533576449 Jack Coates’ Best Practice LDMS Doc – My two cents on how to do it in pilot or production DAY ONE – Installation, Inventory, and Basic Security This document is a supplement to the formally approved Best Known Method available at: http://community.landesk.com/support/docs/DOC-1081 Differences from that document are purely due to my personal opinions, preferences, ideas and tools. If there are conflicting recommendations, please contact me at jack.coates@landesk.com. MACHINE SETUP There is now a nice set of recommendations at http://community.landesk.com/support/docs/DOC-2502 -- it tends to run a bit heavier than mine, but there’s also the difference between pilot and production to consider. 1. RAM: As much as possible, but 1GB for every 500 managed nodes is a decent rule of thumb 2. CPU: As much as possible, but rules of thumb are harder to come by, as workload varies. A single CPU box without multiple cores or hyper-threading will max out by 1,000 users; quad dual cores should be able to comfortably handle 10,000 nodes. 3. Disk: The easiest setup is to put images and packages on the core, and provide disk space appropriately. If you’re going to serve those large files from a NAS or other pre-existing infrastructure, you can install the system on a mirrored pair, with a second mirrored pair for the database if local. More and faster disks will of course improve performance. Plan for 5 MB of database disk space per managed node. 4. Database location: The decision to place the database on the core, on a nearby server, or in a datacenter is politically fraught. Technically, the only thing that matters is to make sure that you’re choosing the least bottlenecked path, whether that’s local disk or local network. Additionally, access to the database for performance monitoring can be crucial when troubleshooting. Page 1 of 38 3/6/2016 533576449 WINDOWS (45 minutes) 1. Install Windows 2003 -- SP1 or R2 or SP2 will work. If you use R2 or SP2 and you plan to download installation material from LANDesk rather than transferring with physical media, you’ll need to add landesk.com to your Internet Explorer trusted sites. See http://community.landesk.com/support/docs/DOC-1002 for more information on this issue. Don’t run Windows Update yet! It will install .Net 3.5 and screw up your IIS. Getting IIS and ASP.Net free of .Net 3.5 and hooked back up with .Net 2.0 SP1 will not be pleasant. 2. Join the domain, login as a domain user rather than local admin. 3. Install IIS and ASP.Net Page 2 of 38 3/6/2016 533576449 4. Install SNMP (only necessary for System Manager or Server Manager). 5. Up to 100 users, you can just let the LANDesk installer install SQL Express. Beyond that, you should provide SQL Server 2000 or Oracle 9. SQL 2005 is supported, but is harder to configure than SQL 2000. Additionally, it is usually significantly slower than SQL 2000, at least on the class of hardware typically used in pilots, so I would skip it unless you have to use SQL 2005. 6. Remove Internet Explorer Enhanced Security Configuration. You don’t have to, but it’s easier. Alternatively, install Firefox. 7. Now you can run Windows Update, if you like. Or, just let LANDesk handle the patching later. 8. Reboot Page 3 of 38 3/6/2016 533576449 LANDESK (4 hours, or 8 hours if explaining as we go) 1. Extract the LANDesk 8.8 installer files to a network share, they’ll be necessary for your remote console installations (see http://community.landesk.com/support/docs/DOC-2493 when you’re ready for that). If you haven’t downloaded LANDesk yet, the Trial link is http://landesk.avocent.com/Tools/Trial/Index.aspx 2. The installer will not run over Terminal Services unless you use the console switch. If you’re on XP SP3 or Vista, that’s mstsc.exe /admin instead (does the same thing, but the old switch doesn’t work). Page 4 of 38 3/6/2016 533576449 3. Install 8.8, select LANDesk Management Suite and LANDesk Server Manager. Security Suite will be installed automatically as part of Management Suite. Activate the web console, but do not install System Manager unless it is necessary for your environment. 