You are on page 1of 69

© 2012 Microsoft Corporation. All rights reserved.

Microsoft Confidential
System Center 2012 Configuration Manager
Concepts & Administration Workshop
Module 4: Inventory, Asset Intelligence, Software Metering
and Remote Control

Your Name

Premier Field Engineer

Microsoft
Conditions and Terms of Use
Microsoft Confidential
This training package is proprietary and confidential, and is intended only for uses described in the training materials. Content and software
is provided to you under a Non-Disclosure Agreement and cannot be distributed. Copying or disclosing all or any portion of the content
and/or software included in such packages is strictly prohibited.
The contents of this package are for informational and training purposes only and are provided "as is" without warranty of any kind, whether
express or implied, including but not limited to the implied warranties of merchantability, fitness for a particular purpose, and non-
infringement.
Training package content, including URLs and other Internet Web site references, is subject to change without notice. Because Microsoft
must respond to changing market conditions, the content should not be interpreted to be a commitment on the part of Microsoft, and
Microsoft cannot guarantee the accuracy of any information presented after the date of publication. Unless otherwise noted, the companies,
organizations, products, domain names, e-mail addresses, logos, people, places, and events depicted herein are fictitious, and no association
with any real company, organization, product, domain name, e-mail address, logo, person, place, or event is intended or should be inferred.

Copyright and Trademarks


© 2012 Microsoft Corporation. All rights reserved.
Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this
document. Except as expressly provided in written license agreement from Microsoft, the furnishing of this document does not give you any
license to these patents, trademarks, copyrights, or other intellectual property.
Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this
document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic,
mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation.
For more information, see Use of Microsoft Copyrighted Content at
http://www.microsoft.com/about/legal/permissions/
Microsoft®, Internet Explorer®, and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States
and/or other countries. Other Microsoft products mentioned herein may be either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries. All other trademarks are property of their respective owners.
Overview
Hardware and Software Inventory
Asset Intelligence
Software Metering
Remote Tools

4 Microsoft Confidential
Objective
After completing this Module, you will be able to:
Configure, customize, troubleshoot and report Hardware
and Software Inventory
Configure Asset Intelligence, import an MVLS license
statement and generate Asset Intelligence reports
Configure Software Metering, create rules and generate
reports
Learn what’s new in Remote Control and how to configure
the Remote Tools client

5 Microsoft Confidential
Hardware and Software Inventory
Types of Inventory
Hardware Inventory components and logs
Enabling and customizing Hardware Inventory
Hardware Inventory reporting
Software Inventory components and logs
Enabling and customizing Software Inventory
Software Inventory reporting

6 Microsoft Confidential
Types of Inventory
Hardware Inventory
Queries WMI for hardware data
Can be customized per site or per collection
Customize Hardware Inventory
MOF files can be imported from the console
Inventory Classes can be imported from a local or remote system

Software Inventory
Scans hard drives for file types
Can also collect copies of files during inventory cycle
Can be customized per site or per collection

7 Microsoft Confidential
Hardware Inventory Components and Logs

1 2 3
Client Management Point Site Server
• Inventory data • Report received in • Report received in
generated and MP\outboxes\hinv.bo Inboxes\auth\dataldr.b
sent to x ox
Management • Moved by Hardware • Data Loader processes Database
Point on agent
schedule
Inventory Manager to
Site Server
data
• Dataldr.log
updated
• InventoryAgent.lo • MP_Hinv.log
g

8 Microsoft Confidential
Enabling and Customizing Hardware Inventory
 Administration Node  Client Settings Default Settings  Hardware Inventory

9 Microsoft Confidential
Enabling and Customizing Hardware Inventory

10 Microsoft Confidential
Enabling and Customizing Hardware Inventory
Assign different settings for Hardware Inventory by
creating custom client device settings
Deploy settings to a collection
If a device is a member of more than one collection with
conflicting device settings, the priority setting determines
which setting is enforced.
Default client settings have a priority of 10,000
Custom device settings have higher priorities
Priorities can be increased or decreased by the
administrator

11 Microsoft Confidential
Creating Custom Device Settings

12 Microsoft Confidential
Creating Custom Device Settings

13 Microsoft Confidential
Deploy Settings to a Collection

14 Microsoft Confidential
Hardware Inventory Reporting
40+ reports for viewing Hardware Inventory results
Hardware – CDROM, Hardware – Disk etc

