Audit Table of Contents:

Similar documents
Kaseya 2. User Guide. for VSA 6.2

User Guide. Version R95. English

Managed Service Edition - G1

Kaseya 2. User Guide. Version 1.0

Agents Table of Contents:

Live Connect. Live Connect

Kaseya 2. User Guide. for VSA 6.0

Kaseya 2. User Guide. Version 1.0

User Guide. Version R9. English

User Guide. Version R95. English

User Guide. Version R94. English

User Guide. Version R93. English

User Guide. Version R94. English

Virtual System Administrator

Kaseya 2. User Guide. Version 7.0. English

Quick Start Guide. Kaseya 2

Quick Start Guide. Kaseya 2009

User Guide. Version R95. English

User Guide. Version R92. English

Remote Control Table of Contents:

Kaseya 2. Quick Start Guide. for VSA 6.1

Kaseya 2. Quick Start Guide. for VSA 6.3

Monitoring Table of Contents:

User Guide. Version 2.1

User Guide. Version R95. English

System Table of Contents:

Kaseya 2. User Guide. Version 1.1

Bridge Cable User s Guide

User Guide. Version R93. English

User Guide. Version R95. English

User Guide. Version R95. English

Quick Start Guide. Version R95. English

Kaseya 2. Installation guide. Version R8. English

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9

Backup Table of Contents:

Kaseya 2. User Guide. for VSA 6.0

Kaseya 2. User Guide. Version 6.5 and 1.1

User Guide. Version R92. English

User Guide. Version R94. English

Kaseya 2. User Guide. Version 7.0. English

User Guide. Version 2.1

Installation Guide. for 6.5 and all add-on modules

Kaseya 2. User Guide. Version 1.1

Categories Administrative Security Categories 57 Alerts Hidden Categories 2 Asset Intelligence Total 59 Client Push Client Status Total Reports 541

Table of Contents. 1 Introduction. 2 Wireless Configurations. 3 Setting Up your LAN Administrator Station

User Guide. Version R93. English

TABLE OF CONTENTS. PRELIMINARY SETUP REQUIREMENTS... 1 Minimum Hardware/Software Requirements...1

Kaseya 2. Quick Start Guide. for VSA 6.0

Kaseya 2. User Guide. Version 2.1

Quick Start Guide. Version R92. English

Kaseya 2. User Guide. for VSA 6.3

User Guide. Version R95. English

Kaseya 2. Quick Start Guide. for VSA 6.5

IT Essentials v6.0 Windows 10 Software Labs

InventoryControl Quick Start Guide

Installation Guide. Version R94. English

KYOCERA Net Viewer User Guide

Kaseya 2. User Guide. Version 6.0

ForeScout CounterACT. Hardware Inventory Plugin. Configuration Guide. Version 1.0.3

Network Scanner Tool V3.3. User s Guide Version

Quick Start Guide. Version R92. English

LevelOne FNS bay/1usb Soho NAS. User s Manual

User Guide. Version R94. English

USB2.0 LAN DISK User s Manual

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

Legal Notes. Regarding Trademarks KYOCERA MITA Corporation

Client Installation and User's Guide

ForeScout CounterACT. Configuration Guide. Version

Kaseya 2. User Guide. Version R8. English

Client Installation and User's Guide

Contents. A April 2017 i

Network Camera. Application Guide 1.5 Before operating the unit, please read this manual thoroughly and retain it for future reference.

