Altiris™ IT Management Suite 7.1 SP2 from Symantec™ Planning
Transcription
Altiris™ IT Management Suite 7.1 SP2 from Symantec™ Planning
Altiris™ IT Management Suite 7.1 SP2 from Symantec™ Planning and Implementation Guide Altiris™ IT Management Suite 7.1 SP2 from Symantec™ Planning and Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Legal Notice Copyright © 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo, Altiris, and any Altiris or Symantec trademarks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com Technical Support Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec’s support offerings include the following: ■ A range of support options that give you the flexibility to select the right amount of service for any size organization ■ Telephone and/or Web-based support that provides rapid response and up-to-the-minute information ■ Upgrade assurance that delivers software upgrades ■ Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis ■ Premium service offerings that include Account Management Services For information about Symantec’s support offerings, you can visit our Web site at the following URL: www.symantec.com/business/support/ All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Contacting Technical Support Customers with a current support agreement may access Technical Support information at the following URL: www.symantec.com/business/support/ Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: ■ Product release level ■ Hardware information ■ Available memory, disk space, and NIC information ■ Operating system ■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: ■ Error messages and log files ■ Troubleshooting that was performed before contacting Symantec ■ Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/business/support/ Customer service Customer service information is available at the following URL: www.symantec.com/business/support/ Customer Service is available to assist with non-technical questions, such as the following types of issues: ■ Questions regarding product licensing or serialization ■ Product registration updates, such as address or name changes ■ General product information (features, language availability, local dealers) ■ Latest information about product updates and upgrades ■ Information about upgrade assurance and support contracts ■ Information about the Symantec Buying Programs ■ Advice about Symantec's technical support options ■ Nontechnical presales questions ■ Issues that are related to CD-ROMs, DVDs, or manuals Support agreement resources If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows: Asia-Pacific and Japan [email protected] Europe, Middle-East, and Africa [email protected] North America and Latin America [email protected] Contents Technical Support ............................................................................................... 4 Section 1 Planning for IT Management Suite ................... 17 Chapter 1 Introducing IT Management Suite ................................... 19 About IT Management Suite ........................................................... What you can do with IT Management Suite ...................................... How IT Management Suite works .................................................... What's new in Symantec Management Platform 7.1 SP2 ...................... What's new for ITMS solutions ....................................................... Where to get more information ....................................................... Chapter 2 19 20 21 25 29 31 Understanding the components of IT Management Suite ................................................................................. 33 About the Symantec Management Platform ...................................... Core architectural components of Symantec Management Platform ............................................................................... Components of the Symantec Management Platform .......................... About Notification Server .............................................................. About the Symantec Management Console ........................................ About the Configuration Management Database ................................ About site services ....................................................................... About the Symantec Management Agent .......................................... Solutions of IT Management Suite .................................................. About Asset Management Suite ...................................................... About Barcode Solution ................................................................. About CMDB Solution ................................................................... About Deployment Solution .......................................................... About Inventory Solution .............................................................. About IT Analytics Solution ........................................................... About Symantec Mobile Management .............................................. About Monitor Solution ................................................................. About Monitor Pack for Servers ...................................................... About Out of Band Management Component ..................................... 34 35 36 37 38 39 39 40 41 42 43 43 44 45 46 46 47 47 47 8 Contents About Patch Management Solution for Windows ............................... About Patch Management Solution for Linux .................................... About Patch Management Solution for Mac ...................................... About pcAnywhere Solution ........................................................... About Real-Time System Manager ................................................... About Endpoint Protection Integration Component ............................ About Software Management Solution ............................................. About Symantec Workflow ............................................................ Chapter 3 Planning for IT Management Suite .................................. 53 IT Management planning considerations .......................................... About planning your SQL Server configuration .................................. About hard drive configuration for off-box SQL Server ................. About hard drive configuration for on-box SQL Server .................. Throughput metrics of SQL Server ............................................ About database sizing for SQL Server ........................................ About memory management for SQL Server considerations ........... About planning your site servers ..................................................... About site maintenance ........................................................... About the task service ............................................................. How task server uses the tickle mechanism ................................. About the package service ....................................................... About the deployment site service ............................................. Symantec Management Agent deployment planning .......................... How agent-based inventory communications work ............................. How agent check-in intervals and basic inventory settings interact ................................................................................ How Patch Management Solution data communications work .............. Components of Deployment Solution ............................................... How capturing master disk images works ................................... How deploying disk images works ............................................. Methods of delivering preboot environments to computers ............ How Deployment Solution imaging jobs work .............................. How asset management data communications work ........................... Chapter 4 48 49 49 49 50 51 51 52 53 55 56 57 59 60 61 62 63 64 65 67 68 70 71 73 73 76 80 82 82 83 87 Reference of topics about multi-Notification Server environments ................................................................. 89 About MultiCMDB reporting with IT Analytics .................................. What's new in IT Analytics 7.1 SP2 ............................................ Adding and configuring external Symantec CMDB connections .................................................................... Editing external Symantec CMDB connections ............................. 89 90 91 92 Contents Editing the Report Integration URLs for an external Symantec CMDB ............................................................................ 93 Deleting external Symantec CMDB connections ........................... 94 Including or excluding the local Symantec CMDB ......................... 94 Updating the Solution Dependencies ......................................... 95 About global policy distribution ...................................................... 95 What you can do with global policy distribution ........................... 96 About hierarchy ..................................................................... 96 How global policy distribution works with hierarchy .................... 97 Hierarchy requirements .......................................................... 97 About hierarchy topology ........................................................ 98 About creating and managing hierarchical relationships ............... 99 Setting up a hierarchical relationship between two Notification Server computers ........................................................... 100 How deployment site servers work in a hierarchy ....................... 102 About hierarchy editable properties ......................................... 102 Global policy distribution implementation considerations for Software Management Solution ........................................ 102 Global policy distribution implementation considerations for Patch Management Solution ............................................. 103 Limitations of global policy distribution in a hierarchy ................ 103 Limitations of hierarchy ........................................................ 104 Replication types in the Symantec Management Platform .................. 105 About hierarchy replication ................................................... 106 About hierarchy replication rules ............................................ 107 About configuring replication ................................................. 107 Replicating custom items in a hierarchy ................................... 109 Configuring replication rules .................................................. 110 Replication rule settings ........................................................ 111 Specifying destination Notification Servers in a replication rule .............................................................................. 113 Overriding the hierarchy differential replication schedule ........... 114 Replicating selected data manually .......................................... 114 Running a hierarchy report .................................................... 115 Section 2 Implementing IT Management Suite .............. 117 Chapter 5 Performance and scalability recommendations for IT Management Suite .................................................. 119 Symantec Management Platform performance factors ...................... 119 About tuning the SQL Server computer for performance .............. 120 9 10 Contents About tuning Notification Server Event processing for performance .................................................................. About predefined inventory policies ........................................ Scheduling resource membership updates ................................ About tuning the Symantec Management Agent for performance .................................................................. Targeted Agent Settings: General tab ....................................... Recommended configuration settings based on managed endpoints ...................................................................... Recommended ranges of component totals for IT Management Suite 7.1 ..................................................................................... Recommended IT Management Suite 7.1 hardware ........................... Recommended configuration for Notification Server with locally installed SQL database .......................................................... Supported operating systems for Notification Server and site servers ............................................................................... SQL Server recommendations and third-party software requirements ....................................................................... Chapter 6 Chapter 7 120 121 123 124 126 126 128 129 132 132 135 Preparing for the installation of IT Management Suite ............................................................................... 139 About developing an installation plan ............................................ About the migration guides .......................................................... About supported SQL Server collations ........................................... Considerations before you install Notification Server ........................ Agent configuration considerations ............................................... 139 140 141 141 142 Installing IT Management Suite ...................................... 145 About installing the Symantec Management Platform products .......... Overview of the installation process ............................................... Managing the installation of the Symantec Management Platform products ............................................................................. Installing Symantec Installation Manager ................................. Starting Symantec Installation Manager ................................... Delaying the update of Symantec Installation Manager ............... About creating an installation package ..................................... Creating an installation package ............................................. Creating an update installation package ................................... Installing the Symantec Management Platform products ................... Install New Products page, Product Updates page, or Products page ............................................................................. Install Readiness Check page .................................................. 146 147 148 151 153 154 155 156 157 158 161 162 Contents Notification Server Configuration page .................................... Database Configuration page .................................................. About installation tasks you can perform after the initial installation ......................................................................... Reconfiguring an installed product .......................................... Installing a hotfix or an additional product ............................... About installing optional components ...................................... Installing optional components ............................................... Uninstalling or repairing optional components .......................... Applying licenses to a solution ................................................ Repairing the installation of an installed product ....................... Creating a support package .................................................... Uninstalling the Symantec Management Platform products ......... About Symantec Installation Manager logs ............................... Disabling the creation of verbose Symantec Installation Manager logs .............................................................................. Viewing Symantec Installation Manager logs ............................. About modifying the installation of a product .................................. Adding a product listing file ......................................................... Updating the product listing ......................................................... About upgrading from IT Management Suite 7.1 to 7.1 SP2 ............... Upgrading from IT Management Suite 7.1 to 7.1 SP2 ......................... Preparing to upgrade from IT Management Suite 7.1 to 7.1 SP2 .......... Performing an upgrade to IT Management Suite 7.1 SP2 .................... Chapter 8 163 165 166 167 167 169 170 171 172 173 174 174 175 176 176 177 177 178 179 180 180 182 Installing the Deployment Solution ............................... 185 About installing Deployment Solution ............................................ Preinstallation requirements for Deployment Solution ...................... Installing Deployment Solution components ................................... Installing Deployment Plug-in ...................................................... Installing an automation folder ..................................................... Installing Deployment site server components ................................. Setting up ACC ..................................................................... Installation path of Deployment Solution tools ................................ Upgrading Deployment Solution components .................................. Uninstalling Deployment Solution components ............................... Enabling the uninstallation policy ................................................. Uninstalling Deployment Solution through Symantec Installation Manager ............................................................................. Repairing Deployment Solution .................................................... 185 188 189 190 191 192 194 195 195 196 197 198 199 11 12 Contents Chapter 9 Configuring Notification Server ...................................... 201 About configuring Notification Server ............................................ Configuring the Configuration Management Database ...................... Purging the Configuration Management Database ............................ Saving resource data history in the CMDB ....................................... Configuring Notification Server settings ......................................... Notification Server processing settings .................................... Notification Server processing settings .................................... Configuring Notification Server settings ......................................... Email server and address settings ............................................ Status message logging settings .............................................. Opening the Log Viewer ......................................................... Proxy server settings ............................................................ Distribution point credential settings ....................................... Configuring Notification Server settings with NS Configurator ........... Performing a first-time setup configuration .................................... Chapter 10 Setting up managed computers ..................................... 217 Discovering computers ................................................................ Installing the Symantec Management Agent .................................... Agent and task setting options ...................................................... Collecting inventory information .................................................. Deploying preboot environments .................................................. Chapter 11 201 202 204 205 210 209 209 210 211 212 212 213 213 214 215 217 219 223 224 226 Configuring security .......................................................... 227 About Symantec Management Platform security .............................. Setting up Symantec Management Platform security ........................ About security roles .................................................................... Predefined security roles ............................................................. About security privileges ............................................................. Connection Profile privileges .................................................. Management privileges ......................................................... System privileges ................................................................. Credential privileges ............................................................. Workflow Directory privileges ................................................ Symantec Management Console privileges ................................ Software Management Framework privileges ............................ Right-click Menu privileges .................................................... Right-click Menu - Connector Samples privileges ....................... Right-click Menu - Hierarchy privileges .................................... Right-click Menu - Actions privileges ....................................... 227 229 231 232 233 235 235 237 239 239 240 240 241 242 243 244 Contents Right-click Menu - Set Asset Status privileges ............................ About Symantec Management Platform user accounts ...................... Creating and configuring Symantec Management Platform user accounts ............................................................................. Specifying general Symantec Management Platform user account details .......................................................................... Configuring credentials for a Symantec Management Platform user account .................................................................. Assigning a Symantec Management Platform user account to a security role .................................................................. Configuring password complexity and lockout settings ..................... Unlocking locked out credentials ................................................... About security role permissions .................................................... Resource Management permissions ......................................... System permissions .............................................................. Task Server permissions ........................................................ Report permissions ............................................................... Policy permissions ................................................................ Folder permissions ............................................................... Filter permissions ................................................................. Connection Profile permissions ............................................... Credential Manager permissions ............................................. About the Security Role Manager .................................................. Accessing the Security Role Manager ....................................... Assigning security permissions to folders and items ................... Customizing permission inheritance ........................................ Role Selection window ........................................................... Taking ownership of a folder or item ........................................ About credential manager ............................................................ Creating a credential ................................................................... Editing a credential ..................................................................... Chapter 12 245 245 247 249 249 252 252 255 255 257 257 258 258 259 259 259 259 260 260 261 262 263 265 265 266 266 267 Configuring Schedules ..................................................... 269 About Symantec Management Platform schedules ............................ About schedule active periods and time zones ............................ About schedule triggers ......................................................... About schedule modifiers ....................................................... How Symantec Management Platform uses schedules ................. Managing shared schedules .......................................................... Configuring a schedule ................................................................ Viewing the Notification Server internal schedule calendar ................ 269 270 270 272 273 274 275 276 13 14 Contents Chapter 13 Configuring site servers ................................................... 279 Managing sites ........................................................................... Creating a new site ............................................................... Modifying a site ................................................................... Managing manually assigned agents ........................................ Managing site servers ................................................................. Creating and modifying site servers ......................................... Assigning a site server to a site manually .................................. About configuring the site service settings ...................................... About package service settings ............................................... About removing automatic site assignments ............................. Configuring package service settings ....................................... About task service settings ..................................................... Configuring task service settings ............................................. About package server for Linux ..................................................... About integrating Apache Web Server with package server for Linux ........................................................................... About detecting the Apache Web Server ................................... Requirements to configure package server and the Apache Web Server .......................................................................... Requirements to configure HTTPS and HTTP ............................ Package server configuration example that uses main web directory for package server links ...................................... Package server configuration example using an alias for package server links ................................................................... Chapter 14 279 281 281 282 283 284 286 286 287 289 290 290 291 292 293 294 295 296 297 299 Getting started with IT Management Suite .................. 303 About the enhanced console views ................................................. About the Computers view ........................................................... Searching for a computer and saving the search ............................... Creating and populating an organizational view or group in the enhanced console views ......................................................... Managing subnets ...................................................................... Creating a new subnet ........................................................... About the Jobs / Tasks view .......................................................... Running a job or task using drag and drop ....................................... About the Policies view ................................................................ Searching for a software and saving the search ................................ Tracking the software licenses in the enhanced console views ............ About the Software Catalog window ............................................... About resource scoping ............................................................... Considerations for resource scoping .............................................. 304 304 305 306 307 308 309 310 310 311 312 313 314 314 Contents Design considerations for resource scoping ..................................... 315 Appendix A Symantec IT Management Suite Platform Support Matrix ............................................................................. 319 Introduction .............................................................................. Current Shipping Information ...................................................... Symantec Management Platform ................................................... Notification Server and Workflow Server .................................. Microsoft SQL Server ............................................................ Microsoft SQL Server Collations .............................................. Microsoft IIS ....................................................................... Microsoft .NET ..................................................................... Console/Browser .................................................................. Console/Silverlight ............................................................... Workflow Designer ............................................................... Site Server .......................................................................... Client Management Suite ............................................................. Client OS Support Matrix ....................................................... Server Management Suite ............................................................ Server OS Support Matrix ...................................................... Language Support ...................................................................... Core Localization .................................................................. Windows Agent Localization .................................................. 319 320 320 321 322 323 323 324 324 325 325 326 331 331 335 335 341 342 342 Index ................................................................................................................... 345 15 16 Contents Section 1 Planning for IT Management Suite ■ Chapter 1. Introducing IT Management Suite ■ Chapter 2. Understanding the components of IT Management Suite ■ Chapter 3. Planning for IT Management Suite ■ Chapter 4. Reference of topics about multi-Notification Server environments 18 Chapter 1 Introducing IT Management Suite This chapter includes the following topics: ■ About IT Management Suite ■ What you can do with IT Management Suite ■ How IT Management Suite works ■ What's new in Symantec Management Platform 7.1 SP2 ■ What's new for ITMS solutions ■ Where to get more information About IT Management Suite IT Management Suite (ITMS) combines client and server configuration management with IT asset and service management. It promotes effective service delivery and helps reduce the cost and complexity of managing corporate IT assets. These assets may include desktops, laptops, thin clients, and servers in heterogeneous environments running Windows, Linux, UNIX, and Mac. You can manage all of the features of the suite through a central console on a common platform: the Symantec Management Platform. This common platform integrates management functions to accelerate automation for better service, value, and IT efficiency. See “What you can do with IT Management Suite” on page 20. IT Management Suite is comprised of the following management capabilities: ■ Server management 20 Introducing IT Management Suite What you can do with IT Management Suite The server management capabilities support not only the Windows operating system, but also the UNIX and the Linux operating systems. In addition, the same management disciplines are applied to both physical systems and virtual systems, including both Microsoft Hyper-V and VMware. ■ Client management The client management capabilities support Windows and a growing number of other platforms, including Mac OS and Linux operating systems. ■ IT asset management IT asset management builds upon solid inventory foundations for configuration management. It helps you accurately value both your discoverable and non-discoverable assets, and track your assets and your asset-related information. You can manage contracts, software license compliance, and procurement processes as well as the configuration items that are associated with your assets. See “What you can do with IT Management Suite” on page 20. See “How IT Management Suite works” on page 21. See “What's new in Symantec Management Platform 7.1 SP2” on page 25. What you can do with IT Management Suite IT Management Suite (ITMS) helps you improve service delivery, increase efficiency, and reduce costs. You can do the following with IT Management Suite: ■ Manage from a central console. You can centrally manage heterogeneous client and server endpoints. ■ Manage remotely. One-to-one remote-management capabilities let you avoid desk-side or server-side visits. ■ Automate tasks. The task engine lets you perform multiple remote-management tasks simultaneously. ■ Automate policy enforcement. The policy engine lets you detect and remediate automatically, without human involvement. ■ Automate processes. The workflow engine lets you automate human and system interactions to eliminate latency errors and omissions. Introducing IT Management Suite How IT Management Suite works ■ Create self-service. The service catalog lets you avoid calls or requests entirely with best-practice self-service. ■ Centrally manage software. Software management includes software inventory, patching, delivery, and license management. See “What's new in Symantec Management Platform 7.1 SP2” on page 25. See “About IT Management Suite” on page 19. How IT Management Suite works IT Management Suite (ITMS) is a bundling of Symantec products and software. IT Management Suite helps you deploy, manage, support, and retire the various computers, devices, servers, and IT assets in your organization. IT Management Suite includes IT asset management and client and server configuration management. See “About IT Management Suite” on page 19. IT Management Suite has the following key features and functions: ■ Centralized management platform All of the parts of IT Management Suite are built on a common foundation that is called the Symantec Management Platform. The Symantec Management Platform is a set of core services that all of the parts of IT Management Suite share. These services can include aspects such as security, reporting, communications, and data storage. IT Management Suite 7.1 introduces an improved management interface that gets you where you want to be faster. Common concepts such as managing computers, delivering software, and managing licenses and deployment are consolidated into an integrated experience. When you click on a computer, resource management details are immediately visible. Powerful search features help you drill down and build filters in a short period of time. You can quickly save the searches for future use. Drag-and-drop functionality lets you select tasks and drag them to one or more selected computers. ■ Common database and management console The different parts of the platform can read and write from a common database. The database is called the Configuration Management Database (CMDB). Even though IT Management Suite covers a wide variety of IT-related capabilities, you interact with all of its technologies through a common Web-based user interface. This interface is called the Symantec Management Console. ■ Management agent and management server 21 22 Introducing IT Management Suite How IT Management Suite works IT Management Suite can discover the computers that are present in your environment. You can install the Symantec Management Agent on these computers. The agent lets you gather very detailed information about them. It regularly sends information about the computer to a management server computer called Notification Server. Notification Server processes the information about your computers and stores it in a common database. The Symantec Management Agent gives you robust control and visibility into the hardware and software on your managed computers and servers. It helps you to maintain your corporate standards and policies remotely from the Web-based Symantec Management Console. ■ Asset Management You can use the data in the CMDB to manage your assets more efficiently. For example, you can use this information with reports and filters to gain visibility into and track metrics on the assets in your environment ■ License management License management and asset management and usage are tightly integrated. Within the software display is an at-a-glance view of the current deployments and cost details. These details are based on the current installations and the purchasing details. A graphic can help you to determine if a software product is over-deployed or under-deployed, and evaluate its current usage. It gives visibility into the financial implications of a product. You can see the potential savings from harvesting licenses, and you can see the cost effect when a product is over-deployed. ■ Software Management You can see what software is installed, how often it is used, and how many licenses for it you have purchased. This type of information can help you determine the IT assets you need to purchase. You can also use this information to determine how to maximize your software investment and when to replace or decommission software. In addition, you can use IT Management Suite to take action on the information that it gathers. For example, IT Management Suite may discover that certain software is installed and licensed but is not used. You can configure the suite to remove the unused software. In ITMS 7.1, the Software Catalog interface is streamlined and redesigned. Any software that is found is stored in the newly discovered list. From this list you can quickly determine whether you want to make the identified software a managed product. If not, you can assign it to unmanaged software. After you identify software as a managed software product, you can manage all elements of it in a single interface. Inventory, metering, delivery, and license tracking are all presented in a single interface. Introducing IT Management Suite How IT Management Suite works The Managed Delivery feature separates the schedule for delivery and the schedule for execution. You can first stage packages in advance, and then later schedule the execution. ■ Task and policy engines Notification Server has two components that are called the task engine and the policy engine. These components let you do work on your managed computers. You can use policies to maintain consistent standards, and you can use tasks to execute sequential steps. Policy-based management can allow the managed computer autonomy whether it is in a connected or disconnected state. Task-based management follows the traditional server to client communications paradigm. ■ Managed computers Managed computers have the management agent installed. They regularly communicate with the Notification Server computer. When a managed computer contacts Notification Server, it checks to see if you have configured any work for it to do. The agent can check to see if the computer on which it is installed is compliant with a policy. For example you can set up a policy to ensure that all of your managed computers have the latest version of software. If it is not compliant, then the agent can download and install the software according to your settings. When software is remotely executed on target computers with Notification Server, this software is called a software package. ■ Patch Management You can use IT Management Suite to keep your computers secure, patched, and compliant. IT Management Suite lets you manage all aspects of applying Microsoft Windows security updates and patches. ■ Provisioning You can remotely provision and deploy standardized operating system images to your computers. This functionality includes bare-metal deployment and re-imaging computers to return them to known-good states. ■ Migration and deployment Deployment Solution is natively integrated with the Symantec Management Platform. Consequently, you work with Deployment Solution and Symantec Management Platform through a single console, database, and agent. IT Management Suite 7.1 provides many enhancements to the Deployment Solution console. The DeployAnywhere capability supports all plug-and-play driver types for hardware-independent imaging. This addition complements the support for hardware abstraction layers (HAL), network interface cards, and mass-storage-controller drivers to provide a complete hardware-independent 23 24 Introducing IT Management Suite How IT Management Suite works imaging solution. Management for the driver database is now available through the console. You can consolidate driver management because both imaging and scripted operating system installations consume the drivers in the DeployAnywhere database. Ghost imaging supports the familiar style of RapiDeploy multicasting. PC transplant supports Microsoft Office 2010 (32-bit and 64-bit). Enhanced Virtual Machine Management capabilities streamline configuration and extend the virtual machine creation wizard. The wizard can execute any Deployment Solution job as part of the virtual machine creation process. This ability lets you leverage existing server provisioning jobs and apply them to virtual server provisioning. ■ Server health monitoring IT Management Suite also lets you monitor and maintain the health of your servers. You can monitor key metrics and indicators of your server health performance. These metrics can be viewed in real time. With the task engine, you can proactively manage your servers. For example, you can automate complex sequences of fail-safe measures such as provisioning a backup server in the event that a server crashes. You can configure the system to alert you if a specific metric starts to indicate a potential problem. You can then resolve that problem so that it does not manifest in the future. ■ Workflow engine IT Management Includes a workflow engine that lets you automate human and system interactions. You can set up robust workflows to automatically complete many of the sequential tasks that are required for efficient service management. In addition to form builders and drag-and-drop process designer capabilities, you can use the full component generator capability for access to third-party technologies. These technologies include HR or finance systems, and the Workflow portal. The Workflow portal lets you track the overall process as a workflow moves through the various stages. ■ Advanced reporting and IT Analytics The executive dashboard and trend analysis give you a representative view of your IT assets. Key performance indicators let you measure critical success factors for your organization and quickly assess trends of how these measures change over time. You can use ad-hoc data mining to construct pivot table reports. The reports are based on predefined measures and dimensions. The functionality allows for easy manipulation of the data so you do not have to be a SQL expert to access the information you need. Multidimensional analysis and robust graphical reporting are incorporated to help you arrive at your answers with very little customization and without waiting. Introducing IT Management Suite What's new in Symantec Management Platform 7.1 SP2 The MultiCMDB feature provides global IT Analytics reporting across multiple CMDBs without the need to replicate large amounts of data. ■ Symantec Workspace Virtualization A key challenge to moving to Windows 7 is that many legacy Web applications depend on Internet Explorer 6. Symantec Workspace Virtualization includes a new update that solves this challenge. You can virtualize Internet Explorer 6 directly in Windows 7. This ability lets you concurrently run Internet Explorer 6, 7, and 8. You can also run multiple Java versions on the native operating system to achieve normal visibility. This approach enables side-by-side usage, and offers a secure implementation that is invisible to the user. You can determine which applications should have access to that specific browser. Users are never prompted to choose a browser. The correct version automatically opens for them based on policy. This option helps you move faster and more efficiently to Microsoft Windows 7. Browser plug-ins such as Acrobat and Flash can be installed into the base or into a virtual layer. Multiple Java versions can be installed in the base, or in a layer, and used by a virtual Internet Explorer. Workspace Virtualization automatically supports any group policy objects that your enterprise may have in place for Internet Explorer. See “What you can do with IT Management Suite” on page 20. See “What's new in Symantec Management Platform 7.1 SP2” on page 25. What's new in Symantec Management Platform 7.1 SP2 In the 7.1 SP2 release of Symantec Management Platform, the following new features are introduced: 25 26 Introducing IT Management Suite What's new in Symantec Management Platform 7.1 SP2 List of new features Table 1-1 Component Description General ■ Core ■ Symantec Help Center The Symantec Management Platform 7.1 SP2 release provides Symantec Help Center. This search-based Help system implements many Web 2.0 features, such as autosuggest and filtering. It also deploys the customized search logic that helps you get more relevant answers to your questions. ■ Symantec ServiceDesk no longer installed as a part of IT Management Suite in Symantec Installation Manager To install Symantec ServiceDesk, you must select the product separately in the product listing in Symantec Installation Manager. Support for Microsoft MED-V virtualization This enhancement adds the ability for Symantec Management Agents on Microsoft MED-V virtual devices to communicate through devices in NAT mode. It is now supported in 6.x or later. ■ NSE processing improvements enable faster inventory updates and consume less processing power on Notification Server and Microsoft SQL systems. ■ Registry keys can be used to change the path to Logs and the Event queue. ■ Scalability - One Notification Server now supports up to 300 task servers. ■ Support for SQL 2008 R2 SP1 ■ Support for SQL 2005 SP4 ■ Support for Windows Internet Explorer 9 in compatibility mode ■ A 5,000-seat environment was tested and documented to provide hardware recommendations and to minimize hardware expenses for SMB environments. For more information, see the IT Management Suite Planning and Implementation Guide at http://www.symantec.com/docs/DOC4827 Introducing IT Management Suite What's new in Symantec Management Platform 7.1 SP2 List of new features (continued) Table 1-1 Component Description Symantec Installation Manager ■ Ability to perform offline upgrades You can export a server's installation history and import it to an Internet-connected computer to create an installation package. ■ Log files for support packages Symantec Installation Manager lets you create and view verbose and non-verbose log files for inclusion in a support package. ■ Ability to create installation packages on Windows XP/7 computers You can now run Symantec Installation Manager on the platforms that Notification Server does not support. Examples of these platforms are Windows XP/7, but only for the purpose of creating offline installation packages. ■ Improvements to SSL configuration New options for supplying a certificate during installation. The options include Create self-signed, Import, and using a certificate available on the computer. For more information, see the Symantec Management Platform 7.1 SP2 Installation Guide. http://www.symantec.com/docs/DOC4798 Enhanced Console Views New Software Management privileges Software Management privileges grant specific abilities to the user role. They also allow the user to perform specific tasks in the Software view and Software Catalog window from the enhanced console views. ■ Improved Licenses tab Improvements in the Licenses tab, on the Software Product dialog box, let you choose whether to license a software product. These improvements also let you create additional licenses for the same software product. ■ ■ Improved Delivery tab Improvements in the Delivery tab, on the Software Product dialog box, let you import software packages, add software packages, and add command lines. ■ Additional search options Improvements in the Enhanced Views Setting dialog box let you configure search settings for the Software view and Computer view center panes (list panes). See Altiris IT Management Suite 7.1 SP2 from Symantec Enhanced Console Views Getting Started Guide at the following URL: http://www.symantec.com/docs/doc4858 27 28 Introducing IT Management Suite What's new in Symantec Management Platform 7.1 SP2 List of new features (continued) Table 1-1 Component Description Symantec Workflow ■ ■ Symantec Workflow is delivered through Symantec Management Platform. The Configuration and Logging Tool in Workflow Designer was renamed to Workflow Explorer. Users can now enter platform credentials during installation, but AD credentials were removed from the installation. Improvements in Active Directory synchronization let you selectively synchronize users with Symantec Workflow. New import profiles and export profiles are available. ■ Symantec Workflow includes a refreshed Sharepoint component library. ■ ■ ■ All integration projects are now multi-generator container projects by default. ■ A new application installer is included for partners. ■ Software Management Framework ■ Support of virtualization package format XPF This enhancement ensures that the software catalog adds support of the default package format of Symantec Workspace Virtualization. Changes in Software Management Framework Agent inventory report To prevent accidental loss of Software Management Framework inventory data, a periodical send of full inventory data ia added. For more information, see the following knowledge base article at the following URL: http://www.symantec.com/docs/HOWTO60920. ■ Automatically generate command lines when a package is created checkbox in Add or Edit Package dialog box This checkbox lets you generate appropriate command lines when a new package is added to either a new software resource or an existing software resource. ■ Introducing IT Management Suite What's new for ITMS solutions List of new features (continued) Table 1-1 Component Description UNIX, Linux, Mac Agent ■ NSE events You can now select specific resource keys to be ignored when you generate NSE events. For more information, see the knowledge base article at the following URL: http://www.symantec.com/docs/HOWTO60919. ■ Support for 64-bit RHEL 6 A 64-bit bootstrap module is added to the solution package to support installation on the RHEL 6 64-bit platforms without a 32-bit compatibility layer. ■ Various enhancements for Client Task Agent Changes in agent packaging for Mac platform ULM Agent distribution for MacOS now contains signed files (libraries, binary executables, and application bundles). Files are signed with the official Symantec certificate. ■ Support for Mac OS X 10.7.x and Mac OS X Server 10.7.x ■ See “About the Symantec Management Platform” on page 34. What's new for ITMS solutions The following links take you to the release notes for individual ITMS solutions. Each release note contains a "What's New" topic. Table 1-2 What's new for ITMS solutions Document Location Altiris™ Client Management Suite 7.1 SP2 from http://www.symantec.com/docs/DOC4723 Symantec™ Release Notes Altiris™ Server Management Suite 7.1 SP2 from Symantec™ Release Notes http://www.symantec.com/docs/DOC4725 Altiris™ Asset Management Suite 7.1 SP2 from http://www.symantec.com/docs/DOC4670 Symantec™ Release Notes Altiris™ Barcode Solution 7.1 SP2 from Symantec™ Release Notes http://www.symantec.com/docs/DOC4673 Altiris™ Deployment Solution 7.1 SP1a MR1 from Symantec™ Release Notes http://www.symantec.com/docs/DOC4467 29 30 Introducing IT Management Suite What's new for ITMS solutions Table 1-2 What's new for ITMS solutions (continued) Document Location Symantec™ Endpoint Protection Integration Component 7.1 SP2 Release Notes http://www.symantec.com/docs/DOC4809 Altiris™ Inventory Solution™ from Symantec™ http://www.symantec.com/docs/DOC4782 7.1 SP2 Release Notes Altiris™ Inventory Pack for Servers from Symantec™ 7.1 SP2 Release Notes http://www.symantec.com/docs/DOC4799 Altiris™ Inventory for Network Devices 7.1 SP2 http://www.symantec.com/docs/DOC4781 from Symantec™ Release Notes Altiris™ IT Analytics Solution 7.1 SP2 from Symantec™ Release Notes http://www.symantec.com/docs/DOC4843 Altiris™ Monitor Solution for Servers 7.1 SP2 http://www.symantec.com/docs/DOC4691 and Event Console 7.1 SP2 from Symantec™ Release Notes Altiris™ Monitor Pack for Servers 7.1 SP2 from http://www.symantec.com/docs/DOC4692 Symantec™ Release Notes Altiris™ Out of Band Management Component http://www.symantec.com/docs/DOC4688 7.1 SP2 from Symantec™ Release Notes Altiris™ Patch Management Solution for Windows 7.1 SP2 from Symantec™ Release Notes http://www.symantec.com/docs/DOC4815 Altiris™ Patch Management Solution for Linux http://www.symantec.com/docs/DOC4817 7.1 SP2 from Symantec™ Release Notes Altiris™ Patch Management Solution for Mac http://www.symantec.com/docs/DOC4819 7.1 SP2 from Symantec™ Release Notes Symantec™ pcAnywhere Solution™ 12.6 SP2 Release Notes http://www.symantec.com/docs/DOC4810 Altiris™ Real-Time Console Infrastructure 7.1 http://www.symantec.com/docs/DOC4689 SP2 from Symantec™ Release Notes Altiris™ Real-Time System Manager Solution http://www.symantec.com/docs/DOC4690 7.1 SP2 from Symantec™ Release Notes Altiris™ Software Management Solution 7.1 SP2 from Symantec™ Release Notes http://www.symantec.com/docs/DOC4663 Introducing IT Management Suite Where to get more information Table 1-2 What's new for ITMS solutions (continued) Document Location Symantec™ Virtual Machine Management 7.1 http://www.symantec.com/docs/DOC4797 SP2 Release Notes Wise™ Connector 7.1 SP2 Release Notes http://www.symantec.com/docs/DOC4811 Symantec™ Workflow 7.1 SP2 Release Notes http://www.symantec.com/docs/DOC4796 Where to get more information Use the following documentation resources to learn about and use this product. See “About IT Management Suite” on page 19. Table 1-3 Documentation resources Document Description Location Release Notes Information about new features and important issues. The Supported Products A-Z page, which is available at the following URL: Information about how to use this product. ■ User guides http://www.symantec.com/business/support/index?page=products The Documentation Library, which is available in the Symantec Management Console on the Help menu. The Documentation Library provides a link to the PDF User Guide This information is on the Symantec support Web site. available in PDF format. ■ The Supported Products A-Z page, which is available at the following URL: http://www.symantec.com/business/support/index?page=products Open your product's support page, and then under Common Topics, click Documentation. 31 32 Introducing IT Management Suite Where to get more information Table 1-3 Documentation resources (continued) Document Description Location Help Information about how to use this product. The Documentation Library, which is available in the Symantec Management Console on the Help menu. Help is available at the Context-sensitive help is available for most screens in the Symantec solution level and at the Management Console. To open context-sensitive help, click inside the suite level. window, pane, dialog box, or other screen element about which you want more information. Then do one of the following: This information is available in HTML help ■ Press the F1 key. format. ■ In the Symantec Management Console, click Help > Context. In the Symantec Help Center window, type your search string to search within the installed documentation. To expand your search to the Symantec Knowledge Base, check Include online search. For more information on how to use the Symantec Help Center, click the Home symbol. In addition to the product documentation, you can use the following resources to learn about Symantec products. Table 1-4 Symantec product information resources Resource Description Location Best practices Support Knowledgebase Compilation of "how to" http://www.symantec.com/docs/HOWTO32608 and best practice articles for IT Management Suite. SymWISE Support Knowledgebase Articles, incidents, and issues about Symantec products. Symantec Connect An online resource that http://www.symantec.com/connect/endpoint-management contains forums, articles, blogs, downloads, events, videos, groups, and ideas for users of Symantec products. http://www.symantec.com/business/theme.jsp?themeid=support-knowledgebase Chapter Understanding the components of IT Management Suite This chapter includes the following topics: ■ About the Symantec Management Platform ■ Core architectural components of Symantec Management Platform ■ Components of the Symantec Management Platform ■ About Notification Server ■ About the Symantec Management Console ■ About the Configuration Management Database ■ About site services ■ About the Symantec Management Agent ■ Solutions of IT Management Suite ■ About Asset Management Suite ■ About Barcode Solution ■ About CMDB Solution ■ About Deployment Solution ■ About Inventory Solution ■ About IT Analytics Solution 2 34 Understanding the components of IT Management Suite About the Symantec Management Platform ■ About Symantec Mobile Management ■ About Monitor Solution ■ About Monitor Pack for Servers ■ About Out of Band Management Component ■ About Patch Management Solution for Windows ■ About Patch Management Solution for Linux ■ About Patch Management Solution for Mac ■ About pcAnywhere Solution ■ About Real-Time System Manager ■ About Endpoint Protection Integration Component ■ About Software Management Solution ■ About Symantec Workflow About the Symantec Management Platform The Symantec Management Platform provides a set of services that IT-related solutions can leverage. Solutions plug into the platform and take advantage of the platform services, such as security, reporting, communications, package deployment, and Configuration Management Database (CMDB) data. Because solutions share the same platform, they can share platform services as well as data. Shared data is more useful than data that is only available to a single solution. For example, one solution collects data about the software that is installed on company computers and another solution uses the data to manage software licenses. A third solution can also use this data to help you update software. This close integration of solutions and the platform makes it easier for you to use the different solutions because they work in a common environment and are administered through a common interface. The platform provides the following services: ■ Role-based security ■ Client communications and management ■ Execution of scheduled or event-triggered tasks and policies ■ Package deployment and installation ■ Reporting Understanding the components of IT Management Suite Core architectural components of Symantec Management Platform ■ Centralized management through a single, common interface ■ Configuration Management Database (CMDB) ■ Software Management Framework When you install a solution or suite, the platform is also installed if it is not already installed. See “Components of the Symantec Management Platform” on page 36. See “What's new in Symantec Management Platform 7.1 SP2” on page 25. Core architectural components of Symantec Management Platform Symantec Management Platform has four main architectural components. See “IT Management planning considerations” on page 53. They are as follows: ■ Notification Server and its Web-based Symantec Management Console See “About Notification Server” on page 37. ■ SQL Server See “About the Configuration Management Database” on page 39. ■ Site servers Site servers can include task servers, package servers, and deployment site servers. See “About site services” on page 39. ■ Managed computers See “About the Symantec Management Agent” on page 40. 35 36 Understanding the components of IT Management Suite Components of the Symantec Management Platform Figure 2-1 Core architectural components of Symantec Management Platform Components of the Symantec Management Platform The Symantec Management Platform includes the following core components: ■ Notification Server and Symantec Management Console The Symantec Management Platform service that processes events, facilitates communications with managed computers, and coordinates the work of the other Symantec Management Platform services. The console is the Notification Server computer's Web-based user interface that lets you manage the platform and its solutions. See “About Notification Server” on page 37. See “About configuring Notification Server” on page 201. See “About the Symantec Management Console” on page 38. ■ Configuration Management Database (CMDB) The database that stores all of the information about managed computers. See “About the Configuration Management Database” on page 39. See “Configuring the Configuration Management Database” on page 202. ■ Site servers Understanding the components of IT Management Suite About Notification Server The Symantec Management Platform can host several types of middleware components, such as package services, task services, and deployment site services. The official name for a middleware component is "site service." Any component that hosts a site service is known as a site server. Site servers can host one or more of these services. See “About site services” on page 39. ■ Symantec Management Agent The software that is installed on a computer to enable Notification Server to monitor and manage it. After the Symantec Management Agent is installed, that computer becomes a managed computer. See “About the Symantec Management Agent” on page 40. ■ Software Management Framework An interface that lets you create and manage the software resources that are in the Software Catalog. It also lets you manage the packages that are in the Software Library. The Software view provides a central location for initiating the software-related tasks that are performed in your organization. ■ Reports A way to gather automated information. You can view reports for any managed computer from the Symantec Management Console. See “About the Symantec Management Platform” on page 34. About Notification Server Notification Server is the primary server component within the Symantec Management Platform. Notification Server coordinates the various solutions and provides the primary user interface, policy-based administration, reporting, and notification. Notification Server hosts the Web-based management console that lets you manage the components of your Symantec Management Platform. See “Components of the Symantec Management Platform” on page 36. See “About configuring Notification Server” on page 201. Notification Server is responsible for managing the predefined policies and tasks that are available in each installed solution. These policies and tasks activate components of Notification Server that process several functions. Notification Server functions include the following: ■ Discovering resources on the network ■ Installing and configuring the management agent on the endpoints ■ Collecting client-reported information and storing it in the CMDB 37 38 Understanding the components of IT Management Suite About the Symantec Management Console ■ Generating detailed Web Reports ■ Sending policy information to the endpoints ■ Distributing software packages About the Symantec Management Console The Symantec Management Console (usually referred to as "the console") is a Web-based user interface that is the primary tool for interacting with Notification Server and its components, and for managing resources. The Symantec Management Console is divided into the following areas: Header The top portion of the console that includes the following: Menus, which let you access console pages and dialogs that provide the management functionality for Notification Server. Symantec solutions that are installed on the system may add new items to the menu. ■ Search box, which lets you search the resource data for the resources that you want. When you perform a search, a search panel appears under where you input the search. ■ ■ Content area A breadcrumb bar that shows the menu path to the currently displayed page. The portion of the console that is below the header can show one of the following: View A view is composed of a tree view and content pane. The tree view, in the left pane, shows a hierarchical arrangement of items that you can select and work with. The content pane, on the right, displays pages based on tree view selections. ■ Portal page A portal page displays a collection of different pieces of information that are contained in Web parts. Notification Server includes predefined portal pages, and other portal pages might be included with solutions. You can also create your own portal pages. ■ ■ Full page A full page has a single content pane without the treeview. Some console pages support personalization, which is the ability for a console page to preserve the state of its controls on a per-user basis. For example, one day user A may open a filter page and, to suit their personal preference, re-order the columns in the grid. Meanwhile, user B opens the same page but leaves the grid Understanding the components of IT Management Suite About the Configuration Management Database in its default configuration. The following day, when the users open that filter page, user A sees the page as they configured it on the previous day. User B still sees the default view as they left it on the previous day. Personalization is currently applied to the reporting pages and filter pages, and to the state of the navigation tree in the view pages. In addition, the My Portal page is personalized for each user. About the Configuration Management Database Database processing is one of the largest consumers of resources on the Symantec Management Platform. The number of solutions that are installed in your environment and how they are used influences the database requirements. The number of managed computers that report to each Notification Server computer also influences the database requirements. Each Notification Server computer can be configured to use a local Configuration Management Database (CMDB) or to use a remote CMDB. A Notification Server computer with a local database requires more resources than a Notification Server computer with a remote database configuration. See “Configuring the Configuration Management Database” on page 202. See “About planning your SQL Server configuration” on page 55. You can use the following configurations for the CMDB: ■ Local CMDB configuration In a local CMDB server configuration, you install the CMDB on the same computer as Notification Server. This configuration is acceptable for the environments that have 1,000 to 5,000 endpoints. In these environments there is minimal contention of resources between Notification Server services and the CMDB services. ■ Remote CMDB configuration In a remote CMDB configuration, you install the CMDB on a different computer from the Notification Server computer. This configuration is recommended for most environments. In this configuration the workload of the CMDB is offloaded from the Notification Server computer. The CMDB server and Notification Server computer must have a high-speed network connection between them. Symantec recommends 1GB Ethernet. About site services The Symantec Management Platform can host several types of middleware components, such as package servers, task servers, and boot servers. Middleware 39 40 Understanding the components of IT Management Suite About the Symantec Management Agent components can be installed on computers other than the Notification Server computer. These services act as the first point of contact for the Symantec Management Agents, thus reducing the load on Notification Server. The official name for a middleware component is “site service.” Any computer that hosts a site service is known as a site server. A site server can have one or more site services installed on it. For example, if you install the package server site service (the "package service") onto a computer, that computer becomes a site server. Site servers can assist Notification Server. Site servers can extend the architecture, improve distribution efficiency, and reduce network bandwidth requirements. Notification Server handles the deployment, configuration, and ongoing maintenance of site services. Package service, task service, and the boot service provide the Symantec Management Agents with packages, tasks, and PXE broadcasts. Notification Server performs the following functions for site management: ■ Handles the deployment and removal of site services to and from site servers ■ Ensures that the site service is installed only on the computers that satisfy the minimum system requirements You use site maintenance to create logical groups of endpoints to balance the load on site servers. For example, you can distribute packages efficiently to your Symantec Management Agents with multiple package servers. The package servers handle most of the package distribution functions, which frees up Notification Server to perform other activities. See “About site maintenance” on page 63. About the Symantec Management Agent The Symantec Management Agent is the software that establishes communication between the Notification Server computer and the computers in your network. Computers with the Symantec Management Agent installed on them are called managed computers. The Notification Server computer interacts with the Symantec Management Agent to monitor and manage each computer from the Symantec Management Console. The Notification Server computer and the Symantec Management Agent work together to provide the following types of functionality for managed computers: ■ Monitoring hardware and software ■ Scheduling software installations and file updates Understanding the components of IT Management Suite Solutions of IT Management Suite ■ Collecting basic inventory information ■ Managing policies and packages You can install the Symantec Management Agent on Windows, Linux, UNIX, and Mac computers. The Symantec Management Agent also lets you install and manage solution agent plug-ins that add additional functionality to the agent. For example, installing the Inventory plug-in lets you gather detailed hardware and software information from all of your managed computers. Solutions of IT Management Suite IT Management Suite includes many solutions and components. Table 2-1 IT Management Suite 7.1 solutions and components Suite/Platform Solution/Component Symantec Management Platform 7.1 Includes the components such as Network Discovery, Notification Server, Symantec Management Console, and Symantec Management Agent ■ Symantec Workflow 7.1 ■ IT Analytics 7.1 Asset Management Suite 7.1 ■ Asset Management Solution 7.1 ■ Barcode Solution 7.1 ■ CMDB Solution 7.1 Client Management Suite 7.1 ■ Deployment Solution 7.1 SP1 with a license for 6.9 SP5 ■ Inventory Solution 7.1 ■ IT Analytics Client and Server Pack 7.1 ■ IT Analytics SEP Pack 7.1 ■ Out-of-Band Management Component 7.1 ■ Patch Management Solution 7.1 ■ pcAnywhere Solution 12.6 ■ Real-Time System Manager 7.1 ■ Software Management Solution 7.1 ■ Symantec Endpoint Protection Integration Component 7.1 ■ Wise Connector 7.1 ■ Workspace Virtualization 7.1 ■ Wise Connector 7.1 41 42 Understanding the components of IT Management Suite About Asset Management Suite Table 2-1 Suite/Platform IT Management Suite 7.1 solutions and components (continued) Solution/Component Server Management Suite 7.1 ■ Deployment Solution 7.1 SP1 with a license for 6.9 SP5 Other ■ Inventory Solution 7.1 ■ Inventory Pack for Servers ■ IT Analytics Client and Server Pack 7.1 ■ IT Analytics SEP Pack 7.1 ■ Monitor Pack for Servers 7.1 ■ Monitor Solution 7.1 ■ Patch Management Solution 7.1 ■ Real-Time System Manager 7.1 ■ Software Management Solution 7.1 ■ Symantec Endpoint Protection Integration Component 7.1 ■ Virtual Machine Management 7.1 ■ Wise Connector 7.1 ■ IT Analytics ServiceDesk Pack 7.1 See “About IT Management Suite” on page 19. About Asset Management Suite Asset Management Suite provides a management console, a database environment, and a suite of solutions that let you track assets and asset-related information. The suite includes Asset Management Solution, Barcode Solution, and CMDB Solution. Asset Management Suite specializes in tracking IT-related assets, such as computers and software. You can also use it to track other types of assets, such as furniture and company cars. In association with assets, you can record and track many types of documents and documented details. For example, you can track lease schedules, NDAs (non-disclosure agreements), SLAs (Service Level Agreements), and warranty information. Contracts and contract details can be associated with assets so that you can easily view the contractual information that is related to specific assets. You can also configure the software so that it notifies you of the upcoming actions that are specified in a contract. You can use the Symantec Management Console to view the value of an asset or a group of assets. You can use it to view the department, cost center, and user that is assigned to an asset. You can use it to improve your ability to allocate software and hardware costs to specific users and departments. You can also use Understanding the components of IT Management Suite About Barcode Solution it to keep track of software license details so that you avoid paying for the licenses that you do not need. Additionally, Asset Management Suite aligns with IT Infrastructure Library (ITIL) standards. It also helps you comply with international IT standards such as COBIT and U.S. federal laws such as the Sarbanes-Oxley Act and HIPAA. About Barcode Solution Barcode Solution provides your organization with a simpler, more accurate way of gathering and verifying asset information in the field. This solution integrates information directly into Altiris Asset Management Solution and Altiris CMDB Solution so that data input errors, accounting irregularities, and redundancies are eliminated. Barcode Solution supports the following barcode formats: ■ Code 39 ■ Code 128 ■ Interleaved 2 of 5 ■ UPC barcode symbologies formats Barcode Solution also works with the Radio Frequency Identification (RFID) dot point tracking. Barcode Solution supports numerous handheld devices and dedicated barcode and RFID devices. The most up-to-date list of the supported devices you find in the Barcode Solution Release Notes. About CMDB Solution CMDB (Configuration Management Database) Solution is a component of Asset Management Suite. This solution lets you model configuration items for any component in your environment and the relationships between them in a centralized database. CMDB Solution lets you identify all components and relationships and to instigate any required changes. The solution actively manages configuration items according to user-specified instructions in jobs, tasks, configuration policies, and custom CMDB rules. 