Useful reports for troubleshooting Hardware Inventory


Inventory Classes enabled on a specific computer
Inventory Classes assigned to a specific collection
Computers not inventoried recently (in a specified number of days)

15 Microsoft Confidential
Software Inventory Components and Logs

1 2 3
Client Management Point Site Server
• Software Inventory • Report received in • Report received on
data generated and
sent to Management
MP\outboxes\sinv.box
• Moved by Software
Inboxes\sinvproc.box
• Software Inventory
Database
Point on Agent
Schedule
Inventory Manager to Processor processes updated
Site Server data
• InventoryAgent.log • MP_Sinv.log • Sinvproc.log

16 Microsoft Confidential
Enabling and Customizing Software Inventory
 Administration Node  Client Settings Default Settings  Software Inventory

17 Microsoft Confidential
Enabling and Customizing Software Inventory
Assign different settings for Software Inventory by creating
custom client device settings
Deploy settings to a collection
Default client settings have a priority of 10,000
Custom device settings have higher priorities
Priorities can be increased or decreased by the
administrator

18 Microsoft Confidential
Creating Custom Device Settings

19 Microsoft Confidential
Creating Custom Device Settings

20 Microsoft Confidential
Deploy Settings to a Collection

21 Microsoft Confidential
Software Inventory Reporting
40+ reports for viewing Software Inventory results
Look in Software – Company and Products, Software – Files
categories

Useful report for troubleshooting Software inventory


Computers not inventoried recently (in a specified number of days)

22 Microsoft Confidential
Lab: Customizing Hardware and Software Inventory
Scenario
You
You are
are the
the administrator of a new
Configuration
Configuration Manager
Manager 2012
2012 hierarchy.
hierarchy.
You
You need
need toto generate
generate inventory
inventory data
data
from
from newly-installed clients

Goals
Enable, customize and report
Hardware Inventory
Enable, customize and report
Software Inventory

23 Microsoft Confidential
Lesson Review
Name two differences in enabling and configuring
hardware inventory in System Center 2012 Configuration
Manager from Configuration Manager 2007?
How can different inventory settings be applied to different
groups of clients within a Configuration Manager site?
How does an administrator troubleshoot conflicting
inventory settings applied to a single computer?

24 Microsoft Confidential
Lesson Summary
In this lesson, you learned:
How hardware inventory can be enabled and customized
How software inventory can be enabled and customized

25 Microsoft Confidential
Asset Intelligence Lesson Objectives
In this Lesson you will learn:
What’s new in System Center 2012 Configuration Manager?
How to configure Asset Intelligence
Hardware Inventory and Software Metering Agents
Enabling Asset Intelligence Reporting Classes
Reporting Class dependencies
Installing an Asset Intelligence Synchronization Point
Auditing successful logon events
Importing an MVLS license statement
Asset Intelligence Maintenance Tasks
Asset Intelligence Reporting

26 Microsoft Confidential
What is New in Asset Intelligence
Enable Asset Intelligence reporting classes
Changes to MVLS license statement import process
2 Maintenance Tasks
Check Application Title with Inventory Information - checks that the
software title reported in software inventory is reconciled with the
software title in the Asset Intelligence catalog.
Summarize Installed Software Data - provides the summary
information displayed in the Inventoried Software node under the
Asset Intelligence node.
Client Access License reports have been removed

27 Microsoft Confidential
How to configure Asset Intelligence
Enable Hardware Inventory and Software Metering Agents
Edit Asset Intelligence Hardware Inventory reporting
classes
Install an Asset Intelligence Synchronization Point
Enable auditing of success logon events
Import software license information
Create a general license statement information file for
import
Configure Asset Intelligence Maintenance Tasks

28 Microsoft Confidential
Hardware Inventory & Software Metering Agent
Enable in Default Client Settings, or create Custom Device
Settings to enable these settings for specific collections

The following reports require the Software Metering Agent


to be enabled:-
Software 07A - Recently Used Executables by Number of Computers
Software 07B - Computers that Recently Used a Specified Executable
Software 07C - Recently Used Executables on a Specific Computer
Software 08A - Recently Used Executables by Number of Users
Software 08B - Users that Recently Used a Specified Executable
Software 08C - Recently Used Executables by a Specified User

