IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog



Similar documents
IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide

IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM

IBM Enterprise Marketing Management. Domain Name Options for

Platform LSF Version 9 Release 1.2. Migrating on Windows SC

IBM Cognos Controller Version New Features Guide

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment

IBM Enterprise Marketing Management. Domain Name Options for

IBM Security QRadar Version (MR1) Checking the Integrity of Event and Flow Logs Technical Note

Linux. Managing security compliance

IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

IBM Endpoint Manager Version 9.2. Software Use Analysis Managing Software Inventory Guide

IBM Security SiteProtector System Migration Utility Guide

Packet Capture Users Guide

Installing on Windows

Patch Management for Red Hat Enterprise Linux. User s Guide

Tivoli Endpoint Manager for Security and Compliance Analytics

IBM Cognos Controller Version New Features Guide

IBM Security QRadar Version (MR1) Replacing the SSL Certificate Technical Note

IBM Security QRadar Version (MR1) Configuring Custom Notifications Technical Note

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2

Tivoli Endpoint Manager for Configuration Management. User s Guide

Getting Started With IBM Cúram Universal Access Entry Edition

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

IBM Security QRadar Version Installing QRadar with a Bootable USB Flash-drive Technical Note

IBM Configuring Rational Insight and later for Rational Asset Manager

Tivoli IBM Tivoli Monitoring for Transaction Performance

IBM Security QRadar Version (MR1) Installing QRadar 7.1 Using a Bootable USB Flash-Drive Technical Note

Software Usage Analysis Version 1.3

OS Deployment V2.0. User s Guide

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

IBM Tivoli Web Response Monitor

Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal

Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version First Edition (December 7, 2007)

IBM FileNet System Monitor FSM Event Integration Whitepaper SC

IBM Digital Analytics Enterprise Dashboard User's Guide

Cúram Business Intelligence and Analytics Guide

Tivoli Security Compliance Manager. Version 5.1 April, Collector and Message Reference Addendum

IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan

IBM VisualAge for Java,Version3.5. Remote Access to Tool API

IBM Connections Plug-In for Microsoft Outlook Installation Help

Sterling Supplier Portal. Overview Guide. DocumentationDate:9June2013

IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager

Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide

IBM Lotus Protector for Mail Encryption

DataPower z/os crypto integration

Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide

IBM FlashSystem. SNMP Guide

IBM Endpoint Manager for Software Use Analysis Version Beta Features Guide

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

IBM TRIRIGA Application Platform Version Reporting: Creating Cross-Tab Reports in BIRT

IBM Security QRadar Version Common Ports Guide

Implementing the End User Experience Monitoring Solution

IBM Lotus Protector for Mail Encryption. User's Guide

Active Directory Synchronization with Lotus ADSync

IBM Endpoint Manager. Security and Compliance Analytics Setup Guide

WebSphere Commerce V7.0

IBM SmartCloud Analytics - Log Analysis Version User's Guide

IBM Lotus Protector for Mail Encryption

Tivoli Endpoint Manager for Software Distribution. User s Guide

Client Manager for Endpoint Protection. User s Guide

Remote Control Tivoli Endpoint Manager - TRC User's Guide

Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series

IBM Enterprise Content Management Software Requirements

Rational Build Forge. AutoExpurge System. Version7.1.2andlater

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1

IBM DB2 Data Archive Expert for z/os:

IBM Tivoli Service Request Manager 7.1

Rational Developer for IBM i (RDI) Distance Learning hands-on Labs IBM Rational Developer for i. Maintain an ILE RPG application using

Remote Support Proxy Installation and User's Guide

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide

Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.

Omnibus Dashboard Best Practice Guide and Worked Examples V1.1

Power Management. User s Guide. User s Guide

IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide

Communications Server for Linux

IBM Client Security Solutions. Password Manager Version 1.4 User s Guide

Copyright International Business Machines Corporation 2015

Database lifecycle management

QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide

Rational Reporting. Module 3: IBM Rational Insight and IBM Cognos Data Manager

IBM Security SiteProtector System Two-Factor Authentication API Guide

IBM Endpoint Manager Version 9.0. Patch Management for Red Hat Enterprise Linux User's Guide

Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide

IBM BigFix Version 9.2. Patch for CentOS User's Guide IBM

IBM XIV Provider for Microsoft Windows Volume Shadow Copy Service Version Release Notes