This option lets you reset the password that you use to log in if you do not remember it. To change the password,

Version 4.1 June Xerox Device Agent (XDA) Lite User Guide

1. Introduction Features Operating Environment Machine Data...6

User's Guide Applied Functions

VMware Mirage Web Management Guide. VMware Mirage 5.9.1

Intel Server RAID Controller U2-1 Integration Guide For Microsoft* Windows NT* 4.0

Network Guide NPD EN

KYOCERA Net Viewer 5.3 User Guide

NEC PowerMate VT 300 Series Release Notes

Altiris CMDB Solution from Symantec Help. Version 7.0

VIP-102B IP Solutions Setup Tool Reference Manual

Edge Device Manager Quick Start Guide. Version R15

Getting Started. Overview of the Splash G3535

Build

Notebook Network Card

VMware Mirage Web Management Guide

Magic Card NET. User s Manual

Altiris Software Management Solution 7.1 from Symantec User Guide

HP LeftHand SAN Solutions

CounterACT Hardware Inventory Plugin

Display Manager Version 1.0

Forescout. Configuration Guide. Version 1.1

Farstone TotalDeploy User Guide

What s New in Fireware v12.3 WatchGuard Training

ForeScout Extended Module for Tenable Vulnerability Management

Web Dashboard. User Manual. October Revision

Kaseya IT Services KASEYA IT SERVICES PROGRAM CATALOG 2014 Q3

Lesson 3: Identifying Key Characteristics of Workgroups and Domains

Transcription:

Table of Contents: Collect Data View Group Data View Individual Data Protection

2 Chapter 3 - Sadjadi et al. Introduction Comprehensive accurate understanding of the configuration of every managed machine provides the basis for identification of potential concerns including, security holes, interoperability issues, hardware/software policy conflicts, licensing issues, and so on, leading into more informed corrective steps with fewer undesired side effects. Therefore, collecting and maintaining up-to-date inventory of all computers has been an integral part of system administration tasks. Collecting and maintaining accurate and up-to-date information, however, is not a one-time process, as the number of managed computers and configuration of each computer including installed software change frequently over time. Without automated support, this task becomes extremely repetitive, tedious and error-prone. An automated audit process to inspect every managed machine at predetermined intervals no matter how many machines are under management and where they are located is necessary for simple, efficient, and reliable and up-to-date tracking of the state of every computer. The Kaseya s provides the needed automated support for the automatic collection of useful data from all managed machines and the presentation of the collected data in an easy to read and understand format. Here are some examples: All hardware, including CPUs, RAM, PCI cards, and disk drives. All installed software, including licenses, version numbers, full path, and description. System Information including PC make, model, serial number, mother board type, and over 40 other pieces of information describing the PC and its configuration. OS info with version number and service pack build. Current network settings including local IP address, gateway IP address, DNS, WINS, DHCP, and MAC address. The audit process collects and maintains three types of audit data for each managed machine (machine ID): Desktop Management Interface (DMI) - generates a standard framework for managing and tracking components System Management BIOS (SMBIOS) - specification defines data structures and access methods in a BIOS. Baseline audit: Baseline audit aggregates the configuration of the system in its original state. Typically a baseline audit is performed when an agent is first installed on a system. Latest audit: Latest audit aggregates the configuration of the system as of the last audit. As the overall system configuration changes rapidly over time, the Latest audit is performed frequently, typically once per day. System Info : System info aggregates all DMI* / SMBIOS* data of the system as of the last system audit. DMI (Desktop Management Interface) provides a standard framework for managing and tracking components in a desktop, notebook or server computer, by abstracting the managed devices from the software that manages them. SMBIOS (System Management BIOS) specification defines data structures (and corresponding access methods) in system BIOS allowing users or applications to store and retrieve specific information about the system. The data collected from DMI/SMBIOS changes slowly over time only after hardware reconfigurations (i.e., hardware upgrades, peripheral addition/ removal, etc.), and is only needed to be updated after each hardware change. The process begins the collection of the baseline system data which is then kept up-to-date with subsequent periodical audits. In Kaseya, audits are performed by agents at the target computers. When an agent complete the audit, it reports the collected data back to the Kaseya server which in turn generates various audit reports as needed resulting in a complete accounting of every computer at any given time.