29 Microsoft Confidential
Software Metering
Software Metering components
Enabling and customizing Software Metering
Creating Custom Device Settings
Creating Metering Rules
Software Metering reporting
Client and server troubleshooting

30 Microsoft Confidential
Software Metering Components and Logs

1 2 3
Client Management Point Site Server
• Metering data generated • Report received in • Report received on
and sent to MP on Data
Collection Schedule
MP\outboxes\swm.
box
Inboxes\swmproc.bo
x
Database
• Mtrmgr.log • Moved by File • Software Metering updated
• Swmtrreportgen.log Despatch Manager Processor processes
to Site Server data
• Swmproc.log

31 Microsoft Confidential
Enabling and Customizing Software Metering
 Administration Node  Client Settings  Default Settings  Software Metering

32 Microsoft Confidential
Software Metering Components
Software Metering client agent
Mtrmgr.log
Software Metering Processor (Site Server component)
Swmproc.log
Data usage report generation log
SWMTRReportGen.log

33 Microsoft Confidential
Enabling and Customizing Software Metering
Assign different settings for Software Metering by creating
Custom Client Device Settings
Deploy settings to a collection

34 Microsoft Confidential
Creating Custom Device Settings

35 Microsoft Confidential
Creating Custom Device Settings

36 Microsoft Confidential
Creating Metering Rules
Auto-created

37 Microsoft Confidential
Creating Metering Rules
Manually created

38 Microsoft Confidential
Deploy Settings to a Collection

39 Microsoft Confidential
Software Metering Administration
Metering rules can be organized in folders
Metering rules can be enabled, disabled, edited or moved.

40 Microsoft Confidential
Software Metering Reporting
Reports rely on metering data being sent from the client –
default is every 7 days
Schedule data collection for Software Metering in Default Client
Settings
Some reports rely on summarization
Summarize Software Metering File Usage Data
Summarize Software Metering Monthly Usage Data

41 Microsoft Confidential
Software Metering Reports

42 Microsoft Confidential
Lab: Customizing Software Metering
Scenario
You
You are
are the
the administrator
administrator of
of the
the
Contoso System Center 2012
Configuration Manager hierarchy. You
wish to create new Software Metering
rules for aa Configuration
Configuration Manager site
site

Goals

Enable
Enable Software
Software Metering
Create
Create a new
new software
software metering
metering rule
rule
Generate
Generate a software metering
metering report
report

43 Microsoft Confidential
Lesson Review
What is the name of the client log that shows metering
rules being checked when an executable is run?
Name the two ways to create a metering rule?

44 Microsoft Confidential
Lesson Summary
In this Lesson, you learned:
How to enable and configure the Software Metering Agent
How to create rules automatically and manually

45 Microsoft Confidential
Asset Intelligence Lesson Objectives
In this lesson, you will learn:
Which components are required to generate successful Asset
Intelligence Reports
How to import MVLS and license statements
Which 2 new Maintenance Tasks have been added to System
Center 2012 Configuration Manager for Asset Intelligence
How to add Categories, Families and Labels to the Catalog

46 Microsoft Confidential
Enable Asset Intelligence Reporting Classes

47 Microsoft Confidential
Reporting Class Dependencies
SMS_Installed_Software

SMS_SystemConsoleUsage

48 Microsoft Confidential
Reporting Class Dependencies
SMS_SystemConsoleUser

SMS_AutoStartSoftware

SMS_BrowserHelperObject

49 Microsoft Confidential
Reporting Class Dependencies
Win32_USBDevice

SMS_InstalledExecutable

SMS_SoftwareShortcut

SoftwareLicensingService

SoftwareLicensingProduct

50 Microsoft Confidential
Reporting Class Dependencies
SoftwareLicensingProduct

51 Microsoft Confidential
Install an Asset Intelligence Synchronization Point

52 Microsoft Confidential
Install an Asset Intelligence Synchronization Point

53 Microsoft Confidential
Install an Asset Intelligence Synchronization Point

54 Microsoft Confidential
Enable Auditing of Successful Logon Events
Required for the following reports
Hardware 3A – Primary Computer Users
Hardware 3B – Computers for a Specific Computer User
Hardware 4A – Shared (multi-user) Computers
Hardware 5A – Console Users on a Specific Computer

