© 2012 Microsoft Corporation. All rights reserved. Microsoft Confidential System Center 2012 Configuration Manager Concepts & Administration Module 4: Inventory, Asset Intelligence, Software Metering and Remote Control Your Name Premier Field Engineer Microsoft Conditions and Terms of Use Microsoft Confidential This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software is provided to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content and/or software included in such packages is strictly prohibited. The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and noninfringement. Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft must respond to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. Unless otherwise noted, the companies, organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred. Copyright and Trademarks © 2012 Microsoft Corporation. All rights reserved. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in written license agreement from Microsoft, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. For more information, see Use of Microsoft Copyrighted Content at http://www.microsoft.com/about/legal/permissions/ Microsoft®, Internet Explorer®, and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other Microsoft products mentioned herein may be either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are property of their respective owners. Overview Hardware and Software Inventory Asset Intelligence Software Metering Remote Tools 3 Microsoft Confidential Objective After completing this Module, you will be able to: Configure, customize, troubleshoot and report Hardware and Software Inventory Configure Asset Intelligence, import an MVLS license statement and generate Asset Intelligence reports Configure Software Metering, create rules and generate reports Learn what’s new in Remote Control and how to configure the Remote Tools client 4 Microsoft Confidential Hardware and Software Inventory Types of Inventory Hardware Inventory components and logs Enabling and customizing Hardware Inventory Hardware Inventory reporting Software Inventory components and logs Enabling and customizing Software Inventory Software Inventory reporting 5 Microsoft Confidential Types of Inventory Hardware Inventory Queries WMI for hardware data Can be customized per site or per collection Customize Hardware Inventory MOF files can be imported from the console Inventory Classes can be imported from a local or remote system Software Inventory Scans hard drives for file types Can also collect copies of files during inventory cycle Can be customized per site or per collection 6 Microsoft Confidential Hardware Inventory Components and Logs 7 1 2 3 Client Management Point Site Server • Inventory data generated and sent to Management Point on agent schedule • InventoryAgent. log • Report received in MP\outboxes\hinv. box • Moved by Hardware Inventory Manager to Site Server • MP_Hinv.log • Report received in Inboxes\auth\dataldr. box • Data Loader processes data • Dataldr.log Microsoft Confidential Database updated Enabling and Customizing Hardware Inventory Administration Node Client Settings Default Settings Hardware Inventory 8 Microsoft Confidential Enabling and Customizing Hardware Inventory 9 Microsoft Confidential Enabling and Customizing Hardware Inventory Assign different settings for Hardware Inventory by creating custom client device settings Deploy settings to a collection If a device is a member of more than one collection with conflicting device settings, the priority setting determines which setting is enforced. Default client settings have a priority of 10,000 Custom device settings have higher priorities Priorities can be increased or decreased by the administrator 10 Microsoft Confidential Creating Custom Device Settings 11 Microsoft Confidential Creating Custom Device Settings 12 Microsoft Confidential Deploy Settings to a Collection 13 Microsoft Confidential Hardware Inventory Reporting 40+ reports for viewing Hardware Inventory results Hardware – CDROM, Hardware – Disk etc. Useful reports for troubleshooting Hardware Inventory Inventory Classes enabled on a specific computer Inventory Classes assigned to a specific collection Computers not inventoried recently (in a specified number of days) 14 Microsoft Confidential Software Inventory Components and Logs 1 2 3 Client Management Point Site Server • Software Inventory data generated and sent to Management Point on Agent Schedule • InventoryAgent.log • Report received in MP\outboxes\sinv.b ox • Moved by Software Inventory Manager to Site Server • MP_Sinv.log • Report received on Inboxes\sinvproc.b ox • Software Inventory Processor processes data • Sinvproc.log 15 Microsoft Confidential Database updated Enabling and Customizing Software Inventory Administration Node Client Settings Default Settings Software Inventory 16 Microsoft Confidential Enabling and Customizing Software Inventory Assign different settings for Software Inventory by creating custom client device settings Deploy settings to a collection Default client settings have a priority of 10,000 Custom device settings have higher priorities Priorities can be increased or decreased by the administrator 17 Microsoft Confidential Creating Custom Device Settings 18 Microsoft Confidential Creating Custom Device Settings 19 Microsoft Confidential Deploy Settings to a Collection 20 Microsoft Confidential Software Inventory Reporting 40+ reports for viewing Software Inventory results Look in Software – Company and Products, Software – Files categories