Chapter 3 - Sadjadi et al. 3 3.1 Collect Data 3.1.1 Run The Run page performs audits of the hardware and software configuration of manage machines. s Agents can be scheduled to automatically audit the hardware and software configurations of their managed machines on a recurring basis. Agents report the information back to the KServer so you can access it using the VSA even when managed machines are powered down. s enable you to examine configurations before they develop into serious problems. The system maintains three types of audits for each machine ID: Baseline audit: The configuration of the system in its original state. Typically a baseline audit is performed when a system is first set up. Latest audit: The configuration of the system as of the last audit. Once per day is recommended. System Info: All DMI / SMBIOS data of the system as of the last system info audit. This data seldom changes and typically only needs to be run once. The VSA detects changes in a machines s configuration by comparing the latest audit to the baseline audit. The latest audit record is stored for as many days as you specify. Most of the agent and managed machine data displayed by function pages and Info Center > Reports are based on the latest audit. The Machine Changes report compares a machine ID s latest audit to a baseline audit. Note: PCI & Disk H/W audits are performed automatically on Windows XP and later operating systems. Older systems are not supported. Fig 3.1 below shows the generic view of the Run page. The options available on this page are listed and explained below. Fig. 3.1: Run page 1. Schedule : Click Schedule or Reschedule to display the Scheduler window, which is used throughout the VSA to schedule a task. Schedule a task once or periodically. Each type of recurrence: Once, Hourly, Daily, Weekly, Monthly, Yearly displays additional options appropriate for that type of recurrence. Periodic scheduling includes setting start and end dates for the recurrence. Not all options are available for each task scheduled. Options can include: Baseline, Latest or System Information: Type of audit.

4 Chapter 3 - Sadjadi et al. Distribution Window: Reschedules the task to a randomly selected time no later than the number of periods specified, to spread network traffic and server loading. Skip if offline: If checked and the machine is offline, skip and run the next scheduled period and time. If blank and the machine is offline, run the task as soon as the machine is online again. Power up if offline: Windows only. If checked, powers up the machine if offline. Requires Wake-On- LAN or vpro and another managed system on the same LAN. Exclude the following time range: If checked, specifies a date/time range to not perform the task. 2. Run Now: Schedules an audit to run immediately. 3. Cancel : Cancels a scheduled audit. 4. Remind me when accounts need audit scheduled: If checked, displays a pop up warning message if audits have not been scheduled for one or more machine IDs. The warning displays each time you select Run. Applies to each VSA user individually. 5. Machine.Group ID: The top line shows the machine ID. The bottom line displays the last time a System Info audit was performed. Overdue date/time stamps display as red text with yellow highlight. Pending and completed date/time stamps display as black text. 6. System Information: This column displays the last time audit was performed. Overdue date/time stamps display as red text with yellow highlight. Pending and completed date/time stamps display as black text. 7. Latest : This displays when the Latest data was performed. Overdue date/time stamps display as red text with yellow highlight. Pending and completed date/time stamps display as black text. 8. Baseline : This displays when the Baseline was performed. Overdue date/time stamps display as red text with yellow highlight. Pending and completed date/time stamps display as black text. 9. Next : Displays the time of the next scheduled Latest. Overdue date/time stamps display as red text with yellow highlight. Pending and completed date/time stamps display as black text. 10. Recurring Interval: Displays the recurring interval for latest audits. 11. View Definitions: This option allows you to filter the display of machine IDs on any agent page by their credential status. For a detailed description of View Definitions, refer to Agent filtering in Agents chapter. 3.2 View Group Data 3.2.1 Summary The > Summary page provides a view of the data returned by audits of machines using the Run page. The columns of audit data shown on this page are individually selectable and filterable. Userdefined sets of columns can also be selected. Columns sets are defined using the Configure Column Sets page. Additional data not shown in the Summary page is provided using the Machine Summary page. This table supports selectable columns, column sorting, column filtering and flexible columns widths. Fig 3.2 below shows the generic view of the summary page. The options supported on this page are listed and explained on the next page.

