360
© 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and agreements, hardware and software warranty, hardware replacement, product returns, technical support terms and product licensing is in the Dell KACE End User License agreement accessible at http://www.kace.com/license/standard_eula Dell KACE K1000 Management Appliance Administrator Guide Release 5.3 Revision Date: May 16, 2011

Dell KACE K1000 Admin Guide

Embed Size (px)

Citation preview

Page 1: Dell KACE K1000 Admin Guide

© 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and agreements, hardware and software warranty, hardware replacement, product returns, technical support terms and product licensing is in the Dell KACE End User License agreement accessible at http://www.kace.com/license/standard_eula

Dell KACE K1000 Management Appliance

Administrator Guide

Release 5.3

Revision Date: May 16, 2011

Page 2: Dell KACE K1000 Admin Guide
Page 3: Dell KACE K1000 Admin Guide

Contents

1 Getting Started 15About this guide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

About this chapter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

Understanding the KACE K1000 Appliance components . . . . . . . . . . . . . . . . . . . . . . . . . . 15Hardware specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Software deployment components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17

To set up your K1000 Management Appliance server . . . . . . . . . . . . . . . . . . . . . . . . . 18

DNS Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Configuring network settings from the console. . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

Logging in to the Administrative Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Using the KACE K1000 Appliance components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

Using Home. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23Guided Tours . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

Client Check-In Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Distributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

Software Threat Level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

License Compliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

Clients Connected . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Managed Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

Tasks in Progress. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

To view the Summary Details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28

To Find Your Software Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30Updating Your Appliance Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

To upgrade software without using Organizational Management . . . . . . . . . . . . . 32

To upgrade software for Organizational Management users . . . . . . . . . . . . . . . . . 32 Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

What’s Next . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

2 Configuring your Appliance 35Key configuration settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

To configure general settings for the server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

To configure general settings for your organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37List of open ports required . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Configuring Network Settings for the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40To configure the Network Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Configuring Local Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42To configure Local Routing Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

Configuring Local HTTPD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42To configure Local HTTPD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43

Configuring Security Settings for the Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44To configure Security Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

To generate an SSL Certificate. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45

Configuring Agent Messaging Protocol Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47To configure Agent Messaging Protocol Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Configuring date and time Settings of the appliance server . . . . . . . . . . . . . . . . . . . . . . . . 49

Administrator Guide, Version 5.3 3

Page 4: Dell KACE K1000 Admin Guide

Contents

To configure Date & Time settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Configuring Single Sign-on for multiple appliances . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

To enable linking of appliances for single sign-on . . . . . . . . . . . . . . . . . . . . . . . . . 50

To link appliances for single sign-on . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50

To disable appliance links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Troubleshooting Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51To access the K1000 Troubleshooting Tools page. . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

To use Network Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

3 Labels and Smart Labels 53About Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

Managing Labels. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Viewing Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

Viewing Computer Details by Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

To view label details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56

To add or edit a new label. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

To delete a label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

About Label Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

To view Label Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

To create a Label Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

To apply a label to a Label Group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

To delete a Label Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

About Smart Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60To create a Smart Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

To edit a Smart Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61

To change the Smart Label Run Order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

What’s Next . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

4 Agent Provisioning 65Overview of first time Agent provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

System requirements for Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66

Preparing to provision the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67Enabling file sharing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Preparing for Windows Platform provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Single Machine Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68To deploy the Agent on a single machine. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Advanced Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69Overview of Advanced Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

To use Advanced Provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69

To provision Windows platforms. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71

To provision Unix (Linux or Mac OS X) platforms . . . . . . . . . . . . . . . . . . . . . . . . . 72

To schedule Agent provisioning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72

Using the Provisioned Configurations page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73Accessing the Provisioned Configurations page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

To create a new configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

4 Administrator Guide, Version 5.3

Page 5: Dell KACE K1000 Admin Guide

Contents

To edit a configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

To run configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

To duplicate a configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

To delete a configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74

Using the Provisioning Results Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75To view Provisioning Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

Managing K1000 Agent Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76

K1000 Agent Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77To configure an Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77

K1000 Agent Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78Overview of Agent Updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

To download a patch Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

To update the Agent automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79

AMP Message Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80To view AMP Message Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

To delete a message queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

5 Managing Software and Hardware Inventories 83Inventory Feature Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Managing Your Computer Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84Searching for Computers in Your Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Using Advanced Search for Computer Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . 85

To specify advanced search criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Creating Smart Labels for Computer Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Searching for Computers by Creating Computer Notifications. . . . . . . . . . . . . . . . 86

Filtering Computers by Organizational Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87Using the Computer Inventory Detail Page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

Appliance Agent Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Adding Computers to Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Adding Computers Automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Adding Computers Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

Managing Your Software Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91Using Advanced Search for Software Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

To specify advanced search criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92Adding Software to Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

Adding software automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92

To add software to Inventory manually. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93To create software assets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

Custom Data Fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94Attaching a Digital Asset to a Software Item. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

To attach a digital asset to a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95

To delete a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

To apply a label to a software item. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

To remove a label from a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

To categorize a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

To set threat level to a software item . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Administrator Guide, Version 5.3 5

Page 6: Dell KACE K1000 Admin Guide

Contents

Managing Your Processes Inventory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

To view process details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

To delete a process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

To disallow processes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

To apply a label to a process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

To remove a label from a process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

To categorize a process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

To set threat level to a process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

To meter a process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

Managing Your Startup Program Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100To view Startup detail information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

To delete a startup program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101To apply a label to a startup program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

To remove a label from a startup program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

To categorize a startup program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101To set threat level to a startup program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

Managing Your Service Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102To view service detail information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102

To delete a service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

To apply a label to a service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

To remove a label from a service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

To categorize a service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

To set a threat level to a service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Managing Your MIA (Out-Of-Reach Computer) Inventory . . . . . . . . . . . . . . . . . . . . . . . . 104Configuring the MIA Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

To configure the MIA settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

To delete an MIA computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

To apply a label to an MIA computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

To create a new label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Using the AppDeploy Live Application Information Clearinghouse . . . . . . . . . . . . . . . . . . 106Enabling AppDeploy Live . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Viewing AppDeploy Live content . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

To view AppDeploy Live information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Using the Dell Warranty feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107To obtain Dell Warranty information on a single Dell machine instantly . . . . . . . . . . . 107

To renew Dell Warranty information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

To run Dell Warranty reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

6 Importing and Exporting Appliance Resources 111Importing and exporting resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

Transferring resources using a SAMBA share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111Export resources from one appliance to another using SAMBA shares . . . . . . . . . . . 112

Transferring resources between Organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115Exporting resources to Other Organizations on an appliance. . . . . . . . . . . . . . . . . . . 116

Importing resources from another organization on your appliance. . . . . . . . . . . . . . . 117

Import software components from another organization . . . . . . . . . . . . . . . . . . . 117

6 Administrator Guide, Version 5.3

Page 7: Dell KACE K1000 Admin Guide

Contents

7 Scanning for IP Addresses 119IP Scan Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

Viewing Scheduled Scans list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

About scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

To view scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

Creating an IP Scan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120To create an IP scan. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120

To search network scan results on the basis of status fields . . . . . . . . . . . . . . . . . . . 122

IP Scan Smart Label . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123

To dynamically identify the network scan results . . . . . . . . . . . . . . . . . . . . . . . . . 123

To edit the order value of IP Scan Smart Labels . . . . . . . . . . . . . . . . . . . . . . . . . 123

8 Distributing Software from Your K1000 Management Appliance 125Distribution Feature Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125

Types of Distribution Packages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126

To create a distribution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127Distributing packages from the appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127

Ensuring that Inventory item package names match . . . . . . . . . . . . . . . . . . . . . . 127Distributing Packages from an Alternate Location . . . . . . . . . . . . . . . . . . . . . . . . . . . 128

When to use a replication share or an alternate download location . . . . . . . . . . . . . . 128

Managed Installations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129Installation parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129

To determine supported parameters for the .msi file . . . . . . . . . . . . . . . . . . . . . . 129Creating a managed installation for the Windows platform. . . . . . . . . . . . . . . . . . . . . 130

To create a managed installation for Windows platforms. . . . . . . . . . . . . . . . . . . 130

Examples of common deployments on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133Standard MSI example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134

To create a managed installation for Windows platforms. . . . . . . . . . . . . . . . . . . 134Standard EXE Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

Standard ZIP Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137

To create a managed installation for a .zip file . . . . . . . . . . . . . . . . . . . . . . . . . . . 138

Examples of Common Deployments on Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139To create a managed installation for an .rpm file . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139

Standard TAR.GZ Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142

To create a managed installation for a tar.gz file . . . . . . . . . . . . . . . . . . . . . . . . . 142

Examples of Common Deployments on Mac OS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

File Synchronizations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143Creating a file synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143

To create a file synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144

Wake-on-LAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145Wake-on-LAN feature overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

Issuing a Wake-on-LAN request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

To issue a Wake-on-LAN request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146

To schedule a Wake-on-LAN request . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147Troubleshooting Wake-on-LAN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147

Replication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148

Administrator Guide, Version 5.3 7

Page 8: Dell KACE K1000 Admin Guide

Contents

Preparing to create a replication share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

To create a replication share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149

Working with your replication share . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

To view replication share details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152

Managing iPhone Profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153Before you use K1000 iPhone profile support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

To add an iPhone profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153

To Delete an iPhone profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

To Configure Collection Settings for iPhones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154

Managing Dell Systems with Dell Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155Understanding the Differences between Patching and Dell Updates . . . . . . . . . . . . . 156

Dell Client and Server Upgrade workflow . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156

Configuring Dell OpenManage Catalog Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158

9 Using the Scripting Features 161Scripting Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161

Order of downloading script dependencies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

Using the Appliance Default Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163

Creating and Editing Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164Token Replacement Variables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165

Adding Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

To add an Offline KScript or Online KScript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166

To add an Online Shell Script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170Editing Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

To edit a script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

To delete a script from the Scripts page. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172

To delete a script from the Scripts Edit page . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172Importing Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173

To import an existing script. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173To Duplicate an existing Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174

Using the Run Now function . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174To run scripts using the Run Now tab. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

Run Now from the Script Detail page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175

To use the Run Now function from the Scripts Lists Page . . . . . . . . . . . . . . . . . . 176Monitoring Run Now Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

Run Now Detail Page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176

Searching the Scripting Log Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177To search scripting logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177

About the Configuration Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178

Using the Windows-based Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179Enforce Registry Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

Remote Desktop Control Troubleshooter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 179

To troubleshoot remote behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180Enforce Desktop Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180

To create a policy to enforce Desktop Settings . . . . . . . . . . . . . . . . . . . . . . . . . . 180Desktop Shortcuts Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

8 Administrator Guide, Version 5.3

Page 9: Dell KACE K1000 Admin Guide

Contents

To create scripts to add shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181Event Log Reporter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181

To create an Event Log query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182MSI Installer Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182

To create the MSI Installer policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182UltraVNC Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184

Un-Installer Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

To create an uninstaller script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186Windows Automatic Update Settings policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186

To modify Windows Automatic Update settings . . . . . . . . . . . . . . . . . . . . . . . . . . 187

To start the Automatic Windows Update on a node . . . . . . . . . . . . . . . . . . . . . . . 188Power Management Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

About monitoring power use. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188

To configure Power Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189

Using the Mac OS Configuration-based Policies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189Enforce Power Management Settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 190

Enforce VNC Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

Enforce Active Directory Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192

10 Maintaining Your K1000 Management Appliance 195K1000 Management Appliance maintenance overview. . . . . . . . . . . . . . . . . . . . . . . . . . . 195

Upgrading your appliance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

To upgrade your K1000 Management Appliance . . . . . . . . . . . . . . . . . . . . . . . . . 196

Backing up K1000 Management Appliance data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196To run the appliance backup manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196

Downloading backup files to another location. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

To change backup file location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

To access the backup files through ftp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197

Restoring K1000 Management Appliance settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198Restoring from most recent backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

To restore from the most recent backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198Uploading files to restore settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198

To upload backup files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198Restoring to factory settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

To restore to factory settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

Updating K1000 Management Appliance software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199To verify the minimum server version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199

Updating the license key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200

Updating your Dell KACE K1000 Management Appliance license key . . . . . . . . 200Applying the server update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

To apply the server update. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

To verify the upgrade . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201Updating patch definitions from KACE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

To update the patch definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201

To delete patch files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

To Reboot and shut down KACE K1000 Appliances . . . . . . . . . . . . . . . . . . . . . . 202

Administrator Guide, Version 5.3 9

Page 10: Dell KACE K1000 Admin Guide

Contents

Updating OVAL definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202To update the OVAL and patch definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202

Troubleshooting K1000 Management Appliance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203Accessing K1000 Management Appliance logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203

Downloading log files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

To download Dell KACE K1000 Management Appliance logs . . . . . . . . . . . . . . . 204

Windows debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204To log on to the AMP service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204

Understanding Disk Status log data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206

11 LDAP 209About LDAP Labels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209

Creating an LDAP Label Manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210

Creating an LDAP Label with the Browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211

Using LDAP Easy Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213

Using the LDAP Browser Wizard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214To use the LDAP Browser Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214

Automatically Authenticating LDAP Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215To configure the appliance for user authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 215

To schedule a User Import . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218

12 Running the K1000 Appliance Reports 221Reporting Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221

Running Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222

Creating and Editing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223Report Layout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223

To create a new report using the Report Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225

To create a new SQL report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228

To edit an existing report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

To duplicate an existing report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

Scheduling Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229To create a report schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230

To select a report if starting from the Schedule icon . . . . . . . . . . . . . . . . . . . . . . 230

To select a report if starting from the Schedule Reports tab . . . . . . . . . . . . . . . . 230

To define email notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231

To schedule the time the report runs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232To delete a scheduled report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

Using Alert Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

To Create a Broadcast Alert Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233

E-mail Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234To create an e-mail Alert. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234

13 Using Organizational Management 237Overview of Organizational Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

Default Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

10 Administrator Guide, Version 5.3

Page 11: Dell KACE K1000 Admin Guide

Contents

Creating and editing Organizations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 237

To create an organization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238

To troubleshoot nodes that fail to show up in Inventory . . . . . . . . . . . . . . . . . . . . 239

To edit an organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241

To delete an organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242

Managing System Admin Console users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243To add a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243

To delete a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

To change the password. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244

Organizational Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245Default role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

Creating and editing Organizational Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245

To create a role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 246

To edit a role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247

To delete a role. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248

To duplicate a role . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248

Organizational Filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248Creating and Editing Organizational Filters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249

To add a data filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249

To add a LDAP filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250

To edit a filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251

To delete a filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252Advanced Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

To specify advanced search criteria . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252

Test and Organization Filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

To test an organization filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253

Refiltering Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253To refilter computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

Redirecting Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254To redirect computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

Understanding Computer Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254

A Administering Mac OS Nodes 259Mac OS Inventory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259

Distributing Software to Mac OS Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260Examples of Common Deployments on Mac OS® . . . . . . . . . . . . . . . . . . . . . . . . . . . 260

To create a managed installation for Mac OS nodes . . . . . . . . . . . . . . . . . . . . . . 260

Patching Mac OS Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263

B Adding Steps to a Script 265Adding Steps to Task Sections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

Steps for Windows Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265

Steps for Mac OS X Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269

Steps for Red Hat Enterprise Linux Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271

Administrator Guide, Version 5.3 11

Page 12: Dell KACE K1000 Admin Guide

Contents

C Writing Custom Inventory Rules 273Understanding Custom Inventory Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

Creating a Custom Inventory rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273

How Custom Inventory Rules are implemented . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274

Understanding rule syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

Function syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

Argument syntax. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275

Checking for conditions (Conditional rules) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 276Conditional rule reference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277

Verifying if a Condition exists (Exists rules) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 279

Evaluating node settings (Equals rules) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280

Comparing node values (Greater and Less Than rules) . . . . . . . . . . . . . . . . . . . 281Testing for multiple conditions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282

Checking for multiple true conditions (AND). . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282

Checking for one true condition (OR) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283

Getting values from a node (Custom Inventory Field) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283Value Return rule reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284

Getting File Information values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284

Getting Registry key values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

Getting command output. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285

Getting PLIST values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

Getting multiple values . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286

Matching file names with Regular Expressions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287Understanding Regular Expressions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287

Regular Expression Rule Reference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

Defining rule arguments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289

Finding a path or file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

Finding a registry key and entry . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

Specifying a version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

Specifying environment or user variables. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

Specifying a file attribute . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

Using Windows file attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290

Testing for Linux and Mac file attributes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292

Specifying the datatype . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

Specifying values to test. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

Specifying the name of a registry entry (Windows only). . . . . . . . . . . . . . . . . . . . 293

Specifying a PLIST key (Mac only). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

Using a regular expression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293

Defining commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294

D Database Tables 295K1000 Management Appliance Database Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295

12 Administrator Guide, Version 5.3

Page 13: Dell KACE K1000 Admin Guide

Contents

E Manually Deploying Agents 301Overview of manual deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

Updating the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301

Resources for troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302

Manually installing the Agent on Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302To manually install the Agent on Windows using the Install wizard . . . . . . . . . . . . . . 302

To manually install the Agent on Windows using command lines. . . . . . . . . . . . . . . . 303

Windows security issues. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304

Windows debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304

Installing and Configuring the Agent on Linux . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305To install the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305

To install from startup or login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305

To upgrade the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

To start and stop the Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

To manually remove the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

Other Agent operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

To check that the Agent is running . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306

To check the version of the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

To run an Inventory check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307Linux Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307

To Install and Configure the Agent on Mac OS Nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . 308To install or upgrade the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

To start or stop the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

To manually remove the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308

Other Agent operations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

To check that the Agent is running . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

To check the version of the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

To run an Inventory check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309Macintosh Debugging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309

Using shell scripts to install the Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310

Information collected by the Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310To access the Computers : Detail page . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311

F Understanding the Daily Run Output 315

G K1000 Classic Reports 321Reporting Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321

Running Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322

Creating and Editing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322To create a new report using the table presentation type. . . . . . . . . . . . . . . . . . . . . . 322

To create a new report using the chart presentation type . . . . . . . . . . . . . . . . . . 324

To duplicate an existing report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

To create a new report from scratch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326

To edit a report using SQL Editor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327

Administrator Guide, Version 5.3 13

Page 14: Dell KACE K1000 Admin Guide

Contents

Scheduling Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328To create a report schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328

To run a schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

To delete a schedule. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329

H Warranty, Licensing, and Support 331Warranty And Support Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

Third Party Software Notice. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331Apache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331

EZ GPO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334

FreeBSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335

Preamble . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335Knoppix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339

NO WARRANTY. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343Microsoft Windows . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344

OpenSSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344

OpenSSL License. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344

Original SSLeay License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 345PHP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346

Samba. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347

Preamble . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348Sendmail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352

Index 355

14 Administrator Guide, Version 5.3

Page 15: Dell KACE K1000 Admin Guide

1

Getting Started

This chapter starts with an overview of this guide and the Dell KACE K1000 Management Appliance interface components. The chapter then explains how to install and set up your K1000, and finally it provides an overview of the K1000 Management Appliance Administrator Console Home page features.

• About this guide, on page 15.

• About this chapter, on page 15.

• Understanding the KACE K1000 Appliance components, on page 15.

• Using the KACE K1000 Appliance components, on page 21.

• Using Home, on page 24.

• What’s Next, on page 34.

About this guideThis guide explains how to install, set up, configure, and use the Dell KACE K1000 Management Appliance.

About this chapterThis chapter explains how to install and set up your K1000 Management Appliance, from unpacking the appliance to Initial Konfiguration. When finished, you will see the Administrator Portal appliance, the Web page from which you configure and use your appliance. At that point, this chapter provides an overview of the Administrator Portal. Before you can use your appliance, you need to configure it.

This section provides an introduction to your appliance and an overview of the total system management workflow.

This section also lists the basic administrative procedures and the best practices for system management.

Understanding the KACE K1000 Appliance components

Your appliance includes the following components:

Administrator Guide, Version 5.3 15

Page 16: Dell KACE K1000 Admin Guide

1 Getting Started

1. Administrator Console—This is used by administrators to control the K1000 Management Appliance. It is accessible by browsing to http://k1000_hostname/admin. This portal is a Web-based interface to access and direct the functionality and capabilities within your company. The Administrator Console provides access to the following components:

• Inventory Management

• Software Distribution

• Reporting

• K1000 Settings

• Asset Management

• Scripting

• Security

• Service Desk

• Settings

• Virtual Kontainers

2. System Console—This is an interface designed primarily to enforce the policies across organizations.

3. Agent—This is the K1000 Management Appliance technology that sits on each desktop that the appliance manages. It includes an application component that manages downloads, installations, and desktop inventory. The agent also includes the Agent Management Service appliance that initiates scheduled tasks such as inventory or software updates.

4. Service Desk—This makes software titles available to users on a self-service basis. The Service Desk does not replace traditional push software distribution (as is handled by the Administrator Console and the agent). You can change or customize the Service Desk name.

The Service Desk provides:

• A repository for software titles that are not required for all users.

• A way for users to submit and track Service Desk (or Service Desk tickets).

• Assistance for users in routine tasks, such as software installation and getting help from the Knowledge Base.

Service Desk is accessible by browsing to http://k1000_hostname.

16 Administrator Guide, Version 5.3

Page 17: Dell KACE K1000 Admin Guide

Getting Started1

Hardware specificationsThe K1000 Management Appliance include a high-performance server with the following hardware configuration:

Software deployment componentsThis section describes the packages that can be deployed by the server on the agents. The K1000 Management Appliance supports several types of distribution packages, and this section lists the components used for the deployment of packages:

• Managed Installations can be configured by the administrator to run silently or with user interaction. Within a “Managed Installation Definition,” the administrator can define install, uninstall, or command-line parameters. See Managed Installations, on page 129 for more information.

• File Synchronization is another way to distribute content to computers with the agent software. Unlike Managed Installations, File Synchronization is used to distribute files that need to be copied to a user’s machine without running an installer. See File Synchronizations, on page 143 for more information.

• Service Desk Packages are ear-marked by administrators for user self-service. Many Dell customers use the portal for handling occasional user applications, print drivers, and so on. You also can use the Service Desk to resolve installation issues by allowing users to download and install fixes. See the Service Desk Administrator Guide for detailed information.

Hardware K1100 K1200

Form Factor 1U Rack mount chassis 1U Rack mount chassis

Dimensions

Height 4.26cm (1.7in) 4.26cm (1.7in)

Width 48.24cm (19in) (includes rack latches)

48.24cm (19in) (includes rack latches)

Depth 77.2cm (30.4in) (includes PSU handles & bezel)

77.2cm (30.4in) (includes PSU handles & bezel)

Model PowerEdge R610 PowerEdge R610

CPU (Quantity/Core) 2/4 Intel® Xeon®, 2.4 GHz 2 /4 Intel® Xeon®, 2.66GHz

RAM 6GB 12GB

RAID Level 5 5

Number of Disks 3 5

Storage 215GB 550GB

Ethernet Ports Quad Gigabit Quad Gigabit

Power Supply Energy Smart 520 Watts, 100 - 240 VAC

Dual Redundant, Energy Smart 520 Watts, 100 - 240 VAC

Administrator Guide, Version 5.3 17

Page 18: Dell KACE K1000 Admin Guide

1 Getting Started

• Agent is a special tab to manage the appliance agent. See Chapter 4: Agent Provisioning, starting on page 65, for details on how to configure and perform these tasks.

• MSI Installer Wizard creates a policy and helps you set the basic command line arguments for running MSI-based installers. The wizard generates a script used for installing or removing the software. See MSI Installer Wizard, on page 182, for more details.

The package types are mostly setup.msi or setup.exe files.

The sections that follow describe how to configure the K1000 Management Appliance to meet the needs of your company.

To set up your K1000 Management Appliance serverThis section describes how to set up the K1000 Management Appliance after the appliance has been properly installed in its rack.

DNS ConsiderationsThe K1000 Management Appliance requires its own unique static IP address. By default, its hostname is kbox. Whatever name you use, it should be specified in the appropriate “A” record created in your internal Domain Name System (DNS) server. An “MX” record containing the hostname defined by the “A” record is required so that the users can e-mail tickets to the Service Desk. A Split DNS is required if the appliance is connected to the Internet using a reverse proxy or by being placed in the DMZ (Demilitarized Zone or Screened Subnet). A DMZ adds an additional layer of security to a LAN (Local Area Network).

Configuring network settings from the console1. To access the console, connect a monitor and keyboard directly to the appliance, but do

not connect a network cable at this time.

2. Power on the appliance.

3. At the login prompt, enter:

Login ID: konfig

Password: konfig

The appliance requires 5 to 10 minutes to start up for the first time.

18 Administrator Guide, Version 5.3

Page 19: Dell KACE K1000 Admin Guide

Getting Started1

Modify the following settings using the Up and Down arrow keys to move between fields.

4. Press the Down arrow to move the cursor to Save, and then press Enter or Return.

The appliance restarts.

5. While your appliance reboots, connect an Ethernet cable into the port labeled “Gb 1” and to a switch on your network.

Logging in to the Administrative ConsoleAfter the basic network configuration is complete, you can log in to the Administrative Console from any computer on the Local Area Network (LAN) using a Web browser.

1. Open a Web browser.

2. Enter the appliance Administrative Console URL:

Field Description

K1000 (DNS) Hostname

Enter the host name of the appliance. The default setting is kbox.

K1000 Web Server Name

(Recommended) Enter the fully qualified domain name (FQDN) of the appliance on your network. This is the value of Hostname concatenated with Domain (for example, appliance.kace.com).Clients connect to the K1000 using the Web Server Name. We recommend adding a DNS host record matching the K1000 Web Server Name chosen during this setup.

Static IP Address

(Required) Enter the IP address of the appliance server.

Domain Enter the domain on which the appliance is running.

Subnet Mask Enter your subnet mask.

Default gateway

Enter the network gateway for the appliance server.

Primary DNS Enter the IP address of the primary DNS server the appliance uses to resolve host names.

Secondary DNS

Enter the IP address of the secondary DNS server, if needed.

Network Speed

User the Right arrow key to select from the available speeds if you need to change the default.

SMTP Server To enable email notifications, specify an SMTP server, enclosing the IP address with square brackets [].

SSH Enabled Permits console access to the K1000. Use the Right arrow key to enable.

Proxy... Enter any necessary proxy information.

Administrator Guide, Version 5.3 19

Page 20: Dell KACE K1000 Admin Guide

1 Getting Started

http://k1000_hostname/admin

The Initial Konfiguration page appears.

3. Enter the license key (including dashes) that you in received in the welcome email from Dell KACE.

If you cannot find your license key, contact Dell KACE Customer Support at www.kace.com/support.

4. Enter a secure and unique password for the admin account.

5. Enter the name of your company or organization.

6. Select the timezone for your K1000 location.

7. Click Apply Settings and Reboot.

The appliance restarts.

8. When the appliance has restarted, refresh the browser page.

9. After accepting the EULA, log in using the username “admin” and the password you chose.

You are now ready to start using the Administrator Interface. The following sections explain the various K1000 Management Appliance feature components.

You can restore the factory settings of the appliance. For more information, refer to Restoring to factory settings, on page 199.

20 Administrator Guide, Version 5.3

Page 21: Dell KACE K1000 Admin Guide

Getting Started1

Using the KACE K1000 Appliance componentsDepending upon your options, the following components are available on your appliance:

The components are described in the following table:

Component Sub-tabs Used to...

Home • Guided Tour

• Summary

• Label

• Search

Manage labels, which are a method for grouping machines, software, people, and so on. You can also have labels dynamically assigned by using “Smart Labels.” Provide overview statistics of your running processes. Also, includes guided tours for learning more about your K1000 Management Appliance.

Inventory • Computers

• Software

• Processes

• Startup

• Service

• IP Scan

• MIA

Administer the hardware and software managed by your appliance.

Virtual Kontainers • Management

• Deployment

• Creation

• Administration

Create virtual versions of supported applications, and deploy and run them on the nodes you administer from the Dell KACE K1000 Management Appliance. For more information, see the Virtual Kontainer User’s Guide.

Asset • Assets

• Asset Types

• Asset Import

• Metering

Track computers and other physical assets, such as software, printers, and so on. Also used to:

• Determine software compliance.

• Establish relationships between assets (using logical assets).

• Meter actual software usage.For more information, see the Asset Management Guide.

Administrator Guide, Version 5.3 21

Page 22: Dell KACE K1000 Admin Guide

1 Getting Started

Distribution • Managed Installation

• File Synchronization

• Wake-on-LAN

• Replication

• iPhone

• Dell Updates

Remote software distribution and administration, including iPhones and Dell OpenManage updates.

Scripting • Scripts

• Run Now

• Run Now Status

• Search Logs

• Configuration Policy

• Security Policy

Automate system administration tasks.

Security • Patching

• OVAL Assessment

• SCAP Scan

• Secure Browsers

Reduce the risks from malware, spyware, and viruses. For more information about patching and security, see Patching and Security Guide.

Help Desk • Tickets

• Software Library

• Knowledge Base

• Users

• Roles

• Configuration

Provide a repository for software resources and documentation for your users to access and download. Provides a full-featured service desk system for creating and tracking Service Desk tickets.

Reporting • Reports

• Classic Reports

• Schedule Reports

• Alerts

• Email Alerts

Run pre-packaged reports and report-creating tools to monitor your appliance implementation.

Component Sub-tabs Used to...

22 Administrator Guide, Version 5.3

Page 23: Dell KACE K1000 Admin Guide

Getting Started1

Using HomeThe Home component includes tabs for:

• Guided Tours, on page 24

• Summary, on page 24

• Label, on page 33

• Search, on page 34

Guided ToursThe Guided Tours are tutorials that help you learn more about the KACE K1000 Management Appliance by walking you through some of basic tasks. The Guided Tours supplement, but do not replace, Boot Kamp and documentation.

SummaryThe K1000 Summary page provides information about the configuration and operation of your appliance. When you log on to the Administrator Console, the Home component displaying the Summary tab appears by default.

Settings • Control Panel

• K1000 Agent

• Resources

• Support

Administer your appliance implementation.

Organization (Organizational Management)

N/A Divide your appliance implementation into different logical organizations that you administer separately.

Global Search N/A Search your appliance for terms you enter.

Component Sub-tabs Used to...

Administrator Guide, Version 5.3 23

Page 24: Dell KACE K1000 Admin Guide

1 Getting Started

The top of the K1000 Summary page provides updated news and popular FAQ information about your Dell KACE K1000 Management Appliance:

Below the Summary are dashboard meters and graphs to give you a quick view of your appliance status:.

The scales on the Summary page gauges adjust automatically.

24 Administrator Guide, Version 5.3

Page 25: Dell KACE K1000 Admin Guide

Getting Started1

Client Check-In RateDisplays the total number of clients that have checked into the server in the past 60 minutes.

DistributionsDisplays the number of managed installations, scripts, and file synchronizations that are enabled. This also displays the number of alerts that you have configured.

Administrator Guide, Version 5.3 25

Page 26: Dell KACE K1000 Admin Guide

1 Getting Started

Software Threat LevelDisplays the various threat levels for software installed on various machines.

License ComplianceDisplays the number of machines that use a particular licensed software. For example, the following figure displays a licensed software Adobe flash player 9, which can be installed on 1000 machines. In this example, this software is used by 12 machines.

This display can use different colors for license types that are ignored (for example, freeware) and licenses that are approaching or at 100% usage. For general information about assets and license compliance, see Asset Management Guide. To change this configuration, see To configure general settings for the server, on page 35.

26 Administrator Guide, Version 5.3

Page 27: Dell KACE K1000 Admin Guide

Getting Started1

Clients ConnectedDisplays the percentage of clients connected to the server.

Managed Operating SystemsDisplays the various operating systems present in the inventory by percentage as a pie chart.

Administrator Guide, Version 5.3 27

Page 28: Dell KACE K1000 Admin Guide

1 Getting Started

Tasks in Progress Displays the total number of tasks in progress on the server.

To view the Summary Details

1. Click Home > Summary.

The Summary page appears.

2. Scroll down, and then select the View Details button at the bottom of the page:

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

28 Administrator Guide, Version 5.3

Page 29: Dell KACE K1000 Admin Guide

Getting Started1

The K1000 Summary Details page appears:

The following sections describe summary details sections. Each organization has its own summary details.

Summary Section Description

Computer Statistics The computers on your network, including a breakdown of the operating systems in use. In addition, if the number of computers on your network exceeds the number allowed by your Dell KACE K1000 Management Appliance license key, you are notified of it here.

Software Statistics The software in Inventory. A summary of the number of software titles that have been uploaded to the Dell KACE K1000 Management Appliance.

Software Distribution Summary

The packages that have been distributed to the computers on your network, separated out by distribution method. The summary also indicates the number of packages that are enabled and disabled.

Administrator Guide, Version 5.3 29

Page 30: Dell KACE K1000 Admin Guide

1 Getting Started

To Find Your Software VersionThe About K1000 link in the lower-left side of the K1000 Management Appliance page brings up KACE software information including:

• The software revision level.

Alert Summary The alerts that have been distributed to the computers on your network, separated by message type. This also indicates the number of alerts that are active and expired.The IT Advisory refers to the number of Knowledge Base articles in Service Desk.

Patch Bulletin Information

The patches received from Microsoft, Apple, and so on. The summary includes the date and time of the last patch (successful and attempted), total patches, and total packages downloaded.

OVAL Information The OVAL definitions received and the number of vulnerabilities detected on clients in your network. The summary includes the date and time of the last OVAL download (successful and attempted) and the number of OVAL tests in the appliance, in addition to the numbers of computers scanned.

Network Scan Summary

The results of the Network Scans that have run on the network, including the number of IP addresses scanned, number of services discovered, number of devices discovered, and number of detected devices that are SNMP-enabled.

Summary Section Description

As this page is refreshed, the record count information is refreshed. New K1000 Management Appliance installations mostly contain zero or no record counts.

30 Administrator Guide, Version 5.3

Page 31: Dell KACE K1000 Admin Guide

Getting Started1

• A list of all of the appliance components that are running:

Updating Your Appliance SoftwareYour K1000 Management Appliance checks in with the servers at Dell KACE daily to find out if more recent appliance software is available. If a software update is available, an alert like this one is displayed on the Home page the next time you log in as Administrator:

This section explains how to accept the latest appliance server upgrade.

Administrator Guide, Version 5.3 31

Page 32: Dell KACE K1000 Admin Guide

1 Getting Started

For details on how to find your current appliance version, see To Find Your Software Version, on page 31.

To upgrade software without using Organizational Management

1. Click K1000 Settings > Server Maintenance.

The K1000 Server Maintenance page appears.

2. Click Edit Mode at the top left of the page.

3. Click the Check for upgrade button.

The Logs tab displays the latest updated files from Dell.

To upgrade software for Organizational Management users

1. Click K1000 Settings > Server Maintenance.

The K1000 Server Maintenance page appears.

2. Click Edit Mode at the top left of the page.

3. Click the Check for upgrade button.

4. The Logs tab displays the latest updated files from Dell.

Label

You can find the Label tab by going to Home > Label. However, you can also create labels and smart labels within the other components of the Dell KACE K1000 Management Appliance that use labels.

• Labels—Provide ad-hoc organization of users, computers, software, managed installations, and more according to your needs. For information on labels see, About Labels, on page 53.

• Smart Labels—Enable you to dynamically group users, computers, software, and more, by organization, based on saved criteria. Smart Labels work much like Search Folders in Outlook or Smart Folders in Mac OS X. For information, see About Smart Labels, on page 60.

• LDAP Labels—Automatic labeling based on LDAP or Active Directory lookup. See About LDAP Labels on page 209.

To perform these steps, be sure to select System in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select System in the Organization drop-down list in the top-right hand corner of the page.

To find these tabs, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

32 Administrator Guide, Version 5.3

Page 33: Dell KACE K1000 Admin Guide

Getting Started1

• LDAP Browser—Automatically discover information via the agent or to interface with Active Directory or LDAP organizational units. See Creating an LDAP Label with the Browser, on page 211.

SearchYou can perform a global search for terms throughout the appliance using the Search tab.

What’s NextNow that your appliance is installed and running, you need to configure it to fit your company’s needs.

For the rest of the setup instructions, see Chapter 2: Configuring your Appliance, starting on page 35.

Administrator Guide, Version 5.3 33

Page 34: Dell KACE K1000 Admin Guide

1 Getting Started

34 Administrator Guide, Version 5.3

Page 35: Dell KACE K1000 Admin Guide

2

Configuring your Appliance

This chapter explains the configuration settings necessary to set up and use your Dell KACE K1000 Management Appliance.

• To configure general settings for the server, on page 35.

• Configuring Network Settings for the Server, on page 40.

• Configuring Local Routing Tables, on page 42.

• Configuring Local HTTPD, on page 42.

• Configuring Agent Messaging Protocol Settings, on page 47.

• Configuring date and time Settings of the appliance server, on page 49.

• Configuring Single Sign-on for multiple appliances, on page 49.

• Troubleshooting Tools, on page 51.

Key configuration settingsIt is important to properly configure the server settings on the agent before you begin inventorying and actively managing the software on your network. For details on agent connection settings, refer to Chapter 4: Agent Provisioning, starting on page 65.

To configure general settings for the server

1. Click K1000 Settings > Control Panel.

2. Click General Settings.

The General Settings page appears.

3. Click Edit Mode to edit the field values.

4. Enter the following settings:

To access some settings, you need to select System on the Organization drop-down list in the top-right hand corner of the page.

Company-Institution Name

Enter the name of your company. This name appears in every pop-up window or alerts displayed to your users. For example, Dell.

Administrator Guide, Version 5.3 35

Page 36: Dell KACE K1000 Admin Guide

2 Configuring your Appliance

5. Specify the following Agent-Server Task settings:

To access these settings, select System on the Organization drop-down list.

User Email Suffix

Enter the domain to which your users send email. For example, dell.com.

System Administrator Email

Enter the email address of the appliance administrator.This address receives system-related alerts, including any critical messages.

Login Organization Drop-down

Select the check box to enable the Login Organization drop-down.By enabling the Login Organization drop-down, the empty Organization: field on the Welcome login page will be replaced by a drop-down of the configured organizations. For information about Organizational Management, see Chapter 13: Using Organizational Management, starting on page 237.Note: The organization field or drop-down only appears if more than one organization is configured.

Organization Fast Switching

Select the check box to enable Organization Fast Switching.By enabling Organization Fast Switching, the static Organization: field at the top right corner of every page is replaced with a drop-down of organizations to which the user has access.Only those organizations that have the same user name and password appear in the drop-down. For information about Organizational Management, see Chapter 13: Using Organizational Management, starting on page 237.

Send to Dell KACE

Crash reports (Recommended) Select this check box to send reports of any agent crashes to Dell KACE. Server crashes areautomatically reported.This option is recommended because it provides additional information to the Dell KACE Technical Support team in case you need assistance.

Enable AppDeploy Live!

Select the check box to enable your appliance to share data with the AppDeploy Live! web site.

Session Timeout:

Set the number of inactive hours to allow all users before closing their session and requiring another login. The default is 1. Service Desk windows have Timeout Session counters to alert users of this time limit. This time limit only counts periods of inactivity. Users restart this timer with any action that causes the appliance interface to interact with the appliance server (refresh a window, save changes, change windows, etc.). If the session times out, any unsaved changes are lost, and the users is presented with the login screen again.

Current K1000 Load Average

The value in the field depicts the load on an appliance server at any given point of time. For the server to run normally, the value in this field must be between 0.0 and 10.0.

Last Task Throughput Update

This value indicates the date and time when the appliance Task Throughput was last updated.

36 Administrator Guide, Version 5.3

Page 37: Dell KACE K1000 Admin Guide

Configuring your Appliance2

6. Specify the following User Portal settings if required to customize the User Portal page:

7. Click Set Options, to save your changes.

8. Specify the following Logo Override settings to use your custom logo:

a. Click Edit Mode to edit the field values:

b. Click Upload Logo.

To configure general settings for your organization

1. Click Settings > Control Panel.

2. Click General Settings.

The General Settings page appears.

3. Click Edit Mode to edit the field values.

4. Specify the following Logo Override settings to use your custom logo:

K1000 Task Throughput

At any given point, the appliance has multiple tasks scheduled like Inventory Updates, Scripting Updates, patching updated and execution of scripts. The value in this field decides how the scheduled multiple tasks are balanced by the appliance.Note: The value of the task throughput can be increased only if the value in the field Current K1000 Appliance load Average is not more than 10.0 and the Last throughput update time is more than 15 minutes.

Portal Title Enter a title for the User Portal page.

Portal Text Enter a description of the User Portal page.

iPhone Portal Title

Enter a title for the user portal page when accessed through an iPhone.

iPhone Portal Text

Enter a description of the User Portal page when accessed through an iPhone.

Login User Portal (.jpg)

Displays on the User Portal login page.

Custom Report Logo (.jpg)

Displayed at the top of reports generated by the appliance.The report image dimensions are 120x32 pixels, which are specified in the auto-generated XML layout. You can adjust the xml report if you need a different layout size.

To access the next set of settings, you need to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 37

Page 38: Dell KACE K1000 Admin Guide

2 Configuring your Appliance

a. Click Edit Mode to edit the field values:

5. Click Upload Logo.

6. Machine Actions allow setting up of a scripted action that you can perform against individual machines in your environment. They are used to connect to machines remotely, so you can access or execute a specified task on the target machine directly from the user interface. You can configure two actions by selecting them from the Action Item menu. The actions can execute two different tasks.

The default Machine Action is mstsc.exe (Remote Desktop Connection).

Under the Machine Actions section, associate the appropriate actions and then click Set Actions.

For example:

• Select ping.exe -t KACE_HOST_IP from the Action #1 drop-down.

• Specify http://KACE_HOST_IP in command line field for Action #2 .

• Click Set Actions.

• Click Inventory > Computers.

Click next to the target machine IP to ping the machine and click next to the target machine IP to launch a web browser. The appliance substitutes the KACE_HOST_IP variable with the target machine IP address and open a new browser window with that URL.

There are 16 pre-programmed actions available. The Machine Actions can also be programmed for other tasks. If the machine action does not include the string .exe, then your appliance assumes it as a URL, and opens a new browser window for it.

User Portal (.jpg)

Displayed at the top of the User Portal page.

• 224x50 pixels is the normal size.

• 104x50 pixels is shorter and doesn't clip the blue highlight around the Log Out link.

• 300x75 pixels is maximum size that does not impact the layout.

Report (.jpg) Displayed at the top of reports generated by the appliance.The report image dimensions are 120x32 pixels, which are specified in the auto-generated XML layout. You can adjust the xml report if you need a different layout size.

KBOXClient (.bmp)

Displayed in the agent. The client bmp image is scaled to 20x20 pixels only and cannot be customized to any other size. It is displayed on snooze pop-ups, install progress pop-ups, alerts, and message windows created by scripts.

Some of the actions listed in the Machine Actions drop-down list require Internet Explorer, because ActiveX is required to launch these programs on the local machine. Firefox does not support this feature.

38 Administrator Guide, Version 5.3

Page 39: Dell KACE K1000 Admin Guide

Configuring your Appliance2

Click Action #1 or Action #2 next to the target machine on the Inventory > Computers tab to execute the Machine Action.

7. In the Optional Ignore Client IP Settings section, enter IP addresses you would like ignored as the node IP and then click Save List.

This might be appropriate in cases where multiple machines could report themselves with the same IP address, like a proxy address.

8. In the License Usage Warning Configurations section, enter the new values.

9. Click Override Configuration to save.

This changes when the alert colors are used in the License Compliance, on page 26. For information about setting up license assets, see K1000 Asset Management Guide.

10. In the Data Retention section, click Edit Mode, and select the amount of time you want to save machine uptime data.

Machine uptime data refers to information about the number of hours each day your nodes are running. You can retain this data forever, never save it (None), or select 1 month, 3 month, 6 month (default), 9 month, or 12 month settings.

For more information about power management, see About monitoring power use, on page 188.

11. Click Save Settings to save.

List of open ports requiredEnsure that following ports are not blocked by your firewall. These ports are required to access the server.

Most actions in the Action Icon drop-down list require you to install additional software for them to function. For example, using DameWare requires you to install TightVNC on your machine as well as on the machine you want to access.

Port Number Use

21 To access backup files through FTP

25 If the KACE K1100 Appliance SMTP Server is to be used

80 HTTP

443 SSL

3306 To access an appliance database

8080 Connects directly to Tomcat

8443 Connects directly to Tomcat

52230 For agents to connect to the server through AMP

Administrator Guide, Version 5.3 39

Page 40: Dell KACE K1000 Admin Guide

2 Configuring your Appliance

Configuring Network Settings for the ServerThe key KACE K1000 Appliance network settings are mostly configured when you log in for the first time, using the konfig/konfig credentials. An administrator can verify or change these settings at any time.

To configure the Network Settings

1. From the Organization drop-down list, select System.

2. Click K1000 Settings > Control Panel.

3. Click Network Settings.

The K1000 Network Settings page appears.

4. If fields are grayed out, click Edit Mode to edit the field values.

5. Specify the following settings:

Saving any changes to the Network settings on this page forces the Appliance to reboot. Total reboot downtime is 1 to 2 minutes—provided that the changes result in a valid configuration.

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

K1000 Server (DNS) Hostname

We recommend adding a static IP entry for “K1000” to your DNS, and using the default Hostname and Web Server Name. The fully-qualified domain name of the appliance on your network is the value of Hostname concatenated with Domain.For example, K1000.kace.com.Nodes connect to the appliance using the Web Server Name, which can be the hostname, fully-qualified domain name, or IP address.For example, K1100.

K1000 Web Server Name

Static IP Address The IP address of the appliance server.Caution: Be careful when changing this setting. If the IP address is entered incorrectly, refer to the appliance Administrative Console, and use the konfig login to correct it.

Domain The domain that the appliance is on. The default value is corp.kace.com

Subnet Mask The domain that the appliance is on. The default value is 255.255.255.0

Default Gateway The default gateway.

Primary DNS The primary DNS server the appliance uses to resolve hostnames.

Secondary DNS (Optional) The secondary DNS server the appliance uses to resolve hostnames.

Network Speed The network speed. The network speed setting should match the setting of your local LAN switch. When set to auto negotiate the system automatically determines the best value. This requires the switch to support auto-negotiate. Otherwise contact your network administrator for the exact setting to be used.

40 Administrator Guide, Version 5.3

Page 41: Dell KACE K1000 Admin Guide

Configuring your Appliance2

6. To set Network Server Options, perform the following steps:

a. Set the external SMTP Server, to enable email notifications through this SMTP server. To set SMTP Server, select the Use SMTP Server check box, and then enter the SMTP Server name in the SMTP Server box.

The server named here must allow anonymous (non-authenticated) outbound mail transport.

Ensure that your company’s network policies allow the appliance to contact the SMTP server directly. The mail server must be configured to allow relaying of email from the appliance without authentication.

You can test the email service by using Network utilities. For more information on how to use Network Utilities, refer to Troubleshooting Tools, on page 51.

b. To set the proxy server, select the Use Proxy Server check box, and then specify the following proxy settings, if necessary:

The appliance includes support for a proxy server, which uses basic, realm-based authentication, which prompts for a user name and password:

If your proxy server uses some other kind of authentication, you must add the IP address of the appliance on the exception list of the proxy server.

For information about the Enable Help Desk POP3 Server setting, see the Service Desk Administrator Guide.