43 44 Understanding the components of IT Management Suite About Deployment Solution About Deployment Solution Deployment Solution lets you integrate standard deployment features with Symantec Management Platform. It helps reduce the cost of deploying and managing servers, desktops, and notebooks from a centralized location in your environment. The solution offers OS deployment, configuration, PC personality migration, and software deployment across hardware platforms and OS types. The following are the key features of Deployment Solution: ■ Lets you mass-deploy hardware-independent images to new systems and existing systems using Symantec Ghost and RapiDeploy imaging tools. ■ Lets you migrate to the latest Windows version; migrates user data, personality settings, and OS and application settings to the new operating system. ■ Lets you configure each system based on standardized criteria, such as job function, user type, or location. ■ Lets you change the system and the network settings. ■ Supports the deployment of heterogeneous client and server operating systems, including Windows and Linux. ■ Supports the deployment of heterogeneous client and server operating systems such as Windows and Linux on client and server computers. ■ Lets you easily create the jobs and tasks that automate deployment and migration functions such as imaging, scripted OS installations, configurations, and software deployments. ■ Supports industry-standard hardware-management capabilities such as Intel vPro, Pre-boot eXecution Environment (PXE), and Wake on LAN technologies. ■ Lets you use role- and scope-based security to secure management features from unauthorized personnel. ■ Supports the WinPE and the Linux preboot environments. ■ Integrates with many Symantec products built on Symantec Management Platform: for example, Altiris solutions and security, backup and recovery, virtualization, data loss prevention, vulnerability assessment, and and other products. The following are the key benefits of Deployment Solution: ■ Reduces the costs that are associated with deploying, migrating, and provisioning desktops, laptops, and servers throughout the organization. ■ Saves time and reduces human error over traditional PC deployments. ■ Reduces end-user downtime by automating the deployment process. Understanding the components of IT Management Suite About Inventory Solution ■ Increases IT efficiency through automated, repeatable deployment tasks. ■ Provides tools for zero-touch migrations to reduce the costs that are associated with moving to a new operating system. About Inventory Solution Obtaining and analyzing accurate inventory data is an important part of managing and securing your network. Inventory Solution lets you gather inventory data about computers, users, operating systems, and installed software applications in your environment. The application metering feature also lets you monitor and deny the usage of software applications on your network. You can collect inventory data from the computers that are running the following platforms: Windows, UNIX, Linux, and Mac. You use policies and tasks to perform inventory and application metering functions. The policies and tasks are easily configured and managed using a central Web console. Predefined inventory policies let you gather inventory with little effort. See “About predefined inventory policies” on page 121. The inventory data is stored in the Configuration Management Database (CMDB). The CMDB provides a central store of data that is used across the Symantec Management Platform. See “About the Configuration Management Database” on page 39. You can use different methods for gathering the following types of inventory data: Basic inventory data: Computer name, domain, installed operating system, etc. Standard inventory data: Hardware and software components, file properties, etc. Custom inventory data: Additional data beyond the predefined data classes in Inventory Solution. Application metering inventory data: Start, stop, deny events and summary data of monitored software applications. Baseline inventory data: Information about files and registry settings on computers. To help maximize your investment, Inventory Solution does more than gather data. Inventory Solution provides a Web-based management console, policies to alert you about critical information, and professional quality predefined or custom Web reports that let you analyze gathered inventory data. Thus Inventory Solution 45 46 Understanding the components of IT Management Suite About IT Analytics Solution includes the tools that you need to transform your inventory data into useful information. Inventory Solution also has the following features: ■ Supports zero-footprint configuration. ■ Operates in always connected, sometimes connected, and stand-alone computing environments. ■ Can be installed to run on a recurring basis with the Symantec Management Agent. ■ Posts data through SMB and/or HTTP. ■ Lets you meter, track, or deny the usage of one or more software applications and harvest unused software licenses. You can use Inventory Pack for Servers, which is a separate product that lets you gather server-based inventory data from servers. You can also use additional Symantec products to gather inventory data from handheld computers, network devices, and Windows, UNIX, Linux, and Mac servers. About IT Analytics Solution IT Analytics Solution software complements and expands upon the reporting that is offered in many Symantec solutions. It brings multi-dimensional analysis and robust graphical reporting features to Symantec Management Platform. This functionality lets you explore data on your own, without advanced knowledge of databases or third-party reporting tools. It also lets you ask and answer you own questions quickly and easily. See “What's new in IT Analytics 7.1 SP2” on page 90. About Symantec Mobile Management Symantec Mobile Management lets you manage, secure, and troubleshoot the mobile devices in your organization. Using Mobile Management, you can automate repetitive tasks to reduce the resources that you spend to control your IT environment. You can also see what mobile devices you have, where each device is located, and what state each device is in. The flexible reporting tools in Mobile Management let you identify any problems in your IT framework. You can then take immediate action to fix those problems from within the reports. Understanding the components of IT Management Suite About Monitor Solution About Monitor Solution Monitor Solution lets you monitor various aspects of computer operating systems, applications, and devices. These aspects can include events, processes, and performance. This ability helps you ensure that your servers and your devices work and reduces the costs of server and network monitoring. Monitor Solution lets you do the following tasks: ■ Identify the health of your environment by collecting detailed data from servers, applications, and network devices. ■ Analyze trends and isolate recurring issues by collecting comprehensive real-time and historical performance data. ■ Pinpoint problems, define their cause, and take automated actions to resolve them. Monitor Solution supports both agent-based and agentless monitoring methods. It runs on the Symantec Management Platform and is a key component of Server Management Suite. About Monitor Pack for Servers Monitor Pack for Servers works with the Monitor Solution core components of the Symantec Management Platform. It lets you monitor operating system performance, services, and events of your Windows, Linux, or UNIX server environment. This pack includes several reports to help you evaluate and tune the performance of your server components. About Out of Band Management Component Altiris Out of Band Management Component software (formerly known as Altiris Out of Band Management Solution) lets you discover computers with ASF, DASH, and Intel AMT in your environment and configure the computers for out-of-band management. Out-of-band management is the ability to manage client computers regardless of the state of their power, operating system, or management agents. You can remotely change the power state of the computer, collect hardware inventory, and perform other management tasks that would normally require a visit to a client computer. 47 48 Understanding the components of IT Management Suite About Patch Management Solution for Windows Figure 2-2 Out of Band Management Component features About Patch Management Solution for Windows Patch Management Solution for Windows lets you inventory managed computers to determine the software updates (patches) that they require. The solution then lets you download the required software updates from the software vendor and provides you with the tools to install the software updates. Software updates include but are not limited to security updates, hot fixes, and service packs. Software from vendors such as Microsoft, Adobe, Mozilla, Google, Sun Microsystems, and many others can be patched. Key features include a software repository that provides comprehensive data on software bulletins, software updates, and inventory rules, such as technical details, severity ratings, and number of executables. The process of populating the information repository from the patch management metadata files can be started after you complete the installation of the solution. Integration with Notification Server 7.x includes features such as hierarchy and maintenance windows. Hierarchy lets you configure features and settings for a parent Notification Server computer, then pass the settings down to child Notification Server computers. Understanding the components of IT Management Suite About Patch Management Solution for Linux About Patch Management Solution for Linux Patch Management Solution for Linux ensures that your Red Hat Linux and SUSE Linux computers have the most up-to-date patches applied and protected against security threats. The solution lets you inventory the managed Linux computers for security vulnerabilities and then reports on the findings. It provides you with the tools that let you download and distribute the needed software updates. Patch Management Solution for Linux lets you set up an automatic update schedule to ensure that managed computers are up-to-date and protected on an on-going basis. About Patch Management Solution for Mac Patch Management Solution for Mac lets you scan Mac computers for the updates that they require. The solution then reports on the findings and lets you automate the downloading and distribution of needed software updates. You can distribute all or some of the updates. Patch Management Solution for Mac can update only the software that the Mac OS X software update utility supports. The solution integrates with the software update utility, and lets you collect needed update information from the target Mac computers and initiate a software update. Mac computers download software updates from the Apple Web site or from a Software Update Server (SUS) and report installation status information to Notification Server. Patch Management Solution for Mac provides the preconfigured rollout jobs that let you automate installing a large number of updates. For example, the preconfigured rollout jobs can install all updates, all recommended updates, and so on. About pcAnywhere Solution Symantec pcAnywhere Solution provides secure, remote access to computers and servers. This remote access lets you quickly resolve help desk and server support issues or stay productive while you work away from your office. You can use your desktop computer or laptop to work across multiple platforms, including the Windows OS, Linux OS, and Macintosh OS. Connectivity features help facilitate connections through firewalls, routers, and other types of network address translation (NAT) devices. Robust security features help protect your computers and servers from unauthorized access. You can use pcAnywhere Solution in the following ways: 49 50 Understanding the components of IT Management Suite About Real-Time System Manager Table 2-2 What you can do with pcAnywhere Features Description Manage computers remotely pcAnywhere Solution lets help desk providers and administrators troubleshoot and quickly resolve computer problems. You can remotely perform diagnostics, check and modify settings, and deploy and install software. Support and maintain servers pcAnywhere Solution lets administrators connect to servers across their organizations to perform routine maintenance. It also helps administrators deploy and install software patches and upgrades, assess performance, and troubleshoot network problems. Transfer files between computers pcAnywhere Solution lets you connect to your home computer or office computer to quickly get the files that you need. You can perform automatic file transfers from one computer to another or exchange multimedia and other files that are too large to send by email. Work from a remote location pcAnywhere Solution lets you remotely connect to another computer. You can then work as though you are sitting in front of that computer. You can view and edit files, run software, print files to a printer at your location or at the host’s location, or give demonstrations. About Real-Time System Manager The Altiris Real-Time System Manager software lets you manage a single computer from the Symantec Management Console in real time. Real-Time System Manager can connect to the target computer using the following protocols: ■ WMI - Microsoft Windows Management Instrumentation ■ ASF - Alert Standards Format 2.0 ■ Intel® AMT - Intel® Active Management Technology Understanding the components of IT Management Suite About Endpoint Protection Integration Component ■ DASH - Desktop and mobile Architecture for System Hardware ■ SNMP - Simple Network Management Protocol ■ IPMI - Intelligent Platform Management Interface With Real-Time System Manager, you can view detailed real-time information about the managed computer and remotely perform various administrative tasks. For example, you can restart the computer, reset a password, run a port scan, terminate a process, and more. Real-Time System Manager also lets you run some of the management tasks on a collection of computers, immediately or on a schedule. About Endpoint Protection Integration Component The Symantec Endpoint Protection Integration Component combines Symantec Endpoint Protection with your other Symantec Management Platform solutions. You can inventory computers, update patches, deliver software, and deploy new computers. You can also back up and restore your systems and data, manage DLP agents, manage Symantec Endpoint Protection clients. You can do this work from a single, Web-based Symantec Management Console. You can perform common Symantec Endpoint Protection client management operations from the Symantec Management Console. About Software Management Solution Software Management Solution provides intelligent and bandwidth-sensitive distribution and management of software from a central Web console. It significantly reduces desktop visits and lets you easily support your mobile work force. Software Management Solution also lets users directly download and install approved software or request other software. Software Management Solution integrates with the Software Catalog and the Software Library that are part of the Symantec Management Platform. By leveraging this information, Software Management Solution ensures that the correct software gets installed, remains installed, and runs without interference from other software. This integration lets your administrators focus on delivering the correct software instead of redefining the packages, command lines, and so on for each delivery. Software Management Solution combines the functionality of earlier versions of Software Delivery Solution and Application Management Solution. It also supports 51 52 Understanding the components of IT Management Suite About Symantec Workflow the software virtualization technology that was available in Altiris Software Virtualization Solution. Software Management Solution supports packages for the Windows, UNIX, Linux, and Mac operating systems. With few exceptions, all the functions in Software Management Solution work the same for all platforms. For example, you use the same method to create a delivery task for a Windows, UNIX, Linux, or Mac OS package. For a complete list of the platforms that Software Management Solution supports, see the Software Management Solution Release Notes. About Symantec Workflow Symantec Workflow is a graphical .NET application process development framework. This tool provides advanced logic and workflow to Symantec Enterprise products. You can use it to edit and implement pre-built workflows. You can also build your own workflows. Symantec Workflow is a security process development framework that you can utilize to create both automated business processes and security processes. These processes provide for increased repeatability, control, and accountability while reducing overall workload. The Symantec Workflow framework also lets you create Workflow processes that integrate Symantec tools into your organization's unique business processes. After Workflow is deployed, Workflow processes can respond automatically to environmental variables. Workflow processes can also allow for human interface points when a process calls for someone to make a decision with accountability. The applications that you design can create human interaction through a variety of user interfaces. You can create human interaction through email, Web forms, handheld devices, or a task list. In addition to basic workflow capability, Symantec Workflow includes Process Manager. Process Manager is a Web portal for managing the various parts of a workflow process, such as tasks, documents, data, and so on. Process Manager can be integrated with Active Directory for user authentication, proper access control, and user management. You can also customize Process Manager. For example, you can change pages, symbols, Web parts, and so on to create an interface that works for you. You can also add new pages to Process Manager that embed Process Manager content or content from the Web or other servers. You can also run the Symantec ServiceDesk Solution product on Symantec Workflow. Chapter 3 Planning for IT Management Suite This chapter includes the following topics: ■ IT Management planning considerations ■ About planning your SQL Server configuration ■ About planning your site servers ■ Symantec Management Agent deployment planning ■ How agent-based inventory communications work ■ How agent check-in intervals and basic inventory settings interact ■ How Patch Management Solution data communications work ■ Components of Deployment Solution ■ How asset management data communications work IT Management planning considerations Many factors and considerations may influence an implementation plan. To design your Symantec Management Platform infrastructure, you must assess your specific organizational features and requirements. See “Core architectural components of Symantec Management Platform” on page 35. Your requirements can include several variables. Some of these variables may include the following: ■ The geographic implications of the environment. 54 Planning for IT Management Suite IT Management planning considerations A centralized management design uses multiple Notification Server computers to support a variety of IT distribution models. For example, you can have central corporate office with thousands of managed computers as well as both large branches and small branches. The centralized design can be effective for managing global policies and tasks. If your IT organization is primarily centralized, then the Symantec Management Platform can be designed to support it. In such an environment, the platform may use a parent Notification Server computer that is connected to additional child Notification Server computers in a hierarchy. A decentralized management design consists of multiple dispersed sites and network segments that support subordinate sites and network segments. The decentralized design does not use hierarchy but instead it uses multiple Notification Server computers that operate independently. ■ The future growth of the organization. The infrastructure design may require room for growth. If possible the architecture should reflect both the current organization and the vision for the organization in the coming years. ■ The IT management team's distribution and its policies. The operations that IT manages centrally and locally influence design. Some IT tasks may need to be done from a central location or some tasks may need to be done from local sites. The security policies of the organization influence the design. Your organizational structure may determine the component placement and design of the infrastructure. How the organization’s staff works on a daily basis and how the business process is established influences the plan. Different branches of the organization, security requirements, or geographical requirements may all require separate Notification Server management domains. Different groups and roles managing endpoints may require Notification Server role and scope-based security. Role and scope-based security adds load on the Notification Server computer. ■ The connectivity ranges of the environment. The connectivity ranges of the environment may determine the placement of components. For example, there may be a first-tier site that is well connected, but the second tier sites are poorly connected. Traveling users may dial in or use a VPN from a remote location. ■ The installed solutions and how actively they are used. The number of installed and actively used solutions influences the number of managed computers that a Notification Server can support. For example, a server with only Inventory Solution installed can serve more managed endpoints than a server with all of IT Management Suite. Planning for IT Management Suite About planning your SQL Server configuration ■ The concurrent console usage and reporting needs. Concurrent use of the console can add additional processor utilization for heavy use of the Symantec Management Console. You can use the console to create custom reports to view information about the environment. Many custom reports are written with advanced Structured Query Language (SQL) statements that require significant database processing power. Having many users run these reports concurrently on the Notification Server computer can degrade its performance. If the organization requires heavy custom reporting, consider implementing a separate Reporting Notification Server. While it does mean that the organization needs to invest in an additional server, it provides for the separation of duties in the infrastructure. The Notification Server computer responsible for managing endpoints is able to dedicate its processing to that function. The Notification Server computer responsible for providing reports dedicates its process to that other function. With this configuration, you can use stand-alone replication to forward resource inventory information from the agent-facing Notification Server computer to the reporting Notification Server computer. Another consideration is the memory cost of each of the concurrent console sessions from IIS on the Notification Server computer . You can calculate this memory requirement at approximately 20MB per console connection. About planning your SQL Server configuration The following information provides guidelines for SQL server configuration for a Symantec CMDB computer. You can follow these guidelines to tune the performance of the SQL Server computer that hosts the Configuration Management Database (CMDB). These guidelines are not exclusive, and additional configuration options may be appropriate depending on the specifics of your environment. For detailed information about SQL Server configuration, refer to Microsoft’s documentation. Many additional articles about SQL server setup, configuration, and maintenance are available on the SymWISE Support Knowledgebase. The SymWISE Support Knowledgebase is available at www.symantec.com/business/theme.jsp?themeid=support-knowledgebase. For additional resources, see the article Links to Notification Server/SQL Server Maintenance and Tuning Articles on the SymWISE Support Knowledgebase. 55 56 Planning for IT Management Suite About planning your SQL Server configuration Table 3-1 Considerations for planning your SQL Server configuration Consideration Description Hardware You can use recommended hardware guidelines to help tune the performance of your SQL Server computer. See Table 5-6 on page 129. Hard drive configuration The way that you configure the hard drives of your SQL Server computer influences your overall performance. You can use disk configuration recommendations to maximize throughput and tune the performance of your SQL Server computer. See “About hard drive configuration for off-box SQL Server” on page 56. See “About hard drive configuration for on-box SQL Server” on page 57. Database sizing You can use database sizing guidelines to help tune the performance of your SQL Server computer. See “About database sizing for SQL Server” on page 60. Memory management You can use memory management guidelines to help tune the performance of your SQL Server computer. See “About memory management for SQL Server considerations” on page 61. About hard drive configuration for off-box SQL Server The throughput of the SQL Server is a primary consideration for Symantec Management Platform performance. The way that you configure your hard drives on SQL Server influences throughput. The hard drive speed also has an influence on throughput. It is recommended to use high performance hard disks: for example, 10k rpm to 15k rpm SAS drives in a striped array. See “About planning your SQL Server configuration” on page 55. See “About the Configuration Management Database” on page 39. For the best performance, make sure that the operating system, SQL data file, TempDB database, and the log file each has a dedicated volume. To improve performance further, you can split the data file and the TempDB database across multiple volumes. The number of volumes that you use should match the number of processor cores in your SQL Server. A recommendation for high performance is to use parallelism with the same number of disk volumes as the number of Planning for IT Management Suite About planning your SQL Server configuration processor cores. You can split the SQL data file and the transaction log file to match the number of processor cores. The data file requires both high read-write performance and redundancy. RAID 10 and RAID 0+1 are good configurations for the data file. RAID 0+1 has similar throughput as RAID 10, but its configuration helps simplify additional storage growth. RAID level 5 is not ideal for the CMDB performance because it requires additional Read/Write activities for parity. The TempDB database needs high read-write performance, but redundancy is not necessary. The TempDB database acts as a temporary working area for many processes. The TempDB database requires very high speed; however, it is not used for storage and it is cleared regularly. The transaction log also requires high disk throughput for optimal system performance. It should be hosted on RAID 10. Table 3-2 Example of an off-box SQL server disk configuration Component Configuration Operating system RAID 1 Mirror Data file RAID 10 or RAID 0+1 TempDB database RAID 0 (Striping) Transaction log RAID 10 or RAID 0+1 About hard drive configuration for on-box SQL Server Caution: We recommend supporting no more than 5,000 managed computers with an on-box SQL configuration. Even with fewer than 5,000 managed computers, performance is unlikely to be as robust as with an off-box SQL configuration. See “Recommended configuration for Notification Server with locally installed SQL database” on page 132. A combined Notification Server and SQL database installation can be installed on spindle drives, solid-state drives, or a combination of the two. We recommend that you use mirrored spindle drives for the operating system and Notification Server, and SSD for the SQL database. This approach provides the best combination of performance, cost effectiveness, and ease of implementation. If you use SAN storage for SQL, verify that your SAN IOPS meet the needs of the SQL database. See “Throughput metrics of SQL Server” on page 59. 57 58 Planning for IT Management Suite About planning your SQL Server configuration If you choose to install the SQL database on SSD disks, the following recommendations apply: ■ Place the operating system and Notification Server on a mirrored spindle drive. ■ All SQL files (the SQL data file, TempDB, and the log file) should be placed on a medium-grade SSD. ■ To improve performance, you can split the data file and TempDB across multiple hard drives. In addition, verify that the bus supports the maximum disk speed. Table 3-3 Example of an on-box SQL server disk configuration using SSD Component Configuration Operating system and Notification Server RAID 1 mirror on spindle disk Data file, TempDB database, and transaction SSD log If you choose to install the SQL database on spindle disks, the following recommendations apply: ■ The OS and Notification server should be combined on one volume. ■ The data file(s) should be on its own volume. ■ TempDB should be on its own volume. ■ The logs should be on their own volume. Note: For more information on Microsoft SQL best practices, consult the Microsoft Web site. Table 3-4 Example of an on-box SQL server disk configuration using spindle disks Component Configuration Operating system and Notification Server RAID 1 (mirrored) Data file/s RAID 10 TempDB database RAID 0 (striped) Transaction log RAID 10 Planning for IT Management Suite About planning your SQL Server configuration Note: Often, using dedicated external storage that is connected to the server is the best way to incorporate enough disks to facilitate requested IOPS. Throughput metrics of SQL Server The Symantec Configuration Management Database (CMDB) has high throughput requirements. Input/Outputs per second (IOPS) are used to measure the throughput. You can use the following IOPS metrics to select the right disk performance for your SQL Server. It represents SQL performance statistics during a one hour time period during peak hour processing. The database that is represented here serves 20,000 endpoints and 20 concurrent console sessions and 45 maximum persistent connections over 2311 concurrent transactions. See “About planning your SQL Server configuration” on page 55. Table 3-5 SQL data file I/O per second Metric Value Number of I/O per second. 238.7 Percent of write I/O per second. 98% Percent of read I/O per second. 2% Table 3-6 TempDB database I/O per second Metric Value Number of I/O per second. 1.3 Percent of write I/O per second. 49% Percent of read I/O per second. 51% Table 3-7 Log files I/O per second Metric Value Number of I/O per second. 593.8 Percent of write I/O per second. 100% Percent of read I/O per second 0% 59 60 Planning for IT Management Suite About planning your SQL Server configuration About database sizing for SQL Server You can use database sizing guidelines to help tune the performance of your SQL Server computer. A Symantec Management Platform installation with no solutions and no managed computers creates a database size of about 300 MB. This size is about 7 percent of the maximum database size of SQL Express. An additional 500 managed computers can increase the size to approximately 500 MB. Databases also grow as solutions are introduced and used. See “About the Configuration Management Database” on page 39. See “About planning your SQL Server configuration” on page 55. Allow between 750KB and 1 MB of space in the database for every managed computer. This sizing does not account for database fragmentation beyond initial creation. Actual sizes vary based on the solutions that are installed and the specific configuration of policies, tasks, and schedules. The database maintenance strategy that you use also influences your database size. When suites are installed in a large environment, you can expect the database to grow up to 6 GB to 12 GB. When choosing a database growth strategy, be sure to account for data growth. Autogrow is a SQL Server setting you can use to help with unexpected data growth. However, do not rely on autogrow to manage your database file sizes. You should monitor the files and re-size them according to your projected needs during maintenance. To choose your autogrow setting, estimate the expected maximum sizes of the data file and the transaction log file. To estimate this size you can monitor the growth of these files in a pre-production environment. Set the autogrow increment for your data file and transaction log files to 10 to 20 percent higher than your initial estimate. Do not use the autoshrink feature with the Symantec Management Platform. Auto shrink runs periodically in the background. It consumes CPU and I/O cycles which can cause unexpected performance degradation. Autoshrink can continually shrink and re-grow the data files. This process causes fragmentation of the database file. This fragmentation may degrade both sequential transfers and random accesses. After you have estimated the approximate size of the database, you should create a database file of this size before you install Notification Server. This step ensures that adequate space is available. It also reduces negative performance from a database that continually grows. To further improve performance, you should defragment and re-index the database after its initial installation. The CMDB SQL Server should not host additional third-party database applications because Symantec Management Platform has very high performance demands. Planning for IT Management Suite About planning your SQL Server configuration However, additional CMDB databases can be hosted on the same SQL Server because each database has similar traffic requirements and hardware configuration needs. You can have a single SQL instance that shares a single TempDB database, or multiple database instances can each have a dedicated TempDB database. Multiple database instances minimize risk for potential contention but require more disk arrays. You may require the individual databases of each Notification Server computer to exist on a separate instance. They may need to be separate instances to avoid TempDB database contention. About memory management for SQL Server considerations Memory management is an important part of tuning SQL Server performance. Memory management is especially important when SQL is run locally on the Notification Server computer. See “About the Configuration Management Database” on page 39. See “About planning your SQL Server configuration” on page 55. Consider the following memory configuration options for SQL Server: ■ 3GB This 32-bit Windows boot option limits the operating system to 1GB of RAM, reserving 3GB for applications. ■ Maximum server memory This SQL setting limits the memory that SQL can consume. ■ PAE This 32-bit Windows boot option allows SQL Server to use more than 4GB of RAM. ■ AWE This SQL option allows SQL Server to use more than 2GB of RAM. If the server has more than 2GB of physical memory, enable AWE memory in SQL Server. This memory mode is recommended. When AWE is enabled, SQL Server always attempts to use AWE-mapped memory. It uses wrapped memory for all memory configurations, including computers that provide applications with less than 3 GB of user mode address space. If AWE memory is enabled in SQL, make sure that the SQL Server account has the correct Lock Pages in Memory setting. Both AWE and the Lock Pages in Memory setting can benefit 64-bit SQL Servers as well as 32-bit SQL Servers. ■ Windows memory usage 61 62 Planning for IT Management Suite About planning your site servers Set Windows memory usage to favor Programs over System Cache. SQL Server does its own data caching to improve performance. ■ 32-bit OS If you use a 32-bit OS, make sure that PAE is enabled at the hardware level. Enabling PAE lets SQL Server use AWE to map physical memory addresses higher than 4 GB. ■ 64-bit SQL This option eliminates the memory limitations that are associated with 32-bit systems. By using a 64-bit operating system (Windows 2003 or 2008) and 64-bit SQL, you do not need to use PAE or AWE. SQL Server 2008 x64 is recommended for dedicated SQL Servers with more than 4 GB of physical memory. About planning your site servers A site is a management construct that allows mappings of subnets to site services. Site services are an extension of the Symantec Management Agent. When a site service is installed on a managed node, it promotes the Symantec Management Agent to a site server. Task, package, and deployment site services are all site server roles. These site services can be deployed in multiple combinations to meet endpoint demands. A remote site may only need a package server. A task server may be needed only at the datacenter. However, a deployment site server requires that the task service and package services be installed on the same computer. Your topology and your use of solutions determines if you should combine site services onto a single computer or use dedicated computers. Site servers may use either a Windows workstation operating system or a Windows server operating system. Distributed and large environments may require numerous site servers to meet configuration management demands. Notification Server makes sure that the site service is installed only on the computers that satisfy the minimum requirements. Your primary consideration is the number of concurrent sessions that you need when you choose between a server operating system and a workstation operating system. A Windows workstation is limited to 10 concurrent TCP connections and a server OS does not have the same limitations. A site with fewer than 100 endpoints may only require 10 sessions; however; a Windows server may be required for larger remote sites. If you install a site service on a Windows 7/2008 computer, you must install the IIS 6 compatibility mode services on it. See “About the package service” on page 67. See “About the task service” on page 64. Planning for IT Management Suite About planning your site servers See “About the deployment site service” on page 68. About site maintenance Site maintenance is the management of sites, subnets, and site services in your organization. You can manage your computers according to site and subnet, which lets you control groups of computers while you minimize bandwidth consumption. A site is typically a physical location in your organization (such as a particular building, or a level of a building). A subnet is a range of logical addresses on your network. Under normal operating conditions, each package server or task server services only the Symantec Management Agents that exist within the assigned sites. If no sites have been defined, all site servers are available to service all Symantec Management Agents (although this method is not recommended). If no sites are defined for a package server or a task server, Notification Server uses the following rules: ■ Notification Server first tries to find any site servers on the same subnet as the requesting computer. If any are found, these site servers are returned to the Symantec Management Agent. ■ If no site servers are in the same subnet as the requesting computer, all site servers are returned to the Symantec Management Agent. ■ If no site servers are available, the agent is directed to the Notification Server computer. You can assign site servers to sites by using the following methods: ■ Assign the subnet that contains the site server to a site. See “Managing subnets” on page 307. ■ Assign the site server to a site. See “Assigning a site server to a site manually” on page 286. ■ Use Connector for Active Directory to perform the task. Connector for Active Directory overrides any subnets and sites that conflict with it. For example, if you manually assign subnets to a site that conflicts with what is in Connector for Active Directory, the Active Directory information is used. After the list of available site servers is returned to the Symantec Management Agent, the agent chooses the most suitable site server. Site servers and managed computers may have multiple NICs and IP addresses; therefore, they may belong to more than one site through subnet assignment. See “About site services” on page 39. 63 64 Planning for IT Management Suite About planning your site servers See “Managing sites” on page 279. See “Managing site servers” on page 283. See “Managing subnets” on page 307. About the task service Task communications are unique from policy communications. Managed computers start policy communications, and the server starts task communications. You can do the following with the task service: ■ Execute multiple tasks in a defined sequence that is called a Job. ■ Provide logic to handle task errors or other return codes. ■ Deliver command-line and VBscript capabilities to managed computers. ■ Provide out-of-the-box power management. ■ Execute client-side and server-side tasks. ■ Reuse tasks in multiple Jobs. Tasks can be cloned and modified as required. Symantec recommends at least one task server per Notification Server. Tasks place a high performance demand on the Notification Server computer’s processor and memory because it must regularly send tickle packets and receive execution status. This demand can negatively influence SQL data loading and user interface responsiveness. You can offload the handling of tasks to a task server. A dedicated task server handles agent tickle communications, task sequencing, and automation capabilities. Distributing the handling of tasks to a task server reduces the load on Notification Server. It reduces the load by minimizing the interruption to Notification Server. See “About planning your site servers” on page 62. Task servers use a high number of operating system sessions. If a task server supports more than 100 managed computers, a Windows Server operating system is recommended. Use the Windows Server operating because it supports many more concurrent operating system sessions. If a task server supports less than 100 managed computers, a workstation operating system might be adequate. Task servers do not require high-performance hardware. A moderate speed processor is adequate. Disk IO is not a significant factor in task server performance. However; task communications can consume multiple concurrent connections to task server. A Windows workstation is limited to only 10 concurrent TCP connections and a Windows Server OS does not have the same limitations. Therefore, you may require a Windows Server operating system on your task Planning for IT Management Suite About planning your site servers server. Symantec recommends a Windows Server operating system for the task servers that support more than 100 managed computers. Task servers are good at offloading performance demands from Notification Server. They are not designed to address network bandwidth limitations. You can put a task server in the same subnet as Notification Server because it has little influence on minimizing network traffic. Use the following guidelines to configure task services within your infrastructure: ■ Symantec recommends at least one task server per Notification Server. After the initial dedicated task server, add additional task servers for every 5,000 to 7,500 endpoints. ■ You can load-balance multiple task servers within large sites to make sure that agents have the latest task execution. ■ You can reduce the load on task servers if you increase the Task Update Interval and the Maximum Time Between Tickle Events settings. By default these are set to every 5 minutes. Consider changing these settings to a value greater than 10 minutes. ■ You must use site management to force computers to use the task server if Notification Server and the task server are in the same site. How task server uses the tickle mechanism The tickle server is a component of Task Management. The tickle server component runs only on the Notification Server computer and is responsible for notifying task servers of pending tasks for their client computers. Task servers also have the native ability to tickle their registered client computers. This tickle ability is separate from the tickle server component on the Notification Server computer. The tickle server sends IP tickle packets to task servers when any of their registered client computers have a job or task to run. After the tickle packet is received, the task server immediately requests the task or the job information from Notification Server for its registered client computers. It also tickles its client computers. When the Client Task Agent receives the tickle packet, it requests the job or the task information from its registered task server. Only after the Client Task Agent receives the task information is the task executed. Status events for completed tasks are sent back to the registered task server upon completion. If the tickle packets are blocked or otherwise cannot reach the destination, the Client Task Agent automatically checks back to its registered task server for any new job information. It performs this check every 5 minutes. This Task Request Interval is configurable in the Symantec Management Console. Task Server task and job information is not received through the Symantec Management Agent configuration policy. It is received directly by the Client Task Agent from its 65 66 Planning for IT Management Suite About planning your site servers registered task server. If you force the Symantec Management Agent to update its configuration policy, it does not force the Client Task Agent to receive pending task information. By default, the Tickle Server uses port 50123 for task servers and task servers use port 50124 to tickle Client Task Agents. The following example assumes the Client Task Agent for ComputerA is registered with RemoteTaskServer1. Table 3-8 Sequence for how the task server tickle works Sequence Description One A Notification Server administrator assigns a task to run immediately on ComputerA. Two The Tickle Server on the Notification Server computer sends a tickle packet to notify RemoteTaskServer1 of the pending task. Three RemoteTaskServer1 receives the tickle packet and immediately requests the job information from Notification Server. Four RemoteTaskServer1 tickles ComputerA to notify it of the pending task. Five ComputerA receives the tickle packet and immediately requests the job information from its registered task server – RemoteTaskServer1. Six ComputerA receives the job information and executes the task. Seven Upon completion of the task, ComputerA sends a status event back to RemoteTaskServer1. Eight RemoteTaskServer1 caches the status event and immediately attempts to forward it back to Notification Server. Nine Notification Server receives the status event from RemoteTaskServer1 and records the information in the database. Planning for IT Management Suite About planning your site servers Figure 3-1 Sequence for how task server tickle works About the package service Package servers are deployment mechanisms to efficiently move data into a site. They work with Notification Server as local file servers for managed computers at a site. Package servers do not require server-class hardware and software. Package servers help you reduce network traffic by allowing a package to copy across the network only once per site. You can place a package server locally at a site to store and deliver packages. This architecture can help you manage sites with low-bandwidth connections to Notification Server. See “About planning your site servers” on page 62. When you enable a package on Notification Server, it is copied to all of the package servers that Notification Server knows about. Once the copy is successful, managed computers download the packages from the local package server instead of the remote Notification Server. The number of package servers that you require is dependent on your network topology and bandwidth. It also depends on the size of your packages and frequency of the packages to be delivered. You can stagger the deployment of packages to the package servers to reduce load. You can deploy a limited number of packages at a time to all package servers. You can also only deploy to select group of package servers at a time. 67 68 Planning for IT Management Suite About planning your site servers A constrained package server can operate only within the sites to which it is assigned. An unconstrained package server can get packages and other resources from anywhere in the system. The unconstrained package server collects any required resources from outside the site and makes them available to all of the constrained package servers. A site server can function as a package server only when there is at least one unconstrained package server that is assigned to it. There must be at least one unconstrained package server in a site with one or more constrained package servers. About the deployment site service A deployment site server's purpose is to provide PXE Boot services and boot packages for network segments. The most common purpose is for restoring a standard image for support or for rolling out new computers during initial provisioning. Typically, PXE protocol is controlled on a network. It may be limited to work within a subnet or other defined range based on IP helpers. If many systems must be reimaged simultaneously, you can place deployment site servers within each network subnet and add more in a large subnet. In addition to providing PXE services, a deployment site server is similar to a package server in that it hosts packages called boot images. See “About planning your site servers” on page 62. You must enable deployment, package, and task site services on the deployment site server. Each subnet must have access to a deployment site server. However, routers normally block PXE broadcast packets. You can use the following three methods to provide each subnet with access: ■ Use “DHCP forced mode,” which is a DHCP setting that forwards client PXE requests to the closest deployment site server. This method works even when the client computer is on a different subnet than the deployment site server. DHCP determines the correct server by using subnet mask and ping tests. ■ Use “IP Helpers,” which is a setting you can configure at each router that lets you forward PXE requests across subnets. ■ Install a deployment site server on each subnet. This method is not recommended because it creates unnecessary overhead. A deployment site server contains the following objects: ■ PXE service ■ Boot images ■ The deployment share with the imaging executables ■ The driver database Planning for IT Management Suite About planning your site servers When new settings are applied to an existing boot image, an updated boot image is compiled locally at each deployment site server. These changes are delivered with a policy and are dependent on the Symantec Management Agent update schedule. A deployment site server requires that you also install task services and package services locally. Table 3-9 Sequence for deployment site server configuration Sequence Description One Deployment Solution is installed on the Notification Server computer. The administrator configures and manages deployment jobs and tasks from the Symantec Management Console. Two The administrator enables and configures the deployment site server on a site server computer. Three The DHCP server can route PXE requests from the client computers to the deployment site servers that are on multiple subnets. 69 70 Planning for IT Management Suite Symantec Management Agent deployment planning Figure 3-2 Sequence for deployment site server configuration Symantec Management Agent deployment planning In some environments, computers are set up with a corporate software image or a standard base list of software. If you add the agent image to the computer image, you can save time and effort. The Symantec Management Agent can be preinstalled and placed in a directory with a “Run Once” operating system directive. See “About tuning the Symantec Management Agent for performance” on page 124. You can also use scripting mechanisms to install the agent. You can push the Symantec Management Agent from the Symantec Management Console if you do not want to add the agent to an image build. Push requires less outside intervention than other methods of deploying the agent to computers already in service. With this method Notification Server contacts the client computer, and then the client computer requests the agent from Notification Server. The push method requires you to disable the file-sharing setting. Planning for IT Management Suite How agent-based inventory communications work You can still deploy the agent with file-sharing enabled. The client computer still has the ability to initiate this request itself. For example, with email, either a script can be emailed or a Web link can be sent to pull the agent. How agent-based inventory communications work Inventory Solution lets you see detailed reports about the hardware and software in your environment. You can target computers for policies and tasks based on this information. It includes predefined inventory policies. Some predefined inventory policies are enabled by default. However, you can modify them to meet your specific needs. See “About Inventory Solution” on page 45. These policies include the following settings: ■ What to inventory. ■ When to run. ■ Which computers to run on (targets); by default, this setting targets all computers with the Inventory Solution plug-in installed. ■ Optional advanced settings. Notification Server delivers the initial inventory task-based policy to the managed computer. The Inventory Solution plug-in runs its first inventory immediately. After the Inventory Solution plug-in has its policy settings, it continues to run the inventory task. It runs the task according to the settings and the schedule that are defined in the policy. If a policy setting is ever changed, then the task server pushes the new settings to the plug-in immediately. The Inventory Solution plug-in then immediately runs an inventory collection. Inventory Solution runs independent of the Symantec Management Agent's configuration request. It uses tasks and task servers to perform its operations. The time that the inventory runs applies to the time zone of the managed computers. It does not use the time zone of the Notification Server computer. You can create your own custom schedules in the policy or you can use one of the following predefined schedules: ■ Daily. This time is at 6:00 P.M. every day. ■ Weekly. This time is at 6:00 P.M. every Monday. ■ Monthly. This time is at 6:00 P.M. on the first Monday of each month. When the Inventory Solution plug-in runs, it gathers hardware inventory, file scans, Microsoft add or remove programs and UNIX, Linux, and Mac software listings. The Inventory Solution plug-in immediately sends the data to Notification 71 72 Planning for IT Management Suite How agent-based inventory communications work Server. The data is compiled as Notification Server Events (NSEs). Notification Server stores the NSEs in the Configuration Management Database. The data is then available for reporting from the Symantec Management Console. Table 3-10 Sequence for Inventory communications Sequence Description One Predefined inventory policies are available for managed computers on Notification Server. Two After the initial Inventory plug-in deployment, inventory tasks are pushed to the managed computer from task services. Three By default the Inventory plug-in runs ASAP. The Inventory plug-in then gathers the inventory according to its defined schedule. Four After inventory is gathered, by default it is immediately sent to the Notification Server computer. Five The Notification Server computer stores the inventory in the CMDB. Figure 3-3 Sequence for Inventory communications Planning for IT Management Suite How agent check-in intervals and basic inventory settings interact How agent check-in intervals and basic inventory settings interact A number of client-side and server-side settings interact to influence when for example, an application is deployed to a number of endpoints.This might explain why, after you added a set of computers to a policy, nothing seems to be happening. Table 3-11 Sequence for agent-server communications Sequence Location Description One Client The basic inventory provides basic client information. For example, it provides agent version, sub-agent information, unique ID, etc. Two Server The resource membership update adds the computer to one or more targets. This is based on the basic inventory and other inventory variables that may apply, such as conditional parameters, policies, and such. Three Server The policy refresh schedule uses the membership tables to update policy tables. When a user saves a policy, it is immediately updated. Four Client The agent configuration request runs and finds which policies apply. How Patch Management Solution data communications work Patch Management Solution takes inventory of managed computers to determine the operating system and software updates (patches) they require. The solution then downloads the required patches and provides wizards to help you deploy patches. The solution enables you to set up a patch update schedule to ensure that managed computers are kept up-to-date with the latest vendor security updates. Managed computers are then protected on an on-going basis. See “About Patch Management Solution for Windows” on page 48. You can schedule Patch Management Solution to automatically download critical security bulletins into the CMDB. Symantec recommends setting this schedule to daily for Windows computers and weekly for Linux computers. This schedule does not download the patch installation files, only the information about them in the 73 74 Planning for IT Management Suite How Patch Management Solution data communications work security bulletins. This download is called the software updates catalog. The first software updates catalog import on a new platform can take several hours. However, subsequent imports typically take less than an hour because each import only performs delta downloads of often only a few MBs. If you choose to enable multiple languages, then the number of security bulletins to download, the size of downloads, and the time to download increases. You can customize software updates catalog updates by creating exclusions for the software that you do not want to patch. You can create custom schedules for the download. By default, every four hours the Software Update Plug-in contacts Notification Server to check for patches. If new security bulletins are added to the CMDB by the software updates catalog, the Software Updated Plug-in checks to see if they are applicable. It also checks if the updates have already been installed. It sends the results of the check to the Notification Server computer. The data is available for compliance reporting. After the software updates catalog import has completed, you can select which security bulletins you want to stage on Notification Server. This staging processes triggers a download of the patch installation files to a folder on the Notification Server computer. After the download of the patches has finished, you can create and enable your patch distribution policy. If you use multiple package servers, your site management settings for package distribution determine how the patch installation files get distributed to the package servers. The policy is not applied until the Symantec Management Agent has checked in. By default, every hour the Symantec Management Agent contacts the Notification Server computer and requests its configuration updates. However, your schedule may be different. The Notification Server computer sends the patch distribution policy to the Symantec Management Agent. The Notification Server computer advertises the location of the package server to the Symantec Management Agent. The Symantec Management Agent connects to the package server and downloads the patches. After the patches are downloaded, the installation waits for the next scheduled maintenance window to run. It waits unless you set it to ignore the maintenance windows for zero-day exploits. It then does the following: ■ Verifies that patches have been downloaded. ■ Installs the patches and restarts the computer. You can configure restart settings so that servers do not restart immediately after patching updates. A no restart window may be given to client computers so that users can defer the restarts. Planning for IT Management Suite How Patch Management Solution data communications work ■ Runs a vulnerability analysis. If a restart has not occurred, the computer may still appear in reports as vulnerable. After the patching process completes, the Software Update Plug-in sends the updated vulnerability analysis to Notification Server and stores it in the CMDB. You can use the compliance reports to view vulnerability information from the Symantec Management Console. The patching process has multiple dependencies, so order of operations is important. The Software Update Plug-in is used to determine vulnerability. The Symantec Management Agent performs the software update. They each may have a different update schedule. The larger schedule defines the window for patches to be delivered to managed computers. The maintenance window defines when the patches are installed. Compliance reports do not show success until after these steps are completed. Table 3-12 Sequence for patch communications Sequence Description One (a) Import runs automatically on Notification Server and pulls security bulletins into the CMDB. Two (a) You select the patches from the security bulletin and they are staged to a local folder on the Notification Server computer. Three (a) You create a patch delivery policy and include the patches that were downloaded. Four (a) After the agents have completed, you run a compliance report to check the patch status. One (b) Patch plug-in checks in every four hours by default. It uses the latest patch management import data and runs a vulnerability scan. The scan is dependent on patch management import being complete. Two (b) The Symantec Management Agent checks in and receives the latest Patch policies and the location of the patches. Three (b) The Symantec Management Agent downloads the patch packages from the Notification Server computer or its assigned packaged server. Four (b) During the next maintenance window, the Symantec Management Agent installs the patches. After installation, the computer restart settings are run. 75 76 Planning for IT Management Suite Components of Deployment Solution Table 3-12 Sequence for patch communications (continued) Sequence Description Five (b) After the package is installed, a vulnerability analysis is run again and the information is sent to the Notification Server computer. Figure 3-4 Sequence for patch communications Components of Deployment Solution When you install Deployment Solution on Symantec Management Platform, the Deployment Solution components get integrated with Symantec Management Platform. The Deployment Solution leverages the platform capabilities to execute and schedule tasks, jobs, and policies, and set up site servers, use filters, and Planning for IT Management Suite Components of Deployment Solution generate reports. The components of Deployment Solution help you manage the client computers in your environment. Table 3-13 Deployment Solution components Component Description Deployment Plug-in The Deployment Plug-in is installed on client computers to manage deployment tasks. This plug-in enables you to create and deploy disk images, perform remote OS installation, change your system settings, and migrate the personality settings. The Deployment Plug-in replaces the former Deployment Solution 6.X agents, such as AClient, DAgent, or ADLAgent. If you need them, AClient and DAgent can coexist with the Deployment Plug-in. You can enable the Symantec firewall on the client computer and enable the Windows firewall on Notification Server. However, to install the Deployment Plug-in by pushing it to computers, you need to disable one of these firewalls. See “Installing Deployment Plug-in” on page 190. 77 78 Planning for IT Management Suite Components of Deployment Solution Table 3-13 Deployment Solution components (continued) Component Description Deployment site server component Deployment site server components let you offload some of the traffic and workload from your primary Symantec Management Platform. You can set up multiple task servers and Deployment site server components to handle your jobs and tasks. Symantec Management Agent then uses the assigned Deployment site server components for all deployment processes. These processes include imaging, scripted OS installation, Copy file, and the tasks that are associated with packages. See “Installing Deployment site server components” on page 192. Deployment site server components can be installed on the site servers that are configured with both Package Services and Task Services. For more information, search for task server topics in the Symantec Management Platform Help. The components also include all of the tools that Deployment Solution needs. These tools include RapiDeploy, Ghost, and Boot Disk Creator. A Deployment share is created when the Deployment site server component is installed on a site server. The Deployment share is the location where all the tools, such as Ghost and RapiDeploy, other utilities, and images that are created are stored. The site server components also include the PXE service. Planning for IT Management Suite Components of Deployment Solution Table 3-13 Deployment Solution components (continued) Component Description Automation folder Automation folder stores the preboot environment. With the help of the preboot environment (WinPE and Linux PE) the client computers are rebooted to the automation environment. The PXE server and automation folder can be used to reboot the client computer to the automation environment to perform deployment tasks. See “Installing an automation folder” on page 191. The preboot environment (WinPE) contains the Boot.wim file. This file is used to execute Deployment tasks. To reboot the client computer to an automation environment, the DNS should be configured on the network. Also, all computers in the network should be able to perform a Name Server Lookup. WinPE 2.1 and Linux are the only automation operating systems that Deployment Solution supports. Both preboot operating systems are installed with Deployment Solution. PXE server The PXE server can be configured on Symantec Management Platform and the site server. This configuration helps to reboot the client computers to WinPE and Linux PE environments using the network interface. Imaging tools Ghost and RapiDeploy are two disk imaging tools that run on the Windows (x86,x64)and Linux(x86)operating systems. These tools can also be used for creating backup disk images and image of disk partitions. These tools support NTFS,FAT(16,32),EXT2/3,and RAW file system,and HTTP and multicast imaging options. These tools support Windows only hardware-independent disk imaging which can be deployed to diverse client computers by using drivers from a centrally managed driver database. Although backup images are not hardware-independent and intended to be deployed on the same client. 79 80 Planning for IT Management Suite Components of Deployment Solution Table 3-13 Deployment Solution components (continued) Component Description Boot Disk Creator Boot Disk Creator creates a boot disk using Windows and Linux preboot environment. Boot Disk Creator is run on the client computer to boot it in WinPE or LinuxPE. It can also create a bootable CD or USB. Resource Import Tool The Resource Import tool is used for importing existing Windows and Linux images. It is also used for adding Windows-scripted OS installation files. Driver Manager Driver Manager provides the interface to perform driver operations such as adding and deleting data from the DeployAnywhere driver database and the Boot Disk Creator driver database. DeployAnywhere Deploy Anywhere enables you to deploy the Windows operating system image to dissimilar hardware. It also enables you to perform a Windows-scripted installation on bare metal hardware. How capturing master disk images works You capture a master disk image of a managed computer with Deployment Solution in the Symantec Management Console. You do this task by creating a disk imaging task. When you create the disk imaging task, you should use a meaningful name to identify the disk image. When you later select the disk image to deploy, you must rely entirely on the image name to locate it. See “About Deployment Solution ” on page 44. The master image of the computer can already contain the Symantec Management Agent. Adding the agent to the image eliminates the need to roll out new agents every time a computer is deployed or reimaged. When you restore the image, the Symantec Management Agent in the image attempts to connect to the same Notification Server computer as the source computer. To force the agent to connect to a new Notification Server computer, you must include a run-script task in the deployment job. The run-script task runs in the preboot environment and reconfigures the agent with the location of the correct Notification Server computer. If you have multiple Notification Server computers in your environment, it may be easier to create a separate deployment job for each Notification Server computer. Planning for IT Management Suite Components of Deployment Solution The disk image is captured and stored on its assigned package server. The disk imaging task creates a disk image package, and then creates a resource object for the package in the CMDB. You leverage the relationship between the image file and its resource in the database. The relationship lets you create, manage, and deploy all of your disk images from the console. Use a dedicated package server to store and host your master disk images. A dedicated server addresses growth issues because each image is uniquely identified, and images do not overwrite each other. Every time you capture an image, a new package is created that is not related to any earlier versions. You should not manually delete any master disk images from the package server because it creates orphaned resources in the CMDB. Table 3-14 Sequence for capturing a master disk image Sequence Description One The administrator uses the Symantec Management Console to create a master disk image of a managed computer. Two The administrator stores the disk image package on a dedicated deployment site server. Three Notification Server creates a resource object for the disk image package in the CMDB. Figure 3-5 Sequence for capturing a master disk image 81 82 Planning for IT Management Suite Components of Deployment Solution How deploying disk images works A deployment site server is a package server; it must include the package services. Site management, package settings, and package servers all determine how your disk images are distributed to the package servers. By default, package servers check for updates every 15 minutes. See “About Deployment Solution ” on page 44. You must use site management to select one of the following global package distribution settings: ■ Wait for a managed computer to request a specific package (default) This method is called manual pre-staging. When a managed computer gets a policy or task that requires a package, it then requests its package information. Site management distributes the package to the applicable package server(s) only. Tasks can track the availability of the package and know when the package is available on the package server execution. ■ Copy to all package servers This method copies your packages to all of the package servers in your production environment. ■ Copy to specific package servers This method copies your packages only to the servers that you define. You can create a custom distribution setting for specific packages. Methods of delivering preboot environments to computers You must deliver and load a preboot environment to run deployment Solution imaging tasks. The way that you choose to deliver the preboot environment depends on your deployment site server settings. It also depends on the current state of the computer that you want to image. See “About Deployment Solution ” on page 44. You can deliver preboot environments to computers in the following ways: ■ Deploy to a managed computer. The computer must have the Symantec Management Agent installed. Because the computer is managed, you can target it directly from the console and start your deploy image job. You can configure this option to either deliver the preboot environment over the network in real time, or to use an automation folder. That automation folder must be preinstalled on the managed computer. Using a preinstalled automation folder simplifies and accelerates the reimaging process. Once the preboot environment is loaded, the job is completed. ■ Deploy to a predefined computer. Planning for IT Management Suite Components of Deployment Solution One job per computer is required. You must enter the MAC, serial number, and UUID of the hardware into the Symantec Management Console in advance. When the computer connects to the network, PXE loads the preboot environment and the job is started. ■ Deploy to an unknown computer when any unknown computer connects to the network. PXE loads the preboot environment, and the job is started. This feature is intended to be used in isolated provisioning environments. Do not enable this option in your production network as it can result in unintentionally re-imaging computers. ■ Boot from a local media device such as a boot disk, CD/DVD, or USB drive. With local access to the computer, you can use boot media to load the preboot environment. Once the computer is connected to the network and the preboot environment is loaded, the job is started. How Deployment Solution imaging jobs work The two main use cases for Deployment Solution imaging are to deploy standard images to new computers, and to restore backup images on production computers. See “About Deployment Solution ” on page 44. For information see the topic “Deploying new computers” in the Altiris Deployment Solution from Symantec User Guide. For information see the topic “Restoring a backup image” in the Altiris Deployment Solution from Symantec User Guide. Your Deployment Solution imaging jobs may contain several custom elements, but each imaging job must accomplish the following tasks: ■ Load a preboot environment. ■ Boot to an automation environment. ■ Deploy an image. ■ Restart to a production environment. Table 3-15 Sequence for re-imaging a managed computer Sequence Description One You configure a disk image package to only be distributed to package servers when it is needed. Two A deployment job is created and delivered as a task to a managed computer. 83 84 Planning for IT Management Suite Components of Deployment Solution Table 3-15 Sequence for re-imaging a managed computer (continued) Sequence Description Three The managed computer requests the package from Notification Server which makes the package available for the managed computer’s package server. Four The package server checks for packages every 15 minutes and copies the disk image package only to the applicable package server. Five The deployment site server delivers the WinPE automation environment. The automation environment contains the PECT agent. Figure 3-6 Sequence for re-imaging a managed computer Planning for IT Management Suite Components of Deployment Solution Table 3-16 Sequence for deploying a new computer Sequence Description One You configure a disk image package to be distributed to all package servers. Two A predefined computer job is created and enabled for imaging a bare-metal computer. Three The predefined computer connects to the network and sends a PXE request. Four The deployment site server delivers the WinPE automation environment. The automation environment contains the PECT agent. Five The PECT agent requests the package from Notification Server which is already available on all package servers. Figure 3-7 Sequence for deploying a new computer 85 86 Planning for IT Management Suite Components of Deployment Solution Table 3-17 Sequence for image restoration completion Sequence Description One The preboot environment is loaded onto the targeted computer. The PECT agent is run. The PECT is a Symantec Management Agent that runs in a preboot environment. Two The PECT agent requests information about which task server it should communicate with from Notification Server . Three The PECT agent requests jobs from the task server. Four The task server distributes the deployment job to the PECT agent. The deployment job contains the path to the imaging .EXE and to the disk image package. They must both be stored on the same server because it uses the same name for the task server and the package server. Five The image is pulled from the package server and is restored on the computer and the computer restarts to the production OS. Six The Symantec Management Agent collects and sends basic inventory and is able to load any additional policies and tasks that apply to it. Any custom tasks that are included in the job are run at this time. Planning for IT Management Suite How asset management data communications work Figure 3-8 Sequence for image restoration completion How asset management data communications work Asset Management Suite provides a management console, a database environment, and a suite of solutions that let you track assets and asset-related information. See “About Asset Management Suite” on page 42. The suite includes Asset Management Solution, Barcode Solution, and CMDB Solution. It specializes in tracking IT-related assets, such as computers and software. You can also use it to track other types of assets, such as office equipment or vehicles. Table 3-18 Sequence for asset management communications Sequence Description One Asset Management Solution relies on Inventory Solution to gather and deliver data about managed computers. Two Administrator adds non-managed assets using the Symantec Management Console. 