4. If this is a pilot or your environment is smaller than 100 nodes, choose “Create a new database” and it will install SQL 2005 Express (MSDE for versions older than 8.8) on your core. You may want to use the Advanced button to move the database files off of C:\. Remember the sa password you choose, it’ll come in handy later. Alternatively, here’s how to set up an MS-SQL database for use with LANDesk: a. Whether you’re using SQL Server 2000 or SQL Server 2005, you’ll need to ensure that Mixed Mode access is available. LANDesk must use a SQL account rather than a Windows account to access the database. Page 5 of 38 3/6/2016 533576449 b. If you’re installing SQL 2005, all access is disabled by default, even to localhost. I don’t know what the minimum required is, but enabling TCP and named pipes works. c. If you’re creating a dedicated user rather than using SA, you should ensure that this user is the database owner. The best way to do this is to login to the SQL Server Management Studio or SQL Enterprise Manager as the user you’ve created before creating the database. After you’ve created the database, you might want to go back to the user’s properties and set their default database to your LANDesk database, but this is purely a convenience. Page 6 of 38 3/6/2016 533576449 d. Default database settings are fine, as long as you make sure that it’s using the correct drives for its data and log files. Page 7 of 38 3/6/2016 533576449 Page 8 of 38 3/6/2016 533576449 Now you can point the install at your new database. 5. Name your certificate, do not create a reports user, and you’re free to sit back and watch the progress bar. Page 9 of 38 3/6/2016 533576449 6. Reboot now. 7. If you’re going to use the Lenovo ThinkVantage version of LANDesk, you’ll need the Toolkit version 3 from their support site and the Integration Kit (download links are in the documentation and Autorun.exe prerequisite checker of that LANDesk distribution); otherwise, you can skip this step. http://www.pc.ibm.com/us/think/thinkvantagetech/landesk.html 8. Install Service Pack 2 Core Patch http://community.landesk.com/support/docs/DOC-1001 and the new help files: http://www.landesk.com/SolutionServices/documentation.aspx#ldms88 9. Activate the core Page 10 of 38 3/6/2016 533576449 Page 11 of 38 3/6/2016 533576449 10. Right-click My Computer and add users/groups to the LANDesk Management Suite and LANDesk Reports groups. 11. Log into the LANDesk Management Suite console 12. View > Toolbox. This toolbox is just an easier way to access the Tools menu, so keep using that if you prefer. The Tools that you open will be in a series of tabs along the bottom of the console window. Each tool that is open consumes resources, of course, so it is good practice to keep them to a minimum. All visual components of the console can be dragged and dropped to a different location, making layouts; many LANDesk administrators will save several task-specific layouts and switch between them as needed. Use the Layouts dropdown to access this feature. Page 12 of 38 3/6/2016 533576449 13. Security & Patch Manager > select your channels and configure your alerts a. Schedule Update and set to run daily at a time in the past Page 13 of 38 3/6/2016 533576449 14. Configure > Services > Inventory a. Duplicates > When MAC matches > Restore Device ID. When LANDesk OS Deployment is used to re-image an existing machine, the old Device ID is restored transparently. This cannot be done for machines that are reimaged or rebuilt by hand, so those machines will create a new random Device ID when the LANDesk Agent is installed, causing them to appear as duplicate records. This option causes the Inventory Service to recognize the machine and restore its old Device ID. A duplicate mini-scan may still make it into the database; this can be deleted or left to automatically age out. Page 14 of 38 3/6/2016 533576449 15. Configure > Services > Scheduler a. Enter domain and local admin accounts 16. Configure > Services > OSD Validation > Validate both if possible. The DOS validation will request files from Windows NT 4.0 and Windows 98 distribution media; the WindowsPE validation will request files from Windows PE and Windows 2003 SP1 distribution media. This is done for licensing reasons and can be skipped if you only intend to use LinuxPE for OSD; alternatively, production environments can select to purchase a Windows PE license from LANDesk, which simply requires re-activating the core. 17. Let the services restart 18. Use a domain admin account for your COM+ objects. This isn’t always strictly necessary, but… sometimes it is. If you don’t want to do this, don’t do it and see if you get weird problems like agents giving CBA8 errors when you send them right-click commands.. The webservices use these accounts to do various things. Start > Programs > Administrative Tools > Component Services > Computers > Page 15 of 38 3/6/2016 533576449 My Computer > COM+ Applications. Change Identity of LANDesk and LANDesk1 to a domain administrator. Page 16 of 38 3/6/2016 533576449 19. Agent Configuration > Default Windows Configuration a. Enable XDD b. Enable LANDesk Antivirus c. LANDesk Trust Agent is only necessary for doing Trusted Access network