7. Click Save to save the Network Server options.

Proxy Type Enter the proxy type, either HTTP or SOCKS5.

Proxy Server Enter the name of the proxy server.

Proxy Port Enter the port for the proxy server. The default port is 8080.

Proxy (Basic) Auth Select the check box to use the local credentials for accessing the proxy server.

Proxy Username Enter the user name for accessing the proxy server.

Proxy Password Enter the password for accessing the proxy server.

Administrator Guide, Version 5.3 41

Page 42: Dell KACE K1000 Admin Guide

2 Configuring your Appliance

Configuring Local Routing TablesLocal routing tables allow the KACE K1000 Appliance to route traffic through multiple gateways on a network. As an example of when this might be used, consider the following:

The KACE K1000 Appliance is physically located in an office in Texas, but many users are located in California. The KACE K1000 Appliance would be serving the client machines on the Texas IP subnet. Using the local routing feature, the Appliance could be pointed to the network in California, so that it could host the California clients as well as the Texas clients.

To configure Local Routing Tables

1. From the Organization drop-down list, select System.

2. Click K1000 Setting.

3. Click Local Routing Table.

The K1000 Local Route Configuration page appears.

4. Select the Green Plus Sign (+) to add settings.

5. Specify the following settings:

6. Click the Save button to add this setting.

7. Click the Green Plus Sign (+) to add additional settings.

8. Click the Save Changes button to save all changes.

A warning will appear indicating the Apache service needs to be restarted.

9. Click OK to continue.

Configuring Local HTTPDThe Local HTTP Configuration feature in the KACE K1000 Appliance helps you to manage adminui/userui/systemui pages. Using this feature, you can specify a whitelist of hosts that

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

Label Enter a name/label for the route.

Destination Enter the IP address or Network for the destination with which you want your KACE K1000 Appliance to communicate.

Netmask/CIDR Enter the “netmask” of the specified network. Netmask/CIDR is applied to the host (for example, "/24", "255.255.240.0").

Gateway Enter the IP address for the router that actually routes the traffic between the KACE K1000 Appliance and the destination network.

Once an IP address or Domain Name has been added to the white list, only that IP or Domain can access that page. All others will be blocked.”

42 Administrator Guide, Version 5.3

Page 43: Dell KACE K1000 Admin Guide

Configuring your Appliance2

are allowed access. Once saved, access to the adminui/userui/systemui pages will be restricted according to your settings.

To configure Local HTTPD

1. From the Organization drop-down list, select System.

2. Click K1000 Settings.

3. Click Local HTTPD Configuration.

The K1000 Local HTTPD Configuration page appears.

4. Select the Green Plus Sign (+) to add settings.

5. Specify the following settings for the following

• Adminui Allow List—This is a white list of who can log into the http://kbox/adminui page.

• Userui Allow List—This is a white list of who can log in to the http://kbox page.

• Systemui Allow List—This is a white list of who can log into the http://kbox/systemui page.

6. Click the Save button to add this setting.

7. Click the Green Plus Sign (+) to add additional settings.

8. Click the Save Changes button to save all changes.

A warning will appear indicating the Apache service needs to be restarted.

9. Click OK to continue.

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

Directive The default for this field is “Allow,” indicating the host should be allowed access.

IP Address/Domain Name

This can be any of the following:

• A (partial) domain name

• A full IP address

• Partial IP address

Netmask/CIDR Along with a network, the Netmask/CIDR provides a finer-grained subnet control.

Once an IP address or Domain Name has been added to the white list, only that IP or Domain can access that page. All others will be blocked.”

Administrator Guide, Version 5.3 43

Page 44: Dell KACE K1000 Admin Guide

2 Configuring your Appliance

Configuring Security Settings for the ServerSecurity Settings are not mandatory but are required to enable certain functionalities like Samba Share, SSL, SNMP, SSH, Offbox DB Access, and FTP access on the appliance server. To use any of the Security Settings features, you must enable them.

To configure Security Settings

To enable SSL, you need the correct SSL Private Key file and a signed SSL Certificate. If your private key has a password, it will prevent the appliance from restarting automatically. Contact KACE support if you have this issue.

1. Click K1000 Settings > Control Panel.

The K1000 Settings: Control Panel page appears.

2. Click Security Settings.

The K1000 Security Settings page appears.

3. Click Edit Mode to edit the security settings fields.

4. In the General Security Settings area, specify the following security settings:

a. Select the SSH Enabled check box to permit someone to login to the appliance using SSH.

b. Select the Enable backup via ftp check box.

Nightly the appliance creates a backup of the database and the files stored on it. You access these files using a read-only FTP server, which allows you to create a process on another server that pulls this information off the appliance. If you do not need this feature, you can turn off this option, and disable the FTP server.

c. Clear the Enable SNMP monitoring check box.

SNMP is a network/appliance monitoring protocol that is supported by many third-party products. If you do not want to expose the appliance SNMP data, turn off this option.

d. Clear the Enable database access check box.

The appliance database is accessible via port 3306 to allow you to run reports using an off board tool, like Access or Excel. If you do not want to expose the database in this way, turn off this option.

e. Clear the Make FTP Writable check box.

Enable this feature to upload backup files using FTP. This feature is useful if your backup files are too large for the default HTTP mechanism (browsers timing out).

If you change any security settings, you must reboot the appliance to make the changes take effect.

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

44 Administrator Guide, Version 5.3

Page 45: Dell KACE K1000 Admin Guide

Configuring your Appliance2

5. In the Samba Share Settings area, select the Enable Organization File Shares check box to allow each organization to leverage the appliance's client share as an install location for the node.

The appliance has a built-in windows file server that can be used by the provisioning service to assist in distributing the samba client on your network. Dell recommends that this file server only be enabled when performing node software installs.

6. In the Optional SSL Settings area, specify the following SSL settings, if required:

a. Clear the Enable port 80 access check box.

When you activate SSL, port 80 continues to be active, unless Enable port 80 access check box is cleared. By default, the standard Agent installers attempt to contact the appliance via port 80, and then switch to SSL over port 443, after getting the server configuration. If you disable port 80, contact KACE Support to adjust the agent deployment scripts to handle SSL. For ease of agent deployment, leave port 80 active.

b. Select the SSL Enabled on port 443 check box to have nodes check in to the appliance server using https.

A properly signed SSL Certificate is required to enable SSL. Certificates should be supported by a valid Certificate Authority. SSL settings should only be adjusted after you have properly deployed the appliance on your LAN in non-SSL mode. If you are enabling SSL, you will need to identify the correct SSL Private Key File and SSL Certificate File.

The files must be in Privacy Enhance Mail (PEM) format, similar to those used by Apache-based Web servers and not in the PCKS-12 format used by some Web servers. It is possible to convert a PCKS-12 certificate into a PEM format using software like the OpenSSL toolkit. Contact Dell KACE Technical Support if you want to enable SSL on your appliance.

You can load SSL certificates into the appliance by any of these two methods:

• You can click Open SSL Certificate Wizard and follow the step by step procedure to load the SSL certificates. Refer To generate an SSL Certificate, on page 45.

• If you have your own SSL certificate and SSL private key, click Edit Mode to edit the field values.

In the Set SSL Private Key File field, browse to the SSL Private Key file and browse to the signed SSL Certificate, in the Set SSL Certificate File field

7. Click Set Security Options, to save the changes and reboot the appliance.

Once you switch over to SSL, this is a one-way automatic shift for the nodes. They must be reconfigured manually if you later decide not to use SSL.

To generate an SSL Certificate

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 45

Page 46: Dell KACE K1000 Admin Guide

2 Configuring your Appliance

Generate an SSL certificate using the wizard as follows:

1. Click K1000 Settings > Control Panel.

The K1000 Settings: Control Panel page appears.

2. Click Security Settings.

The K1000 Security Settings page appears.

3. Click Open SSL Certificate Wizard.

The K1000 Advanced SSL Settings page appears.

4. Click Edit Mode to edit the fields and specify the following:

5. Click Set CSR Options. Your Certificate Signing Request is displayed in the field below the Set CSR Options button. You need to copy the text between the lines “-----BEGIN CERTIFICATE REQUEST----- and -----END CERTIFICATE REQUEST-----” along with these lines, and then send it to the person who provides your company with web server certificates.

Your Private Key is displayed under Private Key field. It will be deployed to the appliance when you upload a valid certificate and subsequently click Deploy.

6. Click Create Self Signed Cert.

The SSL certificate is generated. This certificate will not be accepted by any nodes until it is added into the trusted certificate database on every machine running the client.

7. Click Deploy to deploy the certificates and turn on SSL on the appliance. Click OK to reboot the appliance.

Country Name Enter the name of your country.

State or Province Name Enter the name of your State or Province.

Locality Name Enter your locality name.

Organization Name Enter the name of your organization.

Organization Unit Name Enter the name of unit your organization belongs to.

Common Name Enter a common name of the appliance you are creating the SSL certificate for.

e-mail Enter your email address.

Do not send the private key to anyone. It is displayed here in case you want to deploy this certificate to another web server.

The certificate and private key for SSL are not included in the appliance’s nightly backups for security reasons. Retain these two files for your own records.

Click Create Self Signed Certificate and for Deploy to be displayed.

46 Administrator Guide, Version 5.3

Page 47: Dell KACE K1000 Admin Guide

Configuring your Appliance2

Configuring Agent Messaging Protocol SettingsAgent Messaging Protocol (AMP) is the appliance Communications Protocol used by the server with its respective agents.

AMP includes server, client, and communications components to perform optimized real-time communications for control of systems management operations.

AMP provides:

• Persistent connection between the appliance Server

• Server driven inventory updates

• Higher scalability in terms of number of nodes supported on one K1000 Server

• Better scheduling control and reliability

These settings are specific to the AMP infrastructure and do not affect other appliance configuration settings or runtime operations. These settings control both the runtime state of the AMP server and also the operational state of the agent.

To configure Agent Messaging Protocol Settings

1. Click K1000 Settings > Control Panel.

The K1000 Settings: Control Panel page appears.

2. Click Agent Messaging Protocol Settings.

The K1000 Agent Messing Protocol Settings page appears.

Changing these settings will temporarily interrupt communications between the appliance and the agents. Exercise caution when changing these settings and contact Dell KACE Technical Support for any questions regarding these parameters.

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 47

Page 48: Dell KACE K1000 Admin Guide

2 Configuring your Appliance

3. Specify the General Settings:

4. Click Save and Restart AMP Server to the save the settings and restart the AMP server.

5. You can click Restart AMP Server to restart the AMP server without saving the settings.

Server Port Specify the Server Port.The AMP Server on the appliance SERVER will listen on port 52230 (default). For the Agents to connect to the appliance SERVER using AMP, you must have the AMP Protocol Port 52230 open and available OUTBOUND. (That is, the agent must be able to connect through this port number OUTBOUND without restriction from any OUTBOUND filter/firewall.)Example of an OUTBOUND restriction:“Windows XP Firewall blocking outbound port 52230”.Allow outbound Protocol Port 52230.This can be configured in your Filter/Firewall Software or Hardware as an allowed OUTBOUND Exception.For the SERVER to accept connections via AMP, it must have the AMP Protocol Port 52230 open and available INBOUND to the appliance IP ADDRESS. (That is, the appliance SERVER must be able to accept connections through this port number INBOUND without restriction from an INBOUND filter/firewall.)Example of an INBOUND restriction:“A NAT Firewall such as Cisco or SonicWall blocking INBOUND port 52230 to the K1000 IP ADDRESS.”Allow inbound Protocol Port 52230 to the appliance server.This can be allowed through a One-to-One Inbound NAT Policy.Note: If you change the default AMP Port of 52230, you must update the ALLOWED OUTBOUND/INBOUND port on your filter/firewall.

Enable Server Debug

Select the check box to enable different levels of “server” debug/logging to the server's log file.

Enable SSL for AMP

Select the check box to enable SSL for AMP. The activation of SSL is for AMP Only. The check box must be selected to activate SSL over AMP even though the general appliance settings may have SSL enabled already. This allows the separate configuration of AMP traffic to be un-encrypted even though all other appliance communication is SSL encrypted. Note: Before you can choose this setting, you must enable SSL as described in step b on page 45.

Restarting the AMP Server will not restart the appliance.

48 Administrator Guide, Version 5.3

Page 49: Dell KACE K1000 Admin Guide

Configuring your Appliance2

Configuring date and time Settings of the appliance server

Keep the time of the appliance accurate as most time calculations are made on the server.

To configure Date & Time settings

1. Click K1000 Settings > Control Panel.

The K1000 Settings: Control Panel page appears.

2. Click Date & Time Settings.

The K1000 Date & Time Settings page appears.

3. Click Edit Mode to edit the field values.

4. Specify the following information:

5. Click Set Options to set the date and time settings.

Configuring Single Sign-on for multiple appliancesThe Single Sign-On feature (appliance linking) enables users to authenticate once and gain access to and run multiple appliances. Once appliances are linked, you can sign on to one of them and gain access to the others without having to re-login into each appliance individually. You can link all Dell KACE K1000 Management Appliances.

To link appliance so you can run them from the same console.

When updating the time zone, the appliance web server will be restarted in order for it to reflect the new zone information. Active connections may be dropped during the restart of the web server. After saving changes, this page will automatically refresh after 15 seconds.

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

Time Zone Select the appropriate time zone from the drop-down list.

Automatically synchronize with an Internet time server

Select the check box to automatically synchronize the appliance time with an internet time server. Enter the time server in the text box. For example: time.kace.com

Set the clock on the K1000 manually

Select the check box to manually set the appliance clock. Select the appropriate time and date from the drop-down lists.

You can run multiple appliances from the same appliance console, but you cannot transfer resources or information between them using this feature.

Administrator Guide, Version 5.3 49

Page 50: Dell KACE K1000 Admin Guide

2 Configuring your Appliance

• Start by enabling linking on each appliance with the instructions in To enable linking of appliances for single sign-on, on page 50. Enabling linking creates appliance names and linking keys.

• Copy the appliance names and linking keys between the appliances to link using the instructions in To enable linking of appliances for single sign-on.

To enable linking of appliances for single sign-on

1. Click K1000 Settings > Control Panel.

The K1000 Settings: Control Panel page appears.

2. Click Linking Dell KACE Appliances Settings.

The K1000 Linking Dell KACE Appliances Settings page appears.

3. Click Edit Mode.

4. Click the Enable Dell KACE Appliance Linking check box to enable the linking.

5. Click Set Options to save link settings.

Once linking is enabled, return to the Control Panel page and select Manage Linked K1000 Appliances to configure remote appliances.

To link appliances for single sign-on

This procedure involves copying the K1000 Friendly Names and linking keys from one appliance to another. To save time, copy these to a central location. Optionally, you can make the link an SSL connection for added security. An SSL connection is only available if you have enabled SSL on all K1000 Management Appliance you are linking.

The Manage Linked Appliances page appears after you enable linking.

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

Friendly Name (this server)

Enter a unique, logical name for this appliance. Other appliances use this name to select this appliance.

Remote Login Expiration

Enter the number of minutes to keep the link open. When this time period expires, you need to provide login credentials when switching to a linked appliance. The default is 120 minutes.

Request Timeout Enter the number of minutes this server waits for a remote appliance to respond to a linking request. The default is 10 seconds.

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

If appliance linking is not enabled, you are redirected to the Linking K1000 Appliances Settings page when you click the Manage Linked K1000 Appliances link.

50 Administrator Guide, Version 5.3

Page 51: Dell KACE K1000 Admin Guide

Configuring your Appliance2

1. Follow the instructions in To enable linking of appliances for single sign-on, on page 50, on each appliance that you want to link with.

2. Click K1000 Settings > Control Panel > Manage Linked Dell KACE Appliances.

The Linking K1000 Appliances page appears.

3. In the Choose Action menu, click Add New Item.

The K1000 Settings: Add Linked Appliance page appears.

4. Enter the K1000 Friendly Name and the Linking Key of the appliance that you are establishing the link to.

5. Click Set Options.

If the settings are configured correctly, the Connection Successful message is displayed.

6. Log on to the other appliance you are creating the link for, and repeat these steps to add the Host Name and Linking Key to it.

After you click Save, the Test Connection option appears.

7. Click Test Connection to verify the connection between the two linked appliances.

When you re-login into the first appliance, the newly updated linked appliances appear on the Organization drop-down list of the Home tab.

You can now switch among the linked appliance consoles using the Org: drop-down menu on the upper right side of the appliance user interface.

To disable appliance links

1. Click K1000 Settings > Control Panel.

The K1000 Settings : Control Panel page appears.

2. Click Linking Dell KACE Appliance Settings.

The K1000 Linking Dell KACE Appliances Settings page appears.

3. Click Edit Mode to make this page editable.

4. Clear the Enable Dell LACE Appliance Linking check box.

5. Click Set Options.

After a appliance link is deleted, you can still switch to and control that appliance until you log off and log in again from the appliance Server.

Troubleshooting ToolsThe Troubleshooting Tools page contains tools to help administrators and Dell KACE Technical Support to troubleshoot problems with this appliance.

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 51

Page 52: Dell KACE K1000 Admin Guide

2 Configuring your Appliance

To access the K1000 Troubleshooting Tools pageClick Settings > Support > Troubleshooting Tools.

The Troubleshooting Tools page appears.

To use Network Utilities

You can use Network Utilities to test various aspects of this appliances network connectivity.

1. Click K1000 Settings > Support.

The K1000 Settings: KACE Support page appears.

2. Click Troubleshooting Tools.

The Troubleshooting Tools page appears.

3. Click Edit Mode.

4. Enter the IP Address in the text box.

5. Select the appropriate network utility from the drop-down list.

6. Click Test.

• You can download K1000 Troubleshooting Logs. Dell KACE Technical Support may request the troubleshooting logs to help in troubleshooting some issues. Click the click here link to download troubleshooting logs.

• Select the Enable Tether check box under the KACE Support Tether to allow Dell KACE Technical Support to access your appliance.

Enter the key supplied by Dell KACE in the text box. Dell KACE Technical Support will provide you a key when this type of support is required.

To access the next set of settings, you need to select System in the Organization drop-down list in the top-right hand corner of the page.

52 Administrator Guide, Version 5.3

Page 53: Dell KACE K1000 Admin Guide

3

Labels and Smart Labels

This chapter gives an overview of Labels and Smart Labels, and how your Dell KACE K1000 Management Appliance uses them. For information on LDAP Labels and the LDAP Browser, see Chapter 11: LDAP, starting on page 209.

• About Labels, on page 53.

• About Smart Labels, on page 60.

• What’s Next, on page 63.

About LabelsLabels can be used to organize and categorize computers, software, people, and locations. Labels are intended to be used in a flexible manner, and how you use labels is completely customizable. Label types include:

• Computer inventory

• IP Scan Inventory

• Processes /Startup Items / Services

• Software

• Patches

• Dell Update Packages

• Users

Once included in a label, items can be managed on a per-label basis. All items that support labeling can have none, one, or multiple labels. You can use labels, for example, with patching, distribution packages, categorizing computers, setting up the geographic relationships, and setting the permission levels of users. Labels can be manually or automatically applied through LDAP or Smart Labels.

You can also organize labels with Label Groups. Label Groups are strictly for organizational purposes, such as the “View By” function in the Computer Inventory page. They cannot be targeted for Patching jobs or Managed Installations. Capabilities include:

• Label groups can pass their type, such as Patches or User, to the labels they contain. Label Groups pass their type restrictions to the labels they contain. For example, if a Label Group is restricted to Patches, the labels assigned to that group have only the type Patches available; the other types are grayed out.

Administrator Guide, Version 5.3 53

Page 54: Dell KACE K1000 Admin Guide

3 Labels and Smart Labels

• You can associate labels with one or more Label Groups; membership in one Label Group does not preclude membership in another Label Group. In fact, Label Groups can be a member of another Label Group.

You can find the Label tab by going to Home > Label. (Be sure to select your organization first using the Organization menu in the top-right corner of the page.) You can also create Labels and Smart Labels in the other components of the appliance that use labels. In many areas of the appliance user interface, you can see a label selection list, which you use to constrain an action to a one or more labels. For example, you can restrict the deployment of a script to nodes that belong to particular labels.

Managing LabelsIn Label Management, you can:

• Create Labels (which is also done in other parts of the interface)

• Create Label Groups (or nested labels)

• Edit Label Groups

• Delete Labels or Labe Groups

• Show or Hide Label Groups

Label groups do not create a functional hierarchy of labels. To create a hierarchy, you can make a label dependent on other labels by using Smart Labels to change the order in which labels are processed. For more information, see To create a Smart Label, on page 61 and To change the Smart Label Run Order, on page 62.

54 Administrator Guide, Version 5.3

Page 55: Dell KACE K1000 Admin Guide

Labels and Smart Labels3

Viewing LabelsSelect Label Management to view labels created. You can click on the numbers under the categories to see what the members are. For example, in the following screenshot:

• The FrameMaker 7.2 label belongs to the Licenses Label Group. FrameMaker 7.2 is a

software label, and there are two items in the label. The icon means that the label is associated with a Smart Label.

• The laptops label is a machine label that contains only one item. This label is associated with a Smart Label that adds any computer with the chassis type laptops to the Smart Label. If any more laptops are purchased, they will be added to the label.

• Licenses contains one label, so it is a Label Group.

• MemberOfBuildingA and MemberOfFinancesGroup have the icon for an LDAP Label. For information about LDAP labels, see About LDAP Labels, on page 209.

• Microsoft Office Proof is also associated with a Smart Label. It is also in the Label Group, Licenses. Microsoft Office Proof has four members—until more copies of Office Proof are purchased.

Viewing Computer Details by LabelAfter you have created a Computer label, for example, you can view details about the computers on your network that belong to that label. From the Label Detail view, you can see:

• The IP addresses and machine names of the computers in the label

• The number of Managed Installations and File Synchronizations deployed to the label

• The number of network scans and scripts run on the machines in the label

• The number of alerts, portal packages, and users associated with the label

Administrator Guide, Version 5.3 55

Page 56: Dell KACE K1000 Admin Guide

3 Labels and Smart Labels

• The number of filters and replication shares associated with the label.

To view label details

1. Click Home > Label, and click Label Management.

2. Click the linked name of the label you want to view.

The Labels: Edit Detail page appears.

3. In the Labeled Items section, click the + sign beside the section headers to expand or collapse the view.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

56 Administrator Guide, Version 5.3

Page 57: Dell KACE K1000 Admin Guide

Labels and Smart Labels3

To add or edit a new label

You can add or edit labels from most places in the user interface. You can also add or edit them under Label Management.

1. Click Home > Label, and click Label Management.

2. In the Choose Action menu, click Add New Label.

3. On the Label : Edit Detail page, enter a descriptive title.

If you have large numbers of labels, you can use Label Groups for organization. See To create a Label Group, on page 59

4. (Optional and for Computer labels) Enter a value for KACE_ALT_LOCATION.

Typically, this value is not used. If KACE_ALT_LOCATION is used, scripts check here for dependencies.

5. If you defined KACE_ALT_LOCATION, specify the User Name and Password for it.

6. (Optional) Under Restrict Label Usage To, select an appropriate category. For example, if the label is for software, restrict it to that.

7. (Optional) Select a Label Group.

If you have large numbers of labels, consider putting them in a Label Group. For example, include the labels of your licensed software in a software Label Group named Licenses. See To create a Label Group, on page 59.

8. Click OK.

9. Click Save.

For an another example on how to manually apply labels, refer to Adding Computers to Inventory, on page 89.

To delete a label

You can delete a label in its edit page, you can also:

1. Click Home > Label and select Label Management.

2. Click the check box for the label.

3. From the Choose Action menu, click Delete Selected Item(s).

4. Click OK in the confirmation window.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Avoid using backslashes (\) in Label names. If used, be sure to escape the backslash with another backslash.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 57

Page 58: Dell KACE K1000 Admin Guide

3 Labels and Smart Labels

About Label GroupsYou can organize long lists of labels by putting them in Label Groups. As well as organizing labels, Label Groups share their types with the labels they contain. Not only can a Label Group include multiple labels, a label can be associated with more than one Label Group.

The following illustration shows the Label Group type inherited by the label from the Label Group.

To view Label Groups

1. Click Home > Label, and click Label Management.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

58 Administrator Guide, Version 5.3

Page 59: Dell KACE K1000 Admin Guide

Labels and Smart Labels3

If you see Label Name [groups hidden], do the following:

2. In the Choose Action menu, click Show Label Groups.

You can hide Label Groups by clicking Hide Label Groups.

To create a Label Group

You organize labels by putting them in Label Groups:

1. Click Home > Label, and click Label Management.

2. In the Choose Action menu, click Add New Label Group.

3. In the Label Group : Edit Detail page, enter the name of the Label Group in the Name field.

4. (Optional) Enter any notes about this Label Group.

5. (Optional) Use the Restrict Label Usage To, select an appropriate category. For example, if the label is for software, restrict it to that.

6. (Optional) Use the Assign to Label Group option to assign this Label Group to another Label Group.

You can put Label Groups within other Label Groups.

7. Click Save.

To apply a label to a Label Group

1. Click Home > Label, and click Label Management.

2. Select the check box for the label with which you will work.

In this example, the Smart Label MS Office Home is selected.

3. In the Choose Action menu, click Apply Label Group.

In this example, the MS Office Home Smart Label is associated with the Licenses Label Group.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To include existing labels in the Label Group, select the respective label check boxes before selecting Add New Label Group.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 59

Page 60: Dell KACE K1000 Admin Guide

3 Labels and Smart Labels

To delete a Label Group

Before you delete a Label Group, delete its member labels.

1. Click Home > Label, and click Label Management.

2. Click the name of the Label Group.

The Label Group : Edit Detail page appears.

3. Expand the Labels under Labeled Items.

4. Click the name of the label to open its Edit Detail page.

5. In the Assign to Label Group section, click Edit.

6. In the Label Selection window, select the name of the Label Group from step 2.

7. Click the recycle bin and OK

8. Click Save.

9. When you have removed all labels from Label Items of the Label Group, click Delete.

About Smart LabelsSmart Labels enable you to dynamically apply a label based on a search criteria. Your appliance allows you to create specific types of Smart Labels.

You can view the list of available Smart Labels from the Home > Label > Smart Labels tab. Smart Label types include:

• Dell Package Smart Label

• IP Scan Smart Label

• Machine Smart Label

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

60 Administrator Guide, Version 5.3

Page 61: Dell KACE K1000 Admin Guide

Labels and Smart Labels3

• Patch Smart Label

• Software Smart Label

You can also change the order of your smart labels or delete them from the Smart Labels page.

To create a Smart Label

You can also create a Smart Label in every component where you use them.

1. Go to Home > Label, and click Smart Labels.

2. From the Choose Action menu, click the type of Smart Label you want to create.

The Create Smart Label tab appears for the type of label that you selected. For example, if you selected Software Smart Label, the criteria just apply to software.

3. Specify the search criteria using the available fields.

4. Click Test Smart Label to view the results.

5. From the Choose label list, choose or enter the label to associate with the Smart Label.

6. Click Create Smart Label.

Now, whenever machines with software that meets the specified criteria check into your appliance, the software is automatically assigned to the associated Smart Label.

You can also add a new software Smart Label or change the order of Smart Labels by going to

Home > Label > Smart Labels.

Software Smart Labels are applied in the following ways:

• If a specific software Smart Label is edited using Home > Label > Smart Labels, it is reapplied to all software.

• All Smart Labels are reapplied to a software item when it is updated on Inventory > Software.

For more examples of using Smart Labels, see, Creating Smart Labels for Computer Inventory, on page 86, and To dynamically identify the network scan results, on page 123.

To edit a Smart Label

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Deleting a Smart Label does not delete the label associated with it.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 61

Page 62: Dell KACE K1000 Admin Guide

3 Labels and Smart Labels

You can find all Smart Labels in the Home component. You can also edit Smart Labels within the components that they belong to.

1. Go to Home > Label, and click Smart Labels.

The Smart Labels page appears.

2. Select a Smart Label Name.

The Smart Label : Edit Detail page shows the following information, depending on the type of Smart Label,

3. Click Save.

To change the Smart Label Run Order

To change the order in which Smart Labels:

1. Go to Home > Label, and click Smart Labels.

The Smart Labels page appears.

2. Select one of these options from the Choose Action menu:

• Order Dell Update Smart Labels

• Order IP Scan Smart Labels

• Order Machine Smart Labels

• Order Patch Smart Labels

• Order Software Smart Labels

The order Smart Labels page appears for the type of Smart Label, listing all of that type.

3. To change a Smart Label’s order value, click the icon next to it.

Item Type

Specifies the type of Smart Label, for example, software.

Assigned Label

Contains a drop-down list from which you choose the label you want to assign. Click Details to edit label details. For more information on editing labels, refer to Managing Labels, on page 54.

Label Notes

Displays notes relevant to the label, if entered in the Notes field.

SQL Displays the query in SQL (Structured Query Language). Click Duplicate to create a new Smart Label with same SQL code. This field does not show when the Details link is selected.

When you click Duplicate to create a new Smart Label with the SQL code, you can only reassign it to a new label.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

62 Administrator Guide, Version 5.3

Page 63: Dell KACE K1000 Admin Guide

Labels and Smart Labels3

Smart Labels with smaller values execute before those with larger values. Smart Labels have a default order value of 100.

4. Click Save.

What’s NextMany organizations use labeling with their software and hardware inventories. For more examples of using labeling, see Chapter 5: Managing Software and Hardware Inventories, starting on page 83.

Administrator Guide, Version 5.3 63

Page 64: Dell KACE K1000 Admin Guide

3 Labels and Smart Labels

64 Administrator Guide, Version 5.3

Page 65: Dell KACE K1000 Admin Guide

4

Agent Provisioning

The Agent Provisioning feature enables you to directly install the Dell KACE K1000 Management Appliance Agent onto machines in your environment. Information about the data collected by the Agent for each computer is located in Information collected by the Agent, on page 310.

• Overview of first time Agent provisioning, on page 65.

• System requirements for Agents, on page 66.

• Preparing to provision the Agent, on page 67.

• Single Machine Provisioning, on page 68.

• Advanced Provisioning, on page 69.

• Using the Provisioned Configurations page, on page 73.

• Using the Provisioned Configurations page, on page 73.

• Using the Provisioning Results Page, on page 75.

• Managing K1000 Agent Tasks, on page 76.

• K1000 Agent Settings, on page 77.

• K1000 Agent Update, on page 78.

• AMP Message Queue, on page 80.

Overview of first time Agent provisioningAgent Provisioning helps you to easily deploy the K1000 Management Appliance Agent software on your network. You can deploy the Agent on multiple machines simultaneously by creating a configuration that identifies a range of IPs to target. The procedure for Agent provisioning depends on the operating system.

1. File share on the K1000 Management Appliance must be enabled. See Enabling file sharing on page 67.

2. A provisioning configuration identifies one or more IP addresses for the first time deployment or removal of the Agent.

Dell KACE Support is a good source for additional information and help for Agent Provisioning. Support contains white papers, articles, and a Knowledge Base.

Administrator Guide, Version 5.3 65

Page 66: Dell KACE K1000 Admin Guide

4 Agent Provisioning

3. The target IP address is tested for the existence of an Agent.

4. If the Agent is not detected, then it will remotely install the Agent directly from the appliance.

System requirements for AgentsSystem requirements to install the Agent are:

• Windows:

• Windows 7 (32-bit and 64-bit)

• Windows Vista (32-bit and 64-bit)

• Windows XP (32-bit and 64-bit)

• Windows Server 2008 (32-bit and 64-bit)

• Windows Server 2008 R2 (64-bit)

• Windows Server 2003 (32-bit and 64-bit)

• Windows 2000 Server (32-bit)

• Linux:

Red Hat Enterprise Linux (RHEL) 3, 4, and 5 (32-bit and 64-bit)

• Macintosh®:

• Mac OS X v10.6 Intel

• Mac OS X 10.5 Intel and PowerPC

• Mac OS X 10.4 Intel and PowerPC

• Upgrades supported:

Supports upgrading from Agent version 5.1 or later to 5.3.

You can also deploy the Agent manually on Windows, Linux, and Macintosh platforms. See Appendix E: Manually Deploying Agents, starting on page 301.

66 Administrator Guide, Version 5.3

Page 67: Dell KACE K1000 Admin Guide

Agent Provisioning4

Preparing to provision the Agent

Enabling file sharingTo activate the provisioning functionality, you must enable the K1000 Management Appliance file share.

1. In the Dell KACE Management Center, go to Settings > Control Panel.

2. Click General Settings.

The K1000 Settings: General page appears.

3. In the Samba Share Settings section, click Edit Mode.

4. Select the File Share Enabled checkbox.

5. (Optional) Enter a password for the user share.

6. Click Save Samba Settings.

Preparing for Windows Platform provisioningFor Windows platform installations, the following configuration settings are required:

• Windows XP: Turn off Simple File Sharing. Provisioning requires standard file sharing with its associated security. For information on how to do this, see the Microsoft Support web site.

If Simple File Sharing is enabled, a LOGON FAILURE occurs because simple file sharing does not support administrative file shares and the associated access security.

You must perform the steps in this section before provisioning the Agent.

If you have multiple organizations, you must enable file share for each organization.

You can access the provisioning installers on the appliance at:

\\k1000_name\client\agent_provisioning

where k1000_name is the hostname of your appliance.

Administrator Guide, Version 5.3 67

Page 68: Dell KACE K1000 Admin Guide

4 Agent Provisioning

• Windows Firewall: If turned ON, you must enable File and Print Sharing in the Exceptions list of the Firewall Configuration.

The appliance verifies the availability of ports 139 and 445 on each target machine before attempting to execute any remote installation procedures.

Vista and Windows 7:

• Provide Administrative credentials for each machine.

• Configure User Account Control (UAC) in one of two ways:

• Turn UAC off.

• Set User Account Control : Run all administrators in Admin Approval Mode to Disabled.

• From the Advanced sharing settings page, turn on network discovery and turn on file and printer sharing.

Single Machine ProvisioningSingle Machine Provisioning option provides an easy way to deploy the Agent technologies for the first time. Single Machine Provisioning assumes some default values for settings such as TCP ports, time outs, appliance server name, and so on.

To deploy the Agent on a single machine1. Go to Settings > K1000 Agent.

The Agent Provisioning page appears.

2. Click Single Machine Provisioning.

The Single Machine Provisioning page appears, including the Agent version.

3. Enter the Target IP.

4. Select Install Agent.

5. Select the operating system of the Agent.

6. (Windows Only) Enter the domain or workgroup for the user name you enter below.

7. Enter a user name that has the necessary privileges to install the Agent.

8. Enter the password for the account.

9. Click Run Now.

Ports 139 and 445 along with File and Print Sharing are required only for Agent distribution. Administrative credentials are only needed for installation of the Agent. The Agent runs within the context of the Local System Account, which is a built-in account used by the Windows operating system. Once the Agents are installed and communicating with the appliance you can turn off access to these ports and services. After installation, the Agent uses port 52230.

68 Administrator Guide, Version 5.3

Page 69: Dell KACE K1000 Admin Guide

Agent Provisioning4

The system saves the configuration with a default name as Simple Provisioning - IP Address and then runs the configuration against the targeted IP.

The Provisioned Configurations page appears where the newly created configuration is displayed.

Advanced ProvisioningAdvanced Provisioning provides the ability to provision the Agent to multiple computers.

Overview of Advanced ProvisioningThe following steps describe how to do Advanced Provisioning:

1. Select the type of provisioning:

• Auto Provisioning: provides the ability to define an IP range.

• Manual Provisioning by IP: allows you to specify IP addresses manually and also pick machines from IP Scan and Inventory.

• Manual Provisioning by Hostnames: allows you to enter hostnames manually.

2. Set the General Settings according to the type of provisioning (described in the previous step). See next section (To use Advanced Provisioning, on page 69).

3. Set the platform settings, as described in:

• To provision Windows platforms, on page 71.

• To provision Unix (Linux or Mac OS X) platforms, on page 72.

4. Schedule the provisioning. See To schedule Agent provisioning on page 72.

To use Advanced Provisioning1. Click Settings > K1000 Agent > Advanced Provisioning.

The Advanced Provisioning page appears.

2. Under General Settings, select the type of provisioning you wish to do:

• Auto Provisioning

• Manual Provisioning by IP

• Manual Provisioning by Hostname

Administrator Guide, Version 5.3 69

Page 70: Dell KACE K1000 Admin Guide

4 Agent Provisioning

3. Enter the information shown in the following table:

Config Friendly Name

Specify a unique configuration name to differentiate between different configurations.

Auto Provisioning

Provisioning IP Range

Enter an IP or IP range. Use hyphens to specify individual IP class ranges. For example: 192 168 2-5 1-200

Manual Provisioning by IP

Target IPs Enter a comma-separated list of IP addresses for the target computers.The Help me pick machines link aids in adding machines to the Target IP list:

• Provisioning IP Range: use hyphens to specify individual IP class ranges. For example: 192 168 2-5 1-200. After specifying a range, click the Add All button.

• IP Scan Computer: this drop-down list is populated from the Network Scan Results.

• Inventory Computers: this drop-down list contains all the inventoried computers.

The following list describes the available functions:

• Click a computer in the list to add it to the Target IP field.

• Filter: filters by character. For example, entering “lib” would display computer names in the list such as Library-1, Library-2, and so on.

• (n) indicates the number of computers selected by the filter.

• Limit List to 20 Computers.

• Only Include Found Computers.

• Add All: adds all machines displayed in the list according to the filter and selection criteria.

Manual Provisioning by Hostname

Target Hostnames Enter a comma-separated list of hostnames for the target computers.

Configuration Enabled

Enables the provisioning configuration.Note: Scheduled configurations run only if this check box is selected.

K1000 Server Name

The server that installs the Agent. This field displays the default name of the appliance server. Update this field if you have multiple servers.

K1000 Client Share Name

The share folder name on the appliance, where the Agents are located.

70 Administrator Guide, Version 5.3

Page 71: Dell KACE K1000 Admin Guide

Agent Provisioning4

4. Set up provisioning for the platform, as described below in:

• To provision Windows platforms, on page 71.

• To provision Unix (Linux or Mac OS X) platforms, on page 72.

To provision Windows platforms

1. Enter the following details under Windows Platform Provisioning Settings:

2. Enter the following details under Windows Network Administrative Credentials:

3. Schedule the provisioned configuration, as described in To schedule Agent provisioning, on page 72.

DNS Lookup Enabled

Enables DNS lookup.

Name Server for Lookup

By default, displays the primary DNS Server defined in Network Settings. You can specify either a hostname or IP address.

Lookup Time Out The time, in seconds, after which a DNS lookup expires.

Provision this platform

Enables provisioning.

K1000 Agent Version (Read-only) Displays the Agent Version number.

Agent Identification Port

The port currently in use by the Agents. The port number is 52230.

Required open TCP Ports

The ports that the appliance uses to access the target machine for the Agent install. Use a comma separated list.

Port Scan Time Out The time period (in seconds) during which the appliance scans the port for response.

Bypass Port checks Select to avoid port checks while the appliance installs the Agent.

Enable Debug Info Select to view debug information in the machine’s provisioning results.

Remove K1000 Agent Select to remove the Agent from machines. This overrides any current provisioning activity.

Domain (or Workgroup)

The domain or workgroup name associated with the login credentials you enter below.

User Name (admin level)

The user name that has the necessary privileges to install the Agent on the target machines.

Password The password for the account listed above.

Administrator Guide, Version 5.3 71

Page 72: Dell KACE K1000 Admin Guide

4 Agent Provisioning

To provision Unix (Linux or Mac OS X) platforms1. Enter the following details under Unix (Linux or Mac OS X) Platform

Provisioning Settings:

2. Enter the following details under Network Root Credentials:

3. Schedule the provisioned configuration, as described in the next section (To schedule Agent provisioning, on page 72).

To schedule Agent provisioningScheduling Agent provisioning ensures that the appliance periodically checks computers in the specified IP range. You can install, reinstall, or uninstall the Agent as required.

1. To schedule the provisioning configuration, select the appropriate radio button under Scheduling:

Provision this platform

Enables provisioning on Linux or Macintosh platform.

Required open TCP Ports

The ports that the appliance uses to access the target machine for the Agent install. Use a comma separated list.

Port Scan Time Out The time period (in seconds) during which the appliance scans the port for response.

Bypass Port Checks Select to avoid port checks while the appliance installs the Agent.

Remove K1000 Agent Removes the Agent from machines. This overrides any current provisioning activity.

Remove agent data directory

Removes any remaining data folder/files after the uninstall process completes.

User Name The user name that has the necessary privileges to install the Agent on the targeted machines.

Password Enter the password for the account listed above.

K1000 Agent Version (Read-only) This field displays the Agent version number.

Don’t Run on a Schedule (Default) Select when you do not want to run the provisioning configuration on a schedule.

Run Every n minutes/hours

Run at a specified minute or hour interval.

Run Every day/specific day at HH:MM AM/PM

Run daily at a specified time.-or-Run on specified day of the week at a specified time

Run on the nth of every month/specific month at HH:MM AM/PM

Run monthly at the specified time.-or-Run on a specified day of the month at a specified time.

72 Administrator Guide, Version 5.3

Page 73: Dell KACE K1000 Admin Guide

Agent Provisioning4

2. Click Save to save the provisioned configuration.

The Provisioned Configurations page appears and displays the provisioned configuration you created in the list of configurations.

Using the Provisioned Configurations pageThe Provisioned Configurations page displays a list of provisioning configurations and their status.

Accessing the Provisioned Configurations page1. Click Settings > K1000 Agent.

The Agent Provisioning page appears.

2. Click Provisioned Configurations.

The Provisioned Configurations page appears:

To create a new configuration1. On the Provisioned Configurations page, click the Choose Action drop-down list and

then select Create New Configuration.

Field Description

Config Name The name of the provisioning configuration. (Links to the Advanced Provisioning page.)

Total Target The total number of target machines in the configuration. (Links to the Provisioning Results page.)

Running The total number of target machines on which provisioning is currently running. (Links to the Provisioning Results page.)

Not Started The total number of target machines on which provisioning has not yet started. (Links to the Provisioning Results page.)

Succeeded The total number of target machines on which provisioning has succeeded. (Links to the Provisioning Results page.)

Failed Indicates the total number of target machines on which provisioning has failed. (Links to the Provisioning Results page.)

% Succeeded The total number of target machines on which provisioning has succeeded as a percentage.

IP Range The IP range of the target machine. (Links to the Provisioning Results page.)

Schedule Indicates the specified provisioning schedule. For example: Every n minutes, Every n hours, or Never.

Enabled A green check mark indicates that the provisioning configuration is enabled.

Administrator Guide, Version 5.3 73

Page 74: Dell KACE K1000 Admin Guide

4 Agent Provisioning

The Single Machine Provisioning page appears, where you can create a new configuration. For more information, see To deploy the Agent on a single machine, on page 68.

2. To provision the Agent to multiple computers, click Advanced Setup.

To edit a configuration1. On the Provisioned Configurations page, click the name of the provisioned

configuration that you want to edit.

The Advanced Provisioning page appears.

2. Edit the provisioned configuration. For more information, see To use Advanced Provisioning, on page 69.

To run configurations1. On the Provisioned Configurations page, select the check boxes for the configurations

that you want to run.

2. In the Choose Action drop-down list, click Run Selected Configuration(s) Now.

To duplicate a configuration1. On the Provisioned Configurations page, click the name of the configuration that you

want to duplicate.

The Advanced Provisioning page appears.

2. Under Scheduling, click Duplicate.

The Provisioned Configuration page appears with the new configuration listed.

To delete a configuration1. On the Provisioned Configurations page, select the check boxes for the configurations

that you want to delete.

2. In the Choose Action drop-down list, click Delete Selected Item(s).

Deleting a configuration will delete all associated target machines in the provisioning inventory list. Altering or updating a configuration will reset the data in the associated target machines list to the default settings until the subsequent provisioning run.

74 Administrator Guide, Version 5.3

Page 75: Dell KACE K1000 Admin Guide

Agent Provisioning4

Using the Provisioning Results PageThe Provisioning Results page displays a list of computers for the selected Agent Provisioning Configuration.

To view Provisioning Results1. Click Settings > K1000 Agent.

The Agent Provisioning page appears.

2. Click Provisioned Configurations.

The Provisioned Configurations page appears.

3. Click an item listed in one of the following columns: Total Target, Running, Not Started, Succeeded, Failed, and IP Range.

The Provisioning Results page appears with the following information for each computer

4. To view additional information about a target computer, click its IP Address.

The K1000 Agent Provisioning page appears.

This page displays the results from the most recent provisioning run and includes information such as the IP address, Agent status, port configuration, and the logs of each provisioning step.

5. To print this page, click Printer Friendly Version.

6. To view inventory information, click the [computer inventory] link next to the MAC address.

IP Address The IP address of the target computer.

DNS The host name of the target computer. opens a Remote Desktop Connection (Internet Explorer only).

Action I indicates a successful install. U indicates a successful uninstall.

Result Whether the most recent provisioning succeeded or failed.

Error The failure error, such as TCP ports not accessible.

Indicates an active AMP connection to the server.

Configuration The name of the configuration.

Last Run The last time the configuration was run.

This link is displayed only if the provisioning process can match the MAC address of the target machine with the current inventory data. For more information on computer inventory, see Adding Computers to Inventory, on page 89.

Administrator Guide, Version 5.3 75

Page 76: Dell KACE K1000 Admin Guide

4 Agent Provisioning

Managing K1000 Agent TasksThe K1000 Agent Tasks option displays a list of all the tasks that are currently running or are

scheduled for a machine connected to the appliance.

1. Click K1000 Settings > Support.

The K1000 Settings: Dell KACE Support page appears.

2. Click Troubleshooting Tools.

The K1000 Troubleshooting Tools page appears.

3. Under the K1000 Agent Messaging, click the tasks link in See status of K1000 Agent tasks.

The K1000 Agent Tasks page appears. By default, In Progress tasks are listed. If you don’t see any task, select another filter in the View by drop-down list:

Some options displayed in the filter depend on the configuration of your Task Types. While most Tasks and Task Types are self-explanatory, the following Tasks may need further explanation:

• Ready to Run (connected): Tasks that are AMP connected and about to run.

• Ready to Run: Tasks that will run when an AMP connection established.

• Longer than 10 minutes: Tasks that have been waiting longer than 10 minutes for a connection.

4. To view details about a computer, click its name in the Machine Name column.

The Computers: Detail Item page appears.

5. (Optional) To see a print view of the page and print it, click Printer Friendly Version.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Column Description

Machine Name The computer name on which the tasks are carried out.

Task Type The type of Agent task. Types depend on your configuration and include alerts, inventory, kbot, krash upload and scripting update.

Started The start time of the task type.

Completed The time when the task type is completed.

Next Run The next schedule or run time of the Agent task type.

Running Time How long it took the task to run.

Timeout in When the task type has to be timed out.

Priority The importance or rank of the task type.

76 Administrator Guide, Version 5.3

Page 77: Dell KACE K1000 Admin Guide

Agent Provisioning4

K1000 Agent SettingsAgent settings configure various options, such as how often the Agent runs on the target computer and how often inventory is performed.

To configure an Agent

1. Click Organizations.

The K1000 Organizations page appears.

2. In the table, click the name of an Organization.

3. Click Edit Mode.

The K1000 Organization: Edit Detail page appears.