87 88 Planning for IT Management Suite How asset management data communications work Table 3-18 Sequence for asset management communications (continued) Sequence Description Three Data that is stored in the CMDB is available for reporting and administrator can use reports to create management policies. Figure 3-9 Sequence for asset management communications Chapter 4 Reference of topics about multi-Notification Server environments This chapter includes the following topics: ■ About MultiCMDB reporting with IT Analytics ■ About global policy distribution ■ Replication types in the Symantec Management Platform About MultiCMDB reporting with IT Analytics IT Analytics includes a new feature called MultiCMDB. MultiCMDB lets you run global IT Analytics reporting across multiple CMDBs. You do not need to replicate large amounts of data. You can populate existing cubes from many Notification Server computers. It does not matter if Notification Servers are configured in a hierarchy or are standalone. MultiCMDB supports connections to both external 7.0 CMDBs and 7.1 CMDBs. You can enable the cubes that you have data for and not enable others. This ability lets you use CMDBs with different solutions installed. They do not have to be consistent. You currently cannot create filters (for policy targets, for example) from the ITA reports. MultiCMDB provides reporting but it does not provide top-down management. You should also note that the MultiCMDB feature does not support reporting on the ServiceDesk data. The MultiCMDB feature only covers data that is in a Symantec CMDB. ServiceDesk uses a separate database See “Adding and configuring external Symantec CMDB connections” on page 91. IT Analytics MultiCMDB can provide the following: 90 Reference of topics about multi-Notification Server environments About MultiCMDB reporting with IT Analytics ■ Efficient global ITA reporting across multiple CMDBs in environments without hierarchy. MultiCMDB does not replace hierarchy. It allows for global IT Analytics reporting without the need to replicate large amounts of data. Hierarchy is still needed for management for the top use cases. MultiCMDB capability is not hierarchy-aware. You must manually point IT Analytics to all the CMDBs that you want ITA reporting on. This operation can be done in the IT Analytics configuration page. ■ Efficient global ITA reporting across multiple CMDBs in environments with hierarchy. You must pay specific attention to whether to include the top-level node in the hierarchy into the global reporting. You should exclude the top-level node from the MultiCMDB if your top-level server is used to receive data from a child level. Excluding the top node helps address an asset duplication issue. Currently this feature is not a good fit for the hierarchical environments that use Asset Management Solution. ■ Efficient global ITA reporting during the 7.0 to 7.1 migration (where at least one server is already on 7.1 and the rest are on 7.0), with or without hierarchy. You can use the MultiCMDB feature during IT Management Suite 7.0 to 7.1 migration. The MultiCMDB feature lets you report on a mix of 7.0 data and 7.1 data. This reporting can be helpful if the environment leverages hierarchy because hierarchy must be recreated during a 7.0 to 7.1 migration. What's new in IT Analytics 7.1 SP2 In the 7.1 SP2 release of IT Analytics, the following new features are introduced. Table 4-1 New features Feature Description Display resource list This feature lets users right-click a cell that contains a valid measure cell and open the Resource List window. This window displays all of the resources that can be derived from this cell. In this window, users can select one or more resources and launch any Item Action that is valid to those resources. Reference of topics about multi-Notification Server environments About MultiCMDB reporting with IT Analytics Table 4-1 New features (continued) Feature Description Cube exclusion This feature lets users select cubes to exclude from external CMDBs cube processing to avoid duplication of data or for other purposes. For example, the user may have multiple client-facing Symantec Management Platform servers. In addition, the user may have a top tier Symantec Management Platform that serves as an Asset Management Server. The user can prevent data duplication by excluding the Asset Management Server from processing the Inventory cube, Patch Management cube, etc. Localization support IT Analytics supports the following languages, which Symantec Management Platform console also supports: ■ English ■ French ■ German ■ Italian ■ Japanese ■ Korean ■ Portuguese (Brazil) ■ Russian ■ Simplified Chinese ■ Spanish ■ Traditional Chinese Improved prerequisite checking This enhancement adds Installation Readiness checks to the installation process. The checks ensure that all of the components that are necessary to properly configure IT Analytics are installed on the Symantec Management Platform server. Improved the automatic configuration and installation process This enhancement automatically configures the Analysis and Reporting Services settings when SQL Analysis and Reporting Services are detected on the server during installation. In addition, any cubes and reports that can be installed are automatically installed. Adding and configuring external Symantec CMDB connections IT Analytics Solution lets you add Symantec CMDB connections so their relevant data can be leveraged for reporting purposes. 91 92 Reference of topics about multi-Notification Server environments About MultiCMDB reporting with IT Analytics You need to complete these steps only if the IT Analytics Client and Server Management Pack is installed. The IT Analytics Client and Server Management Pack lets you view data from one or more Symantec CMDBs. By default, the local Symantec CMDB on which IT Analytics is installed is used. If the local Symantec CMDB is the desired configuration, then you do not need to carry out this procedure. If the local Symantec CMDB is part of a hierarchy for inventory replication, you must configure the local CMDB as an external connection. External Symantec CMDB connections provide global IT Analytics reporting across multiple CMDBs without the need to replicate large amounts of data. It allows multiple Notification Servers to populate all existing cubes. Notification Server computers can be configured in a hierarchy or standalone. See “Editing external Symantec CMDB connections” on page 92. See “Deleting external Symantec CMDB connections” on page 94. See “Including or excluding the local Symantec CMDB” on page 94. See “Updating the Solution Dependencies” on page 95. To add and configure external Symantec CMDB connections 1 In the Symantec Management Console, on the Settings menu, click Notification Server > IT Analytics Settings. 2 In the left pane, expand the Connections folder. 3 Click Symantec CMDB. 4 Click Add External Connection. If you have already added a connection and want to add another under External Symantec CMDB Connections, click Add. 5 In the Add/Edit CMDB Connection dialog box, enter the information for each of the connection fields. 6 Click Create. 7 After the connection is configured, click Close. Editing external Symantec CMDB connections IT Analytics Solution lets you edit Symantec CMDB connections so that data can be leveraged for reporting purposes. See “Adding and configuring external Symantec CMDB connections” on page 91. See “Deleting external Symantec CMDB connections” on page 94. Reference of topics about multi-Notification Server environments About MultiCMDB reporting with IT Analytics See “Editing the Report Integration URLs for an external Symantec CMDB” on page 93. To edit Symantec CMDB connections 1 In the Symantec Management Console, on the Settings menu, click Notification Server > IT Analytics Settings. 2 In the left pane, expand the Connections folder. 3 Click Symantec CMDB. 4 In the right pane, under the External Symantec CMDB Connections section, select the server that you want to edit from the drop-down list. The information appears for the server that you selected. 5 Click Change Credentials. 6 In the Add/Edit CMDB Connection dialog box change the credentials to connect to this Symantec CMDB for any of the following fields: ■ Symantec CMDB Database Username ■ Symantec CMDB Database Password ■ Symantec CMDB Database Password Confirmation 7 Click Save. 8 After the connection is edited, click Close. Editing the Report Integration URLs for an external Symantec CMDB The Report Integration URLs are used to specify the appropriate URL to the Resource Manager and Resource Edit screens. A number of reports provide the capability to open a resource in the Resource Manager or Resource Edit pages. If these URL for an external Symantec CMDB connection needs to be changed, it can be done here. See “Editing external Symantec CMDB connections” on page 92. To edit the Report Integration URLs for an external Symantec CMDB 1 In the Symantec Management Console, on the Settings menu, click Notification Server > IT Analytics Settings. 2 In the left pane, expand the Connections folder. 3 Click Symantec CMDB. 4 In the right pane, under the External Symantec CMDB Connections section, select the external Symantec CMDB connection that you want to change the URLs for. 93 94 Reference of topics about multi-Notification Server environments About MultiCMDB reporting with IT Analytics 5 Click Change Report Integration URLs. 6 In the Edit Report Integration URLs dialog box, make the edits to URLs, and click Save. Deleting external Symantec CMDB connections IT Analytics Solution lets you delete Symantec CMDB connections to remove data from reports. See “Adding and configuring external Symantec CMDB connections” on page 91. See “Editing external Symantec CMDB connections” on page 92. To delete Symantec CMDB connections 1 In the Symantec Management Console, on the Settings menu, click Notification Server > IT Analytics Settings. 2 In the left pane, expand the Connections folder. 3 Click Symantec CMDB. 4 In the right pane, under External Symantec CMDB Connections, select the server that you want to delete from the drop-down list. 5 Click Delete. 6 After the Updating Dependencies dialog box is complete, click Close. Including or excluding the local Symantec CMDB If you add an external Symantec CMDB connection, you can select whether you want to include the data in the local Symantec CMDB. Depending on your environment, you may want to include this local CMDB. See “Adding and configuring external Symantec CMDB connections” on page 91. See “Editing the Report Integration URLs for an external Symantec CMDB” on page 93. You can include the local CMDB if you have configured external Symantec CMDBs that are not part of the same hierarchy. However, if the local CMDB is part of hierarchy for inventory replication, you may encounter some duplicate information if you include this local CMDB. To avoid duplication of data and still process the local CMDB, you must configure the local CMDB as an external connection. Reference of topics about multi-Notification Server environments About global policy distribution To include or exclude the local CMDB 1 In the Symantec Management Console, on the Settings menu, click Notification Server > IT Analytics Settings. 2 In the left pane, expand the Connections folder. 3 Click Symantec CMDB. 4 In the right pane, under Local Symantec CMDB Connection, select to include or exclude the local Symantec CMDB. 5 Click Save Changes. 6 After the Updating Dependencies dialog box is complete, click Close. Updating the Solution Dependencies Each time an external connection to a Symantec CMDB is added or removed, IT Analytics reviews all configured connections. IT Analytics evaluates what solutions are installed that should be queried when cubes are processed. If the set of solutions using a configured connection is changed, updating the dependencies ensures that all relevant solutions are queried from each external CMDB. You ensure that this change is incorporated by updating the solution dependencies. See “Adding and configuring external Symantec CMDB connections” on page 91. To update the solution dependencies 1 In the Symantec Management Console, on the Settings menu, click Notification Server > IT Analytics Settings. 2 In the left pane, expand the Connections folder. 3 Click Symantec CMDB. 4 In the right pane, under the Dependencies section, click Update Dependencies. 5 After the Updating Dependencies dialog box is complete, click Close. About global policy distribution Global policy distribution uses a hierarchy to let you create and control global policies from a parent Notification Server computer. Hierarchy gives you some global management capabilities but still preserves regional Notification Server autonomy. Policies, jobs, and tasks are managed at each child Notification Server computer, while global policies are managed centrally from the parent Notification Server computer. See “What you can do with global policy distribution” on page 96. 95 96 Reference of topics about multi-Notification Server environments About global policy distribution The majority of your day-to-day management work should be performed from each Notification Server computer using the Web-based console. However, you can control some policies that apply to all endpoints from the single global Notification Server computer. These global policies can be forced to run on every child Notification Server computer in the hierarchy. At the global Notification Server computer, you can create global reports. However, to make these reports contain the data you need, you may need to specify the data for replication that is required to populate them. A global administrator can distribute policies to regional Notification Server computers where the local administrator may make changes and apply the policy. These distributed policies can be made either editable or non-editable. A non-editable policy is used to force consistent policy behavior across all Notification Server computers. Regional administrators cannot override these rights without you specifying the properties of the policy that they may edit. An editable policy lets regional administrators modify a common policy to apply to specific targets and schedules. A non-editable policy can be cloned. All properties of the cloned policies can then be edited. Whether a policy may be cloned is controlled through role-based security rights. See “About hierarchy editable properties” on page 102. What you can do with global policy distribution Global policy distribution provides limited centralized management opportunities. See “About global policy distribution” on page 95. Global policy distribution lets you do the following: ■ Create and distribute central policies. ■ Replicate packages. ■ Forward inventory for limited centralized reporting. ■ Manage security roles centrally. About hierarchy Hierarchy is a topology that lets you perform global policy distribution. Global policy distribution is a method to centrally manage policies when multiple Notification Server computers are required. See “About global policy distribution” on page 95. Reference of topics about multi-Notification Server environments About global policy distribution A hierarchy uses parent-to-child relationships to define how information flows across multiple Notification Server computers. These relationships are called your hierarchy topology. See “How global policy distribution works with hierarchy” on page 97. How global policy distribution works with hierarchy The purpose of hierarchy is to combine multiple Notification Server computers into a single Symantec Management Platform. It lets you manage some policies from a single Symantec Management Console. However, hierarchy does not increase the number of endpoints that each Notification Server computer can independently support. For example, you can replicate a software delivery policy. Replicating a policy also replicates the associated data. This data includes a software package so that the software can be delivered to the applicable client computers of the child Notification Server computers. See “About global policy distribution” on page 95. In a hierarchy you can manage from both the parent Notification Server computer and the child Notification Server computers. Management from the parent server applies to all child servers. Management at a child server only applies to its endpoints. This functionality lets you combine both global management practices and regional management practices into a single platform. For example, a global policy can be distributed from the parent Notification Server computer to all managed endpoints. Regional administrators can also create policies for their specific region. See “About hierarchy” on page 96. Hierarchy requirements To share or receive common configuration settings and data with multiple Notification Server computers, you must first add the Notification Server computer to a hierarchy. Because Notification Server computers can be managed locally, each Notification Server computer must be added or removed from a hierarchy individually with the appropriate access credentials. Typically, the Symantec Administrator managing the topology design accesses the Notification Server computers in other sites remotely to add them to a hierarchy. The requirements for configuring hierarchy are as follows: ■ Network traffic must be routable between adjoining Notification Server computers within the hierarchy. 97 98 Reference of topics about multi-Notification Server environments About global policy distribution ■ HTTP/HTTPS traffic must be permitted between adjoining Notification Server computers within the hierarchy. ■ Trust relationships must exist between adjoining Notification Server computers within the hierarchy, or credentials for the privileged accounts that facilitate trust must be known. ■ Each Notification Server computer must be able to resolve the name and the network address of any adjoining Notification Server computers within the hierarchy. ■ There must be sufficient bandwidth between Notification Server sites to support package and data replication. Bandwidth and the hardware that is required depend on the size of your hierarchy topology and the data replicated. ■ A site must exist for each Notification Server computer, and must include the subnet that contains Notification Server. The site must also contain a package server (a site server that is running the package service) that serves the Notification Server computer. See “About site services” on page 39. About hierarchy topology The hierarchy topology is a set of one-to-one parent-to-child relationships between two or more Notification Server computers. Each Notification Server computer in the hierarchy can have multiple child servers, but each child server may only connect to a single parent server. Each Notification Server computer is only aware of its immediate parent and its immediate children. The servers are unaware of peer members in the hierarchy. See “About global policy distribution” on page 95. You can manage from both the parent and the child Notification Server computers. If management is done from a parent server, it can apply to all of the child servers and their managed computers. If management is done from a child server, the task only applies to the child server’s managed computers. When you set up the relationships of your hierarchy topology, you must add them two at a time. You must have administrative rights on both Notification Server computers. The relationships can be established from either the child server or the parent server. Symantec Management Platform has security privileges for manipulating hierarchy topology settings such as establishing relationships, editing schedules, and configuring replication rules. Your administrators can force hierarchy to replicate individual items without being assigned this security role. Reference of topics about multi-Notification Server environments About global policy distribution About creating and managing hierarchical relationships You can add your Notification Server (the one that you are logged on to, which may be a remote logon) to a hierarchy as a child of an existing remote Notification Server computer, or as its parent. To create a hierarchical relationship, you require a Symantec Administrator account (or an account with equivalent privileges) on both computers. To add or remove Notification Server computers from a hierarchy, you need the Manage Hierarchy Topology privilege on the Notification Server computer where the action is carried out. See “Hierarchy requirements” on page 97. You can view and configure the Notification Server computer hierarchy using the Symantec Management Console. If you are the Hierarchy administrator, you can see only the parent and children (down to all levels) of your Notification Server. Note that all actions that you take are based on your Notification Server. Right-clicking a Notification Server computer does not perform a remote logon to any remote Notification Server computers. It opens a context menu containing the actions that you can perform on that server, which is different for local and remote computers. A full set of actions is available for the local server, but only a limited set is available for remote servers. Actions such as extracting reports are performed on the appropriate database. The actions that you can perform on the hierarchy are relative to your Notification Server computer, which is the computer that you are logged on to. If you have the Manage Hierarchy privilege on a remote Notification Server computer, you can perform a remote logon to that computer. You can then open the Symantec Management Console, and perform hierarchy configuration relative to that computer. You can enable or disable hierarchy replication on specific Notification Server computers at any time. For example, you can use this facility to temporarily disable hierarchy replication during maintenance tasks such as solution installation, upgrades, or uninstallation. Disabling replication on one Notification Server computer does not affect the replication schedule on the other Notification Server computers in the hierarchy. However, no data is passed through the disabled computer, so replication down stops at the parent, and replication up stops at the children. A colored symbol on the Hierarchy Management page indicates any hierarchy alerts. The colors that you might see and the corresponding alert status are as follows: Yellow Low alert status Orange Medium alert status 99 100 Reference of topics about multi-Notification Server environments About global policy distribution Red Critical alert status. For example, if you attempt to replicate the same data both up and down the hierarchy from the same Notification Server computer, a critical alert is raised. Data should be replicated one way only. If the parent or the child Notification Server computer has the same hierarchy replication rules implemented, or you could set up a data clash. Setting up a hierarchical relationship between two Notification Server computers You can set up a hierarchical relationship (either Parent of or Child of) between your Notification Server computer and a remote Notification Server computer. You need to specify the name, URL (which should include any non-default port configurations or HTTPS), and access details of the remote Notification Server computer. You also need to provide the access details of your local Notification Server computer. By default, the hierarchy replication schedule staggers the replication between each pair of Notification Server computers. You can change the replication schedule to suit your requirements, but you should ensure that replication staggering is maintained. See “Hierarchy requirements” on page 97. See “About creating and managing hierarchical relationships” on page 99. Both Notification Server computers must have a package server available within their respective sites. The package server is required for performance reasons. You cannot create a hierarchical relationship between two Notification Server computers if either one does not have a package server available. Notification Server application credentials should be stable and not be changed regularly like some user account passwords. If the Notification Server computer application account password becomes invalid, a message is displayed in the console. The message prompts you to use the ASConfig command-line tool to make the necessary updates. To set up a hierarchical relationship between two Notification Server computers 1 In the Symantec Management Console, on the Settings menu, click Notification Server Management > Hierarchy. 2 On the Hierarchy Management page, on the Topology tab, right-click your Notification Server, and then click the appropriate option: ■ Add > Parent ■ Add > Child Reference of topics about multi-Notification Server environments About global policy distribution ■ Edit > Parent ■ Edit > Child 3 In the Add Hierarchy Node Wizard, on the first page, enter the name and URL of the remote Notification Server computer. 4 Supply the appropriate access credentials. The access credentials must be a Symantec Administrator account or equivalent account on the remote Notification Server computer. 5 Click Advanced. 6 In the Return Credential Settings dialog box, specify the Symantec Administrator (or equivalent) account that the remote Notification Server computer uses to communicate with the local Notification Server computer. 7 Click OK to close the Advanced dialog box. 8 Click Next. 9 On the Replication Schedules page, set up the differential and the complete replication schedules, and enable those that you want to use on the Notification Server computer. By default, only the differential replication schedule is enabled. Complete replication is rarely used because it puts a heavy load on the Notification Server computer, but you can enable it when necessary. You should schedule the replication at the times that do not clash with replication schedules on other Notification Server computers in the hierarchy. See “Managing shared schedules” on page 274. See “Configuring a schedule” on page 275. 10 Click Next. 11 On the Confirm Settings page, verify that the settings are correct, and then click Finish. The local Notification Server computer uses the specified information to locate and verify the remote Notification Server computer and set up the appropriate hierarchical relationship with it. If the remote Notification Server computer does not have a package server available within its site, the verification fails and the hierarchical relationship cannot be established. 101 102 Reference of topics about multi-Notification Server environments About global policy distribution How deployment site servers work in a hierarchy Hierarchy replication uses site services to operate. There must be a package server in each Notification Server computer site and this server must be off-box. You must offload package services on adjoining Notification Server computers to a managed device candidate capable of running package services. Ensure that the site server running those services is “assigned” to a site or subnet to which Notification Server belongs before setting up hierarchy. See “About global policy distribution” on page 95. In addition to the deployment site server, there must either be a task server and a package server for each site. If you do not use Deployment Solution, then it may be cost-effective to use the task services on the Notification Server computer. If you use Deployment Solution then you must dedicate a computer to host both the task services and the package services. This computer is called a deployment site server. You must have a dedicated deployment site server on each Notification Server computer site. When you use a dedicated task server you must manually configure site management to restrict all client computers to use the dedicated task server. About hierarchy editable properties Hierarchy editable properties allow the parent administrator to control what aspects of replicated policies a child administrator is permitted to edit. Subsequent replications of the policy do not override a child administrator's changes. See “About global policy distribution” on page 95. You can define whether a regional administrator has rights to do the following: ■ Turn on and off a global policy. ■ Change the schedule of a global policy. ■ Modify the targets of global policy. Global policy distribution implementation considerations for Software Management Solution Before you implement a global policy distribution plan, be aware of certain considerations about Software Management Solution. The following are implementation considerations with Software Management Solution: ■ Hierarchy replication replicates software delivery policies and packages to child Notification Server computers for distribution. Reference of topics about multi-Notification Server environments About global policy distribution ■ Policies, filters, and packages are replicated automatically down the hierarchy. ■ Software delivery typically takes more than 48 hours. ■ Replication rules must be customized to include the software inventory details. The details are needed for reporting. Global policy distribution implementation considerations for Patch Management Solution This section includes specific considerations about Patch Management Solution to be aware of before you implement a global policy distribution plan. The following are implementation considerations with Patch Management Solution: ■ Use patch management in a hierarchy to replicate software updates down the hierarchy for distribution and receive vulnerability reports at the top of the hierarchy. ■ In a hierarchy, patches must be imported at the parent Notification Server. ■ To minimize distribution times, replication schedules must account for the following order of operations: Patch import schedule; Patch import replication rule; site server download; agent update interval. ■ Without aligning schedules, patch distribution typically takes more than 48 hours. ■ A compliance summary is all that’s available at the parent Notification Server computer. Full vulnerability analysis reports drill down to each child Notification Server . Limitations of global policy distribution in a hierarchy Global policy distribution in a hierarchy topology does not replace regional management needs. Understand some limitations and considerations before you create a global policy distribution plan. See “What you can do with global policy distribution” on page 96. Global policy distribution has the following limitations: ■ Hierarchy does not provide a central view of all report data in an environment. In a hierarchy, administrators must manage and report at the child and the parent Notification Servers to view all data. ■ Setting up a hierarchy does not increase the ability to scale. 103 104 Reference of topics about multi-Notification Server environments About global policy distribution ■ Hierarchy is not a replacement for organizational views and groups. Hierarchy does not provide scope-based management in an environment. ■ Hierarchy is not a data replication strategy for Notification Server failover. Limitations of hierarchy Hierarchy can simplify the management of multiple Notification Server computers. However, having multiple Notification Server computers does not necessarily indicate that you should implement a hierarchy. Even if a hierarchy simplifies your administration, it increases your Notification Server computer infrastructure overhead. See “What you can do with global policy distribution” on page 96. Consider the following limitations before you implement a hierarchy: ■ Three-tier hierarchies are not supported at this time. ■ Notification Server hierarchy supports between one and six child Notification Server computers. This number depends on the hardware capabilities of each server and your IT management requirements. For example, the frequency and amount of inventory that you gather affects the number of clients each Notification Server computer can support. In a highly complex hierarchy scenario, you should contact Symantec Consulting Services to analyze your requirements and fine-tune the platform architecture to meet your needs. ■ Hierarchy adds the cost of a very robust Notification Server computer to act as the parent server. ■ Replication has some effect on the performance of all the Notification Server computers. This additional load on the child Notification Server computer may influence its maximum supported client count. ■ Replicating information is subject to a time-delay of replicating information. ■ Replicating more than once a day can have negative consequences. ■ Not all solutions in the Symantec Management Platform support hierarchy replication. ■ All Notification Server computers must have the same version of the Symantec Management Platform and Solutions installed. To determine the version you can open the Symantec Installation Manager locally on each Notification Server computer and record them. To perform Symantec Management Platform updates, hierarchy replication must be disabled first to avoid conflicts between dissimilar versions. You can easily enable or disable hierarchy replication on specific Notification Server Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform computers with a single step. To perform Solution updates, use Symantec Installation Manager locally on each Notification Server computer. For more information, see the IT Management Suite migration guides. ■ You cannot get real-time data with hierarchy replication. When data is moved through the hierarchy, there is a time delay. If you use the default schedule for software distribution, then you require up to 24 hours for each tier in the hierarchy. You can force individual items to replicate by using the Replicate Now option instead of waiting for the schedule. ■ If clients are configured with SSL (HTTP or HTTPS), then their Notification Server computer must also be configured for it. Mixed SSL and non-SSL environments should not be supported. If one Notification Server computer has SSL, then all of them must have it configured. ■ Asset Management 7.1 and CMDB 7.1 are designed to work with hierarchy and with Standalone Replication Rules. The Asset Management/CMDB server must be the uppermost server (the parent) in a hierarchy. Asset Management/CMDB cannot be on a child server. Standalone Replication Rules can forward inventory to the Asset Management/CMDB server, but not from this server. ■ Asset Management 7.0 and CMDB 7.0 are not designed to work with hierarchy and Standalone Replication Rules. Asset Management/CMDB 7.0 in a hierarchy with the Asset Management/CMDB server off the ITMS/CMS parent (as a reporting server) is not a supported architecture. Attempting to do so will result in unexpected resource issues. The only solutions are to either flatten the hierarchy to one Symantec Management Platform server or to upgrade to 7.1. Replication types in the Symantec Management Platform Symantec Management Platform uses two types of replication. These include the following types: ■ Hierarchy replication. Copies the information between multiple Notification Server computers. It defines which items are replicated, the direction that each item type flows, and when the replication occurs on each server in the platform. You can use replication to copy policies and tasks and reporting information to other Notification Server computers. ■ Peer-based replication. Requires you to specifically define the items to replicate and the direction that they replicate. You must configure the rules very selectively because there is no automatic conflict prevention in peer-based replication. You can use both hierarchy replication and peer-based replication 105 106 Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform concurrently within a single Symantec Management Platform environment. This method of replication was called "inventory forwarding" in previous releases. About hierarchy replication Hierarchy replication specifies what is replicated in the hierarchy. It has no effect on the stand-alone replication that you can set up between any two Notification Servers. Any data that is replicated down from a parent Notification Server has priority, and overwrites the corresponding data on its child servers. See “About creating and managing hierarchical relationships” on page 99. See “Setting up a hierarchical relationship between two Notification Server computers” on page 100. Note: Hierarchy replication is not supported from a 7.1 server to a 7.0 server or from a 7.0 server to 7.1 server. The replicated configuration and management items received from a parent server are usually read-only so they cannot be modified. The read-only setting ensures that it is replicated unchanged down the hierarchy. If you want to allow additions to replicated items on child servers, you need to unlock the relevant items on the Notification Server computer on which they were created. For example, you may want to allow policies to be enabled and disabled on the child Notification Servers. Hierarchy replication does not let you replicate the same data up and down the hierarchy. If you set up two rules that have the same resource type being replicated in both directions, a critical alert is raised and the replication rules are not executed. Hierarchy has two modes of replication: Differential Replicates the objects and the data that have changed since the last replication. This mode is enabled by default and reduces the load and the bandwidth that hierarchy uses. Complete Replicates all objects and data. This mode is disabled by default. To minimize the load on the network and to prevent data collisions, you should schedule hierarchy replication at a different time for each Notification Server in your hierarchy. See “About Symantec Management Platform schedules” on page 269. Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform Hierarchy replication synchronizes different types of objects in the following ways: Security objects Security objects, such as roles and privileges, always use complete replication. Differential replication is not an option for read-only objects such as these. Items Items use differential replication, which is handled by hashing each item to check for changes and replicating those that have changed. Resources Resources use differential replication. Differential replication is based on the "last changed" timestamp on the source data. Any data that has changed since the last replication is replicated to the destination server. The data on the destination is then verified, if data verification has been enabled in the appropriate replication rule. Data verification imposes significant processing load on Notification Server. To reduce this load, you can verify a specified percentage of data on the destination server with each replication. For example, if you verify 10% of the data for each replication, that ensures that all data has been verified after 10 replications. About hierarchy replication rules Hierarchy replication relies on replication rules. These rules define the data that replicates to other Notification Server computers. Many items are configured to replicate by default. However, there are practical constraints, particularly on the number of items that can replicate up the hierarchy. For example, many inventory data classes are not enabled to replicate up the hierarchy by default. Without those data classes, some reports do not function at the parent Notification Server computer. You should be selective in choosing which data classes to replicate up. You can disable a replication rule at any time and enable it again later; it is not deleted. Events are another item that can overwhelm a parent Notification Server computer when replicated. By default, no events are enabled to replicate. These should be replicated only with great caution and for limited time periods. Note that because replication does not occur real-time, raw event data cannot be used for alerting at the parent Notification Server computer. About configuring replication Before you start replicating data from one Notification Server to another, you need to plan your replication. This is to ensure that similar data is not passed in both directions. If any of your servers are part of a hierarchy, you need to ensure that the replication does not conflict with the hierarchy replication process. 107 108 Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform Notification Server does not check to ensure that your replication configuration is consistent with the hierarchy. A poorly planned implementation may create data clashes or overwrites in the affected CMDBs. See “Configuring replication rules” on page 110. Note: Replication is not supported from a 7.1 server to a 7.0 server or from a 7.0 server to 7.1 server. To configure replication, you need to set up the appropriate replication rules on each Notification Server computer. Each rule specifies the data to replicate from that server (the source server) to one or more specified destination servers and the schedule to use. You should use different replication schedules for each Notification Server computer. For example, stagger the times to ensure that each runs at a different time. Replicating to and from multiple Notification Server computers at the same time can cause problems in the CMDB. The rule must be enabled for the specified replication to take place. You can enable and disable replication rules at any time, according to the needs of your organization. For each rule that is enabled, the specified data is replicated according to the defined schedule. You can replicate data at any time by running the appropriate replication rules. In the console, right-click on the rule and click Run. Running a replication rule overrides its schedule and replicates the specified data to the destination servers immediately. Running a replication rule is a once-only operation and does not change the replication schedule. All replication rules continue to be run as scheduled. Table 4-2 Replication rule types Type Description Events Replicates Notification Server events. Items Replicates Notification Server configuration and management items such as policies, filters, and reports. Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform Table 4-2 Replication rule types (continued) Type Description Resources Replicates Notification Server resource types, resource targets, and specific data classes. If you include resource targets in a resource replication rule, remember that resource scoping applies to the contents (resources) of the replicated target. Therefore, the resources that are replicated depend on the owner of the resource target. The Notification Server administrator can choose to replicate resource targets in their current state (owned by somebody else, with the corresponding scope). Alternatively, they can take ownership of the targets, save them with the administrator’s scope (which usually contains more resources) and replicate them in that state. All the current members of a resource target are replicated. The actual resource target item is replicated in the background as a dependent item. The target that is applied to a stand-alone rule is replicated when the stand-alone rule itself is replicated. When the rule is run, the target is not sent. Security Replicates Notification Server security roles and privileges. Two types of security replication rules are available: Privilege and Role. The configuration procedure is identical for each. When you include a security role in a replication rule, you must also configure a replication rule to replicate all of the privileges in the role. The replicated security role does not recognize any privileges that already exist on the destination Notification Server computer. Replicating custom items in a hierarchy You can replicate custom items for configuration items and management items. In the Hierarchy Management page there is an option available called Custom. When you enable the option and apply the page, console users can then replicate the custom items. See “Replication types in the Symantec Management Platform” on page 105. To replicate custom items in a hierarchy 1 In the console tree view, right-click a configuration management item or folder. 2 In the context menu, click Hierarchy – Enable/disable Replication. 109 110 Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform 3 If you selected a folder, a dialog window appears. It lets you also choose to enable all subfolders and enable all sub-items, or to only enable the selected folder. Choose your required option and click OK. 4 This operation only replicates the selected items when the replication schedule is triggered. When you run the Replicate Now operation on a custom item, it is automatically enabled for future replication. When a differential or a complete replication schedule next runs, any modifications to the item are sent. Configuring replication rules The replication rules that you configure on a Notification Server are items on that server. Therefore it is possible to replicate them to other Notification Servers. You may want to set up your item replication rules to ensure that replication rules are not included. Note: Replication is not supported from a 7.1 server to a 7.0 server or from a 7.0 server to 7.1 server. When a replication rule is replicated, its settings remain unchanged. A rule that is enabled on the source server is immediately enabled on the destination servers. However, the destination that is specified in the replication rule cannot be resolved. Each Notification Server uses its own unique GUIDs to identify resources, so the destination is valid only on the source Notification Server. You need to update the replication rule to point to the correct destination Notification Server. See “About configuring replication” on page 107. To configure a replication rule 1 In the Symantec Management Console, on the Settings menu, click All Settings. 2 In the left pane, expand the Settings > Notification Server > Replication folder. Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform 3 In the Replication folder, do any of the following: Create a new replication rule Right-click the appropriate folder and click New > Replication Rule. The new rule appears in the folder and is selected automatically. Modify an existing replication rule Expand the appropriate folder, and then select the replication rule that you want to modify. Enable or disable a replication rule Expand the appropriate folder, and then right-click the replication rule and click Enable or Disable, whichever is appropriate. You can also enable or disable a rule in the Replication Rule page, by clicking the rule status (On/Off) icon to toggle the setting. Run a replication rule 4 Expand the appropriate folder, and then right-click the replication rule that you want to run and click Run. On the Replication Rule page, specify the appropriate settings. See “Replication rule settings” on page 111. 5 Click Save changes. Replication rule settings Some replication rule settings apply only to a particular rule type. See “About configuring replication” on page 107. See “Configuring replication rules” on page 110. Table 4-3 Replication rule settings Setting Description Rule name and description The first line of the page heading is the name of the replication rule. The second line of the page heading is its description. To change these, you can click the text to make it editable, and then type the rule name or description. 111 112 Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform Table 4-3 Replication rule settings (continued) Setting Description Rule status symbol The current status of the replication rule: ■ On (Green light) – The rule is active. ■ Off (Red light) –The rule is idle. You can click the symbol to toggle the status to its alternative setting. Resource Types Applies to resource replication rules and event replication rules. Resource Targets Specifies the resources that you want to replicate. These two options are alternatives. You can click the appropriate option to activate the one that you want: Resource Types Replicates the selected resource types. If you choose this option, you need to click Resource Types. In the Select Resource Type window, select the resource types that you want to include. ■ Resource Targets Replicates the selected resource targets. If you choose this option, you need to click Resource Targets. In the Select a Group window, select the resource targets that you want to include. ■ Data Classes Applies to resource replication rules only. If you want to specify particular data classes to include, you need to click Data Classes. In the Inventory Data Classes window, select the classes that you want. Event Classes Applies to event replication rules only. The event classes to include. To select these, click Event Classes and, in the Event Classes window, select the classes that you want. Items Applies to item replication rules only. The items to include in the replication rule. To select these, click Items and, in the Select Items window, select the items that you want. Roles Applies to security replication rules only. Privileges The roles or privileges to replicate, according to the rule type. These settings are alternatives and only the appropriate option is displayed on the page. To select these, click Roles/Privileges and, in the Select Roles/Privileges window, select the roles or privileges that you want. Destination The Notification Server computers to which the data is replicated. See “Specifying destination Notification Servers in a replication rule” on page 113. Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform Table 4-3 Replication rule settings (continued) Setting Description Credentials The credentials that are required to connect to the destination Notification Servers. Maximum Rows Applies to event replication rules only. Specifies the maximum number of table rows to replicate. Resend events that have been sent previously Applies to event replication rules only. Use this schedule In the drop-down list, select the schedule that you want to use. You should use this option if a destination server has recently purged its event classes or if you have experienced network problems between servers. If you select Custom Schedule, you need to click Define Custom Schedule and, in the Schedule Editor, specify the schedule parameters. Verify maximum of nn% of data during each replication Applies to resource replication rules only. To reduce the load that is imposed on the server, you can verify small amounts of resource data on every replication. You can specify a verification percentage in the replication rule. For example, if you verify 10% of the data for each replication, that ensures that all data has been verified after 10 replications. Specifying destination Notification Servers in a replication rule You need to specify the Notification Server computers to which a replication rule replicates data. This procedure is the same for all replication rule types. See “About configuring replication” on page 107. See “Configuring replication rules” on page 110. To specify the destination Notification Servers in a replication rule 1 In the Symantec Management Console, on the Settings menu, click All Settings. 2 In the left pane, expand the Settings > Notification Server > Replication folder. 3 In the Replication folder, click the replication rule you want to edit. 4 On the Replication Rule page, click Specified Notification Servers. 5 In the Notification Servers window, in the Available Notification Servers list, select the appropriate destination Notification Servers. 6 If necessary, you can add new Notification Servers to the list, or modify existing Notification Servers. 113 114 Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform 7 Click Save changes. The selected Notification Servers are listed in the Destination field. Overriding the hierarchy differential replication schedule The Notification Server computers in a hierarchy are normally synchronized according to the replication schedule that is set up in the replication rules. If necessary, you can manually override the differential replication schedule for your Notification Server and trigger the hierarchy replication rules immediately. It triggers the hierarchy differential schedule to the selected child node. Any hierarchy replication rules that are set to run on the differential schedule is run immediately. Any rules that are set to run on custom schedules are not triggered to run at the time. You can manually replicate data to your Notification Server from a remote parent or child Notification Server only. You cannot manually override replication to a remote Notification Server. You can only perform an operation that affects your Notification Server. You can log on to a remote Notification Server to make it your Notification Server, and manually override the differential replication schedules on its parent or its child Notification Servers. See “About hierarchy replication” on page 106. To override the hierarchy differential replication schedule 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Hierarchy. 2 On the Hierarchy Management page, on the Topology tab, right-click the Notification Server computer from which you want to replicate data. 3 Click Hierarchy > Replicate To.... This option triggers the hierarchy replication rules that point to the local (currently logged on) Notification Server. You cannot replicate data from the remote Notification Server to any other remote servers. 4 In the confirmation dialog box, click OK. Replicating selected data manually You can override the replication rules for your Notification Server by performing a manual hierarchy replication of a particular folder or item. Manual replication replicates the selected data to the child Notification Servers immediately. The data is replicated regardless of the replication schedules or whether the data is included in the replication rules. See “About hierarchy replication” on page 106. Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform To manually replicate selected data from your Notification Server 1 In the Symantec Management Console, in the left pane, right-click the folder or item that you want to replicate. If you select a folder, the replication includes all of its content (all levels of subfolders and items that it contains). Any parent folders (but not their contents) are also replicated to preserve the folder paths within the structure. 2 Click Hierarchy > Replicate Now.... 3 In the confirmation dialog box, click OK. Running a hierarchy report Some hierarchy reports are supplied with Notification Server, and solutions may provide additional reports. You can run a report on any Notification Server in the hierarchy to extract data from its CMDB. You may want to update the summary data prior to running a hierarchy report. You can update the summary data on demand or schedule updates. Some installed solutions may supply hierarchy federated reports. These reports summarize the relevant data across the hierarchy, and the results contain a single line for each Notification Server. You can run the full report on a particular Notification Server by double-clicking on the appropriate line. To run a hierarchy report 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Hierarchy. 2 On the Hierarchy Management page, on the Topology tab, right-click the Notification Server computer on which you want to run a report. 3 Click Reports and click the appropriate report. 4 In the report page, specify any parameters that you want to use, and refresh the report. 115 116 Reference of topics about multi-Notification Server environments Replication types in the Symantec Management Platform Section 2 Implementing IT Management Suite ■ Chapter 5. Performance and scalability recommendations for IT Management Suite ■ Chapter 6. Preparing for the installation of IT Management Suite ■ Chapter 7. Installing IT Management Suite ■ Chapter 8. Installing the Deployment Solution ■ Chapter 9. Configuring Notification Server ■ Chapter 10. Setting up managed computers ■ Chapter 11. Configuring security ■ Chapter 12. Configuring Schedules ■ Chapter 13. Configuring site servers ■ Chapter 14. Getting started with IT Management Suite 118 Chapter 5 Performance and scalability recommendations for IT Management Suite This chapter includes the following topics: ■ Symantec Management Platform performance factors ■ Recommended ranges of component totals for IT Management Suite 7.1 ■ Recommended IT Management Suite 7.1 hardware ■ Recommended configuration for Notification Server with locally installed SQL database ■ Supported operating systems for Notification Server and site servers ■ SQL Server recommendations and third-party software requirements Symantec Management Platform performance factors Many factors influence the performance of your infrastructure. The following are some of the common items that influence performance: See “About tuning the SQL Server computer for performance” on page 120. See “About tuning the Symantec Management Agent for performance” on page 124. See “About tuning Notification Server Event processing for performance” on page 120. 120 Performance and scalability recommendations for IT Management Suite Symantec Management Platform performance factors About tuning the SQL Server computer for performance The throughput of the SQL Server is a primary consideration for Symantec Management Platform performance. The configuration of SQL server and its hardware will influence overall performance. Most of the decisions you make that influence performance are related to architectural choices. For example, SQL Server will perform better if it is installed on a separate server from the Notification Server. This is referred to as installing SQL "off box." It offloads the work of data processing and frees resources for Notification Server processing. Another decision that influences SQL performance is to use high performance disks and to configure their RAID arrays appropriately. For more information about SQL Server setup see the following: See “About the Configuration Management Database” on page 39. See “About planning your SQL Server configuration” on page 55. See “Symantec Management Platform performance factors” on page 119. About tuning Notification Server Event processing for performance A notification sever event (NSE) is the standard mechanism by which Notification Server receives data. NSE processing directly influences performance on the Notification Server computer. The most direct method to influence the processing of NSEs is to adjust the volume and the frequency of your inventory gathering settings. You can also influence the processing of NSEs by adjusting the schedules for resource membership updates. See “Symantec Management Platform performance factors” on page 119. The following schedules influence the processing of NSEs: ■ Collect full inventory Full inventory lets you gather data about managed computers. It includes data about hardware, operating system, installed software, and file properties. This data is sent to Notification Server in the NSE format. Full inventory can be resource-intensive . The default schedule runs full inventory once per month. Best practice is to collect full inventory once a month during non-production hours. We do not recommend that you run full inventory more often than once a week, even in small environments. Custom inventory can be run more frequently and more efficiently than full inventory. Custom inventory lets you collect very specific data points. See “About predefined inventory policies” on page 121. ■ Collect delta inventory Delta inventory and Full inventory have similar resource consumption on managed computers. A delta inventory contains all the information that was Performance and scalability recommendations for IT Management Suite Symantec Management Platform performance factors added, removed, or changed since the previous inventory. The delta inventory file is smaller than the complete inventory file. Collect delta inventory can be run daily or weekly. You can improve the Symantec Management Console's UI performance if collect delta inventory is run during non-production hours. We recommend that you run delta inventory weekly rather than every day for environments with more than 10,000 clients per Notification Server. Environments with less than 10,000 clients can consider a daily delta inventory schedule. Delta inventory cannot track removed software. Only full inventory tracks removed software. See “About predefined inventory policies” on page 121. ■ Resource membership updates. The resource membership update schedules determine how accurate and current your resource filters, organizational groups, and resource targets are. Notification Server has three resource membership update schedules:the complete update schedule, the delta updates schedule, and the policy update schedule. The more frequently resource membership updates run, the less latency there is on updates or remediation. However, when resource membership updates run, Notification Server must read and analyze the data in the CMDB. When Notification Server runs resource membership updates, computing resources are consumed. An example of how the resource membership update schedule can influence your day-to-day use is with assigning software from the Software Portal . Users that request software from the Software Portal must wait until after the delta resource memberships update completes. See “Scheduling resource membership updates” on page 123. About predefined inventory policies You can use predefined inventory policies to quickly start gathering inventory data. You can use the predefined policies as they are or modify them. If you want to modify a predefined policy, Symantec recommends that you clone the original policy and then modify the copy. To use inventory policies or tasks, you must install the Inventory Plug-in on target computers. 121 122 Performance and scalability recommendations for IT Management Suite Symantec Management Platform performance factors Table 5-1 Predefined inventory policies and tasks Policy Enabled by Default default? schedule Default target Notes Collect Full Inventory Yes All computers with the Inventory Plug-in installed This policy collects a full inventory. By default it collects hardware and operating system, software, and file properties inventory data. Weekly, every Monday at 18:00 (6:00 P.M.) You can use this default to gather an initial inventory, and then again weekly. Even though this policy is enabled by default, you must install the Inventory Plug-in on target computers before inventory data is gathered. Collect Delta No Hardware Inventory Monthly, every first Monday at 18:00 (6:00 P.M.) All computers with the Inventory Plug-in installed By default, this policy collects only the hardware inventory data and the operating system inventory data that has changed since the last full hardware inventory. Collect Delta No Software Inventory Weekly, every Monday at 18:00 (6:00 P.M.) All computers with the Inventory Plug-in installed By default, this policy collects only the software inventory data that has changed since the last full software inventory. Collect Full Server Inventory (Inventory Pack for Servers required) Weekly, every Monday at 18:00 (6:00 P.M.) All computers with the Inventory Pack for Servers Plug-in installed This task only exists if the Inventory Pack for Servers product is installed. Weekly, every Monday at 18:00 (6:00 P.M.) All computers with the Inventory Pack for Servers Plug-in installed By default, this policy collects only the server applications inventory data that has changed since the last full server inventory. Yes Collect Delta No Server Inventory (Inventory Pack for Servers required) Even though this policy is enabled by default, you must install the Inventory Plug-in on target computers before inventory data is gathered. Performance and scalability recommendations for IT Management Suite Symantec Management Platform performance factors Scheduling resource membership updates You can keep all of your resource filters, organizational groups, and resource targets up to date by configuring the appropriate filter update schedules. These schedules let you update the filters, organizational groups, and targets that you need at suitable intervals. These schedules help you manage the processing load that is imposed on Notification Server. Predefined resource membership update schedules are supplied with the Symantec Management Platform. These schedules are suitable for most purposes and you should not need to change them. However, as the requirements of your organization change, you can make the necessary changes. Table 5-2 Schedule Resource membership update schedules Description Delta Update schedule Updates the membership of the following: Filters that have had membership changes since the last update. ■ All dynamic organizational groups. ■ ■ All invalid targets. A target may be invalidated by the following events: ■ Its definition is saved. ■ A filter that it uses has membership changes. An organizational group that it uses has membership changes. ■ The security that is applied to an organizational group that it uses changes. ■ By default, this schedule runs every five minutes. Complete Update schedule Completely re-creates the membership of all filters, organizational groups, and targets, regardless of inventory status or any changes to policies. The complete update may impose a significant load on Notification Server and should be scheduled accordingly. By default, this schedule once a day. Policy Update schedule Updates the membership of filters that a policy uses, if the policy has changed since the last update. This schedule ensures that when you update or create a policy, all the filters that are included in the new policy targets or modified policy targets are updated automatically. By default, this schedule runs every five minutes. 123 124 Performance and scalability recommendations for IT Management Suite Symantec Management Platform performance factors See “About Symantec Management Platform schedules” on page 269. See “Viewing the Notification Server internal schedule calendar” on page 276. To configure the resource membership update schedules 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Resource Membership Update. 2 On the Resource Membership Update page, configure the update schedules that you want to use. 3 If you want to run an update schedule immediately, in the appropriate panel, click Run. For example, you can ensure that all the changes to your filters take effect immediately, rather than waiting until the scheduled update. 4 Click OK. About tuning the Symantec Management Agent for performance The Symantec Management Agent has three general settings that can affect your Notification Server computer’s performance and network bandwidth usage. You can access these settings in the Symantec Management Console, in the Settings > Agents/Plug-in Settings > Targeted Agents Settings page. See “Targeted Agent Settings: General tab” on page 126. See “Symantec Management Platform performance factors” on page 119. The agent has the following general settings: ■ Download new configuration. This setting is the interval at which the Symantec Management Agent requests new policy information from Notification Server. Modifications to the setting influence your Notification Server computer's performance. The Symantec Management Agent communicates regularly with Notification Server to determine if it has work to do. This interval is the primary setting for agent communication time frames and determines how quickly work is delivered to managed computers. The more frequently your managed computers request a new configuration, the more total load is placed on the Notification Server computer’s resources and the network. The configuration request itself does not increase the load on Notification Server computer. Rather, the work that the Notification Server computer must do to respond to each request increases the load. You can change the request interval to adjust the total number of requests and the total volume of network traffic that is generated. Performance and scalability recommendations for IT Management Suite Symantec Management Platform performance factors The default request interval to download new configuration settings is one hour. A typical request generates approximately 3 kbits of network traffic For example, 5,000 managed computers make 120,000 total requests to Notification Server each day, totaling approximately 360,000 kbits of network traffic. However, by adjusting the setting to every two hours, you reduce the number of requests to 60,000. You also reduce the volume of network traffic to 180,000 kbits. This schedule halves the network traffic on the Notification Server computer; however, it also doubles the time between updates to the managed computers. Use the following guidelines to determine the appropriate value for the Symantec Management Agent configuration update interval: Number of managed computers Agent configuration update interval < 1,000 endpoints Every hour 1,000 to 5,000 endpoints Every hour 5,000 to 10,000 endpoints Every two hours 10,000 to 15,000 endpoints Every three hours 15,000 to 20,000 endpoints Every four hours ■ Upload basic inventory. This setting is the interval at which the Symantec Management Agent sends basic inventory to Notification Server. Notification Server uses the information to uniquely identify each managed computer. Basic inventory contains information such as a list of installed agent/plug-ins and the TCP/IP address. The default interval uploads basic inventory once a day. A typical basic inventory update is between 20 kbit and 25 kbit in size. ■ Compress events. This setting determines at what size Notification Server events are compressed before the agent sends them to Notification Server. If you increase this value, you reduce bandwidth load; however, you increase the use of CPU resources on managed computers and Notification Server. This increase occurs because the computers must compress and decompress the data before it can be processed. The recommended minimum size for compressing a Notification Server event is 200 KB. This setting balances bandwidth usage with CPU usage. For example, you may want to set a low value for the events that are sent from mobile computers. You can set a higher value for events on well-connected LAN computers. 125 126 Performance and scalability recommendations for IT Management Suite Symantec Management Platform performance factors Targeted Agent Settings: General tab The targeted agent general settings include the policy download and inventory collection frequencies, and whether to compress large events when sending them to Notification Server. You also need to specify the computers, users, or resource targets to which the targeted agent settings policy applies. Table 5-3 Settings on the General tab Setting Description Download new configuration The interval at which the Symantec Management Agent requests new policy information from Notification Server. The default and recommended interval is one hour. When you first set up your Notification Server, set this time to 1, 5, or 15 minutes. This setting lets you find out how Notification Server interacts with the Symantec Management Agents. This time should then be increased to suit the number of managed computers that you have. Upload basic inventory The interval at which the Symantec Management Agent sends basic inventory to Notification Server. The default interval is one day. You should adjust this value according to the number of managed computers in your organization. Compress events over Select this option to compress events when they are sent to Notification Server, and set the minimum size. The recommended minimum size is 200 KB, which is a compromise between bandwidth and CPU usage. The value you choose here is a trade-off between bandwidth usage and CPU usage on the server. For example, you may want to set a low value for the events that are sent from mobile computers. You can set a higher value for events on well-connected LAN computers. Applies to Displays the details of the resource targets, computers, or users to which the agent settings policy currently applies. You can set or change the policy target as appropriate. Recommended configuration settings based on managed endpoints This section displays recommendations for common configuration settings for the agent, inventory, resource membership updates, and the task service update schedule that can influence the performance of IT Management Suite. Performance and scalability recommendations for IT Management Suite Symantec Management Platform performance factors See “Symantec Management Platform performance factors” on page 119. Table 5-4 Setting Configuration settings based on number of managed endpoints < 1,000 endpoints 1,000 5,000 endpoints 5,000 10,000 endpoints 10,000 15,000 endpoints > 15,000 endpoints Agent Every one configuration hour. schedule Every one hour. Every two hours. Every three hours. Every four hours. Full Inventory collection schedule Monthly. Monthly. Monthly. Monthly. Monthly. Delta Inventory collection schedule Weekly. Weekly. Weekly. Weekly. Weekly. Full resource Daily membership update schedule Daily Daily Daily Daily. Delta resource membership update schedule Every 15 minutes. Every 20 minutes. Every 30 minutes. Every 45 minutes. Every one hour. Policy resource membership update schedule Every 15 minutes Every 20 minutes. Every 30 minutes. Every 45 minutes. Every one hour. Task Service update schedule Every 5 minutes. Every 5 minutes. Every 15 minutes. Every 15 minutes. Every 15 minutes. 127 128 Performance and scalability recommendations for IT Management Suite Recommended ranges of component totals for IT Management Suite 7.1 Recommended ranges of component totals for IT Management Suite 7.1 The following information is based on IT Management Suite 7.1 scalability testing in a 1x6x20k hierarchy configuration. See “Recommended IT Management Suite 7.1 hardware” on page 129. See “About planning your site servers” on page 62. Table 5-5 Ranges of recommended component totals for IT Management Suite 7.1 Components Range Managed computers per Notification Server. 1 - 20,000 Managed computers per package server.1 1 - 7,500 Managed computers per task server.2 1 - 7,500 Managed computers per deployment site server.3 1 - 7,500 Concurrent PXE sessions per deployment site server.3 200 Concurrent console sessions per Notification Server. 100 (75 managers + 25 Asset managers) Package servers per Notification Server. 1 - 500 Task servers per Notification Server. 1 - 300 Deployment site servers per Notification Server (requires local task service and local package service). 1 - 300 1This number depends on package use and frequency. The appropriate number for a specific architecture should be determined using Microsoft Windows file transfer speeds, because package servers are basically file servers. 2If you plan to use tasks excessively, this number needs to be lower due to the number of tasks to process. In this case, the client computer node count is secondary. 