Chapter 3 - Sadjadi et al. 5 Fig 3.2: Summary page 1. Machine ID: The list of Machin IDs displayed is based on the Machine ID / Group ID filter and the machine groups the user is authorized to view. 2. Current User: Displays the logon name of the machine user currently logged into the machine (if any). 3. Last Checkin time: Most recent time when a machine checked into the KServer. 4. Column Set: This allows you to select the column set. The column set can be defined in > Configure column sets. 5. View Definitions: This option allows you to filter the display of machine IDs on any agent page by their credential status. For a detailed description of View Definitions, refer to Agent filtering in Agents chapter. 3.2.2 Configure Column Sets The Configure Columns Sets page defines columns sets that can be used to select a set of columns in the > Summary table. Fig 3.3 below shows the generic view of the Configure column sets page. The options supported on this page are listed and explained below. Fig 3.3: Configure Column Sets 1. New: Create a new column set. 2. Edit: Edit a selected column set. 3. Delete: Delete a selected column set.

6 Chapter 3 - Sadjadi et al. New Column Set To create a new column set, select New and enter the name of the column set and select the columns as required. Fig 3.4 below shows the New Column Set window. The options available on this page are listed and explained below. Fig 3.4: New Column Set 1. Name: Enter a name for the column set. 2. Columns: The various column options that are available on this page are listed below: Machine ID Current User Last Reboot Time Last Checkin Time Group ID First Checkin Time Time Zone Computer Name Domain/Workgroup DNS Computer Name Operating System OS Version CPU Type CPU Speed CPU Count RAM (MB) Agent Version Machine ID label used throughout the system. Logon name of the machine user currently logged into the machine (if any). Time of the last known reboot of the machine. Most recent time when a machine checked into the KServer. The group ID portion of the machine ID. Time when a machine first checked into the KServer. The time zone used by the machine. Computer name assigned to the machine. The workgroup or domain the computer belongs to. The fully qualified DNS computer name for the machine, which comprises the computer name plus the domain name. For example: jsmithxp.acme.com. Displays only the computer name if the machine is a member of a workgroup. Operation system type the machine is running. Operation system version string. Processor make and model. Clock speed of the processor. The number of CPUs. Megabytes of RAM on the machine. Version number of the Kaseya agent loaded on the machine.

Chapter 3 - Sadjadi et al. 7 Last Logged In User Portal Access Logon Portal Access Remote Control Portal Access Ticketing Portal Access Chat Primary/Secondary KServer Quick Checkin Period Contact Name Contact Email Contact Phone Manufacturer Product Name System Version System Serial Number Chassis Serial Number Chassis Asset Tag External Bus Speed Max Memory Size Max Memory Slots Chassis Manufacturer Chassis Type Chassis Version Motherboard Manufacturer Motherboard Product Motherboard Version Motherboard Serial Num Processor Family Processor Manufacturer Processor Version CPU Max Speed CPU Current Speed IP Address Subnet Mask Default Gateway Connection Gateway Country MAC Address Logon name of the last person to log into the machine. Logon name given to a machine user for logging into the KServer. Enabled if this machine user can log in and get remote control access to their own machine from another machine. Disabled if access is denied. Enabled if this machine user can log in and enter trouble tickets. Disabled if access is denied. Enabled if this machine user can initiate chat sessions with a VSA user. Disabled if access is denied. IP address / name the machine uses to communicate with the KServer. Quick check in time setting in seconds. Machine user name entered in Edit Profile. Email address entered in Edit Profile. Phone number entered in Edit Profile. System manufacturer. System product name. Product version number. System serial number. Serial number on the enclosure. Asset tag number on the enclosure. Motherboard bus speed. Max memory size the motherboard can hold. Total number of memory module slots available. Manufacturer of the enclosure. Enclosure type. Enclosure version number. Motherboard manufacturer. Motherboard product ID. Motherboard version number. Motherboard serial number. Processor type installed. Processor manufacturer. Processor version ID. Max processor speed supported. Speed processor is currently running at. IP address assigned to the machine. Networking subnet assigned to the machine. Default gateway assigned to the machine. IP address seen by the KServer when this machine checks in. If the machine is behind a DHCP server, this is the public IP address of the subnet. The country associated with the Connection Gateway. MAC address of the LAN card used to communicate with the KServer.