4. Under K1000 Agent Settings For This Organization, specify the following Agent options:

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Field Suggested Setting Notes

Communications Window

00:00 to 00:00 (+1 day) The period when the Agent can communicate with the appliance to perform inventory, script updates, and crash uploads. Other processes such as patching and scripting are still performed. You may wish to limit this time, if your computers are particularly busy during a certain period of the day.

Agent “Run interval” 2 hours How often the server asks each Agent to report Inventory, Custom Inventory, File Synchronization, and Managed Installations and to check if the Agent needs upgrading.

Agent “Inventory Interval”

0 The interval that the appliance performs inventory on the nodes in the network. For example, if you set this parameter to 4 hours when the Agent “Run Interval” is 2 hours, the Inventory is checked every other time. Conversely, the Agent checks Custom Inventory, File Synchronization, and Managed Installation every 2 hours.

Agent “Splash Page Text”

The message that appears to users when communicating with the appliance.

Administrator Guide, Version 5.3 77

Page 78: Dell KACE K1000 Admin Guide

4 Agent Provisioning

5. Click Save to save the Agent settings configuration.

The K1000 Agent Settings page appears in read-only mode. These changes are reflected

the next time Agent checks into the appliance.

K1000 Agent UpdateAgent Update allows you to automatically update the Agent software for some or all computers that check into your appliance. Updating the Agent to 5.3 is supported from 5.1 or 5.2.

Overview of Agent UpdatingThe following steps describe how to update the Agents:

1. Download the Bundled Agents file from Dell KACE Customer Support.

2. Load the Bundled Agents file on the appliance.

3. Update the Agent on the target computers.

The following sections describe each of these steps.

To download a patch AgentTo download an Agent bundle, you must first register with Dell KACE Customer Support.

1. Using your login credentials, download and save the k1000_patch_agents_xxx.kbin file from the following link:

Scripting Update Interval

1 hour The frequency that the Agents checks for the latest scripts. If necessary, the updated scripts are then downloaded. This does not affect how often a script is run.

Agent Log Retention Save All Agent Logs Turning off Agent Log Retention will save about 1GB of disk space in the database.

Field Suggested Setting Notes

The Agent normally checks in using the “Run Interval” schedule specified in K1000 Agent Settings page. However, you can force a check-in outside the normal schedule by running:

Windows command window: Go to C:\Program Files\Dell\KACE\ or C:\Program Files (x86)\Dell\KACE\ and enter: runkbot 4 0

Macintosh terminal window: sudo /Library/Application Support/Dell/KACE/bin/runkbot 2 0

UNIX (RHEL) terminal window: sudo /opt/dell/kace/bin/runkbot 2 0

78 Administrator Guide, Version 5.3

Page 79: Dell KACE K1000 Admin Guide

Agent Provisioning4

http://www.kace.com/support/customer/downloads.php

2. In the Dell KACE Management Center, click Settings > K1000 Agent.

The Agent Provisioning page appears.

3. Click Agent Updates from KACE.

The Agent Updates from KACE page appears.

4. Under Upload K1000 Agent Update Files, click Edit Mode.

5. Click Browse and locate the update file that you downloaded.

6. Click Load Bundle File.

7. Verify that the file is uploaded and applied.

The updated files appear under Loaded K1000 Agent Updates.

To update the Agent automaticallyYou can see the version numbers of Agent patches currently uploaded to the appliance under Loaded K1000 Agent Updates.

1. Click Settings > K1000 Agent.

The Agent Provisioning page appears.

2. Click Agent Updates from KACE.

The Agent Updates from KACE page appears.

3. Click Edit Mode under the section that you want to edit.

4. Specify the Agent updates as shown in the following table:

The Agent package that you post to the server from this page should be an official Agent release received from Dell KACE directly.

Distribution Time Stamp

The time the Agent bundle was downloaded.

Enabled Upgrades the Agent the next time the computers check into the appliance.

Limit Updates to Labels

Updates those machines with the selected labels.

Administrator Guide, Version 5.3 79

Page 80: Dell KACE K1000 Admin Guide

4 Agent Provisioning

5. To save the new Agent updates, click Save.

AMP Message QueueThe AMP (Agent Messaging Protocol) Message Queue page displays the list of pending communications with the Agents, such as pending alerts, patches, scripts, or crash dumps.

To view AMP Message Queue

1. Click K1000 Settings > Support.

The K1000 Settings: KACE Support page appears.

2. Click Troubleshooting Tools.

The K1000 Troubleshooting Tools page appears.

3. Under K1000 Agent Messaging, click the message queue link.

The AMP Message Queue page appears.

The pending communications are displayed in this queue only during continuous connection between the Agent and the appliance.

The Agent Message Queue page contains the following fields:

Limit Update To Listed Machines

Select the machines from the Select machine to add drop-down list.

Filter Filters the machines displayed in the Limit Update To Listed Machines field. The (n) indicates the number of computers selected by the filter. Filters by character. For example, entering “lib” would list computer names such as Library-1, Library-2, and so on.

Notes Enter release notes about the Agent.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

For Alerts, the pending communications are displayed in the AMP Message Queue even if there is no continuous connection between the Agent and the appliance. These messages are displayed until the Alert’s Keep Alive time interval has expires. For more information about alerts, see To Create a Broadcast Alert Message, on page 233.

Field Description

Machine Name

The machine name that contains the computer inventory information. Click a name to view the Computers Inventory page.

80 Administrator Guide, Version 5.3

Page 81: Dell KACE K1000 Admin Guide

Agent Provisioning4

To delete a message queue

1. Click K1000 Settings > Support.

The K1000 Settings: KACE Support page appears.

2. Click Troubleshooting Tools.

The K1000 Troubleshooting Tools page appears.

3. Under K1000 Agent Messaging, click the message queue link.

The AMP Message Queue page appears.

4. Click the check box for the message you want to delete.

5. In the Choose Action drop-down list, click Delete Selected Item(s).

6. Click OK to confirm deleting the message.

This removes the message queue from the Agent.

Message Type [ID, Src ID]

The type of message type, such as Run Process.

Message Payload

The message payload.

Expires The date and time when the message expired.

Status The status of the AMP message, such as Completed or Received.

Field Description

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 81

Page 82: Dell KACE K1000 Admin Guide

4 Agent Provisioning

82 Administrator Guide, Version 5.3

Page 83: Dell KACE K1000 Admin Guide

5

Managing Software and Hardware

Inventories

The Dell KACE K1000 Management Appliance Inventory tab enables you to identify and manage the hardware and software on your network and organize these assets using labels and filters.

• Inventory Feature Overview, on page 83.

• Managing Your Computer Inventory, on page 84.

• Managing Your Software Inventory, on page 91.

• Managing Your Processes Inventory, on page 97.

• Managing Your Startup Program Inventory, on page 100.

• Managing Your Service Inventory, on page 102.

• Managing Your MIA (Out-Of-Reach Computer) Inventory, on page 104.

• Using the AppDeploy Live Application Information Clearinghouse, on page 106.

• Using the Dell Warranty feature, on page 107.

Inventory Feature OverviewThe agent collects Inventory information from each node. The information is uploaded and displayed on your K1000 Management Appliance after the nodes check in. The data is then listed on one of the Inventory tabs:

• Computers

• Software

• Processes

• Startup

• Services

• IP Scan

• MIA

Administrator Guide, Version 5.3 83

Page 84: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

Inventory data is collected automatically according to the Agent Inventory Interval schedule specified in Settings > K1000 Agent. If the Agent Inventory Interval is set to

zero, the inventory is performed as per the Agent Run Interval setting on the same page.

Although it is listed under the Inventory tab, the IP Scan feature is discussed in Chapter 7: Scanning for IP Addresses, starting on page 119.

This figure illustrates some of the Inventory features using the Computers ab.

Figure 5-1: Inventory - Computers Tab

Managing Your Computer InventoryThe Computer Search & Filter page displays the computer’s IP address and the user

connected to it. Clicking Action #1 or Action #2 beside the IP address, invokes an Machine Action if specified.

For more details on Machine Actions, refer to Chapter 2: Configuring your Appliance, starting on page 35.

To view the Agent Inventory Interval and Agent Run Interval settings, make sure you have selected the correct organization using the Organization drop-down list in the top-right corner of the main page. Then select the Organizations tab and click an organization in the list. These settings are listed under the K1000 Agent Settings for this Organization section of the K1000 Organization : Edit Detail page.

84 Administrator Guide, Version 5.3

Page 85: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

From the Computers tab you can:

• Search by keyword or invoke an Advanced Search

• Create a Filter to apply labels to computers automatically

• Create Notifications based on computer attributes

• Add/delete new computers manually

• Filter the Computer Listing by label

• Apply or remove labels

• Show or hide labels

To view details about a computer, click its name.

Searching for Computers in Your InventoryThis section explains the various options you have for searching for computers in your inventory.

Using Advanced Search for Computer InventoryAlthough you can search computer inventory using keywords like “Windows XP” or “Acrobat,” those types of searches might not specific enough. Advanced search, on the other hand, allows you to specify values for each field present in the inventory record and search the entire inventory listing for that value. This is useful for example, if you needed to list computers with a particular version of BIOS installed.

To specify advanced search criteria

1. Click the Advanced Search tab.

2. Select an attribute from the drop-down list.

For example: IP Address

3. Select a condition from the drop-down list.

For example: contains

4. Enter the attribute value.

For example, to search machines in an IP range: XXX.XX.*

Note: You can add more than one criteria.

5. To add more criteria, select a conjunction operator from the drop-down list.

The options are AND or OR.

6. Click Search.

The search results are displayed.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 85

Page 86: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

Creating Smart Labels for Computer InventorySmart Labels enable you to dynamically apply a label based on a criteria. Smart Labels work well with Inventory attributes. For example, to track laptops that travel, create a label called “San Francisco Office,” and create a Smart Label based on the IP range or subnet for machines located at the San Francisco office. Whenever a machine that meets the IP range is checked in, it is labeled as “San Francisco.”

The table below lists some examples of useful Smart Labels that can be applied to a machine based on its inventory attributes:

For more information about Smart Labels, see About Smart Labels, on page 60.

Searching for Computers by Creating Computer NotificationsYou can also use the Notification feature to search the inventory for computers that meet certain criteria, such as disk capacity or OS version, and then send an e-mail automatically to an administrator. For example, to know when computers have a critically low amount of disk space left, you can:

1. Specify the search criteria to look for a value of 5 MB or smaller in the Disk Free (G) field

2. Notify an administrator to take appropriate action.

To create a notification

1. Go to Inventory > Computers.

2. Select the Create Notification tab.

3. Specify the search criteria and the constraints.

4. Specify a title for the search.

5. Enter the email address of the recipient of the notification.

6. To see whether the filter produces the desired results, click Test Notification.

7. Click Create Notification to create the notification.

Filter Examples

Sample Label Name Sample Condition

XP_Low_Disk Windows XP Machine with less than 1 GB of free hard disk at last connection.

XP_No_HF182374 Windows XP Machine without Hotfix 18237 installed at last connection.

Building 3 Machine connecting to the K1000 Management Appliance is detected in a specified IP range known to originate in building 3.

CN_sales Computers connecting where computer name contains the letters “sales”.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

86 Administrator Guide, Version 5.3

Page 87: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

Now, whenever machines that meet the specified notification criteria check into the K1000 Management Appliance, an e-mail is automatically sent to the specified recipient. You can modify or delete a notification after it has been created on the Reporting > Email Alerts tab.

Filtering Computers by Organizational UnitTo filter computers based on an Organizational Unit found in LDAP or AD, you can create LDAP Labels to do this from the Home > Label > LDAP Labels tab.

For more information on how to create LDAP Labels, refer to About LDAP Labels, on page 209.

Using the Computer Inventory Detail PageFrom the Computers tab, you can select a computer in inventory and view its details. The Computer Detail page provides details about a computer’s hardware, software, install, patch, Service Desk, and OVAL vulnerability history, among other attributes.

The following sections describe each of the detail areas on this page. To expand or collapse the sections, click the + sign next to the section headers.

Administrator Guide, Version 5.3 87

Page 88: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

Inventory Heading Description

Summary Contains basic computer identification information. Most of this is self-explanatory. The only appliance-specific information in this section is the AMP connection and the agent software level. Some appliance features work only if there is a constant connection between the agent and the appliance:

• A icon indicates a constant connection between the agent and the appliance.

• A icon indicates that the agent and the appliance are not connected.For more details on the AMP connection, see AMP Message Queue, on page 80. Use the Force Inventory Update button to immediately update all computer inventory information. Click Force Inventory Update to synchronize the computer with the server. It requests that the node send an inventory to the appliance.

Inventory Information

This section provides more detail on some of the categories in the Summary section.

Software This section provides details on the software programs the computer has installed, including patching level information, running processes, and startup programs.

Activities • The Labels section displays the labels assigned to this computer. Labels are used to organize and categorize machines.

• The Failed Managed Installs section displays a list of Managed Installations that failed to install on this machine. To access details about the Managed Installations, click the Managed Software Installation detail page link.

• The To Install List section lists the Managed Installations that are sent to the machine the next time it connects.

• The Help Tickets section provides a list of the Service Desk Tickets (if any) associated with this machine. These can either be Tickets assigned to the machine owner or Tickets submitted by the machine owner. To view a Service Desk Ticket’s details, click the Ticket ID (for example, TICK:0032).

Security The Patching Detect/Deploy Status section displays a list of patches detected and deployed on the computer. Click the appropriate link, for example, Failed, Not Patched, Patched, and All to sort the list of patches.You can review your patch schedules by clicking the Patch Schedules link.The Threat Level 5 list section displays the items that have been marked with the threat level as 5. A threat that is harmful to any software, process, startup item, and services associated with this machine is considered as threat level 5.The OVAL Vulnerabilities section displays the results of OVAL Vulnerability tests run on this machine. Only tests that failed on this computer are listed by the OVAL ID and marked as Vulnerable. Tests which passed are grouped together and marked as Safe.

Logs The Portal Install Logs section provides details about the User Portal packages installed on this machine.See Appliance Agent Logs, on page 89, for details on this section.The Scripting Logs section lists the Configuration Policy scripts that have been run on this computer, along with the status of any scripts in progress.

88 Administrator Guide, Version 5.3

Page 89: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

Appliance Agent LogsThis section displays logs for K1000 Management Appliance Management Service, boot strap, Client, and Scripting Updater.

• Management Service Logs:

The primary role of appliance Management Service is to execute the Offline KScripts. The Management Service logs display the steps performed by Management Service to execute the Offline KScripts. These steps include, dependencies downloads and validating the KBOTS file. Any error in the execution of Offline KScript is logged in the Management Service logs.

• Boot Strap Logs:

The appliance sends a boot strap request to get inventory information for a node that has checked in for the first time. The logs related to this request are displayed in Boot Strap logs.

• Client Logs:

The appliance sends a request to the agent to get inventory information periodically. A script is executed on the node after which it sends the inventory information to the appliance. On successful execution of K1000Client.exe, inventory is uploaded to the appliance. The agent logs display these actions.

• Scripting Updater:

A request is initiated periodically from the node to get the latest information related to the changes in Offline KScripts. Scripting Updater logs displays this information.

Adding Computers to InventoryThe appliance provides the convenience of automatically adding computers to inventory. This is especially useful when you maintain a large number of computers on your network. However, the appliance also provides the flexibility to manually add computers to inventory. For example, you can track computers that currently do not have agent support or computers that are not available on your LAN.

Adding Computers AutomaticallyComputers are automatically added to Inventory by provisioning the agent on the computers on your network. The computers on which the agent is installed will check into the appliance

Asset This section displays the details of the Asset associated with that machine. Details such as the date and time when the Asset record was created, the date and time when it was last modified, type of the asset and name of the asset are displayed.

Click the [Edit] link to edit the asset information. For more information about Assets, see the Asset Management Guide.

Inventory Heading Description

Administrator Guide, Version 5.3 89

Page 90: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

and upload all the available inventory data. For more information on agent provisioning, refer to Chapter 4: Agent Provisioning, starting on page 65.

Adding Computers ManuallyYou can use the K1000 to maintain inventory data of all the machines on your network, including those not connected to your LAN. This might be a good practise if you want to maintain Inventory on computers in dark networks.

The number of computer or machine records in Inventory affects your license count even if the computer is no longer in use.

To add a computer to inventory manually

1. Go to Inventory > Computers.

2. In the Choose Action menu, click Add New Item.

The Computer: Edit Computer Detail page appears.

3. Complete the information required by:

• Entering by hand:

For example data, view the computer record of a machine that is already listed in the inventory.

• Importing the machine.xml file for this computer.

The K1000Client.exe can take an optional command line parameter-inventory. To configure this, type:

K1000 Agent/exe-inventory

The appliance agent collects the inventory data and generates a file called machine.xml, which you can upload here. If you choose this option, the appliance ignores all other field values on this page.

To delete a computer

1. Go to Inventory > Computers.

2. Select the check box next to the computer(s) you want to delete.

3. In the Choose Action menu, click Delete Selected Item(s).

4. Click OK to confirm deleting the computer.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

90 Administrator Guide, Version 5.3

Page 91: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

To apply a label to a computer

1. Go to Inventory > Computers.

2. Select the computer to which you will apply a label.

3. In the Choose Action menu:

• Select Add Label.

• Enter the New Label name to apply and click Save.

To remove a label from a computer

1. Go to Inventory > Computers.

2. Select the check box next to the computer from which you will remove a label.

3. In the Choose Action menu, click the appropriate label under Remove Label.

Managing Your Software InventoryThe Inventory feature also collects and displays an inventory of the software items installed on each of the computers listed in the inventory. From the Inventory > Software tab you can see all the software installed across your network.

By default, the software list alphabetically lists only the first 100 software items detected. To view all software installed, click the Show All link.

From the Software List page, you can:

• Add or delete software

• Add, remove, or apply labels

• Categorize the Software

• Set Threat Level to Software

To view the details of a software title, click the software name link.

Using Advanced Search for Software InventoryYou can search your software inventory using keywords like “Adobe Flash Player” or “ActivePerl.” For more refined search results use the Advanced Search. This feature allows you to specify values for each field present in the software inventory and search the entire

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Avoid using backslashes (\) in Label names. If used, be sure to escape the backslash with another backslash.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 91

Page 92: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

inventory for that particular value or combination of values. For example, if you need a list of computers that have a specific application installed on a specific operating system.

To specify advanced search criteria

1. Go to the Advanced Search tab.

2. Select an attribute and a condition from the drop-down lists.

For example, Display Name (Title) and contains.

3. Enter the Attribute Value.

For example, ActivePerl causes all the machines having ActivePerl software to be searched.

4. To add more than one criteria, select the Conjunction Operator from the drop-down list.

For example: AND.

5. Select an attribute and a condition from the drop-down lists.

For example, Supported OS and contains.

6. Enter the Attribute Value.

For example, XP.

7. Click Search.

The combination of XP and ActivePerl returns all machines that have Windows XP OS and ActivePerl software installed.

Adding Software to InventoryYou can add software inventory items automatically or manually. Automatically capturing software inventory items is especially useful when it is difficult to determine and maintain lists of all the software titles installed on your network nodes. Thus, the K1000 Management Appliance also provides you with the flexibility to manually add software titles to the inventory. For example, you can add a software item that is not yet been installed on your network, create a managed installation from it, and then deploy it to your other nodes.

Adding software automaticallySoftware items are added to Inventory automatically when the agent checks in. The nodes on which the appliance agent is installed check in to your appliance and upload all the available software inventory data. For more information on agent provisioning, refer to Chapter 4: Agent Provisioning, starting on page 65.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

92 Administrator Guide, Version 5.3

Page 93: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

To add software to Inventory manually

The appliance automatically creates inventory records for the software titles found on the network. If you don’t see a software package in Inventory, the package probably isn’t installed on a node in your K1000 Management Appliance. Usually, it’s better to install the package on a node and run inventory, than to manually install.

You may want o include a custom rule so that information about the software is current and the package is not reinstalled each time that the agent check in, for example. See Appendix C: Writing Custom Inventory Rules, starting on page 273.

1. Go to Inventory > Software.

2. In the Choose Action menu, click Add New Item.

The Software : Edit Software Details page appears.

3. Enter the general software details.

Enter the Display Version, Publisher (Vendor), and Display Name (Title) consistently across software inventory to ensure proper downstream reporting.

4. Upload or specify links to available information files associated with the software.

5. In the Assign To Label field, select the labels to assign.

6. (Optional) Enter any other information in the Notes field.

7. Specify the Custom Inventory Rule. For example:

RegistryValueGreaterThan(HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\TVD\Shared Components\VirusScan Engine\4.0.xx,szDatVersion,4.0.44)

Before deploying a software item to a remote node, your appliance first verifies whether that file is present on the that node. If it is detected, it is not sent to the machine a second time. In some instances, installed programs do not register in Add/Remove Programs or in standard areas of the registry. In such cases, the appliance may not be able to detect the presence of the application without additional information from the administrator. Therefore, the appliance may repeat the install each time the node connects.

8. Select the supported operating systems in the Supported Operating Systems field.

9. In the Custom Inventory Rule field, enter the Custom Inventory ID.

10. Beside Upload & Associate File, click Browse to browse to the file you wish to upload and associate with this software, and then click Open.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

For more information on Custom Inventory ID (rule), refer to Appendix C: Writing Custom Inventory Rules, starting on page 273.

Administrator Guide, Version 5.3 93

Page 94: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

11. Under Metadata, specify the following information:

12. Click Save.

To create software assets

1. Go to Inventory > Software.

2. Select the check box for the appropriate software.

3. In the Choose Action menu, click Create Asset.

The Assets page appears.

For more information about using Assets, see the Asset Management Guide.

Custom Data FieldsYou can create custom data fields to read information from a target machine and report it in the Computer Inventory certificate. This is useful for reading and reporting on information in the registry and elsewhere on the target machine. For example, DAT file version number from the registry, file created date, file publisher, or other data.

To create a custom data field

1. Go to Inventory > Software.

2. In the Choose Action menu, click Add New Item.

3. Enter a value in the Display Name (Title) field.

4. In the Custom Inventory Rule field, enter the appropriate syntax according to the information you want returned:

• To return a Registry Value, enter the following, replacing valueType with either “TEXT”, “NUMBER”, or “DATE”. NUMBER is an integer value:

Category Select the desired category.

Threat Level Select the threat level.

Hide from AppDeploy Live!

Select this check box to hide this information from Live Application Deployment. (Use for proprietary information.)

The software detail page displays license information for the software. You can also view the license asset detail by clicking on the license link.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

94 Administrator Guide, Version 5.3

Page 95: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

RegistryValueReturn(string absPathToKey, string valueName, string valueType),

Example: RegistryValueReturn(HKEY_LOCAL_MACHINE\SOFTWARE\McAfee.com\Virusscan Online,SourceDisk, TEXT)

• To return File Information, enter:

FileInfoReturn(string fullPath, string attributeToRetrieve, string valueType)

Example:

FileInfoReturn(C:\Program Files\Internet Explorer\iexplore.exe, Comments,TEXT)

You can retrieve the following attributes from the FileInfoReport() function:

Attaching a Digital Asset to a Software ItemWhether you add the software to inventory automatically or manually, you need to associate the files required to install the software before distributing a package to users for installation. To associate multiple files, create a .zip file, and associate the resulting archive file.

To attach a digital asset to a software item

1. Go to Inventory > Software.

2. Select the linked name of the software title.

Comments Language

CompanyName LegalCopyright

FileBuildPart LegalTrademarks

FileDescription OriginalFilename

FileMajorPart PrivateBuild

FileMinorPart ProductBuildPart

FileName ProductMajorPart

FilePrivatePart ProductMinorPart

FileVersion ProductName

InternalName ProductPrivatePart

IsDebug ProductVersion

IsPatclhed SpecialBuild

IsPreRelease CreatedDate

IsPrivateBuild ModifiedDate

IsSpecialBuild AccessedDate

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 95

Page 96: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

The Software: Edit Software Detail page appears.

3. Beside Upload & Associate File, click Browse.

4. Locate the file to upload, and then click Open.

5. Modify other details as necessary, and then click Save.

To delete a software item

1. Go to Inventory > Software.

2. Select the check box next the software you wish to delete.

3. In the Choose Action menu, click Delete Selected Item(s).

4. Click OK to confirm deleting the software.

To apply a label to a software item

If you want your label to include all copies of this software, the ones you have now and any you might purchase in the future, use a Smart Label. See Creating Smart Labels for Computer Inventory, on page 86.

1. Go to Inventory > Software.

2. Select the check box beside the software to apply a label to.

3. In the Choose Action menu, click Apply Label and then the appropriate label to apply.

You can also click Add Label in the Choose Action menu to create and apply a new label.

To remove a label from a software item

1. Go to Inventory > Software.

2. Select the check box beside the software to remove the label from.

The Software-To-Computer Deployment Detail table at the bottom of the Software > Edit Software Detail page shows which computers have the software title installed.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Avoid using backslashes (\) in Label names. If used, be sure to escape the backslash with another backslash.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

96 Administrator Guide, Version 5.3

Page 97: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

3. In the Choose Action menu, click Remove Label and the appropriate label.

To categorize a software item

1. Go to Inventory > Software.

2. Select the check box beside the software you want to categorize.

3. In the Choose Action menu, click Set Category and the category.

To set threat level to a software item

1. Go to Inventory > Software.

2. Select the check box next to the software.

3. In the Choose Action menu, click the appropriate threat level.

Managing Your Processes InventoryThe K1000 Management Appliance Processes feature allows you to keep track of processes that are running on all agent machines across your enterprise.

The Processes feature records and reports the processes details information. You can record and view software usage for the last 1, 2, 3, 6, or 12 months. Detail pages provide information on individual processes, including the name of the computer running those processes, system description, and the last user.

Using Processes feature, you can:

• View Process details

• Delete selected processes

• Disallow selected processes

• Meter selected processes

• Apply labels

• Remove labels

The processes are categorized in: Audio / Video, Business, Desktop, Development, Driver, Games, Internet, Malware, Security, and System Tool.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 97

Page 98: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

To view process details

1. Go to Inventory > Processes.

The Processes page appears.

2. Select the process name to view details.

The Process Details page appears.

3. Select labels to assign to a process using the Assign To Label option.

4. Enter any notes that further describe this process in the Notes field.

5. Select the category of the process in the Category drop-down list.

6. Select the threat level of the process in the Threat Level drop-down list.

7. Click Save.

You can also see computers with running the selected process. You can view and print a printer friendly version of this page.

To delete a process

1. To delete processes, do one of the following:

• From the Processes List view, select the check box beside the process, and then in the Choose Action menu, click Delete Selected Item(s).

• From the Process detail page, click Delete.

2. Click OK to confirm deleting the selected process.

To disallow processes

1. Go to Inventory > Processes.

The Processes page appears.

2. Select the check box beside the processes to disallow.

3. In the Choose Action menu, click Disallow Selected Item(s).

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

You can read comments on the process submitted by other users by clicking [Read Comments] on the Process Details page. You can also ask for help from KACE about the processes by clicking [Ask For Help.] You need a KACE user name and password to log in to the Dell KACE database.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

98 Administrator Guide, Version 5.3

Page 99: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

The Script : Edit Detail page appears.

4. Enter the script configuration details, and then click Run Now to run Disallowed Programs Policy.

To apply a label to a process

1. Go to Inventory > Processes.

2. Select the check box next to the processes you want to apply a label to.

3. In the Choose Action menu, click the appropriate label to apply.

To remove a label from a process

1. Go to Inventory > Processes.

2. Select the check box next to the processes you want to remove the label from.

3. In the Choose Action menu, click the appropriate label under Remove Label.

To categorize a process

1. Go to Inventory > Processes.

2. Select the check box next to the processes you want to categorize.

3. In the Choose Action menu, click the appropriate category.

To set threat level to a process

1. Go to Inventory > Processes.

2. Select the check box next to the processes.

3. In the Choose Action menu, click the appropriate threat level.

For more detailed information on scripting and Disallowed Programs Policy, refer to Chapter 9: Using the Scripting Features, starting on page 161.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 99

Page 100: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

To meter a process

1. Go to Inventory > Processes.

2. Click the check box next to the processes.

3. In the Choose Action menu, click Meter Selected Items(s).

The process are added to the list of processes to be monitored in the Metering tab. For more information on Software Metering, refer to Asset Management Guide.

Managing Your Startup Program InventoryThe K1000 Management Appliance Startup feature allows you to keep track of startup programs on all agent machines across your enterprise.

The Startup feature records and reports the startup program detail information. Detail pages provide information on startup programs, including the name of the computer running those startup programs, system description, and the last user.

Using Startup feature, you can:

• View startup program details

• Delete selected startup programs

• Apply or remove labels

The startup programs are categorized in: Audio / Video, Business, Desktop, Development, Driver, Games, Internet, Malware, Security, and System Tool.

To view Startup detail information

1. Go to Inventory > Startup.

The Startup Programs page appears.

2. Click the startup program name to view details.

The Startup Programs : Edit Startup Programs Detail page appears.

3. Select labels to assign to startup program using the Assign To Label option.

4. (Optional) Enter notes that further describe this startup program in the Notes field.

5. Select the category of the startup program in the Category drop-down list.

6. Select the threat level of the startup program in the Threat Level drop-down list.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

100 Administrator Guide, Version 5.3

Page 101: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

7. Click Save to save the startup program details.

You can also see computers with running the selected startup program. You can view a printer friendly version of this page and take print outs of the report.

To delete a startup program

1. To delete startup programs, do one of the following:

• From the Startup Programs List view, select the check box next to the startup program, and then in the Choose Action menu, click Delete Selected Item(s).

• From the Startup Program : Edit Startup Program Detail page, click Delete.

2. Click OK to confirm deleting the selected startup program.

To apply a label to a startup program

1. Go to Inventory > Startup.

2. Select the check box next to the startup programs you want to apply a label to.

3. Select the appropriate label to apply from the Choose Action menu.

To remove a label from a startup program

1. Go to Inventory > Startup.

2. Select the check box next to the startup programs you want to remove from the label.

3. In the Choose Action menu, click the appropriate label under Remove Label.

To categorize a startup program

You can read comments on the startup program submitted by other users by clicking [Read Comments]. You can also ask for help from KACE about the startup programs by clicking [Ask For Help.] You need a KACE user name and password to log in to the Dell KACE database.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 101

Page 102: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

1. Go to Inventory > Startup.

2. Select the check box next to the startup programs you want to categorize.

3. In the Choose Action menu, click the appropriate category.

To set threat level to a startup program

1. Go to Inventory > Startup.

2. Select the check box next to the startup programs.

3. In the Choose Action menu, click the appropriate threat level.

Managing Your Service InventoryThe K1000 Management Appliance Service feature allows you to keep track of services running on all agent machines across your enterprise.

The Service feature records and reports the services information in detail. Detail pages provide information on services, including the name of the computer running those services, system description, and the last user.

Using Services feature, you can:

• View services details

• Delete selected services

• Apply or delete labels

The services are categorized in: Audio / Video, Business, Desktop, Development, Driver, Games, Internet, Malware, Security, and System Tool.

To view service detail information

1. Go to Inventory > Service.

The Services page appears.

2. Click the service name to view details.

The Service : Edit Service Detail page appears.

3. Select labels to assign to service using the Assign To Label option.

4. Enter any notes that further describe this service in the Notes field.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

102 Administrator Guide, Version 5.3

Page 103: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

5. Select the category of the service in the Category drop-down list.

6. Select the threat level of the service in the Threat Level drop-down list.

7. Click Save to save the service details.

You can also see computers with running the selected startup program. You can view a printer friendly version of this page and take print outs of the report.

To delete a service

1. To delete services, do one of the following:

• From the Services List view, select the check box next to the service, and then in the Choose Action menu, click Delete Selected Item(s).

• From the Process detail page, click Delete.

2. Click OK to confirm deleting the selected service.

To apply a label to a service

1. Go to Inventory > Service.

2. Select the check box next to the services you want to apply a label to.

3. In the Choose Action menu, click the appropriate label to apply.

To remove a label from a service

1. Go to Inventory > Service.

2. Select the check box next to the services you want to remove the label from.

3. In the Choose Action menu, click the appropriate label under Remove Label.

You can read comments on the service submitted by other users by clicking [Read Comments]. You can also ask for help from Dell KACE about the service by clicking [Ask For Help.] You need a KACE username and password to log in to the Dell KACE database.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 103

Page 104: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

To categorize a service

1. Go to Inventory > Service.

2. Select the check box next to the services you want to categorize.

3. In the Choose Action menu, click the appropriate category.

To set a threat level to a service

1. Go to Inventory > Service.

2. Select the check box next to the services.

3. In the Choose Action menu, click the appropriate threat level.

Managing Your MIA (Out-Of-Reach Computer) Inventory

The K1000 Management Appliance MIA tab offers a list of the nodes that have not checked in to the appliance in some time. You can filter the MIA view by computers that have missed the last first, fifth, or tenth syncs, or which have not communicated with appliance in the last 1-90 days. The MIA tab also displays the IP and MAC Addresses of these computers.

From the MIA tab, you can remove the computers from the appliance Inventory and assign them to labels to group them for management action.

Configuring the MIA SettingsYou can configure the MIA Settings to enable the appliance to automatically delete computers from the inventory after they have not checked in for a specified number of days. This eliminates the need to manually delete the computers from the Computers - MIA page.

To configure the MIA settings

1. Go to Inventory > MIA.

2. In the Choose Action menu, click Configure Settings.

The MIA Settings page appears.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

104 Administrator Guide, Version 5.3

Page 105: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

3. Enter the following information:

4. Click Save.

To delete an MIA computer

1. Go to Inventory > MIA.

2. Select the check box next to the computers you want to delete.

3. In the Choose Action menu, click Delete Selected Item(s).

4. Click OK to confirm deleting the computer.

To apply a label to an MIA computer

1. Go to Inventory > MIA.

2. Select the check box next to the computers you want to apply a label to.

3. In the Choose Action menu, select the appropriate label to apply .

To create a new label

For example, you can create a label on any tab in Inventory:

1. Click Inventory, and click the tab you want to work with, for example, Software.

2. In the Choose Action menu, click Add Label.

3. In the Add Label window, enter a name for the new label.

4. Click Save.

Automatically delete MIA computers

Select this check box to enable automatic deleting of MIA computers.

Days Enter the period in number of days. Computers that do not communicate with the appliance for the number of days specified are automatically deleted.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Avoid using a backslash (\) in Label names. If used, be sure to escape the backslash with another backslash.

Administrator Guide, Version 5.3 105

Page 106: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

Using the AppDeploy Live Application Information Clearinghouse

AppDeploySM (or AppDeploy.com) contains information on installation, deployment, and systems management automation. (However, it does not tie directly into the appliance.) By centralizing relevant information in one place, AppDeploy.com reduces the need for searching answers through vendor sites, discussion boards, and technical publications. This website provides computer administrators an easier way to search for answers and solutions.

Enabling AppDeploy Live

The AppDeploy Live! website is both a platform for product forums and a source of up-to-date news and announcements. Enabling AppDeploy Live! integrates community submitted information directly from this web site.

1. Click K1000 Settings > Control Panel > General Settings.

2. Click Edit Mode.

3. Click the Enable AppDeploy Live! check box.

4. Click OK on the pop-up confirmation page.

5. Click Set Options to save your changes.

For more information on how to change K1000 General Settings, refer to To configure general settings for the server, on page 35.

Viewing AppDeploy Live contentYou can view AppDeploy Live contents of your appliance. From Inventory, you can view AppDeploy Live information on software, processes, startup programs, and services. AppDeploy Live information can also be viewed from the Distribution > Managed Installations and Distribution > File Synchronization.

You can visit www.AppDeploy.com for more information.

To view AppDeploy Live information

1. Go to Inventory > Software.

The Software page appears, which lists the software installed on nodes.

2. Select a software title to see the associated information from AppDeploy Live.

To perform these steps, be sure to select System in the Organization drop-down list in the top-right hand corner of the page.

If you have not enabled AppDeploy Live, you cannot view AppDeploy Live information. Refer to Using the AppDeploy Live Application Information Clearinghouse, on page 106.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

106 Administrator Guide, Version 5.3

Page 107: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

The Software : Edit Software Detail page appears.

3. Scroll Down to view AppDeploy Live information.

Using the Dell Warranty feature

The Dell Warranty feature runs a background service that gathers and updates warranty information on your Dell computers that are in Inventory.

This background service runs every four hours and selects a different organization in a round-robin fashion. Every four hours, the service runs on approximately 100 machines per organization. Over time, warranty information is gathered and updated for all Dell machines.

This process may take a week or up to a month to acquire warranty information for all of the Dell machines across different organizations. If you need to see warranty information immediately, there is an option to gather warranty information on a single Dell machine instantly.

You can download warranty information into a CSV file for a single or multiple machines within your organization.

From the Dell Warranty tab, you can also access the Dell Support Web site to renew your warranty information if it is out of date or view additional details about your warranty.

To obtain Dell Warranty information on a single Dell machine instantly

1. Go to Inventory > Computers.

The Computers : Detail Item <Machine Name> page appears.

2. Select the Dell machine in the list of computers for which you wish to gather warranty information to view the machine details.

3. Under the Inventory Information section, select the Hardware link.

The Dell Warranty feature only works for Dell computers that are in inventory.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 107

Page 108: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

If this is a Dell computer that you have selected, you will see Dell warranty information under the Dell Service Info section as shown in the following figure:

4. Select the Refresh button.

The warranty information is updated immediately for this machine.

To renew Dell Warranty information

1. Go to Inventory > Computers.

The Computers : Detail Item <Machine Name> page appears.

2. Select the Dell machine in the list of computers for which you wish to renew warranty information.

3. Under the Inventory Information section, select the Hardware link.

4. Select the [email protected] link in the Dell Service Info section.

You will be redirected to the Dell Support Web site. Here you can renew your warranty information if it is outdated. You can also view additional information about your existing warranty.

To run Dell Warranty reports

1. Go to Reporting > Reports.

The K1000 : Reports page appears.

2. From the View By drop-down list in the top-right corner of the page, select Dell Warranty.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

108 Administrator Guide, Version 5.3

Page 109: Dell KACE K1000 Admin Guide

Managing Software and Hardware Inventories5

3. View the following reports:

• Dell Warranty Expired

• Dell Warranty Expires in the Next 60 Days

You can run these reports and store them as HTML, CSV or PDF files.

These reports are available at both the Organization level and the System level within the K1000 Management Appliance.

Administrator Guide, Version 5.3 109

Page 110: Dell KACE K1000 Admin Guide

5 Managing Software and Hardware Inventories

110 Administrator Guide, Version 5.3

Page 111: Dell KACE K1000 Admin Guide

6

Importing and Exporting Appliance

Resources

This chapter explains how to transfer K1000 Management Appliance resources between organizations within an appliance and between separate appliances.

• Importing and exporting resources, on page 111.

• Transferring resources using a SAMBA share, on page 111.

• Transferring resources between Organizations, on page 115.

Importing and exporting resourcesThe Administrator Portal offers you the ability to import and export the following resources components between separate K1000 Management Appliances or between different organizations within an appliance:

• Email alerts

• Managed Installations

• Reports

• Scripts

• Smart labels

• Software components from Inventory

• Ticket rules

All K1000 Management Appliance have built-in SAMBA share directories, allowing you to import and export appliance resources among them. For details, see the Transferring resources using a SAMBA share section.

If you use the Organizational Management component of the K1000 Management Appliance, you also can transfer resources between organizations within an appliance. For details, see Transferring resources between Organizations, on page 115. If you do not use Organizational Management, its options are not displayed.

Transferring resources using a SAMBA shareAny appliance can export the resources listed in Importing and exporting resources to another appliance using their SAMBA share directories as staging areas.

Administrator Guide, Version 5.3 111

Page 112: Dell KACE K1000 Admin Guide

6 Importing and Exporting Appliance Resources

Export resources from one appliance to another using SAMBA shares

1. Open the Administrator Portal of the appliance from which to export resources.

2. Go to Settings > Resources.

The Resource Management Panel appears.

3. Click Export K1000 Resources.

The Export K1000 Resources page appears, listing all of the resources available to export.

By default, all available resources on the appliance are listed. You can limit the resources to view using the drop-down list and Search field on the right side of the page. Select a resource from the View by list to display only that resource category.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

112 Administrator Guide, Version 5.3

Page 113: Dell KACE K1000 Admin Guide

Importing and Exporting Appliance Resources6

Enter a term in the Search field to limit the resources list even further. In this example, only reports with the term closed in the description are listed:

4. Select the check boxes next to those resources you wish to export.

5. In the Choose Action menu, click Export to SAMBA Share.

The Annotate Exported Resource(s) splash screen appears.

6. Enter a description of the components to export in the Notes field and click Save.

Your exported resources first appear on the Resource Manager Queue page with a Status of New Request. Click the Refresh button to update this page. When finished, the Status changes to Completed. Most import/export tasks only take a moment, but very large resources take longer. This page does not refresh by itself for several minutes.

The resources you exported are now available on your SAMBA share for other K1000 Management Appliance to import.

7. Go to Settings > Control Panel > General Settings. and note the location of the SAMBA share directory in the SAMBA Share Settings section.

You need to copy the appliance resources from this directory to the SAMBA share of the appliance importing the software.

8. For the importing appliance, go to Settings > Control Panel, and click General Settings.

The K1000 Settings: General page appears.

9. In the SAMBA Share Settings section, note the location of the SAMBA share directory.

10. Using a third-party file copying utility, copy the resources from the exporting appliance SAMBA share to the importing appliance SAMBA share.

11. For the importing appliance, go to Settings > Resources.

Administrator Guide, Version 5.3 113

Page 114: Dell KACE K1000 Admin Guide

6 Importing and Exporting Appliance Resources

The Resource Management Panel appears:

12. Click Import K1000 Resources.

The Import K1000 Resources page appears, listing all of the appliance resources available to import.

13. From Choose Action menu, click Import Resource(s) from SAMBA Share.

The Import Resources from SAMBA Share Directory page appears.

114 Administrator Guide, Version 5.3

Page 115: Dell KACE K1000 Admin Guide

Importing and Exporting Appliance Resources6

14. Select the resource files to import, and click Import Resources.

Your imported resources first appear on the Resource Manager Queue page with a Status of New Request. Click Refresh to update this page. When finished, the Status changes to Completed.

Most import/export tasks only take a moment, but very large resources take longer. This page does not refresh by itself for several minutes.

Once you see a Status of Completed, the resources you imported are available and listed on their respective tabs (Reporting, Inventory > Software, Scripting, Distribution > Managed Installations) for your organization to use.

Transferring resources between OrganizationsYou transfer resources between KACE K1000 Appliance organizations by exporting them from one organization and then importing them into another. The sections below explain how to do this.

Administrator Guide, Version 5.3 115

Page 116: Dell KACE K1000 Admin Guide

6 Importing and Exporting Appliance Resources

Exporting resources to Other Organizations on an appliance

The first step in transferring any of the resources listed in Importing and exporting resources is exporting them from one organization, which is explained in this section.

1. Go to Settings > Resources.

The Resource Management Panel appears.

2. To export resources from one organization to the others, click Export K1000 Resources.

The Export K1000 Resources page appears, listing all of the resources on the appliance available to export.

3. Select the check boxes next to the resources you wish to export.

4. In the Choose Action menu, click Export to Local K1000.

The Annotate Exported Resource(s) splash screen appears.

5. Enter a brief comment describing the exported resources in the Note field, and then click Save.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

116 Administrator Guide, Version 5.3

Page 117: Dell KACE K1000 Admin Guide

Importing and Exporting Appliance Resources6

Your exported resources first appear on the Resource Manager Queue page with a Status of New Request. In a few minutes, the export will complete, and the Status changes to Completed. Click the Refresh button to update this page.

The resources you exported are now available for other organizations on your appliance to import. For details on importing these resources into another organization, see the Importing resources from another organization on your appliance section.

Importing resources from another organization on your applianceOnce resources are exported from an organization, they are available to the other organizations on that appliance to import and use. If you have not yet exported the appliance resources you need, follow the instructions in the Exporting resources to Other Organizations on an appliance section.

To import appliance resources from another appliance, follow the instructions in the Transferring resources using a SAMBA share section.

Import software components from another organization

1. Go to Settings > Resources.

The Resource Management Panel appears.

2. Click Import K1000 Resources.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 117

Page 118: Dell KACE K1000 Admin Guide

6 Importing and Exporting Appliance Resources

The Import K1000 Resources page appears, listing all of the resources available to import:

3. Select the check boxes next to the resources that you would like to import.

4. In the Choose Action menu, click Import Selected Resource(s).

The Resource Manager Queue page appears.

Your imported resources first appear on the Resource Manager Queue page with a Status of New Request. Click the Refresh button to update this page. When finished, the Status changes to Completed. Most import/export tasks only take a moment to complete, but very large resources take longer. This page may not refresh for several minutes.

Once you see a Status of Completed, the resources you imported are available on the respective pages (Reports, Inventory > Software, Scripting, Distribution > Managed Installations) for your organization.

118 Administrator Guide, Version 5.3

Page 119: Dell KACE K1000 Admin Guide

7

Scanning for IP Addresses

IP scan allows you to scan a range of IP addresses to detect the existence and attributes of various devices on a network.

• IP Scan Overview, on page 119.

• Viewing Scheduled Scans list, on page 119.

• Creating an IP Scan, on page 120.

IP Scan OverviewThe K1000 Management Appliance can scan a range of IP addresses for SNMP-enabled machines, allowing you to retrieve information about machines connected to your network. Although IP scans have their own server-side scheduling, you can invoke a scan on-demand or schedule an IP scan to run at a specific time.

IP Scan reports a variety of inventory data, allowing you to monitor the availability and service level of a target machine. IP Scan scans ports in addition to IP addresses. You can collect data even without knowing the IP addresses of the target machines.

It can scan any type of device (as long as the device has an IP address on the network), including computers, virtual machines, printers, network devices, servers, wireless access points, routers, and switches.

Viewing Scheduled Scans listBy default, the IP Scan tab displays the available scans. From this page, you can also:

• Schedule a new scan.

• Delete scans.

About scan resultsOn the scan results page, you can:

• Schedule new scan.

• Apply a label or a Smart Label or delete a label.

• Create a remote connection to the machine. (This can be done only if configured under Machine Action.)

Administrator Guide, Version 5.3 119

Page 120: Dell KACE K1000 Admin Guide

7 Scanning for IP Addresses

To view scan results

There are other ways to get to scan results. The following is an example:

1. Go to Inventory > IP Scan.

2. In the Choose Action menu, click View Scan Inventory.

The Network Scan Results page opens.

Creating an IP ScanYou can create a network scan that will search for DNS, Socket, and SNMP across a single subnet or multiple subnets. You also define a network scan to search for devices listening on a particular port (for example, Port 80). This allows you to view devices that are connected to your network even when the agent is not installed on those devices.

When defining a network scan, balance the scope of the scan (number of IP addresses you are scanning) with the depth of the probe (number of attributes you are scanning for), so that you do not overwhelm your network or the appliance. For example, if you need to scan a large number of IP addresses frequently, keep the number of ports, TCP/IP connections, and so on, relatively small. As a general rule, scan a particular subnet no more than once every few hours.

To create an IP scan

1. Go to Inventory > IP Scan.

The Network Scan Settings page appears.

2. In the Choose Action menu, click Add New Item.

The Network Scan Setting page appears.

