Whitepaper On Agent versus Agent less management



Similar documents
Whitepaper. Business Service monitoring approach

LEARNING SOLUTIONS website milner.com/learning phone

STeP-IN SUMMIT June 18 21, 2013 at Bangalore, INDIA. Enhancing Performance Test Strategy for Mobile Applications

NERC CIP VERSION 5 COMPLIANCE

Horizontal Integration - Unlocking the Cloud Stack. A Technical White Paper by FusionLayer, Inc.

OPC and DCOM: 5 things you need to know Author: Randy Kondor, B.Sc. in Computer Engineering

ARE AGENTS NECESSARY FOR ACCURATE MONITORING?

Monitoring the BlackBerry Enterprise Server

STeP-IN SUMMIT June 18 21, 2013 at Bangalore, INDIA. Performance Testing of an IAAS Cloud Software (A CloudStack Use Case)

Faster, Cheaper, Safer: Improving Agility, TCO, and Security with Agentless Job Scheduling. A White Paper Prepared for BMC Software August 2006

OPC & DCOM Troubleshooting: Quick Start Guide. Author: Randy Kondor, B.Sc. in Computer Engineering January 2008

Microsoft Exchange Load Balancing. Unique Applied Patent Technology By XRoads Networks

Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

PANO MANAGER CONNECTOR FOR SCVMM& HYPER-V

Policy Management: The Avenda Approach To An Essential Network Service

The ROI of Automated Agentless Endpoint Management

Sophos Mobile Control Technical guide

SNMP Informant. SNMP Informant, the default Microsoft SNMP extension agents and WMI January 2009

Configuring and Monitoring SNMP Generic Servers. eg Enterprise v5.6

SapphireIMS 4.0 BSM Feature Specification

Real World Considerations for Implementing Desktop Virtualization

SapphireIMS Business Service Monitoring Feature Specification

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Open-Xchange Hosted Edition Directory Integration

20696B: Administering System Center Configuration Manager and Intune

Cisco PIX vs. Checkpoint Firewall

Secure Networks for Process Control

Directory Integration in LANDesk Management Suite

Managing Enterprise Devices and Apps using System Center Configuration Manager 20696B; 5 Days, Instructor-led

Server Deployment Overview

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Server Installation ZENworks Mobile Management 2.7.x August 2013

Technical White Paper BlackBerry Enterprise Server

Windows Embedded Security and Surveillance Solutions

Important Notes for WinConnect Server ES Software Installation:

Reporting Services. White Paper. Published: August 2007 Updated: July 2008

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016

Microsoft Virtual Desktop Infrastructure (VDI) FAQ

System Planning, Deployment, and Best Practices Guide

White Paper. Enterprise IPTV and Video Streaming with the Blue Coat ProxySG >

System Services. Engagent System Services 2.06

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

An Oracle White Paper May Distributed Development Using Oracle Secure Global Desktop

Mobile Performance Testing Approaches and Challenges

Virtual Private Network (VPN)

SECURELINK.COM ENTERPRISE REMOTE SUPPORT NETWORK

Outgoing VDI Gateways:

An Oracle White Paper May Oracle Database Cloud Service

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Windows Server ,500-user pooled VDI deployment guide

Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Delphi 2015 SP1-AP1 System Requirements

BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 2. Feature and Technical Overview

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

SAS 9.4 Intelligence Platform

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

2X SecureRemoteDesktop. Version 1.1

NetScaler Logging Facilities

Next Generation Network Firewall

WHY EXTENDING GROUP POLICY MAKES SENSE FOR YOUR WINDOWS ENTERPRISE

Enterprise Remote Support Network

Course MS20696A Managing Enterprise Devices and Apps using System Center Configuration Manager

Implementing Disaster Recovery? At What Cost?

PC Power Management FAQ

Egnyte Local Cloud Architecture. White Paper

Unified network traffic monitoring for physical and VMware environments

By the Citrix Publications Department. Citrix Systems, Inc.

