Presentation is loading. Please wait.

Presentation is loading. Please wait.

Microsoft Confidential © 2012 Microsoft Corporation. All rights reserved.

Similar presentations


Presentation on theme: "Microsoft Confidential © 2012 Microsoft Corporation. All rights reserved."— Presentation transcript:

1 Microsoft Confidential © 2012 Microsoft Corporation. All rights reserved.

2 System Center 2012 Configuration Manager Concepts & Administration Module 4: Inventory, Asset Intelligence, Software Metering and Remote Control Premier Field Engineer Microsoft Your Name

3 Conditions and Terms of Use This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software is provided to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content and/or software included in such packages is strictly prohibited. The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non- infringement. Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft must respond to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. Unless otherwise noted, the companies, organizations, products, domain names, addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place, or event is intended or should be inferred. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. For more information, see Use of Microsoft Copyrighted Content at Microsoft®, Internet Explorer®, and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other Microsoft products mentioned herein may be either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. Copyright and Trademarks © 2012 Microsoft Corporation. All rights reserved. Microsoft Confidential

4 Overview Hardware and Software Inventory Asset Intelligence Software Metering Remote Tools Microsoft Confidential 3

5 Objective After completing this Module, you will be able to: Configure, customize, troubleshoot and report Hardware and Software Inventory Configure Asset Intelligence, import an MVLS license statement and generate Asset Intelligence reports Configure Software Metering, create rules and generate reports Learn what’s new in Remote Control and how to configure the Remote Tools client Microsoft Confidential 4

6 Hardware and Software Inventory Types of Inventory Hardware Inventory components and logs Enabling and customizing Hardware Inventory Hardware Inventory reporting Software Inventory components and logs Enabling and customizing Software Inventory Software Inventory reporting Microsoft Confidential 5

7 Types of Inventory Hardware Inventory Queries WMI for hardware data Can be customized per site or per collection Customize Hardware Inventory MOF files can be imported from the console Inventory Classes can be imported from a local or remote system Software Inventory Scans hard drives for file types Can also collect copies of files during inventory cycle Can be customized per site or per collection Microsoft Confidential 6

8 Hardware Inventory Components and Logs Microsoft Confidential 7

9 Enabling and Customizing Hardware Inventory Microsoft Confidential 8  Administration Node  Client Settings  Default Settings  Hardware Inventory

10 Enabling and Customizing Hardware Inventory Microsoft Confidential 9

11 Enabling and Customizing Hardware Inventory Assign different settings for Hardware Inventory by creating custom client device settings Deploy settings to a collection If a device is a member of more than one collection with conflicting device settings, the priority setting determines which setting is enforced. Default client settings have a priority of 10,000 Custom device settings have higher priorities Priorities can be increased or decreased by the administrator Microsoft Confidential 10

12 Creating Custom Device Settings Microsoft Confidential 11

13 Creating Custom Device Settings Microsoft Confidential 12

14 Deploy Settings to a Collection Microsoft Confidential 13

15 Hardware Inventory Reporting 40+ reports for viewing Hardware Inventory results Hardware – CDROM, Hardware – Disk etc. Useful reports for troubleshooting Hardware Inventory Inventory Classes enabled on a specific computer Inventory Classes assigned to a specific collection Computers not inventoried recently (in a specified number of days) Microsoft Confidential 14

16 Software Inventory Components and Logs Microsoft Confidential 15

17 Enabling and Customizing Software Inventory Microsoft Confidential 16  Administration Node  Client Settings  Default Settings  Software Inventory

18 Enabling and Customizing Software Inventory Assign different settings for Software Inventory by creating custom client device settings Deploy settings to a collection Default client settings have a priority of 10,000 Custom device settings have higher priorities Priorities can be increased or decreased by the administrator Microsoft Confidential 17

19 Creating Custom Device Settings Microsoft Confidential 18

20 Creating Custom Device Settings Microsoft Confidential 19

21 Deploy Settings to a Collection Microsoft Confidential 20

22 Software Inventory Reporting 40+ reports for viewing Software Inventory results Look in Software – Company and Products, Software – Files categories Useful report for troubleshooting Software inventory Computers not inventoried recently (in a specified number of days) Microsoft Confidential 21

23 Lab: Customizing Hardware and Software Inventory Goals Scenario Enable, customize and report Hardware Inventory Enable, customize and report Software Inventory Enable, customize and report Hardware Inventory Enable, customize and report Software Inventory You are the administrator of a new Configuration Manager 2012 hierarchy. You need to generate inventory data from newly-installed clients Microsoft Confidential 22

24 Lesson Review Name two differences in enabling and configuring hardware inventory in System Center 2012 Configuration Manager from Configuration Manager 2007? How can different inventory settings be applied to different groups of clients within a Configuration Manager site? How does an administrator troubleshoot conflicting inventory settings applied to a single computer? Microsoft Confidential 23