compliance testing. d. Use fully qualified domain name to locate the server, or even IP e. Run the inventory scanner once a day and on IP change Page 17 of 38 3/6/2016 533576449 f. Do not reboot after installing an agent. Note that this is different from the global Never Reboot flag under Security and patch scan. g. Run policies once a day, only when user logged in h. Run security scan every day between 11 and 13, using Daily i. Configure Daily agent behavior to 1. Scan AV, Custom, LANDesk, Drivers, Threats, Blocked Apps 2. Show no repair or scan prompts 3. Repair if reboot is pending 4. Never reboot Page 18 of 38 3/6/2016 533576449 ii. Configure Weekly agent behavior to 1. Scan Vulnerabilities & Spyware 2. Show no repair or scan prompts 3. Repair if reboot is pending 4. Reboot if necessary, prompt 2 hours 3 times 5. Snooze if prompt is ignored Page 19 of 38 3/6/2016 533576449 i. Leave Custom Variables alone until you see the need, they’re confusing. j. In a high-security environment, Frequent Security Scans have a place; configure them to scan a blank group, then put things in the group when you need rapid discovery and response. Most shops can leave it off though. k. Disable realtime spyware blocking unless your client machines have more RAM than they know what to do with. Realtime causes the entire Ad Aware database to be loaded into Softmon’s memory. l. Application blocking is not a bad thing, turn it on and notify the end user if you block something. That can be turned off when you roll out production clients, but it’s useful in testing. m. AV Settings i. Enable Risky Page 20 of 38 3/6/2016 533576449 ii. CPU util should be as low as possible iii. Enable a scan every 7 days, between 22 and 4 iv. Allow real-time disabling up to 10 minutes v. Realtime should scan infectable only vi. exclude large files such as VMWare disks or ISO images. n. Enable Agent Watcher i. check every 8 hours for changes – this is a “phone home, update my config, and report on janky users” schedule. ii. check every 10 minutes for okay state – this is when the agent wakes up to see if a user’s been janky. iii. only monitor services and files that you actually use. 20. Create Advance Agent and set an Active Directory Group Policy Object (GPO) to push it out. a. Note that you may need to update this from time to time… it’s kind of a bummer to patch a bunch of desktops with a new LANDesk agent and Page 21 of 38 3/6/2016 533576449 then have the GPO restore your old agent. If you aren’t in charge of setting GPOs, make sure that you’ve got a good working relationship with whoever is, as you’ll probably be sending them an update every quarter or so. b. Here’s how to use Advance Agent if you can’t use a GPO… if you do have a login script or a competing management tool that can do remote execution, just give it this command: msiexec. exe /qn /install /package "\\CORE\ldlogon\advanceagent\Default Windows Configuration.msi". If you don’t have anything else, and you do have remote execution rights (which is to say File & Print Sharing is on, Simple File Sharing is off, and you know an administrative account/password set), check out the lddiscover.exe program in \\CORE\LDMAIN\Utilities. 21. Column Configuration a. Remove OS Name b. Add Login Name, Primary Owner, Network>TCPIP, Last Updated by Inventory Server, System>Chassis Type, System>Manufacturer, System>Model, System>Serial Number c. Set as Default. You’ll need to set as default for each user, or let each user figure out their own column set. Column Sets are valid in the web interface too, look under Administration. Page 22 of 38 3/6/2016 533576449 22. Create queries: a. All nodes (DeviceID exists and DeviceID <> Unassigned) b. All windows clients (OS Name like Microsoft Windows XP or Vista) 23. Security and Patch Manager > Schedule a Security Scan a. Policy b. use Weekly Behavior c. Target against All nodes query d. Schedule to recur weekly 24. Security and Patch Manager > Schedule Gather Historical Information – This causes your database to grow larger, but prevents loss of older data. Note that growing larger is a Bad Thing™ where MSDE or SQL Express is concerned. Page 23 of 38 3/6/2016 533576449 25. Configure > Inventory History Alerts a. Primary Owner, Fixed Disk Model, Memory Physical Total, System Serial Number 26. Configure > Alert a. Inventory Server > Attribute Modified > Email b. Unmanaged Node Detected > Message Box 27. Distribution Methods, change all to Never Reboot, except the two Emergency ones 28. Configure > Agent Discovery Options a. All visible items, refresh, uncheck DNS Page 24 of 38 3/6/2016 533576449 29. Users tab a. Configure the individual users' rights