xassets Hosted Services Microsoft SAM Assist Audits with xassets



Similar documents
xassets for SCCM 6.0. xassets IT Asset Management Software xassets for SCCM

Network Discovery 6.0. xassets Network Discovery 6.0

IT Asset Management 6.0. xassets IT Asset Management Software

System Management. What are my options for deploying System Management on remote computers?

ManageEngine Desktop Central Training

Software Licence Compliance. A guide to Software Asset Management in the Enterprise

Complete Patch Management

Shavlik NetChk Protect 7.1

CA IT Client Manager Asset Inventory and Discovery

Devising a Server Protection Strategy with Trend Micro

HP Client Automation Standard Fast Track guide

Exam Questions

Desktop Central Managing Windows Computers in WAN

Devising a Server Protection Strategy with Trend Micro

Information Technology Solutions

Agent vs. Agent-less auditing

Desktop Central Managing Windows Computers in WAN

OPAS Prerequisites. Prepared By: This document contains the prerequisites and requirements for setting up OPAS.

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

SapphireIMS 4.0 Asset Management Feature Specification

Software Asset Management with Integrated Asset & Service Management

Expert Reference Series of White Papers. Microsoft Assessment and Planning (MAP) Toolkit Version 9.x

RayManageSoft. infinity. The new generation of Application Lifecycle Management

SQL diagnostic manager Management Pack for Microsoft System Center. Overview

Managed Antivirus Quick Start Guide

Maintaining Microsoft SCCM Health with Absolute DDS

KASEYA CLOUD SOLUTION CATALOG 2016 Q1. UPDATED & EFFECTIVE AS OF: February 1, Kaseya Catalog Kaseya Copyright All rights reserved.

Windows Deployment Services

Radia Cloud. User Guide. For the Windows operating systems Software Version: Document Release Date: June 2014

Backup Exec System Recovery Management Solution 2010 FAQ

Technology Partners. Acceleratio Ltd. is a software development company based in Zagreb, Croatia, founded in 2009.

SUMMIT ASSET MANAGEMENT DATASHEET

Kaseya IT Automation Framework

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

4ITP10: IT Maintenance Plan (RO)

Managing Enterprise Devices and Apps using System Center Configuration Manager

Appendix D to DIR Contract No. DIR-SDD SYNNEX Corporation STATEMENT OF WORK / SUPPLEMENTAL AGREEMENT for <DIR CUSTOMER> END USER SERVICES

Freshservice Discovery Probe User Guide

Fixed Asset Management 6.0. xassets Fixed Asset Management Software

LEARNING SOLUTIONS website milner.com/learning phone

Running custom scripts which allow you to remotely and securely run a script you wrote on Windows, Mac, Linux, and Unix devices.

Altiris Inventory Solution 7.1 SP2 from Symantec User Guide

Citrix EdgeSight Administrator s Guide. Citrix EdgeSight for Endpoints 5.3 Citrix EdgeSight for XenApp 5.3

Network Detective. Network Assessment Module Using the New Network Detective User Interface Quick Start Guide

NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Enterprise Desktop Software Management Services Replacement for Novell ZENworks

Automating Software License Management

ACME Enterprises IT Infrastructure Assessment

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

Administration Quick Start

HP SiteScope 11.x Essentials

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Microsoft. Pro: Upgrading to Windows 7 MCITP Enterprise Desktop Support Technician.

Web Dashboard. User Manual. Build

HP Server Management Packs for Microsoft System Center Essentials User Guide

LANDesk Data Analytics

Pcounter Web Report 3.x Installation Guide - v Pcounter Web Report Installation Guide Version 3.4

Q A F 0 3. ger A n A m client dell dell client manager 3.0 FAQ

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Desktop Authority and Group Policy Preferences

Introduction. Manageability. What is needed?

