Pause Scan. Resume Scan The scan and all its associated sessions will be paused. Paused scans and their sessions may be resumed manually. To do so, proceed as follows: 1. Select the scan to resume in the table in the right window pane. 2. Click Edit > Resume Scan. The scan and all its sessions will be resumed. Discovered Devices The Discovered Devices node provides the list of all devices without Asset Core agent, that were discovered and scanned for their assets by the scanner. This list shows all discovered devices independent of their function, that is, servers, workstations, printers or game consoles. Parameter Name IP Address Topology Type Type Operating System Description The name of the scanned device. If no name is available the IP address will be displayed instead. The icon of the device will indicate the operating system of the device, that is, if it is a Windows, a Linux or a Mac device for discovered PCs and the type of device for any other type of hardware, etc, if it is a switch, a router, etc. The IP address of the scanned device. The topology type of the device, which in this case will either be Unmanaged Device or Scanned Device, if the device was already scanned for vulnerabilities. This field displays the purpose type of the discovered device, that is, if it is a server, a workstation, a switch, a game console, etc. The operating system running on the scanned device. Purge Similar to the other inventory types the vulnerability inventory for a device may be purged. All scan inventory data will be deleted in this case. This operation is also taken into account by the Vulnerability Management license which will then be incremented again. If the device for which the inventory is purged does not have a Asset Core agent installed, that is, it is of topology type Scanned Device, not only the inventory will be purged but the device itself will be deleted from the Asset Core database. To purge a device and all its connected data from the database, proceed as follows:

14 14 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 1. Select the device to purge from the list in the right window pane. 2. Then click Edit > Purge. A confirmation window is displayed on the screen. 3. Click Yes to confirm and delete the device. Agent Rollout You may select in this list of scanned devices a number of them that do not yet have the Asset Core agent installed and create a new agent rollout to directly install the agent on them. Be aware, that this shortcut only works for devices on which no agent is yet installed, you cannot upgrade the agent this way. Proceed as follows: 1. Select the target device(s) in the table in the right window pane. 2. Then click Edit > Agent Rollout. The Agent Rollout Wizard is displayed on the screen. 3. Follow the instructions in the wizard and provide the required information. For more details on the wizard and its parameters refer to chapter Automatically Rolling out the Asset Core Agent via the Wizard in the Rollout manual. 4. Click Finish to confirm all choices in the wizard and launch the rollout as scheduled. Discovered Device A discovered device is an unmanaged device scanned by the Asset Discovery Scanner for its assets. It displays the information found as usual in form of tabs and subnodes. The following information may be collected for unmanaged devices: General information displayed on the device s General tab. Inventory information which may be found under the respective nodes: Connectivity inventory displayed in the device s Connectivity node. Custom inventory displayed in the device s Custom node. Hardware inventory displayed in the device s Hardware Inventory node. Software inventory displayed in the device s Software Inventory node. Vulnerability inventory displayed in the device s Vulnerability Inventory node. This type of inventory is only available for devices without agent with a valid Vulnerability Management license and is generated via the Vulnerability scanner. Inventory The inventory for a device is accessed through the device s Inventory subnode. It provides access to all different types of inventory that may be collected for a device. Its information is displayed via its tabs: Asset Summary Hardware Inventory Software Inventory Inventory Status The specific inventory information may be accessed via the respective subnodes: Connectivity Inventory Custom Inventory Hardware Inventory Software Inventory Asset Summary The Asset Summary node provides direct access to the most important information about a device. It lists the selected device s main information and a summary of the device s hardware, software and security inventory in the respective tabs. The tab displays the following general information about the device:

15 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 15 Parameter Network Name Operating System Name Description On top of the information the name of the device is displayed, either as its short network name if available, otherwise as its IP address together with the icon indicating its network status via the color, that is, green if the device is up and running and contactable and its operating system family. The name of the operating system installed on the currently selected device. IP Address The IP address of the device in its dotted version, such as Subnet Mask MAC Address Domain Name Disk Serial Number User Type Agent Version Last Update The subnet mask of the device. The MAC, that is, the hardware address of the currently selected device. Displays the full name of the domain the currently selected device belongs to, that is, kirk.enterprise.starfleet.com. The serial number of the hard disk of the device. This field displays the name of the user, that was logged when the last hardware inventory was generated. Displays the type of the device, that is, if it is a workstation, a server, a router, a switch, etc. The version number of the Asset Core agent installed on the device. Displays the date and time at which the information shown in this tab was last updated. Hardware Inventory The Hardware Inventory tab of the Asset Summary displays a summary of the complete hardware inventory that is displayed in the respective inventory subnode. Specifically it lists in a tabular summary information about the device s manufacturer, its OS, BIOS and processor, RAM and hard disk, and the screen, keyboard, mouse and network adapters. This tab is only available if the discovered asset is a PC. Software Inventory The software inventory also provides a summary view of the device complete software inventory displayed in its inventory subnode. You may select via a list on top of the table which type of collected information to display, that is, only the software found via the Add/Remove Programs or installed via MSI for a windows device, of by software type, that is, all web browsers. This tab is only available if the discovered asset is a PC. Inventory Status The Inventory node displays the following information about the different types of inventory available for the currently selected device. This tab is not available if no inventories may be generated du to license restrictions. Parameter Name Last Update Status Description The fields of this column list the available types of inventory. The date and time the respective inventory type was last updated. This field displays the license status for the inventory type, that is, if it is exceeded or expired. If the field is empty the license is valid. This field is applicable if no inventory has yet been generated. If the license is not valid this type of inventory cannot be generated for the respective device.

16 16 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery Connectivity The Connectivity for a discovered asset is only available if the asset is a hardware that can be contacted via SNMP and is able to connect other hardware devices, for example, if it is a router, a switch, and so on This inventory then displays the hardware connections of this asset. For more information about the hardware inventory of a device refer to chapter Connectivity Inventory in this manual. Custom The Custom for an unconnected or a discovered device provides the same data and information as for any other device in the network. Contrary to other inventory types, however, it is not collected remotely by an agent, it must be directly created in the device s Console view. For more information about how to create the custom inventory of a device and its possibilities refer to chapter Custom Inventory in this manual. Hardware Inventory The Hardware Inventory for an unconnected or discovered device provides the same data and information as for any other device in the network. For more information about the hardware inventory of a device refer to chapter Hardware Inventory in this manual. Software Inventory The Software Inventory for an unconnected or discovered device provides the same data and information as for any other device in the network. For more information about the software inventory of a device refer to chapter Software Inventory in this manual. Vulnerability Inventory The Vulnerability Inventory for an unmanaged device provides the same data and information as for any other device in the network. Contrary to the software and hardware inventory, however, it is must be generated via a scan with the Vulnerability Management node. For more information about how to create the Vulnerability Inventory of a device and its possibilities refer to chapter Inventory in the Vulnerability Management manual. Asset Discovery Scan A scan presents information about its configuration, that is, its targets, ports, schedule, etc., and details on its last execution. Each Asset Discovery Scan node has the following tabs: Scan Configuration Target Lists Assigned Schedule Sessions Scan Configuration This tab displays which scan configuration is used for the currently selected scan. The scan configuration defines the details of tests to be executed, that is, which ports to check for which protocols, which actions and tests to run. Assign Scan Configuration If you have manually created the scan, you may still need to assign a configuration to it. If the scan was created by the wizard, the configuration may already be defined. You may however also change an assigned scan configuration by first removing the currently assigned configuration as explained below and then adding the newly required one. To do so, proceed as follows: 1. Click Edit > Assign Scan Configuration in the icon bar. The Assign a Scan Configuration to the Scan dialog box opens on the screen. It displays the list of available scan configurations in its Available Objects box. 2. Select the desired configuration 3. Click OK to add it and close the window.