8 Chapter 3 - Sadjadi et al. DNS Server DHCP Server Primary/Secondary WINS IP address of the DNS server assigned to the machine. The IP address of the DHCP server used by this machine. WINS settings. 3.3 View Individual Data 3.3.1 Machine Summary The Machine Summary page allows users to perform tasks and functions solely for one managed machine. A series of tabbed property sheets provided access to various categories of information about the managed machine. Actions You can maintain an unlimited number of custom fields of information about managed machines. Custom fields can be maintained on both the Summary tab and the Hardware > Summary tab of this page. Custom fields can also be maintained on the > System Information page. Fig 3.5 below shows the generic view of the Machine Summary page. The options available on this page are listed and explained below. Fig 3.5: Machine Summary page 1. New Custom Field: Creates a new custom field. 2. Rename Custom Field: Renames a custom field. 3. Delete Custom Field: Deletes a custom field. 4. View Definitions: This option allows you to filter the display of machine IDs on any agent page by their credential status. For a detailed description of View Definitions, refer to Agent filtering in Agents chapter. The various tabs that are available on this page are listed and explained below. 1. Summary Collections - Displays the collections a machine is a member of. Defined using the Only show se-

Chapter 3 - Sadjadi et al. 9 lected machine IDs option in View Definitions. Name/OS Information - Displays the name, operating system and OS version. System Information - Displays the manufacturer of system, the product name, version and serial number. Network Information - Displays network configuration settings. CPU/RAM Information - Displays CPU and RAM specifications. Custom Fields - Displays custom fields and values assigned by the user to this machine. 2. Software System Information - Lists system hardware attributes and related information. Software Licenses - Lists all software licenses found for a selected machine ID. Duplicate license keys found on more than one machine display in red text. Clicking the number link next to the title of a duplicate license lists the machine IDs using the duplicate license. Installed Applications - Lists all the applications installed on the managed machine. Add/Remove - Displays programs listed in Add/Remove window of Windows machines. View Definitions: View Definitions window can be accessed by clicking Edit next to the View tab. 3. Hardware Summary System Information - Lists system hardware attributes and related information. Network Information - Displays network configuration settings. Chassis - The chassis manufacturer, type, version, serial number and asset tag. Motherboard - The motherboard manufacturer, product, version, serial number and external bus speed. CPU/RAM Information - Displays CPU and RAM specifications. Custom Fields - Displays custom fields and values assigned by the user to this machine. Printers - Lists the printers and ports a machine can direct print jobs to. PCI & Disk Hardware - Displays type, vendor, and product names. Disk Volumes - Displays disk volume information. Disk Partitions - Displays the partitions on each disk volume. Disk Shares - Displays shared folders. 4. 4. Agent Settings - Displays information about the agent on the managed machine: Agent version Current User Last check-in Last reboot First time check-in Patch Policy Membership - Defined using Patch Management > Membership: Patch Policy View Definition Collections - Defined using the Only show selected machine IDs option in View Definitions. Working Directory - Can also be defined using Agent > Working Directory.