3Deployment Solution has a dependency on task services. As a result, this client computer number should match the task server number. However, care should be taken to not initiate deployment jobs on more than 200 clients per task server at a time. This scenario can have multiple constraints: ■ The disk speed of the task server hosting WinPE and the images. Performance and scalability recommendations for IT Management Suite Recommended IT Management Suite 7.1 hardware ■ The number of available IP addresses in a given DHCP scope for newly discovered computers. ■ The size of the image/s. Recommended IT Management Suite 7.1 hardware To determine your hardware requirements, use the recommendations in this topic. The following are general hardware recommendations for most environments with IT Management Suite 7.1. Depending on your specific circumstances, the appropriate hardware may vary. Note: These recommendations are NOT minimum specifications. Implementing them should ensure reasonable Notification Server performance for inventory collection and UI response times. IT Management Suite 7.1 hardware recommendations for Microsoft SQL Server Table 5-6 Component Proof of concept 100 - 1,000 endpoints 1,000 - 5,000 5,000 - 10,000 10,000 - 20,000 endpoints Processors One core Four cores Eight cores Eight cores Eight cores Disk Speed SAS 10k SAS 10k in SSD or SAS in high-performance RAID 10 disk array. configuration SAS 15k in SSD or SAS 15k high-performance equivalent in a disk array. high-performance disk array. Disk Capacity 80 GB 80 GB 120 GB 400 GB 400 GB RAM 16 GB 16 GB 24 GB 32 GB 48 GB Note: Running Microsoft SQL Server on virtual hardware is not recommended. Table 5-7 IT Management Suite 7.1 physical and virtual hardware recommendations for Notification Server Component Proof of concept 100 - 1,000 endpoints 1,000 - 5,000 5,000 - 10,000 10,000 - 20,000 Processors One core Eight cores Eight cores Eight cores Eight cores Disk Speed SAS 10k SAS 10k SAS 10k SAS 15k SAS 15k 129 130 Performance and scalability recommendations for IT Management Suite Recommended IT Management Suite 7.1 hardware IT Management Suite 7.1 physical and virtual hardware recommendations for Notification Server (continued) Table 5-7 Component Proof of concept 100 - 1,000 endpoints 1,000 - 5,000 5,000 - 10,000 10,000 - 20,000 Disk Capacity 80 GB 80 GB 80 GB 80 GB 80 GB RAM 12 GB 16 GB 16 GB 16 GB 16 GB Note: The services in the following three tables an be combined on one site server or deployed separately, depending on your environment. However, deployment site services always have to include task and package services on the same site server. Table 5-8 IT Management Suite 7.1 physical and virtual hardware recommendations for Task Server Component 10 - 100 endpoints 100 - 1,000 endpoints 1,000 - 5,000 5,000 - 7,500 Operating system Desktop operating system Server operating system Server operating system Server operating system Processors One core Two cores Four cores Four cores Disk Capacity 5 GB 5 GB 5 GB 5 GB RAM 4 GB 4 GB 4 GB 8 GB Table 5-9 IT Management Suite 7.1 physical and virtual hardware recommendations for package server Component 10 - 100 endpoints 100 - 1,000 endpoints 1,000 - 5,000 5,000 - 7,500 Operating system Desktop operating system Server operating system Server operating system Server operating system Processors One core Two cores Four cores Four cores Disk Capacity 100 GB - 250 GB 100 GB - 250 GB 100 GB - 250 GB 100 GB - 250 GB RAM 4 GB 4 GB 4 GB 4 GB Performance and scalability recommendations for IT Management Suite Recommended IT Management Suite 7.1 hardware Table 5-10 IT Management Suite 7.1 physical and virtual hardware recommendations for deployment site server Component 10 - 100 endpoints 100 - 1,000 endpoints 1,000 - 5,000 5,000 - 7,500 Operating system Desktop operating system Server operating system Server operating system Server operating system Processors One core Two cores Four cores Four cores Disk Capacity 100 - 250 GB 100 - 250 GB 100 - 250 GB 100 - 250 GB RAM 4 GB 4 GB 4 GB 8 GB Please take note of the following details: ■ All of the recommendations in this topic assume that you install SQL Server on a dedicated computer. ■ The primary influence on SQL performance is disk throughput. See “About hard drive configuration for off-box SQL Server” on page 56. See “About hard drive configuration for on-box SQL Server” on page 57. ■ Symantec does not recommend that you install SQL Server on a virtual computer. ■ Your Notification Server disk capacity requirements may increase depending on your specific strategy for storing Deployment Disk Images, Patch Management Bulletins, and your Software Library. ■ When Notification Server is installed on a virtual computer, the data loader show performance degradation (approximately 25%). ■ If you choose to install the task service and the package service on the same computer, increase your hardware to account for the additional load. ■ Site servers may use either a Windows workstation operating system or a Windows server operating system. Distributed and large environments may require numerous site servers to meet configuration management demands. Your primary consideration is the number of concurrent sessions that you need when you choose between a server operating system and a workstation operating system. Windows workstations are limited to 10 concurrent TCP connections sessions but Windows Server OS does not have the same limitation. A site with fewer than 100 endpoints may only require 10 sessions; however; a Windows server may be required for larger remote sites. ■ When a site server supports more than 7,500 managed computers, additional site servers should be used. 131 132 Performance and scalability recommendations for IT Management Suite Recommended configuration for Notification Server with locally installed SQL database ■ You might need to add more disk capacity, depending on your use case scenario. Recommended configuration for Notification Server with locally installed SQL database For environments with up to 5,000 managed computers, a Notification Server with a locally installed SQL database might perform adequately. However, this depends on the demands that are placed on it. Symantec Management Platform environments with SQL installed locally are also referred to as "on-box" SQL environments. See “About planning your SQL Server configuration” on page 55. See “About hard drive configuration for on-box SQL Server” on page 57. Installing the SQL database locally will not result in maximum performance, but it can deliver acceptable performance. To ensure maximum performance, you should still install SQL on a separate server class computer. Optimal configuration is especially important for on-box SQL environments. Performance is most noticeable with user interface responsiveness and the time it takes to collect computer inventory. Table 5-11 IT Management Suite 7.1 physical hardware recommendations for Notification Server with on-box SQL Component Proof of concept 1 - 5,000 endpoints Processors One core Eight cores Disk Speed SAS 10k RAID 10 or SSD Disk Capacity 80 GB 80 GB RAM 12 GB 32 GB Supported operating systems for Notification Server and site servers Symantec Management Platform 7.1 requires Windows Server 2008 R2 or Windows Server 2008 R2 SP1. However, the Symantec Management Platform can host middleware components on computers other than the Notification Server. These middle ware components support several operating systems. For more information on Symantec IT Management Suite platform support, see http://www.symantec.com/docs/HOWTO9965. Performance and scalability recommendations for IT Management Suite Supported operating systems for Notification Server and site servers The official name for a middleware component is a "site service." Any computer that hosts a site service is known as a site server. Examples of site services are package service and task service. A site server can have one or more site services installed on it. For example, if you install the package server site service (the "package service") onto a computer, that computer becomes a site server. Table 5-12 Supported operating systems for Notification Server Type of operating system Supported operating system Microsoft Windows server Windows Server 2008 R2 and Windows Server 2008 R2 SP1. Windows Server 2008 R2 requires a 64-bit computer. If you migrate to Symantec Management Platform 7.1, Symantec recommends that you migrate on a new computer. Virtual Host VMware ESX 3.5, 4.0, and 5.0 Microsoft Hyper-V Server 2008 R2 Site servers can use either a Windows workstation operating system or a Windows server operating system. A site server with a package service installed can also use a Linux server operating system. Distributed and large environments may require numerous site servers to meet configuration management demands. Notification Server makes sure that the site service is installed only on the computers that satisfy the minimum requirements. Your primary consideration is the number of concurrent sessions that you need when you choose between a server operating system and a workstation operating system. A Windows workstation is limited to 10 concurrent TCP connections and a server operating system does not have the same limitations. A site with fewer than 100 endpoints may only require 10 sessions. However, a Windows server may be required for larger remote sites. See “About planning your site servers” on page 62. 133 134 Performance and scalability recommendations for IT Management Suite Supported operating systems for Notification Server and site servers Table 5-13 Supported operating systems for package service Type of operating system Supported operating system Microsoft Windows desktop Windows XP SP2 Windows XP SP3 Windows Vista SP1 Windows Vista SP2 Windows 7 Windows 7 SP1 Microsoft Windows server Windows Server 2003 SP2 Windows Server 2003 R2 SP2 Windows Server 2008 Windows Server 2008 SP2 Windows Server 2008 R2 and R2 SP1 Linux Desktops Red Hat Enterprise Linux WS 4 Novell SUSE Linux Desktop 10, 11, 11 SP1 Linux servers Red Hat Enterprise Linux AS 4 Red Hat Enterprise Linux ES 4 Red Hat Enterprise Linux Server 5.1, 5.2, 5.3, 5.4, 5.5, 5.6 Red Hat Enterprise Linux 6.0 Red Hat Enterprise Linux 6.0 Server Red Hat Enterprise Linux 6.1 Server Novell SUSE Linux Enterprise Server 10 Novell SUSE Linux Enterprise Server 11, 11 SP1 Performance and scalability recommendations for IT Management Suite SQL Server recommendations and third-party software requirements Table 5-14 Supported operating systems for task service Type of operating system Supported operating system Microsoft Windows desktop Windows XP SP2 Windows XP SP3 Windows Vista SP2 Windows 7 Windows 7 SP1 Microsoft Windows server Windows Server 2003 SP2 Windows Server 2003 R2 SP2 Windows Server 2008 Windows Server 2008 SP2 Windows Server 2008 R2, R2 SP1 See “Recommended IT Management Suite 7.1 hardware” on page 129. See “SQL Server recommendations and third-party software requirements” on page 135. SQL Server recommendations and third-party software requirements Symantec Management Platform 7.1 requires SQL Server either installed on-box or off-box. The version of SQL Server that you need depends on the number of endpoints that you manage. See “About planning your SQL Server configuration” on page 55. 135 136 Performance and scalability recommendations for IT Management Suite SQL Server recommendations and third-party software requirements Table 5-15 Proof of Concept 100-1,000 endpoints Symantec Management Platform 7.1 SQL Server recommendations 1,000 to 5,000 endpoints Microsoft SQL Server Microsoft SQL Server Microsoft SQL Server 2005 or 2008 Express 2005 or 2008 2005 or 2008 Standard Standard or or Enterprise Enterprise On-box SQL is On-box SQL is supported; off-box SQL supported; off-box is recommended. SQL is recommended. 5,000-10,000 endpoints 10,000-80,000 endpoints Microsoft SQL Server Microsoft SQL Server 2005 or 2008 2005 or 2008 Standard or Enterprise Enterprise Symantec Symantec recommends that you recommends that you host SQL server off host SQL server off box. box. See “About supported SQL Server collations” on page 141. The Symantec Management Platform products also require additional third-party software. See Table 5-16 on page 136. Table 5-16 Symantec Management Platform 7.1 required third-party software Software Purpose Adobe Flash Player 10 The Adobe Flash Player plug-in for Internet Explorer is required for the Resource Association Diagram in the Asset Management Suite. Adobe Reader Adobe Reader is required to open the PDFs of the user guides. AJAX 1.0 Ajax is used to enable asynchronous calls to allow for a dynamic user interface. For example, loading menus on demand and rendering on the fly. Ajax is fundamental to many of the user interface control behaviors — menus, grids, trees, lists, component art controls, etc. Microsoft Access 2010 OLEDB driver Data Connector requires this driver to be able to communicate with Access (.mdb) and Excel (.xls) files. Install the 64-bit version of the driver. Microsoft .NET 3.5 SP1 Symantec Management Platform depends on the Microsoft .NET framework. Microsoft IE 7, IE 8, or IE 9 (compatibility mode only) Microsoft Internet Explorer is the browser that supports the Symantec Management Console. Microsoft Silverlight 4.0 Silverlight is required for the First Time Setup page in the Symantec Management Console. Performance and scalability recommendations for IT Management Suite SQL Server recommendations and third-party software requirements Table 5-16 Software Symantec Management Platform 7.1 required third-party software (continued) Purpose Server Manager roles and role services Application Server role and IIS 6 Management Compatibility, ASP, and Web Server role services Note: If the required IIS Role Services are not installed, you are prompted to install them on the Install Readiness Check page. Sun Java Runtime 6 Java JRE is required for LiveState and Altiris Package Conversion. Java JRE is also required on any computer that remotely accesses the Symantec Management Console when the Software Library is used as the package source. See “Recommended IT Management Suite 7.1 hardware” on page 129. See “Supported operating systems for Notification Server and site servers” on page 132. 137 138 Performance and scalability recommendations for IT Management Suite SQL Server recommendations and third-party software requirements Chapter 6 Preparing for the installation of IT Management Suite This chapter includes the following topics: ■ About developing an installation plan ■ About the migration guides ■ About supported SQL Server collations ■ Considerations before you install Notification Server ■ Agent configuration considerations About developing an installation plan You use Symantec Installation Manager to install the Symantec Management Platform products. Before you install and run Symantec Installation Manager, you should develop an installation plan. For information about upgrading an existing Notification Server environment, see the documents at https://www-secure.symantec.com/ connect/articles/altiris-endpoint-management-migrations-and-upgrades-71. As you develop an installation plan, you should answer the following questions: ■ What type of installation should you perform? You must determine if the installation is a first-time installation or a migration from a previous version of the product. For both a first-time installation or a migration, you must also determine whether the computer can have an Internet 140 Preparing for the installation of IT Management Suite About the migration guides connection. Although the overall process for each of these types of installations is very similar, the type of installation affects how you install the product. See “About installing the Symantec Management Platform products” on page 146. See “Overview of the installation process” on page 147. ■ How many computers do you plan to manage with the Symantec Management Platform products? You configure the installation differently depending on the size of your environment. For example, in a large environment you would not install SQL Server on the same computer where you install the Symantec Management Platform products. ■ Does the computer meet the system requirements? During the installation process, Symantec Installation Manager performs a readiness check to determine if the computer is ready for the installation. However, this check only verifies that the computer meets the minimum requirements. Before you begin the installation, you should make sure that the computer meets the system requirements that are appropriate for your environment. ■ Is the installation for a production environment or for evaluation purposes? If you are an evaluator, you can quickly install and begin testing the products. In a production environment, Symantec recommends that you install the products in a test environment before you install them in a production environment. Use the test environment to evaluate and validate the Symantec Management Platform 7.1 functionality. Throughout the process, keep the test server available to test, troubleshoot, and validate hot fixes and updates. About the migration guides Testing offline solution The migration guides are intended to help you upgrade and migrate your infrastructure to version 7.1 SP2. Migration guide from version 6.x to 7.1 SP2 IT Management Suite Migration Guide 6x to 7.1 SP2 Migration guide from version 7.0 to 7.1 SP2 IT Management Suite Migration Guide 7.0 to 7.1 SP2 The guides include information about the following categories of information: ■ Migration wizard instructions Preparing for the installation of IT Management Suite About supported SQL Server collations This release includes a tool that is called the migration wizard. Migration wizard is designed to automate the gathering of data from your previous system so you can bring it into your new system. When you run the wizard, it gathers this data and stores it in a file. After you install version 7.1 SP2 you can use the wizard to import the data in this file into your new system. ■ Manual data migration instructions Some data is not stored in your current installed database. The data migration wizard is unable to locate and migrate this data. You must manually copy this data from its previous location to its new equivalent location. After the data has been moved there may be additional steps you must take to make that data function in your new environment. Note: Notification Server was renamed Symantec Management Platform (SMP) on December 03, 2010. All previously categorized articles and references that are listed as Notification Server are now found under Symantec Management Platform. This document lists all Notification Server references for 7.1 as Symantec Management Platform. It lists version 6.0 of the comparable architectural objects by their previous names (Notification Server 6.0, etc.) About supported SQL Server collations Symantec Management Platform supports the following SQL Server collations: ■ Latin1_General_BIN - Legacy binary format ■ Latin1_General_BIN2 - Binary format ■ Latin1_General_CI_AI - Latin (“normal”) alphabet, case insensitive, accent insensitive ■ Latin1_General_CI_AS - Latin alphabet, case insensitive, accent sensitive ■ Latin1_General_CS_AI - Latin alphabet, case sensitive, accent insensitive ■ Latin1_General_CS_AS - Latin alphabet, case sensitive, accent sensitive Considerations before you install Notification Server Before you install and run Symantec Installation Manager, you should develop an installation plan. As you develop a Notification Server installation plan, answer the following questions: ■ What type of installation should you perform? 141 142 Preparing for the installation of IT Management Suite Agent configuration considerations You must determine if the installation is a first-time installation or an upgrade. For both a first-time installation and an upgrade, you must also determine whether the computer can have an Internet connection. Although the overall process for each of these types of installations is very similar, the type of installation affects how you install the product. ■ How many computers do you plan to manage with the Symantec Management Platform products? You configure the installation differently depending on the size of your environment. For example, in a large environment you would not install SQL Server on the same computer where you install the Symantec Management Platform products. ■ Does the computer meet the system requirements? During the installation process, Symantec Installation Manager performs a readiness check to determine if the computer is ready for the installation. However, this check only verifies that the computer meets the minimum requirements. Before you begin the installation, you should make sure the computer meets the system requirements that are appropriate for your environment. ■ Is the installation for a production environment or for an evaluation environment If you are an evaluator, you can quickly install and begin testing the products. In a production environment, Symantec recommends that you install the products in a test environment before you install them in a production environment. Agent configuration considerations The default agent configuration settings are suitable for a small Notification Server environment. As your environment grows, or if your organization has particular requirements, you need to make the appropriate configuration changes. Some configuration options to consider are as follows: ■ Enable Power Management settings if you need to turn managed computers on for any solution tasks. ■ Clone the default policies and divide the targeted systems between these policies in larger environments. ■ Make sure that each managed node has a single Symantec Management Agent policy applied. ■ Increase the agent communication parameters as node count increases. A general rule of thumb may be one hour for every 2,500 nodes. Preparing for the installation of IT Management Suite Agent configuration considerations ■ Use bandwidth throttling where WAN or LAN links are slow. ■ To prevent server contention when a large number of managed computers turn on every day, set the communication startup delay to one hour . ■ The All site servers policy influences the site servers throughout the environment. This policy should be set to communicate regularly with Notification Server and receive updates with a reduced bandwidth throttle. ■ The All Windows Mobile policy influences all workstations which primarily connect to the network by a WAN/VPN connection. Set the policy to communicate with Notification Server every hour to help these systems to receive and download packages. Set the agent to not download packages if the available bandwidth is less than 100Kb/sec. ■ Do not use non-ASCII characters in the files and the directory names when you configure installation settings. ■ The Default installation of Notification Server has no maintenance window policies enabled. ■ When multiple maintenance window policies are applied to a computer, task execution is permitted during any available window. The agent checks to see if any windows are “activated” at the time of the scheduled execution. Do not run a large distribution of the Symantec Management Agent during implementation. A best practice is to create specific filters to call a small subset of the systems that need an agent. You can build in dynamic elements to remove the computers from the filter after the agent is installed. 143 144 Preparing for the installation of IT Management Suite Agent configuration considerations Chapter 7 Installing IT Management Suite This chapter includes the following topics: ■ About installing the Symantec Management Platform products ■ Overview of the installation process ■ Managing the installation of the Symantec Management Platform products ■ Installing the Symantec Management Platform products ■ About installation tasks you can perform after the initial installation ■ About modifying the installation of a product ■ Adding a product listing file ■ Updating the product listing ■ About upgrading from IT Management Suite 7.1 to 7.1 SP2 ■ Upgrading from IT Management Suite 7.1 to 7.1 SP2 ■ Preparing to upgrade from IT Management Suite 7.1 to 7.1 SP2 ■ Performing an upgrade to IT Management Suite 7.1 SP2 146 Installing IT Management Suite About installing the Symantec Management Platform products About installing the Symantec Management Platform products You use Symantec Installation Manager to install the Symantec Management Platform products. Symantec Installation Manager manages the entire installation process including licensing, data migration, and updates. See “Overview of the installation process” on page 147. The following types of installations can be performed with Symantec Installation Manager: ■ First-time installation A first-time installation is for anyone who currently does not have Notification Server 6.x or Symantec Management Platform 7.x installed. See “Installing the Symantec Management Platform products” on page 158. ■ On-box upgrade You can do an on-box upgrade if you are moving from ITMS 7.1 or 7.1 SP1 to ITMS 7.1 SP2. You need to use the same hardware, server operating system, and CMDB that you are currently using. See “About upgrading from IT Management Suite 7.1 to 7.1 SP2 ” on page 179. ■ Off-box migration An off-box migration installs the Symantec Management Platform 7.1 products on a new computer. After you install Symantec Management Platform 7.1, you can migrate Notification Server 6.x or 7.0 data to the 7.1 Notification Server. How you migrate data and the data that is migrated depends on whether you are currently on Notification Server 6.x or Symantec Management Platform 7.0. For more information, see the Altiris IT Management Suite from Symantec Migration Guide version 6x to 7.1 SP1 or the Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP1. Note: If your current Notification Server is installed on a 64-bit server, you can install the Symantec Management Platform 7.1 products on that computer. However, before you install the Windows 2008 R2 operating system, you must complete all of the required migration steps. Because the risk is high that some of these migration steps might not complete successfully, Symantec discourages the reuse of the current server. For more information about installing the Symantec Management Platform 7.1 products on your current Notification Server, see HOWTO32427. ■ Offline installation Installing IT Management Suite Overview of the installation process An offline installation installs the Symantec Management Platform 7.x products on a computer that does not have an Internet connection. An offline installation can be a first-time installation or a migration. To perform an offline installation, you have to create an installation package. To create the installation package, you use Symantec Installation Manager on a computer that has an Internet connection. You then run the installation package on the computer that does not have an Internet connection. See “Creating an installation package” on page 156. After you install Symantec Management Platform and the products that run on the platform, you use Symantec Installation Manager to perform additional installation tasks. These tasks include updating installed products, adding products, applying licenses to products, installing optional components, creating support packages, reconfiguring installed products, and repairing installations. See “About installation tasks you can perform after the initial installation” on page 166. Overview of the installation process Symantec Installation Manager manages the installation of the Symantec Management Platform products. As Symantec Installation Manager works through the installation process, it manages different types of tasks. See “Managing the installation of the Symantec Management Platform products” on page 148. See “About installing the Symantec Management Platform products” on page 146. Note: Symantec recommends that you install and test Symantec Management Platform in a test environment before you install it in a production environment. Table 7-1 Overview of the installation process Type of task Description Preinstallation When you run Symantec Installation Manager, a wizard walks you through a set of preinstallation tasks. These tasks configure the installation, Notification Server, and the SQL Server. See “Starting Symantec Installation Manager” on page 153. See “Installing the Symantec Management Platform products” on page 158. 147 148 Installing IT Management Suite Managing the installation of the Symantec Management Platform products Table 7-1 Overview of the installation process (continued) Type of task Description Installation After you complete the preinstallation tasks, Symantec Installation Manager performs the following installation tasks: Installs the platform, the selected products, and the selected optional components. ■ Configures the installed products. ■ ■ Lets you apply licenses to the products. See “About installing optional components” on page 169. See “Applying licenses to a solution” on page 172. (Migration only) Data migration If you migrate to Symantec Management Platform 7.1, you can also migrate the Notification Server 6.x or 7.0 data. How you migrate data and the data that is migrated depends on whether you are currently on Notification Server 6.x or Symantec Management Platform 7.0. When migrating from Symantec Management Platform 7.0, you can connect to the 7.0 database to migrate all of its data. You can also use the migration wizard to migrate data that is not in the database. When migrating from Notification Server 6.x, you have to create a new database. However, you can use the migration wizard to migrate a lot of the data that is in your Notification Server 6.x database. Most of the data that the migration wizard migrates is actionable although some of it is read-only. You can also migrate data that is not in the database. For more information, see the Altiris IT Management Suite from Symantec Migration Guide version 6x to 7.1 SP1 or the Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP1. Managing the installation of the Symantec Management Platform products You use Symantec Installation Manager to manage the installation of the Symantec Management Platform products. Symantec Installation Manager manages the entire installation process including licensing, data migration, and updates. See “About installing the Symantec Management Platform products” on page 146. Installing IT Management Suite Managing the installation of the Symantec Management Platform products See “Overview of the installation process” on page 147. Note: Symantec recommends that you install and test Symantec Management Platform 7.1 in a test environment before you install it in a production environment. Table 7-2 Process for managing the installation of the Symantec Management Platform products Step Action Description Step 1 Configure your system to meet the When you install Symantec Management Platform products, recommended system Symantec Installation Manager checks for the minimum system requirements. requirements. If the minimum system requirements are not met, it does not proceed with the installation. However, the minimum system requirements may not be sufficient for your environment. Before you install Symantec Management Platform products, you should determine what the recommended system requirements are for your environment and configure your system accordingly. The recommended system requirements primarily depend on the number of your managed endpoints. For more information, see the Altiris IT Management Suite from Symantec Planning and Implementation Guide at the following URL: http://www.symantec.com/docs/DOC4827 Step 2 Install Symantec Installation Manager. You install Symantec Installation Manager in one of the following ways: ■ Download and install it from http://www.symantec.com. ■ If the Symantec Management Platform product is distributed on a CD, install it from the CD. See “Installing Symantec Installation Manager” on page 151. Except for an offline installation, you install Symantec Installation Manager on the computer where you plan to install the Symantec Management Platform products. With an offline installation, you install Symantec Installation Manager and then use it to create an installation package. You then use the installation package to install Symantec Installation Manager and the Symantec Management Platform products on an offline computer. See “Creating an installation package” on page 156. 149 150 Installing IT Management Suite Managing the installation of the Symantec Management Platform products Table 7-2 Process for managing the installation of the Symantec Management Platform products (continued) Step Action Description Step 3 Install the Symantec Management You use Symantec Installation Manager to install the Symantec Platform products. Management Platform products. If the installation is a migration, Symantec Installation Manager manages this process as well. See “Installing the Symantec Management Platform products” on page 158. For more information, see the Altiris IT Management Suite from Symantec Migration Guide version 6x to 7.1 SP2 or the Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP2. By default, when the installation is complete the Symantec Management Console opens. It opens to the Getting Started Web part if the products you installed do not specify that a different page in the console should open. You can also access the Getting Started Web part if you click My Portal on the Home menu. The Getting Started Web part contains videos and links to the help topics that explain the key concepts and tasks of the platform. Step 4 (Migration only) Migrate When you migrate from Symantec Management Platform 7.0 to Notification Server 6.x or 7.0 data Symantec Management Platform 7.1, you can keep your 7.0 to the 7.1 computer. Notification Server database. You can also migrate data that is not in the database. When you migrate from Notification Server 6.x to Symantec Management Platform 7.1, you have to create a new database. However, you can migrate a lot of the data that is in your Notification Server 6.x database although some of the migrated data is read-only. You can also migrate data that is not in the database. For more information, see the Altiris IT Management Suite from Symantec Migration Guide version 6x to 7.1 SP2 at the following URL: http://www.symantec.com/docs/doc4742 or the Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP2 at the following URL:http://www.symantec.com/docs/doc4743. Installing IT Management Suite Managing the installation of the Symantec Management Platform products Table 7-2 Process for managing the installation of the Symantec Management Platform products (continued) Step Action Description Step 5 Perform installation tasks after After you install the Symantec Management Platform products, the initial installation of the you can use Symantec Installation Manager to perform the Symantec Management Platform following installation tasks: products. ■ Reconfigure installed products. ■ Update installed products. ■ Install new products. ■ Install optional components. ■ Apply licenses. ■ Repair broken installations. ■ Create a support package. ■ View installation logs. See “About installation tasks you can perform after the initial installation” on page 166. Installing Symantec Installation Manager Symantec Installation Manager manages the installation of the Symantec Management Platform products. Symantec Installation Manager manages the entire installation process, including licensing, data migration, and updates. See “About installing the Symantec Management Platform products” on page 146. Except for offline installations, you install Symantec Installation Manager on the computer where you plan to install the Symantec Management Platform products. With an offline installation, you install Symantec Installation Manager on a computer that has an Internet connection. You then use Symantec Installation Manager to create an installation package that you run on the computer that does not have an Internet connection. See “Creating an installation package” on page 156. If you migrate from Symantec Management Platform 7.0, use the same installation path for Symantec Installation Manager that you used on the 7.0 computer. For example, if the installation path is C:\Program Files on the 7.0 computer, then use C:\Program Files on the 7.1 computer. If the installation path is D:\Program Files on the 7.0 computer, then use D:\Program Files on the 7.1 computer. 151 152 Installing IT Management Suite Managing the installation of the Symantec Management Platform products Warning: If you change the installation path for Symantec Installation Manager from 7.0 to 7.1, you cannot upgrade the Symantec Management Agent and the agent plug-ins. We strongly recommend that you keep the installation path the same. To install Symantec Installation Manager 1 Run the Symantec Installation Manager EXE file. If a Symantec Management Platform product has a Software Download page at www.symantec.com/business/products/downloads, you download the Symantec Installation Manager EXE file from that page. Go to Infrastructure Operations and click the product’s Trialware link. When you click the option to Download Now on the Software Download page, the Symantec Installation Manager EXE file is downloaded. The name of the file is symantecinstallationmanagersetup.exe. If a Symantec Management Platform product is distributed on a CD, the EXE file runs from the CD. 2 If Microsoft Windows Installer 4.5 is not installed, click Yes in the dialog box that asks you to install it. After you click Yes, a Software Update Installation Wizard appears and walks you through the installation of Windows Installer 4.5. After you install Windows Installer, you may have to restart your computer. Microsoft Windows Installer 4.5 is a prerequisite for the installation of Symantec Installation Manager. 3 If Microsoft .NET Framework 3.5 SP1 is not installed, click Yes in the dialog box that asks you to install it. After you click Yes, a Welcome to Setup dialog box appears where you initiate the installation of .NET Framework. After you install .NET Framework, you may have to restart your computer. .NET Framework 3.5 SP1 is a prerequisite for the installation of Symantec Installation Manager. Installing IT Management Suite Managing the installation of the Symantec Management Platform products 4 If Microsoft SQL Server is not installed on the computer, in the dialog box that appears, click one of the following options: Yes Opens Web Platform Installer that installs Microsoft SQL Server 2008 Express. Before SQL Server Express is installed, a dialog box appears where you must select the authentication mode. Microsoft recommends the use of Windows Integrated Authentication mode. Symantec recommends that you always use a strong password with the authentication mode that you select. No Proceeds with the installation of Symantec Installation Manager without installing Microsoft SQL Server. Use this option when Microsoft SQL Server is installed off-box. Cancel Cancels the installation of Symantec Installation Manager. Use this option when you want to install Microsoft SQL Server Standard or Enterprise before installing Symantec Installation Manager. 5 In the Welcome dialog box, click Next. 6 In the License Agreement dialog box, check I accept the terms in the license agreement, and click Next. 7 In the Destination Folder dialog box, click Begin install to install the files in the default location. To install the files in a different location, click Browse, and specify a different location. 8 In the final dialog box, click Finish. By default, the Automatically launch Symantec Installation Manager option is selected on this page. This option opens Symantec Installation Manager to the Install New Products page. See “Overview of the installation process” on page 147. Starting Symantec Installation Manager After you use Symantec Installation Manager to install the Symantec Management Platform products, you then use Symantec Installation Manager to perform additional installation tasks. To perform these tasks, you must first start Symantec Installation Manager. See “Installing Symantec Installation Manager” on page 151. 153 154 Installing IT Management Suite Managing the installation of the Symantec Management Platform products See “About installation tasks you can perform after the initial installation” on page 166. When you start Symantec Installation Manager, if a new version is available, you are prompted to update to the new version. You can choose to update immediately or you can choose to delay the update. See “Delaying the update of Symantec Installation Manager” on page 154. To start Symantec Installation Manager ◆ On the Start menu, click All Programs > Symantec > Symantec Installation Manager > Symantec Installation Manager. Delaying the update of Symantec Installation Manager When you start Symantec Installation Manager, if a new version is available, you are prompted to update to the new version. You can choose to update immediately or you can choose to delay the update. For example, if the latest version must pass change control before you can use it, you might choose to delay the update. You can delay the update until the new version of Symantec Installation Manager is approved. See “Starting Symantec Installation Manager” on page 153. If you delay the update of Symantec Installation Manager, you do not lose any of its current functionality. However, Symantec Installation Manager is not able to update the product listing. An updated product listing contains the latest products and updates. If you do not update Symantec Installation Manager, you also cannot take advantage of any changes in the functionality of the updated version. Note: Symantec recommends that you update Symantec Installation Manager when an updated version is available. When you delay updating Symantec Installation Manager, you can specify when Symantec Installation Manager should remind you to perform the update. If you then start Symantec Installation Manager after the specified time has elapsed, you are again prompted to perform the update. Each time the prompt appears, you can update Symantec Installation Manager or delay the update. If the specified time to delay the update has not elapsed, you can update the product listing to begin the update process. See “Updating the product listing” on page 178. Installing IT Management Suite Managing the installation of the Symantec Management Platform products To delay the update of Symantec Installation Manager 1 When the Update Symantec Installation Manager dialog box appears, select when you want to be reminded to perform the update. This dialog box appears only when an updated version of Symantec Installation Manager is available. If you previously selected to delay the update, the dialog box does not appear until the delayed time expires. You can select to be reminded in one day, three days, one week, or one month. 2 Click OK. About creating an installation package To install the Symantec Management Platform products on a computer that does not have an Internet connection, you must create an installation package. The installation package that Symantec Installation Manager creates is a ZIP file. It contains the MSI files that are needed to install the products that you selected when you created the package. It also contains any licenses you purchased for the products. See “Creating an installation package” on page 156. You can use Symantec Installation Manager to create an installation package for 32-bit and for 64-bit operating systems. Symantec Management Platform 7.0 is a 32-bit platform, whereas Symantec Management Platform 7.1 is 64 bit.You create the same installation package for both versions. The product listing file (.pl.xml) in the ZIP file is a platform-neutral XML file. You can create an installation package even on a computer running an operating system that does not support the installation of Notification Server (the central component of the Symantec Management Platform). Only Microsoft Windows Server 2003 and Microsoft Windows Server 2008 platforms support the installation of Notification Server. Microsoft Windows XP and Windows 7 do not, but they do support Symantec Installation Manager. Note, however, that not all Symantec Installation Manager functionality is available on Windows XP (x86 and x64) and Windows 7 (x86 and x64). For an overview of the available functionality, please see the following table. Table 7-3 Available Symantec Installation Manager functionality OS where Symantec Installation Manager can be installed Available Symantec Installation Manager functionality MS Windows Server 2003 All SIM functionality MS Windows Server 2008 All SIM functionality 155 156 Installing IT Management Suite Managing the installation of the Symantec Management Platform products Table 7-3 Available Symantec Installation Manager functionality (continued) OS where Symantec Installation Manager can be installed Available Symantec Installation Manager functionality MS Windows XP Only the Create Installation Package link MS Windows 7 Only the Create Installation Package link Creating an installation package See “About creating an installation package” on page 155. To create an installation package 1 Install Symantec Installation Manager on any computer with Internet access. You use this installation of Symantec Installation Manager to create the installation package. See “Installing Symantec Installation Manager” on page 151. 2 Start Symantec Installation Manager. When you install Symantec Installation Manager, it starts by default. You can also start it manually. See “Starting Symantec Installation Manager” on page 153. 3 If the Install New Products page appears, click Cancel, and click Yes to confirm the cancellation. 4 On the Installed Products page, click Create installation package. 5 On the Products page, select the products to include in the package, specify the location for the ZIP file, and click Next. See “Install New Products page, Product Updates page, or Products page” on page 161. 6 On the Optional Installations page, check the optional components that you want to install and click Next. See “About installing optional components” on page 169. 7 On the End User License Agreement page, verify that the correct products were selected, check I accept the terms in the license agreements, and click Next. If you need to change the product selection, click Back twice. 8 On the Contact Information page, type the answers for the requested information, and click Next. Installing IT Management Suite Managing the installation of the Symantec Management Platform products 9 (Optional) On the Product Licensing page, apply licenses, and click Next. If you do not apply licenses, trial licenses are applied when the products are installed. You can use Symantec Installation Manager to apply licenses at any time. See “Applying licenses to a solution” on page 172. 10 On the Review Package Details page, review the information about the installation package, and click Begin build. The package is created and is saved in the location that is specified on this page. 11 On the Installation Package Complete page, click Finish. Creating an update installation package If you previously installed Symantec Management Platform products on a computer without an Internet connection, you created an installation package to install the products. See “Creating an installation package” on page 156. On Internet-connected servers, updates to Symantec Management Platform products automatically get flagged by Symantec Installation Manager. This functionality is not available if the computer is not connected to the Internet. Symantec Installation Manager does, however, let you export your product history as an .xml file. You then import this file to an Internet-connected computer. This import lets you create an installation package with only those products that need to get updated. To export your server's product history 1 Go to the Notification Server computer that is not connected to the Internet and whose installation package you want to update. 2 Go to Start > All Programs > Symantec > Symantec Installation Manager to start Symantec Installation Manager. 3 If the Install New Products page appears, click Cancel, and click Yes to confirm the cancellation. 4 On the Settings page, click Export Product History. 5 Save this history file (for example, history.xml) to a portable device or shared drive. 157 158 Installing IT Management Suite Installing the Symantec Management Platform products To import your server's product history 1 Go to the Symantec Management Platform computer that is connected to the Internet and used to create installation packages. 2 Launch Symantec Installation Manager. 3 If the Install New Products page appears, click Cancel, and click Yes to confirm the cancellation. 4 On the Installed New Products page, click Create installation package. 5 On the Products page, click Import Installed History to import the other server's history. 6 Browse to the location of the history file. 7 Click Open. 8 Mark all products you want to update and click Next. 9 Select optional components and click Next. 10 Accept the license agreements. 11 Fill in your contact information. 12 Click Begin build. Symantec Installation Manager now builds the installation package. 13 Click Finish. 14 Copy the installation package to the Notification Server computer without Internet connectivity. 15 Install Symantec Installation Manager and the Symantec Management Platform products. Installing the Symantec Management Platform products Symantec Installation Manager manages the entire installation process for the Symantec Management Platform products. See “About installing the Symantec Management Platform products” on page 146. See “Overview of the installation process” on page 147. Note: Symantec recommends that you install and test Symantec Management Platform in a test environment before you install it in a production environment. Installing IT Management Suite Installing the Symantec Management Platform products For an offline installation, you must create and run an installation package before you can install the Symantec Management Platform products. See “Creating an installation package” on page 156. The following procedure is for an initial installation that installs the Symantec Management Platform and any other products that are selected. After the initial installation, you also use Symantec Installation Manager to install updates or additional products. See “Installing a hotfix or an additional product” on page 167. To install the Symantec Management Platform products 1 Start Symantec Installation Manager. When you complete the installation of Symantec Installation Manager, it starts by default. You can also start it on the Start menu at All Programs > Symantec > Symantec Installation Manager > Symantec Installation Manager. See “Installing Symantec Installation Manager” on page 151. 2 On the Install New Products page, select the products to install, and click Next. See “Install New Products page, Product Updates page, or Products page” on page 161. Warning: When migrating from Symantec Management Platform 7.0, be sure to have exact product parity. This means you need to install at least the same equivalent products that you installed on the previous version of the platform. Failure to have exact product parity can result in the corruption of the database and the operating system when you connect to the 7.0 database. Before you begin migration, create a list of the products that you have currently installed. 3 On the Optional Installations page, select the optional components that you want to install and click Next. When migrating to Symantec Management Platform 7.1, be sure to select the option to install the migration wizard components. See “About installing optional components” on page 169. 4 On the Install Location Configuration page, select the drive on which you want to install Symantec Management Platform products. These products can be installed on a drive different from where Symantec Installation Manager is installed. 159 160 Installing IT Management Suite Installing the Symantec Management Platform products 5 On the End User License Agreement page, verify that the correct products were selected, check I accept the terms in the license agreements, and click Next. If you need to change the product selection, click Back twice. 6 On the Contact Information page, type the answers for the requested information, and click Next. 7 On the Install Readiness Check page, verify that the computer meets the minimum requirements, and click Next. See “Install Readiness Check page” on page 162. 8 On the Notification Server Configuration page, configure Notification Server, and click Next. See “Notification Server Configuration page” on page 163. 9 On the Database Configuration page, configure the database, and click Next. When migrating from Symantec Management Platform 7.0, connect to the restored 7.0 database. See “Database Configuration page” on page 165. 10 On the Review Installation Details page, verify the installation details, and click Begin install. The selected products are installed. Installing IT Management Suite Installing the Symantec Management Platform products 11 (Optional) On the Product Licensing page, apply licenses, and click Next. This page appears only when you initially install a product that requires a license. If you do not apply licenses, trial licenses are applied. You can use Symantec Installation Manager to apply licenses at any time. See “Applying licenses to a solution” on page 172. When migrating to Symantec Management Platform 7.1, you must first copy your product licenses to a location that is accessible from the 7.1 computer. For more information, see topics on migrating licenses in the Altiris IT Management Suite from Symantec Migration Guide version 6x to 7.1 SP1 or the Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP1. 12 On the Installation Complete page, click Finish. If you installed the migration wizard, Run Notification Server Migration Wizard is checked on the Installation Complete page. If Run Notification Server Migration Wizard is checked when you click Finish, a dialog box displays the instructions for migrating Notification Server 6.x or 7.0 data. For more information, see the Altiris IT Management Suite from Symantec Migration Guide version 6x to 7.1 SP2 or Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP2. Install New Products page, Product Updates page, or Products page These pages let you select the products to install, update, or include in an installation package. On each of these pages, the options for selecting the products are the same. You access these pages from the Installed Products page as follows: ■ The Install new products option lets you access the Install New Products page. See “Installing the Symantec Management Platform products” on page 158. ■ The View and install updates option lets you access the Product Updates page. See “Installing a hotfix or an additional product” on page 167. ■ The Create installation package option lets you access the Products page. See “Creating an installation package” on page 156. The Installed Products page also has the filtering and search options that appear on these product pages. 161 162 Installing IT Management Suite Installing the Symantec Management Platform products Table 7-4 Options on the product pages Option Description Filter by Defines what options appear in the Filter drop-down list. Filter Filters the products to display. The Filter by drop-down list defines the options that appear. Search Filters the displayed products. After you type a value, only the products with that value in their name or description appear. Product summary A summary of a product displays when you click a product name. Product check box A product is included in the installation when you check its check box. If you select a product that has one or more dependencies that are not checked, a dialog box appears that lists the dependencies. Click OK in the dialog box to install the dependencies. If you click Cancel, the check box for the product is also unchecked. Show all available versions Displays the previous versions of the products that are still available. Output location (Products page only) Displays the location of the ZIP file for the installation package. By default, the file is put on your desktop. Install Readiness Check page This page verifies whether the computer meets the minimum requirements for the installation. It also provides the recommended requirements for the installation. See “Installing the Symantec Management Platform products” on page 158. When a requirement is not met or includes a recommendation, a link in the requirement provides additional information or lets you install the required product. If a link does not let you install a required product, you must install the requirement yourself. After you install a requirement yourself, you can click Check install readiness again to recheck the readiness of your computer. A symbol precedes each installation requirement as follows: Installing IT Management Suite Installing the Symantec Management Platform products The requirement and any recommendations are met. The requirement is met and you can continue with the installation, but there are some recommendations to consider. The requirement is not met. Do not continue with the installation until you meet the requirement . Notification Server Configuration page This page lets you configure Notification Server credentials and its Web site and email settings. On this page, you must either import, select, or have Symantec Installation Manager create a security certificate. You also have the option to use HTTPS to access the Symantec Management Console. See “Installing the Symantec Management Platform products” on page 158. Table 7-5 Options on the Notification Server Configuration page Option Description User name The user name to access Notification Server. Include the domain name or use ./username or computername/username. The user name must be a Windows user with local administrator rights to the Notification Server computer. Password The password for the account. 163 164 Installing IT Management Suite Installing the Symantec Management Platform products Table 7-5 Options on the Notification Server Configuration page (continued) Option Description Web site The Web site for Notification Server. After you configure a Web site, the Refresh option lets you see the Web site in the drop-down list. After you configure a Web site, a Service Unavailable message may occur when you click Next, if one or more of the following conditions is true: The Network Service account does not have Local Activation permissions to the Internet Information Services Admin service. ■ The ASP.NET worker process account on Notification Server does not have the correct file permissions. ■ Microsoft Windows SharePoint Services 3.0 is installed on the same Web site as Notification Server. ■ For more information, see the Microsoft knowledge base article 930461 that describes how to resolve these same issues for a different product. Fully Qualified Domain Name The Fully Qualified Domain Name must resolve to the same computer where Notification Server is installed. Certificate Provides the following options for supplying a certificate: Create self-signed When you click Next on this page, a dialog box appears that informs you that Symantec Installation Manager automatically creates a self-signed certificate. ■ Import This option lets you browse to a security certificate file and import it. ■ <Available certificate> When you select this option, a Select Certificate drop-down appears that displays the certificates that already exist on the computer. Select the certificate you want to use from the list. ■ You can click the Certificate Requirements link to see the minimum requirements for certificates that are supported by Symantec Management Platform. Installing IT Management Suite Installing the Symantec Management Platform products Table 7-5 Options on the Notification Server Configuration page (continued) Option Description Require HTTPS to access the (Optional) Requires the use of HTTPS to access the Symantec Management Platform Management Console. If you check this option, SSL port 443 is enabled and port 80 access is disabled. HTTP is unsecured and is subject to man-in-the-middle and eavesdropping attacks, which can let attackers gain access to Web site accounts and sensitive information. HTTPS is designed to withstand such attacks and is considered secure against such attacks. Configure my email information now (Optional) Lets you configure how Notification Server events are emailed. You must enter the DNS name or IP address of your SMTP server. If the server requires authentication, you must enter a valid user name and password. The Send Test Email option lets you verify that Notification Server sends the email to the correct address. You can also configure the email in the Symantec Management Console after you install the product. Database Configuration page This page lets you configure the Notification Server database. See “Installing the Symantec Management Platform products” on page 158. Table 7-6 Options on the Database Configuration page Option Description SQL Server name The name of the server that runs Microsoft SQL Server. You can install the Configuration Management Database to a specific SQL Server instance by entering the server name and SQL instance. Example: SQL server name\SQL instance. For the logon, you can use Windows authentication or SQL server authentication. The Browse for SQL on the Network button starts a search for a database. If you do not select this button, SIM does not search for databases (either local or on the network.) If you installed a SQL Express database through Symantec Installation Manager, this database automatically populates the SQL Server name field. 165 166 Installing IT Management Suite About installation tasks you can perform after the initial installation Table 7-6 Options on the Database Configuration page (continued) Option Description Database name The Create new option lets you create a new SQL database whose default name is Symantec_CMDB. You can change this name to one that better fits your environment. The Use existing option lets you reinstall the Symantec Management Platform products on a different computer and access the existing database. When you migrate from Symantec Management Platform 7.0, it also lets you access a restored 7.0 database. If you used SQL credentials, the Refresh option lets you view an existing database. For more information, see topics on restoring the Configuration Management Database in the Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP1. Database timeout The number of seconds before the database times out. You can increase this value if you generate reports with large amounts of data. About installation tasks you can perform after the initial installation After you use Symantec Installation Manager to install the Symantec Management Platform products, you can then use Symantec Installation Manager to perform the following tasks: ■ Reconfigure an installed product. See “Reconfiguring an installed product” on page 167. ■ Install updates or additional products. See “Installing a hotfix or an additional product” on page 167. ■ Install optional components. See “Installing optional components” on page 170. ■ Apply licenses to products. See “Applying licenses to a solution” on page 172. ■ Repair installations. See “Repairing the installation of an installed product” on page 173. ■ Uninstall products. See “Uninstalling the Symantec Management Platform products” on page 174. Installing IT Management Suite About installation tasks you can perform after the initial installation ■ Create a support package. See “Creating a support package” on page 174. ■ View installation logs See “About Symantec Installation Manager logs” on page 175. You initiate these tasks from the Installed Products page. Reconfiguring an installed product After Symantec Installation Manager installs the products that you selected, it configures those products. Normally, Symantec Installation Manager configures the installed products without any problems. However, sometimes Symantec Installation Manager can successfully install a product, but then be unable to configure the product successfully. This failure to configure a product successfully can have many causes. For example, a Web communication problem can cause the configuration to fail. If Symantec Installation Manager is unable to configure any products, a list of these unconfigured products appears at the end of the installation. You can then access these unconfigured products on the Installed Products page and attempt to reconfigure them. See “About installation tasks you can perform after the initial installation” on page 166. If you reconfigure a product and it is still not properly configured, uninstall and reinstall the product. If reinstalling a product does not resolve the problem, create a support package that you can send to support. See “Creating a support package” on page 174. To reconfigure an installed product 1 On the Installed Products page, in the list of Installed products, click the product that you want to reconfigure. 2 Click Reconfigure and click Yes on the dialog box that appears. If the option to reconfigure a product does not appear, the product is properly configured. The option to reconfigure a product appears only if a product is installed but not configured. 3 When the configuration is complete, click Finish on the Configuration complete page. Installing a hotfix or an additional product After you use Symantec Installation Manager to install the Symantec Management Platform products, you then use Symantec Installation Manager to install hot 167 168 Installing IT Management Suite About installation tasks you can perform after the initial installation fixes or additional products. The installation process is similar to an initial installation, but with fewer steps. When hot fixes for installed products are available, the text following View and install updates on the Installed Products page is green and displays the number of available updates. An update can be a hotfix or a service pack. To install a hotfix or add a product 1 Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. See “Installing Symantec Installation Manager” on page 151. 2 3 On the Installed Products page, click one of the following options: ■ View and install updates ■ Install new products If you clicked View and install updates, on the Product Updates page, select the updates to install, and click Next. See “Install New Products page, Product Updates page, or Products page” on page 161. 4 If you clicked Install new products, on the Install New Products page, select the products to install, and click Next. See “Install New Products page, Product Updates page, or Products page” on page 161. 5 On the Optional Installations page, check the optional components that you want to install and click Next. If an optional component is already installed, the option to install it is disabled. If no optional components are available, this page does not appear. See “About installing optional components” on page 169. 6 On the End User License Agreement page, verify that the correct products were selected, check I accept the terms in the license agreements, and click Next. If you need to change the product selection, click Back twice. 7 On the Contact Information page, click Next. 8 On the Review Installation Details page, verify the installation details, and click Begin install. The selected products are installed. Installing IT Management Suite About installation tasks you can perform after the initial installation 9 (Optional) On the Product Licensing page, apply licenses, and click Next. This page appears only when you add a new solution. If you do not apply licenses, trial licenses are applied. You can use Symantec Installation Manager to apply licenses at any time. See “Applying licenses to a solution” on page 172. 10 On the Installation Complete page, click Finish. About installing optional components Symantec Installation Manager has an Optional Installations page that lets you choose whether to install several components. These components are optional because you may not need them. If you do not need them, you can choose not to install them. If you do not install them, it reduces the installation time and the amount of space the installation uses on the computer. The Optional Installations page appears after you select a product on the Install New Products page and click Next. This page does not appear if no optional installations are available. You can also access the Optional Installations page at any time to install the optional components. See “Installing optional components” on page 170. The optional components that can appear on the Optional Installations page are as follows: ■ Install Documentation This option installs the documentation for any products that you selected and for any installed products that do not have installed documentation. ■ Install Language Support This option installs language packs for any products that you selected and for any installed products that do not have installed language packs. ■ Install Migration Wizard Components for migrating Notification Server data This option installs the migration wizard components that you use to migrate Notification Server 6.x or 7.0 data to Symantec Management Platform 7.1. You can install this option without installing any of the Symantec Management Platform products. 169 170 Installing IT Management Suite About installation tasks you can perform after the initial installation Note: If you install the Symantec Management Platform 7.1 products on your current Notification Server, you must migrate any Notification Server data before you upgrade the operating system. You can install Symantec Installation Manager on another computer and install only the migration wizard components on that computer. You can then copy the migration wizard installation package to your current Notification Server and migrate the Notification Server data. For more information about installing the Symantec Management Platform 7.1 products on your current Notification Server, see HOWTO32427. If a component is already installed, it is not enabled on the Optional Installations page except when you create an installation package. After you install an optional component, you can access it on the Installed Products page to uninstall or repair it. See “Uninstalling or repairing optional components” on page 171. Installing optional components Symantec Installation Manager has an Optional Installations page that lets you choose whether to install several components. See “About installing optional components” on page 169. When you install Symantec Management Platform products, the Optional Installations page appears if any of the optional components are not installed. You can also use Symantec Installation Manager to access the Optional Installations page at a later time to install any optional components that are not installed. The following procedure describes how to access this page at a later time to install optional components. See “Installing the Symantec Management Platform products” on page 158. To install optional components 1 Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. 2 On the Installed Products page, click Install optional components. 3 On the Optional Installations page, check the components that you want to install and click Next. 4 On the End User License Agreement page, check I accept the terms in the license agreements and click Next. 5 On the Contact Information page, click Next. Installing IT Management Suite About installation tasks you can perform after the initial installation 6 On the Review Installation Details page, verify the installation details, and click Begin install. 7 On the Installation Complete page, click Finish. If you installed the migration wizard, Run Notification Server Migration Wizard is checked on the Installation Complete page. If Run Notification Server Migration Wizard is checked when you click Finish, a dialog box displays the instructions for migrating the Notification Server 6.x or 7.0 data. For more information, see the Altiris IT Management Suite from Symantec Migration Guide version 6x to 7.1 SP1 or the Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP1. Uninstalling or repairing optional components Symantec Installation Manager has an Optional Installations page that lets you choose whether to install several components. If you install any of these optional components, you can also use Symantec Installation Manager to uninstall or repair them. See “About installing optional components” on page 169. See “Uninstalling the Symantec Management Platform products” on page 174. To uninstall or repair optional components 1 Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. 2 To display the optional components that are installed, on the Installed Products page, press Ctrl+Shift+O. If you press Ctrl+Shift+O again, the optional components are removed from the Installed Products page. 3 In the list of installed products, select the optional component that you want to uninstall or repair. An optional component has (Optional component) below its name. When you select an optional component, the Repair and Uninstall options appear. 4 5 To uninstall an optional component, complete the following steps: ■ Click Uninstall, and click Yes to confirm the removal of the product. ■ On the Uninstallation Complete page, click Finish. To repair an optional component, complete the following steps: ■ Click Repair. Windows Installer performs a repair of the installation. 171 172 Installing IT Management Suite About installation tasks you can perform after the initial installation ■ On the Repair Complete page, click Finish. Applying licenses to a solution When you purchase a Symantec Management Platform product, you receive license files for each solution. You use Symantec Installation Manager to apply the licenses. You can apply the licenses when you install a product or at a later time. When you apply licenses, you can add new licenses or update existing licenses. If you do not apply licenses, Symantec Installation Manager applies trial licenses. If you are connected to the Internet, it applies trial licenses that are good for at least 30 days. If you are not connected to the Internet, it applies seven-day trial licenses. When migrating to Symantec Management Platform 7.1, you must first copy your product licenses to a location that is accessible from the 7.1 computer. You then use Symantec Installation Manager to reapply the licenses. For more information, see the Altiris IT Management Suite from Symantec Migration Guide version 6x to 7.1 SP2 or the Altiris IT Management Suite from Symantec Migration Guide version 7.0 to 7.1 SP2. After a license is applied, it appears on the Product Licensing page of Symantec Installation Manager. If a license is expired, it still appears on the Product Licensing page. If a Symantec Management Platform 7.x solution has an expired license, it uses a trial license. Note: Because some Notification Server 6.x solutions bundle with other solutions on Symantec Management Platform 7.x, their licenses cannot be reused. To apply licenses to a solution 1 To apply licenses to a solution when you install it with Symantec Installation Manager, on the Product Licensing page, click Install licenses. The Product Licensing page appears after the product is installed. See “Installing the Symantec Management Platform products” on page 158. 2 To apply licenses to a solution at any time after you install it, complete the following steps: ■ Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. ■ On the Installed Products page, click Add/Update licenses. ■ On the Product Licensing page, click Install licenses. Installing IT Management Suite About installation tasks you can perform after the initial installation 3 In the Select License Files dialog box, select the license files to apply, and click Open. To select multiple licenses, press Ctrl when you select the license files. 4 Read the message that explains how the licenses affect the applicable products, and click Yes to proceed. 5 After you apply the licenses, on the Product Licensing page, click Next or Close. 