3. Enter a name for the scan in the Network Scan Friendly Name field.

4. Enter the IP range to scan in the Network Scan IP Range field.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

The agent listens to port 52230. To determine which machines on your network are running an agent, define a network scan to report which machines are listening on that port.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

120 Administrator Guide, Version 5.3

Page 121: Dell KACE K1000 Admin Guide

Scanning for IP Addresses7

5. Specify the DNS lookup test details:

6. Select the Ping Test Enabled check box.

If the Ping and Socket tests are disabled, you cannot run the other tests. The Ping or Socket tests determine if the address is alive. If it is, you can run an SNMP or a Port Scan against it.

7. Specify the connection test details:

8. Specify SNMP test details:

9. Specify port scan test details:

10. Specify the scan schedule:

DNS Lookup Enabled

Check live addresses against the DNS server to see if they have an associated name. This can help you identify known nodes on your network.

Name Server for Lookup

Enter the host name or IP address.

Lookup Time Out Enter the time out interval (in seconds).

Connection Test Enabled

Select this check box to perform connection testing during network scan.

Connection Test Protocol

Enter the protocol to use.

Connection Test Port Enter the port to use for testing the connection.

Connection Time Out Enter the time out interval (in seconds).

SNMP Enabled Select this check box to enable SNMP scanning.

SNMP Public String Enter the community string to query. (Public is the default.) The query only runs if authentication is not required. When authentication is required, the scan returns SNMP enabled with no system data.

Device Port Scan Enabled

Select this check box to enable port scanning of device ports.

TCP Port List Enter a comma-separated list of TCP ports to scan.

UDP Port List Enter a comma-separated list of UDP ports to scan.

Port Scan Time Out Enter the time out interval (in seconds).

Don’t Run on a Schedule Run in combination with an event rather than on a specific date or time.

Run Every n minutes/hours

Run the scan at a specified interval.

Administrator Guide, Version 5.3 121

Page 122: Dell KACE K1000 Admin Guide

7 Scanning for IP Addresses

11. Click Save.

To search network scan results on the basis of status fields

1. Click Inventory > IP Scan.

The Network Scan Settings page appears.

2. In the Choose Action menu, click View Scan Inventory.

The Network Scan Results page appears.

3. Click the Advanced Search tab.

4. Select an attribute from the drop-down list.

For example: Ping Status.

5. Select a condition from the drop-down list.

For example: =.

6. Enter the attribute value.

For example, to search machines that have a successful ping status, enter 1.

7. Click Search.

The search results are displayed below.

Run Every day/specific day at HH:MM AM/PM

Run the schedules daily at a specified time, or run on a designated day of the week at a specified time.

Run on the nth of every month/specific month at HH:MM AM/PM

Run either monthly at a specified time and day or run at a designated time and day on a specified month.

Deleting a scan configuration also deletes all associated scan inventory items. If you want to maintain the scan inventory, but do not want to “rescan,” set the schedule of the scan configuration to not run.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Clicking the IP address of a network device displays the values for Ping Status, Connection Status, and SNMP Status as Succeeded or Failed. However, the underlying database fields actually contain a 0 for Failed and 1 for Succeeded.

Therefore, when using these fields as criteria for advanced search, Smart Labels, or notifications, you must enter the numeric values.

122 Administrator Guide, Version 5.3

Page 123: Dell KACE K1000 Admin Guide

Scanning for IP Addresses7

IP Scan Smart LabelThe IP Scan Smart Label searches for all devices that are detected in the Network Scan, including DNS, Socket, and SNMP across a single subnet or multiple subnets.

Smart Labels enable you to dynamically identify based on a search criteria.

To dynamically identify the network scan results

1. Click Home > Label.

The Labels page appears.

2. On the Labels page, click Smart Labels.

3. In the Choose Action menu, click Add New IP Scan Smart Label.

The Network Scan Results page appears.

4. Specify the search criteria.

5. Choose or enter the label to associate with the Smart Label.

6. To see whether the Smart Label produces the desired results, click Test Smart Label.

7. Click Create Smart Label.

When devices that meet the specified criteria are detected in the network scan, they are automatically assigned to the associated Smart Label. You can modify or delete a Smart Label after it has been created from the Home > Label > Smart Labels page.

You can specify the order in which IP Scan Smart Labels are run by changing their order value.

To edit the order value of IP Scan Smart Labels

1. Click Home > Label.

2. On the Labels page, click Smart Labels.

3. In the Choose Action menu, click Order IP Scan Smart Labels.

The Order IP Scan Smart Labels page appears.

4. Click the icon next to an order value to modify it.

5. Enter the appropriate order value, and click Save.

IP Scan Smart Labels with lower order values are run before those with higher order values. The default order value for a new IP Scan Smart Label is 100.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 123

Page 124: Dell KACE K1000 Admin Guide

7 Scanning for IP Addresses

124 Administrator Guide, Version 5.3

Page 125: Dell KACE K1000 Admin Guide

8

Distributing Software from Your

K1000 Management Appliance

The K1000 Management Appliances software distribution features offer various methods for deploying software, updates, and files to the computers on your network.

• Distribution Feature Overview, on page 125.

• Types of Distribution Packages, on page 126.

• Managed Installations, on page 129.

• Examples of common deployments on Windows, on page 133.

• Examples of Common Deployments on Linux, on page 139.

• Examples of Common Deployments on Mac OS, on page 143.

• File Synchronizations, on page 143.

• Wake-on-LAN, on page 145.

• Replication, on page 148.

• Managing iPhone Profiles, on page 153.

• Managing Dell Systems with Dell Updates, on page 155.

• Configuring Dell OpenManage Catalog Updates, on page 158.

Distribution Feature OverviewDell recommends that customers follow a predefined set of procedures before deploying any software on their network. The following illustration represents a high-level example of a generic distribution process. This process can be modified to meet the needs of your organization. However, to avoid distribution problems, it is important to test various deployment scenarios prior to deployment.

Administrator Guide, Version 5.3 125

Page 126: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

Figure 8-1: Basic Deployment procedure

One of the most important concepts in the deployment procedure is to test each deployment before rolling it out to a large number of users. The appliance verifies that a package is designated for a particular system, machine, or operating system. However, the appliance cannot assess the compatibility with other software on the target machine. Therefore, establish procedures for testing each piece of software before deploying it on your network.

For example, develop a test group of target machines, and deploy the required software using your appliance. This practice helps you to verify the compatibility of the software with the operating system and other applications within your test group. You can create a test label and perform a test distribution before you go live in your environment. You can create a test label from the Home > Labels tab.

This chapter focuses primarily on the test, target, and deploy portions of this flow diagram. For more details on creating an inventory of computers and software packages in use on your network, see Chapter 8: Distributing Software from Your K1000 Management Appliance, starting on page 125.

Types of Distribution PackagesThe primary types of distribution packages that can be deployed on the nodes in the network are:

• Managed installations

• File synchronizations

• Appliance agents

Distribution packages (whether for managed installation, file synchronization, or user portal packages) cannot be created until a digital file is associated with an Inventory item. This rule applies even if you are:

Inventory &Assess

Test

Target

Report

Deploy

126 Administrator Guide, Version 5.3

Page 127: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

• Sending a command, rather than an installation or a digital file, to target machines.

• Redirecting the appliance agents to retrieve the digital asset (for example, .exe, .msi) from an alternate download location.

To create a distribution1. Install the package manually on a machine.

2. Take an inventory of that machine. For more information on how to take an inventory, see Managing Your Software Inventory, on page 91.

3. Use the item listed in the Software Inventory list for the Managed Installation.

To create packages with different settings, such as parameters, labels, or deployment definitions, you can create multiple distribution packages for a single Inventory item. However, the Managed Installation (MI) cannot be verified against more than one inventory item because the MI checks for the existence of only one inventory item.

Distributing packages from the appliancePackages distributed through the appliance are only deployed to target nodes if the Inventory item is designated to run on the target’s operating system. For example, if the Inventory item is defined for Windows XP Professional only, the Inventory item does not deploy to targets with Windows 2000.

Also the package does not deploy to nodes that are not included in the machine label. For example, if the deployment package is set to deploy to a label called ‘Office A’, the package does not deploy to machines that are not in ‘Office A’. When an appliance creates a software inventory item, it only records the operating systems on which the item was installed in the Inventory detail record.

A managed installation must be enabled by selecting a managed action and a deployment window.

Ensuring that Inventory item package names matchIf the display name of the Software Inventory item does not exactly match the name that the software registers in Add/Remove programs, the appliance may attempt to deploy a package repeatedly even though it is already there.

To ensure that the Inventory item display name exactly matches:

1. Install the package on a target machine.

2. Take an automatic inventory of that machine using the appliance.

The newly installed package appears in the Inventory list.

Although the K1000 Agent tab is listed under the Distribution tab, “Deploying K1000 Agent” is discussed as part of the installation and setup process in Chapter 1: Getting Started, starting on page 15. For information about updating an existing version of the appliance agent, see K1000 Agent Update, on page 78.

Administrator Guide, Version 5.3 127

Page 128: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

You can then associate a digital file and create one or more deployment packages.

Distributing Packages from an Alternate LocationThe K1000 Management Appliance supports software distribution from alternate locations. The agent can retrieve digital installation files from remote locations, including a UNC address, DFS source, or an HTTP location. The CIFS and SMB protocols, SAMBA servers, and file server appliances are supported by your K1000 Management Appliance.

The alternate download feature addresses administrative issues, such as:

• Supporting remote sites with restricted bandwidth, which might result in difficulties accessing the appliance.

• Avoiding storing large packages on the appliance.

An alternate download location can be any path on the network. Ensure that the alternate location has the required files for installing the application.

To activate this capability, you must enter an alternate checksum (MD5) that matches the MD5 checksum on the remote file share (for security purposes). You may use any tool to establish your checksum.

To create the MD5 checksum, enter:

K1000Client -hash=filename

This displays the MD5 hash for the file.

If no checksum is entered, the digital asset on the file share must exactly match the digital asset associated with the Deployment Package on the K1000 Management Appliance. Also, the target path must include the complete filename (for example, \\fileserver_one\software\adobe.exe).

When to use a replication share or an alternate download locationThe difference between a replication share and an alternate download location is:

• Replication share is a full replication of all digital assets and is managed automatically by the appliance.

When the appliance fetches files, it uses these priorities:

1. Alternate download location

2. Replication share

3. Appliance

If a replication share is specified in the label, the replication share is always used instead of an alternate download location.

If there is no replication share, the agent fails over to the appliance.

128 Administrator Guide, Version 5.3

Page 129: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

• Alternate download location can be any path on the network. You make sure that the alternate location has the files that might be needed for installs of a particular application.

Whenever a replication share is specified for a label, nodes in that label go to that replication share to get files until you remove them from the label or stop using the replication item. If a replication share is specified, that is always be used instead of any other alternate location.

The agent always fails over to appliance in following scenarios:

• There is no replication share specified for any label it is a member of

• There are more than one possible replication shares identified

For more information on replication shares, refer to Replication, on page 148.

Managed Installations

Managed installations enable you to deploy software that requires an installation file to run to the computers on your network. You can create a Managed Installation package from the Distribution > Managed Installation page.

From the Managed Installation tab, you can:

• Create or delete Managed Installations

• Execute or disable Managed Installations

• Specify a Managed Action

• Apply or remove a label

• Search Managed Installations by keyword

Installation parametersYour K1000 Management Appliance allows packaged definitions to contain .msi, .exe,.zip, and other file types for software deployment. If an administrator installs the file on a local machine, either by running a single file, BAT file, or VBScript, the package can be installed remotely by the appliance.

To simplify the distribution and installation process, the package definition can also contain parameters that are passed to the installer at run time on the local machine.

You can use parameters as custom installation settings, for example, a standard install or to bypass auto-restart.

To determine supported parameters for the .msi fileTo identify which parameters are supported by your .msi or other any installer, follow these steps:

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 129

Page 130: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

1. Open an MS-DOS command prompt.

2. Go to the directory that contains the target installer. For example:

c:\...\adobe.exe

3. Enter: filename /?

For example: adobe.exe /?

If that package supports parameters, they are displayed. For example: /quiet, /norestart.

4. Use the parameter definitions identified to update your package definition.

If these steps do not succeed, refer to the software vendor’s documentation.

Creating a managed installation for the Windows platformWhen creating a managed installation, you can specify whether you want to interact with the users using a custom message before or after the installation. You can also indicate whether to deploy the package when the user is logged in or not and limit deployment to a specific label. The following section provides general steps for creating a managed installation. For specific details on creating a managed installation for an .msi, .exe, or .zip file, refer to the subsequent sections.

To create a managed installation for Windows platforms

1. Select Distribution > Managed Installations.

1. In the Choose Action menu, select Add New Item.

2. The Managed Software Installation: Edit Detail page appears.

3. Select the software from the Software drop-down list. You can filter the list by entering any filter options.

4. Enter the following information:

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Also show software without an Associated File

Select this check box to display any software without an associated executable uploaded. You can upload a file to the software record directly from this Managed Installation page.

Upload & Associate New File

Click the Browse button and navigate to the location that contains the new executable of any software selected or to associate an executable to a software without an associated file.

130 Administrator Guide, Version 5.3

Page 131: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

Installation Command

Select the Use Default or Configure Manually option.

Use Default

Run Parameters: Specify the installation behavior as follows:

• The maximum field length is 256 characters. If your path exceeds this limit, on the command line, point to a BAT file that contains the path and the command.

• If your Parameters file path includes spaces, enclose the complete path in quotes. For example: \\kace_share\demo files\share these files\setup.bat

Configure Manually

Installation Command: If desired, specify full command-line parameters in the provided field. Refer to the MSI Command Line documentation for available runtime options.

Un-Install using Full Command Line: Select this check box to uninstall software.

Run Command Only: Select this check box to run the command line only.

Delete Downloaded Files

Select this check box to delete the package files after installation.

Use Alternate Download

Select this check box to specify details for alternate download. When you select this check box, the following fields appear:

• Alternate Download Location: Enter the location where the K1000 Agent can retrieve digital installation files.

• Alternate Checksum: Enter an Alternate Checksum (MD5) that matches the MD5 checksum on the remote file share (for security purposes).

• Alternate Download User: Enter a user name that has the necessary privileges to access the alternate download location.

• Alternate Download Password: Enter the password for the user name.Note: If the target machine is part of a replication label, the appliance does not fetch software from the alternate download location. For more information, refer to Distributing Packages from an Alternate Location, on page 128.Specify an alternate download location only for a specific managed installation. You can also edit an existing label or create a new label that can be used for specifying the alternate location globally. Because that label cannot be specific to any managed installation, you cannot specify an alternate checksum for matching the checksum on the remote file share. For more information, refer to To add or edit a new label, on page 57.

Notes (Optional) Enter additional information in this field.

Administrator Guide, Version 5.3 131

Page 132: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

5. Specify the deployment details:

Managed Actions Managed Action allows you to select an appropriate time for this package to be deployed. Available options are:

• Disabled

• Execute anytime (next available)

• Execute before logon (at machine bootup)

• Execute after logon (before desktop loads)

• Execute while user logged on

• Execute while user is logged off

Deploy to All Machines

Select this check box to deploy the software to all machines.

Limit Deployment To Selected Labels

Select a label to limit deployment only to machines belonging to the selected label. Press CTRL to select multiple labels.If you have selected a label that has a replication share or an alternate download location, the appliance copies digital assets from that replication share or alternate download location instead of downloading them directly from the appliance.Note: The appliance always uses a replication share in preference over an alternate location.

Limit Deployment To Listed Machines

You can limit deployment to one or more machines. Select the machines from the drop-down list to add to the list. You can filter the list by entering filter options.

Deploy Order Select the order to install the software. The lower value deploys first.

Max Attempts Enter the maximum number of attempts, between 0 and 99, to indicate the number of times the K1000 Management Appliance tries to install the package. If you specify 0, the appliance enforces the installation forever.

Deployment Window (24H clock)

Specify the time (using a 24-hour clock) to deploy the package. The Deployment Window times affects any of the Managed Action options. Also, the run intervals defined in the System Console, under K1000 Settings for this specific organization, overrides and/or interact with the deployment window of a specific package.

132 Administrator Guide, Version 5.3

Page 133: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

6. Set user interaction details:

7. Click Save.

Examples of common deployments on WindowsThis section provides examples of the three most common package deployments, which are .msi, .exe, and .zip files.

This section provides examples for each type of deployment.

For each of these examples, you must upload the file to the appliance before creating the Managed Installation package. We recommend that you install the software on a QA machine, wait till the appliance agent connects to the appliance and creates an Inventory item for the software, and then creates the Managed Installation package.

Allow Snooze Click the check box to allow snooze. When you click the check box, the following additional fields appear:

• Snooze Message: Enter a snooze message.

• Snooze Timeout: Enter the timeout, in minutes, for which the message is displayed.

• Snooze Timeout Action: Select a timeout action that take places at the end of the timeout period. For example, if the installation is being carried out when there currently no active users accessing their desktop. You can select Install now to install the software without any hindrance to the users or select Install later if the installer needs some user interaction.

Custom Pre-Install Message

Select this check box to display a message to users prior to installation. When you select the check box, the following additional fields appear:

• Pre-Install User Message: Enter a pre-install message.

• Pre-Install Message Timeout: Enter a timeout, in minutes, for which the message is displayed.

• Pre-Install Timeout Action: Select a timeout action from the drop-down list, this action takes place at the end of the timeout period. Options include Install later or Install now. For example, if the installation is being carried out when there currently no active users accessing their desktop. You can select Install now to install the software without any hindrance to the users or select Install later if the installer needs some user interaction.

Custom Post-Install Message

Select this check box to select a message to users after the installation is complete. When you click the check box, the following additional fields appear:

• Post-Install User Message: Enter a post install message.

• Post-Install Message Timeout: Enter a timeout, in minutes, for which the message is displayed.

Administrator Guide, Version 5.3 133

Page 134: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

Standard MSI exampleUsing .msi files is an easy, self-contained way to deploy software on Windows-based machines. If your .msi file requires no special transformation or customization, the deployment is simple.

MSI files require a /i switch when using other switches with an install.

The appliance parameter line does not require the file name or msiexec syntax. The only the /* input is required:

/qn /I (Correct)

msiexec /I /qn (Incorrect)

To create a managed installation for Windows platforms

1. Select Distribution > Managed Installations.

1. In the Choose Action menu, select Add New Item.

2. The Managed Software Installation: Edit Detail page appears.

3. Select the software from the Software drop-down list. You can filter the list by entering any filter options.

4. Enter the following information:

To use parameters with .msi files, all your target machines must have the same version of Windows Installer (available from Microsoft). Some switches may not be active on older versions. The most up-to-date version of Windows Installer can be distributed to nodes with the appliance.

If you are using Windows Installer 3.0 or later, you can identify the supported parameters by selecting the Run program available from the Start menu. Enter msiexec in the popup window. A window displays, which includes the supported parameters list.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Also show software without an Associated File

Select this check box to display any software without an associated executable uploaded. You can upload a file to the software record directly from this Managed Installation page.

Upload & Associate New File

Click the Browse button and navigate to the location that contains the new executable of any software selected or to associate an executable to a software without an associated file.

134 Administrator Guide, Version 5.3

Page 135: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

Installation Command Select the Use Default or Configure Manually option.

Use Default

Run Parameters: Specify the installation behavior as follows:

• The maximum field length is 256 characters. If your path exceeds this limit, on the command line, point to a BAT file that contains the path and the command.

• If your Parameters file path includes spaces, enclose the complete path in quotes. For example: “\\kace_share\demo files\share these files\setup.bat”.

Configure Manually

Installation Command: If desired, specify full command-line parameters in the provided field. Refer to the MSI Command Line documentation for available runtime options.

Un-Install using Full Command Line: Select this check box to uninstall software.

Run Command Only: Select this check box to run the command line only.

Delete Downloaded Files Select this check box to delete the package files after installation.

Use Alternate Download Select this check box to specify details for alternate download. When you select this check box, the following fields appear:

• Alternate Download Location: Enter the location where the K1000 Agent can retrieve digital installation files.

• Alternate Checksum: Enter an Alternate Checksum (MD5) that matches the MD5 checksum on the remote file share (for security purposes).

• Alternate Download User: Enter a user name that has the necessary privileges to access the alternate download location.

• Alternate Download Password: Enter the password for the user name.

Note: If the target machine is part of a replication label, the appliance does not fetch software from the alternate download location. For more information, refer to Distributing Packages from an Alternate Location, on page 128.Specify an alternate download location only for a specific managed installation. You can also edit an existing label or create a new label that can be used for specifying the alternate location globally. Because that label cannot be specific to any managed installation, you cannot specify an alternate checksum for matching the checksum on the remote file share. For more information, refer to To add or edit a new label, on page 57.

Notes (Optional) Enter any additional information in this field.

Administrator Guide, Version 5.3 135

Page 136: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

5. Specify the deployment details:

Managed Actions Managed Action allows you to select an appropriate time for this package to be deployed. Available options are:

• Disabled

• Execute anytime (next available)

• Execute before logon (at machine bootup)

• Execute after logon (before desktop loads)

• Execute while user logged on

• Execute while user is logged off

Deploy to All Machines Select this check box to deploy the software to all machines.

Limit Deployment To Selected Labels

Select a label to limit deployment only to machines belonging to the selected label. Press CTRL to select multiple labels.If you have selected a label that has a replication share or an alternate download location, the appliance copies digital assets from that replication share or alternate download location instead of downloading them directly from the appliance.Note: The appliance always uses a replication share in preference over an alternate location.

Limit Deployment To Listed Machines

You can limit deployment to one or more machines. Select the machines from the drop-down list to add to the list. You can filter the list by entering filter options.

Deploy Order Select the order to install the software. The lower value deploys first.

Max Attempts Enter the maximum number of attempts, between 0 and 99, to indicate the number of times the K1000 Management Appliance tries to install the package. If you specify 0, the appliance enforces the installation forever.

Deployment Window(24H clock)

Specify the time (using a 24-hour clock) to deploy the package. The Deployment Window times affects any of the Managed Action options. Also, the run intervals defined in the System Console, under K1000 Settings for this specific organization, overrides and/or interact with the deployment window of a specific package.

136 Administrator Guide, Version 5.3

Page 137: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

6. Set user interaction details:

7. Click Save.

Standard EXE ExampleThe standard executable example is identical to the MSI example above with one exception: /I is not required in the “run parameters” line when using an .exe file.

When using an executable file, it is often helpful to identify switch parameters for a quiet or silent installation. To do this, specify /? in the run parameters field.

Standard ZIP ExampleDeploying software using a .zip file is a convenient way to package software when multiple files are required to deploy a particular software title (for example, setup.exe, plus required configuration and data files). For example, if you have a CD-ROM containing a group of files

Allow Snooze Click the check box to allow snooze. When you click the check box, the following additional fields appear:

• Snooze Message: Enter a snooze message.

• Snooze Timeout: Enter the timeout, in minutes, for which the message is displayed.

• Snooze Timeout Action: Select a timeout action that take places at the end of the timeout period. For example, if the installation is being carried out when there currently no active users accessing their desktop. You can select Install now to install the software without any hindrance to the users or select Install later if the installer needs some user interaction.

Custom Pre-Install Message

Select this check box to display a message to users prior to installation. When you select the check box, the following additional fields appear:

• Pre-Install User Message: Enter a pre-install message.

• Pre-Install Message Timeout: Enter a timeout, in minutes, for which the message is displayed.

• Pre-Install Timeout Action: Select a timeout action from the drop-down list, this action takes place at the end of the timeout period. Options include Install later or Install now. For example, if the installation is being carried out when there currently no active users accessing their desktop. You can select Install now to install the software without any hindrance to the users or select Install later if the installer needs some user interaction.

Custom Post-Install Message

Select this check box to select a message to users after the installation is complete. When you click the check box, the following additional fields appear:

• Post-Install User Message: Enter a post install message.

• Post-Install Message Timeout: Enter a timeout, in minutes, for which the message is displayed.

Administrator Guide, Version 5.3 137

Page 138: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

required to install a particular application, you can package them together in a .zip file and upload them to the appliance for deployment.

To create a managed installation for a .zip file

1. Browse to the location that contains the necessary installation files.

2. Select all files and create a .zip file using WinZip or another utility.

3. Create an inventory item for the target deployment.

You can do this manually from the Inventory > Software tab or by installing the package on a node that regularly connects to the appliance.

4. Associate the .zip file with the inventory item and upload it to the appliance.

5. Click Distribution > Managed Installation.

The Managed Installations page appears.

6. In the Choose Action menu, click Add New Item.

The Managed Software Installation : Edit Detail page appears.

7. Select the software title that the .zip file is associated with from the Software drop-down list.

8. In the Run Parameters field, specify the complete command with arguments. For example:

setup.exe /qn

9. Click Save.

When attempting to deploy a .zip file created using WinZip maximum compression, the package may fail to uncompress and you may see an error in the application event viewer or kbxlog.txt with the message:

Unsupported compression mode 9

The appliance agent uses a library called SharpZipLib to uncompress .zip files.

This library supports .zip files using both stored and deflate compression methods and also supports old (PKZIP 2.0) style encryption, tar with GNU long filename extensions, gzip, zlib and raw deflate, as well as BZip2. However, Zip64 and deflate64 are not supported.

Compression mode 9 is deflate64, which in WinZip is called “maximum compression.”

The appliance agent automatically runs deployment packages with .msi and .exe extensions. However, K1000 Management Appliance also provide a capability for administrators to zip many files together and direct the appliance to unpack the ZIP file and run a specific file within. If you intend to deploy a .zip file, you must place the name of the file within the .zip that you would like to run in the Command (Executable) field within the Deployment Package (for example, runthis.exe).

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

138 Administrator Guide, Version 5.3

Page 139: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

To resolve the issue, recreate the zip file using WinZip “normal compression.”

Examples of Common Deployments on LinuxThis section provides examples of the supported package deployments: .rpm .zip, .bin, .tgz, and tar.gz files.

For each of these examples, you must have already uploaded the file to the appliance prior to creating the Managed Installation package. We recommend installing the software on a QA machine, waiting a sufficient amount of time for the appliance agent to connect to the K1000 Management Appliance and create an inventory item for the software, and then creating the Managed Installation package.

To create a managed installation for an .rpm file

You can deploy software on Linux-based machines using .rpm files.

1. Click Distribution > Managed Installations.

The Managed Installations page appears.

2. In the Choose Action menu, click Add New Item.

The Managed Installation: Edit Detail page appears.

3. Select the software from the Software drop-down list.

You can filter the list by entering any filter options.

4. By default, the appliance agent attempts to install the .rpm file using the following command. In general, this is sufficient to install a new package or update an existing one to a new version:

rpm -U packagename.rpm

If you have selected a .zip/.tgz/tar.gz file, the content is unpacked, and the root directory searched for all .rpm files. The installation command is run against each of these files. The appliance finds all rpm files at the top level of an archive automatically, so you can install more than one package at a time. You can also create an archive containing a shell script and then specify that script name as the full command. The appliance runs that command if it is found, and logs an error if is not.

To change the default parameters, you have to specify this in the Run Parameters field. You can specify wildcards in the filenames you use. If the filename contains spaces, enclose it in single or double quotation marks. The files are extracted into a

directory in /tmp and it becomes the current working directory of the command.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

On Red Hat Linux, you do not need to include any other files in your archive other than your script if that is all you want to execute.

Administrator Guide, Version 5.3 139

Page 140: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

If the PATH environment variable of your root account does not include the current working directory, and you want to execute a shell script or other executable that you have included inside an archive, specify the relative path to the executable in the Full Command Line field. The command is executed inside a directory alongside the files that have been extracted.

For example, to run a shell script called installThis.sh, package it alongside an .rpm file, and then enter the command: ./installThis.sh in the Installation Command field. If you archived it inside another directory, the Installation Command field is:

./dir/filename.sh

Both these examples, as well as some other K1000 Management Appliance functions, assume that “sh” is in the root's PATH. If you're using another scripting language, you may need to specify the full path to the command processor you want to run in the Installation Command, like

/bin/sh ./filename.sh

Include appropriate arguments for an unattended, batch script.

If you select the uninstall check box in the MI detail, the agent runs the following command on either your standalone rpm file or each rpm file it finds in the archive, removing the packages automatically:

//usr/sbin/rpm -e packagename.rpm

Removing software in this way is performed only if the archive or package is downloaded to the node. If you select the Uninstall Using Full Command Line check box, specify a full command line in the Installation Command field to ensure the correct removal command is run on the correct package. Because no package is downloaded in this case, specify the path in the installation database where the package receipt is stored.

5. If your package requires additional options, you can enter the following installation details:

Run Parameters (Optional) You do not need to specify parameters if you have an .rpm file. Enter a value to override (Default -U default). For example, if you set Run Parameters to: -ivh --replacepkgs, then the command that runs on the computer is:rpm -ivh –replacepkgs package.rpm

Installation Command You do not need to specify a full command line if you have an .rpm file. The appliance executes the installation command by itself. The Linux node tries to install this via: rpm [-U | Run Parameters] "packagename.tgz”If you do not want to use the default command, you can replace it completely by specifying the complete command line here. If you have specified an archive file, this command is run against all of the .rpm files it can find.

140 Administrator Guide, Version 5.3

Page 141: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

6. Specify the deployment details:

7. Set user interaction details:

Un-Install using Full Command Line

Click the check box to uninstall software. If a Full Command Line above is entered, it is run. Otherwise, by default the agent attempts to run the command, which is generally expected to remove the package.

Run Command Only Click the check box to run the command line only. This does not download the actual digital asset.

Notes (Optional) Enter additional information in this field.

Managed Action Managed Action allows you to select the most appropriate time for this package to be deployed. Execute anytime (next available) and Disabled are the only options available for Linux platform.

Deploy to All Machines Click the check box to deploy to all the machines.

Limit Deployment To Selected Labels

Select a label to limit deployment only to machines belonging to the selected label. Press CTRL to select multiple labels.If you have selected a label that has a replication share or an alternate download location, then the appliance copies digital assets from that replication share or alternate download location instead of downloading them directly from appliance. Note: The appliance always uses a replication share in preference over an alternate location.

Limit Deployment To Listed Machines

You can limit deployment to one or more machines. Select the machines from the drop-down list to add to the list. You can filter the list by entering filter options.

Deploy Order The order in which software is installed. The lower value deploys first.

Max Attempts Enter the maximum number of attempts, between 0 and 99, to indicate the number of times the K1000 Management Appliance tries to install the package. If you specify 0, the appliance enforces the installation forever.

Deployment Window(24H clock)

Specify the time (using a 24-hour clock) to deploy the package. The Deployment Window times affects any of the Managed Action options. Also, the run intervals defined in the System Console, under K1000 Settings for this specific organization, override and/or interact with the deployment window of a specific package.

Allow Snooze This option is not available for Linux platform.

Custom Pre-Install Message

This option is not available for Linux platform.

Custom Post-Install Message

This option is not available for Linux platform.

Delete Downloaded Files Select this check box to delete the package files after installation.

Administrator Guide, Version 5.3 141

Page 142: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

8. Click Save.

Standard TAR.GZ ExampleDeploying software using a tar.gz file is a convenient way to package software when more than one file is required to deploy a particular software title (for example, packagename.rpm, configuration, and data files). If you have a CD-ROM containing a group of files required to install a particular application, you can package them together in a tar.gz file, and upload them to your appliance for deployment.

To create a managed installation for a tar.gz file

1. Use the following two commands to create tar.gz file:

a. tar –cvf filename.tar packagename.rpm

b. gzip filename.tar

This creates filename.tar.gz

2. Create an inventory item for the target deployment.

Use Alternate Download Select this check box to specify details for alternate download. When you select this check box, the following fields appear:

• Alternate Download Location: Enter the location from where the K1000 Agent can retrieve digital installation files.

• Alternate Checksum: Enter an Alternate Checksum (MD5) that matches the MD5 checksum on the remote file share (for security purposes).

• Alternate Download User: Enter a user name that has the necessary privileges to access the Alternate Download Location.

• Alternate Download Password: Enter the password for the user name specified above.

Note: If the target machine is part of a replication label, then the appliance does not fetch software from the alternate download location. For more information on using an alternate location, refer to Distributing Packages from an Alternate Location, on page 128.Here you specify an alternate download location only for a specific managed installation. You can also edit an existing label or create a new label that can be used for specifying the alternate location globally. But since that label cannot be specific to any managed installation, you cannot specify an alternate checksum for matching the checksum on the remote file share. For more information on how to create or edit labels, refer to About Labels, on page 53.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

142 Administrator Guide, Version 5.3

Page 143: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

You can do this manually from the Inventory > Software tab, or by installing the package on a K1000 Agent machine that regularly connects to the K1000 Management Appliance.

3. Associate the tar.gz file with the Inventory item, and upload it to the appliance.

4. Click Distribution > Managed Installation.

The Managed Installations page appears.

5. In the Choose Action menu, click Add New Item.

The Managed Software Installation: Edit Detail page appears.

6. Select the software title with which the tar.gz file is associated from the Software drop-down list.

This file is uncompressed and searched for all .rpm files. The installation command is run against each of them.

If no Run Parameters are filled in, -U is used by default.

You do not need to specify a full command line. The server executes the installation command by itself. The Linux node tries to install this using:

rpm [-U | Run Parameters] "packagename.tgz”

7. Enter other package details as described in the Managed Installations, on page 129 procedures for .rpm file above.

8. Click Save.

The agent automatically runs deployment packages with .rpm extensions. However, the appliance also provides a capability for administrators to zip many files together and direct the K1000 Management Appliance to unpack the zip and run a specific file within.

Examples of Common Deployments on Mac OSFor information on common deployments on Macintosh, refer to Appendix A: Administering Mac OS Nodes, starting on page 259.

File SynchronizationsFile synchronizations enable you to distribute software files to the computers on your network. These can be any type of file, such as PDF, ZIP files, or EXE files, which are simply downloaded to the user’s machine, but not installed.

Creating a file synchronizationUsing file synchronizations, you can push out any type of file to the computers on your network. You can choose to install the files from the appliance, or you can specify an alternate location from where users download the file. The string KACE_ALT_Location in the Alternate Download Location field is replaced with the value assigned by the

Administrator Guide, Version 5.3 143

Page 144: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

corresponding label. You should not have a machine in more than one label with an Alternate Download Location specified.

To create a file synchronization

1. Click Distribution > File Synchronization.

The File Synchronizations page appears.

2. In the Choose Action menu, click Add New Item.

The File Synchronization: Edit Detail page appears.

3. Select the software title to install in the Software Title to Install drop-down list.

4. Set or modify the following installation details:

5. Specify the deployment details:

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Notes Enter any information related to the software title selected.

Location (full directory path)

Enter the location on the users machine where you want to upload this file.

Location User If the Location specified above is a shared location, enter the User login name.

Location Password If the Location specified above is a shared location, enter the login password.

Enabled Click the check box to download the file the next time the K1000 Agent checks into the appliance.

Create Location (if doesn’t exists)

Create the installation location if not has not already been created.

Replace existing files Click the check box to overwrite existing files of the same name on the target machines.

Do Not Uncompress Distribution

Click the check box if you are distributing a compressed file and do not want the file uncompressed.

Persistent Click the check box if you want the appliance to confirm every time that this package does not already exist on the target machine before attempting to deploy it.

Create shortcut (to location)

Click the check box to create a desktop shortcut to the file location.

Shortcut name Enter a display name for the shortcut.

Delete Temp Files Click the check box to delete temporary installation files.

Limit Deployment to Labels

Enter a label for the package. The file is distributed to the users assigned to the label, such as the operating system affected by the synchronization.

144 Administrator Guide, Version 5.3

Page 145: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

6. Click Save.

Wake-on-LANThe K1000 Management Appliance Wake-on-LAN feature provides the ability to “wake up” computers equipped with network cards that are Wake-on-LAN compliant.

Limit Deployment to Listed Machines

Select a machine for deployment. If your list of machines is long, you can use the Filter field to filter the list by entering a few characters of the machine name.

Pre-Deploy User Message Enter a pre-deployment message to be sent to the user prior to deployment.

Post-Deploy User Message Enter a post-deployment message to be sent to the user after deployment.

Deployment Window (24H clock)

Enter the time (using a 24-hour clock) to deploy the package. The Deployment Window times affects any of the Managed Action options. Also, the run intervals defined in the System Console, under K1000 Settings for this specific organization, overrides and/or interact with the deployment window of a specific package.

Use Alternate Download Click this check box to specify details for alternate download. When you click this check box, the following fields appear:

• Alternate Download Location: Enter the location from where the K1000 Agent can retrieve digital installation files.

• Alternate Checksum: Enter an Alternate Checksum (MD5) that matches the MD5 checksum on the remote file share (for security purposes).

• Alternate Download User: Enter a user name that has necessary privileges to access the Alternate Download Location.

• Alternate Download Password: Enter the password for the user name specified above.

Note: If the target machine is part of a replication label, then the appliance does not fetch software from the alternate download location. For more information on using an alternate location, refer to Distributing Packages from an Alternate Location, on page 128.Here you specify an alternate download location only for a specific managed installation. You can also edit an existing label or create a new label that can be used for specifying the alternate location globally. But since that label cannot be specific to any managed installation, you cannot specify an alternate checksum for matching the checksum on the remote file share. For more information on how to create or edit labels, refer to Managing Labels, on page 54.

To distribute files previously deployed after the deployment window has closed, click the Resend Files button.

Administrator Guide, Version 5.3 145

Page 146: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

Wake-on-LAN feature overviewThe Wake-on-LAN feature enables you to remotely power-on device on your network, even if those machines do not have the agent installed. Wake-on-LAN can target a label or a specific MAC-addressed machine.

.

Using the Wake-on-LAN feature on the K1000 Management Appliance will cause broadcast UDP traffic on your network on port 7. This traffic should be ignored by most computers on the network. The K1000 Management Appliance sends 16 packets per Wake-on-LAN request because it must guess the broadcast address that is required to get the “Magic Packet” to the target computer. This amount of traffic should not have a noticeable impact on the network.

Issuing a Wake-on-LAN requestYou can wake multiple devices at once by specifying a label to which those devices belong, or you can wake computers or network devices individually. To wake devices on a regular basis, for example, to perform monthly maintenance, you can schedule a Wake-on-LAN to go out a specific time.

If the device you want to wake is not inventoried by the K1000 Management Appliance but you still know the MAC (Hardware) address and its last-known IP address, you can manually enter the information to wake the device.

To issue a Wake-on-LAN request

1. Click Distribution > Wake-on-LAN.

The Wake-on-LAN page appears.

2. To wake multiple devices, select a label from the Labels drop-down list.

3. To wake computers individually:

a. Click them from the Wake a Computer list.

b. Press CTRL, and then select multiple computers.

You can filter the list by entering any filter options.

4. To wake a network device, specify the device’s IP address in the Devices field.

You can filter the list by entering any filter options.

5. Specify the MAC address of the device in the MAC Address field.

6. Specify the IP address of the device in the IP Address field.

7. Click Send Wake-on-LAN.

This feature only supports machines that are equipped with a Wake-On-LAN-enabled network interface card (NIC) and BIOS.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

146 Administrator Guide, Version 5.3

Page 147: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

After you send the Wake-on-LAN request, the results at the top of the page indicate the number of machines that received the request and to which label, if any, those machines belong.

To schedule a Wake-on-LAN request

1. Click Distribution > Wake-on-LAN.

2. Click the Schedule a routine Wake-on-LAN event link.

The Wake-on-LAN page appears.

3. In the Choose Action menu, click Add New Item.

The Wake-on-LAN Settings page appears.

4. In the Labels to Wake-on-LAN box, select the labels to include in the request.

5.

6. Select the appropriate radio button to schedule Wake-on-LAN scan, in the Scheduling area:

7. Click Save.

The Wake-on-LAN tab appears with the scheduled request listed. From this view you can edit or delete any scheduled requests.

Troubleshooting Wake-on-LANWhen a Wake-on-LAN request fails to wake devices, it might be due inappropriate configuration of network devices. For example:

• The device does not have a WOL-capable network card or is not configured properly.

• The K1000 Management Appliance has incorrect information about the subnet to which the device is attached.

• UDP traffic is not routed between subnets or is being filtered by a network device.

• Broadcast traffic is not routed between subnets or is being filtered by a network device.

• Traffic on Port 7 is being filtered by a network device.

For more assistance with troubleshooting Wake-on-LAN, see:

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Don’t Run on a Schedule

(Default) Select to run the tests in combination with an event rather than on a specific date or at a specific time.

Run Every day/specific day at HH:MM AM/PM

Select to run the tests every day or only the selected day of the week at the specified time.

Run on the nth of every month/specific month at HH:MM AM/PM

Select to run the tests on a specific date or the same day every month at the specified time.

Administrator Guide, Version 5.3 147

Page 148: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

http://support.intel.com/support/network/sb/cs-008459.htm.

ReplicationUsing a replication share is a method to handle managed installations, patching, or Dell Updates where network bandwidth and speed are issues. In those situations, using a replication share is a good alternative to downloading directly from an appliance.

A replication share allows an appliance to replicate software installers, patches, node upgrades, and script dependencies to a shared folder on a node. If any replication item is deleted from the appliance server, it is marked for deletion in the replication share and deleted in the replication task cycle.

In creating a replication share, identify one node at each remote location to act as a replication machine. The server copies all the replication items to the replication machine at

148 Administrator Guide, Version 5.3

Page 149: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

the specified destination path. The replication process automatically restarts if stopped due to a network failure or replication schedule. If stopped, the replication process restarts at the point it was stopped.

Sneaker net share – You can create a new folder and copy the contents of an existing replication folder to it. You can then specify this folder as the new replication folder in the appliance. The appliance checks if the new folder has all the replication items present and replicates only the new ones. This results in conserving the bandwidth by not copying the files twice. You can manually copy the contents of replication folder to a new folder. The replication folder created in a machine follows following hierarchy:

\\machinename\foldername\repl2\replicationitems folder

The machine name and folder name is user defined while repl2 is automatically created by appliance server. The replication items folder includes the folder for patches, kbots, upgrade files, and software.

All the replication items are first listed in the replication queue and then copied one at a time to the destination path. Any new replication item is first listed in the replication queue and then copied after a default interval of 10 minutes.

Replication items are copied in this order:

1. Script dependencies

2. Software

3. Agent upgrades

4. Patches

Preparing to create a replication shareYou can create replication shares only on the machines listed in the Inventory > Computers tab. To create a share on a machine that is not listed in Inventory, you need to first create an inventory record for the machine. For information, see Adding Computers to Inventory, on page 89.

Also, confirm or do the following:

• The replication share needs to have write permissions of the destination path to write the software files.

• The K1000 agent needs to be installed on the replication share.

• Create a computer label for your target nodes before starting the process.

To create a replication share

1. Click Distribution > Replication.

The Replication Shares page appears.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 149

Page 150: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

2. In the Choose Action menu, click Add New Item.

The Replication Share: Edit Detail page appears.

3. Click the Replication Enabled check box.

4. Click Failover to K1000 (optional).

While you are testing the replication setup, don’t enable this setting so that you can confirm that the replication is successful.

5. Select the node in the Replication Machine drop-down list.

The replication share is created on this node. The replication share can be created by two methods:

• Locally

• Shared network drive

6. Specify the replication share destination details:

7. Select the label for the nodes that you want to get files from the replication to share

8. Verify that the selected computer label does not have KACE_ALT_LOCATION specified. KACE_ALT_LOCATION has precedence over the replication share while downloading files to the node.

9. Specify the replication share download details:

Destination Path Enter the path for the replication machine to use for the replication share.

• For a local drive, use local drive syntax, for example: C:\k1000share

• For a network drive, use UNC format, for example: \\kaceRep\k1000hare

Note: $ notation, for example \KaceRep\e$, is not supported

Destination Path User Enter the login name for the replication drive (destination path). The login account should have full access (including write) to the location. Use only letters and numbers; other characters don’t work, such as @. Not required for local drives.

Destination Path Password

Enter the password for the replication share. Use only letters and numbers. Not required for local drives.

Download Path Enter the path for nodes in the replication label to copy items from the replication drive.For example, a UNC path:\\fileservername\directory\k1000\ Other nodes need read permission to copy replication items from this shared folder.

Download Path User Enter the login name for accessing the download path. We recommend you use only letters and numbers. Some other characters, for example, @, don’t work.

150 Administrator Guide, Version 5.3

Page 151: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

10. Specify the following:

In the replication schedule, as well as clicking the individual cells, you can:

• Select hours (columns) by clicking the hour number.

• Select days (rows), by clicking the day of the week.

Download Path Password

Enter the password for accessing the download path. We recommend you use only letters and numbers.

Limit Patch O/S Files Click the OS patches to replicate from the patch subscription settings page. Default: Replicate all displayed. (Only active patches are available.) For information about patching, see Patching and Security Guide.

Limit Patch Language Files

Click the language patches to replicate from the patch subscription settings page. Default: Replicate all displayed. For information about patching, see Patching and Security Guide.

Replicate App Patches Click to replicate the application patches to the replication share.

Replicate Dell Packages

Click to replicate Dell packages to the replication share.

Hi Bandwidth Enter the maximum bandwidth to use for replication. If this field is left blank, the maximum bandwidth available for replication is used.

Lo Bandwidth Enter the restricted bandwidth to use for replication. If this field is left blank, the maximum bandwidth available for replication is used.

Replication Schedule Select the bandwidth used for different time slots and/or days. The colors represent:

• White – Replication Off

• Light Blue – Replication on with low bandwidth

• Blue – Replication on with high bandwidth

Administrator Guide, Version 5.3 151

Page 152: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

11. Click Save.

Working with your replication shareFrom the Replication tab, you can:

• Add or delete replication shares

• Enable or disable replication shares

• Start or restart a halted replication task

• Halt a running replication task

• Perform a share inventory for the replication share

• Interrupt the current replication

• Export to CSV format

To view replication share details

After creating a replication share and clicking Save, the Replication Shares page opens.

1. Click Distribution > Replication.

The Replication Shares page appears.

2. Click a replication share.

The Replication Share: Edit Detail page appears.

3. At the bottom of the Replication Share: Edit Detail page, you can also view the following:

• Replication Queue: Click Replication Queue to see a list of replication files that are going to be replicated with their status.

Copy Schedule From Select an existing replication schedule from the drop-down list to replicate items according to that schedule.

Notes (Optional) Enter comments in the text box.

When you have completed testing, you might want to return to step 4 and check Failover to K1000.

Opening a CSV file containing multibyte characters with Microsoft Excel may yield "garbage characters" in the resulting worksheet. See Dell KACE Support for the steps to import the CSV file into an Excel worksheet.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

152 Administrator Guide, Version 5.3

Page 153: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

• Share Inventory: Click Show Share Inventory to see a list of replication items that have been copied.

• Delete Queue: Click Show Delete Queue to see a list of replication items that are marked for deletion.

Managing iPhone ProfilesDell KACE K1000 Management Appliances can manage your company’s iPhone profiles. iPhone profiles are configuration files in XML (.mobileconfig) generated by Apple tools. You can:

• Email profiles to the appropriate users.

• Have your users download their authorized profile.

Before you use K1000 iPhone profile supportDepending on whether you have already worked with profiles, you might need to perform the following:

1. Create a profile.

If you don’t already have profiles, see www.apple.com for information on creating and editing them. You can edit an existing profile with the K1000 iPhone page, but if you have extensive editing, the Apple tools are handier.