Monitoring Best Practices. Rajib Rashid, VP Product Management Nicolas Ponce, Kaseya University Ronny Tunfjord, Upstream Software

How To: Choosing the Right Catalog for Software License Management

Asset. Unicenter Management r11

Monitoring with Optimize for Infrastructure. Stewart Loewen Chief Solution Architect, Software AG

Guidelines on use of encryption to protect person identifiable and sensitive information

Nessus Agents. October 2015

vrops Microsoft SQL Server MANAGEMENT PACK OVERVIEW

BEST PRACTICES WHITE PAPER. BMC BladeLogic Client Automation and Intel Core vpro Processors

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Wyse Device Manager TM

Altiris Inventory Solution 7.1 SP2 from Symantec User Guide

ZENworks Asset Management 11. Product Brochure

HP OO 10.X - SiteScope Monitoring Templates

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Quick Start Guide. User Manual. 1 March 2012

How To Manage Software License Management With An Aspera Catalog

This document details the procedure for installing Layer8 software agents and reporting dashboards.

Systems Software. Introduction to Information System Components. Chapter 1 Part 2 of 4 CA M S Mehta, FCA

BUYER S GUIDE: PC INVENTORY AND SOFTWARE USAGE METERING TOOLS

Netzwerkvirtualisierung? Aber mit Sicherheit!

Getting started. Symantec AntiVirus Corporate Edition. About Symantec AntiVirus. How to get started

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Managing and Maintaining a Microsoft Windows Server 2003 Environment

New Boundary Technologies, Inc Godward Street N.E. Suite 3100 Minneapolis, MN 55413

SERVICE SCHEDULE PULSANT ENTERPRISE CLOUD SERVICES

Microsoft Power BI. Nov 21, 2015

Patch Management SoftwareTechnical Specs

Unprecedented Malware Growth

Citrix Application Streaming. Universal Application Packaging and Delivery Breaking Away from Traditional IT

This policy applies to all instances of LANDesk client software installed on Creighton-owned hardware that are connected to JAYNet.

Interact Intranet Version 7. Technical Requirements. August Interact

Uptime Infrastructure Monitor. Installation Guide

IT Networking and Security

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Access Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere

ZENworks 11 Support Pack 4 Management Zone Settings Reference. May 2016

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

Transcription:

xassets Hosted Services Microsoft SAM Assist Audits with xassets 2007-2010 xassets.com Limited

Introduction... 2 Preparation... 2 Implementation... 3 Execution of Discovery... 3 Reporting Phase... 3 Information Collected... 4 Impact on Network and Endpoints... 4 Technical Background... 5 1 P a g e

Introduction Microsoft sponsors SAM Assist audits through Microsoft Large Account Resellers. These audits serve to establish the licensing usage of MS products for the next term of the Microsoft agreement, and will also enable the customer to understand their licensing position on other products. xassets Software Discovery Service (SDS) is one of the preferred tools used by Microsoft Large Account Resellers to audit end customer software implementations. This is a hosted service which discovers the network for 30 days and then extends reporting and recognition fine tuning for an additional 30 days. This is a low cost service, and any company can sign up direct with xassets or through their LAR. At the end of the audit, the customer and the LAR can see the licensing position and can reduce installations or increase/reduce licensing to minimise expenditure while ensuring legal compliance. These audits also prove invaluable to the end customer. The audit data includes an inventory of all hardware on the network, so anyone involved in Desktop Management, Server Management, Network Operations, Capacity Planning, Help Desk, Security Specialists and many other IT functions, can easily see which assets exist against which users, in which locations, and can start to use this information to help understand the assets present on the network and their status. Preparation Like any hosted service which is to conduct discovery, it is essential to have access to the network. xassets prefers not to open ports or create other vulnerabilities, so we create a small VM inside the customers network to host a collection server. This system feeds data to the hosted services and controls all discovery processes through a secure, encrypted and compressed SSL web connection. The end customer or the Large Account Reseller would also have the Microsoft MLS statement prepared. This statement enables the existing license entitlements to be assessed. xassets Software Discovery Service includes a function which loads in the Microsoft MLS statement into the Software Asset Register, enabling comparison of used titles against purchased titles. xassets SDS also caters for Active Directory (AD) integration, SCCM integration, and the loading of Location to IP relationship spreadsheets. The ability to pull data from 2 P a g e