6 On the dialog box that appears, click Restart services to restart the Notification Server services or Apply without restart to continue without restarting the services. If you restart the services, the licenses are applied immediately. If you do not restart the services, the licenses might not be applied for 30 or more minutes. This dialog box also has an Always perform this action when installing licenses option. If you check this option, the dialog box does not appear when you apply additional licenses and the action you select is always performed. 7 If you apply the licenses to a solution when you install it, the Installation Complete page appears. 8 If you apply the licenses to a solution at any time after you install it, the Installed Products page appears. Repairing the installation of an installed product You use Symantec Installation Manager to install the Symantec Management Platform products. You also use Symantec Installation Manager to repair the installation of any Symantec Management Platform product. Because all of the installation files are MSIs, Symantec Installation Manager invokes Windows Installer to repair an installation. If you have optional components installed, you can also repair them. See “Uninstalling or repairing optional components” on page 171. To repair the installation of an installed product 1 Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. 2 On the Installed Products page, select a product to repair. When you select a product, the Repair option appears. 173 174 Installing IT Management Suite About installation tasks you can perform after the initial installation 3 Click Repair. Windows Installer performs a repair of the installation. 4 On the Repair Complete page, click Finish. Creating a support package If you encounter problems with the installation of Symantec Management Platform products, you can create a support package that you can send to Symantec Support. The support package is a ZIP file that includes Notification Server logs, Symantec Installation Manager logs, installation history information, and registry information. Note: The option Enable Windows Installer logging in the Symantec Installation Manager's Settings dialog enables the creation of verbose logs. ("Verbose" is another word for "very detailed.") Verbose logs are valuable for troubleshooting and are enabled by default. See “Installing the Symantec Management Platform products” on page 158. See “About Symantec Installation Manager logs” on page 175. The name of the support package is support with the date and time appended. By default, the support package is created in the C:\Program Files\Altiris\Symantec Installation Manager\Support directory. To create a support package 1 Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. 2 On the Installed Products page, click Settings. 3 In the Settings dialog box, click Create Support Package. 4 To access the support package, in the dialog box that appears, check Open containing folder and click OK. Uninstalling the Symantec Management Platform products You can uninstall the Symantec Management Platform products with Symantec Installation Manager. Symantec Installation Manager lets you uninstall a specific product. If you uninstall the Symantec Management Platform, the platform and the other installed products are uninstalled. When you uninstall the platform with Symantec Installation Manager, Symantec Installation Manager is not uninstalled. Installing IT Management Suite About installation tasks you can perform after the initial installation You can also use Windows Add/Remove Programs to uninstall the Symantec Management Platform products. Add/Remove Programs uninstalls the platform, all installed products, and Symantec Installation Manager. If you used Symantec Installation Manager to uninstall the platform, you can use Add/Remove Programs to uninstall Symantec Installation Manager. If you have optional components installed, you can also uninstall them. See “Uninstalling or repairing optional components” on page 171. To uninstall products with Symantec Installation Manager 1 Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. 2 On the Installed Products page, select the product to uninstall. When you select a product, the Uninstall option appears. 3 Click Uninstall, and click Yes to confirm the removal of the product. The product is uninstalled from the Symantec Management Platform. The solution no longer appears in the console and all entries in the database are deleted. 4 On the Uninstallation Complete page, click Finish. To uninstall products with Add/Remove Programs 1 Access Windows Add/Remove Programs. 2 Click Symantec Platform and Solutions, and click Remove. If you uninstalled the Symantec Management Platform products with Symantec Installation Manager, this action uninstalls Symantec Installation Manager. About Symantec Installation Manager logs Symantec Installation Manager creates logs during its installation, repair, and uninstallation. It can create two types of logs: verbose and non-verbose. Verbose logs contain more detailed information about events and are thus more useful for troubleshooting. They can also affect performance by creating large log files. Non-verbose logs contain much less information, such as the event's timing and a minimal description. By default, verbose logging is enabled. When you create a Support package, logs are included in the package to facilitate troubleshooting. See “Viewing Symantec Installation Manager logs” on page 176. See “Creating a support package” on page 174. Types of logs include install logs, uninstall logs, and repair logs. 175 176 Installing IT Management Suite About installation tasks you can perform after the initial installation ■ Install logs detail what happens during the installation of all installed .msi files. ■ Uninstall logs list the uninstall behavior of all .msi files that were uninstalled. ■ Repair logs list what happened when a .msi file was repaired. The logs are stored in one of two locations: ■ Before Symantec Management Platform is installed, SIM logs are generated in the directory C:/Users/<username>/AppData/Local/temp/SIM Logs. (The user name refers to the user who installed Symantec Installation Manager.) Note that these logs stay in this location even after Symantec Management Platform is installed. ■ After the installation of the Symantec Management Platform, logs are generated, by default, in C:\ProgramData\Symantec\SMP\Logs\”. Disabling the creation of verbose Symantec Installation Manager logs Verbose logging is turned on by default in Symantec Installation Manager. Verbose logging is useful for troubleshotting purposes. However, it can create large log files and can slow down performance. If you decide that you want to disable it, follow these instructions. See “About Symantec Installation Manager logs” on page 175. See “Viewing Symantec Installation Manager logs” on page 176. To disable the creation of verbose logs 1 In Symantec Installation Manager, on the Installed Productsscreen, click Settings. 2 Uncheck the checkbox next to Enable Windows Installer logging. Viewing Symantec Installation Manager logs Symantec Installation Manager logs can give you and Symantec Support valuable information. You can view logs about any errors that happened during the installation, repair, or uninstallation of Symantec Installation Manager or the products it installs. Logs are placed in different locations based on whether Symantec Management Platform has been installed or not. See “About Symantec Installation Manager logs” on page 175. To view logs before the installation of Symantec Management Platform 1 Go to C:/Users/<username>/AppData/Local/temp/SIM Logs. 2 View the Symantec Installation Manager logs that were generated. Installing IT Management Suite About modifying the installation of a product Note: The user name in step 1 is the name of the user who installed Symantec Installation Manager. To view logs after the installation of the Symantec Management Platform and its products 1 The default location of these logs is C:/ProgramData/Symantec/SMP/Logs. 2 View the log or logs pertaining to the Symantec product you installed. About modifying the installation of a product In Symantec Installation Manager, when you select a product on the Installed Products page, a Modify option appears. At this time, the Modify option is disabled for all products. See “Repairing the installation of an installed product” on page 173. Adding a product listing file Symantec Installation Manager uses a product listing file to display a list of products that you can install. If you purchase a product that has its own product listing file, you must add that file to install the product. The default product listing file is symantec.pl.xml.zip. A product listing file can also be an uncompressed file. To add a product listing 1 Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. See “Installing Symantec Installation Manager” on page 151. 2 If the Install New Products page appears, click Cancel, and click Yes to confirm the cancellation. 3 On the Installed Products page, click Settings. 4 In the Settings dialog box, click Change product listing. 5 In the Manage Product Listings dialog box, click Add. 177 178 Installing IT Management Suite Updating the product listing 6 In the Add New Product Listing dialog box, specify the path to the new product listing file, and click OK. By default, the product listing file is refreshed daily. You can change this value to any value in the Refresh interval drop-down list. If the path requires a user name and password, specify them as well. See “Updating the product listing” on page 178. 7 In the Manage Product Listings dialog box, click OK. By default, the product listing file you added is selected in this dialog box. 8 In the Settings dialog box, click OK. The products from the new products listing file appear on the Install New Products page. Updating the product listing Symantec Installation Manager accesses a product listing file that lists the products you can install and update. By default, it updates the product listing file once a day. You can also manually update the product listing file at any time. You can also edit how frequently Symantec Installation Manager gets the latest product listing file. See “Adding a product listing file” on page 177. To update the product listing manually 1 Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. See “Installing Symantec Installation Manager” on page 151. 2 If the Install New Products page appears, click Cancel, and click Yes to confirm the cancellation. 3 On the Installed Products page, click Settings. 4 In the Settings dialog box, click Update now. To change when a product listing is updated 1 Start Symantec Installation Manager. See “Starting Symantec Installation Manager” on page 153. See “Installing Symantec Installation Manager” on page 151. 2 If the Install New Products page appears, click Cancel, and click Yes to confirm the cancellation. Installing IT Management Suite About upgrading from IT Management Suite 7.1 to 7.1 SP2 3 On the Installed Products page, click Settings. 4 In the Settings dialog box, click Change product listing. 5 In the Manage Product Listings dialog box, select the product listing, and click Edit. 6 In the Edit Product Listing dialog box, in the Refresh interval, select the time interval. About upgrading from IT Management Suite 7.1 to 7.1 SP2 To upgrade from IT Management Suite 7.1 or 7.1 SP1 to IT Management Suite SP2, you must perform an upgrade process. An upgrade is warranted under these circumstances: ■ Same server hardware (on box) ■ Same server operating system ■ Same IT Management Suite CMDB See “Upgrading from IT Management Suite 7.1 to 7.1 SP2” on page 180. To migrate from IT Management Suite 7.0 or 6.x to IT Management Suite SP2, you must perform a migration process. A migration is warranted under these circumstances: ■ New or consolidated hardware (off box) ■ Updated operating system ■ New CMDB ■ Moving from IT Management Suite 7.0 ■ Moving from IT Management Suite 6.x For migration instructions from 7.0 platforms to ITMS 7.1 SP2, see the Altiris™ IT Management Suite from Symantec™ Migration Guide version 7.0 to 7.1 SP2. For migration instructions from 6.x platforms, see the Altiris™ IT Management Suite from Symantec™ Migration Guide version 6x to 7.1 SP2. 179 180 Installing IT Management Suite Upgrading from IT Management Suite 7.1 to 7.1 SP2 Upgrading from IT Management Suite 7.1 to 7.1 SP2 You can upgrade from IT Management Suite 7.1 or 7.1 SP1 to IT Management Suite 7.1 SP2. An upgrade happens on box or on the same server hardware, as opposed to a migration, which involves migrating to new hardware. For more information on migration, see: ■ Altiris™ IT Management Suite from Symantec™ Migration Guide version 7.0 to 7.1 SP2 ■ Altiris™ IT Management Suite from Symantec™ Migration Guide version 6x to 7.1 SP2 Table 7-7 Process for upgrading to IT Management Suite 7.1 SP2 Step Action Description Step 1 Prepare to upgrade. Before you upgrade to IT Management Suite 7.1 SP2, you must prepare your environment. See “Preparing to upgrade from IT Management Suite 7.1 to 7.1 SP2” on page 180. Step 2 Perform the upgrade. After you prepare your environment, you can perform the upgrade. See “Performing an upgrade to IT Management Suite 7.1 SP2” on page 182. Preparing to upgrade from IT Management Suite 7.1 to 7.1 SP2 Before you can perform an upgrade to IT Management Suite 7.1 SP2, you must prepare for the upgrade. Preparing for the upgrade is a step in the process for upgrading to IT Management Suite 7.1 SP2. See “About upgrading from IT Management Suite 7.1 to 7.1 SP2 ” on page 179. Installing IT Management Suite Preparing to upgrade from IT Management Suite 7.1 to 7.1 SP2 To prepare for the upgrade 1 Back up the IT Management Suite server. 2 Back up the CMDB database. 3 In Symantec Management Console, click the Settings tab, and record the following configuration settings: ■ Task server settings under Task Settings ■ Agent communication settings underAgents/Plug-ins ■ Policy refresh settings under Notification Server > Resource and Data class Settings > Resource Membership Update ■ Membership update settings under Notification Server > Resource and Data class Settings > Resource Membership Update 4 If hierarchy and replication are enabled, disable them. For more information, see www.symantec.com/docs/HOWTO44016 . 5 In Symantec Management Console, click Reports > Notification Server Management > Server > Replication, and click Current Replication Activity. 6 Verify that the Current Replication Activity report is blank. If the report returns any results, you must wait until all replication activity has been completed before you perform the upgrade. 7 In Symantec Management Console, click Settings > Notification Server > Hierarchy > Hierarchy Management, and on the parent node, right-click and then select Edit. 8 Select the schedule tab, uncheck the schedules, and click Save. This action disables the complete and differential standard replication schedules to prevent replication rules from running while the upgrade is in progress. 9 In C:\ProgramData\ Symantec\SMP\EventQueue\, remove any existing NSE files from the "\bad" folders: ■ EvtInbox\bad ■ EvtQFast\bad ■ EvtQLarge\bad ■ EvtQSlow\bad ■ EvtQueue\bad 10 Open the Log Viewer in Start > All Programs > Symantec > Diagnostics > Altiris Log Viewer. 181 182 Installing IT Management Suite Performing an upgrade to IT Management Suite 7.1 SP2 11 Check Symantec logs for existing errors or warnings. If any errors or warnings are found, take note and try to resolve them before the upgrade. 12 Go to Start > All Programs > Accessories > System Tools > Task Scheduler > Microsoft. 13 Select the task NS package refresh and click Run. Now you can perform the upgrade according to the instructions in Performing an upgrade to IT Management Suite 7.1 SP2. Performing an upgrade to IT Management Suite 7.1 SP2 You must perform an upgrade if you move from IT Management Suite 7.1 or 7.1 SP1 on the same server hardware and configuration database. See “About upgrading from IT Management Suite 7.1 to 7.1 SP2 ” on page 179. To ensure that your upgrade runs without problems, you must first prepare your system for the upgrade. See “Preparing to upgrade from IT Management Suite 7.1 to 7.1 SP2” on page 180. To perform an upgrade to IT Management Suite 7.1 SP2 1 Launch Symantec Installation Manager in Start > All Programs > Symantec > Symantec Installation Manager. Right-click the Symantec Installation Manager icon and select Run as administrator. 2 To upgrade all installed products to IT Management Suite 7.1 SP2, select Install new products. Then select the checkboxes next to all IT Management Suite product suites that are currently installed. Warning: Do NOT use the option View and install updates to upgrade your system. This action may result in an unverified scenario. 3 In Symantec Management Console, click the Settings tab, and compare the configuration settings to the ones you recorded when you prepared to upgrade. See “Preparing to upgrade from IT Management Suite 7.1 to 7.1 SP2” on page 180. Revert to the settings you recorded to keep your system running as it did before the upgrade. Installing IT Management Suite Performing an upgrade to IT Management Suite 7.1 SP2 4 If you have hierarchy implemented in your environment, upgrade all the servers in the hierarchy. The supported method is to upgrade the Notification Servers in the hierarchy from the bottom up. This means that you should upgrade the lowest child node first and then work your way up. Ensure that each child Notification Server is upgraded to a higher version before its parent. You do not need to break any hierarchy relationships in the process. For more information, see www.symantec.com/docs/HOWTO21657. Then turn hierarchy and replication back on. 5 Open the Log Viewer at Start > All Programs > Symantec > Diagnostics > Altiris Log Viewer. 6 Check Symantec logs for errors or warnings and resolve them. 7 Perform a database defragmentation of the Symantec CMDB database. For more information, go to the Microsoft TechNet site. 183 184 Installing IT Management Suite Performing an upgrade to IT Management Suite 7.1 SP2 Chapter 8 Installing the Deployment Solution This chapter includes the following topics: ■ About installing Deployment Solution ■ Preinstallation requirements for Deployment Solution ■ Installing Deployment Solution components ■ Installing Deployment Plug-in ■ Installing an automation folder ■ Installing Deployment site server components ■ Installation path of Deployment Solution tools ■ Upgrading Deployment Solution components ■ Uninstalling Deployment Solution components ■ Enabling the uninstallation policy ■ Uninstalling Deployment Solution through Symantec Installation Manager ■ Repairing Deployment Solution About installing Deployment Solution Deployment Solution can only be installed on Symantec Management Platform. Symantec Management Platform has its own set of functionalities that are extended to all of the solutions and suites that are integrated with it. Hence, 186 Installing the Deployment Solution About installing Deployment Solution Deployment Solution also leverages the capabilities of Symantec Management Platform and provides you with a wider range of functionalities. After Deployment Solution is installed on Symantec Management Platform, you have to enable different predefined policies to complete Deployment Solution installation. These predefined policies install Deployment Plug-in, automation folder, and Deployment site server components. Deployment Solution provides several predefined policies for the Windows and Linux platforms. These predefined policies are related to installing, upgrading, and uninstalling different Deployment Solution installer components in your environment. Each predefined policy uses a filter that specifies the client computers that it affects. Also, policies update their targeted computers after those computers request any policy updates. The policies run on the specified client computers only when they are enabled. You can access each predefined policy by clicking the Settings menu and then expanding the Agents/Plug-ins and the Deployment and Migration folders. Table 8-1 Deployment Solution predefined installation policies Policy name Description Deployment Automation Folder - Install Installs the automation folder in the boot directory on the client computers. The automation folder lets you reboot the client computer to the preboot environment using WinPE or Linux PE. See “Installing an automation folder” on page 191. Deployment Automation Folder - Uninstall Uninstalls the automation folder that was previously installed. See “Enabling the uninstallation policy” on page 197. Deployment Automation Folder - Upgrade Upgrades the automation folder on the client computer, which requires the latest version of the automation folder. To upgrade automation folder from x86 to x64 on Windows client computers, you must first uninstall the automation folder for Windows x86. Then, reinstall the automation folder for Windows x64. See “Upgrading Deployment Solution components” on page 195. Installing the Deployment Solution About installing Deployment Solution Table 8-1 Deployment Solution predefined installation policies (continued) Policy name Description Deployment Plug-in - Install Installs the plug-in that performs the Deployment Solution tasks. See “Installing Deployment Plug-in” on page 190. Deployment Plug-in - Uninstall Uninstalls the Deployment Plug-in that was previously installed. See “Enabling the uninstallation policy” on page 197. Deployment Plug-in - Upgrade Upgrades the plug-in on the client computer, which requires the latest version of the plug-in. Deployment Plug-in upgrade is not supported for Linux operating system. See “Upgrading Deployment Solution components” on page 195. Deployment Site Server Components - Install Installs the Deployment site server components on the computers that have Symantec Management Platform or site server installed on them. Deployment site server components contain different tools, processes, and Deployment Solution Task Handlers that are required to perform deployment tasks and store packages. See “Installing Deployment site server components” on page 192. Deployment Site Server Components - Uninstall Uninstalls the site server components that were previously installed. See “Enabling the uninstallation policy” on page 197. Deployment Site Server Components - Upgrade Upgrades the site server component on the client computer, which requires the latest version of the site server component. See “Upgrading Deployment Solution components” on page 195. 187 188 Installing the Deployment Solution Preinstallation requirements for Deployment Solution See “Preinstallation requirements for Deployment Solution” on page 188. See “Installing Deployment Solution components” on page 189. Preinstallation requirements for Deployment Solution Before you start the Deployment Solution installation, you must verify the following: ■ Symantec Installation Manager (SIM) is installed. ■ Symantec Management Platform is installed. ■ Symantec Management Agent for UNIX and Windows is preinstalled on the client computers. ■ Symantec Management Agent for Unix, Linux, and MAC is installed if you plan to use UNIX and Mac client computers. ■ JRE 1.5 or later enabled browser is required. ■ Symantec Administrator Software Development Kit (SASDK) is installed if you plan to use the Web Services API. ■ Client computers have Pre-boot eXecution Environment (PXE) enabled on them. ■ DHCP is up and running with PXE support ■ Silverlight 4 is installed. ■ The storage and the network drivers in your environment are collected. ■ The remote site server is configured on the supported platform if you plan to manage clients in different subnet. For a remote site server to be configured, a package server and a task server should be installed on the supported platform. ■ The package server is installed on Symantec Management Platform and on all remote site servers. ■ DNS is properly configured. Clients computers inside different subnets should be able to ping to Symantec Management Platform and the remote site server using FQDN. See “Components of Deployment Solution” on page 76. Installing the Deployment Solution Installing Deployment Solution components Installing Deployment Solution components You can install Deployment Solution on Symantec Management Platform through Symantec Installation Manager (SIM). Symantec Installation Manager installs Symantec Management Platform and also provides options to install its suites and solutions. You can select the Deployment Solution option from the listed solutions. Symantec Installation Manager downloads the selected product from the product site and installs it on your server through an installation wizard. This installation wizard verifies the installation and guides you through the product installation. After Deployment Solution is installed on Symantec Management Platform, you have to enable different policies to complete the Deployment Solution installation. These policies install the Deployment Plug-in, the automation folder, and the Deployment site server components. For Linux, only x86 policies are supported for Deployment Plug-in and automation folder. Process for installing Deployment Solution components Table 8-2 Step Action Description Step 1 Install the Deployment plug-in. Enable the Deployment Plug-in - Install policy. The Deployment Plug-in is required to run and manage the deployment-specific tasks on the client computers. See “Installing Deployment Plug-in” on page 190. Ensure that you set proper filters while installing the Deployment Plug-in. So that 64-bit policy gets installed on 64 bit OS clients and 32-bit policies gets installed on 32 bit OS clients. Otherwise, the Install Windows OS task fails Step 2 Install the automation folder. Enable the Automation Folder - Install policy. The Automation folder is required to store the preboot configuration. See “Installing an automation folder” on page 191. Ensure that you set proper filters while installing the Automation Folder. So that 64-bit policy gets installed on 64 bit OS clients and 32-bit policies gets installed on 32 bit OS clients. Otherwise, the Install Windows OS task fails. 189 190 Installing the Deployment Solution Installing Deployment Plug-in Process for installing Deployment Solution components (continued) Table 8-2 Step Action Description Step 3 Install the Deployment site Enable the Deployment site server components server components, if Install policy. Enable this policy only if you have required. the remote site server installed on the Symantec Management Platform. Deployment site server components are required to offload some of the traffic to Symantec Management Platform. It is used for all deployment processes. See “Installing Deployment site server components” on page 192. See “About installing Deployment Solution” on page 185. See “Upgrading Deployment Solution components” on page 195. Installing Deployment Plug-in Deployment Solution is installed on Symantec Management Platform and Deployment Plug-in is a component of Deployment Solution. Deployment Plug-in is installed on client computers to manage deployment tasks. This plug-in enables you to create and deploy disk images, perform remote OS installation, change your system settings, and migrate the personality settings. Predefined policies to install, upgrade, and uninstall the Deployment plug-in are provided with Deployment Solution. It provides installation policies for 32-bit and 64-bit client computers. Hence, it supports Windows x64, Windows x86, and Linux x86. You can install the policy on your target computer. If you plan to install Deployment Plug-in on a Linux operating system that has a static IP environment, ensure that you have manually entered the site server's and Symantec Management Platform server's name, and their IP addresses in /etc/hosts file. You cannot install the Deployment Solution plug-in in a maintenance window by using the Run once ASAP in maintenance window only option. You are required to schedule the installation using the Add Schedule option. See “About installing Deployment Solution” on page 185. Installing the Deployment Solution Installing an automation folder To install Deployment Plug-in 1 In the Symantec Management Console, on the Settings menu, click Agent/Plug-ins > All Agents/Plug-ins. 2 In the left pane, expand the Agents/Plug-ins > Deployment and Migration folders. 3 Choose either a Linux or Windows installation and expand the corresponding folder. 4 Click the Deployment Plug-in - Install policy. 5 In the right pane, in the Program name box, ensure that the correct policy is selected. 6 Under Applied to, select the computers that you want to install the plug-in on. 7 (Optional) Under Schedule, select when you want to install the plug-in. 8 (Optional) Click Advanced to check if the computers you selected are available at the exact time that you scheduled. You can also select start and end dates on this page. 9 Under Extra schedule options, select the options that you want. 10 Ensure that the policy is enabled. A green On symbol shows in the top right corner. 11 Click Save changes. See “Installing Deployment Solution components” on page 189. Installing an automation folder An automation folder stores the preboot operating system. With the help of the preboot operating system (WinPE and Linux PE) the client computers are rebooted to the automation environment. Both the PXE server and the automation folder can be used to reboot the client computer to the automation environment to perform deployment tasks. Predefined policies to install, upgrade, and uninstall the automation folder are provided with Deployment Solution. The automation folder is supported on Windows x64, Windows x86, and Linux x86. You can create your own 64-bit automation packages and policies using the preboot configuration options. Ensure that proper filters are set while installing the Deployment Plug-in and Automation Folder. Ensure that a 64-bit policy gets installed on 64-bit clients and 32-bit policies gets installed on 32-bit clients. 191 192 Installing the Deployment Solution Installing Deployment site server components To install an automation folder 1 In the Symantec Management Console, on the Settings menu, click Agent/Plug-ins > All Agents/Plug-ins. 2 In the left pane, expand the Agents/Plug-ins > Deployment and Migration folders. 3 Choose either a Linux or Windows installation and expand the corresponding folder. 4 Click the Automation Folder - Install policy. 5 In the right pane, in the Program name box, ensure that the correct policy is selected. 6 Under Applied to, select the computers that you want to install the plug-in on. 7 Under Schedule, select when you want to install the plug-in. 8 (Optional) Click Advanced to check if the computers you selected are available at the exact time that you scheduled. You can also select start and end dates on this page. 9 Under Extra schedule options, select the options that you want. 10 Ensure that the policy is enabled. A green On symbol shows in the top right corner. 11 Click Save changes. See “Installing Deployment Plug-in” on page 190. Installing Deployment site server components Deployment site server component lets you offload some of the traffic and workload from your primary Symantec Management Platform. You can set up multiple task servers and Deployment site server components to handle your jobs and tasks. Symantec Management Agent then uses the assigned Deployment site server components for all deployment tasks. These tasks include imaging, scripted OS installation, copy file, and the tasks that are associated with packages. The tasks can be scheduled to run immediately or at a later specified time. This process improves scalability. See “About installing Deployment Solution” on page 185. Before installing the Deployment components on a site server, you should install the Package Service and Task Service on that site server. Installing the Deployment Solution Installing Deployment site server components The following are the supported operating systems for Deployment site server components: ■ Windows Server 2003 SP2 ■ Windows Server 2003 R2 SP2 ■ Windows Server 2008 ■ Windows Server 2008 R2 ■ Windows Server 2008 R2 SP1 For the Linux operating system, if there is no domain controller present in the environment, then ensure that the Agent Connectivity Credential (ACC) configuration is set up as expected. Also, ensure that ACC is enabled on every site server that is configured in the environment. Ensure that user credentials for site server and the Symantec Management Platform server are the same. See “Setting up ACC” on page 194. All Deployment computer images and Personality Packages are created on the task server that each managed computer works with. To deploy an image that was created on a different task server, you must replicate that image to your task server. You can replicate the image using the package replication that is contained in Symantec Management Platform. You can also configure specific replication rules for disk image packages. You must install the site server components before you can replicate packages, including driver packages. After the components are installed, your packages become valid and can then be replicated. You can uninstall and upgrade the components by choosing the appropriate policy. For more information, search for site server and task server topics in the Symantec Management Platform Help. To install Deployment site server components 1 In the Symantec Management Console, on the Settings menu, click Agent/Plug-ins > All Agents/Plug-ins. 2 In the left pane, expand the Agents/Plug-ins > Deployment and Migration > Windows folders. 3 Click the Deployment Site Server Components - Install policy. 4 In the right pane, in the Program name box, ensure that the correct policy is enabled. 5 (Optional) Under Schedule, select when you want to install the components. 193 194 Installing the Deployment Solution Installing Deployment site server components 6 (Optional) Click Advanced to check if the computers you selected are available at the exact time that you scheduled. 7 Under Extra schedule options, select the options that you want. 8 Ensure that the policy is enabled. A green On symbol shows in the top right corner. 9 Click Save changes. See “Setting up ACC” on page 194. Setting up ACC For Linux operating system if there is no domain controller present in the environment, then ensure that the Agent Connectivity Credential (ACC) configuration is set up as expected. Also, ensure that ACC is enabled on every site server that is configured in the environment. To set up ACC 1 In the Symantec Management Console, select Settings > Agent/Plug-in > Global settings. 2 Click the Authentication tab. 3 Select Use these credentials and enter the Symantec Management Platform user name and password. 4 Click Save changes. 5 In the Symantec Management Console, select Settings > Notification Server > Site Server Settings. 6 On the right pane, expand Site Management > Settings > Package Service > Package Service Settings. 7 On the left pane, under Security Settings select Create the Agent Connectivity Credential on Package Servers (provided the ACC is not a domain account) check box. 8 Click Save changes. After the site server retrieves the updated policies from Notification Server, an ACC account is created on the site server for package download and task server connectivity. See “Installing Deployment site server components” on page 192. Installing the Deployment Solution Installation path of Deployment Solution tools Installation path of Deployment Solution tools Deployment Solution includes many of the tools that you might have used in the traditional Deployment Solution product. The main Deployment Solution tools are installed in the following default installation locations on the Windows platform: ■ PC Transplant Editor C:\Program Files\Altiris\Altiris Agent\Agents\Deployment\Task Handler\PCT\PCTEdit.exe ■ PC Transplant Wizard C:\Program Files\Altiris\Altiris Agent\Agents\Deployment\Task Handler\PCT\PCTWiz.exe ■ Boot Disk Creator C:\Program Files\Altiris\Altiris Agent\Agents\Deployment\Task Handler\bootwiz.exe ■ RapiDeploy ImageExplorer C:\Program Files\Altiris\Altiris Agent\Agents\Deployment\Task Handler\rdeploy\imgexpl.exe ■ Ghost Image Explorer C:\Program Files\Altiris\Altiris Agent\Agents\Deployment\Task Handler\ghost\Ghostexp.exe ■ Image Importer C:\Program Files\Altiris\Altiris Agent\Agents\Deployment\Task Handler\Tools\ResourceImporterTool.exe See “Components of Deployment Solution” on page 76. Upgrading Deployment Solution components You can upgrade the Deployment Plug-in, Automation Folder, and Deployment site server components to the latest version by using the upgrade policy. By default, this policy is turned off. The Deployment Plug-in upgrade is not supported in the Linux operating system. The upgrade policy uses filters to determine if an upgrade is necessary. You can access the filters that are used from the Manage > Filters > Software Filters > Agent and Plug-in Filters menu. See “About installing Deployment Solution” on page 185. 195 196 Installing the Deployment Solution Uninstalling Deployment Solution components To upgrade Deployment Solution components 1 In the Symantec Management Console, on the Settings menu, click Agent/Plug-ins > All Agents/Plug-ins. 2 In the left pane, expand the Agents/Plug-ins > Deployment and Migration folders. 3 Click the relevant upgrade policy. 4 In the right pane, in the Program name box, ensure that the correct policy is selected. 5 Under Applied to, select the computers that you want to upgrade the plug-in on. 6 (Optional) Under Schedule, select when you want to upgrade the plug-in. 7 (Optional) Click Advanced to check if the computers you selected are available at the exact time that you scheduled. 8 Under Extra schedule options, select the options that you want. 9 Ensure that the policy is enabled. A green On symbol shows in the top right corner. 10 Click Save changes. See “Repairing Deployment Solution” on page 199. Uninstalling Deployment Solution components You can uninstall the Deployment Plug-in, an automation folder, or the Deployment site server components from the client computers, if required. To perform the uninstallation you have to enable the relevant uninstall policy. Installing the Deployment Solution Enabling the uninstallation policy Table 8-3 Process for uninstalling Deployment Solution components Action Description Uninstall the Deployment Plug-in You can uninstall the Deployment plug-in by using the Deployment Plug-in - Uninstall policy under the relevant operating system. This policy is turned off by default. To use this policy, turn off the install policy. Otherwise, the plug-in can be reinstalled as soon as it is uninstalled. See “Installing Deployment Plug-in” on page 190. After the uninstall policy is turned on, the plug-in is uninstalled from all computers that meet the criteria of the filter. If you change the Applied to option to Computers, you can select individual computers. Uninstall the Aautomation You can uninstall the automation folder by using the folder Automation Folder - Uninstall policy under the relevant operating system. After the uninstall policy is turned on, the automation folder is uninstalled from all computers that meet the criteria of the filter. If you change the Applied to option to Computers, you can select individual computers. Uninstall the Deployment site server components You can uninstall Deployment site server components by using the Deployment site server components - Uninstall policy under the relevant Windows operating system. After the uninstall policy is turned on, the Deployment site server components are uninstalled from all computers that meet the criteria of the filter. If you change the Applied to option to Computers, you can select individual computers. See “Enabling the uninstallation policy” on page 197. Enabling the uninstallation policy You can enable the uninstallation policy for Deployment Plug-in, automation folder, and Deployment site server components. Enabling the uninstall policy uninstalls the component from the selected client computers. 197 198 Installing the Deployment Solution Uninstalling Deployment Solution through Symantec Installation Manager To enable uninstall policy 1 In the Symantec Management Console, on the Settings menu, click Agent/Plug-ins > All Agents/Plug-ins. 2 In the left pane, expand the Agents/Plug-ins > Deployment and Migration folders. 3 Choose either a Linux or Windows and expand the relevant folder. 4 Click the relevant uninstall policy. 5 In the right pane, in the Program name box, ensure that the correct policy is selected. 6 Under Applied to, select the computers that you want to uninstall the plug-in from. 7 ( Optional) Under Schedule, select when you want to uninstall the plug-in. 8 (Optional) Click Advanced to check if the computers you selected are available at the exact time that you scheduled. 9 Under Extra schedule options, select the options that you want. 10 Ensure that the policy is enabled. A green On symbol shows in the top right corner. 11 Click Save changes. See “About installing Deployment Solution” on page 185. Uninstalling Deployment Solution through Symantec Installation Manager You can uninstall Deployment Solution through Symantec Installation Manager without uninstalling the Deployment Solution components. To uninstall Deployment Solution through Symantec Installation Manager 1 From the Start menu, select Programs > Symantec > Symantec Installation Manager. 2 On the Symantec Installation Manager console, select Deployment Solution Suites from the Programs list. 3 Click Uninstall. 4 Click Finish when prompted that the repair is complete. See “About installing Deployment Solution” on page 185. Installing the Deployment Solution Repairing Deployment Solution See “Uninstalling Deployment Solution components” on page 196. Repairing Deployment Solution You can repair Deployment Solution to bring it back to its default state. You can use this option if you encounter an error while installing or setting up Deployment Solution, or performing imaging tasks. To repair Deployment Solution 1 On the Windows Start menu, click Programs > Symantec > Symantec Installation Manager. 2 In the Symantec Installation Manager console, click Programs > Deployment Solution Suites. 3 Click Repair. 4 Click Finish when the repair is complete. See “About installing Deployment Solution” on page 185. See “Uninstalling Deployment Solution components” on page 196. 199 200 Installing the Deployment Solution Repairing Deployment Solution Chapter 9 Configuring Notification Server This chapter includes the following topics: ■ About configuring Notification Server ■ Configuring the Configuration Management Database ■ Purging the Configuration Management Database ■ Saving resource data history in the CMDB ■ Configuring Notification Server settings ■ Configuring Notification Server settings ■ Configuring Notification Server settings with NS Configurator ■ Performing a first-time setup configuration About configuring Notification Server The default Notification Server configuration settings are suitable for most purposes and you do not normally need to change them. These default settings are specified when you install the Symantec Management Platform. However, as the needs of your organization change, you can make the appropriate configuration changes. See “About Notification Server” on page 37. For more information, see the Symantec Management Platform Installation Guide. You can perform the following types of configurations: 202 Configuring Notification Server Configuring the Configuration Management Database Configure the Configuration See “Configuring the Configuration Management Management Database (CMDB) settings. Database” on page 202. Set up database purging. See “Purging the Configuration Management Database” on page 204. Configure resource data history retention. See “Saving resource data history in the CMDB” on page 205. Configure Notification Server settings. See “Configuring Notification Server settings” These settings include event on page 210. processing, status message logging, the email message server and default addresses, and a proxy server. Configure the Notification Server settings that do not appear in the Symantec Management Console. See “Configuring Notification Server settings with NS Configurator” on page 214. Specify the software delivery package See “Distribution point credential settings” distribution point credentials. on page 213. Configuring the Configuration Management Database Notification Server has a database, called the Configuration Management Database (CMDB). Both Notification Server and solutions use the CMDB to store configuration items and resource data. See “About the Configuration Management Database” on page 39. See “About configuring Notification Server” on page 201. You can make any necessary changes to the CMDB configuration settings. When Notification Server is installed, the CMDB is configured as part of the installation process. You do not normally need to make any further changes. However, there may be occasions when you need to change the CMDB configuration settings. For example, if you upgrade the hardware on which your Microsoft SQL Server runs, or if you are instructed to do so by Symantec Support. Table 9-1 Configuration Management Database settings Setting Description Database Server name The name of the SQL server that contains the CMDB. Use the format servername\instancename. For example, SydNS\sql_cp1_cs_as. Configuring Notification Server Configuring the Configuration Management Database Table 9-1 Configuration Management Database settings (continued) Setting Description Database Credentials The user name and password that are required to access the CMDB. You can use Notification Server application credentials for Windows authentication. You may want to use this method to avoid being affected by any password change policy that is enforced in your organization. The application credentials are specified in the Processing tab of the Server Settings page. See “Notification Server processing settings” on page 209. You also have the option to use SQL authentication. To use SQL authentication you can specify the appropriate SQL login user name and password. Note: If you want to switch database authentication to SQL, you must make this change on both tabs (General and Reports). The General tab is the default tab that appears when you open the Database Settings page. If you make the change only on the General tab, Notification Server is not fully functional, and you may experience errors with some operations. Database Name You can select an existing database from the list of those available or create a new database. If you select an existing database, ensure that it is the same version as Notification Server. Repair Database Lets you repair the CMDB. You may need to do this procedure when you restore Notification Server from a backup to a new computer. Command Timeout The length of time that Notification Server attempts to process a query, such as running a report or updating a filter. You may want to change this value for performance reasons, such as a high load on the SQL server causing queries to time out. We recommend that you set the ASP Script timeout value in Microsoft IIS to a value equal to or greater than the command timeout value. Consult your database administrator before making any changes. Public report credentials The security context to be used for running report queries on the CMDB. These credentials provide less security than the database credentials (which are for the database administrator). These credentials are used to access the database and run the appropriate SQL query when a user runs a report. 203 204 Configuring Notification Server Purging the Configuration Management Database To configure the Configuration Management Database 1 In the Symantec Management Console, in the Settings menu, click Notification Server > Database Settings. 2 On the Database Settings page, on the General and Reports tabs, make the appropriate configuration changes. 3 Click Apply. Purging the Configuration Management Database To manage the size of the Configuration Management Database (CMDB), you can specify how long certain types of data are stored. You can specify storage length for data such as reports, managed computers, and event data. For example, if you experience poor performance when running reports, try purging your events or configure the event purging options to save less data. See “About configuring Notification Server” on page 201. See “Configuring the Configuration Management Database” on page 202. The data that can be purged from the CMDB includes the following: ■ Report snapshots Snapshots older than a specified amount of time can be deleted. ■ Managed computers that have not communicated with Notification Server for longer than a specified amount of time These can be deleted or set as retired. The CMDB is updated when the CMDB purging schedule is run. ■ Resource event data Event data older than a specified amount of time can be deleted. You can optionally specify a maximum number of rows to retain. If the event data table reaches this size, new rows continue to be added until the next scheduled update. When the CMDB purging schedule runs, the table is trimmed back to its maximum size. The table is trimmed by removing the oldest rows, even if the oldest data has not been retained for the specified time. You can have the same settings for all data classes, or you can set custom settings for some or all data classes. A custom setting for a data class overrides the global setting. If no custom setting is made for a data class, the global setting is used for that data class. The same CMDB purging schedule is used in all cases. The CMDB purging schedule is a Windows schedule that you set when you install Notification Server. You cannot change it through the Symantec Management Configuring Notification Server Saving resource data history in the CMDB Console. If you want to make any changes, you can do so through the Windows Control Panel. To purge the Configuration Management Database 1 In the Symantec Management Console, in the Settings menu, click Notification Server > Purging Maintenance. 2 In the left pane, in the Purging Maintenance folder, click Purging Maintenance. 3 On the Purging Maintenance page, on the Purging Maintenance tab, specify the report purge settings and computer data purge settings that you want. 4 On the Resource Event Data Purge Settings tab, specify the resource event data purging settings that you want. 5 To override the purging schedule and purge the CMDB immediately, on the Purging Maintenance tab, click Purge Now. 6 Click Save Changes. Saving resource data history in the CMDB Notification Server captures resource data in real time as it collects inventory data. You can choose to create a resource data history for each type of resource and resource association. For each history, you can specify how long to retain the history data in the CMDB. See “About configuring Notification Server” on page 201. See “Configuring the Configuration Management Database” on page 202. A resource data history can include data from any of the data classes. A resource association history can include data from any of the resource association types. To save resource data history in the CMDB 1 In the Symantec Management Console, in the Settings menu, click Notification Server > Purging Maintenance. 2 In the left pane, in the Purging Maintenance folder, click Resource History. 3 On the Resource History page, for each resource data class type and resource association type that you want to configure, take the following actions on the appropriate tabs: ■ Expand the data class or association type. ■ Select the data classes or associations for which you want to create resource data history. 205 206 Configuring Notification Server Configuring Notification Server settings ■ For each data class or association, specify the period for which you want to keep the resource data history. In the corresponding drop-down list, select the time period (Days, Weeks, or Months). Then enter the appropriate number of days, weeks, or months. Any resource data older than the time that is specified for its type is deleted from the CMDB on the purging schedule. 4 Click Save Changes. Configuring Notification Server settings Notification Server settings that you can configure include event processing, status message logging, and the email message server and default addresses. See “About configuring Notification Server” on page 201. You can also configure other Notification Server settings with NS Configurator. See “Configuring Notification Server settings with NS Configurator” on page 214. To configure Notification Server settings 1 In the Symantec Management Console, in the Settings menu, click All Settings. 2 In the left pane, in the Settings folder, click Notification Server > Notification Server Settings. Configuring Notification Server Configuring Notification Server settings 3 On the Server Settings page, make the appropriate changes in the following tabs: Processing You can enable or disable Notification Server Event (NSE) processing, specify the application identity of Notification Server, and restart Notification Server services manually. See “Notification Server processing settings” on page 209. Email You can specify the mail server that Notification Server uses and set the default To and From email addresses. See “Email server and address settings” on page 211. Logging You can specify the types of status messages, such as Notification Server errors, warnings and information messages, that you want logged by Notification Server. See “Status message logging settings” on page 212. Proxy If you don’t want to allow Notification Server users direct access to the network, you can configure a proxy server. See “Proxy server settings” on page 213. Distribution Point You can specify the credentials that Notification Server uses to Credential access your package distribution points. See “Distribution point credential settings” on page 213. 4 To confirm your changes, click OK. Notification Server processing settings You can enable or disable Notification Server Event (NSE) processing, and specify the application identity of Notification Server. An NSE is an XML file that is passed between Notification Server and the Symantec Management Agent (including solution plug-ins). See “Configuring Notification Server settings” on page 210. Notification Server Events contain information such as the following: ■ Communication with the Symantec Management Agent ■ Events processing ■ Basic inventory or full inventory ■ Success or failure of package download 207 208 Configuring Notification Server Configuring Notification Server settings NSE processing is enabled by default when you install Notification Server, but there may be occasions when you need to disable or reenable it. For example, when you install a solution, all event processing is automatically paused. After installation completes, event processing should restart automatically. If that does not happen, a warning message appears in the Symantec Management Console, and you are prompted to reenable NSE processing manually. Any NSEs that are received while NSE processing is disabled are stored on the Notification Server computer so are not lost. To reenable NSE processing, click on the warning message and then, in the dialog box that appears, click Resume. The application identity of Notification Server is the account under which Notification Server runs. You specify the appropriate user name and password when you install Notification Server, and you only need to update it when necessary. For example, if your organization has a password change policy, the CMDB access credentials may be forced to change. The application identity no longer has permission to log on to the SQL server. Warning: You cannot use special characters in the application identity user name or password. You may use only alphanumeric characters. The user ID that you define requires the following permissions: ■ Local administrator permissions on Notification Server and any remote Windows 2000/XP/2003/Vista computers to which you want to install the Symantec Management Agent. ■ Permission to act as part of the operating system and log on as a batch job and a service. ■ Permission to log on to the SQL server. If the user ID does not have this permission, you can specify a different user name and password to log on to the CMDB. ■ Permission to connect to any SQL server to which Notification Server may attach. For example, an SMS database for Web Administrator for SMS or Lease database for Contract Management Solution. Notification Server services are restarted automatically when the application identity is changed. However, the Restart Services option lets you manually restart the services when necessary. For example, if you make a change to the database, you need to restart the services to make the changes take effect. If the application identity password fails, Notification Server is unable to access the CMDB. You cannot reset the application identity through the Symantec Configuring Notification Server Configuring Notification Server settings Management Console, as the console uses the same password to access Notification Server. You need to use the ASConfig utility to access the Web services directly and reset the application identity password using the appropriate command line. Notification Server processing settings You can enable or disable Notification Server Event (NSE) processing, and specify the application identity of Notification Server. An NSE is an XML file that is passed between Notification Server and the Symantec Management Agent (including solution plug-ins). See “Configuring Notification Server settings” on page 210. Notification Server Events contain information such as the following: ■ Communication with the Symantec Management Agent ■ Events processing ■ Basic inventory or full inventory ■ Success or failure of package download NSE processing is enabled by default when you install Notification Server, but there may be occasions when you need to disable or reenable it. For example, when you install a solution, all event processing is automatically paused. After installation completes, event processing should restart automatically. If that does not happen, a warning message appears in the Symantec Management Console, and you are prompted to reenable NSE processing manually. Any NSEs that are received while NSE processing is disabled are stored on the Notification Server computer so are not lost. To reenable NSE processing, click on the warning message and then, in the dialog box that appears, click Resume. The application identity of Notification Server is the account under which Notification Server runs. You specify the appropriate user name and password when you install Notification Server, and you only need to update it when necessary. For example, if your organization has a password change policy, the CMDB access credentials may be forced to change. The application identity no longer has permission to log on to the SQL server. Warning: You cannot use special characters in the application identity user name or password. You may use only alphanumeric characters. The user ID that you define requires the following permissions: 209 210 Configuring Notification Server Configuring Notification Server settings ■ Local administrator permissions on Notification Server and any remote Windows 2000/XP/2003/Vista computers to which you want to install the Symantec Management Agent. ■ Permission to act as part of the operating system and log on as a batch job and a service. ■ Permission to log on to the SQL server. If the user ID does not have this permission, you can specify a different user name and password to log on to the CMDB. ■ Permission to connect to any SQL server to which Notification Server may attach. For example, an SMS database for Web Administrator for SMS or Lease database for Contract Management Solution. Notification Server services are restarted automatically when the application identity is changed. However, the Restart Services option lets you manually restart the services when necessary. For example, if you make a change to the database, you need to restart the services to make the changes take effect. If the application identity password fails, Notification Server is unable to access the CMDB. You cannot reset the application identity through the Symantec Management Console, as the console uses the same password to access Notification Server. You need to use the ASConfig utility to access the Web services directly and reset the application identity password using the appropriate command line. Configuring Notification Server settings Notification Server settings that you can configure include event processing, status message logging, and the email message server and default addresses. See “About configuring Notification Server” on page 201. You can also configure other Notification Server settings with NS Configurator. See “Configuring Notification Server settings with NS Configurator” on page 214. To configure Notification Server settings 1 In the Symantec Management Console, in the Settings menu, click All Settings. 2 In the left pane, in the Settings folder, click Notification Server > Notification Server Settings. Configuring Notification Server Configuring Notification Server settings 3 On the Server Settings page, make the appropriate changes in the following tabs: Processing You can enable or disable Notification Server Event (NSE) processing, specify the application identity of Notification Server, and restart Notification Server services manually. See “Notification Server processing settings” on page 209. Email You can specify the mail server that Notification Server uses and set the default To and From email addresses. See “Email server and address settings” on page 211. Logging You can specify the types of status messages, such as Notification Server errors, warnings and information messages, that you want logged by Notification Server. See “Status message logging settings” on page 212. Proxy If you don’t want to allow Notification Server users direct access to the network, you can configure a proxy server. See “Proxy server settings” on page 213. Distribution Point You can specify the credentials that Notification Server uses to Credential access your package distribution points. See “Distribution point credential settings” on page 213. 4 To confirm your changes, click OK. Email server and address settings You can define a mail server and the To and From email addresses for Notification Server email messages. Notification Server uses SMTP to send email messages. The email address can be any valid SMTP address that your SMTP server recognizes. See “Configuring Notification Server settings” on page 210. You can enable Symantec solutions to send you the email messages that are based on the data that Notification Server receives. The email address that you specify can receive notices of reports successfully run, automation actions executed, and system scalability checks. These emails help you monitor and manage your Notification Server activities. The email settings are configured when you install Notification Server, and you do not normally need to change them. However, if the SMTP server changes, or 211 212 Configuring Notification Server Configuring Notification Server settings if you want someone else to receive the email messages, you need to make the appropriate changes. The Send Test Email option lets you test the email server and address settings by sending a message using the current settings. You need to confirm the changes by clicking OK before you send the test email. Status message logging settings You can specify the types of status messages, such as Notification Server errors, warnings, and information messages, that you want logged by Notification Server. Log messages that Notification Server generates are written to log files in the installation path\Altiris\Notification Server\Logs directory (by default). Note: When you upgrade Notification Server from 6.x to 7.x, the migration wizard writes any messages to the 6.x log file location rather than the 7.0 log file location. The 6.x log file location is C:\WINDOWS\system32\Altiris Logs. You need to look in this log file to see any migration errors. The Log Viewer displays only the logs that are filed at the default 7.0 location. The migration log entires are not included. See “Configuring Notification Server settings” on page 210. You can log any of the following message types: ■ Errors ■ Warnings ■ Information ■ Trace You can also choose to archive log files that are older than a particular time. If you set this option, the relevant log files are archived daily at 05:00 a.m. See “Opening the Log Viewer” on page 212. Opening the Log Viewer You can view all status messages in the Log Viewer. Being able to view messages can be helpful in troubleshooting and monitoring your Notification Server. See “Status message logging settings” on page 212. To open the Log Viewer ◆ In the Start menu, click All Programs > Symantec > Diagnostics > Altiris Log Viewer. Configuring Notification Server Configuring Notification Server settings Proxy server settings If you don’t want Notification Server users to have direct access to the network, you can configure a proxy server. For example, if you have Notification Server and your managed computers inside your organization's firewall, a proxy server provides security. You can set up a proxy server to provide a safe way through the firewall without exposing Notification Server. This setup helps Notification Server safely obtain patches or download solutions from external Web sites. See “Configuring Notification Server settings” on page 210. Using a proxy server may improve Notification Server performance by using less bandwidth and filtering requests when requesting files from the Internet. One example is PMImport data. The Test Settings option validates the proxy server settings by attempting to connect to an external Web site. If error messages appear when you test the settings, ensure that your authentication credentials are correct. Ensure that your proxy server is running and that no general network errors exist. Distribution point credential settings You can specify the distribution point credentials (DPC) that Notification Server uses to access software delivery packages. These packages are located on a network share that is accessed through a UNC path. Notification Server publishes these packages to a virtual HTTP directory that uses the DPC to connect to the UNC share. See “Configuring Notification Server settings” on page 210. You must specify the distribution point credentials before you create a software package that is accessed from an existing UNC path. The credentials must have permission to validate user accounts and have read permission on all the files on the remote distribution points. Notification Server can use either of the following credentials: Agent Connectivity Credential All Symantec Management Agents use the Agent Connectivity Credential (ACC) to connect to a secured resource. The ACC is set in the Global Agent Settings policy. 213 214 Configuring Notification Server Configuring Notification Server settings with NS Configurator User-specified credentials If the packages are stored in a location that is not accessible with the Agent Connectivity Credential, you can make them accessible. To make packages accessible, specify the user name and password of an account that does have the appropriate access. You cannot use special characters in the user name or password. You may use only alphanumeric characters. Configuring Notification Server settings with NS Configurator The NS Configurator is a configuration tool that lets you change most core Notification Server configuration settings. These settings include many that are not accessible from the Symantec Management Console. You should only use NS Configurator to change these settings if you know the effect that each setting has on the system. See “About configuring Notification Server” on page 201. When a user starts NS Configurator, a security check is performed to determine if the user has permission to view or modify Notification Server settings. If a user does not have permission, a warning message appears and the tool closes. To configure Notification Server settings with NS Configurator 1 To start NS Configurator, run the NSConfigurator.exe file. This file is at Program Files\Altiris\Notification Server\Bin\Tools. When you run this tool, it opens the CoreSettings.config file that is at Program Files\Altiris\Notification Server\Config. 2 3 Do one of the following to find the setting you want to change: ■ In the navigation tree in the left pane, locate the setting. ■ In the search field in the upper right-hand corner, enter your search text and click Search. In the list of search results, click the Show link for that setting. In the right pane, change the setting and click Save. If you enter an invalid value for a setting, an error message appears. You can only save your changes if you enter a valid value. 4 To restore the default value, click Restore Default. The Restore Default option appears only if the setting had a default value. Configuring Notification Server Performing a first-time setup configuration Performing a first-time setup configuration When you install Symantec Management Platform, you configure Notification Server as part of the installation process. No further configuration is needed before you can start using Notification Server. In the unlikely event that you install Symantec Management Platform without accompanying versions of certain products, you see a number of links to configuration pages. In this scenario, you must configure the platform manually. See “About configuring Notification Server” on page 201. However, when you install Symantec Management Platform 7.1 and accompanying versions of certain products, you see enhanced console views. In this scenario, your first-time setup configuration provides a Welcome to the Symantec Management Console portal page to simplify the initial configuration process. Some of the solutions that are included in your suite may require configuration before you can use them. The Welcome to the Symantec Management Console portal page is a single point of entry for performing key configuration actions for solutions in the suites that you have installed. These actions represent the essential settings that you need to configure to start using the solutions. You see the Welcome to the Symantec Management Console page if you install any of the following products: ■ Deployment Solution ■ IT Management Suite ■ Server Management Suite ■ Client Management Suite In the left pane of the Welcome to the Symantec Management Console page, the key configuration actions are listed. In the right pane, a color key lists each task next to an associated color. As you perform each action, a vertical bar on the right changes color to show progress through the setup process, from discovery to deployment. See Table 9-2 on page 216. After you perform the first-time setup configuration, you may need to perform additional configuration tasks. The need to perform additional steps depends on the solutions and suites that you have installed initially or that you install after the first-time setup. Additional, advanced settings are available from the Settings menu and may be available from other areas of individual solutions. For more information about the configuration options for the individual solutions and products, see the documentation for those products. 215 216 Configuring Notification Server Performing a first-time setup configuration Table 9-2 Process for performing a first-time setup configuration Step Task Description Step 1 Discover computers. Ping all connected computers. See “Discovering computers” on page 217. Step 2 Installing the Symantec Management Agent. After you roll out the agent to computers, those computers become managed computers. Notification Server can send information and data to managed computers. It also receives information from managed computers. If you have installed the products that make enhanced console views visible in Symantec Management Console, rolling out the agent includes an auto-tuning step. This step lets you automatically optimize the Symantec Management Agent settings based on the number of computers that are in your environment. See “Installing the Symantec Management Agent” on page 219. Step 3 Collect inventory. In this step, Notification Server collects the information that the newly deployed agents gather from managed computers. See “Collecting inventory information” on page 224. Step 4 Deploy preboot environments. Finally, you can deploy preboot environments. See “Deploying preboot environments” on page 226. Chapter 10 Setting up managed computers This chapter includes the following topics: ■ Discovering computers ■ Installing the Symantec Management Agent ■ Agent and task setting options ■ Collecting inventory information ■ Deploying preboot environments Discovering computers Discovering computers means identifying the computers that are in your environment. Before you can manage computers, you must first identify the available computers and select those that you want to manage using the Symantec Management Agent. To discover computers, you first select the type of computers on which you want to install the Symantec Management Agent. You discover Windows computers with Active Directory Import. You discover UNIX, Linux, and Mac computers with a ping sweep for an IP range that you select. Discovering computers is a step in the process for performing a first-time setup configuration. See “Performing a first-time setup configuration” on page 215. 218 Setting up managed computers Discovering computers To discover computers 1 If you do not already see the Welcome to the Symantec Management Console page, in Symantec Management Console click Home > Notification Server Management > First Time Setup. 2 On the Welcome to the Symantec Management Console page, click Discover Computers. 3 In the Discover Computers dialog box, complete the discovery steps. Step 1 Windows Lets you import Windows computers by either domain or workgroup. Note: If you prefer to discover computers using a network scan, select nothing on this page, but click Next. To import Windows computers by domain: 1 Check the box to import Windows computers. 2 Click a radio button to choose whether to import from Microsoft Active Directory or through domain membership/WINS. 3 Click the down-arrow next to Domain or Workgroup to select a domain or a workgroup. Or, you can enter a domain name or a workgroup name manually. 4 Enter the domain credentials. 5 Click the option next to Schedule recurring import to On or Off. If you expect to add new computers to your network, leave this setting on. Leaving this setting on means that as you add computers to your network, they are discovered automatically. 6 Click Schedule. Select a preset shared schedule for the recurring import. This list is populated from the Shared Schedules page. You modify, create, and use shared schedules at Settings > Notification Server > Shared Schedules. 7 Click Next. Setting up managed computers Installing the Symantec Management Agent Step 2 Network Lets you discover computers using a network scan (ping sweep). Note: If you prefer to import Windows computers by domain or workgroup, select nothing on this page, but click Back. To discover computers using a network scan: 1 Check the box to discover networked computers and devices. 2 Enter a ping sweep range. Consider whether you need to scan all IP addresses. For a first-time setup, you may need to include all subnets to ensure that you identify every device. However, you can limit the scope as needed. For example, you can run multiple scans on specific subnets if that simplifies the discovery task. 3 If you want to communicate with network devices and classify them more accurately, click turn on additional ranges. Note: If you cannot connect remotely, your network or computers may have firewalls turned on. You may need to turn these off to perform discovery. 