Useful report for troubleshooting Software inventory Computers not inventoried recently (in a specified number of days) 21 Microsoft Confidential Lab: Customizing Hardware and Software Inventory Scenario You are the administrator of a new Configuration Manager 2012 hierarchy. You need to generate inventory data from newly-installed clients Goals Enable, customize and report Hardware Inventory Enable, customize and report Software Inventory 22 Microsoft Confidential Lesson Review Name two differences in enabling and configuring hardware inventory in System Center 2012 Configuration Manager from Configuration Manager 2007? How can different inventory settings be applied to different groups of clients within a Configuration Manager site? How does an administrator troubleshoot conflicting inventory settings applied to a single computer? 23 Microsoft Confidential Lesson Summary In this lesson, you learned: How hardware inventory can be enabled and customized How software inventory can be enabled and customized 24 Microsoft Confidential Asset Intelligence Lesson Objectives In this Lesson you will learn: What’s new in System Center 2012 Configuration Manager? How to configure Asset Intelligence Hardware Inventory and Software Metering Agents Enabling Asset Intelligence Reporting Classes Reporting Class dependencies Installing an Asset Intelligence Synchronization Point Auditing successful logon events Importing an MVLS license statement Asset Intelligence Maintenance Tasks Asset Intelligence Reporting 25 Microsoft Confidential What is New in Asset Intelligence Enable Asset Intelligence reporting classes Changes to MVLS license statement import process 2 Maintenance Tasks Check Application Title with Inventory Information - checks that the software title reported in software inventory is reconciled with the software title in the Asset Intelligence catalog. Summarize Installed Software Data - provides the summary information displayed in the Inventoried Software node under the Asset Intelligence node. Client Access License reports have been removed 26 Microsoft Confidential How to configure Asset Intelligence Enable Hardware Inventory and Software Metering Agents Edit Asset Intelligence Hardware Inventory reporting classes Install an Asset Intelligence Synchronization Point Enable auditing of success logon events Import software license information Create a general license statement information file for import Configure Asset Intelligence Maintenance Tasks 27 Microsoft Confidential Enable Asset Intelligence Reporting Classes 28 Microsoft Confidential Reporting Class Dependencies SMS_Installed_Software 29 Microsoft Confidential SMS_SystemConsoleUsage 30 Microsoft Confidential Reporting Class Dependencies SMS_SystemConsoleUser SMS_AutoStartSoftware SMS_BrowserHelperObject SMS_SoftwareTag 31 Microsoft Confidential Reporting Class Dependencies Win32_USBDevice SMS_InstalledExecutable This class is not a currently used to support existing AI reports. However, it can be enabled to support customer reports SMS_SoftwareShortcut This class is not a currently used to support existing AI reports. However, it can be enabled to support customer reports SoftwareLicensingService SoftwareLicensingProduct 32 Microsoft Confidential Reporting Class Dependencies SoftwareLicensingProduct 33 Microsoft Confidential Install an Asset Intelligence Synchronization Point 34 Microsoft Confidential Install an Asset Intelligence Synchronization Point 35 Microsoft Confidential Install an Asset Intelligence Synchronization Point 36 Microsoft Confidential Enable Auditing of Successful Logon Events Required for the following reports Hardware 3A – Primary Computer Users Hardware 3B – Computers for a Specific Computer User Hardware 4A – Shared (multi-user) Computers Hardware 5A – Console Users on a Specific Computer Enable the SMS_SystemConsoleUser reporting class Modify Domain Security Policy Security Settings Local Policies Audit Policy Audit Logon Events – select Success check box 37 Microsoft Confidential Import Software License Information Import general (non-MVLS) information into the database Create manually in .csv format with the following headers Name Publisher Version Language EffectiveQuantity PONumber ResellerName DateofPurchase SupportPurchased SupportExpirationDate Comments 38 Microsoft Confidential Importing an MVLS License Statement 39 Microsoft Confidential Configure Asset Intelligence Maintenance Tasks 40 Microsoft Confidential Asset Intelligence changes in SP1 Supports the 7 mandatory software identification tags that are defined in ISO/IEC 19770-2. Software identification tags provide authoritative information that is used to identify installed software ISO/IEC 19770-2 standard specifies the structure and basic usage of software identification) Added a new AI class SMS_SoftwareTag Collects inventory of App-V 5 and App-V 4 applications 41 Microsoft Confidential Lesson Review What kind of license statements can be imported into System Center 2012 Configuration Manager? Name the two new Maintenance Tasks for Asset Intelligence data in System Center 2012 Configuration Manager? 