17 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 17 Target Lists This tab displays the target lists and targets the scan is to check. Targets are all devices which are to be checked for vulnerabilities by the Asset Core scanner. These lists can contain individual devices with or without a Asset Core agent installed and all the members of already existing device groups. Assign Target List If you have manually created the scan, you need to assign target lists to it. If the scan was created by the wizard, these may already be defined. You may however also want to add another target or target list later on, which is done via this tab. To do so, proceed as follows: 1. Select the Target Lists tab of the scan to which you want to add a new target list. 2. Click Edit > Assign Target List. The Assign a Target List dialog box opens on the screen. It displays the list of available target lists in its Available Objects box. 3. Select the desired target list(s) 4. Click OK to add it and then close the window. Assigned Schedule When a scan is created it is automatically assigned a scheduler. The Assigned Schedule tab of the scan s node provides the possibility to modify the timer for the currently selected scan and to define when and at which frequency it is to run. The default settings of the scheduler s timer are to execute the scan once a immediately with immediate activation as well, however, the assignment is still paused. If you have created the scan via the wizard you will also have defined the schedule, and these settings will be displayed here. Parameter Status Last Status Update Time Activation Schedule Termination Time of Assignment Description The fields of this column display the status of the scan. This time value indicates at which date and time the status displayed above was updated by the target s agent for the last time. This field shows the condition on which the scan will start executing on the targets. The fields of this column display the frequency with which the scan will be executed on the assigned device. This field displays when the scan execution is scheduled to be terminated, that is, when the scan is to be run for the definitely last time of the current scheduling cycle. This field displays the date and time at which the assignment between the objects was created in the database. Activate Scan Depending on the choice of activation the scan may be deactivated. To activate, proceed as follows: 1. Select the entry to activate in the table in the right window pane. 2. Click Edit > Activate Scan. The scan will be automatically activated.

18 18 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery Reassign Scan If you have made modifications to a scan which is already assigned for execution it must be reassigned. To reassign, proceed as follows: 1. Select the scan which is to be reassigned in the table in the right window pane. 2. Click Edit > Reassign Scan. The reassignment process of the scan will be launched. Sessions Scans are executed in sessions. A session is the complete scanning of one device of the target list. Generally an executing scan consists of as many sessions as it has targets, which may however not all be executing at the same time. The number of simultaneously running sessions can be defined in the module settings of the Vulnerability Management of the respective scanner. The Sessions tab displays the following information about the different sessions of the currently executing scan on the scanner: Parameter Status Device Name Description These fields display the current scan status of the respective target. If the target is can not be scanned, that is, it is not contactable, the status will display Unreachable. The fields of this column display the names of the scan targets. IP Address The IP address of the device in its dotted version, such as Operating System Name Hardware Inventory Software Inventory Discovery Time Start Time End Time Duration (sec) MAC Address The name of the operating system installed on the discovered device. This field indicates if the hardware inventory was generated for the respective device. Possible values are Yes and No. No will be displayed as long as the inventory collection is being executed and not updated to the master device. However it will also be displayed if the inventory collection failed for any type of reason. This field indicates if the software inventory was generated for the respective device. Possible values are Yes and No. No will be displayed as long as the inventory collection is being executed and not updated to the master device. However it will also be displayed if the inventory collection failed for any type of reason. This column displays the date and time at which the individual devices were discovered for the first time. The date and time at which the scanning session was started on the target client. The date and time at which the session finished. The the total time the session needed to execute in the regular time format hh:mm:ss. The MAC, that is, the hardware address of the currently discovered device. Reassign Scan If you have made modifications to a scan which is already assigned for execution it must be reassigned. To reassign, proceed as follows: 1. Select the scan which is to be reassigned in the table in the right window pane. 2. Click Edit > Reassign Scan.

19 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 19 The reassignment process of the scan will be launched. Cancel Scan To cancel a currently executing scan proceed as follows: 1. Select the scan to stop in the table in the right window pane. 2. Click Edit > Cancel Scan. The scan will be stopped. Discovering the Assets via the Wizard Asset Discovery scans may also be configured and executed via the provided wizard. The wizard may either use existing objects to execute or it may create new ones. Be aware, that to create new objects you need the manage capability for the top node of the respective object or at least one of its folders. By default objects created with the wizard will be located directly under the object s top node. If you do not have access to this node the new object will be created in the first folder for which you do have access rights. Otherwise, that is, if you do not have access to any of the objects of the type the object created via the wizard will be stored under the Lost and Found node. However, you now also have the possibility to specify the target directory for the newly created objects. The Asset Discovery wizard is available under the main Asset Discovery node and on the main Wizards menu which is always present, thus can be called at any moment. From anywhere in the Console select the Wizards > Asset Discovery menu item. The wizard is displayed on the screen with its first window. Discovery Type The first wizard window allows you to decide if you want to execute an asset discovery scan with the predefined default values or if you would like to create a new customized scan. Remember If you want to scan your network for virtual devices and physical ones you need to use the customized scan. Select the radio button for the scan type you want to execute. a) If you have left selected the Automatic radio button to execute a default scan the list below now explains the values that will be used for the default scan. Be aware that the master will not be scanned using this option. b) Enter the login to access the remote devices into the Windows Login (DomainLogin) and Windows Password fields. The login name must have the following format: <domain name>/<user login> if you are on a domain, <user login> if you are not on a domain. Executing an Automatic Scan This window provides a recaptitulation of the options defined for an automatic scan of your assets. 1. Check all defined options. 2. To modify any values click < Back to return to the previous window and select the Configurable radio button.