4 4 If you want to proceed immediately to the second first-time setup configuration step, check Run the Roll Out Symantec Agent wizard. After you have made all your selections in the Discover Computers dialog box, click Discover. See “Installing the Symantec Management Agent” on page 219. Installing the Symantec Management Agent The process of installing the agent includes the following procedures, which must be completed in order: ■ Rolling out the agent to the network computers that you want to manage. You select the computers on which you want to install the agent. You can select all computers automatically or select from a list of discovered computers. See “To roll out the agent” on page 220. ■ Rolling out the agent plug-ins. Certain plug-ins are turned on by default. You can select additional plug-ins to install. Plug-ins are installed to the list of computers to which you installed 219 220 Setting up managed computers Installing the Symantec Management Agent the agent. Note that if you choose to deselect all plug-ins and select plug-ins manually, the default plug-ins are also deselected. See “To roll out the agent plug-ins” on page 221. ■ Optimizing the agent for the number of computers in your environment. Optimizing the agent is an auto-tuning feature. If you have installed a suite, you have a setup option for auto-tuning your network. You can auto-tune the settings for the agents that you installed. In the agent rollout wizard, you see a slider that lets you select from 0 to 15,000+ computers. Based on the number of computers you select, the wizard auto-tunes your system to optimize performance. See “To optimize the agent” on page 222. Rolling out the Symantec Management Agent is a step in the process for performing a first-time setup configuration. See “Performing a first-time setup configuration” on page 215. To roll out the agent 1 If you do not already see the Welcome to the Symantec Management Console page, in Symantec Management Console click Home > Notification Server Management > First Time Setup. 2 On the Welcome to the Symantec Management Console page, click Rollout Agent. 3 In the rollout wizard, click Step 1 Computers. Setting up managed computers Installing the Symantec Management Agent 4 In the Roll Out Symantec Agent dialog box, select an installation option. Automatically install to all discovered computers Lets you install the agent to all discovered computers. Only on selected discovered computers Lets you type the name of or search for specific computers on which to install the agent. This installation option also lets you select a recurring installation schedule from a drop-down list. This list is populated from the Shared Schedules page. You modify, create, and use shared schedules at Settings > Notification Server > Shared Schedules. This option presents a typical pick list. The left-hand column is where you search and your discovered computers are listed. This column is referred to in this topic as the discovery column. The right-hand column is where you build your list of computers on which to install the agent. This column is referred to as the selected column. In the discovery column, type all or part of a computer name. You can also use search criteria such as XP, Win, or other letters that a group of your preferred computer names contains. The discovery column lists the discovered computers that match your search criteria. Use the arrow keys to move computers from the discovery column to the selected column. As you move computers into the selected column, you see the number of selected computers change in the bottom right of the column. This installation option also lets you add search criteria for selected discovered computers. You can refine the results in the selected column by searching for computers by name or IP address. 5 Click Next. The agent plug-in rollout opens. To roll out the agent plug-ins 1 If you do not already see the Welcome to the Symantec Management Console page, in the Symantec Management Console click Home > Notification Server Management > First Time Setup. 2 On the Welcome to the Symantec Management Console page, click Rollout Agent. 3 In the rollout wizard, click Step 2 Plug-ins. 221 222 Setting up managed computers Installing the Symantec Management Agent 4 In the Rollout Agent dialog box, select the plug-ins that you want to install. Click a plug-in to see its description. Review the plug-ins that you want to install. Select plug-ins for all of the solutions that you have installed. You should also select plug-ins based on the management functions that you want perform. For example, you want to collect inventory. You must ensure that the Inventory plug-ins that are relevant for your environment are turned on. 5 Turn on all Lets you turn on all plug-ins that are listed. When you turn on all plug-ins, you see green shading along the left side of the list. When you turn off all plug-ins, you see red shading. On/Off bar Lets you turn selected plug-ins on or off. Red or green shading indicates which plug-ins are off (red) and which plug-ins are on (green). Click Next. To optimize the agent 1 If you do not already see the Welcome to the Symantec Management Console page, in the Symantec Management Console click Home > Notification Server Management > First Time Setup. 2 On the Welcome to the Symantec Management Console page, click Rollout Agent. 3 In the rollout wizard, click Step 3 Optimize. Setting up managed computers Agent and task setting options 4 In the Rollout Agent dialog box, select the rollout environment: Production Environment Lets you install the agent to your production environment. Select the number of computers in your production environment. The number of computers in your production environment determines the optimal intervals for downloading agent settings and checking for new tasks. When you select the number of computers that operate in your environment, the intervals adjust automatically. This automatic adjustment tunes your network for optimal performance. Using the slider, select the number of computers that are in your production environment. See “Agent and task setting options” on page 223. To see details of the agent settings and the task settings, click Show Details, and then click OK. Testing Environment (1 50 computers) 5 Lets you test the rollout on a subset of installed computers. When you are satisfied with the settings, click Rollout Agent. Agent and task setting options In the agent rollout wizard, you see a slider that lets you select from 0 to 15,000+ computers. Based on the number of computers you select, the wizard auto-tunes your system to optimize performance. Click Show details to view the optimized settings. The Optimized Settings dialog box shows how often a new configuration is downloaded for agent settings. It also lists the maximum time between tickle attempts for task settings. The details in the wizard apply to the discovered computers on which you chose to install the agent. If you need to set or modify agent setting options or task setting options for other computers, you can do so. To modify agent settings, in Symantec Management Console navigate to Settings > Agents/Plug-ins > Targeted Agent Settings - Download new configuration every ___. To optimize task settings, click Settings > Notification Server > Site Server Settings, and then in the left pane click Site Management > Settings > Task Service > Task Service Settings. In the right pane, set Minimum time between tickle attempts. See “Installing the Symantec Management Agent” on page 219. 223 224 Setting up managed computers Collecting inventory information Table 10-1 Options for optimal agent and task settings Number of computers in production environment Optimized agent settings Optimized task settings 0 - 100 5 minutes 1 minute 100 - 5000 one hour 5 minutes 5000 - 10000 two hours 5 minutes 10000 - 15000 three hours 5 minutes 15000 + four hours 5 minutes Collecting inventory information Collecting initial inventory information is key to managing your network. All solutions use inventory, and the information that inventory collects populates the computer views, software views, and other pages and fields in the console. Knowing what is installed on your network is critical to gathering the right data so that you can make essential management decisions. Your network is unique. Therefore, you must determine which information you want to collect, which resources you want to collect information about, and how often to collect the information. In the Collect Inventory policy window you can turn off the policy or turn on the policy. You also select a default schedule or a custom schedule on which to ensure that the policy is current. Before collecting inventory information, consider which information you need to keep track of and how often you want to update that information. You should also consider whether any circumstance exists under which you would want to turn off the inventory policy. The default is to leave the policy on. You can collect the following types of inventory information: Hardware and operating system Lets you collect inventory of CPUs, hard drives, memory, firmware, users, and groups. Software Lets you collect inventory about Windows programs and UNIX/Linux/Mac software packages. File properties Lets you collect information about manufacturers, versions, size, and internal name. Server applications If you have Inventory Pack for Servers installed, lets you collect information about server applications. Setting up managed computers Collecting inventory information Collecting inventory information is a step in the process for performing a first-time setup configuration. See “Performing a first-time setup configuration” on page 215. To collect inventory information 1 In the Symantec Management Console, click Home > Notification Server Management > First Time Setup. 2 On the Welcome to the Symantec Management Console page, click Collect Inventory. The Collect Full Inventory policy shows the default settings and also shows policy compliance. 3 In the Collect Full Inventory policy window next to Policy Rules/Actions, leave the policy turned on. If you have a particular need to stop running the policy for a time, click Off to turn off the policy. 4 Select a schedule for keeping the policy current. You can select a default schedule or create a custom schedule. This list of schedules is populated from the Shared Schedules page. You modify, create, and use shared schedules at Settings > Notification Server > Shared Schedules. 5 In the Collect Full Inventory policy window, review the inventory details and select the types of inventory to gather. Make changes as necessary. To see details about the types of inventory you selected, in the Policy Rules/Actions area of the window click Advanced. You can select additional items about which you want to collect inventory data. If you make changes, click OK. 6 In the Collect Full Inventory policy window in the Applies To/Compliance area, review the details. This area shows details about the inventory that is collected on targeted computers. You can verify compliance to the inventory policy, modify which computers collect inventory, and make other changes as needed. 7 Click Save changes. 8 After the window refreshes, click x in the upper right to close the policy window. 225 226 Setting up managed computers Deploying preboot environments Deploying preboot environments You choose which PXE preboot environments you want to build and turn on the PXE server rollout policy. The preboot configurations that you build during first-time setup are available to use later for deployment tasks. Deploying preboot environments is a step in the process for performing a first-time setup configuration. See “Performing a first-time setup configuration” on page 215. To deploy preboot environments 1 In the Symantec Management Console, click Home > Notification Server Management > First Time Setup. 2 On the Welcome to the Symantec Management Console page, click Setup Deployment. 3 In the Setup Deployment window, select which PXE Preboot Automation environments you want to build. Step 1 PXE Image Lets you choose one or more of the following operating systems: ■ WinPE x86 ■ WinPE x64 ■ Linux The PXE Preboot Automation environments table lists the available operating systems with their architecture and OEM extensions. After you choose the operating system or operating systems, click Next. If you need to create other preboot environments at a later time, you can do so. In Symantec Management Console, navigate to Settings > Deployment > Create Preboot Configurations. Step 2 PXE Servers 4 Lets you choose whether to roll out PXE servers to your site servers. If you plan to perform deployment tasks, you want to roll out PXE servers to site servers. Click Setup Deployment. Chapter 11 Configuring security This chapter includes the following topics: ■ About Symantec Management Platform security ■ Setting up Symantec Management Platform security ■ About security roles ■ Predefined security roles ■ About security privileges ■ About Symantec Management Platform user accounts ■ Creating and configuring Symantec Management Platform user accounts ■ Configuring password complexity and lockout settings ■ Unlocking locked out credentials ■ About security role permissions ■ About the Security Role Manager ■ About credential manager ■ Creating a credential ■ Editing a credential About Symantec Management Platform security The Symantec Management Platform uses role-based security, which means that user access is based on the user's security role. A security role is a set of privileges and permissions that is granted to all members of that role. Using role-based security lets you create and maintain a small number of security roles. You can 228 Configuring security About Symantec Management Platform security then assign each Symantec Management Platform user account to the appropriate role, rather than assign specific privileges and permissions to each individual user. However, you can also assign specific permissions to individual user accounts. See “About security roles” on page 231. See “Setting up Symantec Management Platform security” on page 229. User accounts, which are sometimes referred to as users, are not the same as user resources in Symantec Management Platform. A user resource is an entity that is used to associate managed devices with the owner of the device. The existing user resources and the user accounts that can log on to the Symantec Management Console or run a workflow are separate entities. A security role controls user access to the Symantec Management Platform using the following: ■ Privileges A privilege applies system-wide. Privileges are assigned only to roles and cannot be assigned directly to individual user accounts. A privilege assigned to a role lets a user account that is a member of that role perform a particular action on the Symantec Management Platform or in the Symantec Management Console. In some cases, the user's role requires the corresponding permissions. See “About security privileges” on page 233. ■ Permissions on folders and items Permissions specify the access that a security role or user account has to a Symantec Management Console folder or item. A permission on a security role applies to all members of that role. A permission on a folder applies to all of the items that are contained directly in that folder. See “About security role permissions” on page 255. ■ Permissions on organizational views and groups An organizational view is a hierarchical grouping of resources (as organizational groups) that reflects a real-world structure or view of your organization. You can set up resource security by assigning the appropriate permissions for each security role on each organizational view. You also assign the appropriate permissions on the organizational groups within each view. A permission that is assigned to an organizational group applies to all resources in that group. By default, the permission applies to all of its child groups. You cannot assign permissions directly to a particular resource. Privileges, permissions on folders and items, and permissions on organizational views and groups work together. You need to assign the appropriate combination to each security role to grant user accounts the access that they need to perform their activities. Configuring security Setting up Symantec Management Platform security Setting up Symantec Management Platform security To give user accounts access to the Symantec Management Platform, installed solutions, and the data that is contained in the CMDB, you need to set up your security roles. You assign the appropriate privileges and permissions to each role. You need to create your Symantec Management Platform user accounts and then add each user account to the appropriate role (or roles). You configure and maintain Symantec Management Platform security through the Symantec Management Console. See “About Symantec Management Platform security” on page 227. Table 11-1 Process for setting up Symantec Management Platform security Step Action Description Step 1 Create and configure the security Security roles control access to the Symantec Management roles that you require. Platform, installed solution functionality, and all the data that is contained in the CMDB. You can create new security roles in the following ways: ■ Create completely new security roles. ■ Clone existing security roles. ■ Import domain groups and users from Active Directory. Step 2 Assign the appropriate privileges A privilege allows a role member to perform a particular action to your security roles. on the Symantec Management Platform, or on items in the Symantec Management Console. To perform an action on an item, the role must have the necessary permission on the item. Step 3 Create and configure the user accounts that you require. Each Symantec Management Platform user account contains the credentials that the user needs to access the Symantec Management Console or to run a workflow. The credentials may be internal Symantec Management Platform user names and passwords or Windows accounts. Internal credentials are currently used for workflow integration only. Windows credentials are required to access the Symantec Management Console. You can create new user accounts in the following ways: ■ Create completely new user accounts. ■ Clone existing user accounts. ■ Import domain groups and users from Active Directory. See “Creating and configuring Symantec Management Platform user accounts” on page 247. 229 230 Configuring security Setting up Symantec Management Platform security Table 11-1 Process for setting up Symantec Management Platform security (continued) Step Action Description Step 4 Add user accounts to the appropriate security roles. A user gains access to the Symantec Management Platform, installed solutions, and the data that is contained in the CMDB through their security role membership. You can assign a user to any number of security roles. A user who is a member of multiple security roles has the union of all the privileges and permissions that those roles grant. Step 5 For each security role, assign permissions on the folders and items that are contained in the Symantec Management Console. Permissions specify the access that each security role has to a Symantec Management Console folder or to a particular item. A permission on an item applies only to the item. A permission on a folder applies to all of the items that are contained directly in that folder. By default, the contents of a folder inherit all the permissions on the folder. See “Assigning security permissions to folders and items” on page 262. Step 6 (Optional) For each security role, modify the permission inheritance on the Symantec Management Console folder structure. Modifying permission inheritance lets you customize permissions on the Symantec Management Console folder structure. This means that you can grant a particular permission on a parent folder but remove that permission from some or all of the folder contents. Remember that you configure permissions on folders and the items within those folders. If you configure a folder and grant Write permissions for a particular role, that role has the Write permission to the folder and all its contents. If the folder contains 100 items, and you do not want those items to inherit the Write permission from the parent folder, you can break permission inheritance. In that case, users who are members of the role to which you granted the Write permission have the Write permission on the folder only. However, they do not have the Write permission on the items that the folder contains. The permission inheritance on a folder or item applies to all security roles. You cannot customize permission inheritance per role. See “Customizing permission inheritance” on page 263. Configuring security About security roles Table 11-1 Process for setting up Symantec Management Platform security (continued) Step Action Description Step 7 (Optional) Configure resource security. By default, all the predefined security roles have the Read permission on resources. Security-related resources are specially controlled in Symantec Management Platform: Only users who are members of the Symantec Administrators role have full access to security resources by default. Users who are members of the Symantec Supervisors role have Read permissions on security resources by default. No other predefined security role has permissions on any security resources. See “Predefined security roles” on page 232. If you want to restrict or otherwise control access to resources, you can configure resource security. You configure resource security by creating one or more organizational views that model your resource structure. You control access to the resources by assigning permissions to each security role on the appropriate organizational views and groups. About security roles A security role is a set of privileges and permissions that is granted to all members of the role. Using role-based security lets you create and maintain a small number of security roles and assign each user account to the appropriate role. You do not need to assign privileges and permissions to each individual user account (although you can if you want). You can assign a user account to multiple security roles: a member of multiple security roles has the union of all the privileges and permissions that those roles grant. See “About Symantec Management Platform security” on page 227. See “Setting up Symantec Management Platform security” on page 229. Security roles may be nested: a role may be a member of one or more other roles, and its membership may include both roles and user accounts. The only restriction is that you cannot create a circular role membership where a role is a member of itself. Privileges, permissions on folders and items, and permissions on organizational views and groups work together. You need to assign the appropriate combination to each security role to grant user accounts the access that they need to perform 231 232 Configuring security Predefined security roles their activities. Privileges can only be assigned to security roles, but permissions may be assigned to security roles and user accounts. You should decide what security roles to set up based on logical IT worker or user groups in your organization. For example, you might want an IT level 1 worker role, an upper-level management role, and a human resources role. All user accounts in a security role receive the same privileges and permissions, therefore they have the same level of access to the Symantec Management Platform. The Symantec Management Platform and some solutions include predefined security roles. If the predefined security roles do not meet the needs of your organization, you can create new ones. You can also edit the predefined security roles by specifying different privileges and permissions. See “Predefined security roles” on page 232. During Symantec Management Platform installation, the administrator installing the Symantec Management Platform is automatically assigned to the Symantec Administrators role. The administrator can then create any new security roles that are required and assign each role the appropriate privileges and permissions. The administrator can then assign each user to one or more roles. You should set up security roles before Notification Server is deployed to your production network. Predefined security roles The Symantec Management Platform includes a set of predefined security roles that you can use. If the predefined security roles do not meet the needs of your organization, you can create new ones. You can also edit the predefined security roles by specifying different privileges and permissions. See “About Symantec Management Platform security” on page 227. See “Setting up Symantec Management Platform security” on page 229. See “About security roles” on page 231. Table 11-2 Predefined Symantec Management Platform security roles Security role Description Everyone A top-level role that contains all roles and user accounts. This role replaces the Windows built-in groups Everyone and Authenticated Users. The membership of this role is calculated automatically and cannot be modified manually. By default, this role has no privileges assigned. Configuring security About security privileges Table 11-2 Predefined Symantec Management Platform security roles (continued) Security role Description Symantec Administrators Has all security privileges and permissions assigned, so it has complete access to all aspects of the Symantec Management Platform and any installed solutions. You can modify the membership of this security role, but you cannot change its privileges and permissions. Symantec Supervisors Has the complete Management and most of the Right-click Menu privileges. Has limited System privileges assigned. Has the Read permission on resources, including security resources. Symantec Level 2 Workers Has the complete Management privileges and most of the Right-click Menu privileges assigned. Has the Read permission on resources, excluding security resources. Symantec Level 1 Workers Has no privileges assigned. Has the Read permission on resources, excluding security resources. Symantec Software Librarian Has the Software Management Framework privileges and the Right-click Menu Actions privileges assigned. The privileges are limited to those needed to create and manage software packages. Symantec Guests Has no privileges assigned. About security privileges A privilege allows a user to perform a particular action on the Symantec Management Platform, or on items in the Symantec Management Console. To perform an action on an item, the user's role must have the necessary permission on the item. The privileges that you can assign to a security role are grouped into categories. However, when you assign privileges to a security role, you need to select the appropriate privileges individually. 233 234 Configuring security About security privileges Table 11-3 Security privilege categories Privilege category Description Connection Profile Privileges Lets you create and modify connection profiles. Management Privileges Lets you create management items, such as filters, targets, reports, and tasks, on the Symantec Management Platform. See “Connection Profile privileges” on page 235. See “Management privileges” on page 235. System Privileges Lets you perform management activities, such as setting up security, managing hierarchy, and importing XML files, on the Symantec Management Platform. See “System privileges” on page 237. Credential Privileges Lets you use the Credential Manager to create and modify credentials. These credentials are not the same as the Internal credentials and Windows credentials that are associated with user accounts. Note: The Credential Manager is a component of the extended Symantec Management Platform, so may not be installed in your environment. See “Credential privileges” on page 239. Workflow Directory Privileges Lets you publish workflows from the workflow designer into Notification Server as a task or item action (an option on the right-click menu). See “Workflow Directory privileges” on page 239. Console Privileges Lets you customize the Symantec Management Console. These privileges include the ability to edit the menu, and to create portal pages, Web parts, and views. See “Symantec Management Console privileges” on page 240. Software Management Privileges Lets you grant specific abilities to the user role and allow the user to perform specific tasks in the Software view and Software Catalog window. Software Management Framework Privileges Lets you manage the Software Management Framework. These privileges are the ability to create the Software Library and to create and import software resources. See “Software Management Framework privileges” on page 240. Right-click Menu Privileges Lets you perform general actions on items in the Symantec Management Console. When you right-click on an item, the options that are relevant to that item type are available on the right-click menu. These privileges include the ability to delete an item, edit views, Web links, and item links, and start, stop, and schedule tasks. See “Right-click Menu privileges” on page 241. Configuring security About security privileges Table 11-3 Security privilege categories (continued) Privilege category Description Right-click Menu Connector Samples Privileges Examples of user-creatable right-click actions. Right-click Menu Hierarchy Privileges Lets you manage hierarchy replication. These privileges let you include or exclude specific items from hierarchy replication, and let you replicate items immediately. See “Right-click Menu - Connector Samples privileges” on page 242. See “Right-click Menu - Hierarchy privileges” on page 243. Right-click Menu - Actions Privileges Lets you perform the actions that are relevant to the Software Management Framework. Additional solutions that are installed on the Symantec Management Platform may add further privileges to this category. See “Right-click Menu - Hierarchy privileges” on page 243. Right-click Menu - Set Asset Lets you change the status of an asset. These privileges let you set the status of a Status Privileges resource to Active or Retired. Solutions that are installed on Symantec Management Platform may add more privileges. See “Right-click Menu - Set Asset Status privileges” on page 245. Connection Profile privileges Connection Profile privileges let you create and modify connection profiles. Connection profiles store the information that is required to communicate with computers and other network devices using standard network monitoring protocols. These protocols include SNMP, WMI, WSMan, and several others. See “About security privileges” on page 233. Table 11-4 Connection Profile privileges Privilege Description Create Connection Profile Lets you create and modify connection profiles. Management privileges Management privileges let you create management items, such as filters, targets, reports, and tasks, on the Symantec Management Platform. See “About security privileges” on page 233. 235 236 Configuring security About security privileges Table 11-5 Management privileges Privilege Description Create Agent Settings Lets you create a new targeted agent settings policy, or clone an existing policy. The targeted agent settings are the general parameters that control the Symantec Management Agent, including how the agent communicates with Notification Server. Create Automation Policies Lets you create new automation policies. An automation policy is dynamic and specifies automated actions to perform on the Notification Server computer. It targets the appropriate computers when the policy is activated and performs whatever action is required based on the current state of each target computer. Create Filters Lets you create new resource filters. A resource filter, usually known as a filter, is a dynamic definition of a set of resources. Filters are used with organizational groups to identify the resources (a resource target) that a task or policy applies to. Create Jobs or Tasks Lets you create a new job or task, or clone an existing job or task. Jobs can contain multiple tasks, multiple tasks, and multiple conditions, which gives you great flexibility in setting up the job sequence that you need. Create Maintenance Windows Lets you create a new maintenance window policy, or clone an existing policy. A maintenance window is a scheduled time and duration when maintenance operations may be performed on a managed computer. A maintenance window policy defines one or more maintenance windows. Create New Client Job Lets you create a new client job. Client jobs are deployed to managed computers by a task server. The managed computer then runs the job and reports back to Notification Server. Create New Server Job Lets you create a new server job. Server jobs run on Notification Server. Create Organizational Groups Lets you create new organizational views and groups. An organizational view is a hierarchical grouping of resources (as organizational groups) that reflects a real-world structure or view of your organization. Create Reports Lets you create a new report, or clone an existing report. Create Resource Targets Lets you create new resource targets. A resource target, usually known as a target, is a framework that lets you apply tasks and policies to a dynamic collection of resources. A target consists of at least one organizational view or group, and a number of filters. The filters refine the available resources to identify those that you want. Discovery Task Management Lets you perform Network Discovery tasks. Configuring security About security privileges System privileges System privileges let you perform management activities, such as setting up security, managing hierarchy, and importing XML files, on the Symantec Management Platform. See “About security privileges” on page 233. Table 11-6 System Privileges Privilege Description Change Security Lets you change the security configuration on the Symantec Management Platform. You can create security roles, assign privileges and user accounts to security roles, and assign permissions to management items for each role. See “Setting up Symantec Management Platform security” on page 229. Create CMDB Rules Lets you create CMDB rules in Data Connector. You use Data Connector to transfer data between the CMDB and a data source, and manipulate data within the CMDB. Data Connector is part of the extended Symantec Management Platform. Edit SQL Directly Lets you create or modify SQL queries in reports and filters. If a user is proficient in SQL and familiar with the CMDB, this privilege lets them write very specific, efficient reports. However, it can also be used to avoid security checks. For example, a user can write a query that accesses resources that are outside their scope. That is, the resources are not contained in the organizational groups that the user has permission to view. Warning: Poorly written SQL queries can return incorrect results or be inefficient, consuming excessive memory and CPU time on the CMDB computer. Also, a malicious SQL query can delete, modify, or add data anywhere in the CMDB. Therefore, this privilege is very security sensitive and is only granted to the Symantec Administrators role by default. If you let security role members edit SQL directly, you should use the report-specific application credentials to force reports to use an account with restricted CMDB access. 237 238 Configuring security About security privileges Table 11-6 System Privileges (continued) Privilege Description Import/Export XML Lets you import items and resources from specially structured XML files, and export items and resources to XML files. Take care when you create an item or resource in the Symantec Management Platform by importing information that is stored in an XML file. Creating an item this way bypasses all security checks. For example, a user can create a report by importing its XML even when the user does not have the necessary privileges and permissions. In this example the user needs the Create Reports privilege and the Create Children permission to the folder in which the report is stored. This privilege is very security sensitive. By default, it is granted only to the Symantec Administrators role and should not be granted to non-administrators. Manage Data Connector Lets you manage Data Connector. Data Connector is part of the extended Symantec Management Platform. You use Data Connector to transfer data between the CMDB and a data source, and manipulate data within the CMDB. Manage Hierarchy Replication Lets you create and run hierarchy replication rules. The hierarchy replication rules specify what is replicated to the parent Notification Server and to any child Notification Servers. Manage Hierarchy Lets you add your Notification Server to a hierarchy, or remove it from a hierarchy. You can add your Notification Server to a hierarchy as a child of an existing remote Notification Server, or as its parent. Remember that your Notification Server is the one that you are logged into, which may be a remote logon. You require this privilege on both Notification Servers to create or change a hierarchical relationship between them. See “About creating and managing hierarchical relationships” on page 99. Take Ownership Lets you take ownership of a security entity. This privilege grants the new owner full permissions on the entity. For example, you would need to take ownership if all permissions on the entity were accidentally removed. See “Taking ownership of a folder or item” on page 265. View Security Lets you view the security configuration on the Symantec Management Platform. This information includes details of the security roles, and the user accounts, privileges, and permissions that are assigned to each role. See “About security roles” on page 231. Configuring security About security privileges Credential privileges Credential privileges let you create new credentials in Credential Manager. Credential Manager provides a secure storage location for user names and passwords. The types of credentials that the Credential Manager stores are defined by the solutions that are installed on Symantec Management Platform. See “About security privileges” on page 233. When a credential is created, only the creator is granted access. If other users need to perform a management operation that requires a credential, you need to assign this privilege to the appropriate user account or role that contains the user account. Table 11-7 Credential privileges Privilege Description Create Credential Lets you create and modify credentials in Credential Manager. See “About credential manager” on page 266. Workflow Directory privileges Workflow Directory privileges let you publish workflows from the workflow designer into Notification Server as a task or item action (an option on the right-click menu). Workflow Designer is part of Workflow solution. When you install Workflow solution, it adds a page to the Symantec Management Console that lets you download and install the Workflow Designer. It is not included in the Symantec Management Platform by default. See “About security privileges” on page 233. Table 11-8 Workflow Directory privileges Privilege Description Register/Unregister Workflows Lets you publish workflows from the workflow designer into Notification Server as a task or item action (an option on the right-click menu). For more information, refer to the Workflow solution documentation. 239 240 Configuring security About security privileges Symantec Management Console privileges Symantec Management Console privileges let you customize the Symantec Management Console. These privileges include the ability to edit the menu, and to create portal pages, Web parts, and views. See “About security privileges” on page 233. Table 11-9 Symantec Management Console privileges Privilege Description Create Portal Pages Lets you create new portal pages. A portal page is a Symantec Management Console page that you can customize to suit your requirements. You can use a portal page to consolidate key information into a single, easy-to-view page. A portal page can display the status of the Symantec Management Platform and managed computers, or any other information that you want to make available. For example, you can include external Web pages, intranet pages, RSS feeds, or your own applications. You need to have the Create Children permission on the folder in which you want to create the new portal page. Create Web Parts Lets you create new Web parts. Web parts are the mini Web pages that you can use as the building blocks for portal pages. A Web part can display a report or the contents of a Web page . You need to have the Create Children permission on the folder in which you want to create the new Web part. Create Views Lets you create new views. A view is a two-pane layout with a navigation tree in the left pane and content in the right pane. The navigation tree contains links to Symantec Management Console items and lets you group items from different parts of the console into a suitable structure. An item may appear multiple times in a view, and in any number of different views. A view can include folders, item links, and Web links. Edit Console Menu Lets you customize the Symantec Management Console menus. The menu options that are supplied with the Symantec Management Platform are read-only and cannot be modified. You can add new submenus, and can modify them as necessary. You can move or delete any menu item, except those that have been designated as read-only. Software Management Framework privileges Software Management Framework privileges let you manage the Software Management Framework. These privileges are the ability to create the Software Library and to create and import software resources. Configuring security About security privileges See “About security privileges” on page 233. Table 11-10 Privilege Software Management Framework privileges Description Manage Software Resources Lets you create, import, edit, and delete software resources. A software resource is the metadata that describes a specific instance of a software product. A software resource provides a common way to describe the software so that all software-related actions can identify it accurately. Typically, you should give software resource privileges to the user accounts who deliver and manage software. The Symantec Software Librarian and Asset Manager security roles has this privilege by default. Manage Software Library Settings Lets you create and edit the Software Library Settings. The Software Library is the physical directory location of the package files that are associated with the software in the Software Catalog. Because the Software Library is a repository of the definitive, authorized versions of the packages, you should restrict library access to maintain its integrity. The Symantec Software Librarian and Asset Manager security roles has this privilege by default. Create software deliveries Lets you create software deliveries (Quick Delivery or Package Delivery tasks and Manage Software Delivery policy) for selected software resource from the available software list. Lets you use the drag-and-drop feature to initiate software delivery from any software list. This privilege also allows the user to use the Delivery tab to create software deliveries. Right-click Menu privileges The Right-click Menu privileges (sometimes referred to as item action privileges) let you perform general actions on items in the Symantec Management Console. When you right-click on an item, the options that are relevant to that item type are available on the right-click menu. These privileges include the ability to delete an item, edit views, Web links, and item links, and start, stop, and schedule tasks. See “About security privileges” on page 233. 241 242 Configuring security About security privileges Table 11-11 Right-click Menu privileges Privilege Description Applies to Item Types Add to organizational group Lets you add a resource to an organizational group. All resources Write permission on the organizational group. Clone Lets you clone an item. All item types Clone permission on the item. Delete Lets you delete an item. All item types Delete permission on the item. Edit Item Link Lets you modify an item link. Item links only. Write permission on the item link. Edit Rule Lets you edit an inventory rule. Inventory rules only. Write permission on the inventory rule. Edit View Lets you edit a view. Views only. Write permission on the view. Edit Web Link Lets you modify a Web link. Web links only. Write permission on the Web link. Schedule Lets you schedule a policy. Policies only. Write permission on the policy. Schedule Task Lets you schedule a task. You can set the task to Tasks only. run once at a particular time, or to repeat at regular intervals. Run Task permission on the task. Security Role Manager Lets you open the Security Role Manager. All item types Write permission on the item. Start Task Lets you start a task immediately. Tasks only. Run Task permission on the task. Stop Task Lets you stop a task immediately. Tasks only. Run Task permission on the task. See “About the Security Role Manager” on page 260. Additional Requirements Right-click Menu - Connector Samples privileges The Connector Samples privileges are examples of user-creatable right-click actions. See “About security privileges” on page 233. Configuring security About security privileges Table 11-12 Right-click Menu - Connector Samples privileges Privilege Description Applies to Item Types Additional Requirements Ping Computer Lets you perform a TCP/IP ping on a computer. Computer resources only Read permission on the organizational group that contains the computer. Right-click Menu - Hierarchy privileges The Hierarchy privileges let you manage hierarchy replication. These privileges let you include or exclude specific items from hierarchy replication, and let you replicate items immediately. See “About security privileges” on page 233. Table 11-13 Right-click Menu - Hierarchy privileges Privilege Description Applies to Item Types Additional Requirements Disable Replication Lets you prevent an item from participating in hierarchy replication. All item types Manage Hierarchy Replication privilege, Write permission on the item. Lets you replicate selected data directly from a All item types Notification Server to all its child Notification Servers without including it in a replication rule. This operation is a once-off replication that takes place immediately. Manage Hierarchy Replication privilege, Write permission on the item. All configuration items and management items, and security roles and privileges are replicated by default. This option is available only when custom hierarchy replication rules are used. Replicate Now See “Replicating selected data manually” on page 114. Enable Replication Lets you allow an item to participate in hierarchy All item types replication. All configuration items and management items, and security roles and privileges are replicated by default. This option is available only when custom hierarchy replication rules are used. Manage Hierarchy Replication privilege, Write permission on the item. 243 244 Configuring security About security privileges Right-click Menu - Actions privileges The Actions privileges let you perform the actions that are relevant to the Software Management Framework. Additional solutions that are installed on the Symantec Management Platform may add further privileges to this category. See “About security privileges” on page 233. Table 11-14 Right-click Menu - Actions privileges Privilege Description Applies to Item Types Assign Type Assigns a type to an unassigned software resource Software resources in the Software Catalog. only An unassigned software resource is one that is not categorized as a software release, an update, or a service pack. Create Installed Software Filter Creates filters to find managed computers by the Software resources software that is installed on them. only Detailed Export Exports a software resource and any of its Software resources associated resource information to a detailed XML only file. Edit Command Line Opens the selected command line for editing within Software resources the software resource editing page. only Edit Package Opens the selected package for editing within the Software resources software resource editing page. only Edit Software Resource Opens the selected software resource for editing. Software resources only Import Package Changes a package’s source to the Software Library Software resources from a different source such as a directory on the only server or a UNC path. Merge Company Resource Merges the selected company resource with another company resource. This privilege is useful if you have two entries for the same company that might be spelled slightly differently, such as “Symantec” and “Symantec Corporation”. You can select the items to merge and specify the appropriate name to use. Additional Requirements Configuring security About Symantec Management Platform user accounts Table 11-14 Privilege Right-click Menu - Actions privileges (continued) Description Applies to Item Types Additional Requirements Resolve Duplicate When two software resources represent the same Software resources Software software but have different identifiers, this dialog only Resources box lets the user associate both identifiers with one software resource. Right-click Menu - Set Asset Status privileges The Set Asset Status privileges let you set the status of a resource to Active or Retired. Solutions that are installed on Symantec Management Platform may add more privileges to this category. For example, Asset Management solution adds three or four privileges here. See “About security privileges” on page 233. Table 11-15 Right-click Menu - Set Asset Status privileges Privilege Description Applies to Item Types Additional Requirements Active Sets the status of the selected resource as active. Resources only Write permission on the organizational group that contains the resource. Retired Sets the status of the selected resource as retired. Resources only Write permission on the organizational group that contains the resource. About Symantec Management Platform user accounts Symantec Management Platform 7.1 has its own user accounts. Previous versions of Symantec Management Platform used Windows users and groups for user security. Windows users are still used, but they are no longer the only security mechanism. User accounts, which are sometimes referred to as users, are not the same as user resources in Symantec Management Platform. A user resource is an entity that is used to associate managed devices with the owner of the device. The existing 245 246 Configuring security About Symantec Management Platform user accounts user resources and the user accounts that can log on to the Symantec Management Console or run a workflow are separate entities. A Symantec Management Platform user account is linked to the Windows credentials that the user requires to access the Symantec Management Console. The user account may also be linked to internal credentials that it can use to access other Symantec Management Platform services, such as workflows. The user account can be added to the appropriate security roles: an account has the union of all the privileges and permissions that are granted by the roles to which it belongs. See “Creating and configuring Symantec Management Platform user accounts” on page 247. A credential is something that a user account provides to prove its identity. In Symantec Management Platform, a credential may be a user name and password or a Windows account. The user account associates one or more credentials with a particular user and lets the user access the Symantec Management Console or Symantec Management Platform services. Symantec Management Platform uses two types of credentials: Internal credential Lets a user access the appropriate Symantec Management Platform services using a user name and password that is stored in the CMDB. For security reasons, only the hash value of the password is stored. A user account cannot use internal credentials to access the Symantec Management Console. The internal credentials are currently used only for workflow integration. Windows credential Lets a user access the Symantec Management Console and Symantec Management Platform services using a Windows user name and password. To use Windows credentials, Notification Server must be in the user's domain, or the user's domain must be trusted by the Notification Server domain. You should configure Windows credentials if your organization uses Windows accounts internally. Using Windows credentials lets you enforce password complexity requirements, periodically change passwords, keep password history, and perform other password management tasks in Windows. Configuring security Creating and configuring Symantec Management Platform user accounts Creating and configuring Symantec Management Platform user accounts You can configure your Symantec Management Platform user accounts to meet the requirements of your organization. You need to create all of the accounts that you want and assign them to the appropriate security roles. Each account has the union of all the privileges and permissions that the roles to which it belongs grants. See “About Symantec Management Platform user accounts” on page 245. See “About Symantec Management Platform security” on page 227. Creating and configuring Symantec Management Platform user accounts is a step in the process of setting up Symantec Management Platform security. See “Setting up Symantec Management Platform security” on page 229. Create and configure a user account in one of the following ways: ■ Create a completely new user account or clone an existing user account. See “To create a completely new user account or clone an existing user account” on page 247. ■ Import domain groups and users from Active Directory. See “To import domain groups and users from Active Directory” on page 248. To create a completely new user account or clone an existing user account 1 In the Symantec Management Console, on the Settings menu, click Security > Account Management. 2 In the left pane, click Account Management > Accounts. 3 On the Accounts page, in the left pane, take one of the following actions: To create a new account Click Add. In the New Account dialog box, type the new Symantec Management Platform account name, and then click OK. The new account appears in the list of accounts. By default, the new account status is Inactive. To clone an existing account Right-click the Symantec Management Platform account that you want to clone and configure. Enter the name of the new copy of this account, and click OK. 247 248 Configuring security Creating and configuring Symantec Management Platform user accounts 4 In the right pane, configure the appropriate settings in the following tabs: General The general account details. These include the full name and email address of the user for whom the account is created, the account status, and the account credentials. See “Specifying general Symantec Management Platform user account details” on page 249. See “Configuring credentials for a Symantec Management Platform user account” on page 249. Member Of The security roles to which the account belongs. The account has the union of all the privileges and permissions that the roles to which it belongs grants. See “Assigning a Symantec Management Platform user account to a security role” on page 252. 5 Click Save changes. To import domain groups and users from Active Directory 1 In Symantec Management Console, on the Actions menu, click Discover > Import Microsoft Active Directory. 2 On the Microsoft Active Directory Import page, in the description that is labeled Import Role and Account resources from <data source>, from (none). Perform this import on the specified schedule, click the user group (none). 3 (Optional) Create your own Role and Account import rules. 4 In the Select Security Groups dialog box, search for the domain groups from which you want to import user accounts; for example, Administrators and Users. 5 Click Add and then OK to add the selected groups. 6 Run the rule as a full import to import the selected domain groups. 7 (Optional) You can also schedule a full import to run at appropriate intervals. You can use this schedule to synchronize your security role membership with the domain group membership. This means that if you remove a domain user from the domain group, the corresponding Security Account is removed from the corresponding security role. Likewise if you add a domain user to the domain group, the corresponding Security Account is created and added to the corresponding security role. Note that if a domain user is removed from a domain group, the corresponding security account is not deleted. Only the membership to the security role is removed. Configuring security Creating and configuring Symantec Management Platform user accounts Specifying general Symantec Management Platform user account details You need to specify the full name and email address of the user for whom the account is created. You can also change the account status from Inactive to Active when appropriate. See “About Symantec Management Platform user accounts” on page 245. See “Creating and configuring Symantec Management Platform user accounts” on page 247. See “Setting up Symantec Management Platform security” on page 229. To specify general Symantec Management Platform user account details 1 In the Symantec Management Console, on the Settings menu, click Security > Account Management. 2 In the left pane, click Account Management > Accounts. 3 On the Accounts page, in the left pane, click the account that you want to configure. 4 In the right pane, on the General tab, specify the account details by editing the appropriate boxes: Full Name The full name of the user to whom the account belongs. Email The email address of the account user. 5 (Optional) If you want to activate or deactivate the account, click the status icon in the title bar and then select Active or Inactive. 6 Click Save changes. Configuring credentials for a Symantec Management Platform user account You need to configure the appropriate credentials to each Symantec Management Platform user account. You can add one Symantec Management Platform internal credential and one Windows credential to a user account. The Windows credential emulates the behavior of previous versions of Symantec Management Platform. See “About Symantec Management Platform user accounts” on page 245. See “Creating and configuring Symantec Management Platform user accounts” on page 247. See “Setting up Symantec Management Platform security” on page 229. 249 250 Configuring security Creating and configuring Symantec Management Platform user accounts An internal credential lets a user access the appropriate Symantec Management Platform services using a user name and password that is stored in the CMDB. Currently, internal credentials are used only for workflow integration. A Windows credential lets a user account access the Symantec Management Console and Symantec Management Platform services using a Windows user name and password. To use Windows credentials, Notification Server must be in the user's domain, or the user's domain must be trusted by the Notification Server domain. You should configure Windows credentials if your organization uses Windows accounts internally. Using Windows credentials lets you enforce password complexity requirements, periodically change passwords, keep password history, and perform other password management tasks in Windows. To configure credentials for a Symantec Management Platform user account 1 In the Symantec Management Console, on the Settings menu, click Security > Account Management. 2 In the left pane, click Account Management > Accounts. 3 On the Accounts page, in the left pane, click the account that you want to configure. Configuring security Creating and configuring Symantec Management Platform user accounts 4 In the right pane, on the General tab, under Credentials, click Add Credential and then do one of the following: To add a Windows credential Click Windows and then, in the Windows Credential to the account dialog box, specify the appropriate Windows user name in Domain/Username format. If the Windows account is in the same domain as Notification Server, you can omit the Domain and specify the Username only. If you specify a Windows account that is already assigned to a user account, the Windows credential is removed from the existing account. The Windows credential is then added to the new user account. To add an internal credential Click Internal and then, in the Create Internal to the account Credential dialog box, specify the appropriate password. The password must meet the password complexity settings. See “Configuring password complexity and lockout settings” on page 252. The credential user name is the name of the Symantec Management Platform account and you cannot change it. 5 Click OK. The new credential is added to the Credentials list. 6 (Optional) If you want to modify a credential, select it in the Credentials list and then click Edit. In the Edit Windows Credential dialog box or the Edit Internal Credential dialog box, make the appropriate changes and then click OK. For security reasons, the Edit Internal Credential dialog box does not display the current password. If you specify a new password, the credential is updated accordingly. If you leave the Password box empty, the original password is preserved. 7 (Optional) If you want to delete a credential, select it in the Credentials list and then click Delete. 8 Click Save changes. 251 252 Configuring security Configuring password complexity and lockout settings Assigning a Symantec Management Platform user account to a security role You need to assign each Symantec Management Platform user account to the appropriate security roles. You need to be a member of the Symantec Administrators role, or a member of a role that has the Change Security privilege, to assign role membership. The account has the union of all the privileges and permissions that the roles to which it belongs grants. See “About Symantec Management Platform user accounts” on page 245. See “Creating and configuring Symantec Management Platform user accounts” on page 247. See “Setting up Symantec Management Platform security” on page 229. To assign a Symantec Management Platform account to a security role 1 In the Symantec Management Console, on the Settings menu, click Security > Account Management. 2 In the left pane, click Account Management > Accounts. 3 On the Accounts page, in the left pane, click the account that you want to configure. 4 In the right pane, on the Member Of tab, make the appropriate settings. 5 Click Add Role. 6 In the Select Role(s) dialog box, select the security roles to which you want to add the account, and then click OK. 7 On the Member Of tab, verify that the list of security roles is correct. You can remove any that you do not want. 8 Click Save changes. Configuring password complexity and lockout settings The Password Settings page lets you configure the password complexity and lockout settings for internal credentials. These settings apply to internal credentials only: they do not apply to passwords that are managed externally, such as a Windows account. These complexity and lockout settings are often required to comply with an organization’s access control policy. See “About Symantec Management Platform security” on page 227. See “Setting up Symantec Management Platform security” on page 229. See “Unlocking locked out credentials” on page 255. Configuring security Configuring password complexity and lockout settings You need to specify appropriate password complexity requirements to prevent Symantec Management Platform user accounts from creating weak passwords. Any changes that you make to the password complexity settings do not affect existing passwords. The password complexity rules are applied only when passwords are created or changed. You cannot specify temporal restrictions such as allowing user accounts to log on only during certain time periods or on particular days of the week. To configure this type of restriction, you can use a scheduled task, a workflow, or an automation policy that disables and enables accounts at the appropriate times. You cannot configure the maximum password age for internal credentials. The maximum password age for Windows credentials should be managed using a Windows policy. Table 11-16 Settings on the Password Complexity tab Setting Description Allow blank password Specifies whether to allow a credential to have an empty password. If you enable this setting, the minimum password length is disabled. By default, this setting is disabled. Minimum password length Specifies the minimum number of characters that the password must contain. If you want to set the length to zero (0), you must also enable the allow blank password setting. The default is six (6). Minimum number of non-alphabetic characters Specifies the minimum number of non-alphabetic characters that the password must contain. Non-alphabetic characters are numbers (such as 1, 2, 3, etc.) and special characters (such as !, ?, &, etc.) The default is one (1). Contain account name Specifies whether to allow the password to contain the user account name. Note that this is not case sensitive. By default, this setting is disabled. You need to specify appropriate password lockout conditions to prevent unauthorized access to Symantec Management Platform. Any changes that you 253 254 Configuring security Configuring password complexity and lockout settings make to the password lockout settings are applied to all subsequent failed logon attempts. The maximum allowable unsuccessful attempts setting is not applied to the number of previous failed logon attempts. Table 11-17 Settings on the Password Lockout tab Setting Description Enable Credential Lockout Specifies whether to lock the credentials when the specified maximum number of unsuccessful logon attempts is reached. By default, this setting is enabled. Internal Credential Lockout Specifies the maximum number of logon attempts that a Threshold user may make with any particular credential. If a user attempts to authenticate with an incorrect password more than this number, the credential is locked for the specified lockout period. Unsuccessful logon attempts are counted from when the credential is created. The failed attempts do not need to happen within a minimum time period. There is no maximum time after which a failed attempt is no longer counted. If you change this setting to reduce the maximum number of unsuccessful attempts allowed, the new value is not applied to any account until the next logon attempt. If the next attempt is successful, the count is reset to zero (all previous failures are erased). However, if the next attempt fails, the count of failed attempts is evaluated. If the maximum number is reached (or possibly already exceeded), the account is locked. Lockout Duration Specifies the duration that a locked out credential cannot be used. The default period is 1800 minutes (30 hours). All logon attempts that the user makes during this time period fail, even if the correct credentials are supplied. When the lockout period expires, the same credentials are valid again. No automatic password reset is required. You can specify an infinite lockout period by entering a value of -1. In this scenario, a locked credential remains locked until an administrator manually unlocks the credential. See “Unlocking locked out credentials” on page 255. Configuring security Unlocking locked out credentials To configure password complexity and lockout settings 1 In the Symantec Management Console, on the Settings menu, click Security > Account Management. 2 In the left pane, click Account Management > Password Settings. 3 On the Password Settings page, make the necessary configuration changes in the appropriate tabs. Password Complexity Lets you specify the password complexity rules that you want to apply to Internal credentials. See Table 11-16 on page 253. Password Lockout Lets you specify the conditions that cause Symantec Management Platform to lock Internal credentials. See Table 11-17 on page 254. 4 Click Save changes. Unlocking locked out credentials The Unlock Credentials page lets you unlock internal credentials that have become locked out after the maximum number of unsuccessful logon attempts has been exceeded. See “About Symantec Management Platform security” on page 227. See “Setting up Symantec Management Platform security” on page 229. See “Configuring password complexity and lockout settings” on page 252. To unlock locked out credentials 1 In the Symantec Management Console, on the Settings menu, click Security > Account Management. 2 In the left pane, click Account Management > Unlock Credentials. 3 On the Unlock Credentials page, in the list of locked credentials, select the credential that you want to unlock. 4 Click Unlock Credentials. About security role permissions The permissions on an item in the Symantec Management Console determine the access that a security role has to that item. Permissions on items are applied to 255 256 Configuring security About security role permissions security roles, not to individual user accounts. For example, the Read permission on an item lets a user view it, and the Write permission on the item lets the user modify it. See “Setting up Symantec Management Platform security” on page 229. See “Assigning security permissions to folders and items” on page 262. Permissions are used with privileges to determine what actions a security role may perform on an item. For example, to delete an item a security role must have both the Delete privilege and the Delete permission on that particular item. Having only the Delete privilege, or the Delete permission on the item, is not sufficient. You can specify the permissions that apply to each folder or item for each security role. Permissions that are applied directly to a folder or item (non-inherited permissions) are combined with the permissions that are inherited from the parent folder. The combined permissions determine the access that the security role has to that particular folder or item. By default, child items and folders inherit all permissions on a folder. You can modify permission inheritance to suit your requirements. Table 11-18 lists and describes the categories of security permissions that you can set for each role. Table 11-18 Security permission categories Permission category Description Resource Management These permissions apply to resources. See “Resource Management permissions” on page 257. System These permissions apply to the system, such as reading, writing, and deleting items. See “System permissions” on page 257. Task Server These permissions apply to Task Server. See “Task Server permissions” on page 258. Report These permissions apply to reports. See “Report permissions” on page 258. Policy These permissions apply to policies. See “Policy permissions” on page 259. Folder These permissions apply to folders. See “Folder permissions” on page 259. Configuring security About security role permissions Table 11-18 Security permission categories (continued) Permission category Description Filter These permissions apply to filters. See “Filter permissions” on page 259. Connection Profile These permissions let you use connection profiles. See “Connection Profile permissions” on page 259. Credential Manager These permissions let you use the Credential Manager. See “Credential Manager permissions” on page 260. Resource Management permissions These permissions apply to resources. See “About security role permissions” on page 255. Table 11-19 Resource Management permissions Permission Description Read Resource Data Lets you read resource data. Read Resource Association Lets you read resource association data. Write Resource Data Lets you write resource data. Write Resource Association Lets you write resource association data. System permissions These permissions apply to the system, such as reading, writing, and deleting items. See “About security role permissions” on page 255. Table 11-20 System permissions Permission Description Full Control Lets you take full control of an item that another user owns. See “Taking ownership of a folder or item” on page 265. Delete Lets you delete items 257 258 Configuring security About security role permissions Table 11-20 System permissions (continued) Permission Description Write Lets you create or modify items. Clone Lets you clone an existing item. Read Lets you open an item and views the item contents. Change Permissions Lets you change permissions on items. Read Permissions Lets you read the permissions for an item. Task Server permissions These permissions apply to Task Server. See “About security role permissions” on page 255. Table 11-21 Task Server permissions Permission Description Create New Task Lets you create new tasks. Run Script Lets you run a script. Run Power Control Lets you run power control tasks. Run Task Lets you run tasks. Run Control Service State Lets you run a control service state. Report permissions These permissions apply to reports. See “About security role permissions” on page 255. Table 11-22 Report Permissions Permission Description Run Reports Lets you run a report. Save Reports Lets you save a report. Configuring security About security role permissions Policy permissions These permissions apply to policies. See “About security role permissions” on page 255. Table 11-23 Policy permissions Permission Description Apply to Resource Targets Lets you apply resource targets to policies. Enable Policy Lets you enable or disable a policy. Folder permissions These permissions apply to folders. See “About security role permissions” on page 255. Table 11-24 Folder permissions Permission Description Create Children Lets you add items and subfolders to a folder. Filter permissions These permissions apply to filters. See “About security role permissions” on page 255. Table 11-25 Filter permissions Permission Description Apply Agent Settings Lets you change a targeted agent settings policy and apply it to a resource target. Apply Software Delivery Tasks Lets you apply software delivery tasks. Connection Profile permissions These permissions let you use connection profiles. Connection profiles store the information that is required to communicate with computers and other network devices using standard network monitoring protocols. These protocols include SNMP, WMI, WSMan, and several others. 