Analyzing Hardware Inventory report and hardware scan files IBM LICENSE METRIC TOOL AND BIGFIX INVENTORY SUPPORT OPEN MIC To hear the WebEx audio, select an option in the Audio Connection dialog or by accessing the Communicate > Audio Connection menu option. To ask a question by voice, you must either Call In or have a microphone on your device. You will not hear sound until the host opens the audio line. For more information, visit: http://ibm.biz/webexoverview_supportopenmic By : Pau Leen Lee ILMT Support Engineer Email : leepl@my.ibm.com 28 February 2017 NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING THE CALL, AS WELL AS TO IBM S USE OF SUCH RECORDING IN ANY AND ALL MEDIA, INCLUDING FOR VIDEO POSTINGS ON YOUTUBE. IF YOU OBJECT, PLEASE DO NOT CONNECT TO THIS CALL.
Panelists Presenter : Sherrie Clarke, ILMT L2 Support Engineer Panelists: Khalid Yahya, ILMT Advisory Software Engineer Leslie Popow, ILMT L2 Support Engineer Hope Maxwell-Daley, ILMT L2 Support Team Leader Moderator: Hope Maxwell-Daley
Goal of Session Advise users so they can a) Accomplish simple troubleshooting for hardware files b) Locate and distinguish different computer IDs c) Locate hardware files and know how to use them
Agenda of Session a) Hardware Inventory Summary b) Viewing hardware inventory from ILMT UI c) Checking Hardware computer in Big Fix console d) Viewing hardware information from database e) Checking related files
Hardware Refresher Understanding the hardware process in ILMT
Hardware software scans based on software identification (SWID) tags For hardware discovery - is being used by scanner Scanner is obtained during installation of BigFix client From BigFix client, it will enables both software and capacity scans These capacity scans are collected set of data which will appear in ILMT reporting 6 IBM Security
Viewing Hardware Inventory from ILMT UI You need to login to ILMT / BFI Web User Interface Click Reports > Infrastructure Hardware Inventory 7 IBM Security
Checking Computer ID from Big Fix Console Computer ID is assigned by Big Fix For ILMT, remote_id is being used 8 IBM Security
Adding Column for computer ID 9 IBM Security
Computer Properties Summary 10 IBM Security
Detecting From Database Queries to capture information from database
1) You would need to login to TEMADB or SUADB 2) DB2 connect SUADB 3) Run the following statement to see one sample hardware which is found in reporting: select * from sam.processors p join dbo.computers c on p.computer_id = c.id where c.remote_id = 148382888 <- use computer ID from Big Fix select * from sam.processors p where p.partition_network_address = LMT923' 12 IBM Security
Query1 output sample 13 IBM Security
Query2 output sample 14 IBM Security
Running the Scans Procedure in Big Fix Console to Run Hardware Scans
To check for the files in hardware repository, one needs to ensure that fixlet Run Capacity Scan has been done. To perform the Run Capacity Scan: a) Use the credentials to login to BigFix console b) Select Sites > External Sites > IBM License Reporting (ILMT) > Fixlets and Tasks and select Run Capacity Scan and Upload Results c) Select Take Action, and choose Click here to schedule regular capacity scans and uploads of results. d) Select the device computer involved 16 IBM Security
Determining Hardware output files 17 IBM Security
Checking COMPUTER ID from Hardware Inventory Console 18 IBM Security
How to check if capacity scan ran from logs How to check if capacity scan ran from UI There is no logging that can be seen from ILMT UI directly, however in case of error, you should take note of No Scan Data in ILMT UI Dashboard. 19 IBM Security
Questions for the panel Now is your opportunity to ask questions of our panelists. To ask a question now: Raise your hand by clicking Raise Hand. The Raise Hand icon appears next to your name in the Attendees panel on the right in the WebEx Event. The host will announce your name and unmute your line. or Type a question in the box below the Ask drop-down menu in the Q&A panel. Select All Panelists from the Ask drop-down-menu. Click Send. Your message is sent and appears in the Q&A panel. To ask a question after this presentation: You are encouraged to participate in the dw Answers forum: https://developer.ibm.com/answers/topics/ilmt/ 20 IBM Security
For more information More articles you can review: IBM developerworks articles: https://www.ibm.com/developerworks/community/wikis/home?lang=en#!/wiki/ibm%20license%20metric%20tool IBM Knowledge Center https://www.ibm.com/support/knowledgecenter/en/ss8jfy_9.0.0/com.ibm.lmt.doc_9.0/com.ibm.license.mgmt.doc/ic -homepage_lmt.html Useful links: Get started with IBM Security Support IBM Support Portal Sign up for My Notifications Follow us: 21 IBM Security
THANK YOU FOLLOW US ON: https://www.facebook.com/ibmsecuritysupport/ youtube/user/ibmsecuritysupport @askibmsecurity securityintelligence.com xforce.ibmcloud.com Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.