20 20 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery 3. If all options are defined as desired click Scan Now to launch the scan. Defining a Configurable Discovery In the second window you can define which parts of the scan are to be specifically defined, and for which the default values are to be used. 1. Check the respective radio buttons in the different boxes. Depending on your choices the corresponding steps in the hierarchy on the left will be highlighted and become available. 2. Click Next to continue. Defining the Scanner The Scanner window only is displayed on the screen if you have selected to NOT use the Master as your scanner. In this case another device to be used as the scanner must be selected. 1. Select the scanner device which is to execute the scan that is being defined via the wizard. If none of the defined scanners fits your requirements, you may also add another device as a Scanner: a) Click Add Scanner on top of the list box. The Add a Scanner pop-up menu will appear on the screen displaying the list of all devices, that may be a scanner because of their operating system. b) Select the device to be added from one of the list boxes. c) Click OK to confirm and close the window. The device will be added to the table of Scanners and its configuration parameter will be updated. d) Select the newly defined scanner in the list. 2. Then click Next to continue. Selecting the Scan Configuration This window is displayed if you have selected to use an existing scan configuration instead of creating a new one. It displays all scan configurations that are available. 1. Select the desired scan configuration from the displayed list of existing configurations. 2. Click Next to continue. Defining a New Scan Configuration This window will only be displayed if the option to create a new configuration was selected. 1. Enter the required information in the respective fields. 2. Click Next to continue. Defining the Scan In this wizard window, a unique descriptive name must be defined for the scan. This is the name of the scan which will be created with the data you define in the next windows and which will be added to the list of assigned scans under the selected scanner s node. 1. Enter a name for the new scan into the Name field.

21 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery Select a folder if the new scan is to be located in a specific folder. 3. Click Next to continue. Protocols The Protocols window only is displayed on the screen, if you are defining a new scan configuration. In this window you may define which protocols are to be used for scanning. 1. Define the date and time at which the assignment of the patch group to the targets is to be effected in the Select Patch Group Assignment Date box. 2. By default all protocols are activated, to deactivate a protocol uncheck the box next to it. If you are not scanning for virtual devices you may uncheck the VMware vsphere and Hyper-V protocols. 3. To add credentials to a protocol select its entry in the table and then click Add Credential to the right. The Credentials box becomes available. 4. To add a new user identification click Add at the bottom. The Properties window is displayed on the screen. 5. Enter the login name, corresponding password in the respective fields and reenter the password for confirmation. The login name must have the following format: <domain name>/<user login> if you are on a domain, <user login> if you are not on a domain. 6. If you are adding credentials for the SNMP protocol you must enter into these fields the name of the community and confirm it by re-entering into the respective field. 7. To view the passwords/communities you may also uncheck the Hide Passwords check box. Both password fields will now be displayed in clear text format. 8. To confirm the new user account click OK at the bottom of the window. 9. The account will be added to the list in the right window part. 10. Repeat the preceding steps to add more authentications if necessary. 11. To delete an existing user login from the selected protocol select it in the table and click Delete below the box. 12. Then click Next to continue. Defining the Target List This window only is displayed if you have selected to use an existing target list instead of creating a new one: 1. Select the target list to be used from the list of existing target lists. 2. Click Next to continue. Configuring a New Target List This step is only required if you decided to create a new target list for the devices to scan. 1. Enter a name for the new target list into the Name field and define a specific folder if necessary. 2. Add the devices to the scan. For this you have a number of different methods available. 3. Click Next to continue.