259 260 Configuring security About the Security Role Manager See “About security role permissions” on page 255. Connection profiles are associated with devices during network discovery. During discovery, a connection profile is selected to define the protocols and credentials to use. When discovery completes, this connection profile is then associated with each discovered resource. When information is required, the associated connection profile is used to connect. Table 11-26 Connection Profile permissions Permission Description Use Lets you use connection profiles. Credential Manager permissions Credential Manager provides a secure storage location for user names and passwords. The types of credentials that the Credential Manager stores are defined by the solutions that are installed on Symantec Management Platform. These permissions let you use the Credential Manager. See “About security role permissions” on page 255. Table 11-27 Credential Manager permissions Permission Description Use Lets you use the Credential Manager. See “About credential manager” on page 266. About the Security Role Manager The Security Role Manager is a special console that lets you view and set permissions for security roles. The console lets you select a particular security role and view the permissions that are associated with each item for that security role. You can view the items by type, or view all the available items, and select the folder or item on which to set permissions. By default, child items and folders inherit all permissions on a folder. You can modify permission inheritance to suit your requirements. You can also use the Security Role Manager to take ownership of an item. You may need to take ownership if permissions on an item are removed accidentally so that the owner no longer has access to it. By taking ownership of an item, you can reset the appropriate permissions and restore access for the original owner. Configuring security About the Security Role Manager See “About security role permissions” on page 255. See “Accessing the Security Role Manager” on page 261. See “Assigning security permissions to folders and items” on page 262. See “Customizing permission inheritance” on page 263. See “Taking ownership of a folder or item” on page 265. Accessing the Security Role Manager You can access the Security Role Manager in the following ways: Directly from the Symantec Management Console Settings menu. The Security Role Manager opens with your security role selected, and the All Data Classes view shown. From the right pane of the Roles page. The Security Role Manager opens with the appropriate security role selected, and the All Data Classes view shown. From the Actions menu for a security role. The Security Role Manager opens with the appropriate security role selected, and the All Data Classes view shown. From the right-click menu for an item or folder in the left pane. You would normally use this method to set permissions on a particular item or folder. The Security Role Manager opens with your security role selected, and the appropriate folder selected. See “About the Security Role Manager” on page 260. See “Assigning security permissions to folders and items” on page 262. See “Customizing permission inheritance” on page 263. See “Taking ownership of a folder or item” on page 265. To access the Security Role Manager from the Symantec Management Console menu ◆ In the Symantec Management Console, on the Settings menu, click Security > Permissions. To access the Security Role Manager for a specific security role 1 In the Symantec Management Console, on the Settings menu, click Security > Account Management. 2 In the left pane, click Account Management > Roles. 261 262 Configuring security About the Security Role Manager 3 On the Roles page, in the left pane, click the security role that you want to configure. 4 Do one of the following: ■ In the right pane (the Security Role Name page), click Show Security Role Manager Console. ■ Click Actions > Security Role Manager. ■ Right-click the security role that you want to configure and then click Security Role Manager. To access the Security Role Manager for a specific folder 1 In the Symantec Management Console, open a view that contains the folder on which you want to set security permissions. 2 In the left pane, right-click the folder and then click Security. Assigning security permissions to folders and items You can specify the non-inherited permissions that apply to each folder or item for each security role. These are combined with the permissions that are inherited from the parent folder. The combined permissions determine the access that the security role has to that particular folder or item. By default, any child folders or items inherit the combined set of permissions. See “About security role permissions” on page 255. See “About the Security Role Manager” on page 260. See “Accessing the Security Role Manager” on page 261. Assigning security permissions to folders and items is a step in the process of setting up Symantec Management Platform security. See “Setting up Symantec Management Platform security” on page 229. To assign security permissions to folders and items 1 In the Security Role Manager, in the Role drop-down list, select the security role for which you want to set permissions. 2 (Optional) In the View drop-down list, select an item category to view the folder structure that contains the relevant items. If you want to view the full folder structure, select All Items. 3 In the left pane, select the folder or item for which you want to set permissions. Configuring security About the Security Role Manager 4 On the right pane, in the Noninherited panel, make the appropriate changes to the permission settings. 5 (Optional) If you want to configure permission inheritance for this folder or item, click Advanced. See “Customizing permission inheritance” on page 263. 6 Click Save changes. Customizing permission inheritance By default, permission inheritance is enabled for all folders and items. Child folders and items inherit the security permissions for each role that is assigned to a folder. The inherited permissions cannot be modified on the child folders and items, but additional non-inherited permissions can be specified. The non-inherited permissions are applied directly to the folder or item and can be modified at any time. The permission settings on each folder or item are the combination of both the inherited and non-inherited settings. The combined set of permissions is then applied to any child folders or items. Any changes to permission settings for a folder are immediately applied to all of its child folders or items. See “About security role permissions” on page 255. See “About the Security Role Manager” on page 260. See “Accessing the Security Role Manager” on page 261. See “Assigning security permissions to folders and items” on page 262. You can disable permission inheritance for any folder or item. This lets you remove some of the inherited permissions from the folder or item, but preserve them on its parent folder. The permission inheritance settings that you apply to a folder or item apply to every security role. You cannot customize inheritance settings for particular roles. Warning: Disabling permissions inheritance on a folder or item can cause unexpected denials of access for user accounts. If you disable permissions inheritance, ensure that there are explicitly specified permissions on the folder or item for user accounts to have the appropriate access. You can also remove all non-inherited permissions from folders or items, leaving only the inherited permissions. You may want to remove all non-inherited permissions to remove custom permissions that have been added to child folders or items. You may also use this feature to restore a standard set of permissions on all child folders and items. 263 264 Configuring security About the Security Role Manager Customizing permission inheritance is an optional step in the process of setting up Symantec Management Platform security. See “Setting up Symantec Management Platform security” on page 229. To customize permission inheritance for a folder or item 1 In the Security Role Manager, in the left pane, select the folder or item for which you want to configure permission inheritance. 2 In the right pane, click Advanced. 3 In the Permissions for: Item Name window, in the Account/Group/Role list, select the security role or user account for which you want to configure permissions. If you want to add another security role or user account to the list, click Add. In the Role Selection window, choose the appropriate security role or user account. See “Role Selection window” on page 265. 4 (Optional) In the Permissions for panel, change the permissions that are assigned to the selected security role for this folder or item. You can use this feature only for the non-inherited permissions. You cannot edit the inherited permissions. 5 Take any of the following actions: To inherit permissions from Check Inherit the permission entries from parent the parent folder object that apply to child objects. The inherited permission settings on the folder or item are updated to reflect the current permission settings on the parent folder. To disable permissions inheritance Uncheck Inherit the permission entries from parent object that apply to child objects. You have the choice of copying the current inherited permissions from the parent folder, or removing all inherited permissions. Any subsequent changes to the permission settings on the parent folder do not affect the permission settings on the folder or item. To remove all non-inherited Check Replace permissions on all child objects. permissions from child The non-inherited permissions settings are cleared on folders and items all child folders and items, leaving only the inherited permissions. Configuring security About the Security Role Manager 6 Click Save changes. 7 (Optional) If you have disabled permission inheritance, in the Inherited Permissions Behavior dialog box, click the appropriate option: Copy The current inherited permissions are merged with the non-inherited permission settings on this folder or item. Remove The current inherited permissions are cleared, leaving only the non-inherited permissions. Ensure that you have the appropriate non-inherited permissions on the folder or item before you select this option. 8 Click Cancel to close the Permissions for: Item Name window. Role Selection window The Role Selection window lets you choose a security role to add to the list of those available in the Permissions for: Item Name window. See “Customizing permission inheritance” on page 263. Table 11-28 Options on the Role Selection window Option Description Role list The list of security roles that are available for selection. Select Adds the selected security role to the list of those available in the Permissions for: Item Name window Advanced Opens the Select Accounts or Groups window, letting you select the appropriate user accounts. Taking ownership of a folder or item You can also use the Security Role Manager to take ownership of an item. This may be required if permissions on an item are removed accidentally so that the owner no longer has access to it. By taking ownership, you can reset the appropriate permissions and restore access for the original owner. To take ownership of a folder or item, you require the Take Ownership privilege and the Full Control permission on the folder or item. The Symantec Administrator role has this privilege, and has this permission on all items and folders. See “About the Security Role Manager” on page 260. 265 266 Configuring security About credential manager See “About security role permissions” on page 255. See “Accessing the Security Role Manager” on page 261. See “Assigning security permissions to folders and items” on page 262. See “Customizing permission inheritance” on page 263. To take ownership of a folder or item 1 In the Security Role Manager, in the left pane, select the folder or item for which you want to take ownership. 2 In the right pane, click Advanced. 3 In the Permissions for: Item Name window, click Take Ownership. 4 Click Save changes. 5 Click Cancel to close the Permissions for: Item Name window. About credential manager Credential manager provides a secure storage location for user names and passwords. Your installed management solutions define the types of credentials that the credential manager stores. See “About security role permissions” on page 255. See “Credential Manager permissions” on page 260. Access to credentials is controlled with the built-in role-based security of the Symantec Management Platform. When a credential is created, only the creator is granted access. If other users need to perform a management operation that requires a credential, then they must be assigned the rights. See “Creating a credential” on page 266. Before you delete a credential, make sure that the credential is not required as part of an active management task. See “Editing a credential” on page 267. Creating a credential Management solutions typically create credentials when they are needed to perform a task. To define a credential manually, you need to know the credential type that is used and the information that is required for that credential type. See “About credential manager” on page 266. Configuring security Editing a credential When a credential is created, only the creator is granted access. Additional users and groups are assigned access by editing the credential after it is created. To create a credential 1 In the Symantec Management Console, on the Settings menu, click All Settings. 2 In the left pane, click Monitoring and Alerting > Credential Settings > Credentials Management. 3 In the right pane, click Add Credentials. 4 In the Add Credential dialog box, select a credential type and then provide the required values. 5 Click OK. Editing a credential Editing a credential lets you update the password and lets you grant access to additional users and groups. See “About credential manager” on page 266. To edit a credential 1 In the Symantec Management Console, on the Settings menu, click All Settings. 2 In the left pane, click Monitoring and Alerting > Credential Settings > Credentials Management. 3 In the right pane, select a credential and then click Edit. 4 In the Edit Credential dialog box, update the credential, and then click OK to save your changes. 267 268 Configuring security Editing a credential Chapter 12 Configuring Schedules This chapter includes the following topics: ■ About Symantec Management Platform schedules ■ Managing shared schedules ■ Configuring a schedule ■ Viewing the Notification Server internal schedule calendar About Symantec Management Platform schedules Symantec Management Platform schedules let you perform both once-off and repeating operations on the Notification Server computer and the managed computers at appropriate times, without requiring manual intervention. For example, resource filters need to be updated frequently, the CMDB needs to be purged regularly, and packages must be refreshed at appropriate intervals. All of these tasks should be scheduled to run at whatever times and frequencies best suit the needs of your organization. See “Viewing the Notification Server internal schedule calendar” on page 276. See “How Symantec Management Platform uses schedules” on page 273. Symantec Management Platform uses two types of schedules: Shared These are defined on Notification Server as shared items that are available for any scheduled operation to use. See “Managing shared schedules” on page 274. Custom These are configured independently within each task, policy, or rule that is scheduled. They cannot be shared with any other tasks, policies, or rules. 270 Configuring Schedules About Symantec Management Platform schedules Table 12-1 Component Components of a schedule Description Active period and time The active period and time zone define the time period within zone which a schedule may occur. See “About schedule active periods and time zones” on page 270. Triggers A trigger is an event that causes the schedule to become active. A trigger may be a specific time and date, or an event such as a user logging on to a computer. Triggers control when the schedule occurs and repeats. If a schedule contains multiple triggers, it runs each time that any one of its triggers occurs. See “About schedule triggers” on page 270. Modifiers Modifiers are the additional conditions that are required for the schedule to be triggered. See “About schedule modifiers” on page 272. About schedule active periods and time zones A schedule may occur only within its active period. See “About Symantec Management Platform schedules” on page 269. All schedules, triggers, and modifiers have the following properties: Time Zone The time zone in which the task is scheduled to run. The time zone may be Local, Server, or UTC. Start Date The date and time when the schedule's active period begins. A schedule cannot be triggered before its start date. End Date The date and time when the schedule's active period ends. If the end date is not specified, the schedule remains active indefinitely. A schedule cannot be triggered after its end date. A schedule cannot run outside its active period. This applies even if the schedule was triggered within its active period, but was prevented from running at that time by a modifier. About schedule triggers A trigger is an event that causes the schedule to become active. See “About Symantec Management Platform schedules” on page 269. Configuring Schedules About Symantec Management Platform schedules Table 12-2 Schedule triggers Trigger Description Once The task occurs at a specified date and time. Daily The task recurs on a daily basis. The frequency can be specified to be a particular number of days. For example, a task can be scheduled every second day. Weekly The task recurs on a weekly basis. The day of the week can be specified, as can the frequency of the weeks. Monthly by date The task recurs on specified dates of the month. Monthly by day of week The task recurs on specified days of the week, in specified weeks. Yearly by date of month The task recurs on specified dates of the month, in specified months. Yearly by day of week The task recurs on specified days of the week, in specified weeks, in specified months. At system startup The task recurs at system startup. At user logon The task recurs whenever a user logs on. Schedule triggers may have the following properties: 271 272 Configuring Schedules About Symantec Management Platform schedules Table 12-3 Schedule trigger properties Property Description Exact Determines the behavior when a scheduled task cannot be performed at the exact time at which it is scheduled: True - Perform the scheduled task at the exact time, or not at all. If the conditions are such that the task cannot be performed at the exact scheduled time, the scheduled task is not performed. ■ False - Perform the scheduled task at the exact time, or as soon as possible afterwards. If the task cannot be performed at the exact time for any reason, it is performed as soon as possible after the scheduled time. For example, a task is scheduled to run every night at 2:00 A.M., but the computer is always off at that time. The Exact setting lets you run the task whenever the computer is turned on after that time. ■ This property applies to logon, startup, and other events, as well as specified times. Duration The length of time that the schedule is active. The duration may be up to 24 hours. Repetition The interval at which the task should be repeated during the schedule's active period. The repetition interval may be up to 24 hours. About schedule modifiers A schedule may contain one or more modifiers. Modifiers are the conditions that must be true to enable any of the triggers to start the schedule. All of the modifiers apply to all of the triggers. See “About Symantec Management Platform schedules” on page 269. Table 12-4 Schedule modifiers Modifier Description Only when a user is logged on When the trigger occurs on a target computer, the Symantec Management Agent on that computer checks to ensure that a user is logged on before it runs the schedule. If no user is logged on, the schedule is not run on that computer. Configuring Schedules About Symantec Management Platform schedules Table 12-4 Schedule modifiers (continued) Modifier Description Only when no user is logged When the trigger occurs, the target computer is checked to on ensure that no user is logged on. If a user is logged on, the schedule is not run on that computer. How Symantec Management Platform uses schedules Symantec Management Platform uses schedules for tasks and policies. See “About Symantec Management Platform schedules” on page 269. Table 12-5 describes how Symantec Management Platform uses schedules. Table 12-5 Use Schedule uses Description Scheduling server tasks and Many Symantec Management Platform operations are scheduled to occur at regular server policies intervals. Some of these operations need to be performed frequently. For example, updating the membership of resource groups and filters, or they may be less frequent, such as purging old records from the CMDB. These schedules are usually configured to repeat at regular intervals, and they remain active for an indefinite period. Scheduling agent tasks Schedules may be used when you want to perform operations on managed computers. For example, rolling out a patch to fix a vulnerability in an application or gathering inventory for compliance purposes. You would usually want to perform the operation as soon as possible, and you would want to perform it one time only. You can schedule agent tasks to run: ■ Immediately ■ Immediately, if a maintenance window is open ■ The next time a user logs on to the computer ■ The next time the computer is started. On some occasions you may want to schedule the operation to take place at a specific date and time. For example, 9:00 P.M. next Sunday evening, to ensure that it does not interfere with the user's ability to work. On rare occasions you may need to schedule a task to repeat. However, a repeating operation would usually be considered a task-based policy. 273 274 Configuring Schedules Managing shared schedules Table 12-5 Schedule uses (continued) Use Description Scheduling agent policies An agent policy is a statement about how a computer should be managed. For example, an agent policy may do the following: ■ Disallow software from being run ■ Require software to be installed ■ Require that inventory information about a computer be no older than N days To function correctly, some agent policies need to be scheduled to run at appropriate intervals. For example, a software compliance policy needs to periodically check that the computer is in compliance, and perform the appropriate remediation if it is not. Likewise, an inventory policy needs to ensure that the inventory data is current. These schedules are usually recurring schedules with a possible repetition during the working day. Agent policies are often scheduled to run when the computer starts up, or when a user logs on. When you set up these schedules, you also need to consider how they interact with the maintenance windows that are configured on the managed computers. Scheduling agent maintenance windows A maintenance window schedule is essentially a recurring schedule that has a duration. You do not need to schedule maintenance windows using computer startup, user logon, or other events. Maintenance windows have no need for any repetition during the working day. Managing shared schedules Any number of scheduled items (such as policies, tasks, or replication rules) may use a shared schedule. The alternative to using a shared schedule is to define a custom schedule within the policy or task. See “About Symantec Management Platform schedules” on page 269. Shared schedules cannot override maintenance windows. If you want a scheduled item to run outside a maintenance window, you need to configure the appropriate custom schedule. A set of default shared schedules is supplied with Symantec Management Platform. You can modify these to suit your requirements, but you cannot delete them. For example, you can configure the business hours schedule to run at regular intervals during your normal working hours. You may configure the package refresh schedule to run at a suitable time outside working hours. You can also create any new shared schedules that you require and delete them when they are no longer required. Configuring Schedules Configuring a schedule You can enable or disable each shared schedule as appropriate. All enabled shared schedules are available to any scheduled item. If you disable a shared schedule, any scheduled item that uses the schedule is disabled. See “Viewing the Notification Server internal schedule calendar” on page 276. To manage shared schedules 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Shared Schedules. 2 In the Shared Schedules page, do any of the following: To add a new schedule Click Add Schedule and then, in the Schedule Editor, specify the appropriate details. See “Configuring a schedule” on page 275. To edit a schedule Click the schedule name and then, in the Schedule Editor, specify the appropriate details. See “Configuring a schedule” on page 275. To enable a schedule Check the appropriate check box. If you want to disable the schedule, clear the check box. To delete a schedule At the right end of the appropriate row, click Delete. To see which items currently use a schedule In the Items Currently Using drop-down list, select the appropriate schedule. The names of all the items (such as tasks, policies, and replication rules) that use the selected schedule are shown in the lower panel. Configuring a schedule The Schedule Editor lets you configure a schedule to suit your requirements. See “About Symantec Management Platform schedules” on page 269. See “Managing shared schedules” on page 274. To configure a schedule 1 In the Schedule Editor window, in the Name box, type the schedule name. 2 Under Schedule Task, select the schedule frequency or trigger. 3 In the Details tab, specify the schedule start time, and the days, weeks, or months on which to run. 275 276 Configuring Schedules Viewing the Notification Server internal schedule calendar 4 If you want the schedule to be active for a particular range of dates, in the Advanced tab, specify the appropriate start and end dates. By default a new schedule is active as soon as it is created (from the current date). The schedule remains active indefinitely (no end date is specified). 5 If you want the schedule to repeat a task at regular intervals each time the schedule runs, in the Advanced tab, check Repeat Task. Specify the appropriate frequency and duration. 6 If you want this schedule to contain multiple schedules, check Use Multiple Schedules. 7 For each additional schedule that you want to add to this schedule, click New, and then complete steps 2 to 5. 8 If you want to remove a schedule, in the Will Occur drop-down list, select the appropriate schedule and then click Delete. 9 Click OK. Viewing the Notification Server internal schedule calendar You can view Notification Server schedule information in the Notification Server internal schedule calendar. The scheduled items that you can view in the Calendar include tasks running on Notification Server, policies, and automation policies. They also include shared schedules, blockout periods, maintenance windows, and Notification Server internal schedules. Symantec solutions may add additional scheduled items to the calendar. See “About Symantec Management Platform schedules” on page 269. The following types of scheduled items are displayed: Period items These define only a start time, and run for an indefinite period. Examples include maintenance windows, blockout periods, and shared schedules. Event items These have a defined end time. Examples include tasks, jobs, custom schedules, and policies. Note that policies are not always run at the times that are shown in the calendar. Policies are not as deterministic as tasks, so may be subject to delay. Tasks and jobs are always run at the times that are shown in the calendar. Configuring Schedules Viewing the Notification Server internal schedule calendar The Calendar view lets you see what schedules are configured for particular time periods, such as specific days, weeks, or months. In both the Week view and the Month view, you can click a particular day to open the Day view for that day. Some scheduled items use shared schedules, rather than define their own schedules. Shared schedule relationships are represented in the left pane of the Day view. The scheduled items are grouped under the shared schedule to which they refer. Each schedule has an associated symbol that links it to the appropriate configuration page, if one is available. You can click the symbol to drill down to the configuration page, which opens in a new window. If no configuration page is available for a schedule, the default calendar symbol is used and no drill-down functionality exists. See “Managing shared schedules” on page 274. See “Configuring a schedule” on page 275. To view the Notification Server schedule calendar 1 In the Symantec Management Console, in the Settings menu, click All Settings. 2 In the left pane, expand Settings > Notification Server and then click Internal Schedules Calendar. 3 On the Calendar View for Internal NS Schedules page, in the View drop-down list, select the view that you want to use: Automation Policies Shows the details of automation policies only. Tasks/jobs Shows the details of scheduled tasks and jobs only. Shared schedules Shows the details of shared schedules only. Internal NS schedules Shows the details of internal Notification Server schedules only. All server schedules Shows the details of all schedules. 277 278 Configuring Schedules Viewing the Notification Server internal schedule calendar 4 Select the time period that you want to view by clicking the appropriate symbol: Day Shows the details of each schedule that runs one or more times per day. The schedules are listed in order of their start times. The left pane lists the schedules, and the right pane shows their occurrences in the calendar. Day view is the default view. Each occurrence of a period item is displayed as a diamond. Each occurrence of an event item is normally displayed as a bar, but those that occur with very short intervals are displayed as small diamonds. For clarity on screen, events with an interval less than 15 minutes (by default) are omitted. The background color identifies the business hours that are defined for the organization. Week Shows the details of each schedule that runs less than one time per day but at least one time per week. Month Shows the details of each schedule that runs less than one time per week are displayed. Period items are omitted and event items are summarized to their start times, end times, and titles. 5 To view earlier or later time periods, click Previous or Next, whichever is appropriate. Chapter 13 Configuring site servers This chapter includes the following topics: ■ Managing sites ■ Managing site servers ■ About configuring the site service settings ■ About package server for Linux Managing sites You need to set up all the sites that you require in your organization. You can run a site import rule to automatically collect the site information for your organization from Active Directory. You can also create sites manually and assign the appropriate subnets and site servers to them. 280 Configuring site servers Managing sites To manage sites 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 Configure the sites to suit your requirements. You can do any of the following: Create a new site In the left pane, click New > Site. See “Creating a new site” on page 281. Modify a site In the left pane, select the site that you want to modify, and then click Configure. See “Modifying a site” on page 281. Delete a site In the left pane, select the site that you want to delete, and then click Del. Any subnets that are assigned to the site are not deleted. They become unassigned and may be assigned to a different site. Any site servers inside the affected subnets are not used until they are assigned to a different site. Remove a manually assigned site server from a site In the left pane, under the site server, select the site that you want to remove, and then click Del. The site server is not affected, and it continues to serve any other sites to which it is assigned. This option applies only to the site servers that are manually assigned to sites. A site server that belongs to a site through its subnet membership cannot be removed from that site. Remove a subnet from In the left pane, under the site, select the subnet that you a site want to delete, and then click Del. Deleting a subnet makes the subnet unassigned to any site. Any encompassed subnets that are not manually assigned to a site also become unassigned. Any site servers on the subnet, or the encompassed subnets, no longer serve the site. However, they continue to serve any sites to which they are manually assigned. Manage manually assigned agents You can assign agents to a site and remove any that you no longer require. See “Managing manually assigned agents” on page 282. Configuring site servers Managing sites Creating a new site You can create sites manually. When you create a site, you can assign the appropriate subnets to the site immediately. If you create a new site from the context of a subnet, then the subnet is assigned to the new site by default. If you create a site from the context of a site server, then that site server is manually assigned to the new site by default. To create a new site 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 In the left pane, click New > Site. 3 In the New Site window, in the Name box, type the new site name. 4 If you want to assign subnets to the site immediately, specify the appropriate subnets by doing one or more of the following: Click Add. Add a new subnet and assign it to the site. See “Creating a new subnet” on page 308. Click Edit. Assign existing subnets to the site. In the Select Subnets window, select the appropriate subnets, and then click OK. Click Delete. 5 Remove the selected subnets from the list of those to be assigned to the site. Click OK. Modifying a site You can modify existing sites as required. You can change the site name, the subnets that are assigned to it, and the site services that are installed on its site servers. To modify a site 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 In the left pane, select the site that you want to modify. 3 Click Configure. 281 282 Configuring site servers Managing sites 4 If you want to modify the site servers that are manually assigned to the site, in the Add/Remove Services window, make the appropriate selections. Adding or removing services manually does not affect site servers that are assigned to the site by subnet IP address encompassment. 5 If you want to change the site name, in the Edit Site window, in the Name box, type the new name. 6 If you want to change the subnets that are assigned to the site, specify the appropriate subnets by doing one or more of the following: Click Add. Add a new subnet and assign it to the site. See “Creating a new subnet” on page 308. Click Edit. Assign existing subnets to the site. In the Select Subnets window, select the appropriate subnets, and then click OK. Click Delete. Remove the selected subnets from the list of those to be assigned to the site. 7 When the subnet list is complete, click OK. 8 Click OK. Managing manually assigned agents A manually assigned agent is a computer that has been manually assigned to a site rather than assigned through its subnet. You may want to manually assign particular computers to a site to break away from the subnet assignment. You can manually assign new agents to a site by assigning the relevant resource targets to the site. You can remove any agents that you don’t want in the site by assigning the appropriate resource targets to a different site. Configuring site servers Managing site servers Note: When the manually assigned agent is a Task Server, the change does not formalize unless you reset the Symantec Management Agent on the computer. One way to reset the Symantec Management Agent is to click Reset Agent in the Task Status tab in the Symantec Management Agent. Another way is to run the Reset Task Agent task on the computer. To manage manually assigned agents 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 In the left pane, expand the site or site server that you want to modify, and then click Manually Assigned Agents. 3 On the Manually Assigned Agents page, do any of the following: Add manually assigned agents to a site Click New and then, in the Select a group window, select or create the appropriate resource targets. Reassign manually assigned This option is available only under the Site node, not agents to another site the Site Services node. Select the appropriate resource targets, and then click Assign to Site. In the Select a site window, select the appropriate site, and then click OK. Remove manually assigned agents from a site Select the appropriate resource targets, and then click Delete. Managing site servers You need to create all the site servers that you require in your organization and assign them to the appropriate sites. You can also modify existing site servers by adding or removing site services. See “About site services” on page 39. When a site server is selected, the Site Services page shows statistics for each site service that is installed on it. The collapsed view shows summary details, while the expanded view opens a pane for each site service that shows full details and graphical information. Each site service pane also includes a link to the corresponding global settings configuration page. See “About package service settings” on page 287. 283 284 Configuring site servers Managing site servers The title bar for each site service contains a symbol that shows its current status: Green The service is installed and running on the site server. Yellow The service is not currently installed on the site server. Orange The service is in a warning state. Red The service is unusable. A package is invalid. To manage site servers 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 Configure the site servers to suit your requirements. You can do any of the following: Create a site server In the left pane, click New > Site Server. See “Creating and modifying site servers” on page 284. Modify a site server In the left pane, select the site server that you want to modify, and then click Configure. See “Creating and modifying site servers” on page 284. Manually assign a site Select the appropriate site server, and then click Assign to server to a site Site. See “Assigning a site server to a site manually” on page 286. Remove a manually assigned site server from a site In the left pane, under the site server, select the site that you want to remove, and then click Del. The site server is not affected, and it continues to serve any other sites to which it is assigned. This option applies only to the site servers that are manually assigned to sites. A site server that belongs to a site through its subnet membership cannot be removed from that site. Creating and modifying site servers You can create the site servers that you require by selecting the computers that you want to use and specifying the site services that you want to install on each. You can modify existing site servers by adding or removing site services. Notification Server deploys the appropriate installation packages to the selected computers, and removes any that are no longer required. The changes are made Configuring site servers Managing site servers when the Symantec Management Agents on the target computers make their next configuration request, so it may not happen immediately. See “About site services” on page 39. See “Managing site servers” on page 283. To create and modify site servers 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 Do one of the following: Create a new site server 1 In the left pane, click New > Site Server. 2 In the Select Computers window, select the computers to which you want to add site services. The list in the left panel contains all the computers that are available to be used as site servers. When you install the Symantec Management Platform, you need to allow a few minutes for the system to populate this list. Modify a site server 3 3 Click OK to confirm your selection. 1 In the Detailed Information table, ensure that the Site Servers view is selected, and then select the appropriate site server. 2 Click the Edit symbol. In the Add/Remove Services window, check the appropriate check boxes to select the site services that you want to install on each computer. All of the available site services are listed under each computer, allowing you to select any combination of services for each computer. The check boxes for any service types that are not allowed to be installed on a particular computer are grayed out. You can group the list by site servers or by services. Selecting a parent node on the list selects all of its children. If any check box is already checked, that indicates the corresponding site service is already installed. If you want to remove it, uncheck the check box. 4 Click Next. The installation and uninstallation actions that you have specified are displayed. If necessary, click Back to return to the previous page and change your selection. 5 Click OK. 285 286 Configuring site servers About configuring the site service settings Assigning a site server to a site manually Site servers automatically serve the site to which their parent subnet is assigned. Site servers may have multiple NICs/IPs and be in more than one subnet, so may therefore belong to more than one site. You can also manually assign each site server to one or more other sites. The Manually Assigned column in the Detailed Information table indicates whether the site server is manually assigned to the site. See “Managing site servers” on page 283. When you manually assign a site server to a site, only the site server is assigned to the selected site. The subnet to which the site server belongs is not affected. To assign a site server to a site manually 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 In the Detailed Information table, ensure that the Site Server view is selected, and then select the appropriate site servers. 3 Click Assign to Site. 4 In the Select a Site window, select the site to which you want to assign the site server. 5 Click OK. About configuring the site service settings The site service settings are usually global default settings. Any changes that you make to the settings for a particular site service type are applied to all site services of that type. However, some site service types may have settings that can be configured on individual services, overriding the global defaults. For example, each package server can be configured as Constrained or Unconstrained, overriding the default setting. You can view and modify the global settings for each site service. Each site service, such as package servers, has a page that lets you edit its global settings. In the left pane, each installed service is shown underneath each site server. The corresponding page shows the service summary for the site server. The panel is expanded by default, rather than collapsed for statistics as on the Site Server page. The Change Settings link lets you edit the global settings for that service type. For many services, the summary information that is shown here may be the same as the summary information expandable on the Site Server page. However, the Configuring site servers About configuring the site service settings Symantec Management Platform allows a service to provide a different control in this context, if appropriate. For example, if there is a full page of data available, it is displayed on the site service page. A condensed data set is displayed on the Site Server page. See “About package service settings” on page 287. See “Configuring package service settings” on page 290. See “About task service settings” on page 290. See “Configuring task service settings” on page 291. About package service settings The Package Service Settings page contains the global package service settings. These settings are applied to all package services that are installed on site servers in your Symantec Management Platform environment. See “Configuring package service settings” on page 290. See “About configuring the site service settings” on page 286. Table 13-1 Setting Global package service settings Description Package File Settings You can delete package files if they have been unused for a specified time. You can choose to remove automatic site assignments for a package that has been unused for a specified time. This feature is activated for a package when you enable the Assign packages to package servers automatically with manual prestaging option on the Package Servers tab. The Remove automatic site assignments if they are unused for setting relates to the package delivery system as a whole, not specifically to package servers. A software package that is configured for automatic assignment is automatically assigned to a site when one of the following occurs: An enabled task or policy that delivers the package targets one or more computers in the site. ■ A Symantec Management Agent in the site requests the package. ■ An automatic assignment is flagged as unused if an agent in the site does not request the package within the specified time period. Unused automatic site assignments are removed automatically on a schedule. The site assignment is removed even if an enabled policy or task is still associated with the package. The automatic site assignment is then restored the next time an agent requests the package. See “About removing automatic site assignments” on page 289. 287 288 Configuring site servers About configuring the site service settings Table 13-1 Global package service settings (continued) Setting Description Published Codebase Types You can specify the codebase types to publish to the Symantec Management Platform. Security Settings You can publish the following types: ■ UNC codebase ■ IIS hosted codebase This codebase can be either HTTP or HTTPS. You can allow anonymous access to package codebases. This option enables all packages that are downloaded to package servers to have anonymous access applied to the directories containing the package files. Anonymous access is also enabled for the directory security inside IIS for the hosted package server packages. If this feature is disabled, the Agent Connectivity Credentials are used when you apply security to the package server files. The Agent Connectivity Credentials are specified on the Authentication tab on the Global Symantec Management Agent Settings page; it is a global setting for all package servers and agents. This account usually has a lower level of rights than the Application Identity account, and is a dedicated account created for use on package servers. Any HTTP virtual directories that are mapped to packages on the package server then have Windows authentication enabled. Only authenticated users are allowed to download through UNC when anonymous access is enabled. For example, if a package server in a non-trusted domain has anonymous access enabled on its files and the Agent Connectivity Credential (ACC) account the Symantec Management Agent uses to connect anonymously to the UNC source cannot be authenticated, access is denied and no download occurs. However, you can download through HTTP from a package server, in a non-trusted domain, using anonymous access because the ACC account does not need to be authenticated. You can create the ACC on package servers, provided the ACC is not a domain account. During this procedure, you have the option to reenable the created local account if it has been locked out. You also can create the ACC even if the package server is also a domain controller. Specifying a local account as the ACC facilitates the download of packages between a non-trusted domain. A local account ensures there is always a common account for all agents and package servers to use, rather than using a domain account that all parties may not trust. The local ACC account is usually specified as .\<account name> or <account name>. For a site to function, there must be at least one unconstrained package server that is assigned to it. Unconstrained package servers can download packages from the Notification Server computer or package servers outside of its site. Constrained package servers can only operate by downloading packages from other package servers within their site that have the packages available. You need an Configuring site servers About configuring the site service settings unconstrained package server to collect any required packages from outside the site. The unconstrained package server then makes the package available to all the constrained package servers within the site. Each package server can be configured as constrained or unconstrained, overriding the default setting. About removing automatic site assignments The Package Service Settings page has a Remove automatic site assignments if they are unused for setting. This feature is activated for a package when you enable the Assign packages to package servers automatically with manual prestaging option on the Package Servers tab. An automatic site assignment is removed if an agent has not requested the package for a time period that exceeds the Remove automatic site assignments if they are unused for setting. See “About package service settings” on page 287. If you check the option to remove automatic site assignments, site assignments are removed even if enabled tasks or policies are associated with the package. When a package is unassigned from a site, it is not reassigned at the next package refresh interval, even if an enabled task or policy is associated with the package. A package is reassigned to a site only if a Symantec Management Agent in the site requests the package. When a package is unassigned from a site, the package servers that hosted the package are no longer assigned as hosts. When a package server updates its configuration, the package is not in the list of packages that the package server should host. The package server then marks the package for deletion. When the package is marked for deletion, the countdown for its deletion begins. The package is deleted when the time that is specified in Delete package files if they are unused for on the Package Service Settings is reached. You cannot manually remove a package’s site assignment on the package’s Package Servers tab. If you manually remove a package’s site assignment on the package’s Package Server tab, the site assignment is restored when you save the changes. You also cannot remove a package’s automatic site assignment by modifying the polices that caused the assignment. To remove a package’s automatic site assignment, you must use the Remove automatic site assignments if they are unused for setting. When you check Remove automatic site assignments if they are unused for , it is possible for a package to not get unassigned from a site when the duration that is specified is exceeded. This situation can occur if you used the Package Servers by Site option to assign a package to a site and later changed this option to Package Servers automatically with manual prestaging. Because the initial site assignment 289 290 Configuring site servers About configuring the site service settings was not automatically assigned, the option that removes automatic site assignments does not remove it. Note: You can check whether Notification Server considers a package to be automatically assigned in the SWDPackageSite table of the CMDB. If the AutoAssigned column for the package has a value of 1, the package is automatically assigned. Configuring package service settings You need to configure the global package service settings. These settings are applied to all package services that are installed on site servers in your Symantec Management Platform. See “About package service settings” on page 287. See “About configuring the site service settings” on page 286. To configure package service settings 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 In the left pane, under the Settings node, expand the Package Service folder and then click Package Service Settings. 3 On the Package Service Settings page, configure the appropriate settings: To set the global package service settings In the Global Package Service Settings pane, make the necessary changes. To set up unconstrained package servers In the Constrained Package Server Selection panel, set up each package server by checking or unchecking the Constrained check box, as appropriate. You can use the Site drop-down list to view the summary information about all the package servers in a specific site, or all sites. 4 Click Save changes. About task service settings The Task Service Settings page contains the task service settings. These settings are applied to all task services that are installed on site servers in your Symantec Management Platform. Configuring site servers About configuring the site service settings See “Configuring task service settings” on page 291. Table 13-2 Task service settings Setting Description Task update interval The intervals when the task services download new and updated tasks from Notification Server. Minimum time between tickle attempts The minimum amount of time between tickle attempts. The tickle server sends a packet to a task server when any of its client computers have a task or job to run. It also collects status information and sends it to the client computer’s Notification Server database (CMDB). Maximum computers to manage per Task Server The maximum number of computers that each task server should manage. Allow maximum computers to be exceeded. . . Whether a task server can manage more computers if no other servers are available. Send detailed task events Whether to send detailed information for each task server event, which requires more bandwidth and might slow down your network’s performance. Automatically restart services Whether to restart the following services when configuration changes are made: ■ Symantec Object Host Service ■ Client Task Data Loader ■ WWW Publishing The data loader runs on each task server. It receives status information from the task service and caches it in memory until it can be sent to the CMDB. Network ports The ports to use for the Client to Task Server tickle option and the Server to NS tickle options. The ports to use for remote connections to the task server, data loader, and tickle server. Configuring task service settings You can apply task service settings to the task servers that computers, users, or resources use. Notification Server applies these settings to the chosen task services that are installed on the site servers in your environment. 291 292 Configuring site servers About package server for Linux To configure task service settings 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 In the left pane, under the Settings node, expand the Task Service > Settings folder and then click Task Service Settings. 3 On the Task Service Settings page, configure the appropriate settings. See “About task service settings” on page 290. 4 In the Applied To panel, click Apply to to select the computers, users, or resources to which these task service settings apply. These settings apply to the task services that these computers, users, or resources use. 5 Click Save changes. About package server for Linux To designate a Linux computer as a package server, ensure that the computer is running the following software: ■ Symantec Management Agent 7.1 for UNIX, Linux, and Mac This agent was previously known as the Altiris Agent for UNIX and Linux. Symantec Management Agent for UNIX, Linux, and Mac runs on a managed computer. That agent must match the version of the agent that is installed on the Notification Server computer in Symantec Management Platform. If the agent on the managed computer is older than the agent on Notification Server, upgrade it. After the agent is upgraded, the managed computer can become a package server. ■ Apache Web Server version 2.0 or 2.2 See “About integrating Apache Web Server with package server for Linux” on page 293. The following server platforms are supported: ■ Red Hat Enterprise Linux AS 4 ■ Red Hat Enterprise Linux ES 4 ■ Red Hat Enterprise Linux Server 5 ■ SUSE Linux Enterprise Server 10 ■ SUSE Linux Enterprise Server 11 Configuring site servers About package server for Linux Package server for Linux supports alternate download locations. Paths for alternate locations are converted automatically from Windows style to UNIX style if you include the trailing slash. For example, if you have Patch Management Solution installed, you can change policy and package settings when rolling out patches. In Symantec Management Console, under Settings > All Settings > Software > Patch Management, you click a vendor settings page; for example, you would click Red Hat Settings > Red Hat Patch Remediation Settings. When you click the Policy and Package Settings tab, you see the Remediation Settings page for the selected product. This is where you can check Use alternate download location on Package Server. When you enter the alternate download location, you must use the full Windows path. In this and similar instances, include a trailing slash in the Windows-style path to ensure that it is converted correctly to a UNIX-style path. Correct: C:\path\ Incorrect: C:\path Trailing slash means that the Windows path is converted correctly to /path/. If you omit the trailing slash, the Windows path is converted incorrectly. About integrating Apache Web Server with package server for Linux You integrate package server for Linux with the Apache Web Server to expose packages and Package Snapshots to Symantec Management Agent. Snapshots are downloaded from Notification Server to Symantec Management Agent on all supported platforms through HTTP URLs. See “About package server for Linux” on page 292. The packages and package snapshots are always downloaded to package server directories. The only files that are created in the Apache Web Server are directories, symbolic links, and .htaccess files. Symbolic links are created to the package files and snapshot files. The .htaccess files lock down package files with passwords. When a Linux computer becomes a package server, the agent on that computer attempts to create two main HTTP shares. These shares are created in the Apache Web Server virtual web space, as follows: ■ /Altiris/PS/Snapshots ■ /Altiris/PS/Packages Note /Altiris/PS This second directory is created if required. The Package Manifest file is not used when a package server for Linux downloads a package for distribution. The exception is if the package is located in the same 293 294 Configuring site servers About package server for Linux directory for the package server for Linux and Software Delivery. All package file permissions are set to allow Apache Web Server clients access. This access is typically through 0x744. Depending on the specific configuration of the Apache Web Server, directories are created in the root of the web directory. An example is /var/www/html on a typical Linux Red Hat system. The package server agent reads the Apache Web Server configuration file to determine this location. See “About detecting the Apache Web Server” on page 294. If you choose, you can specify that package server create the directories in an alternate location. Use an Apache Web Server alias directive to specify a separate directory. See “Requirements to configure package server and the Apache Web Server” on page 295. See “Requirements to configure HTTPS and HTTP” on page 296. About detecting the Apache Web Server You can detect the Apache Web Server automatically or manually. See “About integrating Apache Web Server with package server for Linux” on page 293. See “Requirements to configure package server and the Apache Web Server” on page 295. If you choose Automatic Detection, Symantec Management Agent looks for the Apache HTTPD or HTTPD2 executable in the following directory locations: ■ /bin:/usr/bin:/sbin:/usr/sbin:/usr/lbin:/usr/etc:/etc:/usr/bsd:/usr/local/bin:/ usr/contrib/bin/ ■ System PATH variable ■ /opt/apache/bin:/usr/apache/bin:/usr/apache2/bin:/usr/local/apache/bin:/usr/ local/apache2/bin:/usr/local/bin:/opt/freeware/apache/bin:/opt/freeware/ apache2/bin:/opt/freeware/apache/sbin:/opt/hpws/apache/bin:/opt/apache2:/ usr/local/apache+php If both HTTPD and HTTPD2 executables are found, then both Apache 2.0 and Apache 2.2 are installed. In addition, if both executable files are found, then the file that matches a running process is used. The default file is HTTPD2. If the Apache Web Server cannot be detected automatically, you may need to detect it manually. The Apache Web Server might not be detected automatically Configuring site servers About package server for Linux if the executable file is renamed. If multiple installations have occurred, then the wrong Apache Web Server could be detected. In any of these situations, you should specify the Apache Web Server location manually. To specify the Apache Web Server manually you should edit the [httpd Integration] section of the client.conf file in the agent. In this section, you should specify the "apache_exe_location" setting. When the Apache Web Server executable is located, it is used to determine the default location of the Apache Web Server configuration file. The configuration file is required to determine if the Apache Web Server setup is suitable for package server use. The configuration file also lets the installation program determine the settings that are applicable to the package server. Applicable settings include the ports that are used or whether the server is SSL-enabled. If Symantec Management Agent for UNIX, Linux, and Mac cannot find the Apache Web Server configuration file, it searches in the following locations: ■ /etc/httpd/conf ■ /etc/httpd/2.0/conf As an alternative to Automatic Detection you can edit the [Httpd Integration] section of the Symantec Management Agent for UNIX, Linux, and Mac client.conf file. When you edit the file, specify the apache_config_location. Any setting that you change becomes the default. You can use the Apache Web Server "-f" option during the installation to relocate the configuration file from its default location. If you relocate the file, you must specify the location of the apache_config_location. Package server for Linux does not support mod_perl generated httpd.conf files. Requirements to configure package server and the Apache Web Server For the package server for Linux to work with the Apache Web Server, certain requirements must be met. When these requirements are met, the Symantec Management Agent for UNIX, Linux, and Mac sends the Apache HTTP Server role. This role allows the computer to be used as a package server for Linux. See “About detecting the Apache Web Server” on page 294. The configuration requirements are as follows ■ Apache Web Server version 2.0 or 2.2 is installed. ■ The package server for Linux uses only the main Apache Web Server or the default Apache Web Server. All other virtual host sections in the Apache Web Server configuration are ignored, with the following exceptions: 295 296 Configuring site servers About package server for Linux ■ ■ The global settings and the _default_ virtual host are read for the main server settings. ■ The first virtual host that defines an SSL server is considered to be the main SSL server. Its settings are used for integrating and all other SSL virtual hosts are ignored. The Apache Web Server web space location where the package server files and directories are to be created must have the following options enabled: ■ FollowSymLinks ■ AllowOverride The Apache Web Server web space location must also be accessible through anonymous HTTP. The location is virtual directory /Altiris/PS/. See “Requirements to configure HTTPS and HTTP” on page 296. ■ If both HTTP and HTTPS are defined for the Apache Web Server, the HTTPS server is used. ■ Non-standard ports are detected and used, but the main Apache Web Server must be accessible through the hostname of the computer. The Listen directive for the main server must come before all other Port statements and Listen directives in the configuration file. ■ The Apache Web Server must be running. ■ No compressing modules are used with the Apache Web Server. This requirement exists because Package Delivery does not support those modules. ■ You may need to restart Symantec Management Agent for UNIX, Linux, and Mac after you make changes to the httpd.conf file. The files may not take effect until after you restart the agent. Requirements to configure HTTPS and HTTP Symantec Management Agent for UNIX, Linux, and Mac uses whichever type of Apache Web Server is available. It can use either HTTP or HTTPS. See “Requirements to configure package server and the Apache Web Server” on page 295. If the Apache Web Server supports both types of Web server, the package server for Linux uses HTTPS. Integrating with SSL through HTTPS is the default option because it is the most secure. If you want to use the HTTP server, you can change the [httpd Integration] "integrate_with" setting. We recommend one of the following approaches for installing the Apache Web Server to support package servers for UNIX and Linux: Configuring site servers About package server for Linux Install a packaged version of Apache Web Server. On Linux, the distributed Apache Web Server is most suitable. This installation contains the executable files and the technical support exe files in /usr/sbin or /usr/bin. Install the Apache Web Server package in the recommended location. An example of a suitable default location is /usr/local or /opt. Leave the Configuration directory in its The default configuration directory is the default location. This requirement ensures location that was compiled into your .exe, or that Symantec Management Agent for UNIX, /etc/httpd/conf. Linux, and Mac can easily detect the Apache Web Server and the configuration file. If you do not move the configuration directory, you do not have to specify extra manual settings. If you change the Apache Web Server configuration files while Symantec Management Agent is running, data is sent to Notification Server after a short time. After the Apache Web Server role data is sent to Notification Server, the computer becomes a candidate package server . If you want to speed up this process you should run the aex-sendbasicinventory executable file manually. Run the executable file from the shell on the client computer that is targeted for the package server installation. Update Notification Server with the changes. Two configuration examples are available. See “Package server configuration example that uses main web directory for package server links” on page 297. See “Package server configuration example using an alias for package server links” on page 299. Package server configuration example that uses main web directory for package server links This configuration generally requires the minimal modification to an out-of-the-box or default Apache Web Server setup. In this configuration a virtual directory that is called /Altiris/PS is created automatically under the main Apache HTML directory. See “Requirements to configure HTTPS and HTTP” on page 296. The example configuration contains the following directories: ■ Snapshots ■ Packages Symbolic links are created in these directories to each shared package. The packages themselves are stored under the package server agent VAR directory. 297 298 Configuring site servers About package server for Linux This configuration includes both an HTTP and an HTTPS Apache server. The package server uses the HTTPS server if it is available. The HTTPS server ensures a more secure operating environment and allows the use of Package Access credentials. Several configuration file checks are performed. The configuration files that are listed in this section are examples. These examples are from the default installation of the Apache Web Server as part of a legacy Red Hat Linux Distribution. Check number 1; Listen statement is as follows: ...## When we also provide SSL we have to listen to the ## standard HTTP port (see above) and to the HTTPS port ## <IfDefine HAVE_SSL> Listen 80 Listen 443 Listen 10.10.10.10:8080 </IfDefine>... Ensure that the Listen statement for each of the main servers is the first Listen statement of its type in the configuration file. The main HTTP and HTTPS servers should be the first two Listen statements. You should remove the IP or ensure that it is the same IP to which the hostname resolves, as reported to Notification Server. Check number 2; Main directory options is as follows: ... # DocumentRoot: The directory out of which you will serve your Notification Server Reference 62 # documents. By default, all requests are taken from this directory, but # symbolic links and aliases may be used to point to other locations. DocumentRoot "/var/www/html" ... # This should be changed to whatever you set DocumentRoot to. #<Directory "/var/www/html"> # This may also be "None", "All", or any combination of "Indexes", # "Includes", "FollowSymLinks", "ExecCGI", or "MultiViews". # Note that "MultiViews" must be named *explicitly* --- "Options All" # does not give it to you. Options Indexes FollowSymLinks # This controls which options the .htaccess files in directories can # override. Can also be "All", or any combination of "Options", "FileInfo", Configuring site servers About package server for Linux # "AuthConfig", and "Limit" AllowOverride AuthConfig # Controls who can get stuff from this server. Order allow,deny Allow from all </Directory> ... Find the <Directory> node for the DocumentRoot directory, and ensure that the following options are set: ■ FollowSymLinks ■ AllowOverride AuthConfig or Allow override All Check number 3; Check SSL host is as follows: ## SSL Virtual Host Context <VirtualHost _default_:443> # General setup for the virtual host DocumentRoot "/var/www/html" ErrorLog logs/error_log TransferLog logs/access_log Notification Server Reference 63 # SSL Engine Switch: # Enable/Disable SSL for this virtual host. SSLEngine on ... Ensure that the _default_ SSH Virtual host has the correct port. The port should match the first SSH Listen. Ensure that the DocumentRoot of the virtual host is the same as the DocumentRoot of the main server. The DocumentRoot of the host can be different from the DocumentRoot of the main server. The DocumentRoot of the host must have a <Directory> node that is configured with the same options that are specified in Check number 2. Package server configuration example using an alias for package server links You may want to keep the package server for Linux virtual directory completely separate from the Apache Web Server directory. To keep them separate, follow 299 300 Configuring site servers About package server for Linux this configuration example. This configuration example keeps all the symbolic links out of the main Apache Web Server directory. It ensures that the FollowSymLinks options are not required in the main directory. See “Requirements to configure HTTPS and HTTP” on page 296. An alias is used in the Apache Web Server configuration file to separate the /Altiris/ PS virtual directory. The package server for Linux automatically detects this alias and creates the required subdirectories in the correct location. The subdirectories are as follows: ■ Packages ■ Snapshots The actual packages are downloaded to the VAR directory on the agent. The configuration files that are used in this section are an example. The example is from the default installation of the Apache Web Server as part of a legacy Red Hat Linux Distribution. The Check number 1; Listen statement is as follows: ...## When we also provide SSL we have to listen to the ## standard HTTP port (see above) and to the HTTPS port ## <IfDefine HAVE_SSL> Listen 80 Listen 443 Listen 10.10.10.10:8080 </IfDefine> ... Ensure that the Listen statement for each of the main servers is the first Listen statement of its type in the configuration file. The main HTTP and HTTPS servers should be the first two Listen statements. You should remove the IP or ensure that it is the same IP to which the hostname resolves, as reported to Notification Server. You can use port numbers other than 80 and 443. The package server for Linux detects the ports. However, it always uses the port of the first Listen in the Apache Web Server configuration file. Check number 2; Create Alias and aliases directory options is as follows: ... Configuring site servers About package server for Linux # Aliases: Add here as many aliases as you need (no limit). The format is # Alias fakename realname # <IfModule mod_alias.c> ... Alias /Altiris/PS /var/altiris/www/ps <Directory /var/altiris/www/ps > Options FollowSymLinks AllowOverride All </Directory> </IfModule> # End of aliases. You should perform these steps in the following order: ■ Create both the Alias statement and the <Directory> node for the destination directory of the alias. ■ Ensure that the following options are set on that directory: ■ FollowSymLinks ■ AllowOverride AuthConfig or Allow override All ■ Create the destination directory. ■ Set the correct permissions on the destination directory to ensure that Apache Web Server clients can download files from there. ■ To ensure that the directory works, place a text file in it. Then browse to a URL such as http://your.server.name/ Altiris/PS/testfile.txt. In this example, your.server.name and testfile.txt are your own server name and the name of the text file that you created. Check number 3; Check SSL host is as follows: ... ## SSL Virtual Host Context <VirtualHost _default_:443> # General setup for the virtual host DocumentRoot "/var/www/html" 301 302 Configuring site servers About package server for Linux ErrorLog logs/error_log TransferLog logs/access_log # SSL Engine Switch: # Enable/Disable SSL for this virtual host. SSLEngine on ... Ensure that the _default_ SSH Virtual host has the correct port. It should match the first SSH Listen. Ensure that its DocumentRoot is the same as the DocumentRoot of the main server. Chapter 14 Getting started with IT Management Suite This chapter includes the following topics: ■ About the enhanced console views ■ About the Computers view ■ Searching for a computer and saving the search ■ Creating and populating an organizational view or group in the enhanced console views ■ Managing subnets ■ About the Jobs / Tasks view ■ Running a job or task using drag and drop ■ About the Policies view ■ Searching for a software and saving the search ■ Tracking the software licenses in the enhanced console views ■ About the Software Catalog window ■ About resource scoping ■ Considerations for resource scoping ■ Design considerations for resource scoping 304 Getting started with IT Management Suite About the enhanced console views About the enhanced console views The enhanced console views (also known as Symantec Management Console enhanced views and enhanced Symantec Management Console views) add functionality to the management views for version 7.1 and later for computers, jobs and tasks, policies, and software. The enhanced views add a Silverlight interface. This interface increases speed, enables drag-and-drop, allows easy access to status, and enhances searching and filtering that can be used for targeting. If you install Symantec Management Platform 7.1 and accompanying versions of certain products, you can see the enhanced view. You can access the following enhanced views through the Manage menu in the Symantec Management Console: ■ Computers See “About the Computers view” on page 304. ■ Software ■ Software Catalog See “About the Software Catalog window” on page 313. ■ Jobs / Tasks See “About the Jobs / Tasks view” on page 309. ■ Policies See “About the Policies view” on page 310. About the Computers view The Computers view is one of the enhanced console views in the Symantec Management Console. To access the enhanced Computers view, in the Symantec Management Console, click Manage > Computers. See “About the enhanced console views” on page 304. The Computers view offers three panes: navigation pane on the left, a list of computers and a search field pane in the center, and a content pane on the right. The navigation pane contains saved searches and organizational views and groups. The computer list pane displays the computers from the selected saved search or organizational view or group. The content pane displays the details about the computer or computers that you select. The Computers view lets you perform the following tasks: Getting started with IT Management Suite Searching for a computer and saving the search ■ Search for computers, and save the search results to re-use as a custom filter to target computers with jobs, tasks, policies, or software delivery. See “Searching for a computer and saving the search” on page 305. ■ Create and manage organizational views and groups. See “Creating and populating an organizational view or group in the enhanced console views” on page 306. ■ Drag and drop computers to organizational views and groups. Searching for a computer and saving the search In the Computers view, you can search for a specific computer or group of computers by applying or modifying a predefined search. You can also create a completely new search. The All Computers list is the starting point that displays all computers and all saved searches. To refine your search, you can only type the name of a computer, or you can use multiple criteria. See “About the Computers view” on page 304. To search for a computer and save the search 1 In the Symantec Management Console, on the Manage menu, click Computers. 