and email addresses 30. When the vulnerability information has all downloaded... a. Security & Patch Manager > Type = Blocked Applications i. Sort by Title, Drag apps from Unassigned to Block and Do Not Block, per policy. “Potentially Malicious” apps should be evaluated carefully before blocking. Page 25 of 38 3/6/2016 533576449 b. Type = Antivirus i. Set AV-101 and applicable Up-to-date vulns to autofix c. Type = LANDesk Updates i. Set all to Autofix d. Type = Security Threats i. Set the custom variables in each threat to match corporate policy ii. Enable autofix iii. There are some very useful compliance tests, there are some that replicate Active Directory Group Policies (which is still useful if you don’t have those or can’t control them), and then there’s the outright dangerous ones. For instance, ST000052 (Disable Active Scripting) or ST000060 (NSA’s Windows XP Guidelines). If you’re held to this standard, repair those; if you’re not, you will be unhappy with the results. The average user might as well nuke and re-deploy a machine that’s had ST000060 applied to it. Drag threats you don’t need to Do Not Scan. Page 26 of 38 3/6/2016 533576449 31. Configure Inventory Service to support recovery – by default, it will stop after 10 database errors. If you’re using ldms_status.exe this is less important. Page 27 of 38 3/6/2016 533576449 32. Additionally, the service should restart after stopping: OTHER (30 minutes) 1. Install SQL Client Tools package if it was MSDE 2. Enterprise Manager, configure a maintenance plan 3. Make directories under ldlogon for images and packages 4. Backup everything, or at least the LANDesk\Shared Files\Keys directory. Read the Post Install Backup Whitepaper at http://community.landesk.com/support/docs/DOC-2343 for more details. 5. Install maintenance add-ons a. If this is a production system, you’ll also want ldms_core from http://www.droppedpackets.org/scripts/ldms_core/ -- run the installer and configure it, then schedule a task to run the command. Page 28 of 38 3/6/2016 533576449 i. Proper fingerprinting of discovered devices is very helpful. The default UDD fingerprinting is hopelessly bad, and XDD doesn’t even try. Download NMAP and install it, accepting all the defaults unless you have good reason not to, then ldms_core will put it to good use figuring out the real OS Names. Page 29 of 38 3/6/2016 533576449 b. It’s not at all uncommon for new LANDesk administrators to run into trouble with keeping the core services running. Changes in the service account can prevent the Scheduler service from restarting properly, and the flood of new information from a newly managed network can cause problems with the Inventory service before the database is settled. To prevent these problems from going unnoticed, use ldms_status from http://www.droppedpackets.org/scripts/ldms_status -- this is a status tray application, so copy it to Utilities and then drag a shortcut to C:\Documents and Settings\All Users\Start Menu\Programs\Startup. It will only allow a single copy to exist in the process table. Page 30 of 38 3/6/2016 533576449 DAY TWO – Software Distribution, OS Deployment, Connection Control Manager, Server Monitoring Software Distribution (1 to 2 hours, depending on size and complexity of package) 1. Select a package, copy it to ldogon/packages. If you can’t think of a package, there are several Best Known Method documents on http://community.landesk.com for common applications. For instance: Adobe Reader 7 http://community.landesk.com/support/docs/DOC-2350 WinZip 10 http://community.landesk.com/support/docs/DOC-1210 MS Office 2003 http://community.landesk.com/support/docs/DOC-2161 a. Define it in the console b. Set its command line per http://www.appdeploy.com – however, do not set /qn or quiet interface options for msiexec, as these will be ignored. User interface is handled by LANDesk’s Delivery Method. c. Note that most Microsoft MSI packages are notoriously bad at defining their package manifest; do not rely on the auto-detect button in the additional files area, but rather select the entire directory. Auto-detect works fine for non-Microsoft MSIs, such as Adobe Acrobat. Page 31 of 38 3/6/2016 533576449 d. Further note that LANDesk’s default behavior is to copy all install files locally, then run them from the local drive; this is done because Targeted Multicast and Peer Download allow it to be more efficient and faster than the run-from-source methods used by most other management tools. However, run-from-source is an option for those with bandwidth to blow, and can be selected in the Delivery Method. Page 32 of 38 3/6/2016 533576449 e. Set a prerequisite query. Note that this is not the targeting query, deciding which systems will receive the package; rather, it is a safety filter which is checked after the target query resolves but before the push or policy begins. For instance, one might set an XP Power Toy package’s prerequisite query to only allow Windows XP nodes, in case someone accidentally schedules the package to all Windows nodes. This preqrequisite query would then prevent the package being installed on servers or Windows 2000 workstations. 