22 22 BMC FootPrints Asset Core - Asset Discovery What you have to know about Asset Discovery Scheduling the Scan This step will only be displayed if you decided to define a specific schedule for the scan. You can define the intervals and frequencies at which the scan is to be run. 1. Select in the Validity tab first the date of the actual execution by checking the respective radio button. 2. Then select in the Termination box when the scan is to be run for the last time. 3. Select the Frequency tab. 4. Here you may define the interval at which the scan is to be executed. Depending on the choice made at the radio buttons the different additional options of this tab become available. 5. When you have made your selections click Finish to confirm all scan configuration choices and launch the process. A confirmation window is displayed now on the screen. Here you may define the focus of the console, that is, which node will be displayed once the wizard closes and the scan in launched. To go directly to the newly created scan check the Go to Scan box. To immediately activate the new scan click Yes. To create the scan without activating it, click No. To launch this scan it must then be activated specifically via its Assigned Schedule tab.

BMC Client Management - Client Agent Rollout. Version 12.0

BMC Client Management - Client Agent Rollout. Version 12.0 BMC Client Management - Client Agent Rollout Version 12.0 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1994-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are

More information

BMC Client Management - Technical Specifications. Version 12.0

BMC Client Management - Technical Specifications. Version 12.0 BMC Client Management - Technical Specifications Version 12.0 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1994-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo

More information

Using the Cisco OnPlus Scanner to Discover Your Network

Using the Cisco OnPlus Scanner to Discover Your Network Using the Cisco OnPlus Scanner to Discover Your Network Last Revised: October 22, 2012 This Application Note explains how to use the Cisco OnPlus Scanner with the Cisco OnPlus Portal to discover and manage

More information

Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.

Cisco is a registered trademark or trademark of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1996-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered

More information

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

Freshservice Discovery Probe User Guide

Freshservice Discovery Probe User Guide Freshservice Discovery Probe User Guide 1. What is Freshservice Discovery Probe? 1.1 What details does Probe fetch? 1.2 How does Probe fetch the information? 2. What are the minimum system requirements

More information

Kaseya 2. User Guide. Version R8. English

Kaseya 2. User Guide. Version R8. English Kaseya 2 Discovery User Guide Version R8 English September 19, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Quick Start Guide 7.0 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

LepideAuditor Suite for File Server. Installation and Configuration Guide

LepideAuditor Suite for File Server. Installation and Configuration Guide LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers

More information

Verizon Remote Access User Guide

Verizon Remote Access User Guide Version 17.12 Last Updated: August 2012 2012 Verizon. All Rights Reserved. The Verizon names and logos and all other names, logos, and slogans identifying Verizon s products and services are trademarks

More information

User's Manual. Intego Remote Management Console User's Manual Page 1

User's Manual. Intego Remote Management Console User's Manual Page 1 User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Configuration Guide. Remote Backups How-To Guide. Overview

Configuration Guide. Remote Backups How-To Guide. Overview Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

Quick Start Guide for Parallels Virtuozzo

Quick Start Guide for Parallels Virtuozzo PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current

More information

BMC BladeLogic Client Automation Installation Guide

BMC BladeLogic Client Automation Installation Guide BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

BMC Service Request Management 7.6.04 User s Guide

BMC Service Request Management 7.6.04 User s Guide BMC Service Request Management 7.6.04 User s Guide January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

NetBrain Discovery Appliance Manual

NetBrain Discovery Appliance Manual NetBrain Discovery Appliance Manual NetBrain Technologies, Inc. 2009-07-20-1 - Table of Contents 1. Overview... 4 2. Installation... 5 2.1 Installation Software... 5 2.1.1 Install ActivePerl... 5 2.1.2

More information

Parallels Plesk Panel

Parallels Plesk Panel Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011

More information

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Version 8.2 Tivoli Endpoint Manager for Asset Discovery User's Guide Note Before using this information and the product it supports,