25 Lesson Summary In this lesson, you learned: How hardware inventory can be enabled and customized How software inventory can be enabled and customized Microsoft Confidential 24

26 Asset Intelligence Lesson Objectives In this Lesson you will learn: What’s new in System Center 2012 Configuration Manager? How to configure Asset Intelligence Hardware Inventory and Software Metering Agents Enabling Asset Intelligence Reporting Classes Reporting Class dependencies Installing an Asset Intelligence Synchronization Point Auditing successful logon events Importing an MVLS license statement Asset Intelligence Maintenance Tasks Asset Intelligence Reporting Microsoft Confidential 25

27 What is New in Asset Intelligence Enable Asset Intelligence reporting classes Changes to MVLS license statement import process 2 Maintenance Tasks Check Application Title with Inventory Information - checks that the software title reported in software inventory is reconciled with the software title in the Asset Intelligence catalog. Summarize Installed Software Data - provides the summary information displayed in the Inventoried Software node under the Asset Intelligence node. Client Access License reports have been removed Microsoft Confidential 26

28 How to configure Asset Intelligence Enable Hardware Inventory and Software Metering Agents Edit Asset Intelligence Hardware Inventory reporting classes Install an Asset Intelligence Synchronization Point Enable auditing of success logon events Import software license information Create a general license statement information file for import Configure Asset Intelligence Maintenance Tasks Microsoft Confidential 27

29 Enable Asset Intelligence Reporting Classes Microsoft Confidential 28

30 Reporting Class Dependencies SMS_Installed_Software Microsoft Confidential 29

31 SMS_SystemConsoleUsage Microsoft Confidential 30

32 Reporting Class Dependencies SMS_SystemConsoleUser SMS_AutoStartSoftware SMS_BrowserHelperObject SMS_SoftwareTag Microsoft Confidential 31

33 Reporting Class Dependencies Win32_USBDevice SMS_InstalledExecutable SMS_SoftwareShortcut This class is not a currently used to support existing AI reports. However, it can be enabled to support customer reports SoftwareLicensingService SoftwareLicensingProduct Microsoft Confidential 32 This class is not a currently used to support existing AI reports. However, it can be enabled to support customer reports

34 Reporting Class Dependencies SoftwareLicensingProduct Microsoft Confidential 33

35 Install an Asset Intelligence Synchronization Point Microsoft Confidential 34

36 Install an Asset Intelligence Synchronization Point Microsoft Confidential 35

37 Install an Asset Intelligence Synchronization Point Microsoft Confidential 36

38 Enable Auditing of Successful Logon Events Required for the following reports Hardware 3A – Primary Computer Users Hardware 3B – Computers for a Specific Computer User Hardware 4A – Shared (multi-user) Computers Hardware 5A – Console Users on a Specific Computer Enable the SMS_SystemConsoleUser reporting class Modify Domain Security Policy  Security Settings  Local Policies  Audit Policy  Audit Logon Events – select Success check box Microsoft Confidential 37

39 Import Software License Information Import general (non-MVLS) information into the database Create manually in.csv format with the following headers Name Publisher Version Language EffectiveQuantity PONumber ResellerName DateofPurchase SupportPurchased SupportExpirationDate Comments Microsoft Confidential 38

40 Importing an MVLS License Statement Microsoft Confidential 39

41 Configure Asset Intelligence Maintenance Tasks Microsoft Confidential 40

42 Asset Intelligence changes in SP1 Supports the 7 mandatory software identification tags that are defined in ISO/IEC Software identification tags provide authoritative information that is used to identify installed software ISO/IEC standard specifies the structure and basic usage of software identification) Added a new AI class SMS_SoftwareTag Collects inventory of App-V 5 and App-V 4 applications Microsoft Confidential 41

43 Lesson Review What kind of license statements can be imported into System Center 2012 Configuration Manager? Name the two new Maintenance Tasks for Asset Intelligence data in System Center 2012 Configuration Manager? Microsoft Confidential 42

44 Lesson Summary In this lesson, you learned: Which components are required to generate successful Asset Intelligence Reports How to import MVLS and license statements Which 2 new Maintenance Tasks have been added to System Center 2012 Configuration Manager for Asset Intelligence Microsoft Confidential 43

45 Software Metering Software Metering components Enabling and customizing Software Metering Creating Custom Device Settings Creating Metering Rules Software Metering reporting Client and server troubleshooting Microsoft Confidential 44

46 Software Metering Components and Logs Microsoft Confidential 45

47 Enabling and Customizing Software Metering Microsoft Confidential 46  Administration Node  Client Settings  Default Settings  Software Metering