2. Distribute it a. Schedule a Policy-supported Push of the package to machines that are on and machines that are off b. Turn on the machines that were off to observe how the policy kicks in. c. Run full inventory scans on targeted machines to force updating of the SLM information. Page 33 of 38 3/6/2016 533576449 3. Find the package in Software License Monitoring 4. Assign a license to it Page 34 of 38 3/6/2016 533576449 OS Deployment (2 hours if all goes well, 2 days if it doesn’t) 1. Create a capture script a. Use WinPE or Linux, DOS performance is not as good. However, do note that Linux and WinPE require at least 256 MB RAM on the machine being captured or deployed. 2. Delete the UUID keys from one of the test machines 3. Push the capture job to that machine. If it doesn’t work, the problem may be DNS, or it may be network drivers. Search http://community.landesk.com for instructions to force name resolution and inject drivers. 4. Wipe the machine’s drive 5. Create a deploy script 6. Create a PXE menu 7. Push a PXE Representative to another test machine (assuming isolated network) 8. PXE boot the test machine and select the imaging job Page 35 of 38 3/6/2016 533576449 Connection Control Manager (1 hour) 1. Build a new Device Control policy. Connection Control (network) policies are harder to test, but essentially work in a similar manner. 2. Turn on Wireless blocking when Wired connection exists. For testing purposes, it’s useful to block USB storage devices; however, blocking USB Keyboards and Mice is never recommended. Page 36 of 38 3/6/2016 533576449 3. Chances are good that unblocking of a specific device will be required – for instance, most multi-function devices need to be unblocked, as do many specialized pieces of hardware such as check printers or scanners. To unblock, use usbmon.exe’s Advanced tab to find the identifying string, then add that string to your configuration and repush it. 4. Finally, create an “Open” policy with nothing blocked, and push it to the test machine to remove Device blocking. Server Monitoring (2 hours) 1. Create a Server agent 2. Push it to a server 3. Observe the hardware monitors 4. Trigger an alert Page 37 of 38 3/6/2016 533576449 5. Trigger a reboot and use the out of band console to check out the BIOS configuration. DAY THREE – Patch Manager Process, Management Gateway Patch Manager Process The first thing to note is that setting up the Patch Manager Process requires access to the database server’s SA account, so you might want to stop reading and just go get that. It’s also always a good idea to check for the latest rollup, see http://community.landesk.com/support/docs/DOC-2981 for links and more. Now then, follow the instructions at http://community.landesk.com/support/docs/DOC2813 to configure the database connection (using the SA account), Domain connection, and LDMS connection. If you’re not using a domain or also need local accounts, you’ll want to configure local WinNT:// style access per that document. After that’s all done, the Process Designer should be able to open and allow you to configure things. Management Gateway Get a basic box: a desktop platform, use an old server, or use VMWare. The disk will be wiped, so don’t use something you intend to keep. You’ll need at least 11 GB of disk space and 256 MB RAM, and a CD drive. The application is CPU and NIC bound, so spend resources there if you are concerned about load. Burn the ISO to a CD, put it in the box, and boot to it. Follow the menu. Then go to the core, select Configure > Management Gateway, and fill in the form. Go to the second tab and post your certificate. The biggest difficulty in using or testing the gateway is networking. If you want to really test it or use it in production, you’ll need to install it in your company’s DMZ and assign a real IP address to it; an externally resolvable DNS name is also handy, though not strictly required. To test it internally without using the Internet, you can simply add a null route or firewall rule to your test client, stopping it from reaching the core. DAY FOUR – Provisioning, App Virtualization, LDAV, HIPS, whipped cream and a cherry on top… Page 38 of 38 3/6/2016