42 Microsoft Confidential Lesson Summary In this lesson, you learned: Which components are required to generate successful Asset Intelligence Reports How to import MVLS and license statements Which 2 new Maintenance Tasks have been added to System Center 2012 Configuration Manager for Asset Intelligence 43 Microsoft Confidential Software Metering Software Metering components Enabling and customizing Software Metering Creating Custom Device Settings Creating Metering Rules Software Metering reporting Client and server troubleshooting 44 Microsoft Confidential Software Metering Components and Logs 1 2 3 Client Management Point Site Server • Metering data generated and sent to MP on Data Collection Schedule • Mtrmgr.log • Swmtrreportgen.log • Report received in MP\outboxes\sw m.box • Moved by File Despatch Manager to Site Server • Report received on Inboxes\swmproc. box • Software Metering Processor processes data • Swmproc.log 45 Microsoft Confidential Database updated Enabling and Customizing Software Metering Administration Node Client Settings Default Settings Software Metering 46 Microsoft Confidential Software Metering Components Software Metering client agent Mtrmgr.log Software Metering Processor (Site Server component) Swmproc.log Data usage report generation log SWMTRReportGen.log 47 Microsoft Confidential Enabling and Customizing Software Metering Assign different settings for Software Metering by creating Custom Client Device Settings Deploy settings to a collection 48 Microsoft Confidential Creating Custom Device Settings 49 Microsoft Confidential Creating Custom Device Settings 50 Microsoft Confidential Creating Metering Rules Auto-created 51 Microsoft Confidential Creating Metering Rules Manually created 52 Microsoft Confidential Software Metering Administration Metering rules can be organized in folders Metering rules can be enabled, disabled, edited or moved. 53 Microsoft Confidential Software Metering Reporting Reports rely on metering data being sent from the client – default is every 7 days Schedule data collection for Software Metering in Default Client Settings Some reports rely on summarization Summarize Software Metering File Usage Data Summarize Software Metering Monthly Usage Data The following reports require the Software Metering Agent to be enabled:Software 07A - Recently Used Executables by Number of Computers Software 07B - Computers that Recently Used a Specified Executable Software 07C - Recently Used Executables on a Specific Computer Software 08A - Recently Used Executables by Number of Users Software 08B - Users that Recently Used a Specified Executable Software 08C - Recently Used Executables by a Specified User 54 Microsoft Confidential Software Metering Reports 55 Microsoft Confidential Lab: Customizing Software Metering Scenario You are the administrator of the Contoso System Center 2012 Configuration Manager hierarchy. You wish to create new Software Metering rules for a Configuration Manager site Goals Enable Software Metering Create a new software metering rule Generate a software metering report 56 Microsoft Confidential Lesson Review What is the name of the client log that shows metering rules being checked when an executable is run? Name the two ways to create a metering rule? 57 Microsoft Confidential Lesson Summary In this Lesson, you learned: How to enable and configure the Software Metering Agent How to create rules automatically and manually 58 Microsoft Confidential Lesson Objectives Remote Control What’s new in System Center 2012 Configuration Manager? What’s new with Remote Control, Remote Desktop, Remote Assistance How to configuring the Remote Tools Client 59 Microsoft Confidential What’s New in Configuration Manager Supported Operating Systems for Remote Control Viewer Windows 7 (32 bit and 64 bit) Windows XP SP3 32-bit, Vista 32-bit, Vista 64-bit Install the Remote Desktop Connection (RDC) client update 7.0 (KB969084) No support for the Remote Control Viewer on Windows XP (64 bit), Windows Server 2003 (32 or 64 bit), Windows Server 2008 or R2 (64 bit) operating systems 60 Microsoft Confidential What’s New in Configuration Manager? Pass CTRL+ALT+DEL to client Disable client mouse and keyboard during remote control session Remote Tools are configured in the Default Client Settings or in Custom Device Settings linked to a collection 61 Microsoft Confidential What’s New in Configuration Manager? (continued) Start Remote Control Viewer from a command line <Configuration Manager Installation Folder>\AdminConsole\Bin\i386\CmRcViewer.exe Supported Switches File – Connect File - Disconnect File - Exit View - Full Screen View - Scale to Fit View - Status Bar Action - Send Ctrl+Alt+Del Key Action - Enable Clipboard Sharing Action - Lock Remote Keyboard and Mouse 62 Microsoft Confidential Configuring the Remote Tools Client Client can be used to configure Remote Control, Remote Assistance and Remote Desktop Remote Assistance and Remote Desktop settings are applied as local policy, so can be over-written by domainbased Group Policy Remote Assistance and Remote Desktop needs to be enabled on the client before settings for these features are effective Remote Assistance feature must be installed on the machine initiating the connection 63 Microsoft Confidential Remote Control Client Settings 64 Microsoft Confidential Demo: Remote Control in Configuration Manager Scenario You are the administrator of a Configuration Manager hierarchy. You need to use the Remote Tools client to remotely control a Windows 7 client Goals Enable and configure the Remote Tools Client Start a Remote Tools session from the command line 66 Microsoft Confidential Lesson Review Name one new feature of the Remote Tools Client? How can you start the Remote Control viewer from a command line? 67 Microsoft Confidential Lesson Summary In this lesson, you learned: What’s new in Configuration Manager for the Remote Tools Client How to enable and configure the Remote Tools Client Agent 68 Microsoft Confidential