More information

SmartSync Monitor Help

SmartSync Monitor Help 1.0 (Build 15) 2 Table of Contents Foreword 0 Part I Welcome to SmartSync Monitor 3 Part II Getting Started 4 1 Copyright... 4 2 System... requirements and installation 4 3 Uninstalling... 5 6 Part III

More information

PATROL Console Server and RTserver Getting Started

PATROL Console Server and RTserver Getting Started PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

Compuprint 4247 Serial Matrix Printers

Compuprint 4247 Serial Matrix Printers Compuprint 4247 Serial Matrix Printers Remote Printer Management Utility for Serial Matrix Printers MAN10300-00.00 First edition (October 2011) This edition applies to the Compuprint 4247 printers and

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

EventTracker Enterprise v7.3 Installation Guide

EventTracker Enterprise v7.3 Installation Guide EventTracker Enterprise v7.3 Installation Guide Publication Date: Sep 11, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help the users to install

More information

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11

Table of Contents. Introduction...9. Installation...17. Program Tour...31. The Program Components...10 Main Program Features...11 2011 AdRem Software, Inc. This document is written by AdRem Software and represents the views and opinions of AdRem Software regarding its content, as of the date the document was issued. The information

More information

BMC Performance Manager Portal Monitoring and Management Guide

BMC Performance Manager Portal Monitoring and Management Guide BMC Performance Manager Portal Monitoring and Management Guide Supporting BMC Performance Manager Portal 2.7 Remote Service Monitor 2.7 April 2009 www.bmc.com Contacting BMC Software You can access the

More information

Using Device Discovery

Using Device Discovery 2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery

More information

Discovery Guide. Secret Server. Table of Contents

Discovery Guide. Secret Server. Table of Contents Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Installation and Operation Manual Portable Device Manager, Windows version

Installation and Operation Manual Portable Device Manager, Windows version Installation and Operation Manual version version About this document This document is intended as a guide for installation, maintenance and troubleshooting of Portable Device Manager (PDM) and is relevant

More information

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks

More information

Xerox Secure Access Unified ID System 5.4 Administration Guide

Xerox Secure Access Unified ID System 5.4 Administration Guide 2014 Xerox Secure Access Unified ID System 5.4 Administration Guide Xerox Secure Access Unified ID System 5.4 Administration Guide Document Revision History Revision Date Revision List September 12, 2014

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

CPEi 800/825 Series. User Manual. * Please see the Introduction Section

CPEi 800/825 Series. User Manual. * Please see the Introduction Section CPEi 800/825 Series User Manual * Please see the Introduction Section Contents Introduction...iii Chapter 1: CPEi 800/825 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the

More information

InventoryControl for use with QuoteWerks Quick Start Guide

InventoryControl for use with QuoteWerks Quick Start Guide InventoryControl for use with QuoteWerks Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

In order to upload a VM you need to have a VM image in one of the following formats:

In order to upload a VM you need to have a VM image in one of the following formats: What is VM Upload? 1. VM Upload allows you to import your own VM and add it to your environment running on CloudShare. This provides a convenient way to upload VMs and appliances which were already built.

More information

Upgrading from Call Center Reporting to Reporting for Contact Center. BCM Contact Center

Upgrading from Call Center Reporting to Reporting for Contact Center. BCM Contact Center Upgrading from Call Center Reporting to Reporting for Contact Center BCM Contact Center Document Number: NN40010-400 Document Status: Standard Document Version: 02.00 Date: June 2006 Copyright Nortel Networks

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

VT Technology Management Utilities for Hyper-V (vtutilities)

VT Technology Management Utilities for Hyper-V (vtutilities) VT Technology Management Utilities for Hyper-V (vtutilities) vtutilities provide a local graphical user interface (GUI) to manage Hyper-V. Hyper-V is supported on Windows Server 2008 R2 and Windows Server

More information

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started

Getting Started. Symantec Client Security. About Symantec Client Security. How to get started Getting Started Symantec Client Security About Security Security provides scalable, cross-platform firewall, intrusion prevention, and antivirus protection for workstations and antivirus protection for

More information

vtcommander Installing and Starting vtcommander

vtcommander Installing and Starting vtcommander vtcommander vtcommander provides a local graphical user interface (GUI) to manage Hyper-V R2 server. It supports Hyper-V technology on full and core installations of Windows Server 2008 R2 as well as on