2. Create labels for your users.

If your implementation involves multiple profiles, consider creating user labels for the profiles. Also, you may also want to restrict a profile to a test user label. For information about creating labels, see About Labels, on page 53.

3. Think about how you want to organize iPhone profiles in the Software Library of your K1000 user portal.

To add an iPhone profile

1. Click Distribution > iPhone.

2. In the Choose Action menu, click Add New Item.

The iPhone Profile : Edit Detail page appears.

3. In the Profile Name field, enter a profile name.

If you don’t enter a name, a name from the .mobileconfig file is used. (This name is overwritten if you upload the .mobileconfig file again.)

4. Click Browse and select your profile.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 153

Page 154: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

5. Click Browse to make this profile available to users when you save.

You can also enable the profile after saving.

6. Click Edit for Limit Access to User Labels to restrict access to specific users.

For example, if your profile is designed for users in a specific geography or division, create a label for those users.

7. To send the profile to your users by email, enter their email addresses in the To field.

Use the Filter field to filter your search for users by name or email address.

8. In Message field, enter a message and/or instructions for your users.

9. In the XML field, enter any attributes for the .mobileconfig file.

10. Click Save.

To Delete an iPhone profile

1. Click Distribution > iPhone.

2. Click the check box for the iPhone profile you want to delete.

3. In the Choose Action menu, click Delete Selected Item(s).

You can also delete a profile from the iPhone Profile : Edit Detail page.

To Configure Collection Settings for iPhones

1. Click Distribution > iPhone.

2. In the Choose Action menu, click Configure Collection Settings.

The iPhone Asset Collection Settings & Schedule page appears.

3. Select the Enabled check box to enable deployment.

4. Select the Deploy to All Machines check box to deploy to all machines.

5. In the Choose Action menu, click Configure Collection Settings.

The iPhone Asset Collection Settings & Schedule page appears.

6. Use the Limit Deployment to Selected Labels option to select a label to limit deployment to only machines belonging to the selected label. Press CTRL to select multiple labels.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

154 Administrator Guide, Version 5.3

Page 155: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

If you have selected a label that has a replication share or an alternate download location, the appliance copies digital assets from that replication share or alternate download location instead of downloading them directly from the appliance.

7. Use the Supported Operating Systems list to select the operating system to include in the deployment.

8. Select the appropriate radio button to schedule the collection settings in the Scheduling area:

9. Click Save.

Managing Dell Systems with Dell Updates The Dell Updates tab offers Dell customers the Dell Client Updates and Dell Server Updates features. You use these features to keep your Dell computers updated with the latest software patches and upgrades.

Dell provides catalogs (lists) of software upgrades and patches, which you can choose to install on the Dell computers in your appliance implementation. The catalogs provide updates for:

• Software and firmware for servers and workstations.

• Some Dell-supplied applications.

The Dell Updates tab is similar features and workflow to the appliance patching features on the Security tab. The two tabs are so similar that you can use the Patching and Security

Guide document for all the Dell Client Updates and Server updates except for the differences listed in the next section. Patching and Security Guide is available from the www.kace.com website, Support tab, under Documentation (your Support login is required).

Don’t Run on a Schedule

(Default) Select to run the collection in combination with an event rather than on a specific date or at a specific time.

Run Every nth minutes or hours

Select to run the collection every few minutes or hours depending on your setting.

Run every day or specific day of the week at HH:MM AM/PM

Select to run the collection every day or on a specific day of the week at a specific time.

Run on the nth of every month/specific month at HH:MM AM/PM

Select to run the collection on a specific date or the same day every month at the specified time.

Custom Schedule Select to create a custom schedule for the collection.

Administrator Guide, Version 5.3 155

Page 156: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

Understanding the Differences between Patching and Dell UpdatesThe K1000 Management Appliance patching and Dell Update features are nearly identical. Read Patching and Security Guide for most patching/updating procedures. The exceptions are:

• The Dell Update subscription process is different from the K1000 Management Appliance patch subscription process. For instructions on subscribing to Dell Updates, see the Configuring Dell OpenManage Catalog Updates section below.

• The names used for these actions are different:

• You manage and execute Dell Updates and Patching from different appliance interface pages:

Dell Client and Server Upgrade workflowThis section explains the general steps you use upgrade your Dell clients and servers. Unless otherwise noted, see the Patching and Security Guide for details on these steps.

Follow these steps to use Dell client and server updates on an appliance:

1. (If needed) Upgrade your nodes and servers to the latest K1000 Management Appliance release.

2. Configure the Dell Updates.

This includes deciding when to update your catalogs of Dell updates for Dell hardware that you own. Once Dell OpenManage is set up on your appliance, it automatically probes for and determines what updates your system requires. You do need to set up a schedule for these updates and configure this process. This step is different than the patching subscription. For details, see the Configuring Dell OpenManage Catalog

Action Patching Term Dell Updates Term Term Used in:

Probe your computers to determine whether they have or need a specific patch or update.

Detection Inventory Patching and Security Guide

Install the patch or update on the computers in your appliance implementation.

Deployment Update This chapter and the Dell documentation.

Action K1000 Management Appliance Interface Page

Execute Dell Update schedules

Administrator Portal > Distribution > Dell Updates

Manage Dell Updates Administrator Portal > Organization: System > K1000 Settings > Dell Client and Server Update Settings

Execute Patching Schedules Administrator Portal > Security > Detect and Deploy patches

Manage Patching Administrator Portal > Security > Patching > Subscription Settings

156 Administrator Guide, Version 5.3

Page 157: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

Updates section below. You configure Dell updates from the Administrator Portal > Organization:: System > K1000 Settings > Control Panel > Dell Client and Server Update Settings page.

All other Dell Updates settings and feature are available on the Administrator Portal > Organization: Default > Distribution > Dell Updates tab.

3. Filter out the updates that you do not want to apply to your servers and clients.

You may not want to install all of the patches from the catalog. Mark these patches as inactive to prevent them from being automatically installed.

4. Group the updates by applications or software families in patch labels that your schedules use to run the inventory and update actions.

For example, a label can specify patches for all Microsoft Windows systems.

5. Group your Dell systems together in machine labels that your schedules use to run the inventory and update actions.

For example, you can collect all Dell servers running Microsoft XP into a single label and then run a patch schedule to inventory and update them.

6. Perform an update inventory to discover which of your nodes have updates available.

You can perform this step independently, or as part of an inventory and update patch schedule that also installs the updates. Normally, you perform the inventory automatically as part of a patch schedule.

Patching and Security Guide uses the term detect or detection instead of inventory.

7. Install the updates on the nodes that need them.

This is known as patch update, and you can also perform it automatically part of an update schedule.

Patching and Security Guide uses the term deploy or deployment instead of update.

8. Bring all these pieces together into patch schedules that automatically run inventory/update actions for the updates in your update labels, on the corresponding computers in your machine labels.

Patching and Security Guide walks you through the process of creating a schedule that automatically inventories your hardware and updates it with the critical software updates it needs. You can run schedules at any interval that you choose. Normally, you create different schedules for the laptops, workstations, and servers in your appliance implementation, because these three types of computers have very different usage characteristics.

9. Test your schedules on a small subset of the computers you administer to make sure everything is working the way you expect.

Administrator Guide, Version 5.3 157

Page 158: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

Configuring Dell OpenManage Catalog Updates

Follow these steps to configure the Dell update process for the s and applications that your appliance implementation uses. Dell updates its hardware patches in Catalogs; one for serves and one for workstations.

1. Click K1000 Settings > Control Panel > Dell Client and Server Update Settings page.

The Dell Client and Server Update Settings page appears:

2. Scroll to the bottom the page and click Edit Mode link.

The Dell Client and Server Update Settings page buttons and check boxes are enabled for changes. The Download Status table shows you the current status of the Dell catalogs that your appliance uses.

3. Click Disable import of Dell Client and Server Update Catalogs to stop the Dell updates.

4. Click one of the Check for Changes options to set up a schedule for updating the Dell catalogs.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

158 Administrator Guide, Version 5.3

Page 159: Dell KACE K1000 Admin Guide

Distributing Software from Your K1000 Management Appliance8

The first option of these two is intended for weekly updates and the second for monthly.

5. Use the Stop Download section options to limit the amount of time you allow the Dell updates to run.

You may want to enforce a hard stop at a specific time, for example, when your users start working.

6. The Package Download Options buttons to specific whether to limit the Dell updates to just the ones that apply to your appliance implementation now, or keep all of the Dell updates available.

If you change operating systems or bring on new Dell equipment frequently, it’s probably best to keep all Dell updates handy.

7. Click Refresh Catalog Now to update the catalogs immediately.

8. Click Delete All Files or Delete Unused Files to remove all or some of the Dell catalog files.

These options can free disk space.

9. Click Save Dell Update Settings at the bottom of the page to make your changes take effect.

This completes the process of configuring your Dell OpenManage catalog updates.

Administrator Guide, Version 5.3 159

Page 160: Dell KACE K1000 Admin Guide

8 Distributing Software from Your K1000 Management Appliance

160 Administrator Guide, Version 5.3

Page 161: Dell KACE K1000 Admin Guide

9

Using the Scripting Features

The Dell KACE K1000 Management Appliance Policy and Scripting component provides a point-and-click interface to perform tasks that typically require you to use a manual process or advanced programming.

• Scripting Overview, on page 161.

• Using the Appliance Default Scripts, on page 163.

• Creating and Editing Scripts, on page 164.

• Using the Run Now function, on page 174.

• Searching the Scripting Log Files, on page 177.

• About the Configuration Policies, on page 178.

• Using the Windows-based Policies, on page 179.

• Using the Mac OS Configuration-based Policies, on page 189.

Scripting OverviewWith Policy and Scripting, you can more easily and automatically perform a variety of tasks. You can perform these tasks across your network through customized scripts that run according to your preferences.

Administrator Guide, Version 5.3 161

Page 162: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

Figure 9-1: The Scripting tabs

Scripts automate tasks such as:

• Power management

• Installing software

• Checking antivirus status

• Changing registry settings

• Scheduling deployment to the endpoints on your network

Each script consists of:

• Metadata

• Dependencies (any supporting executable files that are necessary to run a script, for example, .zip and .bat files)

• Rules to obey (Offline Kscripts and Online Kscripts)

• Tasks to complete (Offline Kscripts and Online Kscripts). Each script can have any number of tasks, and you can configure whether each task must complete successfully before the next is executed.

• Deployment settings

• Schedule settings

You can create these types of scripts:

162 Administrator Guide, Version 5.3

Page 163: Dell KACE K1000 Admin Guide

Using the Scripting Features9

• Offline KScripts: These scripts can execute even when nodes are not connected to the appliance server, such as at the time of Machine Boot Up and User Login. Or, they execute at a scheduled time based on the node clock. You can create these scripts using the K1000 Management Appliance scripting wizard.

• Online KScripts: These scripts can execute only when the node is able to ping the appliance server. They execute at scheduled times based on the appliance clock. You can create these scripts using the K1000 Management Appliance scripting wizard.

• Online Shell Scripts: These scripts can execute only when the node is connected to the appliance server. They execute at scheduled times based on the server clock. The online shell scripts are built using simple text-based scripts (bash, perl, batch, and so on) supported by the target operating system. Batch files are supported on Windows, along with the different shell script formats supported by the specific operating system of the targeted machines.

Order of downloading script dependenciesThe order of downloading script dependencies is as follows:

1. Local machine (checks if the dependency is present on the node).

2. KACE_ALT_LOCATION (Alternate Download Location if specified).

3. Replication server (if replication is enabled).

4. K1000 Server.

Using the Appliance Default ScriptsYour K1000 Management Appliance includes these ready-made scripts:

Script Name Description

Defragment the C: drive Defragments the c: drive on the computer.

Force Checkin Runs KBScriptRunner on a node to force a checkin.WARNING: Do not run this with more than 50 nodes selected as it can overload the server with requests.

Inventory Startup Programs Fix

On some machines, a missing registry entry causes all the contents of the system32 directory to be reported as the Startup Programs. This script fixes the registry entry if it is missing.

Issue a DOS Command Example

Issues the DOS-DIR command on a Windows system. Used as an example for how to run a DOS command.

Issue a Mac Command Example

Issues the AppDir.txt command to list the contents of the Mac OS applications directory. Used as an example of how to run a command on a Mac OS system.

K1000 Remote Control Disabler

Disables the appliance Remote Control functionality on Windows XP Professional by configuring Terminal Services properly.

Administrator Guide, Version 5.3 163

Page 164: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

Creating and Editing ScriptsThere are three ways to create scripts, which you can perform from the Scripting > Scripts tab.

• By importing an existing script (in XML format).

• By copying and modifying an existing script.

K1000 Remote Control Enabler

Enables the appliance Remote Control functionality on Windows XP Professional by configuring Terminal Services properly.

K1000Client debug logs Disable

Disables the debug switch used with the appliance client debug logs.

K1000Client debug logs Enable

Enables client debug and sends the debug log back to the appliance. This script turns on debug only for the inventory and deployment part of the node. It does not enable debugging of the scheduling service.

Make Removable Drives Read-Only

Allows removable drives to be mounted only as read-only (a method of controlling unauthorized access to data).

Make Removable Drives Read-Write

Removable drives can be mounted read-write.

Message Window Script Example

Illustrates use of the Message Window. Your script must have properly paired create/destroy message window commands to work properly. The Message Windows remain displayed until one of the following occurs:

• User dismisses the message.

• Script finishes executing.

• Timeout is reached.

Put a Mac to sleep Places a Mac OS system in sleep mode.

Reset KUID Deletes the registry keys that identify a node so that a new key can be generated. Will only execute one time per node due to the ResetKUIDRunOnce registry flag.

Shutdown a Mac Powers-off a Mac OS system.

Shutdown a Mac with snooze

An example Online KScript that uses the Alert User Before Run feature to allow the console user to snooze the shutdown.

Shutdown a Windows system

Specifies a delay (in seconds) while the message in quotes is displayed to the user. Omit the -t parameter to silently and immediately shut down nodes.

Shutdown a Windows system with Snooze

An example Online KScript that uses the Alert User Before Run feature to allow the console user to snooze the shutdown.

USB Drives Disable Disables usage of USB Drives.

USB Drives Enable Enables usage of USB Drives.

Script Name Description

164 Administrator Guide, Version 5.3

Page 165: Dell KACE K1000 Admin Guide

Using the Scripting Features9

• By creating a new script from scratch.

Token Replacement VariablesYou can use the following token replacement variables anywhere in the XML of a K1000 Management Appliance script. They are replaced at run time on the node with appropriate values:

• $(KACE_DEPENDENCY_DIR) expands to:

• Windows: $(KACE_INSTALL)\packages\kbots\xxx

• Mac OS and Linux: /var/kace/SMMP/kbots_cache/packages/kbots/xxx

Any script dependencies for this script are downloaded to the node in this folder.

• $(KBOX_INSTALL_DIR) – agent installation directory:

• Windows: C:\Program Files\KACE\KBOX

• Mac OS: /Library/KBOXAgent/Home/bin/

• Linux: /KACE/bin/

• $(KBOX_SYS_DIR) – agent machine's system directory:

• Windows: C:\Windows\System32

• Mac OS and Linux: /

• $(KACE_INSTALL) – same as KBOX_INSTALL_DIR.

• $(KBOX_EXECUTE_EVENT) – event causing KBOT to run, [BOOTUP|LOGON|null].

• $(MAC_ADDRESS) – agent machine's primary MAC address.

• $(KACE_SERVER) – host name of the appliance server.

• $(KACE_SERVER_PORT) – port to use when connecting to KACE_SERVER (80/443).

• $(KACE_SERVER_URLPREFIX) – http/https.

• $(KACE_COMPANY_NAME) – agent's copy of the setting from the server's configuration page.

• $(KACE_SPLASH_TEXT) – agent's copy of the setting from the server's configuration page.

• $(KACE_LISTEN_PORT) – agent's port that the server can use for Run Now.

• $(KACE_SERVER_URL) – a combination of server, port, and URL prefix (http://k1000_hostname:80).

The process of creating scripts is an iterative one. After creating a script, deploy the script to a limited number of machines to verify that the script runs correctly before deploying it to all the machines on your network. (You can create a test label to do this.) Leave a script disabled until you have tested and edited the script and are ready to run it.

Administrator Guide, Version 5.3 165

Page 166: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

• $(KBOX_IP_ADDRESS) – agent's local IP address (corresponds with network entry of MAC_ADDRESS).

• $(KBOX_MAC_ADDRESS) – same as MAC_ADDRESS.

Adding ScriptsOffline and Online KScripts include one or more Tasks. Within each Task section, there are Verify and Remediation sections where you can further define the script behavior. If a section is left blank, it defaults to success.

For example, if you leave the Verify section blank, it ends in On Success.

To add an Offline KScript or Online KScript

1. Click Scripting > Scripts.

2. In the Choose Action menu, click Add New Item .

The Script: Edit Detail page appears.

3. In the Configuration area, enter the requested details:

4. Specify the deployment options:

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Script Type Use this field to select the Offline Kscript or Online Kscript types.

Name (Optional) Enter a meaningful name for the script to make it easier to distinguish from others listed on the Scripts tab.

Description (Optional) Enter a brief description of the actions the script performs. This information helps you to distinguish one script from another on the Scripts tab.

Status Select a value to indicate whether the script is in development (Draft) or has been rolled out to your network (Production). Use the Template status if you are building a script that is used as the basis for future scripts.

Enabled Select to run the script on the target machines. Do not enable a script until you are finished editing and testing it and are ready to run it. Enable the script on a test label before you enable it on all machines.

Notes (Optional) Enter notes for yourself and other appliance administrators.

Deploy to All Machines

Select to deploy the script to all the machines.

Limit Deployment To Selected Labels

Select a label to limit deployment only to machines grouped by that label. Press CTRL to select more than one label.

Limit Deployment To Listed Machines

Select to limit deployment to one or more machines. From the drop-down list, select the machines to add to the list. You can filter the list by entering filter options.

166 Administrator Guide, Version 5.3

Page 167: Dell KACE K1000 Admin Guide

Using the Scripting Features9

Pick Specific OS Versions:

Select to limit the script to specific operating system versions. (Otherwise, the script runs on all versions of the operating systems you pick.)

Alerts:Online KScripts OnlyAgents 5.1 (and higher) Windows and Mac OS agents

Alert User Before Run Allows you to delay or cancel the script before it runs. (For example, choose to enable this for scripts that reboot or shut down computers.) If no user is logged in to the console, the script runs immediately. Dialog Options:

• OK - The script runs immediately.

• Cancel - The script is cancelled until its next scheduled run.

• Snooze - The user is prompted again after the Snooze Duration.

If the time specified by Dialog Timeout elapses without the user pressing a button, the script runs at that time.When the user presses the snooze button, the dialog reappears after the Snooze Duration.Interaction With Run As:

• Only the console user can see the alert dialog (and therefore choose to snooze or cancel) regardless of the Run As setting.

• Enabling an alert prompts the console user even if the script is set to run as all users or another user.

Dialog Timeout (Minutes): Enter the number of minutes.

Snooze Duration (Minutes):

Enter the number of minutes:

Alert Message: Enter the message you want displayed to users.

Run As:Online KScripts Only

Run As Local System Run with administrative privileges on local machine.Use this setting for all scripts created with a wizard.

Run As User logged in to console

Affect that user’s profile.

Run As All Logged in Users Affect all users’ profiles.

Run As User: Handle network-wide tasks. Usually admin, but you can run as any user.

Administrator Guide, Version 5.3 167

Page 168: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

5. Click Run Now to immediately push the script to all machines. Use this option with caution. For more information about Run Now, refer to Using the Run Now function, on page 174.

Scheduling In the Scheduling area, specify when and how often the script is run.

Don’t Run on a Schedule Runs in combination with an event rather than on a specific date or at a specific time. Use this option in combination with one or more of the “Also” choices below. For example, use this option in conjunction with “Also Run at User Login” to run whenever the user logs in.

Run Every nth minutes/hours

Runs on every hour and minutes as specified.

Run Every day/specific day at HH:MM AM/PM

Runs on the specified time on the specified day.

Run on the nth of Every Month or on a Specific Month at HH:MM AM/PM.

Runs on a particular day of every month or particular month at a specified time.

Custom Schedule Allows you to set an arbitrary schedule using standard cron format. For example, 1,2,3,5,20-25,30-35,59 23 31 12 * * means:On the last day of year, at 23:01, 23:02, 23:03, 23:05, 23:20, 23:21, 23:22, 23:23, 23:24, 23:25, 23:30, 23:31, 23:32, 23:33, 23:34, 23:35, 23:59. The appliance does not support the extended cron format.

Also Run Once at next Client Checkin (Only for Offline KScript)

Runs the Offline KScript once when new scripts are downloaded from the appliance. To set the time interval for downloading scripts, click Scripting Update Interval in the help area on this page.

Also Run at Machine Boot Up (Only for Offline KScript)

Runs the Offline KScript at machine boot time. Beware that this causes the machine to boot up slower than it might normally.

Also Run at User Login (Only for Offline KScript)

Runs the Offline KScript after the user has entered their Windows login credentials.

Allow Run While Disconnected (Only for Offline KScript)

Allows the Offline KScript to run even if the target machine cannot contact the appliance to report results. In such a case, results are stored on the machine and uploaded to the appliance until the next contact.

Allow Run While Logged Off (Only for Offline KScript)

Allows the Offline KScript to run even if a user is not logged in. To run the script only when the user is logged into the machine, clear this option.

168 Administrator Guide, Version 5.3

Page 169: Dell KACE K1000 Admin Guide

Using the Scripting Features9

6. To browse for and upload files required by the script, click Add new dependency, click Browse, and then click Open to add the new dependency file.

If a Replication Share is specified and enabled at Distribution > Replication, the dependencies are downloaded from the specified replication share.

Repeat this step to add additional new dependencies as necessary.

7. Click Add Task Section to add a new task.

The process flow of a task is a script similar to the following:

IF Verify THEN Success

ELSE IF Remediation THEN Remediation Success

ELSE Remediation Failure

8. Under Policy or Job Rules, set the following options for Task 1:

9. In the Verify section, click Add to add a step, and then select one or more steps to perform.

Refer to Appendix B: Adding Steps to Task Sections, starting on page 265.

10. In the On Success and Remediation sections, select one or more steps to perform.

Refer to Appendix A: Administering Mac OS Nodes, starting on page 259.

11. In the On Remediation Success and On Remediation Failure sections, select one or more steps to perform.

Refer to Appendix A: Administering Mac OS Nodes, starting on page 259.

If the replication share is inaccessible, the dependencies are downloaded from the appliance server.

To enable this setting, select the Failover To K1000 check box on the Replication Share : Edit Detail page.

Attempts Enter the number of times the script attempts to run.If the script fails but remediation is successful, you may want to run the task again to confirm the remediation step. To do this, set the number of Attempts to 2 or more. If the Verify section fails, it is run the number of times mentioned in this field.

On Failure • Select Break to stop running upon failure.

• Select Continue to perform remediation steps upon failure.

To remove a dependency, task, or step, click the trash can icon beside the item. This icon appears when your mouse hovers over an item.

Administrator Guide, Version 5.3 169

Page 170: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

To add an Online Shell Script

1. Click Scripting > Scripts.

2. In the Choose Action menu, click Add New Item .

The Script: Edit Detail page appears.

3. In the Configuration area, enter the following information:

4. Specify the deployment options:

Click next to Policy or Job Rules to view the token replacement variables that can be used anywhere in the K1000 Management Appliance script. The variables are replaced at runtime with appropriate values on the node. For more information, refer to Token Replacement Variables, on page 165.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Script Type Select the Online Shell Script type.

Name Enter a meaningful name for the script to make it easier to distinguish from others listed on the Scripts tab.

Description (Optional) Enter a brief description of the actions the script performs. This field helps you to distinguish one script from another on the Scripts tab.

Status Indicate whether the script is in development (Draft) or has been rolled out to your network (Production). Use the Template status if you are building a script to use as the basis for future scripts.

Enabled Click to run the script on the target machines. Do not enable a script until you are finished editing and testing it and are ready to run it. Enable the script on a test label before you enable it on all machines.

Notes (Optional) Enter any notes.

Deploy to All Machines

Click to deploy the script to all the machines.

Limit Deployment To Selected Labels

Select a label to limit deployment to machines in that label. Press CTRL and click labels to select more than one label.

Limit Deployment To Listed Machines:

You can limit deployment to one or more machines. From the drop-down list, select machines to add to the list. You can filter the list by entering filter options.

Pick Specific OS Versions:

Select to limit the script to specific operating stem versions. Otherwise, the script runs on all versions of the operating systems you pick.

170 Administrator Guide, Version 5.3

Page 171: Dell KACE K1000 Admin Guide

Using the Scripting Features9

5. Click Run Now to immediately push the script to all machines. Use this option with caution. For more information about the Run Now button, refer to Using the Run Now function, on page 174.

6. To browse for and upload files required by the script, click Add new dependency, click Browse, and then click Open to add the new dependency file.

If a Replication Share is specified and enabled at Distribution > Replication, the dependencies are still downloaded from the appliance server, because Replication is not supported by online shell scripts.

Repeat this step to add additional new dependencies as necessary.

7. Specify the following:

Scheduling In the Scheduling area, specify when and how often the script runs.

Don’t Run on a Schedule The test runs in combination with an event rather than on a specific date or at a specific time. Use this option in combination with one or more of the “Also” choices below. For example, use this option in conjunction with “Also Run at User Login” to run whenever the user logs in.

Run Every nth minutes/hours

The test runs on the interval of hour and minutes specified.

Run Every day/specific day at HH:MM AM/PM

The test runs on the specified time on the specified day.

Custom Schedule This option allows you to set an arbitrary schedule using standard cron format. For example, 1,2,3,5,20-25,30-35,59 23 31 12 * * means:On the last day of year, at 23:01, 23:02, 23:03, 23:05, 23:20, 23:21, 23:22, 23:23, 23:24, 23:25, 23:30, 23:31, 23:32, 23:33, 23:34, 23:35, 23:59. The appliance doesn’t support the extended cron format.

Script Text Enter the relevant script text.

Timeout (minutes) Enter the value in minutes, the maximum time, for which the server tries for execution of the script.

Upload File Select to upload dependency file, if any, to the node. Specify the directory path and file name.

Delete Downloaded Files

Select to delete the downloaded files from the node.

To remove a dependency, click the trash can icon beside the item. This icon appears when your mouse hovers over an item.

Administrator Guide, Version 5.3 171

Page 172: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

Editing ScriptsOn the Script: Edit Detail page, you can edit the three types of scripts: Offline KScripts, Online KScripts, and Online Shell Scripts. You can also edit Offline KScripts and Online KScripts by using the wizard or with the XML editor. To use the XML editor, click the View raw XML editor link below the Scheduling option.

To edit a script

1. Click Scripting > Scripts.

2. Click the name of the script you want to edit.

The Script: Edit Detail page appears.

3. Modify the script as desired.

4. Click Save.

To delete a script from the Scripts page

1. Click Scripting > Scripts.

2. Click the check box beside the script you want to delete.

3. In the Choose Action menu, click Delete Selected Item(s).

4. Click OK to confirm deletion.

To delete a script from the Scripts Edit page

1. Click Scripting > Scripts.

2. Click the name of the script you want to delete.

The Script: Edit Detail page appears.

3. Click Delete.

4. Click OK to confirm deletion.

Click next to Policy or Job Rules to view the token replacement variables that can be used anywhere in the K1000 Management Appliance script and are replaced at runtime on the node with appropriate values. For more information, refer to Token Replacement Variables, on page 165.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

172 Administrator Guide, Version 5.3

Page 173: Dell KACE K1000 Admin Guide

Using the Scripting Features9

Importing ScriptsIf you prefer to create your script in an external XML editor, you can upload your finished script to the K1000 Management Appliance. Be sure that the imported script conforms to the following structure:

• The root element <kbots></kbots> includes the URL of the KACE DTD “kbots xmlns=”http://kace.com/Kbots.xsd”>...<kbots>

• One or more <kbot> elements.

• Exactly one <config> element within each <kbot> element.

• Exactly one <execute> element within each <config> element.

• One or more <compliance> elements within each <kbot> element.

The following is an example of the XML structure for an appliance script:

<?xml version=”1.0” encoding=”utf-8” ?> <kbots xmlns=”http://kace.com/Kbots.xsd”> <kbot> <config name=”name=”” type=”policy” id=”0” version=”version=”” description=”description=””>

<execute disconnected=”false” logged_off=”false”> </execute>

</config> <compliance> </compliance> </kbot> </kbots>

In the above example of a simple XML script, the </config> element corresponds to the Configuration section on the Script: Edit Detail page. This is where you specify the name of the policy or job (optional), and the script type (policy or job). Within this element you can also indicate whether the script can run when the target machine is disconnected or logged off from the appliance.

You can specify whether the script is enabled and describe the specific tasks the script is to perform within the <compliance> element.

To import an existing script

If you are creating a script that will perform some of the same tasks as an existing script, copy the existing script, and open it in an XML editor. The script’s <compliance> element gives you an idea of how the script works, and how you can change it.

For more information, refer to To Duplicate an existing Script, on page 174.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 173

Page 174: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

1. Click Scripting > Scripts.

2. In the Choose Action menu, click Import from XML.

The Script: Edit Detail page appears.

3. Paste the existing script into the space provided, and click Save.

To Duplicate an existing Script

If you have already created a script that is similar to a proposed script, the duplicate feature makes it easier to copy the script as a start for a new script.

1. Click Scripting > Scripts.

2. Click the linked name of the script you want to copy to open it for editing.

The Script: Edit Detail page appears.

3. Click Duplicate at the bottom of the page.

The Scripts list page appears, which includes a new script named “Copy of xxx”, where “xxx” is the name of the copied script.

4. Click the linked name of the copied script to open it for editing.

Continue by following the steps in Adding Scripts, on page 166.

Using the Run Now functionThe Run Now function provides a way for you to run scripts on selected machines immediately without setting a schedule. For example, you may want to use this function if you:

• Suspect machines on your network are infected with a virus or other vulnerability, and they can compromise the entire network if not resolved right away.

• Want to test and debug scripts on a specific machine or set of machines during development.

The Run Now function is available in three locations:

• Run Now tab—Running Scripts from the Scripting > Run Now tab allows you to run one script at a time on the target machines.

• Script : Edit Detail Page—Running Scripts from the Script : Edit Detail page allows you to run one script at a time on the target machines.

• Scripts List Page—Running scripts from the Scripts List Page using the Run Now option from the Choose Action menu allows you to run more than one script at the same time on the target machines.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

174 Administrator Guide, Version 5.3

Page 175: Dell KACE K1000 Admin Guide

Using the Scripting Features9

To run scripts using the Run Now tab

1. Click Scripting > Run Now.

The Run Now page appears.

2. Select the script you want to run in the Scripts list.

You can use the Filter options to filter the Scripts list.

3. Select the machines on which script needs to run from the Inventory Machines list.

Selected machine names appear in the Machine Names field.

• You can use the Filter options to filter the machine names list.

• You can add all the machines by clicking Add All.

At least one machine name is required.

4. Click Run Now to run the selected script.

Run Now from the Script Detail page

To minimize the risk of deploying to unintended target machines, create a label that represents the machines on which you will perform the Run Now function. Refer to Using the Run Now function, on page 174, for more information.

1. Click Scripting > Scripts.

2. Select the script you want to run.

The Script: Edit Detail page appears.

3. Select the labels that represent the machines on which you want to run the script.

Press CTRL to select multiple labels.

4. Scroll to the bottom of the Scheduling section, and then click Run Now.

A confirmation dialog box appears if you have made any changes.

5. Click OK in the confirmation dialog box to save any unsaved changes before running.

The Run Now Status page is displayed after the script is run.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

CAUTION: A script is deployed immediately when you click Run Now:

• Use this feature cautiously!

• Do not deploy unless you are certain that you want to run the script on the target machines.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 175

Page 176: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

To use the Run Now function from the Scripts Lists Page

To minimize the risk of deploying to unintended target machines, create a label that represents the machines you want to run the Run Now function on. Refer to Using the Run Now function, on page 174, for more information.

1. Click Scripting > Scripts.

2. Select the scripts you want to run.

3. From the Choose Action menu, click Run Now.

Monitoring Run Now Status

When you click Run Now or select Run Now from the Choose Action menu, the Run Now Status tab appears where you can see a new line item for the script.

• The Pushed column indicates the number of machines on which the script is attempting to run.

• The Completed column indicates the number of machines that have finished running the script.

The numbers in these columns increment accordingly as the script runs on all of the selected machines. The icons above the right-hand column provide further details of the script status.

If errors occurred in pushing the scripts to the selected machines, you can search the scripting logs to determine the cause. For more information about searching logs, refer to Searching the Scripting Log Files, on page 177.

Run Now Detail PageFor more information on a Run Now item, click the linked start time on the Run Now Status page to display the item’s Run Now Detail page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Icon Description

The script completed successfully.

The script is still being run, therefore its success or failure is unknown.

An error occurred while running the script.

The Run Now function communicates over port 52230. One reason a script might fail to deploy is if firewall settings are blocking the appliance Agent from listening on that port.

176 Administrator Guide, Version 5.3

Page 177: Dell KACE K1000 Admin Guide

Using the Scripting Features9

The Run Now Detail page displays the results of a script that was run manually using the Run Now function, instead of running it on a schedule.

The Run Now Statistics section displays the results of a script that was pushed, the push failures, push successes, completed machines, running machines, successes and failures in numbers and percentage.

The Push Failures section lists those machines that the server could not contact and therefore did not receive the policy. Once pushed, it may take some time for the machine to complete a policy.

Machines that have received the policy but have not reported their results, are listed in the Scripts Running section. After the policy is run, it reports either success or failure. The results are sorted under the appropriate section. Each individual computer page also has the results of the Run Now events run on that machine.

The Run Failures section lists those machines that failed to complete the script.

The Run Successes section lists those machines that completed the script successfully.

Searching the Scripting Log FilesThe Search Logs page allows you to search the logs uploaded to the K1000 Management Appliance by the machines on your network.

To search scripting logs

1. Click Scripting > Search Logs.

2. Enter keywords for the scripts in the Search for field.

You can use the following operators to change how the logs are searched:

3. To search only in logs uploaded by a particular script, choose the script name.

4. Select the log type to search in from the drop-down list.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Operator Function

+ A leading plus sign indicates the word must be present in the log.

- A leading minus sign indicates the word must not be present in the log.

* A trailing asterisk can be used to find logs that contain words that begin with the supplied characters.

“ A phrase enclosed in double quotes matches only if the log contains the phrase exactly as typed.

Administrator Guide, Version 5.3 177

Page 178: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

You can choose from the following options:

• Output

• Activity

• Status

• Debug

5. In the Historical field, select whether to search in only the most recent logs or in all logs from the drop-down list.

6. In the Labels field, select a label from the drop-down list to search logs uploaded by machines in a particular label group.

7. Click Search.

The search results display the logs and the machines that have uploaded the logs.

You can apply a label to the machines that are displayed by selecting a label from the drop-down list, under search results.

About the Configuration PoliciesThe Configuration Policy page displays a list of wizards you can use to create policies that manage various aspects of the computers on your network.

To access the list of available Configuration Policy wizards, go to Scripting > Configuration Policy. This section includes descriptions of the settings for each of the policies you can create.

The Windows-based wizards include:

• Enforce Registry Settings, on page 179.

• Remote Desktop Control Troubleshooter, on page 179.

• Enforce Desktop Settings, on page 180.

• Desktop Shortcuts Wizard, on page 181.

• Event Log Reporter, on page 181.

• MSI Installer Wizard, on page 182.

• UltraVNC Wizard, on page 184.

• Un-Installer Wizard, on page 186.

• Windows Automatic Update Settings policy, on page 186.

• Power Management Wizard, on page 188.

For details, see Using the Windows-based Policies, on page 179.

The Mac OS-based wizards include:

• Enforce Power Management Settings, on page 190.

• Enforce VNC Settings, on page 192.

178 Administrator Guide, Version 5.3

Page 179: Dell KACE K1000 Admin Guide

Using the Scripting Features9

• Enforce Active Directory Settings, on page 192.

For details, see Using the Mac OS Configuration-based Policies, on page 189.

Using the Windows-based Policies

The following sections explain how to use the default policies available to Windows systems.

Enforce Registry SettingsThis wizard allows you to create scripts that enforce registry settings:

1. Use regedit.exe to locate and export the values from the registry that you are interested in.

2. Open the .reg file that contains the registry values you want with notepad.exe and copy the text.

3. Click Scripting > Configuration Policy.

4. Select Enforce Registry Settings.

The Configuration Policy : Desktop Enforcement page appears.

5. Enter a policy name in the Policy Name field.

6. Paste the copied registry values into the Registry File field.

7. Click Save.

The Script: Edit Detail page appears.

8. Enable and set a schedule for this policy to take effect.

A new script is created, which checks that the values in the registry file matching the values found on the target machines. Any missing or incorrect values are replaced. Refer to Adding Scripts, on page 166, for more information.

Remote Desktop Control TroubleshooterThis editor creates a troubleshooting script for the K1000 Management Appliance Remote Control functionality. The script that this page generates tests the following:

• Terminal Services: To access a Windows XP Professional machine using Remote Desktop, Terminal Services must be running. This script verifies that this is the case.

• Firewall Configuration: If the Windows XP SP2 Firewall is running on the machine, several different configurations can affect results in Remote Desktop requests being blocked by the firewall.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

If you edit a Wizard-based policy, keep the “Run As” setting as local system.

Administrator Guide, Version 5.3 179

Page 180: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

To troubleshoot remote behavior

1. Click Scripting > Configuration Policy.

1. Click Remote Desktop Control Troubleshooter.

The Configuration Policy : Remote Control Troubleshooter page appears.

2. Under Firewall Configuration, specify the required settings.

3. Click Save.

The Script: Edit Detail page appears.

4. Enable and set a schedule for this policy to take effect.

Refer to Adding Scripts, on page 166, for more information.

Enforce Desktop SettingsThis wizard allows you to build policies that affect the user's desktop wallpaper. The wallpaper bitmap file is distributed to each machine affected by the policy. This file must be in bitmap (.bmp) format.

To create a policy to enforce Desktop Settings

1. Click Scripting > Configuration Policy.

1. Click Enforce Desktop Settings.

2. Select the Use wallpaper check box.

3. Click Browse to select and upload the .bmp file to use for the wallpaper.

4. Select a position for the wallpaper image from the Position drop-down list.

• Select Stretch to stretch the image so that it covers the entire screen.

• Select Center to display the image in the center of the screen.

• Select Tile to repeat the image over the entire screen.

5. Click Save.

The Script: Edit Detail page appears.

6. Enable and set a schedule for this policy to take effect. Refer to Adding Scripts, on page 166 for more information.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

180 Administrator Guide, Version 5.3

Page 181: Dell KACE K1000 Admin Guide

Using the Scripting Features9

Desktop Shortcuts WizardThis wizard allows you to quickly create scripts that add shortcuts to users' Desktop, Start Menu, or Quick Launch bar. You can create an Internet shortcut and put a URL to the target with no parameters and working shortcut.

To create scripts to add shortcuts

1. Click Scripting > Configuration Policy.

2. Click Desktop Shortcuts Wizard.

The Configuration Policy : Enforce Shortcuts page appears.

3. Enter a name for the desktop shortcut policy in the Policy Name field.

4. Click Add Shortcuts.

5. Specify the shortcut details.

6. Click Save Changes to save the new shortcut.

7. Click Add Shortcut to add more shortcuts. To edit or delete a shortcut, hover over a shortcut and click the Trash can icon that appears.

8. Click Save.

The Script: Edit Detail page appears.

9. Enable and set a schedule for this policy to take effect.

Refer to Adding Scripts, on page 166, for more information.

Event Log ReporterThis wizard creates a script that queries the Windows Event Log and uploads the results to the K1000 Management Appliance.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Name Enter the text label that appears below or next to the shortcut.

Target Enter the application or file that is launched when the shortcut is selected. For example: Program.exe.

Parameters

Enter any command line parameters. For example: /S /IP=123.4.

WorkingDir

Enter the changes to the current working directory. For example: C:\Windows\Temp.

Location Select the location where the shortcut appears from the drop-down list. Options include: Desktop, Quick Launch, and Start Menu.

Administrator Guide, Version 5.3 181

Page 182: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

To create an Event Log query

1. Click Scripting > Configuration Policy.

2. Click Event Log Dumper.

The Configuration Policy : Event Log Reporter page appears.

3. Specify query details:

4. Click Save.

The Script : Edit Detail page appears.

5. Enable and set a schedule for this policy to take effect.

Refer to Adding Scripts, on page 166 for more information.

6. You can view the event log in the Computers : Detail page of the particular machine, by selecting Inventory > Computers.

7. In Scripting Logs, under Currently Deployed Jobs & Policies, click the View logs link next to Event Log.

MSI Installer WizardThis wizard helps you set the basic command line arguments for running MSI-based installers. Refer to the MSDN website (msdn.microsoft.com) for complete options documentation.

To create the MSI Installer policy

1. Click Scripting > Configuration Policy.

1. Click MSI Installer Wizard.

The Configuration Policy : MSI Wizard page appears.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Output filename

Enter the name of the log file created by the script.

Log file Enter the type of log you want to query: Application, System, and Security.

Event Type Enter the type of event you want to query: Information, Warning, and Error.

Source Name (Optional) Use this field to restrict the query to events from a specific source.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

182 Administrator Guide, Version 5.3

Page 183: Dell KACE K1000 Admin Guide

Using the Scripting Features9

2. Enter the following information:

Action Select a task from the drop-down list. Options include Install, Uninstall, Repair missing files, and Reinstall all files.

Software Select the application you want to install, uninstall, or modify from the drop-down list. You can filter the list by entering any filter options.

MSI Filename Specify the MSI filename if it is a zip.

User Interaction Select an option to specify how the installation should appear to end users. Options include: Default, Silent, Basic UI, Reduced UI, and Full UI.

Install Directory Enter the installation directory.

Additional Switches Enter details of any additional installer switches. Additional Switches are inserted between the msiexe.exe and the /i foo.msi arguments.

Additional Properties

Enter details of any additional properties. Additional properties are inserted at the end of the command line.For example: msiexec.exe /s1 /switch2 /i patch123.msi TARGETDIR=C:\patcher PROP=A PROP2=B

Feature List Enter the features to install. Separate features with commas.

Store Config per machine

Select this box to do per-machine installations only.

After install Select the behavior after installation. Options include:

• Delete installer file and unzipped files.

• Delete installer file, and leave unzipped files.

• Leave installer file, and delete unzipped files.

• Leave installer file and unzipped files.

Restart Options Select the restart behavior. Options include:

• No restart after installation.

• Prompts user for restart.

• Always restart after installation.

• Default.

Administrator Guide, Version 5.3 183

Page 184: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

3. Click Save. The Script: Edit Detail page appears.

4. Enable and set a schedule for this policy to take effect. Refer to Adding Scripts, on page 166 for more information.

UltraVNC WizardThe UltraVNC Wizard creates a script to distribute UltraVNC to Windows computers on your network. UltraVNC is a free software application that allows you to remotely log into another computer (through the Internet or network). Refer to the UltraVNC Web site (www.uvnc.com) for documentation and downloads.

To distribute UltraVNC to the computers on your network

1. Click Scripting > Configuration Policy.

2. Select UltraVNC Wizard.

The Configuration Policy : Ultra VNC Wizard page appears.

Logging Select the types of installer messages to log. Press CTRL and click to select multiple message types. Options include:

• None

• All Messages

• Status Messages

• Non-fatal warnings

• All error messages

• Start up actions

• Action-specific records

• User requests

• Initial UI parameters

• Out-of-memory or fatal exit information

• Out-of-disk-space messages

• Terminal properties

• Append to existing file

• Flush each line to the log

Log File Name Enter the name of the log file.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

184 Administrator Guide, Version 5.3

Page 185: Dell KACE K1000 Admin Guide

Using the Scripting Features9

3. Specify UltraVNC installation and authentication options:

4. Specify UltraVNC miscellaneous options:

5. Click Save.

The Script: Edit Detail page appears.

6. Enable and set a schedule for this policy to take effect. Refer to Adding Scripts, on page 166, for more information.

Install Options

Install Mirror Driver

Select this check box to install the optional UltraVNC Mirror Video Driver.The Mirror Video Driver is a driver that allows faster and more accurate updates. The video driver also makes a direct link between the video driver framebuffer memory and UltraWinVNC server.Using the framebuffer directly eliminates the use of the CPU for intensive screen blitting, resulting in a big speed boost and very low CPU load.

Install Viewer Select this check box to install the optional UltraVNC Mirror Video Driver.

Authentication

VNC Password Provide a VNC password for authentication.

Require MS Logon To use MS Logon authentication and to export the ACL from your VNC installation, use:MSLogonACL.exe /e acl.txt Copy and paste the contents of the text file into the ACL field. Review the script that is generated by this wizard to make sure its output is expected. You can view the raw script by clicking View raw XML Editor on the Script Detail page.

Key Based Encryption

Select this check box to enable key-based encryption.

Disable Tray Icon Select this check box if you do not want to display the UltraVNC tray icon on the target computers.

Disable client options in tray icon menu

Select this check box if you do not want to display node options in the tray icon menu on the target computers. This option is available if you did not select Disable Tray Icon option.

Disable properties panel

Select this check box to disable the UltraVNC properties panel on the target computers.

Forbid the user to close down WinVNC

Select this check box if you do not want to allow computer users to shut down WinVNC.

Administrator Guide, Version 5.3 185

Page 186: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

Un-Installer WizardThis wizard allows you to quickly build a script to uninstall a software package. The resulting script can perform three actions: Execute an uninstall command, Kill a process, and Delete a directory.

To create an uninstaller script

1. Click Scripting > Configuration Policy.

2. Click Un-Installer Wizard.

The Configuration Policy : Uninstaller page appears.

3. Enter the following information:

4. Click Save.

The Script: Edit Detail page appears.

5. Enable and set a schedule for this policy to take effect. Refer to Adding Scripts, on page 166 for more information.

Windows Automatic Update Settings policyThe K1000 Management Appliance provides a way for you to control the behavior of the Windows Update feature. This feature allows you to specify how and when Windows updates are downloaded so that you can control the update process for the computers on your network. The configuration settings reside under the Scripting > Configuration Policy

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Job Name Enter a name for the uninstaller script.

Software Item Select the software item to uninstall from the drop-down list.

The wizard attempts to fill in the correct uninstall command. Verify that the values are correct.

Uninstall Command Directory

When you select the software item, the wizard attempts to fill in the uninstall command directory, file, and parameters.

Review the entries to make sure the values are correct.Uninstall Command File

Uninstall Command Parameters

Kill Process To have a process killed before executing the uninstall command, enter the full name of the process in the Kill Process field. For example: notepad.exe.

Delete Directory. To have a directory deleted after executing the uninstall command, enter the full name of the directory in the Delete Directory field here. For example: C:\Program Files\Example_App\.

186 Administrator Guide, Version 5.3

Page 187: Dell KACE K1000 Admin Guide

Using the Scripting Features9

tab. More detailed information can be found at Microsoft's support site: KB Article 328010.

To modify Windows Automatic Update settings

1. Click Scripting > Configuration Policy.

2. Click Windows Automatic Update Settings.

The Windows Automatic Update Policy page appears.