Reading multi-temperature data with Cúram SPMP Analytics

z/os V1R11 Communications Server system management and monitoring

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide

QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide

S/390 Virtual Image Facility for LINUX Guide and Reference

SmartCloud Monitoring - Capacity Planning ROI Case Study

IBM WebSphere Adapter for PeopleSoft Enterprise Quick Start Tutorials

FileNet Integrated Document Management Technical Bulletin

IBM Cloud Orchestrator Content Pack for OpenLDAP and Microsoft Active Directory Version 2.0. Content Pack for OpenLDAP and Microsoft Active Directory

Release 7.1 Installation Guide

IBM XIV Management Tools Version 4.7. Release Notes IBM

Endpoint Manager for Mobile Devices Setup Guide

IBM Endpoint Manager Version 9.1. Patch Management for Mac OS X User's Guide

Transcription:

IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog

IBM Endpoint Manager for Software Use Analysis Version 9 Release 0 Customizing the software catalog

Customizing the software catalog This edition applies to version 9.0 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright IBM Corporation 2002, 2014. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Contents Chapter 1. Catalog customization process............... 1 Step 1: Prioritize the work.......... 1 Step 2: Analyze your software........ 1 Step 3: Review information about files and packages 2 Step 4: Create component signatures...... 3 Privacy policy considerations..... 11 Chapter 2. Creating signatures..... 5 Notices............... 9 Trademarks.............. 10 Copyright IBM Corp. 2002, 2014 iii

iv IBM Endpoint Manager for Software Use Analysis: Customizing the software catalog

Chapter 1. Catalog customization process The process of adding custom signatures to the software catalog requires careful planning and consideration. It starts with identifying products that you expect to discover but are not reported or are missing from the software catalog. Next, you should organize your work to ensure that the most important products are given the highest priority. Then, you determine what files or packages can be used to detect the software and report its usage. Finally, you can create the signatures. Note: Software Use Analysis is intended for software inventory and license management. It is suggested that you extend the software catalog for those purposes only. Process input The input to the catalog customization process is a list of software products that you want to be discovered. The list can be based on the general knowledge of your environment and the procurement data. As the discovery, monitoring, and license management of every software product require extra effort, target products on the basis of license expenses. Focus on a few selected products and adopt an iterative approach instead of trying to work on all products simultaneously. Required skills Step 1: Prioritize the work A set of skills that are helpful during the creation of the custom catalog content includes: v v General knowledge of the software products that are used in your company, their architecture, and licensing models General knowledge of the operating systems on which the software is installed Before you start adding custom signatures to the software catalog, prioritize your work. Start with products that are critical from the business perspective. Then, iteratively continue with the remaining products until all software that is used in your company is discovered. To optimize your work on the custom catalog content, adopt an iterative approach. Start by grouping all software products that are used in your company into software families and focus on one software family per iteration. Analyze and create software signatures for all products that belong to the family on which you are working. If a software family is too extensive, split it into smaller groups, for example based on editions or distributions. The iterative approach allows for continuously extending the catalog content and verifying its correctness at the same time. Thus, you can gain more benefits in less time. Step 2: Analyze your software Extend the software catalog only with information that is related to products that are used in your company but are not reported or do not exist in the catalog. Consult the product administrators and available documentation to gather information that is related to the product architecture and licensing model. Copyright IBM Corp. 2002, 2014 1

To gather basic information about a software product, work with the administrator who is responsible for its installation and has the knowledge of its architecture and licensing model. Try to establish a reference installation. Investigate the architecture of the product to obtain the following details: v Separately installable pieces (components) that constitute the product and are important for discovery or licensing purposes v Version number of each component v Ways to check whether the component is installed v Platforms on which the component can be installed v Licensing model If the product administrator is unable to provide the information necessary for creating the licensing model, consult the available documentation. It can be found on the installation media, in the product installation path, license agreements, installation instructions, or online resources. Step 3: Review information about files and packages To identify candidates for software signatures, review information about files and packages that exist on the computer where a particular software product is installed. Candidates for file and package signatures Most efficient signatures are file-based signatures with constant size that is different for each release or signatures that are based on package data where a wildcard (*) can be used. In both cases, the file and package data should be removed during the product uninstallation or changed during the product upgrade or downgrade. When you are looking for candidates for such signatures, always check: v Whether any product documentation describes methods for determining the product edition and release based on files or package data v Whether the product name and version can be unambiguously determined, for example, by the file name v Whether there are any component-specific files: Executable files whose version, part of version, or size is specific to the particular release Files whose name or its part is specific to the particular release Files whose content defines the product name and version Other files with constant size, for example, a graphic that contains the product release number Libraries with version or constant size v Whether there are application-specific packages Do not create signatures that are based on: v Shared or external libraries v Files that can be used by another product v File names that are commonly used, for example, readme.txt 2 IBM Endpoint Manager for Software Use Analysis: Customizing the software catalog