Installation and User Guide

Kaspersky Security Center 10 Getting Started

WHITEPAPER. PHD Virtual Monitor: Unmatched Value. of your finances. Unmatched Value for Your Virtual World

Managing Enterprise Devices and Apps using System Center Configuration Manager

The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions

Using hp OpenView Omniback II GUI Via Slow Remote Connections

A Guide to Understanding SNMP

Oracle Enterprise Manager

An Oracle White Paper June Oracle Database Firewall 5.0 Sizing Best Practices

capacity management for StorageWorks NAS servers

AdminToys Suite. Installation & Setup Guide

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Virtualizing Enterprise Desktops and Apps

A brief on Two-Factor Authentication

This document has for purpose to elaborate on how Secomea have addressed all these topics with a solution consisting of the three components:

Firewalls Overview and Best Practices. White Paper

Project management integrated into Outlook

Microsoft Exam

Integrated management information in utilities

Meeting the Challenges of Virtualization Security

StarWind iscsi SAN Software: Installing StarWind on Windows Server 2008 R2 Server Core

Centrata IT Management Suite 3.0

Unicenter Remote Control r11

Key Considerations for Vulnerability Management: Audit and Compliance

RemoteApp Publishing on AWS

Citrix XenDesktop Backups with Xen & Now by SEP

Zerto Virtual Manager Administration Guide

Whitepaper Continuous Availability Suite: Neverfail Solution Architecture

Online Transaction Processing in SQL Server 2008

Transcription:

Whitepaper On Agent versus Agent less management Swaminathan V Tecknodreams Restricted Page 1 of 7

Copyright Copyright 2008 Tecknodreams Software Consulting Pvt. Ltd. All Rights Reserved. Restricted Rights Legend This documentation is subject to and made available only pursuant to the terms of the Tecknodreams License Agreement and may be used or copied only in accordance with the terms of that agreement. It is against the law to copy the documentation except as specifically allowed in the agreement. This document may not, in whole or in part, be copied photocopied, reproduced, translated, or reduced to any electronic medium or machine readable form without prior consent, in writing, from Tecknodreams. Information in this document is subject to change without notice and does not represent a commitment on the part of Tecknodreams. Tecknodreams Restricted Page 2 of 7

Introduction Emergence of sophisticated communication technologies, secure methodologies and industry standard adoption has enabled the possibility of managing the desktops, servers, systems, network devices and applications from the centralized server without the need to install proprietary agents on the target device which is being managed. Central server shall be responsible for collecting the data from each of the device under management and this is referred as Agentless management. Historically, management products used custom application referred as management agents which runs on the target device under management and performs the data collection and manageability tasks as per the instruction from the central server. The concept of having separate proprietary application for this purpose is referred as agent based management. This document discusses about the pros and cons involved agent and Agentless architecture for management. The purpose of this document is to give an audience a real picture of what is involved in management, how each of the architecture works and the merits of the same. What is Agent based management? - Using proprietary application for collecting the data and managing the target devices is called agent based architecture. - Management products typically provide an agent for each flavor of the operating system and the agents are deployed on the target device either manually or automatically based on the product maturity. - Agents have to be running on the target system to be manageable. If the agents are not running, management product shall not have any control over that device. - Intelligence of Agent application and feature depth of the agents depends purely on the vendor or product as there is no standards for the custom agents. Some agents are bulky and hog system(cpu & memory) resources and some agents act as simple broker to enable the communication. What is Agentless management? The term Agent is being used to refer proprietary agent and Agentless refers to the products which does not require proprietary agents for managing the target systems/devices. - Agentless management products typically make use of the native management interfaces or technologies available with the operating system or devices and then achieve the needed management objective. Tecknodreams Restricted Page 3 of 7

For example, Microsoft windows operating systems provide Windows management interface(wmi) based manageability support for managing operating systems, applications, etc. For managing Unix based operating systems, the most preferred mode is Secure Shell(SSH) and the complete system can be managed using this. Network devices and standard applications typically support Simple network management protocol (SNMP) agents to manage it effectively. Applications expose interfaces through Java management extensions(jmx), web services or through other open standards to make it manageable. Due to the availability of above options, it has become practical and feasible to perform management from central server without the need to deploy proprietary agents. Agent vs Agentless Management In this section, we compare the pros and cons of both the approaches by taking most commonly debated aspects and then analyze it based on the experience. Sl. No Feature under comparison Agent based architecture 1 Scalability Agents run on the target device under management and perform the specific management task which has been configured dynamically by the server. 2 Agent manageability Conceptually, the agents can be used efficiently to scaleup and manage very large networks as they run on individual systems. However, it depends on the agent implementation and central server implementation as the bottlenecks are found in many products in their approach. Agents need to be installed on target systems/devices Agentless Architecture As the polling is performed from the central server, experts feel that their may be an restriction on the number of target devices which are manageable through this approach. Agentless products can scale through the adoption of multi-threaded asynchronous data collection approach and can manage very large environments. Certain products distribute the server load by having additional data collection server for performing remote data collection and scale-up No proprietary agents are needed. Hence the Tecknodreams Restricted Page 4 of 7