3. Enter the following information:

4. Enter the details for the SUS Server and SUS Server Statistics. (SUS stands for Windows Server Update Service.)

5. Click Save.

The Script: Edit Detail page appears.

6. Enable and set a schedule for this policy to take effect.

Refer to Adding Scripts, on page 166, for more information.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Automatic (recommended)

Select this option to enable automatic downloading of Windows Updates.

Download updates for me, but let me choose when to install them.

Select this option ensure that you receive the latest downloads, but control their installation.

Notify me but don’t automatically download or install them.

Select this option to provide the additional flexibility in the installation of updates.Important: This may make your network more vulnerable to attack if you neglect to retrieve and install the updates on a regular basis.

Turn off Automatic Updates

Select this option if you are using the appliance patching feature to manage Microsoft patch updates.

Remove Admin Policy. User allowed to configure.

Select this option to provide users with the control over the updates downloaded.Important: This may make end-users, as a result your network, more vulnerable to attack.

Reschedule Wait Time Select the interval (in minutes) from the Reschedule Wait Time drop-down list to wait before rescheduling an update if the update fails.

Do not reboot machine while user logged in

Select to specify no reboot while a user is logged in.

Administrator Guide, Version 5.3 187

Page 188: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

To start the Automatic Windows Update on a nodeYou can start the Automatic Windows Update on the node using one of the following methods:

• Enable automatic Windows updates settings policy of the Appliance on the node.

• Enable the local policy for automatic deployment of Windows update on the node.

• Modify the registry key for automatic deployment of Windows update on the node.

• Set up the group policy on the domain for automatic deployment of Windows updates on the node.

• Configure the patching functionality for automatic deployment of the Windows update on the node.

Power Management WizardThe Power Management Wizard enables you to configure power management settings to determine and/or decrease the amount of time your computers are drawing power.

• To enable power management on a Windows XP System, you need EZ GPO. The Power Management Wizard automatically downloads EZ GPO when run on a Windows XP system. EZ GPO is a free tool that works in conjunction with Group Policy Objects on Windows XP. For more information on EZ GPO, see: http://www.energystar.gov

• On Windows 7 and Vista machines, power management is configured using the built-in powercfg command. (EZ GPO does not work on these platforms.)

About monitoring power useMost power companies are concerned with the consumption of desktop systems, but not laptops. For example, to collect information of desktop systems:

• Create a Smart Label in Inventory for the chassis type.

• Create reports grouping machines by the chassis type.

• Make a Smart Label in Inventory for Uptime since last reboot that contains the number of days that concern you.

To get an overview of your power consumption, run reports about power management for about a month. Go to Reporting > Reports to see the available reports in the Power Management category.

You can also configure how long node uptime information is retained. See To configure general settings for the server, on page 35. This is one of the last configuration options.

If you are using the patching functionality for automatic deployment of Windows updates on the node, you must disable the automatic deployment of Windows updates on the node by any other process to avoid the conflict between the different deployment processes.

188 Administrator Guide, Version 5.3

Page 189: Dell KACE K1000 Admin Guide

Using the Scripting Features9

To configure Power Management

1. Click Scripting > Configuration Policy.

2. Select Power Management Wizard.

3. On the Configuration Policy : Windows Power Management page, select your target operating system.

• If you manage Windows XP systems, refer to the side bar help.

• If you handle Windows Vista or Windows 7, you can select one of standard configurations: Balanced, High Performance, Power Saver, or Custom.

4. Click Save.

The Script : Edit Detail page opens.

5. Select the value for Status.

6. (Optional) Enter any Notes.

7. Limit the script to the appropriate version of Windows by doing one or both of the following:

• In the Deployment section, use labels to limit the deployment of the script to computers that run the corresponding version of Windows.

• In the Supported Operating Systems section, select the Pick Specific OS version check box and select the supported version of Windows.

For example, if you select Deploy to All Machines, you can use the Pick Specific OS Version option to limit it to a specific version of Windows.

Windows XP: Keep the default Run as Local System with any script created in a wizard.

“Run As” options are offered with Online KScripts like the Windows XP version of the Power Management script.

8. (Optional) Alert users before run.

9. (Optional) Change Scheduling options according to your preferences.

10. Click Save.

Using the Mac OS Configuration-based PoliciesThe following sections explain how to use the default policies available to Mac OS systems:

• Enforce Power Management Settings, on page 190.

• Enforce VNC Settings, on page 192.

• Enforce Active Directory Settings, on page 192.

To perform these steps, be sure to select your organization in the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 189

Page 190: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

Enforce Power Management SettingsThis policy offers you these different energy management profiles to configure and use on your Mac OS-based systems:

• Better energy savings

• Normal

• Better Performance

• Custom

You can tailor each of the profiles to these power sources:

• All

• Battery

• Charger (Wall Power)

• UPS

Power usage settings are a trade-off between CPU usage and power usage. Most of the settings are on/off check boxes to apply or remove options. You can add time periods, in numbers, to the Sleep settings. The policy options are shown below:

190 Administrator Guide, Version 5.3

Page 191: Dell KACE K1000 Admin Guide

Using the Scripting Features9

Figure 9-2: The Mac Power Management page

Administrator Guide, Version 5.3 191

Page 192: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

Enforce VNC SettingsThis configuration policy controls enables/disables the Mac OS built-in VNC server.

Figure 9-3: The Enforce VNC Settings page

Enforce Active Directory SettingsYou use this policy to add or remove a computer from your domain by:

• Choosing to add or remove a system.

• Entering your administrator credentials.

• Specifying the LDAP domain name and user authentication information.

• Deciding on the other options you have for this system as shown below.

You can also use this policy to ensure that your Mac OS nodes check into your Active Directory database.

The resulting script assumes that you have root access and shows your password unencrypted (clear text), so make sure that anyone using this script is trusted.

192 Administrator Guide, Version 5.3

Page 193: Dell KACE K1000 Admin Guide

Using the Scripting Features9

Figure 9-4: The Enforce Active Directory Settings page

Administrator Guide, Version 5.3 193

Page 194: Dell KACE K1000 Admin Guide

9 Using the Scripting Features

194 Administrator Guide, Version 5.3

Page 195: Dell KACE K1000 Admin Guide

10

Maintaining Your K1000 Management Appliance

This chapter describes the most commonly used features and functions for maintaining and administering K1000 Management Appliance.

• K1000 Management Appliance maintenance overview, on page 195

• Backing up K1000 Management Appliance data, on page 196.

• Restoring K1000 Management Appliance settings, on page 198.

• Updating K1000 Management Appliance software, on page 199.

• Updating OVAL definitions, on page 202.

• Troubleshooting K1000 Management Appliance, on page 203.

• Windows debugging, on page 204.

K1000 Management Appliance maintenance overview

The Server Maintenance page allows you to perform a variety of functions to maintain and update your K1000 Management Appliance, for example:

• Access the most recent appliance server backups

• Upgrade your appliance server to a newer version

• Retrieve updated OVAL definitions

• Restore to backed-up versions and also create a new backup of the appliance at any time

The Server Maintenance tab also enables you to reboot and shut down the appliance, as well as update appliance license key information.

From the Server Maintenance tab you can:

• Upgrade the appliance

• Update OVAL vulnerability definitions

• Create a backup appliance

• Enter or update the appliance License Key

• Restore to most recent backup

• Restore to factory default settings

Administrator Guide, Version 5.3 195

Page 196: Dell KACE K1000 Admin Guide

10 Maintaining Your K1000 Management Appliance

• Restore from uploaded backup files

• Reboot your appliance

• Reboot with extended database check

• Shut down your appliance

Upgrading your applianceKACE provides new server software patches on the corporate server. Your appliance checks kace.com nightly for recommended upgrades, which you can apply from the server maintenance page.

To upgrade your K1000 Management Appliance

1. Go to K1000 Settings > Server Maintenance.

2. Click Edit Mode.

3. Click Check for Upgrade.

If the upgrade is available, the label Available Upgrade along with the build number is displayed.

If the upgrade is not available, the label Your K1000 is up to date, is displayed.

4. Click Upgrade Now to upgrade to the available build.

When the appliance has finished upgrading, reboot it to use the latest features.

Backing up K1000 Management Appliance dataBy default, your K1000 Management Appliance automatically backs up at 3 A.M., creating two files on the backup drive:

• k1000 _dbdata.gz– containing the database backup

• k1000_file.tgz– containing any files and packages you have uploaded to the appliance.

To run the appliance backup manually

To run a K1000 Management Appliance backup before the nightly backup occurs, run the backup manually:

1. Go to K1000 Settings > Server Maintenance.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

196 Administrator Guide, Version 5.3

Page 197: Dell KACE K1000 Admin Guide

Maintaining Your K1000 Management Appliance10

2. Click Edit Mode.

3. In the K1000 Controls section, click Run Backup.

After creating the backup, the Settings > Logs tab appears.

Downloading backup files to another locationThe backup files are used to restore your K1000 Management Appliance configuration in the event of a data loss or during an upgrade or migration to new hardware. The K1000 Management Appliance contains only the most recent full backup of the files.

For a greater level of recoverability (for instance if you wanted to keep rolling backups), you can offload the backup files to another location so that they can be restored later if necessary. You can access the backup files for downloading from the Administrator UI as well as through ftp.

To change backup file location

1. Go to K1000 Settings > Server Maintenance.

2. In the K1000 Controls section, click the backup links:

• k1000_dbdata.gz– containing the database backup

• k1000_file.tgz– containing the files and packages you uploaded to the K1000 Management Appliance

3. Click Save in the dialog box that appears.

• In Internet Explorer, use Browse to specify a location for the files and click Save.

• In Firefox, you must have previously set the download location.

To access the backup files through ftp1. Open a command prompt.

2. At the C:\ prompt, enter:

ftp k1000

3. Enter the login credentials:

Username: kbftp. Password: getbxf.

4. Enter the following commands:

> type binary > get k1000_dbdata.gz > get k1000_file.tgz

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 197

Page 198: Dell KACE K1000 Admin Guide

10 Maintaining Your K1000 Management Appliance

>close >quit

Restoring K1000 Management Appliance settingsYou use backup files to restore your appliance configuration in the event of a data loss or to

transfer the setting during an upgrade or migration to new hardware. Restoring any type of backup file destroys the data currently configured in the appliance server. Dell recommends off-loading any backup files or data that you want to keep before performing a restore.

Restoring from most recent backupThe appliance has a built-in ability to restore files from the most recent backup directly from the backup drive. You can access the backup files from the Administrator UI or through ftp.

To restore from the most recent backup

1. Go to K1000 Settings > Server Maintenance.

2. Click Edit Mode.

3. Click Restore from Backup.

Uploading files to restore settingsIf you have off-loaded your backup files to another location, you can upload those files manually, rather than restoring from the backup files stored on the K1000 Management Appliance.

To upload backup files

1. Go to K1000 Settings > Server Maintenance.

2. Scroll down and click the Edit Mode.

3. In the K1000 Restore section, click Browse and locate the backup file.

4. Click Restore from Upload Files.

If your backup files are too large to upload using the default HTTP mechanism (the browser times out), you can upload them using FTP. To upload using FTP, enable the Enable backup via FTP and Make FTP writable security settings. For details see Configuring Local HTTPD, on page 42.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

198 Administrator Guide, Version 5.3

Page 199: Dell KACE K1000 Admin Guide

Maintaining Your K1000 Management Appliance10

Restoring to factory settingsThe appliance has a built-in ability to restore the itself back to its factory settings.

To view the factory settings refer to To set up your K1000 Management Appliance server, on page 18.

To restore to factory settings

1. Go to K1000 Settings > Server Maintenance.

2. Scroll down and click Edit Mode.

3. Click Restore Factory Settings.

Updating K1000 Management Appliance softwarePart of maintaining your Dell KACE K1000 Management Appliance involves updating the software that runs on the K1000 Management Appliance Server. This process also involves:

• Verifying that you are using the minimum required version of the K1000 Management Appliance

• Updating the license key in the Dell KACE K1000 Management Appliance to obtain the current product functionality.

To verify the minimum server versionBefore applying this update, verify your K1000 Management Appliance Server version meets the minimum version requirement.

1. Open your browser, and go to the URL for the K1000 Management Appliance (http://k1000/admin).

2. Select the About K1000 link located at the lower left of the screen.

3. The System Management Appliance line (below the license agreement) contains the release number, as shown in Figure 10-1 on page 200.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 199

Page 200: Dell KACE K1000 Admin Guide

10 Maintaining Your K1000 Management Appliance

Figure 10-1: About K1000

Updating the license keyAfter installing an upgrade to the Dell KACE K1000 Management Appliance server, you may need to enter a new KACE license key to fully activate the K1000 Management Appliance. You need the new license key to upgrade your appliance.

Updating your Dell KACE K1000 Management Appliance license key

1. Go to K1000 Settings > Server Maintenance.

2. Scroll down and click Edit Mode.

3. Under License Information, enter your new license key.

4. Click Save License.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

200 Administrator Guide, Version 5.3

Page 201: Dell KACE K1000 Admin Guide

Maintaining Your K1000 Management Appliance10

Applying the server updateIf you are using a previous version of the Dell KACE K1000 Management Appliance, you must apply the earlier updates separately before continuing. Refer to the release notes for your version of the Dell KACE K1000 Management Appliance to determine the minimum updates.

To apply the server update

1. Download the k1000_upgrade_server_XXXX.bin file, and save it locally.

2. Open your browser to http://k1000/admin.

3. Go to K1000 Settings > Server Maintenance.

4. Scroll down and click Edit Mode.

5. Under Update K1000, click Browse, and locate the update file you just downloaded.

6. Click Update K1000.

When the file has completed uploading, your K1000 Management Appliance will reboot with the latest features.

To verify the upgrade

After applying the upgrade, verify successful completion by reviewing the update log.

1. Go to K1000 Settings > Logs.

2. Select Updates from the Current log drop-down list.

3. Review the Update log for any error messages or warnings.

4. Click About K1000 in the upper right corner to verify the current version.

Updating patch definitions from KACEAlthough the definitions for Microsoft patches are updated automatically on a scheduled basis, you can retrieve the latest files manually from the Server Maintenance page.

To update the patch definitions

1. Go to K1000 Settings > Server Maintenance.

2. Scroll down and click Edit Mode.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 201

Page 202: Dell KACE K1000 Admin Guide

10 Maintaining Your K1000 Management Appliance

3. Click Update Patching to update your patch definitions.

To delete patch files

You can delete all previously downloaded patches:

1. Go to K1000 Settings > Server Maintenance.

2. Scroll down and click Edit Mode.

3. Click Delete Patch Files to delete the patch files.

To Reboot and shut down KACE K1000 Appliances

You may need to reboot the appliance from time to time when troubleshooting or upgrading its settings.

1. Click K1000 Settings > Server Maintenance.

2. Click Reboot K1000.

Before you can perform hardware maintenance, you need to shut down the appliance before unplugging it. You can shut down the appliance either by:

• Pressing the power button once, quickly.

• Clicking the Shutdown K1000 button on the Settings > Server Maintenance tab.

Updating OVAL definitionsAlthough the definitions for OVAL vulnerabilities are updated automatically on a scheduled basis, you can retrieve the latest files manually from the Server Maintenance page. For more information about OVAL definitions, see the Security and Patching Guide.

To update the OVAL and patch definitions

1. Go to K1000 Settings > Server Maintenance.

2. Scroll down and click Edit Mode.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

You can use the Reboot and Shutdown buttons after you click the Edit Mode link at the bottom of the page.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

202 Administrator Guide, Version 5.3

Page 203: Dell KACE K1000 Admin Guide

Maintaining Your K1000 Management Appliance10

3. Click Update OVAL.

Troubleshooting K1000 Management ApplianceYour appliance offers several log files that can help you detect and resolve errors. The log files are rotated automatically as each grows in size, so no additional administrative log maintenance procedures are required. Log maintenance checks are performed daily.

The appliance maintains the last seven days of activity in the logs. KACE Technical Support may request that you send the appliance server logs if they need more information in troubleshooting an issue. To download the logs, click the Download Logs link. For more information, see Downloading log files, on page 204.

Accessing K1000 Management Appliance logsYou can access the appliance Server logs by going to the Settings > Logs tab. Select the appropriate log to view from the Current log drop-down list. This area also provides a

reference for any K1000 Management Appliance informational or exception notices.

Log Type Log Name Description

Hardware Disk Status Displays the status of the appliance disk array.

Server K1000 Log Displays the errors generated on the server.

Access Displays the HTTP Server's access information.

Server Errors

Displays errors or server warnings regarding any of the onboard server processes.

Stats Displays the number of connections the appliance is processing over time.

Updates Displays details of any appliance patches or upgrades applied using the Update K1000 function.

Tomcat Log Displays the Tomcat log information.

System Performance

Displays system performance log information.

Konductor Log

Displays Konductor log information.

Opcode Cache

Displays opcode cache log information.

Client Client Errors

Displays Agent exception logs.

AMP Server Displays AMP server errors.

AMP Queue Displays AMP Queue errors.

Administrator Guide, Version 5.3 203

Page 204: Dell KACE K1000 Admin Guide

10 Maintaining Your K1000 Management Appliance

Downloading log filesThe Dell KACE K1000 Management Appliance provides the ability to directly download the logs into one file from the Admin UI. To help diagnose a problem, Dell KACE Technical support might ask you to submit log files.

To download Dell KACE K1000 Management Appliance logs

1. Go to K1000 Settings > Logs.

2. Click Download logs on the right of the Log page.

The logs are downloaded in the k1000_logs.tgz file.

3. Click Save.

In addition to the standard logging, you can enable other debug logs on a node:

• K1000 Agent – Enable debug logging on the node to troubleshoot machine inventory, managed installs, and file synchronizations.

• K1000 AMP Service – Enable debug logging on the Windows node to troubleshoot the on-demand running of Desktop Alerts, Run-Now scripts, and Patching. You can enable debug logging by configuring AMP Settings. For information on how to configure the AMP Settings page, refer to Configuring Agent Messaging Protocol Settings, on page 47.

Windows debugging

To log on to the AMP service1. Open the SMMP configuration file:

%PROGRAMFILES%\KACE\K1000\SMMP.conf

2. Add the following line:

debug=true

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

For more information on debug logging on Linux and Mac OS platforms, refer to Appendix E: Manually Deploying Agents, starting on page 301.

SMMP.conf Windows Mac OS X Linux

without debug=true debug.log with basic logging

agent.log with basic logging

agent.log with basic logging

204 Administrator Guide, Version 5.3

Page 205: Dell KACE K1000 Admin Guide

Maintaining Your K1000 Management Appliance10

with debug=true debug.log with detailed logging

agent.log with detailed logging

agent.log with detailed logging

SMMP.conf Windows Mac OS X Linux

Administrator Guide, Version 5.3 205

Page 206: Dell KACE K1000 Admin Guide

10 Maintaining Your K1000 Management Appliance

Understanding Disk Status log dataWhen troubleshooting the K1000 Management Appliance, you often work with the Disk Status log. If there is a physical problem with the appliance, that issue is reflected here.

K1000 Management Appliance server and agent exceptions are reported nightly to kace.com if you enabled crash reporting on the Settings > General tab.

206 Administrator Guide, Version 5.3

Page 207: Dell KACE K1000 Admin Guide

Maintaining Your K1000 Management Appliance10

Figure 10-2: Disk Status Log

In the cases where the logs display errors, this section will be helpful to solve any problems. This section does not describe every possible error message, but other possible errors can be resolved by following the same steps:

Step Description

Step 1: Rebuild The disk status log error “Degraded” indicates that you need to rebuild the array. To do this:

• Click Rebuild Disk Array. Rebuilding can take up to 2 hours.

• If an error state still exists after this, proceed to step 2.

Administrator Guide, Version 5.3 207

Page 208: Dell KACE K1000 Admin Guide

10 Maintaining Your K1000 Management Appliance

Step 2: Power Down and Reseat the Drives

In some cases, the degraded array may be caused by a hard drive that is no longer seated firmly in the drive-bay. In these cases, the disk status will usually show “disk missing” for that drive in the log.

• Power down the Dell KACE K1000 Management Appliance.

• Once the appliance is powered off, eject each of the hard-drives and then re-insert them, making sure that the drive is firmly in the bay.

• Power the machine back on and then look again at the disk status log to see if that has resolved the issue.

• If an error state still exists, try rebuilding again or proceed to Step 3.

Step 3: Call Dell KACE Technical Support

If you have performed the previous steps and are still experiencing errors, contact Dell KACE Technical Support by email at ([email protected]) or phone (888)522-3638 option 2.

Step Description

208 Administrator Guide, Version 5.3

Page 209: Dell KACE K1000 Admin Guide

11

LDAP

The Dell KACE K1000 Management Appliance LDAP feature allows you to browse and search the data located on an LDAP Server.

• About LDAP Labels, on page 209.

• Creating an LDAP Label Manually, on page 210

• Creating an LDAP Label with the Browser, on page 211.

• Using LDAP Easy Search, on page 213.

• Using the LDAP Browser Wizard, on page 214.

• Automatically Authenticating LDAP Users, on page 215.

About LDAP LabelsLDAP Labels allow the automatic labeling of machine records based on LDAP or Active Directory interaction. The search filter queries the LDAP server. If it finds any entries, they are automatically labelled.

You can bind to an LDAP query based on the following Dell KACE K1000 Management Appliance variables:

• Computer Name

• Computer Description

• Computer MAC

• IP Address

• User name

• User Domain

• Domain User

If the LDAP server requires credentials for administrative login (i.e., non-anonymous login), supply these credentials.

If no LDAP user name is given, an anonymous bind is attempted. Each LDAP Label can connect to a different LDAP/AD server.

Administrator Guide, Version 5.3 209

Page 210: Dell KACE K1000 Admin Guide

11 LDAP

Creating an LDAP Label Manually

1. Click Home > Label > LDAP Labels.

2. In the Choose Action menu, click Add New Item.

The LDAP Label : Edit Detail page appears.

Skip the Enabled check box until you have tested the LDAP Label.

3. Enter the following information:

If you are unable to fill in the information for Search Base DN and Search Filter fields, you can use the LDAP Browser Wizard. For more information on the LDAP Browser Wizard, refer to Service Desk Administrator Guide.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Enabled Select this check box to enable the appliance to run the label each time a system checks in. Select this only after you have tested the label.

Filter Type Select the LDAP filter type: Machine or User.

Associated Label Name

Select an existing label to associate with this LDAP label.

Associated Label Notes Any notes from the label definition are automatically added to this field.

Server Hostname Specify the IP or Host Name of the LDAP Server.Note: For connecting through SSL, use the IP or Host Name. For example: ldaps://HOSTNAME.If you have a non-standard SSL certificate installed on your LDAP server, contact KACE Support for assistance before proceeding. A non-standard certificate can be an internally-signed or a chain certificate that is not from a major certificate provider such as Verisign.

LDAP Port Number Enter the LDAP port number, which is either 389 or 636 (LDAPS).

Search Base DN Enter the Search Base DN (Distinguished Names). For example: CN=Users,DC=kace,DC=com.

Search Filter Enter a search filter. For example: (&(sAMAccountName=admin)(memberOf=CN=financial,DC=kace,DC=com))

LDAP Login Enter the LDAP login. For example: LDAP Login: CN=Administrator, CN=Users,DC=kace=com

LDAP Password Enter the password for the LDAP login.

Negative searches are NOT supported correctly in LDAP search using Microsoft’s recommended method. You will receive a bad search filter error, even if you use the filter builder.

Error example: (!samaccountname=David)

Workaround example: (!(samaccountname=David))

210 Administrator Guide, Version 5.3

Page 211: Dell KACE K1000 Admin Guide

LDAP11

4. Click the Test LDAP Label button to test your new label. Change the label parameters and test again as necessary.

5. If the LDAP label is ready to use, select the Enabled check box.

Otherwise, you can save without enabling.

6. Click Save.

Each time a machine checks into the K1000 Management Appliance, this query runs against the LDAP server. The admin value in the Search Filter field is replaced with the name of the user that is logged onto this machine. If a result is returned, the machine gets the label specified in the Associated Label field.

You can also create an LDAP Label using the LDAP Browser.

Creating an LDAP Label with the Browser

The LDAP Browser allows you to browse and search the data located on the LDAP Server (for example, the Active Directory Server.)

You must have the Bind DN and Password to log on to the LDAP Server.

1. Go to Home > Labels > LDAP Browser.

2. Specify the LDAP Server Details

3. Click Test.

On a successful connection to the LDAP server, a list of possible base DNs (Distinguished Names) available on that directory is displayed. You can use these base DNs as a starting point to browse and search the directory.

To test your LDAP label, click the Test button and review the results.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

LDAP Server Enter the IP or the Host Name of the LDAP Server.Note: For connecting through SSL, use the IP or Host Name. For example: ldaps://HOSTNAME.If you have a non-standard SSL certificate installed on your LDAP server, such as an internally-signed certificate or a chain certificate that is not from a major certificate provider such as Verisign, contact KACE Support for assistance before proceeding.

LDAP Port Enter the LDAP port number, either 389 or 636 (LDAPS).

LDAP Login Enter the Bind DN. For example:CN=Administrator,CN=Users,DC=kace,DC=com.

LDAP Password Enter the password for the LDAP login.

Administrator Guide, Version 5.3 211

Page 212: Dell KACE K1000 Admin Guide

11 LDAP

If the connection was not established, the Operation Failed message appears, which can be due to one of the following reasons:

• The IP or Host Name provided is incorrect.

• The LDAP server is not up.

• The login credentials provided are incorrect.

4. Click a Base DN, or click Next.

A new window displays the Search Base DN and the Search Filter fields. The Search Base DN is populated on the basis of the Base DN that you selected in the previous screen. You can modify the Search Base DN and the Search Filter values.

5. You can also use the Filter Builder to create complex filters. Click Filter Builder. The Query Builder is displayed. Specify the following information.

6. To add more than one attribute:

7. Click OK.

The query appears in the Search Filter text area. For example, (samaccountname=admin).

8. Click Browse to display all the immediate child nodes for the given base DN and search filter. Click Search to display all the direct and indirect child nodes for the given base DN and search filter.

The search results are displayed in the left panel.

9. Click a child node to view its attributes.

The attributes are displayed in the right panel.

Attribute Name Enter the attribute name. For example: samaccountname.

Relational Operator Select the relational operator from the drop-down list. For example, =.

Attribute Value Enter the attribute value. For example, admin.

Conjunction Operator Select the conjunction operator from the drop-down list. For example, AND.

Note: This field is available for the previous attribute only when you add a new attribute.

Add Click to add multiple attributes.

Search Scope Click One level to search at the same level or click Sub-tree level to search at the sub-tree level.

212 Administrator Guide, Version 5.3

Page 213: Dell KACE K1000 Admin Guide

LDAP11

Using LDAP Easy Search

You can use LDAP Easy Search to quickly search the data located on the LDAP Server.

To use the LDAP Easy Search

1. Go to Home > Label >LDAP Browser.

2. Specify the LDAP Server Details

3. Click Test.

4. On a successful connection to the LDAP server, a list of possible base DNs available on that directory is displayed. You can use these base DNs as a starting point to browse and search the directory.

If the connection was not established, the Operation Failed message appears. Check the following causes:

• The IP or Host Name provided is incorrect.

• The LDAP server is not up.

• The login credentials provided are incorrect.

5. Click a Base DN, or click Next.

A new window displays the Search Base DN and the Search Filter fields. The Search Base DN field is populated on the basis of the Base DN that you selected in the previous screen. You can modify the Search Base DN and Search Filter values.

6. Click the Go to LDAP Easy Search link.

The LDAP EasySearch page appears.

7. Enter any key word for search, and click GO.

For more a specific search, you can click the Indexed field option or Non-Indexed field option. You can also specify Other attributes, separated by comma.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

LDAP Server Enter the IP or the Host Name of the LDAP Server.Note: For connecting through SSL, use the IP or Host Name. For example: ldaps://HOSTNAME.If you have a non-standard SSL certificate installed on your LDAP server, such as an internally-signed certificate or a chain certificate that is not from a major certificate provider such as Verisign, contact KACE Support for assistance before proceeding.

LDAP Port Enter the LDAP port number, either 389 or 636 (LDAPS).

LDAP Login Enter the Bind DN. For example:CN=Administrator,CN=Users,DC=kace,DC=com

LDAP Password Enter the password for the LDAP login.

Administrator Guide, Version 5.3 213

Page 214: Dell KACE K1000 Admin Guide

11 LDAP

Using the LDAP Browser WizardThe LDAP Browser Wizard enables you to fill in the information for the Search Base DN and the Search Filter fields. Using the LDAP Browser Wizard, you can browse and search the data located on the LDAP Server. For example, Active Directory Server.

You must have the Bind DN and the Password to log on to the LDAP Server.

To use the LDAP Browser Wizard

1. Go to Home > Label > LDAP Browser.

2. Specify the LDAP Server Details

3. Click Test.

4. On a successful connection to the LDAP server, a list of possible base DNs (Distinguished Names) available on that directory is displayed. You can use these base DNs as a starting point to browse and search the directory.

If the connection was not established, the Operation Failed message appears. Check the following causes:

• The IP or Host Name provided is incorrect.

• The LDAP Server is not up.

• The login credentials provided are incorrect.

5. Click Next or one of the base DNs to advance to the next step.

A new window displays the Search Base DN and Search Filter fields. The Search Base DN is populated on the basis of the Base DN that you selected in the previous screen. You can modify the Search Base DN and Search Filter field values.

6. To create complex filters, click Filter Builder.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

LDAP Server Enter the IP or Host Name for the LDAP Server.Note: For connecting through SSL, use the IP or the Host Name. For example: ldaps://HOSTNAME.If you have a non-standard SSL certificate installed on your LDAP server, you need to contact KACE Support for assistance before proceeding. A non-standard certificate can be an internally-signed or a chain certificate that is not from a major certificate provider such as Verisign.

LDAP Port Enter the LDAP Port number. For example: 389 or 636 (LDAPS).

LDAP Login Enter the Bind DN. For example:CN=Administrator,CN=Users,DC=kace,DC=com

LDAP Password Enter the password for the LDAP login.

214 Administrator Guide, Version 5.3

Page 215: Dell KACE K1000 Admin Guide

LDAP11

The Query Builder is displayed.

7. Specify the following information:

8. To add more than one attribute:

9. Click OK. The query appears in the Search Filter text area. For example, (samaccountname=admin).

10. Click Browse to display all the immediate child nodes for the given base DN and search filter or click Search to display all the direct and indirect child nodes for the given base DN and Search Filter.

The search results are displayed in the left panel.

11. Click a child node to view its attributes.

The attributes are displayed in the right panel.

12. Click Next to confirm the LDAP configuration.

13. Click Next to use the displayed settings.

Automatically Authenticating LDAP UsersInstead of setting up users individually on the Users tab, you can configure the K1000 Management Appliance for local authentication or External LDAP Server authentication. The appliance can then access a directory service (such as LDAP) for user authentication. This allows users to log into the appliance Administrator portal using their domain user name and password, without having to add users individually from the Users tab.

To configure the appliance for user authentication

Attribute Name Enter the attribute name. For example: samaccountname.

Relational Operator Select the Relational Operator from the drop-down list. For example: =.

Attribute Value Enter the attribute value. For example: admin.

Conjunction Operator Select the Conjunction Operator from the drop-down list. For example, AND.Note: This field is available for the previous attribute only when you add a new attribute.

Add Click to add multiple attributes.

Search Scope Click One level to search at the same level or click Sub-tree level to search at the sub tree level.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 215

Page 216: Dell KACE K1000 Admin Guide

11 LDAP

1. Click Settings > Control Panel.

The Settings: Control Panel page appears.

2. Click User Authentication.

The K1000 Settings: Authentication page appears.

3. Click Edit Mode.

4. Specify the authentication method you want to use:

5. Click Edit Mode to edit External LDAP Server Authentication fields.

6. Click the appropriate icons next to the server name to perform described actions:

7. Click Add New Server to add a new LDAP Server.

You can have more than one LDAP Server/Directory configured.

K1000 (local) Authentication)

Select this option to enable local authentication. (This is the default.)If local authentication is enabled, the password is authenticated against the existing entries in the local database at Service Desk > Users.

External LDAP Server Authentication

Select this option to enable external user authentication.You can use external authentication against an LDAP server or Active Directory server.If External LDAP Server Authentication is enabled, the password is authenticated against the External LDAP Server.Contact KACE customer support if you need assistance with this process.

If the External LDAP Server Authentication is enabled, provide credentials for administrative login.

The LDAP user configured should at least have READ access to the “search base” area. If you do not specify an LDAP user name, an anonymous bind is attempted.

Icon Description

Schedules a user import for this server.

Modifies the server definition.

Removes the server.

Changes the order of the server in the list of servers.

All servers must have a valid IP address or Hostname. Otherwise, the appliance will timeout, resulting in login delays when using LDAP authentication.

216 Administrator Guide, Version 5.3

Page 217: Dell KACE K1000 Admin Guide

LDAP11

8. Complete the LDAP server definition by specifying the following information:

9. Click Apply to save your changes.

10. To test the LDAP settings, enter a password in the Test User password, and then click Test LDAP Settings.

If you are unable to fill in the information for Search Base DN and Search Filter, you can use the LDAP Browser Wizard. For more information on how to use the LDAP Browser Wizard, refer to Using the LDAP Browser Wizard, on page 214.

Server Friendly Name Enter a name for the server.

Server Host Name (or IP)

Enter the IP or Host Name of the LDAP server.Note: For connecting through SSL, use the IP or the Host Name. For example: ldaps://HOSTNAME.If you have a non-standard SSL certificate installed on your LDAP server, contact KACE Support for assistance before proceeding. A non-standard certificate can be an internally-signed or a chain certificate that is not from a major certificate provider such as Verisign.

LDAP Port Number Enter the LDAP Port number, either 389 or 636 (LDAPS).

Search Base DN Enter the Search Base DN. For example:

CN=Users,DC=hq,DC=corp,DC=kace,DC=com.

Search Filter Enter the Search Filter. For example:

(samaccountname=admin).

LDAP Login Enter the LDAP login. For example:

CN=Administrator,CN=Users,DC=hq,DC=corp,DC=kace,DC=com

LDAP Password (if required)

Enter the password for the LDAP login.

Role Required. Enter the user’s role:

• Admin Role: This user can log on to and access all features of the administrator UI and Service Desk. The Admin Role is the default role.

• Read-Only Admin Role: This user can log on but cannot modify any settings in the administrator UI or Service Desk.

• User Role: This user can log on only to the Service Desk.

• Login Not Allowed: This user cannot log on to the Service Desk.

Note: The roles listed above are system provided roles and are not editable. To create a new role, refer to the Service Desk Administrator Guide.

Administrator Guide, Version 5.3 217

Page 218: Dell KACE K1000 Admin Guide

11 LDAP

To schedule a User Import1. Click Edit Mode to edit the External LDAP Server Authentication fields.

2. Click the icon next to the server name in the list of servers to schedule a user import.

The User Import : Schedule – Choose attributes to import: Step 1 of 3 page appears.

The LDAP Server Details are displayed, which are read-only:

3. Specify the attributes to import.

If you are unable to complete the information for Search Base DN and Search Filter, you can use the LDAP Browser Wizard. For more information on how to use the LDAP Browser Wizard, refer to Using the LDAP Browser Wizard, on page 214.

4. In Email Notification section, click to enter the recipient’s e-mail address, or choose Select user to add from the drop-down list.

LDAP Server The IP or Host Name of the LDAP Server.

LDAP Port The LDAP Port number, which is either 389 (LDAP) or 636 (LDAPS).

Search Base DN The Search Base DN. For example:OU=users,DC=domain,DC=com

Search Filter The Search Filter.

LDAP Login The LDAP login.

LDAP Password The LDAP login password.

Attributes to retrieve Specify the attributes to retrieve. For example:samaccountname, objectguid, mail, memberof, displayname, sn, cn, userPrincipalName, name, descriptionIf you leave this field blank, it retrieves all attributes. This may make the import process slow, and is not recommended.

Label Attribute Enter a label attribute. For example: memberof.Label Attribute is the attribute on a customer item that returns a list of groups this user is a member of. The union of all the label attributes will form the list of labels you can import.

Label Prefix Enter the label prefix. For example: ldap_The Label Prefix is a string that is added to the front of all the labels.

Binary Attributes Enter the Binary Attributes. For example: objectsid.Binary Attributes indicates which attributes should be treated as binary for purposes of storage.

Max # Rows Enter the maximum rows. This limits the result set that is returned in the next step.

Debug Output Click the check box to view the debug output in the next step.

218 Administrator Guide, Version 5.3

Page 219: Dell KACE K1000 Admin Guide

LDAP11

5. In Scheduling section, specify the scan schedule:

6. Click Next.

The User Import : Schedule - Define mapping between User attributes and LDAP attributes: Step 2 of 3 page opens.

7. Select the value from the drop-down list next to each LDAP attribute to map the values from your LDAP server into the User record on the appliance.

The fields in red are mandatory. The LDAP Uid must be a unique identifier for the user record.

8. Select a label to add to the appliance.

Press CTRL and click to select more than one label. This list displays a list of all the Label Attribute values that were discovered in the search results.

9. Click Next.

10. Review the information displayed in the tables below:

• The Users to be Imported table displays list of users reported.

• The Labels to be Imported table displays the list of labels reported.

• The Existing Users table and the Existing Labels table display the list of Users and Labels that are currently on the appliance.

• Only users with a LDAP UID, User Name, and E-mail value will be imported. Any records that do not have these values are listed in the Users with invalid data table.

11. Click Next to start the import.

The User Import : Schedule - Import data into the K1000: Step 3 of 3 page opens.

12. Click Import Now to save the schedule information and load the user information into the appliance.

After importing, the User list page appears, where you can edit the imported user records.

13. Click Save to save schedule information.

Don’t Run on a Schedule

Select this to not have the user import run on a schedule. (Default)

Run Every day/specific day at HH:MM AM/PM

Run daily or a specific day of the week at the specified time.

Run on the nth of every month/specific month at HH:MM AM/PM

Run on a specific date or day of the month at the specified time.

Administrator Guide, Version 5.3 219

Page 220: Dell KACE K1000 Admin Guide

11 LDAP

The Settings: Authentication page opens.

The imported user can log on to and access all features of the administrator UI and Service Desk depending on the role assigned.

220 Administrator Guide, Version 5.3

Page 221: Dell KACE K1000 Admin Guide

12

Running the K1000 Appliance Reports

The Dell KACE K1000 Management Appliance provides a variety of reporting and alert features that enable you get a detailed view of the activity on your organizations’ implementation.

The K1000 Management Appliance 5.3 includes a new reporting engine. If you are upgrading from an earlier version, the previous Reports and the reporting engine are still available. These Reports are listed under the Classic Reports tab. Appendix G: K1000 Classic Reports, starting on page 321, contains instructions for using this deprecated feature.

• Reporting Overview, on page 221

• Running Reports, on page 222

• Creating and Editing Reports, on page 223

• Scheduling Reports, on page 229

• Using Alert Messages, on page 233

• E-mail Alerts, on page 234

Reporting OverviewThe K1000 Management Appliance is shipped with many stock reports. To view the list, select Reporting > Reports. The reporting engine generate reports in HTML, CSV, and TXT formats. By default, the appliance provides reports in the following general categories:

• Compliance

• Dell Updates

• Dell Warranty

• Hardware

• Service Desk

Administrator Guide, Version 5.3 221

Page 222: Dell KACE K1000 Admin Guide

12 Running the K1000 Appliance Reports

• iPhone

• Inventory

• K1000

• Network

• Patching

• Power Management

• Security

• Software

• Template

• Virtual Kontainers

You can duplicate and modify these reports as necessary. However, a strong knowledge of SQL is required to successfully change a report.

Running ReportsThe K1000 Reports page displays a list of the available reports. The View by menu allows

you to filter which reports are displayed by category.

To run any of the K1000 Management Appliance reports, click the desired format type: HTML, CSV, or TXT.

For the HTML format, the report is displayed in a new window. For other formats, you can open the file or save it to your computer.

Opening a CSV file containing multi byte characters with Microsoft Excel may yield “garbage characters" in the resulting worksheet. See Dell KACE Support for instructions on how to import the CSV file into an Excel worksheet.

To use, create, delete or modify Reports, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

222 Administrator Guide, Version 5.3

Page 223: Dell KACE K1000 Admin Guide

Running the K1000 Appliance Reports12

Creating and Editing ReportsIf you have other reporting needs not covered by default reports, you can:

• Duplicate an existing report and modify the copy to suit your needs. See To duplicate an existing report on page 229.

• Create a new report using the Report Wizard. See To create a new report using the Report Wizard on page 225.

• Create an SQL report. See To create a new SQL report on page 228.

Report LayoutTo make the analysis of your data easier, the K1000 Management Appliance can lay out reports by:

• Column and row order.

• Group rows under a subheading row.

• Order rows by ascending or descending alphanumeric sequence.

• Prioritize row sorting.

The following graphic shows an example of grouping rows. In this example, suppose you want to create a list of Windows machines that have Adobe Illustrator installed, and for license reasons, you want them separated by operating system. The report criteria looks for Illustrator and makes the operating system (OS_Name) the break column (displayed as a

Administrator Guide, Version 5.3 223

Page 224: Dell KACE K1000 Admin Guide

12 Running the K1000 Appliance Reports

subheading). The report returns a list of machines divided into Windows XP, Windows Vista, Windows 7, and shows the number of machines in each group.

224 Administrator Guide, Version 5.3

Page 225: Dell KACE K1000 Admin Guide

Running the K1000 Appliance Reports12

The following graphics shows an example of sorting using two criteria. In this example, suppose that you want to create a list of the last time the agent was synced sorted by operating system and domain. The Sort on fields selection is:

The report returns a list of computers first sorted by operating system and then domain. The sort criteria first groups the computers by the type of operating system and then by the domain:

To create a new report using the Report Wizard1. Click Reporting > Reports.

The K1000 Reports page appears.

2. In the Choose Action menu, click Add New Report.

The Define a New Report page is displayed.

3. Enter the report details as shown:

Report Title Display name for the report. Make this as descriptive as possible, so you can distinguish this report from others.

Administrator Guide, Version 5.3 225

Page 226: Dell KACE K1000 Admin Guide

12 Running the K1000 Appliance Reports

4. Click the appropriate topic name from the Available Topics list. For example, software.

5. Click Next.

The Define a New Report: Fields to include page is displayed.

6. Select the fields that you want to include in your report.

Clicking a Section title toggles the fields in the section.

7. Click Next.

The Define a New Report: Fields order page is displayed.

8. Using drag and drop, place the fields in the order you want the columns to appear on the Report.

9. Click Next.

The Define a New Report: Sort on fields page is displayed.

10. Configure how the rows are arranged.

Report Category Category for the report. If the category does not already exist, it will be added to the drop-down list on the Reports list page and displayed in the Report list on the K1ooo Reports page.

Description Information that the report will provide.

Show Line Number Column

Adds number column for each row.

Report Topic The available topics are displayed in the menu. This sets which fields are available for the report, which you define in step 6.

226 Administrator Guide, Version 5.3

Page 227: Dell KACE K1000 Admin Guide

Running the K1000 Appliance Reports12

• Order By: Specify how the results are sorted based on the fields defined in step 6.

These fields organize the data by priority with the top field having the highest priority. Report data is organized by the selection in the first field, and then by the second field, and then by the third field. For an example, see Report Layout, on page 223.

• Sequence: Orders the results in either ascending or descending alphanumeric order.

• Break Header: Groups results under a subheading using the name of the field selected in the Order by column.

11. Click Next.

The Define a New Report: Filters page is displayed.

12. (Optional) Use filter criteria if you don't want to return the entire data set in your report:

a. To add a filter, click or to add a nested group

b. Select the AND/OR operator from the and/or drop-down list.

AND: Match all of the following fields. OR: Match any of the following fields.

c. Select the appropriate field from the Field Name list. For example, Supported Operating Systems.

d. Select the appropriate operator from the Operator drop-down list. For example, contains.

e. In the Value field, enter the appropriate value. For example, Windows.

This rule filters the data and displays only Windows machines.

f. Save the filter.

g. To add another filter, repeat the preceding steps.

13. Click Save.

Administrator Guide, Version 5.3 227

Page 228: Dell KACE K1000 Admin Guide

12 Running the K1000 Appliance Reports

The K1000 Reports page is displayed with the new report listed. The View by field is automatically set to the category of the new report.

14. To run the new report, click the desired format. If you select CSV or TXT, you can open the file or save it to your computer.

To create a new SQL report1. Click Reporting > Reports.

The K1000 Reports page appears.

2. In the Choose Action menu, click Add New SQL Report.

The K1000 Report : Edit Report page is displayed.

3. Enter the report details as shown:

4. Click Save.

The K1000 Management Appliance checks the syntax for your report and reports any errors.

5. To run the new report, click the desired format. If you select CSV or TXT, you can open the file or save it to your computer.

Title Display name for the report. Make this as descriptive as possible, so you can distinguish this report from others.

Category Category for the report. If the category does not already exist, it will be added to the drop-down list on the Reports list page and displayed in the Report list on the K1ooo Reports page.

Description Information that the report will provide.

Output Types The formats that you want available for this report.

SQL Select Statements

The query statement that will generate the report data. For reference, consult the MYSQL documentation.

Break on Columns

A comma-separated list of SQL column names. The report will generate break headers and sub totals for these columns.

Show Line Number Column

Adds number column for each row.

228 Administrator Guide, Version 5.3

Page 229: Dell KACE K1000 Admin Guide

Running the K1000 Appliance Reports12

To edit an existing report1. Click Reporting > Reports.

The K1000 Reports page appears.

2. Click the report that you want to edit.

Depending on the type of report, one of the following pages is displayed:

• The K1000 Reports : Edit Report page, if the Report is an SQL report.

• Define a New Report page, if the report was created by the Report Wizard.

3. To edit an SQL report, use the same steps as described in To create a new SQL report, on page 228.

4. To edit a report using the Report Wizard, use the same steps as described in To create a new report using the Report Wizard, on page 225.

To duplicate an existing report

1. Click Reporting > Reports.

The K1000 Reports page appears.

2. Click the report title you want to duplicate. Depending on the type of report, either of the following pages are displayed.

• Wizard Report: Define a New Report page

• SQL Report: The K1000 Reports : Edit Report page

3. To duplicate the report, click Duplicate.

Depending on the type of report, either the The K1000 Reports : Edit Report page is displayed, where you can modify the report for your needs, or the Reporting wizard is started where you can modify the duplicated report.

4. Modify the report details as necessary.

5. Click Save.

Scheduling ReportsReports schedules allow you to specify a specific time to run reports and send email notifications of the results to one or more recipients. The Reports Schedules page displays a list of scheduled reports

You cannot duplicate a report made with the Report Wizard.

Administrator Guide, Version 5.3 229

Page 230: Dell KACE K1000 Admin Guide

12 Running the K1000 Appliance Reports

To create a report scheduleReports are scheduled on the Schedule Reports : Edit Detail page.

1. Go to the Schedule Reports : Edit Detail page in one of two ways:

• Go to Reporting > Reports, and then on the K1000 Reports page click the report’s

Schedule icon .

• Go to Reporting > Schedule Reports, and then from the Choose Action menu, select Create a New Schedule.

The Schedule Reports : Edit Detail page is displayed.

2. On the Schedule Reports : Edit Detail page, specify the details for the report schedule, as described in the following sections.