Available reports Use one of the following reports to identify candidates for signatures. Package Data The report provides information about the packages that are installed on the computers in your infrastructure. To find a package that can be used as a signature, filter the report to the data from the computer on which the particular software product is installed. Scanned File Data The report provides information about files that were detected on the computers in your infrastructure. To find a file that can be used as a signature, filter the report to the data from the computer on which the particular software product is installed. To further narrow down the results, specify the whole or part of the path to the directory where the software is installed. Then, look at the following columns: v Recognized - the column shows whether the file was recognized as part of an existing signature v Caused Detection - the column shows whether the file contained enough information to cause detection of the related software Important: The columns are not displayed by default. To display the columns, click Configure View and select the appropriate check boxes. If the value in both columns is false, the file is not used for software detection and can be used to create a new signature. Only files with the following extensions can be used to create software signatures: *.A, *.APP, *.BAT, *.BIN, *.CMPTAG, *.EAR, *.EXE, *.FXTAG, *.ITLM, *.LIC, *.NLM, *.O, *.OCX, *.PL, *.PRODUCT, *.PTF, *.RPM, *.SGN, *.SH, *.SIG, *.SIGNATURE, *.SL, *.SPB, *.SWIDTAG, *.SWTAG, *.SY, *.SYS, *.SYS2, *.TCL, *.XPM, *.a, *.app, *.bat, *.bin, *.cmd, *.cmptag, *.com, *.ear, *.exe, *.fxtag, *.ink, *.itlm, *.lic, *.mdb, *.nlm, *.o, *.ocx, *.pl, *.product, *.ptf, *.rpm, *.sgn, *.sh, *.sig, *.signature, *.sl, *.so, *.spb, *.swidtag, *.swtag, *.sy, *.sys, *.sys2, *.tcl, *.xpm Unrecognized Files The report creates a ranking of files that are most commonly encountered in your computer infrastructure but do not produce matches for any signature. The ranking of 1000 file names is separate for each computer group. It is based on the number of computers on which the files were detected, the number of copies of a particular file, and the alphabetical order. The files are listed by name with no regard to their size or version metadata. To access such detailed information, click the file name. Step 4: Create component signatures Use the following guidelines to avoid common mistakes and to create the most accurate signatures that better recognize software. To obtain the best results, try to create signatures that meet the following requirements: v The signature is based on the main executable file of the software. v The signature combines the main executable file of the software with package data if it is available. Chapter 1. Catalog customization process 3

v v The signature discovers only one release. If it discovers release 7.2, it cannot be valid for releases 7.1 or 7.3. The signature is generic and discovers a particular release and all its mod-releases and fix packs. To ensures that the signature is generic: Use a wildcard (*) in the package version, for example: 7.2.* Specify the version of the file rather than its size If a signature combines a file and package data and neither of them has a version, accept a file with any size Tip: If you are unable to cover all fix packs and mod-releases, combine separate conditions for each of them. Version of the software that are provided in the package and in the file might sometimes be inaccurate and might not match the version that is displayed in Software Use Analysis. If such discrepancy occurs, ensure that the proper version is defined in the software catalog. Consider creating more specific rules for handling issues related to software versioning. 4 IBM Endpoint Manager for Software Use Analysis: Customizing the software catalog

Chapter 2. Creating signatures To create a software signature, identify a file or package that is specific for the product and can be used for discovery purposes. If you create a file-based signature, it is used for both discovery and usage monitoring unlike a package-based signature that is used for discovery only. To avoid false-positive discovery, it is best to create a signature that is based on both a file and package data. About this task The following procedure is based on the example of creating a signature for Live Project Premium Viewer. Procedure 1. To avoid unnecessary work, verify that the product is not in the software catalog. In the catalog search, type Live Project Premium Viewer, and click Search. Tip: If searching for the full product name does not return any results, try using different key words. For example, search for Live Project Viewer or Live Project. 2. Optional: If Live Project Premium Viewer was installed recently, initiate the software scan to ensure that the data from the computers on which the product is installed is up-to-date and accurate. a. Log in to the Endpoint Manager console. b. In the navigation tree, click Sites > External Sites > IBM Endpoint Manager for Software Use Analysis > Fixlets and Tasks. c. In the top pane, click Initiate Software Scan, and then click Take Action. d. Open the Applicable Computers pane and select a computer or computers on which Live Project Premium Viewer is installed. Then, click Take Action. Copyright IBM Corp. 2002, 2014 5