More information

Software Version 5.2 June 2015. Xerox Device Agent User Guide

Software Version 5.2 June 2015. Xerox Device Agent User Guide Software Version 5.2 June 2015 Xerox Device Agent User Guide 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design and Phaser are trademarks of Xerox Corporation in the United States and/or

More information

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

Introduction to Hyper-V High- Availability with Failover Clustering

Introduction to Hyper-V High- Availability with Failover Clustering Introduction to Hyper-V High- Availability with Failover Clustering Lab Guide This lab is for anyone who wants to learn about Windows Server 2012 R2 Failover Clustering, focusing on configuration for Hyper-V

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

XStream Remote Control: Configuring DCOM Connectivity

XStream Remote Control: Configuring DCOM Connectivity XStream Remote Control: Configuring DCOM Connectivity APPLICATION BRIEF March 2009 Summary The application running the graphical user interface of LeCroy Windows-based oscilloscopes is a COM Automation

More information

Embarcadero Performance Center 2.7 Installation Guide

Embarcadero Performance Center 2.7 Installation Guide Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.

More information

NETWRIX WINDOWS SERVER CHANGE REPORTER

NETWRIX WINDOWS SERVER CHANGE REPORTER NETWRIX WINDOWS SERVER CHANGE REPORTER INSTALLATION AND CONFIGURATION GUIDE Product Version: 4.0 March 2013. Legal Notice The information in this publication is furnished for information use only, and

More information

Scholastic Reading Inventory Installation Guide

Scholastic Reading Inventory Installation Guide Scholastic Reading Inventory Installation Guide For use with Scholastic Reading Inventory version 2.0.1 or later and SAM version 2.0.2 or later Copyright 2011 by Scholastic Inc. All rights reserved. Published

More information

Synchronizer Installation

Synchronizer Installation Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient

More information

Using SolarWinds Orion for Cisco Assessments

Using SolarWinds Orion for Cisco Assessments Using SolarWinds Orion for Cisco Assessments Cisco Network Assessments Registering Your Assessment... 1 Installing SolarWinds Orion Network Performance Monitor... 1 Discovering Your Network... 1 Polling

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

Orientation Course - Lab Manual

Orientation Course - Lab Manual Orientation Course - Lab Manual Using the Virtual Managed Workplace site for the lab exercises Your instructor will provide the following information before the first lab exercise begins: Your numerical

More information

Software Version 5.1 November, 2014. Xerox Device Agent User Guide

Software Version 5.1 November, 2014. Xerox Device Agent User Guide Software Version 5.1 November, 2014 Xerox Device Agent User Guide 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United States and/or

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Getting Started with IntelleView POS Administrator Software

Getting Started with IntelleView POS Administrator Software Getting Started with IntelleView POS Administrator Software Administrator s Guide for Software Version 1.2 About this Guide This administrator s guide explains how to start using your IntelleView POS (IntelleView)

More information

FreeFlow Accxes Print Server V15.0 August 2010 701P50924. Xerox FreeFlow Accxes Print Server Drivers and Client Tools Software Installation Guide

FreeFlow Accxes Print Server V15.0 August 2010 701P50924. Xerox FreeFlow Accxes Print Server Drivers and Client Tools Software Installation Guide FreeFlow Accxes Print Server V15.0 August 2010 701P50924 Xerox FreeFlow Accxes Print Server Drivers and Client Tools Software 2010 Xerox Corporation. All rights reserved. XEROX and Xerox and Design, 6204,

More information

Comodo LoginPro Software Version 1.5

Comodo LoginPro Software Version 1.5 Comodo LoginPro Software Version 1.5 User Guide Guide Version 1.5.030513 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File

Administration guide. Océ LF Systems. Connectivity information for Scan-to-File Administration guide Océ LF Systems Connectivity information for Scan-to-File Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form

More information

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Note Before using this information and the product it supports,

More information

User s Guide. Software Version 12.04.0056

User s Guide. Software Version 12.04.0056 User s Guide PowerAlert Network Management System Software Version 12.04.0056 Note: PowerAlert is not required to operate your UPS system. For the latest PowerAlert updates, go to www.tripplite.com/software.