48 Software Metering Components Software Metering client agent Mtrmgr.log Software Metering Processor (Site Server component) Swmproc.log Data usage report generation log SWMTRReportGen.log Microsoft Confidential 47

49 Enabling and Customizing Software Metering Assign different settings for Software Metering by creating Custom Client Device Settings Deploy settings to a collection Microsoft Confidential 48

50 Creating Custom Device Settings Microsoft Confidential 49

51 Creating Custom Device Settings Microsoft Confidential 50

52 Creating Metering Rules Auto-created Microsoft Confidential 51

53 Creating Metering Rules Manually created Microsoft Confidential 52

54 Software Metering Administration Metering rules can be organized in folders Metering rules can be enabled, disabled, edited or moved. Microsoft Confidential 53

55 Software Metering Reporting Reports rely on metering data being sent from the client – default is every 7 days Schedule data collection for Software Metering in Default Client Settings Some reports rely on summarization Summarize Software Metering File Usage Data Summarize Software Metering Monthly Usage Data The following reports require the Software Metering Agent to be enabled:- Software 07A - Recently Used Executables by Number of Computers Software 07B - Computers that Recently Used a Specified Executable Software 07C - Recently Used Executables on a Specific Computer Software 08A - Recently Used Executables by Number of Users Software 08B - Users that Recently Used a Specified Executable Software 08C - Recently Used Executables by a Specified User Microsoft Confidential 54

56 Software Metering Reports Microsoft Confidential 55

57 Lab: Customizing Software Metering Goals Scenario Enable Software Metering Create a new software metering rule Generate a software metering report Enable Software Metering Create a new software metering rule Generate a software metering report You are the administrator of the Contoso System Center 2012 Configuration Manager hierarchy. You wish to create new Software Metering rules for a Configuration Manager site Microsoft Confidential 56

58 Lesson Review What is the name of the client log that shows metering rules being checked when an executable is run? Name the two ways to create a metering rule? Microsoft Confidential 57

59 Lesson Summary In this Lesson, you learned: How to enable and configure the Software Metering Agent How to create rules automatically and manually Microsoft Confidential 58

60 Lesson Objectives Remote Control What’s new in System Center 2012 Configuration Manager? What’s new with Remote Control, Remote Desktop, Remote Assistance How to configuring the Remote Tools Client Microsoft Confidential 59

61 What’s New in Configuration Manager Supported Operating Systems for Remote Control Viewer Windows 7 (32 bit and 64 bit) Windows XP SP3 32-bit, Vista 32-bit, Vista 64-bit  Install the Remote Desktop Connection (RDC) client update 7.0 (KB969084) No support for the Remote Control Viewer on Windows XP (64 bit), Windows Server 2003 (32 or 64 bit), Windows Server 2008 or R2 (64 bit) operating systems Microsoft Confidential 60

62 What’s New in Configuration Manager? Pass CTRL+ALT+DEL to client Disable client mouse and keyboard during remote control session Remote Tools are configured in the Default Client Settings or in Custom Device Settings linked to a collection Microsoft Confidential 61

63 What’s New in Configuration Manager? (continued) Start Remote Control Viewer from a command line \AdminConsole\Bin\i386\CmRcViewer.exe Supported Switches File – Connect File - Disconnect File - Exit View - Full Screen View - Scale to Fit View - Status Bar Action - Send Ctrl+Alt+Del Key Action - Enable Clipboard Sharing Action - Lock Remote Keyboard and Mouse Microsoft Confidential 62

64 Configuring the Remote Tools Client Client can be used to configure Remote Control, Remote Assistance and Remote Desktop Remote Assistance and Remote Desktop settings are applied as local policy, so can be over-written by domain- based Group Policy Remote Assistance and Remote Desktop needs to be enabled on the client before settings for these features are effective Remote Assistance feature must be installed on the machine initiating the connection Microsoft Confidential 63

65 Remote Control Client Settings Microsoft Confidential 64

66 New Text-Only Slide (Hidden) Microsoft Confidential 65

67 Demo: Remote Control in Configuration Manager Goals Scenario Enable and configure the Remote Tools Client Start a Remote Tools session from the command line Enable and configure the Remote Tools Client Start a Remote Tools session from the command line You are the administrator of a Configuration Manager hierarchy. You need to use the Remote Tools client to remotely control a Windows 7 client Microsoft Confidential 66

68 Lesson Review Name one new feature of the Remote Tools Client? How can you start the Remote Control viewer from a command line? Microsoft Confidential 67

69 Lesson Summary In this lesson, you learned: What’s new in Configuration Manager for the Remote Tools Client How to enable and configure the Remote Tools Client Agent Microsoft Confidential 68


Download ppt "Microsoft Confidential © 2012 Microsoft Corporation. All rights reserved."

Similar presentations


Ads by Google