multiple sources ensures that the system knows about all possible assets on the network and therefore makes it easy to check that all known assets have been discovered fully. Implementation Once the server is prepared, xassets SDS consultants connect with the customer to install the collection server software. Usually this process takes about 20 minutes. Then discovery can begin. Usually the consultant will initiate discovery during the first webex session, and smaller organisations (1000 computers or less) can usually see a first discovery of their entire network within an hour of implementation. At the end of the implementation session, the consultant and the customer will agree a discovery schedule appropriate to the size, speed, and availability of devices on the customers network. The discovery schedule will then execute automatically, feeding delta data to the xassets hosted service for the next thirty days. Execution of Discovery As discovery runs through the next few weeks, computers of absent staff will begin to appear and the network discovery percentage increases from about 70%-80% on first discovery to between 90% and 99%. xassets consultants will then work with the end customer to discuss nodes which failed to discover (because they were present in Active Directory or SCCM), and the customer can then investigate whether these specific nodes still exist, have been reimaged, or have been disposed of. Throughout the discovery process the customer will have full access to the collection server and to the xassets SDS web application which shows the results so far and includes compliance reports and asset inventory. Reporting Phase Customers will use the built in reports in xassets to assess the software compliance position and may choose to make adjustments to their network to remove software. Many customers choose to continue to use xassets Network Discovery as an extension to the xassets SDS service. They find that the inventory information collected is invaluable not only for Software Licensing and Compliance, but also for 3 P a g e

removing unwanted software on the network, detecting security risks such as computers which are not patching or computers which are missing AV software, and for capacity planning where suitability for upgrades and rollouts can be assessed. xassets staff will work through the list of unrecognised software at each discovery and ensure that all software is fully recognised, and properly categorized as licensable or free. Information Collected xassets Discovery collects information by discovering endpoint computers and by querying local systems such as Active Directory and SCCM. Despite being a very fast process and very light on the network and light on the endpoint, comprehensive asset information is returned including: - Serial numbers, Make, Model, BIOS, chassis type, Time Zone - CPU Speed, slots, information and architecture - Full Network and domain information - OS version, service pack, edition, install date - Hard disk space, size and serial number - Software on disk (exe file header scan) and software in registry - Device manager entries for internal and external devices - Monitor Make, Model and Serial Numbers, multiple monitors are supported - Services and Daemons - User information - Memory information and memory slots - Patches installed Impact on Network and Endpoints The impact on endpoints is minimal. A typical discovery would consume between 1 second and 4 seconds CPU on a desktop or laptop computer, and about 1 second or less on a server. The discovery system does not deploy agents and does not write any information to the endpoint s hard disk or registry, so each discovered computer is left completely untouched by the discovery process. The information transmitted across to the collection server from the endpoint is minimal, about 100k per desktop and about 40k per server. This information is then delta analysed by the collection server, the delta is compressed, and then it is sent up to the xassets hosted infrastructure server from a lazy write process, ensuring 4 P a g e

that there is no measurable impact on the customer s internet connection and associated resources. Technical Background xassets invested substantial funding to develop highly optimized agentless discovery technologies which would run at super fast speeds and yet have no impact on the network. The result is a discovery engine which can run in large corporate environments without a measurable impact on the network or on the endpoints being discovered. Many agentless discovery tools rely on WMI alone. These tools list software from the registry but often a small percentage of those titles will be ghost installs and WMI has no way of distinguishing between ghost install and real installations. For that reason, we rely on a multi-faceted approach to discovery where we inspect the add/remove software list but we also inspect EXE file headers and test for physical software presence within a network. Our technology is unique in having access to EXE file headers, Windows API, BIOS, and low level calls on the endpoint, and yet does not require any kind of installation or change on the endpoint to achieve this. The discovery technology is also open, so if we hit an obstacle on a particular network, our consultants can reshape the discovery process to work around it. This also allows discovery by many different techniques, including email, internet, local deployment, AD push, logon scripts and the default agentless technology. We combined this excellent technology with some innovative ways of feeding information from customer networks into a cloud environment, and this was achieved without having any significant effect on the customer s internet connection and without requiring open ports. Finally at the application layer the user interface is deeply configurable so we can insure that all menus, dashboards, queries, forms, reports and alerts are aligned to a customers data set. For example a large company with multiple domains (e.g. from acquisitions) might be focussed on discovery by domain, whereas other organisation might run a single domain and then their reports would be focussed on discovery progress by location (or IP range). 5 P a g e