overhead 3 Agents security Threats 4 Customers openness for installing 3 rd party agents 5 Administrative privilege and it has to be monitored for uptime and agent performance as well. If there is a problem with an agent in a large environment, all the agents need to get upgraded. This overhead can become expensive at times and create operational havoc. Proprietary agents can become a security threat to an organization, If it has any vulnerability. Also upgrading them can prove to be a challenge. Network managers and server administrators in customers place are not open to install any proprietary agents in their production or mission critical system. This poses challenge at times to convince the customer and get a buy-in for installation Central server requires administrative privilege to push the agents dynamically. Customers hesitate to share their critical passwords at times. Certain agents can be installed manually and started as part of system start-up. These agents do not require administrative privilege to perform management. However, the operation overhead is painful. proprietary agent manageability overhead is zero. However, there is a need to make sure the native interfaces available with the operating system or devices are active and accessible. No proprietary agents are involved and the risk due to this aspect is Zero. Customers are quite comfortable since it does not disturb their existing baselined configuration. They are open to try this approach. Central server requires administrative privilege to perform remote data collection. Customers hesitate to share their critical passwords at times. 6 Protection against network failures Agents can gather the local monitoring information, store it and then synchronize with the central server upon completion. It is not possible to manage the remote system or device when there is a network failure. Tecknodreams Restricted Page 5 of 7

7 Complexity of Management 8 Support for new operating systems and devices 9 Agent Intelligence & Network communication traffic Loss of data against network failures can be avoided. Agent based architecture are relatively complex to deploy and manage as it involves diagnosis of various agents and central server. The skill level needed is relatively higher. Need to depend on product vendor to announce a support for new operating system or device and release an agent for the same. At times, such agents(newly released) are vulnerable with quality issues or charged separately by the product vendor for commercial gains. Agents are embedded with an additional intelligence of management. Hence good agent implementation transmits only the necessity data after performing needed analysis and compression. Thus reduces the size of data transmitted over network. Network connectivity is mandatory and must for an Agentless management. To protect against internet or broadband failures, remote data collection servers are set-up in the LAN environment to collect the data and synchronize with the central server once the network connectivity resumes. Uses native agents and information about it are public and proven. Hence manageability is relatively simple and skill level required is lesser. Standard based management. Operating systems and devices are released with manageability as basic necessity. Hence it can be brought under management without any vendor dependency or commercial implications. Data collection is generic and analysis is performed at the central server. Hence the size of data is relatively large. This is applicable only for inventory data collection since Agentless management systems pull all the data and then perform change analysis in the server. Hence complete inventory is re-transmitted each-time. However, it is performed at Tecknodreams Restricted Page 6 of 7

10 Controlling the systems It is possible to enforce certain policies as the agents shall be running and monitoring on the target systems all the time. For example, if the user needs to be blocked against launching a certain application, it can be achieved through effective agent implementation. However, agents can be turned off selectively by the users, if they have privilege. Performance data monitoring does not have additional overhead with this approach. It is possible to enforce certain policies by working with windows domain policies. Since there is no proprietary agents, enforcements against process launch, etc. cannot be achieved. Conclusion From the technology perspective, it is possible to achieve the manageability needs through agent based as well as agent-less architecture and each approach has its pros and cons. Industry has started adapting the agent-less architecture in a big way and most of the products have come out with their Agentless offering. Some of the industry leaders are yet to launch their Agentless offering due to their strong agent based market presence and it is expected that they shall be launching their offering in near future. It is recommended to go with the hybrid model and use the Agentless approach as a default management technique due to simplicity and the vast advantage it offers and selectively look the need for agents based on the merit of the case. Tecknodreams Restricted Page 7 of 7