• To select a report if starting from the Schedule icon

• To select a report if starting from the Schedule Reports tab

• To define email notifications

• To schedule the time the report runs

To select a report if starting from the Schedule icon1. If you accessed the Schedule Reports : Edit Detail page starting from the Schedule icon

, specify the following schedule details:

• Schedule Title: The display name for the schedule. Make this as descriptive as possible, so you can distinguish this schedule from others.

• Description: The information that the schedule provides.

• Select the Reports or Classic Reports radio button based on the type of report you are scheduling. This determines which of reports are listed in the Select report to schedule drop-down list.

• Report to Schedule: The name of the report is already selected.

• Report Output Formats: The available output formats (CSV, TXT, or HTML) for the scheduled report.

2. Continue to To define email notifications, on page 231.

To select a report if starting from the Schedule Reports tab1. If you accessed the Schedule Reports : Edit Detail page starting from the Schedule

Reports tab, specify the following schedule details:

230 Administrator Guide, Version 5.3

Page 231: Dell KACE K1000 Admin Guide

Running the K1000 Appliance Reports12

• Schedule Title: The display name for the schedule. Make this as descriptive as possible, so you can distinguish this schedule from others.

• Description: The information that the schedule provides.

• Select the Reports or Classic Reports radio button based on the type of report you are scheduling. This determines which of reports are listed in the Select report to schedule drop-down list.

• Report to Schedule: From the Select report to schedule drop-down list, select the report that you want to schedule.

Use the Filter to limit the number of reports displayed in the Select report to schedule menu.

The Filter filters by character. For example, entering “dell” displays report titles containing dell.

• Report Output Formats: The available output formats (CSV, TXT, or HTML) for the scheduled report.

2. Continue to To define email notifications, on page 231.

To define email notifications

1. (Required) Define the email notifications by clicking .

Administrator Guide, Version 5.3 231

Page 232: Dell KACE K1000 Admin Guide

12 Running the K1000 Appliance Reports

The Recipients field and Select user to add drop-down list are displayed.

2. Enter the email addresses in following ways:

• Enter a comma-separated list of email addresses in the Recipients field.

• Use the Filter to limit the number of email address displayed in the Select user to add menu.

The Filter filters by character. For example, entering “mgt” would display email addresses [email protected], [email protected], and so on.

3. In the Subject field, enter the subject of the schedule.

The subject can help the reader to quickly identify what the report is about.

4. In the Message Text field, enter the message text in the notification.

5. If desired, select Only send when results are present.

To schedule the time the report runs

1. Select the appropriate radio button and time under Scheduling:

2. Click Save.

Don’t Run on a Schedule (Default) Select when you do not want to run the report on a schedule.

Run Every n hours Run at a specified hour interval.

Run Every day/specific day at hour:minute

Run daily at a specified time.-or-Run on specified day of the week at a specified time.

Run on the nth of every month/specific month at hour:minute

Run monthly at the specified time.-or-Run on a specified day of the month at a specified time.

232 Administrator Guide, Version 5.3

Page 233: Dell KACE K1000 Admin Guide

Running the K1000 Appliance Reports12

The Report Schedules page is displayed listing the newly scheduled report.

From the Report Schedules List page, you can:

• Click a report to open it.

• Use keywords to search schedules.

• From the Choose Action menu, you can create new schedules or delete them.

To delete a scheduled report1. Click Reporting > Schedule Reports.

The Report Schedules page appears.

2. Select the check box for the schedules that you want to delete.

3. In the Choose Action menu, click Delete Selected Item(s).

4. Click OK to confirm deleting the schedules.

Using Alert MessagesAlert messages provide a way for you to interact with your users by displaying a message in a pop-up window. The Alerts List page displays the messages you have distributed to users.

From the Alerts List page you can open existing alerts, create new alerts, or delete alerts. You can also search messages using keywords.

To alert users before you run a script on their computer, you can add this to online KScripts. See the information about alerts in To add an Offline KScript or Online KScript, on page 166.

To Create a Broadcast Alert Message

The Alerts feature works only if there is a constant connection between the appliance agent and the appliance. For information on how to set up the constant connection, refer to Configuring Agent Messaging Protocol Settings, on page 47.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 233

Page 234: Dell KACE K1000 Admin Guide

12 Running the K1000 Appliance Reports

If you have information that you want to distribute to your network, you can review and modify previous messages you have deployed, or you can create a new message.

1. Click Reporting > Alerts.

2. In the Choose Action menu, click Add New Item.

The Alerts: Edit Detail page appears.

3. In the Message Content field, type the text of your message.

4. In the Keep Alive field, specify the length of time the message will be valid.

Messages will be broadcast to users until either the user's desktop has received the message or the specified time interval has elapsed. To set the time interval for downloading scripts, go to: Settings >K1000 Agent >K1000 Agent Settings.

5. In the Limit Broadcast To area, select the recipient labels to send this message to.

Press CTRL and click to select multiple labels.

6. Select the Enable Scheduled Run check box to specify the alert schedule. Select the appropriate day and time from the drop-down lists.

7. Click Save.

E-mail AlertsE-mail Alerts differ from Alerts (broadcast messages) in an e-mail alert you can send out messages to administrators based on more detailed criteria. The E-mail Alert feature relies on the Inventory > Computers engine to create a notification that will be sent to administrators when computers meet the criteria you specify.

The K1000 Management Appliance checks the computers listed in the inventory against the criteria in the E-mail Alert once in every hour until one or more computers meet the criteria; then a message is sent to the administrators specified in the alert details.

To create an e-mail Alert

Notifications are processed every 60 minutes. If a notification query results in one or more machine records, a notification e-mail is automatically sent to the specified recipient.

1. Click Reporting > Email Alerts.

The Email Alerts page appears.

The pending alert messages are displayed in the AMP Message Queue until they are pushed to the target machine. The alert messages remain in the queue until the target machine checks in. This is true even if the Keep Alive time interval elapses or if the connection between the appliance Agent and the appliance has been lost or interrupted.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

234 Administrator Guide, Version 5.3

Page 235: Dell KACE K1000 Admin Guide

Running the K1000 Appliance Reports12

2. In the Choose Action menu, click Add New Computer Notification.

The Inventory > Computers tab appears with the Create Email Notification fields exposed.

3. Enter the search criteria.

4. In the Title field, enter a title for the alert.

The Title will appear in the Subject field.

5. In the Recipient field, enter the e-mail address(es) of the message recipient.

The e-mail addresses must be fully qualified e-mail addresses. The recipient’s address can be a single e-mail address or a list of addresses separated by commas.

6. Click the Create Notification tab.

Administrator Guide, Version 5.3 235

Page 236: Dell KACE K1000 Admin Guide

12 Running the K1000 Appliance Reports

236 Administrator Guide, Version 5.3

Page 237: Dell KACE K1000 Admin Guide

13

Using Organizational Management

The Organizational Management component allows you to create different organizations within your appliance that you administer separately. You can assign roles within each organizations to limit user access to specific tabs.

• Overview of Organizational Management, on page 237

• Creating and editing Organizations, on page 237

• Organizational Roles, on page 245

• Creating and editing Organizational Roles, on page 245

• Organizational Filters, on page 248

• Creating and Editing Organizational Filters, on page 249

• Computers, on page 252

Overview of Organizational ManagementThe K1000 Management Appliance organization feature enables you to group machines to allow for a high level of separation between logical areas of responsibility within a company. These groups are referred to as Organizations. This feature is accessible to the system administrator through the System Administrative Console. The system administrator creates these organizations and assigns them roles to limit access to specific tabs. The administrators of each organization cannot view or perform activities on machines that belong to other organizations other than their own.

Default OrganizationThe default organization will have everything coming into the appliance. The default organization will allow the administrator to view or perform activities on machines in all organizations. If a machine is not set in a filter, then the machine will go to the default organization.

Creating and editing OrganizationsYou can create new organizations or edit the existing organizations from the Organizations page by going to the Organizations > Organizations tab. Create the roles, and then create the organizations, because you must specify the role while creating an organization.

Administrator Guide, Version 5.3 237

Page 238: Dell KACE K1000 Admin Guide

13 Using Organizational Management

To create an organization

1. Select Organizations.

The K1000 Organizations page appears.

2. In the Choose Action menu, click Add New Item.

The K1000 Organization: Edit Detail page appears.

3. Enter Organization information as follows:

4. Click Save.

The K1000 Organization: Edit Detail page appears with more content.

5. Scroll down and click the Edit Mode link.

6. Enter the following information:

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Name Enter a name for the new organization. This field is mandatory.

Description Enter a description for the new organization.

Role Select the appropriate role from the drop-down list.Note: First, create the role by going to Organizations > Roles, before you can select that specific role from this list.

Name Enter a name for the organization. This field retains the information you specified in the previous page. You can modify the name if required.

Description Enter the description for the organization. This field retains the information you specified in the previous page. You can modify the description if required.

Role Select the appropriate role from the drop-down list. This field retains the role you selected in the previous page. You can modify this selection if required.Note: You must first create the role by going to Organizations > Roles, before you can select that specific role from this list.

Organization Filters Select the filter that will be used to direct a new machine that is checking into the appliance to the this organization. Press CTRL and click to select more than one filter.Note: Create the filter by going to Organizations > Filters. Then, you can select that specific filter from this list.

Computer Count (Read-only) Displays the number of computers checking in to the organization.

Database Name (Read-only) Displays the name of the database the organization is using.

238 Administrator Guide, Version 5.3

Page 239: Dell KACE K1000 Admin Guide

Using Organizational Management13

7. Specify the agent settings for the organization:

8. Click Save.

To troubleshoot nodes that fail to show up in InventoryYou can perform troubleshooting tasks, if your machine does not show up in Inventory after installing the Agent. By default, the Agent communicates with the appliance using http: over port 80. Assuming network connectivity is in place, newly-installed agents may fail to connect to the appliance during the first-time setup due to problems with the default “KBOX” host name in DNS.

Report User Displays the report user name used to generate all reports in the specific organization.By having a report user name, you can provide access to the organizational database (for additional reporting tools), but not give write access to anyone.

Report User Password Enter the report user password.

Field Suggested Setting Notes

Communications Window

12:00 am to 12:00 am

The interval during which the agent is allowed to communicate with the appliance. For example, to allow the Agent to connect between 1 AM and 6 AM only, select 1:00 am from the first dropdown list, and 6:00 am from the second drop-down list.

Agent “Run interval”

1 hours The frequency with which the agent checks into the appliance. Each time an agent connects, it resets its connect interval based on this setting. The default setting is once every hour.

Agent “Inventory Interval”

0 The interval (in hours) during which the appliance will inventory the computers on your network. If set to zero, the appliance will inventory nodes at every Run Interval.

Agent “Splash Page Text”

The appliance is verifying your PC Configuration and managing software updates. Please Wait...

The message that appears to users when communicating with the appliance.

Scripting Update Interval

15 minutes The frequency with which the agent downloads new script definitions. The default interval is 15 minutes.

Agent Log Retention

This option disallows the server to store the scripting result information that comes up from the agents. The default is to store all the results, which can impact performance. Turning this off provides less information about each node but enables faster agent check-ins.

Administrator Guide, Version 5.3 239

Page 240: Dell KACE K1000 Admin Guide

13 Using Organizational Management

1. If you set up the appliance in your DNS using a host name other than the default name “kbox” or if you need agents to reach the appliance by using the IP address rather than the DNS name, you must install the agent specifying the SERVER property.

For example:

Windows:

c:\>KInstallerSetup.exe -server=myk1000 -display_mode=silent

or

c:\>KInstallerSetup.exe -server=192.168.2.100 -display_mode=silent

Mac OS:

/Library/KBOXAgent/Home/bin/setkbox myk1000

or

/Library/KBOXAgent/Home/bin/setkbox 192.168.2.100

Linux:

/KACE/bin/setKBOX myk1000

or

/KACE/bin/setKBOX 192.168.2.100

2. To correct the server name for a node that is already installed, edit the host= value in:

Windows:

c:\program files\KACE\KBOX\smmp.conf

Mac OS:

/var/kace/kagentd/kbot_config.yaml

Linux:

/var/KACE/kagentd/kbot_config.yaml

3. Verify that you are able to ping the appliance, and reach it through a Web browser at http://k1000_hostname.

4. Verify that Internet Options are not set to use proxy. Verify that proxy is excluded for the local network or k1000_hostname.

5. Verify that no firewall or anti-spyware software is blocking communication between the appliance and any of the agent components, including:

• KBOXManagementService.exe

• KBOXClient.exe

• KUpdater.exe

• kagentd (OS X/ Unix)

6. Verify that the KBOXManagementService.exe (Windows) or the kagentd (OS X/ Unix) processes are running. The agent shows as perl in the OS X Activity Monitor.

240 Administrator Guide, Version 5.3

Page 241: Dell KACE K1000 Admin Guide

Using Organizational Management13

If, after verifying these items, you are still unable to get the agent to connect to the appliance, contact KACE Support.

To edit an organization

1. Select Organizations.

The K1000 Organizations page appears.

2. Click the linked name of the organization.

The K1000 Organization : Edit Detail page appears.

3. Scroll down and click the Edit Mode link.

4. Edit the organization details as follows:

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Name Enter a name for the organization. This field retains the information you specified in the previous page. You can modify the name if required.

Description Enter the description for the organization. This field retains the information you specified in the previous page. You can modify the description if required.

Role Select the appropriate role from the drop-down list. This field retains the role you selected in the previous page. You can modify this selection if required.Note: You must first create the role by going to Organizations > Roles, before you can select that specific role from this list.

Organization Filters Select the filter that will be used to direct a new machine that is checking into the appliance to the this organization. Press CTRL and click to select more than one filter.Note: Create the filter by going to Organizations > Filters. Then, you can select that specific filter from this list.

Computer Count (Read-only) Displays the number of computers checking in to the organization.

Database Name (Read-only) Displays the name of the database the organization is using.

Report User Displays the report user name used to generate all reports in the specific organization.By having a report user name, you can provide access to the organizational database (for additional reporting tools), but not give write access to anyone.

Report User Password Enter the report user password.

Administrator Guide, Version 5.3 241

Page 242: Dell KACE K1000 Admin Guide

13 Using Organizational Management

5. Specify the agent settings for the organization:

6. Click Save.

To delete an organization

1. Select Organizations.

The K1000 Organizations page appears.

2. Click the linked name of the organization.

The K1000 Organization: Edit Detail page appears.

3. Scroll down and click Edit Mode.

4. Click Delete to delete the organization.

Field Suggested Setting Notes

Communications Window

12:00 am to 12:00 am The interval during which the agent is allowed to communicate with the appliance. For example, to allow the Agent to connect between 1 AM and 6 AM only, select 1:00 am from the first dropdown list, and 6:00 am from the second drop-down list.

Agent “Run interval”

1 hours The frequency with which the agent checks into the appliance. Each time an agent connects, it resets its connect interval based on this setting. The default setting is once every hour.

Agent “Inventory Interval”

0 The interval (in hours) during which the appliance will inventory the computers on your network. If set to zero, the appliance will inventory nodes at every Run Interval.

Agent “Splash Page Text”

The appliance is verifying your PC Configuration and managing software updates. Please Wait...

The message that appears to users when communicating with the appliance.

Scripting Update Interval

15 minutes The frequency with which the agent downloads new script definitions. The default interval is 15 minutes.

Agent Log Retention

This option disallows the server to store the scripting result information that comes up from the agents. The default is to store all the results, which can impact performance. Turning this off provides less information about each node but enables faster agent check-ins.

The default credentials admin/admin are automatically created when you create an organization.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

242 Administrator Guide, Version 5.3

Page 243: Dell KACE K1000 Admin Guide

Using Organizational Management13

A confirmation message appears.

5. Click OK to confirm deleting the organization.

Managing System Admin Console usersWhen logged in as a system administrator, you can add users to access the System Administrator Console. When adding users, be sure to specify the correct user permission level.

To add a user

1. Select Organizations.

The K1000 Organizations page appears.

2. Select K1000 Settings > Control Panel.

3. Click Users.

The K1000 System Admin Users page appears.

4. In the Choose Action menu, select Add New Item.

The K1000 System Admin: Edit Detail page appears.

5. Enter the necessary user details.

Do not specify legal characters in any field.

To set up users for a specific organization, log into that organization.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

User Name Enter a user name for accessing the system administrator console.

Full Name Enter the user’s full name.

Email Enter the user’s email address.

Domain (Optional) Enter an active directory domain.

Budget Code (Optional) Enter the financial department code.

Location (Optional) Enter the name of a site or building.

Work Phone (Optional) Enter the user’s work phone number.

Home Phone (Optional) Enter the user’s home phone number.

Mobile Phone (Optional) Enter the user’s mobile phone number.

Pager Phone (Optional) Enter the user’s pager phone number.

Administrator Guide, Version 5.3 243

Page 244: Dell KACE K1000 Admin Guide

13 Using Organizational Management

6. Click Save.

To delete a user

1. Select Organizations.

The K1000 Organizations page appears.

2. Click K1000 Settings > Control Panel.

The K1000 Settings : Control Panel page appears.

3. Click Users.

The K1000 System Admin Users page appears.

4. Click the check boxes for the users you want to delete.

5. In the Choose Action menu, click Delete Selected Item(s).

6. Click OK to confirm deleting the selected user.

You can also delete users from the K1000 System Admin: Edit Detail page.

To change the password

1. Select Organizations.

Custom 1(Optional) Enter additional information in the custom fields as necessary.

Custom 2

Custom 3

Custom 4

Password Enter the password for the new user. Null passwords are not valid for new users. The user will be created but cannot be activated without a valid password.

Confirm Password

Re-enter the user’s password.

Permissions Specify the user’s logon permissions:

• Admin—This user can log on to and access all features in the system administrator console.

• ReadOnly Admin—This user can log on but cannot modify any settings in the system administrator console.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

244 Administrator Guide, Version 5.3

Page 245: Dell KACE K1000 Admin Guide

Using Organizational Management13

The K1000 Organizations page appears.

2. Click K1000 Settings > Control Panel.

3. Click Users.

The K1000 System Admin Users page appears.

4. Click the user name whose password you want to change.

The K1000 System Admin: Edit Detail page appears.

5. Modify the password as follows:

6. Click Save to save the changes.

Organizational RolesRoles are assigned to each organization to limit access to different tabs in the Administrator Console and the User Portal. You can restrict what tabs an organization is allowed to see when the administrator logs in to the Administrator Console and the user logs in to the User Portal.

The following are the permissions that can be applied for each tab.

• Write — The organization will have write access for the tab. The administrator or user will be able to edit the fields present on the page.

• Read — The organization will have only read access for the tab. The administrator or user will be not be able to edit the fields present on the page. The administrator or user will be not be able to add, edit, or delete any item present in the list.

• Hide — The tab will be hidden and the administrator or user will not be able to view that tab.

Default roleThe default role has access to all tabs in the Administrator Console and the User Portal. The default role will have write access for all tabs. The administrator or user will be able to edit the fields present on the page.

Creating and editing Organizational RolesIt is recommended that you first create the roles and then create the organizations, since it is mandatory to specify the role while creating an organization.

Password Enter the password for the user. Null passwords are not valid. This field is mandatory.

Confirm Password

Re-enter the user’s password. This field is mandatory.

Administrator Guide, Version 5.3 245

Page 246: Dell KACE K1000 Admin Guide

13 Using Organizational Management

To create a role

1. Select Organizations.

The K1000 Organizations page appears.

2. Click Roles.

The Organizational Roles page appears.

3. In the Choose Action menu, click Add New Item.

The Organizational Role : Edit Detail page appears.

4. Enter the role information as follows:

5. In the Permissions ADMIN Console, click a component link to expand it.

You can also click the Expand All link to expand all component sections.

6. To assign the same access level to all areas of a component, click one of the following:

• All Write

• All Read

• All Hide

7. To assign different permission levels to different areas of the component, click the Custom option.

If you clicked the Custom option, select the appropriate permission from the drop-down menu next to the names of each tab.

8. Under Permissions USER Console, click the UserUI link to expand it.

9. To assign the same access level to all areas of a the User Console, click one of the following:

• All Write

• All Read

• All Hide

10. To assign different permission levels to different areas of the User Console, click the Custom option.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Role Name Enter a name for the new role. This field is mandatory.

Description (Optional) Enter a description for the new role.

246 Administrator Guide, Version 5.3

Page 247: Dell KACE K1000 Admin Guide

Using Organizational Management13

11. Click Save.

To edit a role

1. Select Organizations.

The K1000 Organizations page appears.

2. Click Roles.

The Organizational Roles page appears.

3. Click the linked name of the role.

The Organizational Role: Edit Detail page appears.

4. Edit the role details:

5. Under Permissions ADMIN Console, click the individual tab link to expand it. Or, click the Expand All link to expand all the tabs.

6. Under each tab, select All Write, All Read, or All Hide to assign the respective permission to all the sub tabs. Or, select the Custom option to assign custom permissions to individual sub tabs.

7. If you select the Custom option, select the appropriate permission from the drop-down list next to each tab.

8. Under Permissions USER Console, click the UserUI link to expand it.

9. Under each tab, select All Write, All Read, or All Hide to assign the respective permission to all the sub tabs. Or, select the Custom option to assign custom permissions to individual sub tabs.

10. If you select the Custom option, select the appropriate permission from the drop-down list next to each tab.

11. Click Save.

If you assign HIDE permission to General Settings and User Authentication under K1000 Settings, the Control Panel tab is hidden.

For users upgrading from 1100 to 1200: When using 1100, if you assign HIDE permission to all tabs other than Logs and Server Maintenance under K1000 Settings. Then after upgrading to 1200, the K1000 Settings tab gets hidden from the Administrator console.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Name Enter the name for the new organization. This field is mandatory.

Description (Optional) Enter the description for the new organization.

Administrator Guide, Version 5.3 247

Page 248: Dell KACE K1000 Admin Guide

13 Using Organizational Management

To delete a role

1. Select Organizations.

The K1000 Organizations page appears.

2. Click Roles.

The Organizational Roles page appears.

3. To delete a role, do one of the following:

• Select the check box beside the role, and then select Delete Selected Item(s) from the Choose Action menu.

• From the Organizational Role: Edit detail page, click Delete.

4. Click OK.

To duplicate a role

1. Select Organizations.

The K1000 Organizations page appears.

2. Click Roles.

3. Click the role you want to duplicate.

The Organizational Role : Edit Detail page appears.

4. Click Duplicate to duplicate the organization details.

The page refreshes.

5. Enter the role information as follows:

6. Click Save.

The Associated Organizations table displays the list of organizations associated with this role.

Organizational FiltersFilters are used to direct a new machine checking into the appliance to the appropriate organization. An organization can be assigned more than one filter. The filters are executed

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Role Name Enter a name for the role. This is a mandatory field.

Description Enter a description for the role.

248 Administrator Guide, Version 5.3

Page 249: Dell KACE K1000 Admin Guide

Using Organizational Management13

according to the ordinal specified when the filters are created. If a machine is not set in a filter, it will go to the default organization.

A machine can be directed to the appropriate organizations in the following ways:

• One or more filters will be executed against the machine that is checking in. If one of the filters is successful, the machine will be redirected to the correct organization.

• If no filter matches the machine, it will be put into the default organization. The system administrator can then manually move that machine from the default organization to the appropriate organization.

Two types of filters exist:

• Data Filter — Allows the automatic organization of machines based on a search criteria. Whenever machines that check in meet the criteria, they will be directed to the specific organization.

• LDAP Filter — The LDAP label allows the automatic organization of machines based on LDAP or Active Directory interaction. The filter will be applied to the LDAP server, and if any entries are returned, they are automatically organized.

Creating and Editing Organizational FiltersYou can create new filters or edit existing filters from the Organizational Filters page by going to Organizations > Filters.

To add a data filter

1. Select Organizations.

The K1000 Organizations page appears.

2. Click Filters.

The K1000 Organization Filters page appears.

3. In the Choose Action menu, click Add New Data Filter.

The K1000 Organization Filter : Edit Detail page appears.

4. Enter the filter information as follows:

If the LDAP server requires credentials for administrative login (that is, non-anonymous login), supply those credentials. If no LDAP user name is given, an anonymous bind is attempted. Each LDAP filter may connect to a different LDAP/AD server

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Enabled Select to enable this filter. (You have to enable the filter to use it.)

Name Enter a name for the filter.

Description Enter the description for the filter.

Administrator Guide, Version 5.3 249

Page 250: Dell KACE K1000 Admin Guide

13 Using Organizational Management

5. Enter the Machine Filter Criteria.

6. Select an attribute from the drop-down list. For example, IP Address.

7. Select the condition from the drop-down list. For example, contains.

8. Enter the attribute value in the provided field.

For example, to filter machines from the specified IP range and direct them to the organization, enter: XXX.XX.*

You can add multiple criteria.

9. Select the Conjunction Operator (AND or OR) from the drop-down list to add more criteria.

10. Click the Add Criteria link to add more criteria.

11. Click Save.

To add a LDAP filter

1. Select Organizations.

The K1000 Organizations page appears.

2. Click Filters.

The K1000 Organization Filters page appears.

3. In the Choose Action menu, click Add New LDAP Filter.

K1000 Organization LDAP Filter : Edit Detail page appears.

4. Enter the Filter information as follows:

5. Enter the LDAP Machine Filter Criteria.

Evaluation Order Enter a number. The filter will be executed according to the evaluation order specified.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Enabled Select to enable this filter. (You have to enable the filter to use it.)

Name Enter a name for the filter.

Description Enter a description for the filter.

Evaluation Order

Enter a number. The filter will be executed according to the evaluation order specified.

Server Hostname Specify the IP or Host Name of the LDAP Server.Note: To connect through SSL, use the IP or the Host Name. For example: ldaps://HOSTNAME.

LDAP Port Number

Specify the LDAP Port number. For example: 389 or 636 (LDAPS).

250 Administrator Guide, Version 5.3

Page 251: Dell KACE K1000 Admin Guide

Using Organizational Management13

6. To test your filter, click Test LDAP Filter.

7. Click Save.

To edit a filter

1. Select Organizations.

The K1000 Organizations page appears.

2. Click Filters.

The K1000 Organization Filters page appears.

3. Click the linked name of the filter.

The K1000 Organization Filter : Edit Detail page appears.

4. Edit the filter details:

5. Edit the machine filter criteria.

6. Select an attribute from the drop-down list.

For example: IP Address.

7. Select the condition from the drop-down list.

For example: contains.

8. Specify the attribute value in the provided field. For example, XXX.XX.*

In the above example, machines from the specified IP range are filtered and directed to the organization to which this filter is applied.

Search Base DN Enter the Search Base DN. For example:

CN=Users,DC=hq,DC=corp,DC=kace,DC=com.

Search Filter Specify the Search Filter. For example: samaccountname=admin.

LDAP Login Specify the LDAP login. For example:

LDAP Login: CN=Administrator,CN=Users,DC=hq,DC=corp,

DC=kace,DC=com

LDAP Password Enter the password for the LDAP login if required.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

Enabled Select to enable this filter. (You have to enable the filter to use it.)

Name Enter a name for the filter.

Description Enter a description for the filter.

Evaluation Order Enter a number. The filter will be executed according to the evaluation order specified.

Administrator Guide, Version 5.3 251

Page 252: Dell KACE K1000 Admin Guide

13 Using Organizational Management

Note: You can add multiple criteria.

9. Select a conjunction operator (AND or OR) from the drop-down list to add more criteria.

10. Click the Add Criteria link to add more criteria.

11. To test your filter, click Test Filter.

12. Click Save.

To delete a filter

1. Select Organizations.

The K1000 Organizations page appears.

2. Click Filters.

The K1000 Organization Filters page appears.

3. To delete a filter, do one of the following:

• Select the check box beside the filter, and then select Delete Selected Item(s) from the Choose Action menu.

• Click Delete.

4. Click OK.

ComputersThe K1000 Computers page lists all the nodes that are checking into the appliance. It displays details for each computer such as the Name, the Organization the computer is checking into, the Last Sync (when the computer last checked into the appliance), the Description, and the IP Address.

Advanced SearchIf you need more granularity than keyword searches provide, try using an advanced search. The advanced search allows you to specify values for each field present in the inventory record and search the entire inventory listing for that value. For example, if you need to know which computers have a particular version of BIOS installed to upgrade only those affected machines, you can search for these.

To specify advanced search criteria

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

252 Administrator Guide, Version 5.3

Page 253: Dell KACE K1000 Admin Guide

Using Organizational Management13

1. Go to Inventory > Computers.

2. Click Advanced Search.

3. Select an attribute from the drop-down list.

For example: IP Address.

4. Select the condition from the drop-down list.

For example: contains.

5. Specify the attribute value in the provided field.

For example: XXX.XX.*

In the above example, machines from the specified IP range are searched.

Note: You can add more than one criteria.

6. Select the Conjunction Operator from the drop-down list to add more criteria.

For example: AND.

7. Click Search.

The search results are displayed below.

You can refilter the computers displayed in the list, for more information refer to Refiltering Computers, on page 253.

Test and Organization FilterYou can test an existing organization filter to check whether it is getting applied to the computers.

To test an organization filter1. Click the Test Organization Filter tab.

2. Select the appropriate filter from the drop-down list.

3. Click Test. The test results will be displayed below.

You can refilter the computers displayed in the list. For more information, refer to Refiltering Computers, on page 253.

Note: If you do not see any computers listed in the test results, no existing computers match the machine filter criteria you set up—or the machine filter criteria is invalid. You can edit the machine filter criteria. For more information on how to edit a filter, refer to Creating and Editing Organizational Filters, on page 249.

Refiltering ComputersYou can refilter the computers, which will recheck the computers against all filters. For example, you can check if the filter created by you is applied correctly to the intended computers. You first create the new filter by going to Organizations > Filters. In the Computers page, refilter the computers. The organizations column will display the new

Administrator Guide, Version 5.3 253

Page 254: Dell KACE K1000 Admin Guide

13 Using Organizational Management

organization name in red besides the old organization name, against those computers on which the filter has been applied.

To refilter computers

1. Go to Organizations > Computers.

The K1000 Computers page appears.

2. Select the check boxes next to the computers that you want to refilter.

3. In the Choose Action menu, click Refilter Selected Computers to recheck the computers against all filters.

Redirecting ComputersYou can redirect a computer to a different organization. For example, a computer checks into organization A. You can redirect that computer to organization B. The next time the computer checks in, it will check into organization B.

To redirect computers

1. Go to Organizations > Computers.

The K1000 Computers page appears.

2. Select the check boxes next to the computers that you want to redirect.

3. Select the appropriate organization name under Change Sync to Organization, from the Choose Action menu, to redirect the computers to the appropriate organization.

Understanding Computer DetailsThe Computer Detail page provides details about a computer’s inventory information, software, activities and assets. To access computer details, go to Organizations > Computers and click on a computer name in the list.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select System from the Organization drop-down list in the top-right hand corner of the page.

254 Administrator Guide, Version 5.3

Page 255: Dell KACE K1000 Admin Guide

Using Organizational Management13

The following table describes each of the detail areas on this page. To expand the sections, select Expand All.

The fields that are displayed depend on the type of computer and its operating system.

Item Description

Summary

Name Name of the computer.

Model Computer model.

Chassis Type Type of computer, such as desktop or laptop.

IP Address IP address of the computer.

MAC Media Access Control address number.

RAM Total Amount of Random-access memory.

Processors Number of CPUs and type.

OS Name Type of operating system, such as Windows, Macintosh, or Linux.

Service Pack Service Pack version number (Windows only).

Agent Version K1000 Agent version number.

User Name Name of most recent user. (Some computers might have multiple users).

AMP Connection Time of last connection to the K1000 Agent.

Last Inventory Time of latest inventory.

Record Created Time that the inventory record was created.

Disk Number of disk drives, type and size of the file system, and amount of disk space used.

Inventory Information

Hardware

RAM Total Total amount of RAM.

Ram Used How much RAM is used.

Manufacturer Computer manufacturer.

Model Computer model.

Domain Name of domain.

Motherboard Main and peripheral buses.

Processors CPU count, type, and manufacturer.

CD/DVD Drives Configuration of drives installed on the computer.

Sound Devices Installed audio devices.

Video Controllers Installed video controllers

Administrator Guide, Version 5.3 255

Page 256: Dell KACE K1000 Admin Guide

13 Using Organizational Management

Monitor Type and manufacturer of the monitor.

BIOS Name BIOS version.

BIOS Version BIOS version.

BIOS Manufacturer BIOS Manufacturer.

BIOS Description BIOS Description.

BIOS Serial Number BIOS serial number.

Disk Number of disk drives, type and size of file system, and amount of disk space used.

Printers The printers that the computer is configured to use.

Network Interfaces Type of network interface, IP Address, MAC address, and whether DHCP is enabled or disabled.

K1000 Agent

Agent Version Agent Version.

AMP Version Version of Agent Messaging Protocol.

AMP Connected Time of the last connection to the K1000 Agent.

KACE ID KACE ID.

Database ID Database ID.

Last Inventory Time of latest inventory.

Last Sync Time the computer last checked in to the appliance.

Last Agent Update Time when the Agent was updated.

User

User Logged The user currently logged into the computer.

User Name User name.

User Domain The domain that the user belongs to.

Operating System

Name Name of the operating system.

Version Version number of the operating system.

Build Build of the operating system.

Number Build number of the operating system.

Architecture Operating system architecture, such as PPC or x64.

Installed Date Date of operating system installation.

Last System Reboot Last time the operating system was rebooted.

Last System ShutDown Last time the operating system was turned off.

Uptime Since Last Reboot How long the operating system has been up.

Item Description

256 Administrator Guide, Version 5.3

Page 257: Dell KACE K1000 Admin Guide

Using Organizational Management13

System Directory Location of the system directory.

Registry Size Size of the registry.

Registry Max Size Maximum size of the registry.

Notes You can enter any additional information in this field.

Software

Installed Programs List of the software and versions installed on the computer.

Custom Inventory Fields. Lists any Custom Inventory fields created for this machine, along with the field name and value.

Virtual Application Kontainers

List any Virtual Kontainers on the computer. You use Virtual Kontainers to create virtual versions of supported applications, and deploy and run them on the nodes you administer.

Uploaded Files Lists the files that have been uploaded to the K1000 Management Appliance from this computer using the “upload a file” script action.

Installed Patches via Inventory

Installed Microsoft Patches.

Running Processes List of running processes.

Startup Programs List of startup programs.

Services List of services.

Activities

Labels The labels assigned to this computer. Labels are used to organize and categorize inventory and assets.

Failed Managed Installs Lists any failed managed installs. Managed installations allow deploying software that require installation files.

To Install List List of managed installations that will be sent to the computer the next time it connects with the appliance.

Service Desk Tickets Lists any Service Desk Tickets assigned or submitted by any user of the computer.

Security

Patching Detect/Deploy Status

Lists the patches detected and deployed on the computer.

Threat Level 5 List Lists any threats that are harmful to any software, process, startup item, or service.

OVAL Vulnerabilities Results of OVAL Vulnerability tests run on this computer.

FDCC/SCAP Configuration Scans

Results of FDCC/SCAP Configuration Scans run on this computer.

Logs

Item Description

Administrator Guide, Version 5.3 257

Page 258: Dell KACE K1000 Admin Guide

13 Using Organizational Management

K1000 Agent Logs Contains the logs for the K1000 Agent application. A question mark indicates that its status is unknown.

Portal Install Logs Details about User Portal packages installed on this machine.

Scripting Logs Configuration Policy scripts that have been run on this computer, along with the available status of any scripts in progress.

Asset

Asset Information Lists when the record was created and last modified; the asset type, such as computer; and the name of the asset.

Related Assets Lists any related assets.

Asset History Lists the changes done to the asset of the computer along with the date and time when each change was done.

Item Description

258 Administrator Guide, Version 5.3

Page 259: Dell KACE K1000 Admin Guide

A

Administering Mac OS Nodes

This appendix lists Dell KACE K1000 Management Appliance information and behaviors that are specific to Apple® Mac OS nodes.

For the supported versions of the Mac OS operating system, see Chapter 4: System requirements for Agents, starting on page 66.

• Mac OS Inventory, on page 259.

• Distributing Software to Mac OS Nodes, on page 260.

• Patching Mac OS Nodes, on page 263.

Mac OS InventoryYour K1000 Management Appliance manages Mac OS X nodes the same manner it manages Windows nodes. See the Chapter 5: Managing Software and Hardware Inventories, starting on page 83, for details.

You search for Macintosh nodes using Inventory > Computer > Advanced Search. In the Advanced Search tab, identify the nodes using attributes such as OS Name. For more information on how to use the Advanced Search tab, see Using Advanced Search for Software Inventory, on page 91.

You can select the Create Notification tab to set up searches for Mac OS nodes with specific criteria and sends the administrator an email when it finds them. For example, if you wanted to know when computers had a critically low amount of disk space left, you could specify the search criteria to look for a value of 5 MB or smaller in the Disk Free field, and then notify an administrator who can take appropriate action. For more information on how to create notifications, see Searching for Computers by Creating Computer Notifications, on page 86.

Inventory filtering provides a way to dynamically apply a label based on search criteria. It is often helpful to define filters by inventory attribute. For example, you can create a label called “San Francisco Office” and create a filter based on the IP range or subnet for machines in San Francisco. Whenever machines check in that meet the criteria you have set up, they would receive the San Francisco label. This is particularly useful if your network includes laptops that often travel to remote locations.

You can also create a label to group all your Mac OS nodes. Once grouped by label, you can more easily manage software, reports, or software deployments on your Mac OS nodes. For more information on labeling, refer to Managing Labels, on page 54.

Administrator Guide, Version 5.3 259

Page 260: Dell KACE K1000 Admin Guide

A Administering Mac OS Nodes

Distributing Software to Mac OS NodesThe K1000 Management Appliance Distribution component provides various methods for deploying software, updates, and files to your nodes.

Managed installations deploy software to the nodes on your network that require an installation file to run. You can create a managed installation package by going to Distribution > Managed Installation.

From the Managed Installations page you can:

• Create or delete managed installations

• Execute or disable managed installations

• Specify a Managed Action

• Apply or remove a label

• Search managed installations by keyword

Examples of Common Deployments on Mac OS®

On the Apple Mac OS X platform, there is a universal installer with the usual .pkg file extension. You cannot upload a .pkg file directly, as these files consist of low-level directories, and Web browsers cannot handle uploading entire directories.

You do not require an installer to install plain packages from the K1000 Management Appliance. These are the .app packages you might normally drag to your Applications folder. These packages must be archived as well, since they consist of low-level directories, just like the installer packages.

You can even archive installers along with plain applications. The K1000 Management Appliance runs installers first and then copies applications into the Applications folder.

The supported package deployments are .pkg, .app, .dmg, .zip, .tgz, and tar.gz. If you package the file as a disk image, the appliance mounts and unmounts it quietly. This section provides examples for each type of deployment. For each of these examples, you must have already uploaded the file to the appliance prior to creating the Managed Installation package. Dell recommends that you install the software on a test machine. Once the agent connects to the appliance, the appliance creates an inventory item and a managed installation package for the software.

To create a managed installation for Mac OS nodes

1. Go to Distribution > Managed Installations.

The Managed Installations page appears.

2. Select Add New Item in the Choose Action menu.

The Managed Software Installation: Edit Detail Page appears.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

260 Administrator Guide, Version 5.3

Page 261: Dell KACE K1000 Admin Guide

Administering Mac OS NodesA

3. Select the software from the Software drop-down list.

By default, the agent attempts to install the .pkg file using the following command:

installer -pkg packagename.pkg -target / [Run Parameters]

If you have selected a .zip/.tgz/tar.gz file, the contents are unpacked and the system searches the root directory for all .pkg files. The installation command runs against each of these .pkg files and executes on all of these files in alphabetical order.

Next, the appliance searches for all plain applications (.app) on the top level of the archive and copies them to the Applications folder using the following command:

ditto -rscs Application.app /Applications/Application.app

To execute a script or change any of the these command lines, you can specify the appropriate script invocation as the Full Command Line. You can specify wildcards in the filenames you use. Enclose the filename in single or double quotation marks if it contains spaces. The files are extracted into a directory in /tmp, and that becomes the

current working directory of the command.

4. If your package requires additional options, you can enter the following installation details:

On Mac OS, you do not need to include any other files in your archive other than your script, if this is all you want to execute.

Run Parameters You cannot apply “Run Parameters” to the above-mentioned commands.

Installation Command You do not need to specify an installation command The server executes the installation command by itself. The Mac OS node tries to install this using:installer -pkg packagename.pkg -target / [Run Parameters]

or ditto -rsrc packagename.app /Applications/theapp

If you do not want to use the default command at all, you can replace it completely by selecting the Configure Manually option and specifying the complete command line. If you have specified an archive file, this command runs against all of the .pkg files or .app files it can find.

Un-Install using Full Command Line

Select this check box to uninstall software. If the Installation Command field above is filled in, it is run. Otherwise, by default, the agent attempts to run the command, which is generally expected to remove the package.

Run Command Only Select this check box to run the command line only. This will not download the actual digital asset.

Notes Enter additional information in this field, if any.

Administrator Guide, Version 5.3 261

Page 262: Dell KACE K1000 Admin Guide

A Administering Mac OS Nodes

5. Specify the deployment details:

6. Set user interaction details:

Managed Action Select the most appropriate time for this package to be deployed. Execute anytime (next available) and Disabled are the only options available for Macintosh platform.

Deploy to All Machines Select this check box to deploy to all the machines.

Limit Deployment To Selected Labels

Select one or more labels to limit deployment only to machines grouped by these label(s)

Limit Deployment To Listed Machines

You can limit deployment to one or more machines. From the drop-down list, select a machine to add to the list. You can add more than one machine, and filter the list by entering filter options.

Deploy Order The lowest deploy number is installed first.

Max Attempts Enter the maximum number of attempts, between 0 and 99, to indicate the number of times the appliance tries to install the package. If you specify 0, the appliance enforces the installation forever.

Deployment Window(24H clock)

Enter the time (using a 24-hour clock) to deploy the package. Deployment Window times affect the Managed Action options. Also, the run intervals defined in the System Console, under Organizations > Organizations for this specific organization, override and/or interact with the deployment window of a specific package.

Allow Snooze This option is not available for Mac OS nodes.

Custom Pre-Install Message

This option is not available for Mac OS nodes.

Custom Post-Install Message

This option is not available for Mac OS nodes.

Delete Downloaded Files Select this check box to delete the package files after installation.

262 Administrator Guide, Version 5.3

Page 263: Dell KACE K1000 Admin Guide

Administering Mac OS NodesA

7. Click Save.

For more information about distribution, refer to Chapter 8: Distributing Software from Your K1000 Management Appliance, starting on page 125.

For more information about managed installations, refer to Managed Installations, on page 129.

Patching Mac OS NodesPatching enables you to quickly and easily deploy patches to your network. For details on all patching features, see the Patching Strategies document.

Use the Patch Listing > View by Operating System listing or Advanced Search feature to find Mac OS patches. Or use the Smart Label feature to automatically search the patch list using predefined search criteria.

To allow the appliance to download Apple Security updates for Macintosh, you need to select the appropriate operating system from the Macintosh Platform list in the Patch Subscription Settings page. You can select more than one Macintosh operating system.

Use Alternate Download Select this check box to specify details for alternate download. When you select this check box, the following fields appear:

• Alternate Download Location—Enter the location from where the Agent can retrieve digital installation files.

• Alternate Checksum—Enter an Alternate Checksum (MD5) that matches the MD5 checksum on the remote file share (for security purposes).

• Alternate Download User—Enter a user name with the necessary privileges to access the Alternate Download Location.

• Alternate Download Password—Enter the password for the user name specified above.

Note: If the target node is part of a replication label, the K1000 Management Appliance does not fetch software from the alternate download location. For more information, refer to Distributing Packages from an Alternate Location, on page 128.Specify an alternate download location only for a specific managed installation. You can also edit an existing label or create a new label that can be used for specifying the alternate location globally. However, since that label will not be specific to any managed installation, you cannot specify an alternate checksum for matching the checksum on the remote file share. For more information on how to create or edit labels, refer to To add or edit a new label, on page 57.

Administrator Guide, Version 5.3 263

Page 264: Dell KACE K1000 Admin Guide

A Administering Mac OS Nodes

264 Administrator Guide, Version 5.3

Page 265: Dell KACE K1000 Admin Guide

B

Adding Steps to a Script

The steps documented here are available on the Scripting component. For details on scripting, see Chapter 9: Using the Scripting Features, starting on page 161.

• Adding Steps to Task Sections.

Adding Steps to Task SectionsRefer to the following table when adding steps to a Policy or Job task. These steps are available from the Verify, On Success, Remediation, On Remediation Success, and On Remediation drop-down lists.

The other column headings V, OS, R, ORS, and ORF indicate whether a particular step is available in the corresponding Task sections.

Steps for Windows SystemsThe following table shows the steps that are available in Tasks for Windows systems.

Step Description V OS R ORS ORF

Always fail X X

Call a custom DLL function

Call function "%{procName}" from "%{path}\%{file}".

X X X

Create a custom DLL object

Create object "%{className}" from "%{path}\%{file}".

X X X

Create a message window

Create a message window named "%{name}" with title "%{title}", message "%{message}" and timeout "%{timeout}" seconds.

X X X X X

Delete a registry key Delete "%{key}" from the registry. X X

Delete a registry value

Delete "%{key}!%{name}" from the registry. X X

Destroy a message window

Destroy the message window named "%{name}".

X X X X X

Administrator Guide, Version 5.3 265

Page 266: Dell KACE K1000 Admin Guide

B Adding Steps to a Script

Install a software package

Install "%{name}" with arguments "%{install_cmd}".Note: This step requires you to choose from a list of software packages already uploaded using the functionality in the Inventory/Software tab. For more information, see Adding Software to Inventory, on page 92.

X X

Kill a process Kill the process "%{name}". X X X X X

Launch a program Launch "%{path}\%{program}" with params "%{parms}".

X X X X X

Log a registry value Log “%{key}!%{name}”. X

Log file information Log “%{attrib}” from “%{path}\%{file}”. X X X

Log message Log “%{message}” to “%{type}”. X

Restart a service Restart service “%{name}” X

Run a batch file Run the batch file "%{_fake_name}" with params "%{parms}".

Note: In this step, you do not need to upload the batch file. You create the batch file by pasting the script in the space provided.

X X X

Search file system Search for "%{name}" in "%{startingDirectory}" on "%{drives}" and "%{action}".

X

Set a registry key Set "%{key}". X X

Set a registry value Set "%{key}!%{name}" to "%{newValue}". X X

Start a service Restart service “%{name}”. X

Stop a service Stop service “%{name}” X

Unzip a file Unzip "%{path}\%{file}" to "%{target}". X X X X

Update message window text

Set the text in the message window named "%{name}" to "%{text}".

X X X X

Update policy and job schedule

Update policy and job schedule from the appliance.

X

Upload a file Upload "%{path}\%{file}" to the server. X X

Verify a directory exists

Verify that the directory "%{path}" exists. X

Verify a file exists Verify that the file "%{path}\%{file}" exists. X

Verify a file version is exactly

Verify that the file "%{path}\%{file}" has version "%{expectedValue}".

X

Step Description V OS R ORS ORF

266 Administrator Guide, Version 5.3

Page 267: Dell KACE K1000 Admin Guide

Adding Steps to a ScriptB

Verify a file version is greater than

Verify that the file "%{path}\%{file}" has version greater than "%{expectedValue}".