10 Chapter 3 - Sadjadi et al. Fig. 3.8: IP Info Check-In Control - Can also be defined using Agent > Check-In Control. Edit Profile - Can also be defined using Agent > Edit Profile. Agent Logs and Profiles - Can also be defined using Agent > Log History. Logs - Displays the logs available for a machine: Alarm Log, Monitor Action Log, Agent Log, Configuration Changes, Network Statistics, Event Log, Agent Procedure Log, Remote Control Log, Log Monitoring. Pending Procedures - Displays and schedules pending procedures for a machine and the procedure history for that machine. Includes the execution date/time, status and user who scheduled the procedure. Click the Schedule Another Procedure button to schedule a procedure not yet pending. Once selected and scheduled, the procedure displays at the bottom of the Pending Procedures section. Click the Schedule button to schedule a selected procedure to run in the future or on recurring basis. Click the Run Now button to run a selected procedure once immediately. Click the Cancel button to cancel any selected pending procedure. 5. Alerts: Defines alerts for a machine: Agent Status, Application Status, Get File Changes, Hardware Changes, Low Disk Space, Event Log, LAN Watch, Agent Procedure Failure, Protection Violations, Patch Alert, Backup Alert. 6. Patch Status: Displays Missing and Pending Microsoft patches and schedules missing patches. If a machine belongs to a patch policy, missing patches may be further identified as Denied (Pending Approval). The user can manually override the denied patch policy by scheduling the patch. Click the Schedule button to schedule a selected missing patch. Click the Cancel button to cancel a selected pending patch. Click the Show History link to display the history of patches installed on the managed machine. 7. Remote Control: Displays the status of remote control sessions for the managed machine: Remote Control, FTP, and Chat. The VSA user can set the remote control package to use during a remote control session. 8. Documents: Lists documents uploaded to the KServer for a managed machine. You can upload additional documents. Provides the same functionality as > Documents. 9. Users Accounts - Lists all user accounts for the managed machine. Groups - Lists all user groups for the managed machine. Members - Identifies the users belonging to each user group for the managed machine.

Chapter 3 - Sadjadi et al. 11 3.3.2 System Information The System Info page displays all DMI / SMBIOS data collected by the system info audit for a selected machine ID. Select a Machine Select a machine in the middle panel to display data for that machine. When more rows of data are selected than can be displayed on a single page, click the and buttons to display the previous and next page. The drop-down list alphabetically lists the first record of each page of data using the sort order of the selected column on that page. Fig 3.6 below shows the generic view of the System Information page. The options available on this page are listed and explained below. Fig 3.6: System Information 1. System Information Manufacturer - System manufacturer Product Name - System product name System Version - System version number

12 Chapter 3 - Sadjadi et al. System Serial Number - System serial number 2. Network Information 3. Chassis IPv4 Address - IP version 4 address assigned to the machine. IPv6 Address - IP version 6 address assigned to the machine. Subnet Mask - Networking subnet assigned to the machine. Default Gateway - Default gateway assigned to the machine. Connection Gateway - IP address seen by the KServer when this machine checks in. If the machine is behind a DHCP server, this is the public IP address of the subnet. Country - The country associated with the Connection Gateway. MAC Address - MAC address of the LAN card used to communicate with the KServer. DHCP Server - The IP address of the DHCP server used by this machine. DNS Server 1, 2 - IP address of the DNS servers assigned to the machine. Chassis Manufacturer - Manufacturer of the enclosure Chassis Type - Enclosure type Chassis Version - Enclosure version number Max Memory Slots - Total number of memory module slots available Chassis Serial Number - Serial number on the enclosure Chassis Asset Tag - Asset tag number on the enclosure 4. Motherboard Motherboard Manufacturer - Motherboard manufacturer Motherboard Product - Motherboard product ID Motherboard Version - Motherboard version number Motherboard Serial Num - Motherboard serial number External Bus Speed - Motherboard bus speed 5. CPU/RAM Information Processor Manufacturer - Processor manufacturer Processor Family - Processor type installed Processor Version - Processor version ID CPU Max Speed - Max processor speed supported CPU Current Speed - Speed processor is currently running at CPU - Processor make and model. Quantity - The number of CPUs. Speed - Clock speed of the processor. RAM - MBytes of RAM on the machine. Max Memory Size - Maximum memory size the motherboard can hold Max Memory Slots - Total number of memory module slots available. 6. Custom Fields: Displays custom fields and their values.