Enable the SMS_SystemConsoleUser reporting class

Modify Domain Security Policy


 Security Settings
 Local Policies
 Audit Policy
 Audit Logon Events – select Success check box

55 Microsoft Confidential
Import Software License Information
Import general (non-MVLS) information into the database
Create manually in .csv format with the following headers
Name
Publisher
Version
Language
EffectiveQuantity
PONumber
ResellerName
DateofPurchase
SupportPurchased
SupportExpirationDate
Comments

56 Microsoft Confidential
Importing an MVLS License Statement

57 Microsoft Confidential
Configure Asset Intelligence Maintenance Tasks

58 Microsoft Confidential
Lesson Review
What kind of license statements can be imported into
System Center 2012 Configuration Manager?
Name the two new Maintenance Tasks for Asset
Intelligence data in System Center 2012 Configuration
Manager?

59 Microsoft Confidential
Lesson Summary
In this lesson, you learned:
Which components are required to generate successful Asset
Intelligence Reports
How to import MVLS and license statements
Which 2 new Maintenance Tasks have been added to System
Center 2012 Configuration Manager for Asset Intelligence
How to add Categories, Families and Labels to the Catalog

60 Microsoft Confidential
Lesson Objectives Remote Control
What’s new in System Center 2012 Configuration Manager?
What’s new with Remote Control, Remote Desktop,
Remote Assistance
How to configuring the Remote Tools Client

61 Microsoft Confidential
What’s New in Configuration Manager
Supported Operating Systems for Remote Control Viewer
Windows 7 (32 bit and 64 bit)
Windows XP SP3 32-bit, Vista 32-bit, Vista 64-bit
 Install the Remote Desktop Connection (RDC) client update 7.0
(KB969084)

No support for the Remote Control Viewer on Windows XP


(64 bit), Windows Server 2003 (32 or 64 bit), Windows
Server 2008 or R2 (64 bit) operating systems

62 Microsoft Confidential
What’s New in Configuration Manager?
Pass CTRL+ALT+DEL to client
Disable client mouse and keyboard during remote control
session
Remote Tools are configured in the Default Client Settings
or in Custom Device Settings linked to a collection

63 Microsoft Confidential
What’s New in Configuration Manager? (continued)
Start Remote Control Viewer from a command line
<Configuration Manager Installation
Folder>\AdminConsole\Bin\i386\CmRcViewer.exe
Supported Switches
File – Connect
File - Disconnect
File - Exit
View - Full Screen
View - Scale to Fit
View - Status Bar
Action - Send Ctrl+Alt+Del Key
Action - Enable Clipboard Sharing
Action - Lock Remote Keyboard and Mouse

64 Microsoft Confidential
Configuring the Remote Tools Client
Client can be used to configure Remote Control, Remote
Assistance and Remote Desktop
Remote Assistance and Remote Desktop settings are
applied as local policy, so can be over-written by domain-
based Group Policy
Remote Assistance and Remote Desktop needs to be
enabled on the client before settings for these features are
effective
Remote Assistance feature must be installed on the
machine initiating the connection

65 Microsoft Confidential
Remote Control Client Settings

66 Microsoft Confidential
Demo: Remote Control in Configuration Manager
Scenario
You
You are
are the
the administrator of a
Configuration
Configuration Manager
Manager hierarchy.
hierarchy. You
You
need
need to
to use
use the
the Remote
Remote Tools
Tools client
client to
to
remotely
remotely control
control aa Windows
Windows 77 client
client

Goals

Enable
Enable and
and configure
configure the
the Remote
Remote
Tools
Tools Client
Client
Start
Start aa Remote
Remote Tools
Tools session
session from the
command
command line

68 Microsoft Confidential
Lesson Review
Name one new feature of the Remote Tools Client?
How can you start the Remote Control viewer from a
command line?

69 Microsoft Confidential
Lesson Summary
In this lesson, you learned:
What’s new in Configuration Manager for the Remote Tools Client
How to enable and configure the Remote Tools Client Agent

70 Microsoft Confidential

You might also like