2 In the list pane, in the search field, type the full name or part of the name of a computer. Full name Enter the full name of a specific computer or group of computers that you want to find. Partial name Enter a partial name if you want your search to return all computers that contain a specific text string anywhere in the name. To view all computers with a location prefix such as India, you can enter Ind. The search results display all the computers that contain the string. 3 (Optional) To use advanced search features, click the down-arrow next to the search field, and then select the search criterion that you want to apply. 4 (Optional) To select multiple search criteria, click the down-arrow next to the search criteria drop-down list, select a criterion, and then repeat the step to add other criteria. To remove a search criterion, leave its field empty. 305 306 Getting started with IT Management Suite Creating and populating an organizational view or group in the enhanced console views 5 6 (Optional) If the criteria that you want to use is not listed in the advanced search drop-down list, create a custom search criteria. To create a custom search criterion, do the following: ■ In the list pane, click the down-arrow next to the search field. ■ In the Add Search Criteria drop-down list, click Add Custom Criteria. ■ In the Add Search Criteria dialog box, check the data classes and columns that you want to use for search criteria. Note that selecting columns populates the search criteria in the drop-down list and makes the additional criteria available as part of your search. ■ Click OK. To save the search, click the save icon in the advanced search area. Note that any field that does not contain a value is ignored in the query and is not saved when you save the search. 7 In the Save Search dialog box, in the Name field, enter a name, and then click OK. The saved search appears under Saved Searches in the navigation pane and becomes available for you to re-use. 8 (Optional) If you use a saved search only as a filter that you use to target jobs, tasks, or policies, and you do not want it to appear in the navigation pane, you can hide it. To hide the saved search, do the following: ■ Right-click Saved Searches, and then click Manage Saved Searches. ■ In the Manage Saved Searches dialog box, uncheck the box next to the search that you do not want to be displayed. ■ Click Close. Creating and populating an organizational view or group in the enhanced console views In the enhanced Computers view, you can easily create and populate organizational views and groups. See “About the Computers view” on page 304. To create and populate an organizational view or group 1 In the Symantec Management Console, on the Manage menu, click Computers. 2 Right-click All Computer Views, and click New > Organizational View. Getting started with IT Management Suite Managing subnets 3 In the Organizational View dialog box, type the name for the organizational view, and then click OK. 4 Right-click the new organizational view, and click New > Organizational Group. Note that you cannot add organizational groups to the default All computers organizational view. 5 In the Organizational Group dialog box, type the name for the new group, and then click OK. 6 To populate the new organizational group, do the following: ■ Under All Computer Views, click All Computers. ■ In the list pane, select the computers that you want to add to this organizational group. You can use the Shift or Ctrl keys to select multiple computers. ■ Drag the selected computers onto the new organizational group, or right-click one of the selected computers, and then click Add to organizational group. In the Add to organizational group dialog box, click the group to which you want to add the computers, and then click OK. Managing subnets You need to create all the subnets in your organization and assign them to the appropriate sites. You can resynchronize subnets when necessary and delete any subnets that no longer exist. Subnets can be determined from basic inventory data, imported from Active Directory, or added manually. You can run a subnet import rule to automatically collect the subnet information from Active Directory. Subnets are always suffixed with the number of bits that are set in the network mask, for example, 192.168.0.0/24. The subnets are always displayed in a hierarchical tree. Resource scoping applies, so you can see only the subnets that contain resources to which you have access. You need to assign each subnet to the appropriate site. By default, any encompassed subnets (a subnet whose IP range is wholly contained within another subnet) are automatically assigned to the same site. However, you can manually override subnet encompassment by explicitly assigning an encompassed subnet to a different site. By default, encompassed subnets are displayed under their parent subnets in the left pane. However, when an encompassed subnet is manually 307 308 Getting started with IT Management Suite Managing subnets assigned to a different site from its parent, it is displayed under the site to which it is assigned. Any site servers on a subnet are automatically assigned to the same site as the subnet. This assignment is not broken if you manually assign a site server to a different site. A site server can be manually assigned to any number of sites, in addition to the site that it serves through its subnet assignment. To manage subnets 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 Configure the subnets to suit your requirements. You can do any of the following: Create a new subnet In the left pane, click New > Subnet. See “Creating a new subnet” on page 308. Delete a subnet In the left pane, select the subnet that you want to delete, and then click Del. If you delete a subnet that you created manually, it is deleted permanently. However, any subnets that were imported from basic inventory or from Active Directory are restored when the data is refreshed. Assign a subnet to a site On the Subnets page, select the appropriate subnet, and then click Assign to Site. In the Site Selection window, select the site to which you want to assign the subnet. Resynchronize subnets On the Subnets page, click Re-synchronize Subnets. Notification Server refers to the CMDB for the current subnet information. It reads the subnet assignment that is included in the results of the latest Agent Inventory scan. Notification Server then updates the list of subnets accordingly. Creating a new subnet You can create new subnets manually and assign them to the appropriate sites. See “Managing subnets” on page 307. Getting started with IT Management Suite About the Jobs / Tasks view To create a new subnet 1 In the Symantec Management Console, on the Settings menu, click Notification Server > Site Server Settings. 2 In the left pane, click New > Subnet. 3 In the New Subnet dialog, specify the appropriate details: Subnet The subnet network address. Subnet mask When you press Tab or click in this box after typing the subnet network address, a mask is automatically selected according to the following rules: The system examines the first octet of an IPv4 address to determine if it is a class A, B, or C subnet. It then selects the appropriate default mask. ■ If the network address is more specific (i.e. more non-zero octet) than allowed for that class, then additional bytes are set in the default mask. ■ If the address is not in a recognized format, or the last octet is non-zero, then no default mask is suggested. ■ You can edit the default mask manually if necessary. However, once you have manually edited the subnet mask, updating the network address in the Subnet box no longer updates the mask. Assign to site The site to which you want to assign the new subnet. If you don’t want to assign the subnet to a site, select Unassigned. 4 Click OK. About the Jobs / Tasks view The Jobs / Tasks view is one of the enhanced console views in the Symantec Management Console. To access the enhanced Jobs / Tasks view, in the Symantec Management Console, click Manage > Jobs and Tasks. See “About the enhanced console views” on page 304. The Jobs / Tasks view lets you view and work with all available jobs and tasks. For example, you can run jobs and tasks by dragging and dropping them onto one or more computers. You can also use the Quick Run option to target a job or task without drilling down manually. 309 310 Getting started with IT Management Suite Running a job or task using drag and drop See “Running a job or task using drag and drop” on page 310. Running a job or task using drag and drop In the enhanced Jobs / Tasks view, you can easily view, run, and schedule the jobs and tasks. See “About the Jobs / Tasks view” on page 309. You can run jobs and tasks by dragging and dropping them onto one or more computers. You can also use the Quick Run option to target a job or task without drilling down manually. To run a job or task using drag and drop 1 In the Symantec Management Console, on the Manage menu, click Jobs and Tasks. 2 In the navigation pane, click the job or task that you want to run, and drag it to the right to initiate the drag-and-drop operation. The results of your most recent computer search appear in the list pane. If you filtered your last computer search, the list displays the results of the filtered search. See “Searching for a computer and saving the search” on page 305. 3 4 To select the computers on which you want to run the job or task, do one of the following: ■ To run the job or task on all listed computers, drop it onto the title icon in the list pane. ■ To run the job or task on a specific computer, drop it onto the computer in the list. ■ To run the job or task on a saved search, organizational view, or organizational group, drag it to the Computers blade, and then drop it onto a saved search, organizational view, or organizational group. In the New Schedule dialog box, specify the schedule of the job or task, and then click Schedule. About the Policies view The Policies view is one of the enhanced console views in the Symantec Management Console. To access the enhanced Policies view, in the Symantec Management Console, click Manage > Policies. Getting started with IT Management Suite Searching for a software and saving the search See “About the enhanced console views” on page 304. The enhanced Policies view lets you view and work with all available policies. You can perform all the common functions of applying rules and remediation to computers. You can set the compliance check schedules and turn on policies. You can launch policies by dragging and dropping them onto one or more computers. You can also use the Quick apply option to target a policy without drilling down manually. Searching for a software and saving the search In the enhanced Software view, the search results that appear in the list pane are not automatically filtered. You can use the search and the advanced search features to narrow and refine your list, until the list pane contains the specific software. You can save the custom software searches and reuse them later. Saved searches appear in the navigation pane, in the Installed Software subpane. You can then use the saved searches as filters to target software for tasks, jobs, and policies. You can also use saved searches to deliver software to specific computers or groups of computers. To search for a specific software and save the search 1 In the Symantec Management Console, on the Manage menu, click Software. 2 In the navigation pane, click a saved search that you want to use as a starting point of your search. 3 In the list pane, in the search field, type the search criteria. You can search by full or partial software name, full or partial manufacturer name, or version. 4 (Optional) To use advanced search features, click the down-arrow next to the search field, and then select the search criterion that you want to apply. 5 (Optional) To select multiple search criteria, click the down-arrow next to the search criteria drop-down list, select a criterion, and then repeat the step to add other criteria. 6 (Optional) If the criteria that you want to use is not listed in the advanced search drop-down list, create a custom search criteria. To create a custom search criterion, do the following: ■ In the Add Search Criteria drop-down list, click Add Custom Criteria. ■ In the Add Search Criteria dialog box, check the data classes and columns that you want to use for search criteria. 311 312 Getting started with IT Management Suite Tracking the software licenses in the enhanced console views Note that selecting columns populates the search criteria in the drop-down list and makes the additional criteria available as part of your search. ■ 7 Click OK. To save the search, click the save icon in the advanced search area. Note that any field that does not contain a value is ignored in the query and is not saved when you save the search. 8 In the Save Search dialog box, in the Name field, enter a name, and then click OK. The saved search appears under Installed Software in the navigation pane and becomes available for you to re-use. 9 (Optional) If you use a saved search only as a filter that you use to target jobs, tasks, or policies, and you do not want it to appear in the navigation pane, you can hide it. To hide the saved search, do the following: ■ Right-click Installed Software, and then click Manage Saved Searches. ■ In the Manage Saved Searches dialog box, uncheck the box next to the search that you do not want to be displayed. ■ Click Close. Tracking the software licenses in the enhanced console views The enhanced Software view in the Symantec Management Console lets you easily perform various software management tasks. For example, you can track software licenses. To manage software, you must identify the software components that make up a specific software product. This action lets you track the usage and licenses for the software product. After you specify components for a software product, it appears in the Installed Products saved search. To meter and track the software usage information, you must associate the software product with the program that runs it. In the Software Product dialog box, on the Meter / track usage tab, click Add Program to associate the software product to a program. After you perform this task, check Turn on metering / usage tracking for this software product to turn on the metering. An internal metering policy tracks all of the managed software that is metered and then generates the usage information. Getting started with IT Management Suite About the Software Catalog window Note: Application metering is a Windows-only feature. If you plan to meter software, be careful when you fill out the information in the Software Product dialog box, on the Identify inventory tab. Make sure that only the Windows version of selected software appears in the result set. To track software licenses, you must associate license with a software product. After you associate a license to a software, it is listed in the Licensed saved search. Note: To manage software licenses, you must have Asset Management Suite installed in your environment. See “About installing the Symantec Management Platform products” on page 146. To track software usage and software licenses ◆ In the Symantec Management Console, on the Manage menu, click Software. About the Software Catalog window The Software Catalog window appears within the enhanced Software view. To access the Software Catalog window, in Symantec Management Console, click Manage > Software Catalog. You can also navigate to Manage > Software, right-click Installed Software, and then click Manage Software Catalog. In the Software Catalog window, you can perform the following software management tasks: ■ Import or add new software components and software products. You can import software even if it is not found in inventory. ■ Add the newly discovered or undefined software that you intend to manage to your list of managed software. ■ Move the newly discovered or undefined software that you do not intend to manage to your list of unmanaged software. ■ Move software products from one list to another as your needs change. ■ Delete a software product. This action cancels the association between software components and the packages through which they were delivered. When you delete a software product, its components are listed again in the Newly discovered / undefined software pane. 313 314 Getting started with IT Management Suite About resource scoping About resource scoping Resource scoping provides a secure means of segregating resources into manageable, well structured units. These units are generic in nature so they can be arranged to suit a wide variety of organizational requirements. In most cases assessing the resource scoping requirements within your design will come down to the following questions: ■ Who should have full access to the Altiris 7 infrastructure? ■ What roles exist within the management functions of day to day operations? ■ What areas of functionality require specific roles and rights? ■ Does Active Directory accurately reflect our management and/or business model? ■ Do Active Directory groups exist that reflect the roles within the Altiris 7 architecture? ■ What are the types of resources that need to be managed? Considerations for resource scoping ■ Filters are conceptually similar to Notification Server 6 collections. They are implemented differently as they are applied to targets, not policies. They are resources joined together by a defined set of criteria. ■ Targets are the intersection of organizational groups and filters. For example, all computers in the Finance (Group) that have less than 1GB RAM (Filter). ■ Targets are applied to policies and tasks and can be pre-created or created at the time of application. ■ Targets can only contain the resources that the target creator has access to. They are not visible as objects anywhere in the console, but are accessible using the Quick Apply option within a task or policy. ■ Consider an organizational view to represent an administrative security structure or boundary which aligns with your IT environment. ■ Organizational views provide a simplified and a secure means to group and manage resources. ■ An organizational view is a self-contained secure hierarchy of organizational groups, which contain resources. ■ All resources in an organizational view (managed and unmanaged) are scoped by default. Getting started with IT Management Suite Design considerations for resource scoping ■ There are two types of organizational structures: ■ Default organizational view ■ Custom organizational view ■ Organizational views use a top-down security inheritance model. ■ Organizational groups contain other organizational groups and resources. ■ Security grants are assigned to organizational groups and are inherited from the organizational group above it. ■ Resource security is the combination of Scope, Security Role, and Permissions. ■ Resources obtain all their permission grants from the scope collections that they are a member of. The grants are cumulative in nature. By having permission to perform an action on a resource in one scope collection, you ensure that the user/role can continue to perform this action regardless of whether the permission is applied to other scope collections containing the resource. ■ Security roles are the user groups that let you assign privileges for administrative and worker responsibilities and assign permissions for the folders or items that those administrators and workers can view in the Symantec Management Console. ■ Out-of-the-box roles are provided with a variety of privilege grants, and roles can be assigned anywhere within the organizational view or organizational group structure, depending on the administrative scope you choose to grant. Design considerations for resource scoping ■ Filters should be created from a single attribute. Filters can be combined to create complex targets, and by using fewer criteria you get a higher chance of re-use and lower complexity, which results in a more efficient Notification Server. ■ Resource membership within the system default view is dynamically updated, and set at a 5-minute update interval. Depending on how you plan the creation and the resource membership of your organizational structure, keep this issue in mind when identifying the overall effect of resource membership updates. ■ You should set up security roles before performing any other console security tasks and before Notification Server is deployed to your production environment. ■ Organizational views only contain resources through the organizational groups. An organizational view cannot contain any resources directly. All newly 315 316 Getting started with IT Management Suite Design considerations for resource scoping discovered resources are automatically imported into the default organizational view. ■ One resource item can belong to only one organizational group in each organizational view. When you add a resource to an organizational group, it is automatically removed from any other group to which it may be assigned. ■ Use organizational groups to apply a policy or task to selected computers, users, and resources. To do this, use an organizational group in a target. In this instance, an organizational group functions as a filter, but provides security to ensure that only the resource to which the target owner has permission is included. ■ Notification Server 7 allows multiple organizational views because administrators may have multiple ways of organizing resources. Therefore, you can have both a view by function and by region. ■ With the default organizational view, all resources are scoped and secure in this view; resources (managed and unmanaged) are grouped by type; and the resource membership is dynamic. ■ Only the Symantec administrator role has “full access”. ■ Mirror your Active Directory organizational model by using Active Directory Import to avoid manual creation and population. ■ Group your resources by Type. ■ There are various update processes in place, and they should be considered when you evaluate server performance: ■ ■ Three Update Types (Filters, Targets, OG’s) ■ Shared Schedules (Delta, Complete, Policy). When designing your resource framework, use the following implementation checklist to ensure that it is completed in the correct order: ■ Identify users, security roles, and rights. ■ Create security roles. ■ ■ ■ Assign rights. ■ Assign user membership. Create organizational views and groups structure. ■ Follow AD Import best practices. ■ Group by resource type (User, Computer). Assign roles and permissions to specific organizational views and groups. Getting started with IT Management Suite Design considerations for resource scoping ■ Generate reports for baseline system view of resources. ■ Back up the organizational view and group structure using Export .XML. 317 318 Getting started with IT Management Suite Design considerations for resource scoping Appendix A Symantec IT Management Suite Platform Support Matrix This appendix includes the following topics: ■ Introduction ■ Current Shipping Information ■ Symantec Management Platform ■ Client Management Suite ■ Server Management Suite ■ Language Support Introduction The Symantec IT Management Suite Platform Support Matrix (PSM) has been created to provide current and future planned platform support information to interested parties. It is organized to display supportability information based on the Symantec IT Management Suite (ITMS) components as well as by ITMS release. Many OS and database platforms include multiple versions that are based on the same platform kernel. An example would be Windows Vista where there is Home Basic, Home Premium, Business, and Ultimate. QA testing resources are limited; therefore, we have only included a platform in the PSM if that platform has actually been tested. This does not necessarily prevent a derivative platform from being 320 Symantec IT Management Suite Platform Support Matrix Current Shipping Information used by a customer, however, it should be understood that if an untested derivative platform were used, support would not be provided.1 Any forward-looking indication of plans for products is preliminary. All future release dates are tentative and are subject to change. Any future release of the product or planned modifications to product capability, functionality or feature is subject to ongoing evaluation by Symantec, and should not be relied upon in making purchasing decisions. As changes occur, an updated version of this document will be made available. Note: The PSM includes supportability matrices for the Symantec solutions currently included in Client Management Suite (CMS), Server Management Suite (SMS) or IT Management Suite (ITMS). For additional Symantec solution support information, please refer to the solution Release Notes published with each solution. 1 Requests to formally support currently untested platforms will be treated as an enhancement request and will be considered in the context of the numbers of customers who could benefit from support weighted against the amount of QA and Engineering effort required to provide that support. Current Shipping Information The current shipping version of the Symantec IT Management Suite (ITMS) is 7.1 SP2. Symantec Management Platform The following section contains the Microsoft platform support matrices for the Symantec Management Platform. This section outlines which platforms are supported for the installation of Symantec Management Platform components. For information about supported agent platforms, please refer to the Symantec Client Management Suite, and Server Management Suite sections provided later in this document. Symantec IT Management Suite Platform Support Matrix Symantec Management Platform Notification Server and Workflow Server Table A-1 Notification Server and Workflow Server Microsoft Server Operating Systems SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Supported Supported Not supported Not supported Windows Server 2003 R2 x86 Supported Supported Not supported Not supported Windows Server 2003 R2 SP2 Not x86 supported Supported Not supported Not supported Microsoft Server 2003 Windows Server 2003 SP2 x86 SuMicrosoft Server 2008 Windows Server 2008 R21 Not supported Not supported Supported Supported Windows Server 2008 R2 SP11 Not supported Not supported Supported Supported 1 The Symantec Management Platform version 7.1 will support Windows Server 2008 R2 (64-bit only) Enterprise, Standard, and Datacenter editions. Core Edition is not a supported platform. Note: Workflow server includes the Workflow server and Process Manager Components. The support matrix for the Workflow Designer is included in the Designer and Tools section below. Table A-2 Notification Server on a Virtual Host Virtual Host version SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 VMware ESX 3.5 Supported Supported Supported Supported VMware ESX 4.0 Supported Supported Supported Supported VMware ESX 5.0 Not supported Not supported Not supported Supported Windows Hyper-V Server 2008 R21 Not supported Not supported Supported Supported 321 322 Symantec IT Management Suite Platform Support Matrix Symantec Management Platform 1 It should be noted that core Hyper-V Server 2008 requires that UAC be set to a lower level (1 down from the max security level) to allow the Symantec Management Agent to work. Note: For more details about hosting the Notification Server on a virtual host, please reference the knowledgebase article titled “Installing the Symantec Management Platform on VMware”: http://www.symantec.com/docs/HOWTO9692 Microsoft SQL Server Table A-3 Microsoft SQL Server Microsoft SQL Server Version SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Microsoft SQL Server 2005 SP2 R5 Supported Supported Supported Microsoft SQL Server 2005 SP3 R10 Supported Supported Supported Microsoft SQL Server 2005 SP4 R13 Not supported Not supported Supported Microsoft SQL Server 2008 R13 Supported Supported Supported Microsoft SQL Server 2008 SP1 Not supported Supported Supported Supported Microsoft SQL Server 2008 SP2 Not supported Not supported Supported Supported Microsoft SQL Server 2008 R2 Not supported Not supported Supported Supported Microsoft SQL Server 2008 R2 SP1 Not supported Not supported Not supported Supported Microsoft SQL Server 2005 Microsoft SQL Server 2008 Symantec IT Management Suite Platform Support Matrix Symantec Management Platform Note: The Notification Server installation is tested with Microsoft SQL Express, Standard, and Enterprise versions x86 and 64-bit. Using a 64-bit OS in combination with an x64 version of SQL Server is highly recommended for dedicated SQL servers that have more than 4GB of physical memory to take advantage of the memory addressing capabilities of 64-bit hardware. For additional information, please refer to the following article: http://www.symantec.com/docs/HOWTO10723 Microsoft SQL Server Collations Table A-4 Microsoft SQL Server Collations Microsoft SQL Server Collations SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Latin1_General_BIN Supported Supported Supported Supported Latin1_General_BIN2 Supported Supported Supported Supported Latin1_General_CI_AI Supported Supported Supported Supported Latin1_General_CI_AS Supported Supported Supported Supported Latin1_General_CS_AI Supported Supported Supported Supported Latin1_General_CS_AS Supported Supported Supported Supported Latin1_General_CP1_CI_AS Supported Supported Supported Supported Microsoft IIS Table A-5 Microsoft IIS IIS Version SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Microsoft IIS 6 Supported Supported Not supported Not supported Microsoft IIS 7.5 (IIS 6 compatibility) Not supported Not supported Supported Supported 323 324 Symantec IT Management Suite Platform Support Matrix Symantec Management Platform Microsoft .NET Table A-6 Microsoft .NET .NET Version SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Microsoft .NET Framework 1.1 Supported Not supported Not supported Not supported Microsoft .NET Framework 3.5 Not supported Supported Not supported Not supported Microsoft .NET Framework 3.5 SP1 Not supported Supported Supported Supported Console/Browser Table A-7 .NET Version Console/Browser SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Microsoft Internet Explorer Supported 6 SP1 Not supported Not supported Not supported Microsoft Internet Explorer Supported 7 Supported Supported Supported Microsoft Internet Explorer Not supported Supported 8 (compatibility mode only) Supported Supported Microsoft Internet Explorer Not supported Supported 8 Supported Supported Microsoft Internet Explorer Not supported Not supported Not 9 (compatibility mode only) supported Supported Note: Current referenced browser support is for the 32-bit version of Internet Explorer. Symantec IT Management Suite Platform Support Matrix Symantec Management Platform Console/Silverlight Table A-8 Silverlight versions supported Silverlight version SMP 6.x SMP 7.0 SP5 SMP 7.1 SP2 Silverlight 3.x Not supported Not supported Supported Silverlight 4.x Not supported Not supported Supported Silverlight 5 Not supported Not supported Supported Workflow Designer The Workflow Designer and Tools are the client tools used to design, publish, and debug processes. The following matrix defines the Microsoft platforms that the Designer and Tools are supported on. Table A-9 Designer and Tools Microsoft Windows Operating Systems SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Windows XP SP2 x86/x64 Supported Supported Supported Supported Windows XP SP3 x86/x64 Supported Supported Supported Supported Supported Supported Not supported Not supported Windows Vista SP1 x86/x64 Supported Supported Supported Supported Windows Vista SP2 x86/x64 Supported Supported Supported Supported Windows XP Windows Vista Windows Vista x86/x64 Windows 7 Windows 7 x86/x64 Supported Supported Supported Supported Windows 7 SP1 x86/x64 Supported Supported Supported Supported Supported Supported Not supported Not supported Windows Server 2003 Windows Server 2003 R2 x86/x64 325 326 Symantec IT Management Suite Platform Support Matrix Symantec Management Platform Table A-9 Designer and Tools (continued) Microsoft Windows Operating Systems SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 Windows Server 2003 R2 SP2 Not supported Supported x86/x64 SMP 7.1 SP2 Supported Supported Windows Server 2008 Windows Server 2008 SP2 x86/x64 Supported Supported Supported Supported Windows Server 2008 x86/x64 Supported Supported Supported Supported Windows Server 2008 R2 SP1 Not supported Not supported Supported Supported Site Server Any server that has either the Package Service or the Task Service installed on it is called a "Site Server”. The Site Server support matrix below indicates full support for Package and Task Services on the specified platform unless otherwise indicated. These services will also run on any supported Notification Server OS platform. Table A-10 Site Server OS Support Matrix Site Server Operating Systems SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Windows Server 2000 SP4 Supported Not supported Not supported Not supported Windows 2000 Professional SP4 Supported Not supported Not supported Not supported Windows XP SP2 x86/x641 Supported Supported Supported Supported Windows XP SP3 x86/x641 Supported Supported Supported Supported Not supported Support for Package Server only Not supported Not supported Windows 2000 Windows XP Windows Vista Windows Vista x86/x6411 Symantec IT Management Suite Platform Support Matrix Symantec Management Platform Table A-10 Site Server OS Support Matrix (continued) Site Server Operating Systems SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Windows Vista SP1 x86/x641 Not supported Support for Package Server only Support for Package Server only Support for Package Server only Windows Vista SP2 x86/x641 R13 Supported Supported Supported Windows 7 Windows 7 x86/x641 R13 Supported Supported Supported Windows 7 SP1 x86/x64 1 R13 Not supported Supported Supported Windows Server 2003 SP2 x86 R5 Supported Supported Supported Windows Server 2003 SP2 x641 R9 Supported Supported Supported Windows Server 2003 R2 x86/x641 Supported Supported Not supported Not supported Windows Server 2003 R2 SP2 Not x86/x641 supported Supported Supported Supported Windows Server 2003 Windows Server 2008 Windows Server 2008 x86/x641 R8 Supported Supported Supported Windows Server 2008 SP2 x86/x641 R13 Supported Supported Supported Windows Server 2008 R2 R13 Supported Supported Supported Windows Server 2008 R2 Core Not supported Not supported Not supported Not supported Not supported Supported Supported Windows Server 2008 R2 SP1 R13 Red Hat Enterprise Linux 4 327 328 Symantec IT Management Suite Platform Support Matrix Symantec Management Platform Table A-10 Site Server OS Support Matrix (continued) Site Server Operating Systems SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Red Hat Enterprise Linux 4 WS x86/x64 Support for Package Server only2 Not supported Support for Support for Package Package Server only2 Server only2 Red Hat Enterprise Linux 4 ES x86/x64 Support for Package Server only2 Not supported Support for Support for Package Package Server only2 Server only2 Red Hat Enterprise Linux 4 AS x86/x64 Support for Package Server only2 Not supported Support for Support for Package Package Server only2 Server only2 Red Hat Enterprise Linux 5.1 Not Server x86/x64 supported Not supported Support for Package Server only Support for Package Server only Red Hat Enterprise Linux 5.2 Not Server x86/x64 supported Not supported Support for Package Server only Support for Package Server only Red Hat Enterprise Linux 5.3 Not Server x86/x64 supported Not supported Support for Package Server only Support for Package Server only Red Hat Enterprise Linux 5.4 Not Server x86/x64 supported Not supported Support for Package Server only Support for Package Server only Red Hat Enterprise Linux 5.5 Not Server x86/x64 supported Not supported Support for Package Server only Support for Package Server only Red Hat Enterprise Linux 5.6 Not Server x86/x64 supported Not supported Support for Package Server only Support for Package Server only Not supported Not supported Support for Package Server only Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 6.0 Not x86/x64 supported Symantec IT Management Suite Platform Support Matrix Symantec Management Platform Table A-10 Site Server OS Support Matrix (continued) Site Server Operating Systems SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Red Hat Enterprise Linux Server 6.0 x86/x64 Not supported Not supported Not supported Support for Package Server only Red Hat Enterprise Linux 6.1 Not Server x86/x64 supported Not supported Not supported Support for Package Server only Novell SUSE Linux Support for Enterprise Server 9 x86/x64 Package Server only Not supported Not supported Not supported Novell SUSE Linux Support for Enterprise Server 10 x86/x64 Package Server only Not supported Support for Package Server only Support for Package Server only Novell SUSE Linux Not Enterprise Server 11 x86/x64 supported Not supported Support for Package Server only Support for Package Server only Novell SUSE Linux Enterprise Server 11 SP1 x86/x64 Not supported Not supported Support for Package Server only Novell SUSE Enterprise Server Not supported Novell SUSE Enterprise Desktop Novell SUSE Linux Enterprise Desktop 10 x86/x64 Support for Package Server only2 Not supported Support for Support for Package Package Server only2 Server only2 Novell SUSE Linux Enterprise Desktop 11 x86/x64 Not supported Not supported Support for Support for Package Package Server only2 Server only2 Novell SUSE Linux Enterprise Desktop 11 SP1 x86/x64 Not supported Not supported Not supported Support for Package Server only2 Support for Package Server only Not supported Not supported Not supported Sun Solaris Sun Solaris 7 Sparc 329 330 Symantec IT Management Suite Platform Support Matrix Symantec Management Platform Table A-10 Site Server OS Support Matrix (continued) Site Server Operating Systems SMP 6.x SMP 7.0 SP5 SMP 7.1 SP1 SMP 7.1 SP2 Sun Solaris 8 Sparc Support for Package Server only Not supported Not supported Not supported Sun Solaris 9 Sparc Support for Package Server only Not supported Not supported Not supported Sun Solaris 10 x86/x64/Sparc Support for Package Server only Not supported Not supported Not supported IBM AIX 4.3 Support for Package Server only Not supported Not supported Not supported IBM AIX 5.1 PPC Support for Package Server only Not supported Not supported Not supported IBM AIX 5.2 PPC Support for Package Server only Not supported Not supported Not supported IBM AIX 5.3 PPC Support for Package Server only Not supported Not supported Not supported Support for Package Server only Not supported Not supported Not supported Hewlett-Packard HP-UX 11i Support for PA-RISC/IA-64 Package Server only Not supported Not supported Not supported IBM AIX Hewlett-Packard HP-UX Hewlett-Packard HP-UX 11 PA-RISC/IA-64 1 It should be noted that core 6.x agents running on x64 platforms currently only support running in WOW64 (32-bit emulation mode). This limits the core agent to seeing only those files and registry entries in the 32-bit environment. Starting Symantec IT Management Suite Platform Support Matrix Client Management Suite with Notification Server 7.1, the Symantec Management Agent adds native 64-bit support. 2 The Package Service supports Red Hat Enterprise Linux 4 WS x86/x64, and Novell SUSE Linux Enterprise Desktop version 10 and 11 when Apache Web Server has been installed. Apache Web server is not installed by default on these operating systems. Client Management Suite The following section includes OS support for the solutions used in Client Management Suite (CMS). This suite includes full support for the following solutions unless otherwise indicated: ■ Deployment Solution ■ Inventory for Network Devices ■ Network Discovery ■ Out of Band Management ■ Patch Management Solution, ■ pcAnywhere Solution ■ Real-Time System Manager ■ Software Management Solution Note: Although CMS 7.1 and later versions connect over SSL, Deployment Solution 7.1 SP1 and later versions do not support communication over SSL. Client OS Support Matrix Table A-11 Agent on Client Operating 6.x Systems Client OS Support Matrix 7.0 SP5 7.1 SP1 7.1 SP2 Not Supported3 Not supported Not supported Windows 2000 Windows 2000 Professional SP4 Windows XP Supported 331 332 Symantec IT Management Suite Platform Support Matrix Client Management Suite Table A-11 Client OS Support Matrix (continued) Agent on Client Operating 6.x Systems 7.0 SP5 7.1 SP1 7.1 SP2 Windows XP Professional SP2 x86 Supported Supported Supported Supported Windows XP Professional SP2 x641 R9 Supported Supported Supported Windows XP Professional SP3 x861 R8 Supported Supported Supported Windows XP Tablet PC Edition 2005 R8 Limited support 2 Limited support 2 Limited support 2 Windows XP Embedded SP3 Not supported Limited support 2 Limited support 2 Limited support 2 Windows Embedded Standard Not supported Limited support 2 Limited support 2 Limited support 2 Windows Embedded Point of Not supported Service 1.0 Limited support 2 Limited support 2 Limited support 2 Windows Embedded Point of Not supported Service 1.1 SP3 Limited support 2 Limited support 2 Limited support 2 Windows Embedded POSReady 2009 Not supported Limited support 2 Limited support 2 Limited support 2 Supported Supported Not supported Not supported Windows Vista SP1 x86/x641 R8 Supported Supported Supported Windows Vista SP2 x86/x641 R10 Supported Supported Supported Windows Embedded Windows Vista Windows Vista x86/x641 Windows 7 Windows 7 x86/x641 R13 Supported Supported Supported Windows 7 x86/x64 SP1 R13 Not supported Supported Supported Windows 7 XP Mode Not supported Not supported Not supported Supported Red Hat Enterprise Linux 3 Symantec IT Management Suite Platform Support Matrix Client Management Suite Table A-11 Client OS Support Matrix (continued) Agent on Client Operating 6.x Systems 7.0 SP5 7.1 SP1 7.1 SP2 Limited support 4 Not supported Not supported Not supported Limited support 4 Limited support 4 Limited support 4 Limited support 4 Not supported Limited support 4 Limited support 4 Limited support 4 Red Hat Enterprise Linux 5.1 Not supported x86/x64 Limited support 4 Limited support 4 Limited support 4 Red Hat Enterprise Linux 5.2 Not supported x86/x64 Limited support 4 Limited support 4 Limited support 4 Red Hat Enterprise Linux 5.3 Not supported x86/x64 Limited support 4 Limited support 4 Limited support 4 Red Hat Enterprise Linux 5.4 Not supported x86/x64 Not supported Limited support 4 Limited support 4 Red Hat Enterprise Linux 5.5 Not supported x86/x64 Not supported Limited support 4 Limited support 4 Red Hat Enterprise Linux 5.6 Not supported x86/x64 Not supported Limited support 4 Limited support 4 Red Hat Enterprise Linux 6.0 Not supported x86/x64 Not supported Not supported Limited support 4 Red Hat Enterprise Linux 6.1 Not supported x86/x64 Not supported Not supported Limited support 4 Red Hat Enterprise Linux 3 WS x86/x64 Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 4 WS x86/x64 Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 5 x86/x64 Red Hat Enterprise Linux 6 Novell SUSE Linux Enterprise Desktop Novell SUSE Linux Enterprise Desktop 10 x86/x64 Limited support 4 Limited support 4 Limited support 4 Limited support 4 333 334 Symantec IT Management Suite Platform Support Matrix Client Management Suite Table A-11 Client OS Support Matrix (continued) Agent on Client Operating 6.x Systems 7.0 SP5 7.1 SP1 7.1 SP2 Novell SUSE Linux Enterprise Desktop 11 x86/x64 Not supported Not supported Limited support 4 Limited support 4 Novell SUSE Linux Enterprise Desktop 11 SP1 x86/x64 Not supported Not supported Not supported Limited support 4 Apple Mac OS X (10.2) PPC Limited support 5 Not supported Not supported Not supported Apple Mac OS X (10.3) PPC Limited support 5 Not supported Not supported Not supported Apple Mac OS X (10.4) Universal Limited support 5 Limited support 5 Limited support 5 Limited support 5 Apple Mac OS X (10.5) Universal Limited support 5 Limited support 5 Limited support 5 Limited support 5 Apple Mac OS X (10.6) Limited support7 Limited support 5 Limited support 5 Limited support 5 Apple Mac OS X (10.7) Not supported Not supported Limited support 5, Limited support 5 Apple Mac OS X 6 1 Note that core 6.x agents running on Windows x64 platforms currently only support running in WOW64 (32-bit emulation mode). This limits the core agent to seeing only those files and registry entries in the 32-bit environment. Starting with Notification Server 7.1, the Symantec Management Agent adds native 64-bit support. 2 Windows Embedded support is limited. Please see the following article for conditions and limitations: http://www.symantec.com/docs/HOWTO10921 3 Microsoft ended support for Windows 2000 on July 13, 2010, hence support for Windows 2000 agents has been removed in the 7.0 SP5 release. Base agent functionality using a 7.0 SP4 agent in a 7.0 environment will provide limited functionality for the agent machines as they are upgraded. 4 The Linux agent does not support PC Transplant, Application Management, Software Virtualization Client Functionality, the WiseScript scripting tool, Symantec IT Management Suite Platform Support Matrix Server Management Suite Software Portal, Application Metering, or the ability to evaluate software detection rules that are not .rpm packages. 5 The Mac OSX agent does not support PC Transplant, Application Management, Software Virtualization Client Functionality, the WiseScript scripting tool, Application Metering, or the ability to evaluate software detection rules. 6 In 7.1 SP1, Mac OS X 10.7 is only available through a special point fix. posted on September 19, 2011. Please refer to the following article: http://www.symantec.com/docs/HOWTO58968 7 In NS 6.x, Mac OS X 10.6 support is limited to the Symantec Management Agent and basic inventory; none of the solutions support it. Basic inventory and Symantec Management Agent support is available through a special point-fix. Please refer to the following article: http://www.symantec.com/docs/HOWTO21457. Server Management Suite The following section includes OS support for the solutions used with Server Management Suite (SMS). This suite includes full support for the following solutions unless otherwise indicated: Deployment Solution10, Inventory for Network Devices, Inventory Solution, Network Discovery, Out of Band Management, Patch Management Solution, Real-Time System Manager, Software Management Solution, and Monitor Solution for Servers. Server OS Support Matrix Table A-12 Server OS Support Matrix Agent on Server Operating 6.x Systems 7.0 SP5 7.1 SP1 7.1 SP2 Supported Not supported2 Not supported Not supported Windows Server 2003 SP2 x86 R5 Supported Supported Supported Windows Server 2003 SP2 x641 R9 Supported Supported Supported Windows Server 2000 Windows Server 2000 SP4 Windows Server 2003 335 336 Symantec IT Management Suite Platform Support Matrix Server Management Suite Table A-12 Server OS Support Matrix (continued) Agent on Server Operating 6.x Systems 7.0 SP5 7.1 SP1 7.1 SP2 Windows Server 2003 R2 x86/x641 Supported Supported Not supported Not supported Windows Server 2003 R2 SP2 Not x86/x641 supported Supported Supported Supported Windows Small Business Server (SBS) 2003 R2 x86/x641 Not supported Not supported Supported Supported Windows Server 2008 x86/x641 R8 Supported Supported Supported Windows Server 2008 SP2 x86/x641 R13 Supported Supported Supported Windows Server 2008 Core x86/x641 R13 Supported Supported Supported Windows Server 2008 R2 R13 Supported Supported Supported Windows Server 2008 R2 SP1 Not supported Not supported Supported Supported Windows Server 2008 R2 Core3 R13 Supported Supported Supported Windows Hyper-V Server 2008 Not supported Not supported Supported Supported Windows Small Business Server (SBS) 2008 Not supported Not supported Supported Supported Apple Mac OS X Server (10.2) Limited PPC support 4 Not supported Not supported Not supported Apple Mac OS X Server (10.3) Limited PPC support 4 Not supported Not supported Not supported Apple Mac OS X Server (10.4) Limited Universal support 4 Limited support 4 Limited support 4 Limited support 4 Windows Server 2008 Apple Mac OS X Server Symantec IT Management Suite Platform Support Matrix Server Management Suite Table A-12 Server OS Support Matrix (continued) Agent on Server Operating 6.x Systems 7.0 SP5 7.1 SP1 7.1 SP2 Apple Mac OS X Server (10.5) Limited Universal support 4 Limited support 4 Limited support 4 Limited support 4 Apple Mac OS X Server (10.6) Not supported Limited support 4 Limited support 4 Limited support 4 Apple Mac OS X Server (10.7) Not supported Not supported Limited support 11 Limited support 4 Red Hat Enterprise Linux 3 Red Hat Enterprise Linux 3 ES x86/x64 Limited support 5 Not supported Not supported Not supported Red Hat Enterprise Linux 3 AS x86/x64 Limited support 5 Not supported Not supported Not supported Red Hat Enterprise Linux 4 ES x86/x64 Limited support 5 Limited support 5 Limited support 5 Limited support 5 Red Hat Enterprise Linux 4 AS x86/x64 Limited support 5 Limited support 5 Limited support 5 Limited support 5 Not supported Limited support 5 Limited support 5 Limited support 5 Red Hat Enterprise Linux 5.1 Not Server x86/x64 supported Limited support 5 Limited support 5 Limited support 5 Red Hat Enterprise Linux 5.2 Not Server x86/x64 supported Limited support 5 Limited support 5 Limited support 5 Red Hat Enterprise Linux 5.3 Not Server x86/x64 supported Limited support 5 Limited support 5 Limited support 5 Red Hat Enterprise Linux 5.4 Not Server x86/x64 supported Not supported Limited support 5 Limited support 5 Red Hat Enterprise Linux 5.5 Not Server x86/x64 supported Not supported Limited support 5 Limited support 5 Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 5 Server x86/x64 337 338 Symantec IT Management Suite Platform Support Matrix Server Management Suite Table A-12 Server OS Support Matrix (continued) Agent on Server Operating 6.x Systems 7.0 SP5 7.1 SP1 7.1 SP2 Red Hat Enterprise Linux 5.6 Not Server x86/x64 supported Not supported Limited support 5 Limited support 5 Not supported Not supported Not supported Limited support 5 Red Hat Enterprise Linux 6.1 Not Server x86/x64 supported Not supported Not supported Limited support 5 Limited support 5 Not supported Not supported Not supported Novell SUSE Linux Limited Enterprise Server 9 x86/x64 support 5 Not supported Not supported Not supported Novell SUSE Linux Limited Enterprise Server 10 x86/x64 support 5 Limited support 5 Limited support 5 Limited support 5 Novell SUSE Linux Not Enterprise Server 11 x86/x64 supported Not supported Limited support 5 Limited support 5 Novell SUSE Linux Not Enterprise Server 12 x86/x64 supported Not supported Not supported Not supported Red Hat Enterprise Linux 6 Red Hat Enterprise Linux 6 Server x86/x64 Novell SUSE Linux Enterprise Server Novell SUSE Linux Enterprise Server 8 x86 VMware vSphere / ESX / ESXi VMware ESX / ESXi 3.0.1 Limited support 6 Limited support 6 Not supported Not supported VMware ESX / ESXi 3.0.2 Limited support 6 Limited support 6 Not supported Not supported VMware ESX / ESXi 3.0.3 Limited support 6 Limited support 6 Not supported Not supported VMware ESX / ESXi 3.5 Limited support 6 Limited support 6 Limited support 6 Limited support 6 VMware vSphere / ESX / ESXi 4.0 (Agentless) Not supported Not supported Limited support 8 Limited support 8 Symantec IT Management Suite Platform Support Matrix Server Management Suite Table A-12 Server OS Support Matrix (continued) Agent on Server Operating 6.x Systems 7.0 SP5 7.1 SP1 7.1 SP2 VMware vSphere / ESX / ESXi 5.0 (Agentless) Not supported Not supported Not supported Limited support 8 Sun Solaris 7 Sparc Limited support 7 Not supported Not supported Not supported Sun Solaris 8 Sparc Limited support 7 Not supported Not supported Not supported Sun Solaris 9 Sparc Limited support 7 Limited support 7 Limited support 7 Limited support 7 Sun Solaris 10 x86/x64 Limited support 7 Limited support 7 Limited support 7 Limited support 7 Sun Solaris 10 Sparc Limited support 7 Limited support 7 Limited support 7 Limited support 7 Sun Solaris 11 x86/x64 Not supported Not supported Not supported Not supported Sun Solaris 11 Sparc Not supported Not supported Not supported Not supported Sun Solaris Zones Not supported Not supported Not supported Limited support 7 Hewlett-Packard HP-UX 11.11 (11i) PA-RISC9 Limited support 7 Limited support 7 Limited support 7 Limited support 7 Hewlett-Packard HP-UX 11.23 (11i v2) PA-RISC/IA-649 Limited support 7 Limited support 7 Limited support 7 Limited support 7 Hewlett-Packard HP-UX 11.31 (11i v3) PA-RISC/IA-649 Not supported Limited support 7 Limited support 7 Limited support 7 Hewlett-Packard HP-UX 11.xx (11i v4) PA-RISC9 Not supported Not supported Not supported Not supported Sun Solaris Hewlett-Packard HP-UX 339 340 Symantec IT Management Suite Platform Support Matrix Server Management Suite Table A-12 Server OS Support Matrix (continued) Agent on Server Operating 6.x Systems 7.0 SP5 7.1 SP1 7.1 SP2 IBM AIX IBM AIX 4.3.3 Limited support 7 Not supported Not supported Not supported IBM AIX 5.1 PPC Limited support 7 Not supported Not supported Not supported IBM AIX 5.2 PPC Limited support 7 Limited support 7 Limited support 7 Limited support 7 IBM AIX 5.3 PPC Limited support 7 Limited support 7 Limited support 7 Limited support 7 IBM AIX 6.1 PPC Not supported Limited support 7 Limited support 7 Limited support 7 IBM AIX 7.1 Standard Not supported Not supported Not supported Not supported IBM LPAR-s Not supported Not supported Not supported Limited support 7 1 It should be noted that core 6.x agents running on Windows x64 platforms currently only support running in WOW64 (32-bit emulation mode). This limits the core agent to seeing only those files and registry entries in the 32-bit environment. Starting with Notification Server 7.1, the Symantec Management Agent adds native 64-bit support. 2 Microsoft ended support for Windows 2000 on July 13, 2010, hence support for Windows 2000 agents has been removed in the 7.0 SP5 release. Base agent functionality using a 7.0 SP4 agent in a 7.0 environment will provide limited functionality for the agent machines as they are upgraded. 3 Monitor Packs for Servers support only agentless monitoring of Windows Server 2008 R2 Core Edition servers. 4 The Mac OSX agent does not support PC Transplant, Monitor Solution, Application Management, Software Virtualization Client Functionality, the WiseScript scripting tool, Application Metering, or the ability to evaluate software detection rules. 5 The Linux agent does not support PC Transplant, Application Management, Software Virtualization Client Functionality, Software Portal, the WiseScript Symantec IT Management Suite Platform Support Matrix Language Support scripting tool, Application Metering, or the ability to evaluate software detection rules that are not .rpm packages. 6 VMware ESX and ESXi 3.x supports Inventory for Network Devices, Inventory Solution, Network discovery at a hardware level, and Monitor Solution only. 7 The UNIX agent does not support PC Transplant, Application Management, Software Virtualization Client Functionality, Software Portal, the WiseScript scripting tool, Application Metering, Patch Management, or the ability to evaluate software detection rules. 8 VMware ESX and ESXi 4 supports Inventory for Network Devices, and Network Discovery only. Starting with the Symantec Management Platform 7.1, ESX and ESXi 4.x servers will be managed as agentless. 9 IA-64 support on NS 6.x is provided by running PA-RISC binaries under the HP-UX Aries translation engine which is included as a core component of HP-UX. IA-64 support with the 7.x version is provided natively. 10 For additional support information for Deployment 6.9, please refer to the following article: http://www.symantec.com/docs/DOC2079 11 In 7.1 SP1, Mac OS X 10.7 is only available through a special point fix posted on September 19, 2011. Please refer to the following article:http://www.symantec.com/docs/HOWTO58968 Language Support The following section contains the Symantec IT Management Suite language support matrices for the core platform and the management agent. Core Localization indicates the Console and Help files have been localized in the referenced languages. It also indicates the supported language for the operating system where the Notification Server installs. Agent Localization indicates the Agent and Agent Help have been localized in the referenced languages. 341 342 Symantec IT Management Suite Platform Support Matrix Language Support Core Localization Table A-13 Core Localization Core Localization 6.x 7.0 SP5 7.1 SP1 7.1 SP2 English Supported Supported Supported Supported German Supported Supported Supported Supported French Supported Supported Supported Supported Japanese Supported Supported Supported Supported Spanish Supported Supported Supported Supported Chinese (Simplified) Supported Supported Supported Supported Italian Supported Supported Supported Supported Russian Supported Supported Supported Supported Portuguese (Brazil) Supported Supported Supported Supported Korean Not supported Supported Supported Supported Chinese (Traditional) Not supported Supported Supported Supported Windows Agent Localization Table A-14 Windows Agent Localization Core Localization 6.x 7.0 SP5 7.1 SP1 7.1 SP2 English Supported Supported Supported Supported German Supported Supported Supported Supported French Supported Supported Supported Supported Japanese Supported Supported Supported Supported Spanish Supported Supported Supported Supported Symantec IT Management Suite Platform Support Matrix Language Support Table A-14 Windows Agent Localization (continued) Core Localization 6.x 7.0 SP5 7.1 SP1 7.1 SP2 Chinese (Simplified) Supported Supported Supported Supported Italian Supported Supported Supported Supported Russian Supported Supported Supported Supported Portuguese (Brazil) Supported Supported Supported Supported Swedish Supported Supported Supported Supported Danish Supported Supported Supported Supported Finnish Supported Supported Supported Supported Polish Supported Supported Supported Supported Norwegian Supported Supported Supported Supported Dutch Supported Supported Supported Supported Korean Supported Supported Supported Supported Chinese (Traditional) Supported Supported Supported Supported Turkish Supported Supported Supported Supported Czech Supported Supported Supported Supported 343 344 Symantec IT Management Suite Platform Support Matrix Language Support Index A About creating installation packages 155 about automation folder 79 Mobile Management 46 adding external Symantec CMDB connections 91 agent tuning 124 agent and task settings auto-tuning 223 optimizing 223 agent settings auto-tuning 219 optimizing 219 application identity Notification Server 207, 209 architecture planning 53 Symantec Management Platform 35 asset management dataflow 87 Asset Management Suite about 42 auto-tune agent settings 219 auto-tuning agent and task settings 223 Automation Folder uninstalling 197 automation folder about 79 using Deployment policies to install, uninstall, and upgrade 186 automation policy viewing on internal schedule calendar 276 B Barcode Solution about 43 blockout period viewing on internal schedule calendar 276 Boot Disk Creator 195 C Certificates in Notification Server 164 cloning policies 121 CMDB about 39, 202 command timeout 202 configuring 202 database access credentials 202 database name 202 database server name 202 disk configuration 56–57 memory 61 public report credentials 202 purging old data 204 resource data history 205 size 60 SQL authentication 202 Windows authentication 202 CMDB Solution about 43 collations, SQL supported for Symantec Management Platform 141 Complete Update schedule configuring 123 components, optional about 169 installation 169 language packs 169 migration wizard 169 computer general targeted agent settings 126 searching 305 Symantec Management Agent 40 346 Index computer search performing 305 saving 305 computers discovering 217 computers view about 304 configuration first-time solution setup 215 redoing 167 Configuration Management Database. See CMDB about 39 configuration settings configuring with NS Configurator 214 Configuring Notification Server database 165 configuring external Symantec CMDB connections 91 connections adding external Symantec CMDB 91 deleting external Symantec CMDB 94 editing external Symantec CMDB 92 console. See Symantec Management Console context-sensitive help 31 credential creating 266 editing 267 credential manager about 266 custom search criteria creating 305, 311 D DASH 50 data synchronization hierarchy replication 106 hierarchy requirements 97 running hierarchy replication manually 114 data verification replication rule 111 database configuration 165 deleting external Symantec CMDB connections 94 Delta Update schedule configuring 123 deployment handler about 78 deployment handlers installing 192 Deployment plug-in uninstalling 197 upgrading 195 deployment site server about 68 hierarchy considerations 102 Deployment site server components uninstalling 197 Deployment Solution about 44 about Automation Folder 76 about Deployment Plug-in component 76 about site server components 76 about task server handler 76 installer components 76 installing automation folder 186 installing plug-in 186, 190, 192 policy for installing site server 192 policy for uninstalling Automation Folder 197 policy for uninstalling Deployment site server components 197 policy for uninstalling plug-in 197 policy for upgrading plug-in 195 predefined policies 186 preinstallation requirements 188 repair 199 tools 195 uninstalling Automation Folder 197 uninstalling automation folder 186 uninstalling Deployment site server components 197 uninstalling plug-in 186, 197 upgrading automation folder 186 upgrading plug-in 186, 195 Disabling verbose logs in Symantec Installation Manager 176 discover computers 217 disk configuration off-box SQL Server 56 on-box SQL Server 57 disk image deployment 82 documentation 31 installing 170 optional component 169 uninstalling 171 drag and drop running jobs and tasks 310 Index E editing external Symantec CMDB connections 92 editing the Report Integration URLs external Symantec CMDB 93 email notifications configuring 211 endpoint protection management about 51 enhanced console views about 304, 309–310 computers view 304 jobs and tasks view 309 policies view 310 running jobs and tasks 310 tracking software 312 excluding local Symantec CMDB 94 exporting product history 157 external Symantec CMDB editing the Report Integration URLs 93 external Symantec CMDB connections adding 91 configuring 91 deleting 94 editing 92 F filter scheduling membership updates 123 first-time setup portal 215 first-time setup configuration deploying preboot environments 226 Flash requirements 136 folder setting permission inheritance 263 setting permissions 262 taking ownership 265 fully qualified domain name 164 G global policy distribution about 95 how it works 97 software management considerations 102 global policy distribution (continued) topology 98 what you can do 96 global policy distributions limitations 103–104 globalb policy distribution patch management considerations 103 H hardware IT management 129 help context-sensitive 31 hierarchy about 96 alert status indicator 99 creating hierarchical relationships 99–100 deployment site server 102 editing 102 enabling replication 99 limitations 103–104 manually replicating selected data 114 modifying hierarchical relationships 100 removing a Notification Server 99 replication. See hierarchy replication reports 115 requirements 97 topology 98 hierarchy replication complete replication 106 differential replication 106 items 106 manually replicating selected data 114 overriding differential replication schedule 114 resources 106 security objects 106 history product 157 I Image Explorer 195 imaging jobs dataflow 83 importing product history 157 including local Symantec CMDB 94 347 348 Index installation adding products 166 applying licenses 166 Deployment plug-in 190 first-time 146 modifying 177 offline 146 optional components 166, 169 overview 147 planning 139 process 148 reconfiguring a product 166 repairing 166, 173 system requirements 162 types 146 updating 166 installation logs viewing 166 Installation package about creating 155 installation package creating 156 installation prerequisities Deployment Solution 188 installed product reconfiguring 167 Installed Products page 167 Installing Symantec Installation Manager 151 Symantec Management Platform products 158 Intel AMT 50 Inventory scheduling 121 inventory dataflow 71 inventory data about 45 inventory policies 121 cloning 121 Inventory Solution about 45 IOPS CMDB 59 IT Analytics 7.1 SP2 what's new 90 IT Analytics Solution about 46 IT Management about 19 IT Management (continued) features 20 understanding 21 IT management hardware 129 ratios of components 128 item setting permissions 262 taking ownership 265 J Java requirements 137 jobs and tasks running 310 jobs and tasks view about 309 L language packs installing 170 optional component 169 uninstalling 171 licenses applying 172 Linux 52 See also UNIX, Linux, and Mac support in Software Management Solution 52 Log Viewer opening 212 logs installation, viewing 166 M Mac 52 See also UNIX, Linux, and Mac support in Software Management Solution 52 maintenance window viewing on internal schedule calendar 276 master disk image dataflow 80 memory SQL Server 61 Microsoft Access 2010 OLEDB driver 136 migration off-box 146 Index migration guide about 140 migration wizard installing 170 optional component 169 uninstalling 171 Mobile Management about 46 Monitor Solution about 47 MultiCMDB reports 89 N Notification Server about 37 application identity 207, 209 Configuration Management Database 202 configuration overview 201 configuration procedure 206, 210 configuration settings overview 206, 210 configuring 163 configuring with NS Configurator 214 creating hierarchical relationships 99–100 database configuration 165 email 163 email address settings 211 functions 37 internal schedule calendar 276 NSE processing 207, 209 See also NSE processing operating system requirements 132 overview 36 package server 286 See also package service processing settings 207, 209 proxy server configuration 213 schedule usage 273 schedules 269 See also schedule shared schedules 274 site. See services site server. See site server site services 40, 286 See also site service status message logging 212 subnet. See subnet viewing log file 212 viewing status messages 212 Notification Server (continued) Web site 163 NS Configurator about 214 NSE performance impacts 120 NSE processing configuration settings 207, 209 enabling manually 207, 209 O off-box migration 146 upgrade 146 offline installation creating installation package 156 OLEDB driver Microsoft Access 2010 136 on-box upgrade 146 on-box SQL Server disk configuration 57 optimize agent settings 219 optimizing agent and task settings 223 optional components about 169 installing 166, 170 uninstalling 171 organizational group update schedule 123 organizational views and groups creating 306 populating 306 P package distribution points specifying credentials 213 package server. See package service operating systems, supported 133 Package Server for inux configuration examples 297 Package Server for Linux about 292 about configuring HTTPS and HTTP 296 about configuring with the Apache Web Server 295 about integrating Apache Web Server 293 349 350 Index Package Server for Linux (continued) detecting the Apache Web Server 294 supported platforms 292 package service about 67 configuring settings 290 global settings 287 package file settings 287 published codebase types 287 security settings 287 setting as unconstrained 290 package, software removing automatic site assignments 289 patch management dataflow 73 Patch Management Solution for Linux about 49 Patch Management Solution for Mac about 49 Patch Management Solution for Windows about 48 PC Transplant 195 performance tuning agent 124 factors 119 NSE 120 settings 126 SQL Server 120 permissions about 256 assigning to security role 262 connection profiles 259 credential management 260 filters 259 folders 259 how to view 260 permission categories 256 policies 259 reports 258 resource management 257 system 257 task server 258 planning IT management 53 platform support, Software Management Solution 52 policies cloning 121 inventory 121 policies view about 310 policy Automation Folder uninstalling 197 Deployment site server components uninstalling 197 Deployment Solution uninstalling 197 upgrading plug-in 195 Deployment Solution, about 186 for installing Deployment plug-in 192 for upgrading Deployment plug-in 195 viewing on internal schedule calendar 276 Policy Update schedule configuring 123 preboot enviroment deployment 82 preboot environments deploying 226 preinstallation requirements Deployment Solution 188 Preparing for an upgrade 180 privilege, security asset status item 245 categories 233 connection profile 235 connector samples 242 credential 239 hierarchy 243 management 235 right-click action 241 software management action 244 Software Management Framework 240 solution-specific action 244 Symantec Management Console 240 system 237 workflow directory 239 product listing adding a different file 177 updating 178 ProductName about 47 products adding 166–167 applying licenses 166, 172 modifying an installation 177 reconfiguring 166 Index products (continued) repairing an installation 166, 173 selecting 161 uninstalling 166, 174 updating 166–167 proxy server configuring 213 PXE deploying preboot environments 226 PXE server about 68 R reconfiguration installed product 167 Release Notes 31 repair Deployment Solution 199 replication configuring 108 creating replication rules 110 deleting replication rules 110 destination Notification Servers, specifying 113 enabling replication rules 110 events 108 hierarchy. See hierarchy replication items 108 replication rule settings 111 replication rules 108 resources 108 rules 107 running replication rules 110 security 108 types of 105 replication rules replication 108 replications custom 109 report hierarchy reports 115 reports MultiCMDB 89 resource data history saving in CMDB 205 resources scheduled filter updates 123 rolling out the agent 219 S saved searches managing 311 schedule active date range 275 active period 270 agent policy 274 agent task 273 components 269 configuring 275 custom 269 including multiple schedules 275 maintenance window 274 modifiers 272 resource membership updates 123 server policy 273 server task 273 shared 269 time zone 270 trigger 270 uses in Notification Server 273 viewing Notification Server schedule calendar 276 Schedule Editor opening 274 using 275 searching for a computer 305 searching for a software 311 security about 228 default roles 232 password complexity settings 252 password lockout settings 252 predefined roles 232 roles, overview 231 See also security role setting up 229 unlocking locked out credentials 255 security role about 231 asset status item privileges 245 assigning permissions 262 connection profile privileges 235 connector samples privileges 242 credential privileges 239 default 232 hierarchy privileges 243 item tasks privileges 241 management privileges 235 351 352 Index security role (continued) predefined 232 privilege categories 233 right-click action privileges 241 selecting 265 setting permission inheritance on folders 263 software management action privileges 244 Software Management Framework privileges 240 Symantec Management Console privileges 240 system privileges 237 taking ownership of folder or item 265 workflow directory privileges 239 Security Role Manager about 260 accessing 261 server processing configuration settings 207, 209 shared schedule about 274 creating 274 deleting 274 enabling 274 modifying 274 viewing on internal schedule calendar 276 viewing schedule users 274 Silverlight requirments 136 site assigning subnet 307 assigning subnets 281 creating 281 deleting 279 managing 279 manually assigning agents 282 manually assigning site server 286 modifying 281 removing site server 279 removing subnet 279 site maintenance 63 site server 63 site services 40 unconstrained package server 290 site assignments, automatic removing 289 site server about 67 about task server handler 78 adding site services 285 site server (continued) creating 285 deployment site server 68 managing 283 manually assigning to site 286 modifying 285 planning 62 removing from site 283 removing site services 285 status 283 task 64 site server component about 78 site servers installing task server handlers 192 managing deployment tasks 192 operating system requirements 132 using Deployment policies to install, uninstall, and upgrade 186 site service configuring settings 286 package service settings 287 task service settings 290 SNMP 50 software managing 312 searching 311 Software Catalog window about 313 software delivery 51 See also Software Management Solution software license tracking 312 Software Management Framework about 37 Software Management Solution about 51 platform support 52 software search performing 311 saving 311 software, third-party requirements 135 solution dependencies updating 95 solutions IT Management Suite 41 SQL Server collations, supported 141 Index SQL Server (continued) disk configuration 56 IOPS 59 memory 61 performance tuning 120 planning configuration 55 recommendations 135 size 60 status messages logging 212 viewing in Log Viewer 212 subnet assigning to site 307–308 creating 308 deleting 307 managing 307 resynchronizing 307 subnet mask 308 support package creating 166, 174 Symantec Installation Manager delaying the update 154 installing 151 starting 153 Symantec Installation Manager logs disabling verbose 176 viewing 175–176 Symantec Management Agent about 40 embedding in image 70 general targeted settings 126 manually assigning to site 282 rolling out 219 Symantec Management Agent for UNIX, Linux, and Mac about 40 Symantec Management Console about 38 personalization 38 Symantec Management Platform about 34, 36 adding products 167 architecture 35 components 36 installation overview 147 installation process 148 installing products 158 introduction 34 planning the installation 139 Symantec Management Platform (continued) security 228 types of installations 146 uninstalling 174 updating products 167 Symantec Management Platform 7.1 SP2 What's new 25 Symantec Workflow about 52 system requirements checking for 162 T target update schedule 123 task viewing on internal schedule calendar 276 task server 290 See also task service operating systems, supported 133 tickle 65 task server handler about 78 task server handlers installing 192 task service about 64 configuring settings 291 global settings 290 network ports used 290 tickle task server 65 tools 195 troubleshooting creating a support package 166, 174 U uninstallation Automation Folder 197 Deployment plug-in 197 Deployment site server components 197 UNIX 52 See also UNIX, Linux, and Mac support in Software Management Solution 52 UNIX, Linux, and Mac support in Software Management Solution 52 update delaying 154 353 354 Index update installation package creating 157 updating solution dependencies 95 upgrade off-box 146 on-box 146 Upgrade to IT Management Suite 7.1 SP2 performing 182 preparing for 180 Upgrading about 179 to IT Management Suite 7.1 SP2 179, 182 user selecting 265 user account assigning to security roles 252 configuring 247 creating 247 credentials, adding 249 credentials, modifying 249 credentials, types 246 general account details 249 overview 245 password complexity settings 252 password lockout settings 252 setting permission inheritance on folders 263 unlocking locked out credentials 255 V Verbose logs in Symantec Installation Manager 176 Viewing Symantec Installation Manager logs 175–176 viewing installation logs 166 W Web site configuration troubleshooting 164 What's new Symantec Management Platform 7.1 SP2 25 what's new in IT Analytics 7.1 SP2 90 WMI 50