e. When the software scan finishes, upload its results. Click Upload Software Scan Results, and then click Take Action. f. Open the Applicable Computers pane and select a computer or computers on which Live Project Premium Viewer is installed. Then, click Take Action. g. In Software Use Analysis, run an import to retrieve the latest scan data from Endpoint Manager. In the top navigation bar, click Management > Data Imports, and then click Import Now. Wait for the import to finish. 3. To find information about files that were discovered in your infrastructure, click Reports > Scanned File Data. 4. To narrow down the result, click Configure View and specify filtering parameters. For example, narrow down the results to entries in which the computer name is the name of the computer on which Live Project Premium Viewer is installed and the installation path contains the words Live or Project. Then, click Submit. 5. To create a signature, click the arrow sign next to the file name and then click Create Signature. 6 IBM Endpoint Manager for Software Use Analysis: Customizing the software catalog

6. In the Create Catalog Entry pane, specify the publisher name, product name, and release number of the product. Then, click Submit. Note: The file size and version are pre-filled by default. However, if they do not fulfill certain requirements, they might lead to false-positive discovery. Specify the file version if it is in sync with the version of the product or is changed with every release. Otherwise, specify only the file size. You created a file-based signature that allows for discovering Live Project Premium Viewer and measuring its usage. 7. Optional: To increase the accuracy of the signature and avoid false-positive discovery, you can specify a package that must also be present on the computer for the product to be discovered. a. To view package data, click Reports > Package Data. b. To narrow down the result, click Configure View and specify filtering parameters. For example, narrow down the results to entries for which the vendor contains the word KaDonk and the package name contains the word Live. Then, click Submit. c. Write down the information about the package name, version, and vendor. Chapter 2. Creating signatures 7

d. To add this information to the signature that you created in step 6, click Management > Catalog Customizations, and search for the signature. e. In the Edit Signature pane, select The following installation package is found and provide the package name, version and vendor. Then, click Save. Tip: In the release field, use a wildcard (*) to cover the whole release, including fix packs and mod-releases. 8. Wait for the scheduled import to refresh the data. When the import finishes, verify whether Live Project Premium Viewer is discovered. a. To view information about the installed software, click Reports > Software Installatios. b. To narrow down the results, click Configure View and specify filtering parameters. For example, narrow down the results to entries in which the software name contains the words Live Project. Then, click Submit. Information about the discovered instances and usage data is displayed. 8 IBM Endpoint Manager for Software Use Analysis: Customizing the software catalog

Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte character set (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: Intellectual Property Licensing Legal and Intellectual Property Law IBM Japan, Ltd. 19-21, Nihonbashi-Hakozakicho, Chuo-ku Tokyo 103-8510, Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. Copyright IBM Corp. 2002, 2014 9

IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation 2Z4A/101 11400 Burnet Road Austin, TX 79758 U.S.A Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. All statements regarding IBM's future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. Trademarks IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at Copyright and trademark information at www.ibm.com/legal/copytrade.shtml. 10 IBM Endpoint Manager for Software Use Analysis: Customizing the software catalog

Privacy policy considerations IBM Software products, including software as a service solutions, ( Software Offerings ) may use cookies or other technologies to collect product usage information, to help improve the end user experience, to tailor interactions with the end user or for other purposes. In many cases no personally identifiable information is collected by the Software Offerings. Some of our Software Offerings can help enable you to collect personally identifiable information. If this Software Offering uses cookies to collect personally identifiable information, specific information about this offering s use of cookies is set forth below. This Software Offering does not use cookies or other technologies to collect personally identifiable information. If the configurations deployed for this Software Offering provide you as customer the ability to collect personally identifiable information from end users via cookies and other technologies, you should seek your own legal advice about any laws applicable to such data collection, including any requirements for notice and consent. For more information about the use of various technologies, including cookies, for these purposes, See IBM s Privacy Policy at http://www.ibm.com/privacy and IBM s Online Privacy Statement at http://www.ibm.com/privacy/details the section entitled Cookies, Web Beacons and Other Technologies and the IBM Software Products and Software-as-a-Service Privacy Statement at http://www.ibm.com/software/info/product-privacy. Copyright IBM Corp. 2002, 2014 11

12 IBM Endpoint Manager for Software Use Analysis: Customizing the software catalog

Printed in USA