Chapter 3 - Sadjadi et al. 13 7. On Board Devices: Lists motherboard based devices (like video or ethernet). 8. Port Connectors: Lists all the connections available on the chassis. 9. Memory Devices: Lists memory modules installed on the motherboard. 10. System Slots: Displays the status of each available card slot. 3.3.3 Installed Applications The Installed Applications page lists all applications found during the latest audit for a selected machine ID. The list of machine IDs you can select depends on the machine ID / group ID filter. This table supports selectable columns, column sorting, column filtering and flexible columns widths. Select a Machine Select a machine in the middle panel to display data for that machine. When more rows of data are selected than can be displayed on a single page, click the and buttons to display the previous and next page. The drop-down list alphabetically lists the first record of each page of data using the sort order of the selected column on that page. Fig 3.7 below shows the generic view of the Installed Applications page. The options available on this page are listed and explained below. Fig 3.7: Installed Applications 1. Application: The filename of the application. 2. Description: A brief description of the application as reported in the Properties dialog box of the executable file. 3. Version: The version number of the application. 4. Manufacturer: The manufacturer of the application. 5. Product Name: The product name of the application.

14 Chapter 3 - Sadjadi et al. 6. Directory Path: The absolute directory path where the application file is located. 7. File Size: The size, in kilobytes, of the application file. 8. Last Modified: The modification date of the application file. 3.3.4 Add/Remove The Add/Remove page displays the programs listed in the Add or Remove Programs window of the managed machine. Information shown on this page is collected when a Latest is performed. Click a machine ID to display data for that selected machine. The list of machine IDs you can select depends on the machine ID / group ID filter. Select a Machine Select a machine in the middle panel to display data for that machine. When more rows of data are selected than can be displayed on a single page, click the and buttons to display the previous and next page. The drop-down list alphabetically lists the first record of each page of data using the sort order of the selected column on that page. Fig 3.8 below shows the generic view of the Add/Remove page. The options available on this page are listed and explained below. Fig 3.8: Add/ Remove page 1. Application Name: The name of the application. 2. Uninstall String: The uninstall string in the registry used to uninstall this application.

Chapter 3 - Sadjadi et al. 15 3.3.5 Software Licenses The Software Licenses page displays all software licenses found for a selected machine ID. The list of machine IDs displayed depends on the Machine ID / Group ID filter and machine groups the user is authorized to see using System > User Security >Scopes. Information shown on this page is collected when a Latest is performed. Each vendor stores an application s license key differently so all application software licenses may not be collected. Duplicate License Keys Duplicate license keys found on more than one machine display in red text. Clicking the number link next to the title of a duplicate license lists the machine IDs using the duplicate license. Fig 3.9 below shows the generic view of the Software Licenses page. The options available on this page are listed and explained below. Fig 3.9: Software Licenses page 1. Publisher: The software publisher of the application (e.g. Microsoft). 2. Title: The name of the application. 3. Product Key: The product key used to activate the application during installation. 4. License: The license code associated with the application. 5. Version: The version of the application. 6. Date: The version release date.

16 Chapter 3 - Sadjadi et al. 3.3.6 Documents The Documents page stores files associated with a machine ID. For example, you can upload scanned copies of purchase receipts, contract information, and configuration notes specific to a machine ID. Uploaded documents are stored in the User Profiles directory of the KServer. Note: Documents are not included in the backup of the KServer database using System > Configure. A separate backup of KServer files and directories should be performed as well. To Store a Document 1. Click a machine.group ID link. The list of machine IDs you can select depends on the machine ID / group ID filter. Documents previously stored on the KServer for this machine ID display or else No files found displays. 2. Click Browse to locate a file on your local computer or LAN. 3. Click Upload to upload the file to the KServer. The added Filename displays, along with its file Size and the date/time of the Last Upload. Fig 3.10 below shows the generic view of the Documents page. The options available on this page are listed and explained below. Fig 3.10: Documents page 1. New Folder: Optionally click the New Folder icon and link to create a new folder to store documents in for the selected managed machine. 2. Edit: You can click a Filename link or edit icon to display a file or run the file, depending on the application the filename extension is associated with on your local machine. 3. Delete: Click the delete icon to delete a stored document or folder from the KServer.

Chapter 3 - Sadjadi et al. 17