More information

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.

Reflection DBR USER GUIDE. Reflection DBR User Guide. 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip. Reflection DBR USER GUIDE 995 Old Eagle School Road Suite 315 Wayne, PA 19087 USA 610.964.8000 www.evolveip.net Page 1 of 1 Table of Contents Overview 3 Reflection DBR Client and Console Installation 4

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Parallels Remote Application Server

Parallels Remote Application Server Parallels Remote Application Server Administrator's Guide v15 Copyright 1999-2016 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen

More information

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide

Installation Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Installation Guide Novell Storage Manager 3.1.1 for Active Directory Installation Guide www.novell.com/documentation Installation Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices Condrey

More information

Strategic Asset Tracking System User Guide

Strategic Asset Tracking System User Guide Strategic Asset Tracking System User Guide Contents 1 Overview 2 Web Application 2.1 Logging In 2.2 Navigation 2.3 Assets 2.3.1 Favorites 2.3.3 Purchasing 2.3.4 User Fields 2.3.5 History 2.3.6 Import Data

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

CA arcserve Unified Data Protection Agent for Linux

CA arcserve Unified Data Protection Agent for Linux CA arcserve Unified Data Protection Agent for Linux User Guide Version 5.0 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as

More information

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express

ArcGIS 9. Installation Guide: Workgroup for Microsoft SQL Server Express ArcGIS 9 Installation Guide: Workgroup for Microsoft SQL Server Express Copyright 2006 ESRI All Rights Reserved. Printed in the United States of America. The information contained in this document is the

More information

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation

Legal Notes. Regarding Trademarks. 2011 KYOCERA MITA Corporation Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Setting up VPN and Remote Desktop for Home Use

Setting up VPN and Remote Desktop for Home Use Setting up VPN and Remote Desktop for Home Use Contents I. Prepare Your Work Computer... 1 II. Prepare Your Home Computer... 2 III. Run the VPN Client... 3-4 IV. Remote Connect to Your Work Computer...

More information

Installation and Configuration User's Guide

Installation and Configuration User's Guide Dell UPS Management Software Installation and Configuration User's Guide www.kesintisizservis.com Notes NOTE: A NOTE indicates important information that helps you make better use of your software. Information

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

MULTIFUNCTIONAL DIGITAL SYSTEMS. Operator s Manual for Backup/Restore Utility

MULTIFUNCTIONAL DIGITAL SYSTEMS. Operator s Manual for Backup/Restore Utility MULTIFUNCTIONAL DIGITAL SYSTEMS Operator s Manual for Backup/Restore Utility 2009 KYOCERA MITA Corporation All rights reserved Preface Thank you for purchasing Multifunctional Digital Color Systems. Read

More information

AT-UWC Wireless LAN Controller. Installation Guide. Software Version

AT-UWC Wireless LAN Controller. Installation Guide. Software Version Software Version Installation Guide This Installation Guide is an introductory guide to help you start the software-based AT-UWC Wireless LAN Controller. It describes how to run the AT-UWC-Install program

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Symantec Virtual Machine Management 7.1 User Guide

Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide Symantec Virtual Machine Management 7.1 User Guide The software described in this book is furnished under a license agreement and may be used only in

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved.

User Guide. Version 3.2. Copyright 2002-2009 Snow Software AB. All rights reserved. Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or

More information

@ptitude Observer. Installation Manual. Part No. 32170700 Revision G

@ptitude Observer. Installation Manual. Part No. 32170700 Revision G Part No. 32170700 Revision G Installation Manual Copyright 2012 by SKF Reliability Systems All rights reserved. Aurorum 30, 977 75 Lulea Sweden Telephone: +46 (0) 31 337 10 00, Fax: +46 (0) 920 134 40

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for

More information

Deploying Microsoft Clusters in Parallels Virtuozzo-Based Systems

Deploying Microsoft Clusters in Parallels Virtuozzo-Based Systems Parallels Deploying Microsoft Clusters in Parallels Virtuozzo-Based Systems Copyright 1999-2008 Parallels, Inc. ISBN: N/A Parallels Holdings, Ltd. c/o Parallels Software, Inc. 13755 Sunrise Valley Drive

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) ( SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies

More information