X

Verify a file version is greater than or equal to

Verify that the file "%{path}\%{file}" has version greater than or equal to "%{expectedValue}”.

X

Verify a file version is less than

Verify that the file "%{path}\%{file}" has version less than "%{expectedValue}".

X

Verify a file version is less than or equal to

Verify that the file "%{path}\%{file}" has version less than or equal to "%{expectedValue}.

X

Verify a file version is not

Verify that the file "%{path}\%{file}" does not have version "%{expectedValue}".

X

Verify a file was modified since

Verify that the file "%{path}\%{file}" was modified since "%{expectedValue}".

X

Verify a process is not running

Verify the process "%{name}" is not running. X

Verify a process is running

Verify the process "%{name}" is running. X

Verify a product version is exactly

Verify that the product "%{path}\%{file}" has version "%{expectedValue}".

X

Verify a product version is greater than

Verify that the product "%{path}\%{file}" has version greater than "%{expectedValue}".

X

Verify a product version is greater than or equal to

Verify that the product "%{path}\%{file}" has version greater than or equal to "%{expected-Value}”.

X

Verify a product version is less than

Verify that the product "%{path}\%{file}" has version less than "%{expectedValue}".

X

Verify a product version is less than or equal to

Verify that the product "%{path}\%{file}" has version less than or equal to "%{expectedValue}”.

X

Verify a product version is not

Verify that the product "%{path}\%{file}" does not have version "%{expectedValue}".

X

Verify a registry key does not exist

Verify that "%{key}" does not exist. X

Verify a registry key exists

Verify that "%{key}" exists. X

Verify a registry key’s subkey count is exactly

Verify that "%{key}" has exactly "%{expectedValue}" subkeys.

X

Step Description V OS R ORS ORF

Administrator Guide, Version 5.3 267

Page 268: Dell KACE K1000 Admin Guide

B Adding Steps to a Script

Verify a registry key’s subkey count is greater than

Verify that "%{key}" has greater than "%{expectedValue}" subkeys.

X

Verify a registry key’s subkey count is greater than or equal to

Verify that "%{key}" has greater than or equal to "%{expectedValue}" subkeys.

X

Verify a registry key’s subkey count is less than

Verify that "%{key}" has less than "%{expectedValue}" subkeys.

X

Verify a registry key’s subkey count is less than or equal to

Verify that "%{key}" has less than or equal to "%{expectedValue}" subkeys.

X

Verify a registry key’s subkey count is not

Verify that "%{key}" does not have exactly "%{expectedValue}" subkeys.

X

Verify a registry key’s value count is exactly

Verify that "%{key}" has exactly "%{expectedValue}" values.

X

Verify a registry key’s value count is greater than

Verify that "%{key}" has greater than "%{expectedValue}" values.

X

Verify a registry key’s value count is greater than or equal to

Verify that "%{key}" has greater than or equal to "%{expectedValue}" values.

X

Verify a registry key’s value count is less than

Verify that "%{key}" has less than "%{expectedValue}" values.

X

Verify a registry key’s value count is less than or equal to

Verify that "%{key}" has less than or equal to "%{expectedValue}" values.

X

Verify a registry key’s value count is not

Verify that "%{key}" does not have exactly "%{expectedValue}" values.

X

Verify a registry pattern doesn’t match

Verify that "%{key}!%{name}=%{expectedValue}" doesn't match.

X

Verify a registry pattern match

Verify that "%{key}!%{name}=%{expectedValue}" matches.

X

Verify a registry value does not exist

Verify that "%{key}!%{name}" does not exist. X

Verify a registry value exists

Verify that "%{key}!%{name}" exists. X

Step Description V OS R ORS ORF

268 Administrator Guide, Version 5.3

Page 269: Dell KACE K1000 Admin Guide

Adding Steps to a ScriptB

Steps for Mac OS X SystemsThe following table shows the steps that are available in Tasks for Mac OS X systems.

Verify a registry value is exactly

Verify that "%{key}!%{name}" is equal to "%{expectedValue}".

X

Verify a registry value is greater than

Verify that "%{key}!%{name}" is greater than "%{expectedValue}".

X

Verify a registry value is greater than or equal to

Verify that "%{key}!%{name}" is greater than or equal to "%{expectedValue}" .

X

Verify a registry value is less than

Verify that "%{key}!%{name}" is less than "%{expectedValue}".

X

Verify a registry value is less than or equal to

Verify that "%{key}!%{name}" is less than or equal to "%{expectedValue}".

X

Verify a registry value is not

Verify that "%{key}!%{name}" is not equal to "%{expectedValue}".

X

Verify a service exists Verify the service "%{name}" exists. X

Verify a service is running

Verify the service "%{name}" is running. X

Step Description V OS R ORS ORF

Step Description V OS R ORS ORF

Always fail X X

Create a message window

Create a message window named "%{name}" with title "%{title}", message "%{message}" and timeout "%{timeout}" seconds.

X X X X X

Destroy a message window

Destroy the message window named "%{name}".

X X X X X

Kill a process Kill the process "%{name}". X X X X X

Launch a program Launch "%{path}\%{program}" with params "%{parms}".

X X X X X

Log a plist value

Log an environment variable

Log file attribute

Log filenames matching regex

Log message Log “%{message}” to “%{type}”. X

Administrator Guide, Version 5.3 269

Page 270: Dell KACE K1000 Admin Guide

B Adding Steps to a Script

Search file system Search for "%{name}" in "%{startingDirectory}" on "%{drives}" and "%{action}".

X

Unzip a file Unzip "%{path}\%{file}" to "%{target}". X X X X

Update message window text

Set the text in the message window named "%{name}" to "%{text}".

X X X X

Update policy and job schedule

Update policy and job schedule from the appliance.

X

Upload a file Upload "%{path}\%{file}" to the server. X X

Verify a directory exists

Verify that the directory "%{path}" exists. X

Verify a file exists Verify that the file "%{path}\%{file}" exists. X

Verify a file was modified since

Verify that the file "%{path}\%{file}" was modified since "%{expectedValue}".

X

Verify a process is not running

Verify the process "%{name}" is not running. X

Verify a process is running

Verify the process "%{name}" is running. X

Verify a plist value equals

Verify a plist value exists

Verify a plist value greater than

Verify a plist value less than

Verify an environment variable equals

Verify an environment variable exists

Verify an environment variable greater than

Verify an environment variable less than

Verify at least one file matching regex exists

Step Description V OS R ORS ORF

270 Administrator Guide, Version 5.3

Page 271: Dell KACE K1000 Admin Guide

Adding Steps to a ScriptB

Steps for Red Hat Enterprise Linux SystemsThe following table shows the steps that are available in Tasks for RHEL (Red Hat Enterprise Linux) systems.

Verify count of filenames matching regex is greater than

Verify count of filenames matching regex is less than

Verify count of filenames matching regex

Verify file info equals

Verify file info greater than

Verify file info less than

Step Description V OS R ORS ORF

Step Description V OS R ORS ORF

Always fail X X

Kill a process Kill the process "%{name}". X X X X X

Launch a program Launch "%{path}\%{program}" with params "%{parms}".

X X X X X

Log an environment variable

Log file attribute info

Log filenames matching regex

Log message Log “%{message}” to “%{type}”. X

Search file system Search for "%{name}" in "%{startingDirectory}" on "%{drives}" and "%{action}".

X

Unzip a file Unzip "%{path}\%{file}" to "%{target}". X X X X

Update policy and job schedule

Update policy and job schedule from the appliance.

X

Upload a file Upload "%{path}\%{file}" to the server. X X

Verify a directory exists

Verify that the directory "%{path}" exists. X

Administrator Guide, Version 5.3 271

Page 272: Dell KACE K1000 Admin Guide

B Adding Steps to a Script

Verify a file exists Verify that the file "%{path}\%{file}" exists. X

Verify a file was modified since

Verify that the file "%{path}\%{file}" was modified since "%{expectedValue}".

X

Verify a process is not running

Verify the process "%{name}" is not running. X

Verify a process is running

Verify the process "%{name}" is running. X

Verify an environment variable equals

Verify an environment variable exists

Verify an environment variable greater than

Verify an environment variable less than

Verify at least one file matching regex exists

Verify count of filenames matching regex is greater than

Verify count of filenames matching regex is less than

Verify count of filenames matching regex

Verify file info equals

Verify file info greater than

Verify file info less than

Step Description V OS R ORS ORF

272 Administrator Guide, Version 5.3

Page 273: Dell KACE K1000 Admin Guide

C

Writing Custom Inventory Rules

This chapter describes how to inventory items that are not appearing in Software list by default. Custom Inventory rules allow you to automatically detect software and other items on a node. Capturing this information allows you to manage your custom Software items with Smart Labels, Distribution and Managed Installations, Scripting, and include additional details in Reports.

Use the Custom Inventory rules if:

• The software or item you want to inventory is not listed in Add/Remove Programs.

• Different versions of the same software have the same entry in Add/Remove Programs, either with incorrect or incomplete “Display Version” information.

• To write deployment rules, scripts, reports based on the presence of a Software Item or value that is not reported by the agent.

Understanding Custom Inventory RulesCustom Inventory rules test or get the value of registry keys and entries, program, files, scripts, environment variables, system properties, and the output of commands.

There are two types of rules:

• Conditional rules that test whether or not a condition exists on the node. When a rule returns true, the agent reports the item as an Installed Program; when the rule returns false, the item does not appear as an Installed Program.

• Value Return rules that get data from the node and if the value exists the agent reports the item as an Installed Program and sets a corresponding Custom Inventory field.

Creating a Custom Inventory ruleYou add Custom Inventory rules to the Custom Inventory field of the Inventory > Software > Custom_Item: Details page.

Administrator Guide, Version 5.3 273

Page 274: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

See Chapter 5: To add software to Inventory manually, starting on page 93 for details.

How Custom Inventory Rules are implementedYou create a custom Software Item, add a Custom Inventory rule, and save the item. The agent receives the new rule during the first checkin after you created it. In the session the agent executes the rule and reports the finding back to the appliance.

The agent runs all rules as well as any other processes scheduled for that session. Therefore, once the agent checks in, it could take several minutes to run all the rules and other processes before the agent reports the results.

After the agent reports the results, the node’s Inventory > Computer Details page shows the results under Software in Installed Programs and/or Custom Inventory field.

274 Administrator Guide, Version 5.3

Page 275: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

The Installed Program and Custom Inventory Field name. For example BIOSDATE, is the custom Software Item’s Display name (Title): BIOSDATE.

If the results you expect don’t appear, verify that the node recently checked in. The check in time is shown in the Last Inventory field of the Inventory > Computers Detail page.

Understanding rule syntaxConditional and Value Return rules use the following syntax:

functionName(argument,argument,...)

For specific information on functions and their arguments see:

• Checking for conditions (Conditional rules), on page 276

• Getting values from a node (Custom Inventory Field), on page 283

• Matching file names with Regular Expressions, on page 287

Function syntaxEnter the functionName followed by an opening parentheses, enclose the arguments with a closing parentheses. No spaces are allowed between the name of the function and the opening parentheses.

Argument syntaxEnter argument syntax for all rules except command and regex (regular expression) as follows:

• Separate arguments by commas.

• Commas are not allowed anywhere else in the string.

The Software Items with Value Return rules that set a Custom Inventory Field also appear as Installed Programs.

Administrator Guide, Version 5.3 275

Page 276: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

• Do not include single or double quotes.

• White space is trimmed from the front and back of each argument.

For example, the following syntaxes are the same:

RegistryValueEquals(HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Version Vector, IE, 6.000)

RegistryValueEquals(HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\Version Vector,IE,6.000)

Checking for conditions (Conditional rules)This section explains how to write Custom Inventory rules that identify whether or not (true/false) a Software Item is installed.

When using a conditional rule, if the rule returns true the Display name (Title) of the custom Software Item displays in the node’s inventory list under Installed Programs (Inventory > Details > Software > Installed Programs).

The following screen shows a node with a custom Software Item, A1 IE custom inventory 7 , installed.

The following sections describe the rules that test for conditions:

• Conditional rule reference

• Verifying if a Condition exists (Exists rules)

• Evaluating node settings (Equals rules)

• Comparing node values (Greater and Less Than rules)

• Testing for multiple conditions

When the rule returns false, the Software Item does not appear in Installed Programs in the node’s inventory list.

You can also display a list of nodes that have the item installed from the Inventory > Software > Custom_item: Details page.

276 Administrator Guide, Version 5.3

Page 277: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

Conditional rule referenceThe following table provides a list of all available conditional rules with links to specific details on how to specify the arguments:

Syntax OS Description

Win

dow

s

Linu

x

Mac

OS

X

DirectoryExists(path) X X X Checks for a directory at the specified path on the node.

FileExists(path) X X X Checks for a file at the specified path on the node. Include the name of the file and extension in the path.

FileVersionEquals(path, version) X Verifies that the Version > File Version property of the file specified in the path matches the NUMBER value you entered.

FileVersionLessThan(path, version) Verifies that the Version > File Version property of the file you specified as the path is lower than the NUMBER value you entered.

FileVersionGreaterThan(path, version)

X Verifies that the Version > File Version property of the file you specified is higher than the NUMBER value you entered.

ProductVersionEquals(path, version)

X Verifies that the Version > Product Version property of the executable or installation file you specified matches the NUMBER value you entered.

ProductVersionLessThan(path, version)

X Verifies that the Version > Product Version property of the executable or installation file you specified is lower than the NUMBER value you entered.

ProductVersionGreaterThan(path, version)

X Verifies that the Version > Product Version property of the executable or installation file you specified is higher than the NUMBER value you entered.

FileInfoGreaterThan(fullpath, attribute, type, value)

X X X Verifies that the File Info property of the executable or installation file you specified is higher than the value you entered.

FileInfoLessThan(fullpath, attribute, type, value)

X X X Verifies that the File Info property of the executable or installation file you specified is lower than the value you entered.

Administrator Guide, Version 5.3 277

Page 278: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

FileInfoEquals(fullpath, attribute, type, value)

X X X Verifies that the attribute of the executable or installation file you specified matches the value you entered.

RegistryKeyExists(registryPath) X Verifies that a registry key exists.

RegistryValueEquals(registryPath, valueName, value)

X Verifies that a registry entry exactly matches the value you specify. Value is compared as TEXT.

RegistryValueLessThan(registryPath, valueName, value)

X Verifies that the registry entry is lower than the value you specify. Value is a NUMBER.

RegistryValueGreaterThan(registryPath, valueName, value)

X Verifies that the registry entry is higher than the value you specify. Value is a NUMBER.

EnvironmentVariableExists(var) X X X Verifies that an environment variable with the name you specify exists.

EnvironmentVariableGreaterThan(var, type, value)

X Verifies that the environment variable definition is higher than the value you specify. Only DATE (in the full format mm/dd/yyyy hh:mm:ss) and NUMBER are valid types.

EnvironmentVariableLessThan(var, type, value)

X X Verifies that the environment variable definition is lower than the value you specify. Only DATE (in the full format mm/dd/yyyy hh:mm:ss) and NUMBER are valid types.

EnvironmentVariableEquals(var, type, value)

X X Verifies that the environment variable definition exactly matches the value you specify. All three types are valid, TEXT, DATE (in the full format mm/dd/yyyy hh:mm:ss), and NUMBER.

PlistValueExists(fullpath, entry) X Verifies that a named value exists in a PLIST file.

PlistValueGreaterThan(fullpath, entry, type, value)

X Verifies that the named value is a DATE (in the full format mm/dd/yyyy hh:mm:ss) or NUMBER higher than the value you specified.

Syntax OS Description

Win

dow

s

Linu

x

Mac

OS

X

278 Administrator Guide, Version 5.3

Page 279: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

Verifying if a Condition exists (Exists rules)Rules whose name ends with Exists check for the presence of a file, directory, registry key, or other item. If the agent locates the item on the node, the rule returns true, and the item appears as an Installed Program.

Use any of the following Exists rules:

• DirectoryExists(path)

• FileExists(path)

• RegistryKeyExists(registryPath)

• EnvironmentVariableExists(var)

• PlistValueExists(fullpath, entry)

• FilenamesMatchingRegexExist(fullpath,regex)

Example—Check for a directory (folder)The following example tests to see if the Windows directory exists on the node:

DirectoryExists(C:\WINDOWS\)

Example—Check for a fileThe following example verifies that the Notepad executable file exists on the node:

PlistValueLessThan(fullpath, entry, type, value)

X Verifies that the named value is a DATE (in the full format mm/dd/yyyy hh:mm:ss) or NUMBER lower than the value you specified.

PlistValueEquals(fullpath, entry, type, value)

X Verifies that the named value is a TEXT, DATE (in the full format mm/dd/yyyy hh:mm:ss), or NUMBER that exactly matches the value you specified. You can specify a colon separated list of entries to match the value. Arrays and other valid PLIST datatypes are not supported.

Syntax OS Description

Win

dow

s

Linu

x

Mac

OS

X

Administrator Guide, Version 5.3 279

Page 280: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

FileExists(C:\WINDOWS\notepad.exe)

Evaluating node settings (Equals rules)Rules whose name ends with Equals compare the value set on the node to the value you specify in the rule. The rules return true if the values exactly match.

Rules that use arguments with set datatypes can only compare values of the same type. For example version is a NUMBER and therefore cannot match a value that includes an alpha or special character, even if you specify the character in the argument. Likewise, the value argument for RegistryValueEquals compares the values as TEXT, so a whole number such as 1 does not match a value of 1.0, 1.0.0, and so forth; it matches 1 only.

Use any of the following Equals rules:

• FileVersionEquals(path, version)

• ProductVersionEquals(path, version)

• FileInfoEquals(fullpath, attribute, type, value)

• RegistryValueEquals(registryPath, valueName, value)

• EnvironmentVariableEquals(var, type, value)

• PlistValueEquals(fullpath, entry, type, value)

• FilenamesMatchingRegexEqual(fullpath,regex,value)

Example—Testing JAVA_HOME settingTo verify that the JAVA_HOME setting is C:\Program Files\Java\jdk1.6.0_02:

EnvironmentVariableEquals(JAVA_HOME, TEXT, C:\Program Files\Java\jdk1.6.0_02)

Example—Testing McAfee Registry Entry settingTo check the setting use the same format as the date in the entry:

RegistryValueEquals(HKEY_LOCAL_MACHINE\Software\McAfee\AVEngine, AVDatDate, 2010/03/01)

Example—Testing Internet Explorer versionTo verify that the Internet Explorer is version 6.0.2900.2180. Specifying the version as 6.0.2900.218 returns false.

280 Administrator Guide, Version 5.3

Page 281: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

FileVersionEquals(C:\Program Files\Internet Explorer\iexplore.exe, 6.0.2900.2180)

Example—Detecting Windows XP Service Pack 2Windows XP Service Pack 2 appears in Add/Remove programs for machines that were originally on SP1 then upgraded to SP2 only. The default Software inventory for this item does not reflect machines that are already on SP2 because they were originally imaged at the SP2 level.

When using the appliance to deploy Windows XP Service Pack 2 create the following Custom Inventory rule for a custom Software Item:

RegistryValueEquals(HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion,CSDVersion,Service Pack 2)

You can then exclude nodes with this item installed to prevent the appliance from trying to deploy the SP2 to nodes that are already at that level (that is, SP1 machines that have been upgraded, as well as machines originally imaged with SP2).

Comparing node values (Greater and Less Than rules)Functions whose names end with GreaterThan and LessThan compare NUMBER (integer) values only. Therefore, a value that contains an alpha or special character, such as versions that contain a letter (1.2.3B), do not compare correctly with this function.

Use any of the following Greater Than and Less Than rules:

• FileVersionGreaterThan(path, version) and FileVersionLessThan(path, version)

• ProductVersionGreaterThan(path, version) and ProductVersionLessThan(path, version)

• FileInfoGreaterThan(fullpath, attribute, type, value) and FileInfoLessThan(fullpath, attribute, type, value)

• RegistryValueGreaterThan(registryPath, valueName, value) and RegistryValueLessThan(registryPath, valueName, value)

• EnvironmentVariableGreaterThan(var, type, value) and EnvironmentVariableLessThan(var, type, value)

• PlistValueGreaterThan(fullpath, entry, type, value) and PlistValueLessThan(fullpath, entry, type, value)

• FilenamesMatchingRegexGreaterThan(fullpath,regex,value) and FilenamesMatchingRegexLessThan(fullpath,regex,value)

Example—Testing if the Product Version is higher than 6.0

To verify that the product version is higher than 6.0:

Administrator Guide, Version 5.3 281

Page 282: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

ProductVersionGreaterThan(C:\Program Files\Internet Explorer\iexplorer.exe, 6.0)

To verify that the production version is 6 (that is equal to 6.0) or higher, enter the following:

ProductVersionEquals(C:\Program Files\Internet Explorer\iexplorer.exe, 6.0) OR ProductVersionGreaterThan(C:\Program Files\Internet Explorer\iexplorer.exe, 6.0)

Example—Testing for a Product Version rangeTo test if the product version is within a range, combine less than and greater than rules:

ProductVersionGreaterThan(C:\Program Files\Internet Explorer\iexplorer.exe, 6.0) AND ProductVersionLessThan(C:\Program Files\Internet Explorer\iexplorer.exe, 8.0)

Testing for multiple conditionsYou can join rules using AND and OR operators to test for multiple conditions.

Joining conditional rules produces the following results:

• AND operator: All the rules must return true in order for the results to return true and report the Software Item as an Installed Program.

• OR operator: Only one rule must return true for the Software Item to be reported as an Installed Program.

Checking for multiple true conditions (AND)Use the AND operator to join conditional rules in the Custom Inventory field when you want the item to be reported as an Installed Program only if all the rules are true.

In the Custom Inventory field, join rules using the following syntax:

Function(arguments...) AND Function(arguments) AND ...

Separate the conditional statements from the operator with spaces.

Example—Checking for a Registry Key and comparing valuesTo check for a registry key and a registry entry value on a Windows system use AND to combine the rules as shown below:

Using both AND and OR operators in the same Custom Inventory rule is not supported. Set up separate Software Items.

282 Administrator Guide, Version 5.3

Page 283: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

RegistryKeyExists(registryPath) AND RegistryValueEquals(registryPath, valueName, value)

Checking for one true condition (OR)When you join rules using the OR operator, if any of the rules in the Custom Inventory field are true, the software appears in the Installed Program list of the node.

In the Custom Inventory field, join the rules using the following syntax:

Function(arguments) OR Function(arguments) OR ...

Separate the function statements and operator using a space.

Example—Checking for either Registry valueTo check that a registry entry is one value or another:

RegistryValueEquals(registryPath, valueName, value) OR

RegistryValueEquals(registryPath, valueName, value)

Getting values from a node (Custom Inventory Field)The rules that end with ValueReturn allow you t gather information from the node. Use these rules to get information that the agent normally does not.

The returned values are set with the custom Software Item Display name (Title) in the node’ inventory. To display the list, go to Inventory > Details > Software > Custom Inventory Fields.

Use the Custom Inventory Field values to manage installs and distribute software as well as in reports, View by filtering, and Smart Label search criteria, or any other process that can be performed with a automatically detected setting.

This section covers the following topics:

To specify a range it use RegistryValueGreaterThan and RegistryValueLessThan rules joined by the AND operator.

Administrator Guide, Version 5.3 283

Page 284: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

• Value Return rule reference

• Getting Registry key values

• Getting command output

• Getting PLIST values

• Getting multiple values

Value Return rule referenceThe following table shows all available value return rules that you can use to set a Custom Inventory Field.

Getting File Information valuesYou can set the Custom Inventory Field to any of the Windows File Information attributes using the FileInfoReturn rule.

Example—Getting Windows Internet Explorer Product VersionThe following example sets the Custom Inventory Field for the Internet Explorer Product Version as a NUMBER. In the Custom Inventory field, enter the following:

Syntax OS Description

Win

dow

s

Linu

x

Mac

OS

XRegistryValueReturn(registryPath, valueName, type)

X Returns the value of a registry entry, and sets the datatype to the one you specified.

EnvironmentVariableReturn(var, type) X X Returns the value of an environment variable, and sets the datatype to the one your specified.

FileInfoReturn(path, attribute, type) X X X Returns the value of a file attribute, see valid types in Specifying a file attribute, on page 290.

ShellCommandTextReturn(command) X X X Returns the output of the command, and sets the datatype to TEXT.

ShellCommandDateReturn(command) X X X Returns the output of the command, and sets the datatype to DATE.

ShellCommandNumberReturn(command) X X X Returns the output of the command, and sets the datatype to NUMBER.

PlistValueReturn(fullpath, entry, type) X Returns the value of the PLIST key, and sets the datatype to TEXT, NUMBER, or DATE.

284 Administrator Guide, Version 5.3

Page 285: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

FileInfoReturn(C:\Program Files\Internet Explorer\iexplore.exe,ProductVersion,NUMBER)

However, if the value contained a special or alpha character, specify the TEXT as the type. TEXT limits the operators you can use in queries in other features, such as Smart Label Search Criteria.

Getting Registry key valuesSet the Custom Inventory Field to a registry key using the RegistryValueReturn rule. Where the registryPath (on left) is the path to the entry, the valueName (on right) is the key you want to return.

Example—Getting the Internet Explorer ProductID keyTo set the ProductID registry key as a Custom Inventory Field.

RegistryValueReturn(HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Registration, ProductId, TEXT)

Getting command outputCommand rules allow you to set the output of a command to a Custom Inventory Field. The command depends on the command interpreter and executable path on the node. For example, on Windows systems you can write MS-DOS commands, but not Cygwin-style UNIX commands unless Cygwin is installed and available in the default path for all users.

Use any of the following rules to set the output of the command to a Custom Inventory Field:

• ShellCommandTextReturn(command)

• ShellCommandDateReturn(command)

• ShellCommandNumberReturn(command)

Administrator Guide, Version 5.3 285

Page 286: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

Example—Getting uptime on a Mac OS XTo set the uptime as a Custom Inventory Field:

ShellCommandTextReturn(/usr/bin/uptime | sed -e 's/.*load averages://' | awk '{print $1}')

The Uptime Return custom Software Item displays in the Custom Inventory Field.

Getting PLIST valuesPlistValueReturn rules allow you to set a Property List (PList) key as a Custom Inventory Field.

Example—Getting the system localeTo distribute software using Managed Installations based on the native language, enter the following rule to get computer locale and then create corresponding Smart Label that is applied to the machine based on the language code reported by the agent in the Custom Inventory Field:

PlistValueReturn(~/Library/Preferences/GlobalPreferences.plist, AppleLocale, TEXT)

Getting multiple valuesJoin ValueReturn rules using either the AND or OR operator. The rule shows the software item as an Installed Program, if any of the values are not empty.

The joined values are all set in the same Custom Inventory Field separated by the operator and therefore are technically considered for the purposes of Search Criteria, filters, reports, and other appliance processes as TEXT.

ValueReturn rules joined by the:

• AND operator: All the values are reported in the Custom Inventory Field.

• OR operator: All values are reported in the Custom Inventory Field.

286 Administrator Guide, Version 5.3

Page 287: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

In the Custom Inventory field, join rules using the following syntax:

Function(arguments...) AND Function(arguments) AND ...

Separate the conditional statements from the operator with spaces. Do not join AND and OR operators in the same rule.

Matching file names with Regular ExpressionsThis section describes the Regular Expression rules that match file names in Conditional and Value Return rules using a regular expression.

Regular expressions match a character or the specified string to the file names in the directory you specified.

Understanding Regular ExpressionsThe purpose of this section is to provide a high-level introduction to regular expressions.

The following table provides an overview of basic regular expression syntax you can use to match file names:

The K1000 agent only provides functions that compare file names using regular expressions.

For more information on writing regular expressions go to: http://msdn.microsoft.com/en-us/library/az24scfc.aspx.

Character DescriptionExample

Expression Matches From

(any string) Entering non-special characters only matches any file name that contains the string.

abc Myabc.txtabcFile.xlsMyFile.abc

File.docMyabc.txtabcFile.xlsMyFile.abcExample.jpg

. Dot matches any single character. When entered alone it matches all files.

. File.docMyabc.txtabcFile.xlsMyFile.abcExample.jpg

File.docMyabc.txtabcFile.xlsMyFile.abcExample.jpg

\ Backslash escapes a special character, suppressing the special regular expression quantifier meaning.For example, to match all text files, enter: .*\.txt$

\. File.docMyabc.txtabcFile.xlsMyFile.abcExample.jpg

File.docMyabc.txtabcFile.xlsMyFile.abcExample.jpg

Administrator Guide, Version 5.3 287

Page 288: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

^ Caret (and \A) matches the characters you specify to the start of the file name.

^k kinstaller.exe install.exerunkbot.batkinstaller.exe

| Pipe separates a list of options to match.

run|installer kinstaller.exerunkbot.bat

install.exekinstaller.exerunkbot.bat

$ Dollar (and \Z or \z) matches the characters your specify to the end of the file name.

bat$ MyStartup.bat MyStartupBat.docMyStartup.bat

? Question mark makes the preceding character optional in matches.

\.log10?$ a.log11

mylog.log10 app.log appconf.log2mylog.log10a.log11afile.txt

* Asterisk matches the preceding character zero or more times.

\.log1*$ app.log

appconf.log12

a.log11

app.log appconf.log12mylog.log10a.log11afile.txt

+ Plus matches the preceding character one or more times.

ap+.*\.log app.log

appconf.log12

app.log appconf.log12mylog.log10a.log11afile.txt3

[ ] Brackets enclose a character class and matches any character within the brackets.Note that character class special character rules differ from normal regular expressions.

[123] appconf.log12

mylog.log10

a.log11

afile.txt3

app.logappconf.log12mylog.log10a.log11afile.txt3

() Parentheses enclosing characters creates a back reference and matches the preceding characters and/or the enclosed characters.

ap?+\.(log) [123]$

appconf.log12

a.log11

app.logappconf.log12mylog.log10a.log11afile.txt3

Character DescriptionExample

Expression Matches From

288 Administrator Guide, Version 5.3

Page 289: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

Regular Expression Rule ReferenceThe syntax of a regular expression rule varies slightly from the other File rules. Where the fullpath argument is a string that matches the absolute path to the file location, but does not include name of the file. And the file name is specified as a separate argument using a regular expression.

The following table provides a list of rules that allow you to use regular expressions.

Defining rule argumentsThis section provides details on defining the arguments in a rule.

For rule syntax see the tables in Checking for conditions (Conditional rules), on page 276, Getting values from a node (Custom Inventory Field), and Matching file names with Regular Expressions for more details on the specific rules they can be used in.

{n} Curly brackets repeats the preceding character the number of specified times, where n is greater than or equal to 1.

a.{3}?+\. (log)[123]$

appconf.log12 app.logappconf.log12mylog.log10a.log11afile.txt3

Character DescriptionExample

Expression Matches From

Syntax OS Description

Win

dow

s

Linu

x

Mac

OS

X

FilenamesMatchingRegexExist(fullpath,regex) X X X Returns true if any files in the specified directory match the file name you entered using a regular expression.

FilenamesMatchingRegexGreaterThan(fullpath,regex,value)

X X X True if the number of files that match is more than the value.

FilenamesMatchingRegexLessThan(fullpath,regex,value)

X X X True if the number of files that match is less than the value.

FilenamesMatchingRegexEqual(fullpath,regex,value)

X X X True if the number of files that match is the same as the value.

FilenamesMatchingRegexReturn(fullpath,regex,type)

X X X Sets the Custom Inventory Field to the matching file names (includes path).

Administrator Guide, Version 5.3 289

Page 290: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

Finding a path or filepath and fullpath are a string that specifies the absolute path to a directory or file on the node, for example:

C:\Program Files\Mozilla Firefox\firefox.exe

The agent locates the directory or file and performs the specific test.

Finding a registry key and entryregistryPath is a string that specifies the absolute path in the registry to a registry key, for example:

HKEY_LOCAL_MACHINE/software/kace

Specifying a versionversion is an integer (datatype is NUMBER) that the agent compares to the version of the item being tested on the node.

For example, the FileVersionGreaterThan test returns ‘true’ if the value you specify is higher than the version number of the file or folder and otherwise returns ‘false’.

To test a range, join a Less Than and Greater Than rule as follows:

FileVersionGreaterThan(C:\Program Files\Adobe\Acrobat\7.0\Acrobat\Acrobat.exe, 6.99) AND FileVersionLessThan(C:\Program Files\Adobe\Acrobat\7.0\Acrobat\Acrobat.exe, 8.00)

Specifying environment or user variablesvar is a string that matches the actual name of the environment variable on the system.

For example, to test that the Program Files directory variable is correctly set:

EnvironmentVariableEquals(ProgramFiles, TEXT, C:\Program Files)

Specifying a file attributeattribute is a system property, a file or folder property, or an agent assigned property on the node. The appliance provides operating system dependent argument types.

Using Windows file attributesYou can use the FileInfoGreaterThan, FileInfoLessThan, and FileInfoEquals functions to test a file property on Windows in the following syntax:

290 Administrator Guide, Version 5.3

Page 291: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

FunctionName(fullpath, attribute, type, value)

You can specify any type but the datatype indicated in the table below shows the Windows

supported type:

AccessedDate DATE Last date and time the file was accessed.

Comments TEXT Additional information provided for diagnostic purposes.

CompanyName TEXT Name of the company that produced the file.

CreatedDate DATE When the file was created.

FileBuildPart NUMBER/TEXT

Third position of the File Version, for example in version 1.2.3, 3=Build.

FileDescription TEXT File Description of the Windows file properties Details tab.

FileMajorPart NUMBER/TEXT

First position of the File Version, for example in version 1.2.3, 1=Major.

FileMinorPart NUMBER/TEXT

Second position of the File Version, for example in version 1.2.3, 2=Minor.

FileName TEXT Current name of the file. Also see FileExists.

FilePrivatePart TEXT Fourth position of the File Version, for example in version 1.2.3.4, 4=Private.

FileVersion NUMBER/TEXT

Complete File Version shown on the file properties Details tab. Also see FileVersionEquals, FileVersionGreatThan, and FileVersionLessThan

InternalName TEXT Internal name of the file, if one exists, such as the module name. If the file has no internal name, it is equal to the original filename, without an extension.

IsDebug TEXT/NUMBER

Returns True (1) if the file contains debugging information or was compiled with debugging enabled; otherwise returns False (0).

IsPatched TEXT/NUMBER

Returns True (1) if the provider marked the file as modified and it is not identical to the original shipped version; otherwise returns False (0).

IsPreRelease TEXT/NUMBER

Returns True (1) if the provider marked the file as a development version, not a commercially released product; otherwise returns False (0).

Administrator Guide, Version 5.3 291

Page 292: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

Testing for Linux and Mac file attributesOn Linux and Mac nodes you can use the following arguments to test file attributes:

IsPrivateBuild TEXT/NUMBER

Returns True (1) if the provider marked the file as not built using standard release procedures; otherwise returns False (0). When True, file also has a PrivateBuild string.

IsSpecialBuild TEXT/NUMBER

Returns True (1) if the provider marked the file as built by the original company using standard release procedures but is a variation of the standard file of the same version number; otherwise returns False (0). When True, file also has a SpecialBuild string.

Language TEXT Language code, displays corresponding name on the File Properties Details tab.

LegalCopyright TEXT Copyright notices that apply to the file.

LegalTrademarks TEXT Trademarks and registered trademarks that apply to the file.

ModifiedDate DATE Last day and time the file was modified.

OriginalFilename TEXT Provides the full name of the file when it was put or installed on the node.

PrivateBuild TEXT Information about the version of the file.

ProductBuildPart NUMBER/TEXT

Third position of the Product Version, for example in version 1.2.3, 3=Build.

ProductMajorPart NUMBER/TEXT

First position of the Product Version, for example in version 1.2.3, 1=Major.

ProductMinorPart NUMBER/TEXT

Second position of the Product Version, for example in version 1.2.3, 2=Minor.

ProductName TEXT String that matches the Product Name of the Windows property.

ProductPrivatePart NUMBER Fourth position of the Product Version, for example in version 1.2.3.4, 4=Private.

ProductVersion NUMBER/TEXT

The full production version.Also see ProductVersionEquals, ProductVersionGreaterThan, and ProductVersionLessThan.

SpecialBuild TEXT Additional information about the build.

device_number ID of device (disk) containing the file.

inode inode number.

number_links Number of hard links to the file.

owner User name of the person who owns the file.

292 Administrator Guide, Version 5.3

Page 293: Dell KACE K1000 Admin Guide

Writing Custom Inventory RulesC

Specifying the datatypetype identifies the type of data you are testing or returning.

The agent supports the following types:

• TEXT a string. Only valid for exactly matching in conditional rules such as Equals. In ValueReturn rules, sets the Custom Inventory Field type to string and therefore limits search criteria and filtering to matching operators.

• NUMBER an integer. Valid in all conditional rules, allows you to specify a whole number for comparison.

• DATE must be in the format of MM/dd/yyyy HH:mm:ss for example 09/28/2006 05:03:51. Time is required, for example in a comparison such as greater than you must at least specify the time as 00:00:00.

Specifying values to testvalue typically follows type except in a rule where the datatype is known, such as in a version rule. The value you specify must match the type, for more information see Specifying the datatype, on page 293.

Specifying the name of a registry entry (Windows only)valueName is a string that matches the name of the registry entry you want to test. Used only in registry tests for Windows systems.

Specifying a PLIST key (Mac only)entry is either NUMBER, TEXT, or DATE and matches a key in a PLIST file on a Mac OS X computer. In the entry argument, you can specify a colon separated list of keys to match.

Using a regular expressionregex is a regular expressions that matches a file name in a Conditional or Value Return rule.

See Matching file names with Regular Expressions, on page 287 for more details.

group Group name of the file owner.

size File size.

access_time Time stamp of the last time the user or system accessed the file.

modification_time Last time a change that was mode to the file was saved.

creation_time When the file was created.

block_size The block size of the file.

blocks The number of blocks used by the file.

Administrator Guide, Version 5.3 293

Page 294: Dell KACE K1000 Admin Guide

C Writing Custom Inventory Rules

Defining commandsThe shell command functions allow you to specify the command you want to run on the computer. The guidelines for writing rule arguments do not apply to command. However white space after the opening parentheses and immediately before the closing one is stripped from the command.

294 Administrator Guide, Version 5.3

Page 295: Dell KACE K1000 Admin Guide

D

Database Tables

This appendix contains a list of the table names used in the Dell KACE K1000 Management Appliance database.

• K1000 Management Appliance Database Tables, on page 295.

K1000 Management Appliance Database TablesRefer to the following table when creating custom reports. For more information, see Chapter 12: Running the K1000 Appliance Reports, starting on page 221.

Table Component

ADVISORY Service Desk

ADVISORY_LABEL_JT Service Desk

ASSET Assets

ASSET_ASSOCIATION Assets

ASSET_DATA_1 Assets

ASSET_DATA_2 Assets

ASSET_DATA_3 Assets

ASSET_DATA_4 Assets

ASSET_DATA_5 Assets

ASSET_DATA_6 Assets

ASSET_DATA_7 Assets

ASSET_FIELD_DEFINITION Assets

ASSET_FILTER Assets

ASSET_HIERARCHY Assets

ASSET_HISTORY Assets

ASSET_TYPE Assets

AUTHENTICATION Appliance Administration

CLIENTDIST_LABEL_JT Appliance Administration

CLIENT_DISTRIBUTION Appliance Administration

Administrator Guide, Version 5.3 295

Page 296: Dell KACE K1000 Admin Guide

D Database Tables

CUSTOM_FIELD_DEFINITION Custom Fields

CUSTOM_VIEW Custom Fields

DELL_INVENTORY Dell Updates

DELL_INVENTORY_APPLICATION_DEVICE_JT

Dell Updates

DELL_INVENTORY_DEVICE_JT Dell Updates

DELL_INVENTORY_LOG Dell Updates

DELL_MACHINE_PKG_UPDATE_STATUS

Dell Updates

DELL_MACHINE_STATUS Dell Updates

DELL_PKG_LABEL_JT Dell Updates

DELL_PKG_STATUS Dell Updates

DELL_PKG_UPDATE_HISTORY Dell Updates

DELL_SCHEDULE Dell Updates

DELL_SCHEDULE_LABEL_JT Dell Updates

DELL_SCHEDULE_OS_JT Dell Updates

DELL_SCHEDULE_UPDATE_LABEL_JT

Dell Updates

FILTER Labeling

FS File Synchronization

FS_LABEL_JT File Synchronization

FS_MACHINE_JT File Synchronization

GLOBAL_OPTIONS Appliance Administration

HD_ATTACHMENT Service Desk

HD_CATEGORY Service Desk

HD_EMAIL_EVENT Service Desk

HD_FIELD Service Desk

HD_IMPACT Service Desk

HD_MAILTEMPLATE Service Desk

HD_PRIORITY Service Desk

HD_QUEUE Service Desk

HD_QUEUE_APPROVER_LABEL_JT

Service Desk

HD_QUEUE_OWNER_LABEL_JT Service Desk

Table Component

296 Administrator Guide, Version 5.3

Page 297: Dell KACE K1000 Admin Guide

Database TablesD

HD_QUEUE_SUBMITTER_LABEL_JT

Service Desk

HD_SERVICE Service Desk

HD_SERVICE_TICKET Service Desk

HD_SERVICE_USER_LABEL_JT Service Desk

HD_STATUS Service Desk

HD_TICKET Service Desk

HD_TICKET_CHANGE Service Desk

HD_TICKET_CHANGE_FIELD Service Desk

HD_TICKET_FILTER Service Desk

HD_TICKET_RELATED Service Desk

HD_TICKET_RULE Service Desk

HD_WORK Service Desk

IM_CRON Appliance Administration

IPHONE_PROFILE iPhone

IPHONE_PROFILE_LABEL_JT iPhone

KBOT Scripting

KBOT_CRON_SCHEDULE Scripting

KBOT_DEPENDENCY Scripting

KBOT_EVENT_SCHEDULE Scripting

KBOT_FORM Scripting

KBOT_FORM_DATA Scripting

KBOT_LABEL_JT Scripting

KBOT_LOG Scripting

KBOT_LOG_DETAIL Scripting

KBOT_LOG_LATEST Scripting

KBOT_OS_FAMILY_JT Scripting

KBOT_OS_JT Scripting

KBOT_RUN Scripting

KBOT_RUN_MACHINE Scripting

KBOT_RUN_TOKEN Scripting

KBOT_SHELL_SCRIPT Scripting

KBOT_UPLOAD Scripting

KBOT_VERIFY Scripting

Table Component

Administrator Guide, Version 5.3 297

Page 298: Dell KACE K1000 Admin Guide

D Database Tables

KBOT_VERIFY_STEPS Scripting

LABEL Labeling

LABEL_LABEL_JT Labeling

LDAP_FILTER Labeling

LDAP_IMPORT_USER User

MACHINE Inventory

MACHINE_CUSTOM_INVENTORY Inventory

MACHINE_DAILY_UPTIME Inventory

MACHINE_DISKS Inventory

MACHINE_LABEL_JT Inventory

MACHINE_NICS Inventory

MACHINE_NTSERVICE_JT Inventory

MACHINE_PROCESS_JT Inventory

MACHINE_REPLITEM Inventory

MACHINE_SOFTWARE_JT Inventory

MACHINE_STARTUPPROGRAM_JT Inventory

MESSAGE Alerts

MESSAGE_LABEL_JT Alerts

METER Software Metering

METER_COUNTER Software Metering

MI Managed Installs

MI_ATTEMPT Managed Installs

MI_LABEL_JT Managed Installs

MSP_MI_TEMPLATE Patching

NODE Network Scan

NODE_LABEL_JT Network Scan

NODE_PORTS Network Scan

NODE_SNMP_IF Network Scan

NODE_SNMP_SYSTEM Network Scan

NOTIFICATION Alerts

NTSERVICE Inventory

NTSERVICE_LABEL_JT Inventory

OBJECT_HISTORY Appliance Administration

Table Component

298 Administrator Guide, Version 5.3

Page 299: Dell KACE K1000 Admin Guide

Database TablesD

OPERATING_SYSTEMS Inventory

OVAL_STATUS OVAL

PATCHLINK_MACHINE_STATUS Patching (Security)

PATCHLINK_PATCH_LABEL_JT Patching (Security)

PATCHLINK_PATCH_STATUS Patching (Security)

PATCHLINK_SCHEDULE Patching (Security)

PATCHLINK_SCHEDULE_DEPLOY_LABEL_JT

Patching (Security)

PATCHLINK_SCHEDULE_DETECT_LABEL_JT

Patching (Security)

PATCHLINK_SCHEDULE_LABEL_JT

Patching (Security)

PATCHLINK_SCHEDULE_OS_JT Patching (Security)

PATCHLINK_SCHEDULE_ROLLBACK_LABEL_JT

Patching (Security)

PATCH_FILTER Labeling

PORTAL Service Desk

PORTAL_LABEL_JT Service Desk

PROCESS Inventory

PROCESS_LABEL_JT Inventory

PROVISION_CONFIG Appliance Administration

PROVISION_NODE Appliance Administration

REPLICATION_LANGUAGE Replication

REPLICATION_PLATFORM Replication

REPLICATION_SCHEDULE Replication

REPLICATION_SHARE Replication

REPORT Reporting

REPORT_FIELD Reporting

REPORT_FIELD_GROUP Reporting

REPORT_JOIN Reporting

REPORT_OBJECT Reporting

REPORT_SCHEDULE Reporting

SAVED_SEARCH Appliance Administration

SCAN_FILTER Labeling

SCAN_SETTINGS Network Scan

Table Component

Administrator Guide, Version 5.3 299

Page 300: Dell KACE K1000 Admin Guide

D Database Tables

SETTINGS Appliance Administration

SOFTWARE Inventory

SOFTWARE_LABEL_JT Inventory

SOFTWARE_OS_JT Inventory

STARTUPPROGRAM Inventory

STARTUPPROGRAM_LABEL_JT Inventory

THROTTLE Appliance Administration

USER Service Desk

USERIMPORT_SCHEDULE Service Desk

USER_HISTORY Service Desk

USER_KEYS Service Desk

USER_LABEL_JT Service Desk

USER_ROLE Appliance Administration

USER_ROLE_PERMISSION_VALUE

Appliance Administration

Table Component

300 Administrator Guide, Version 5.3

Page 301: Dell KACE K1000 Admin Guide

E

Manually Deploying Agents

This appendix explains how to manually deploy the Dell KACE K1000 Management Appliance Agent on nodes using a command-line or terminal.

Overview of manual deploymentManually deploying or upgrading the Agent is useful when you have problems with provisioning or want to use other means, such as email, scripting, and Group Policy/Active Directory:

• Email

To deploy Agents through email, you can send an email to your users that contains one of the following:

• Install file.

• Link to the appliance.

• Other Web location to retrieve the required installation file.

Using this method, your users can click a link and install the Agent.

• Logon Scripts

Logon scripts provide a great mechanism to deploy the Agent when you log onto a computer. If you use logon scripts, simply post the appropriate file in an accessible directory and create a logon script for the Agents to retrieve it.

You can find the installers for Windows, Macintosh, and Red Hat Linux in the following directory:

\\k1000_hostname\client\agent_provisioning

Updating the AgentManually updating the Agent depends on which version of the K1000 Agent that is installed on the target computer:

• For 5.1 or later, install the Agent as described in this chapter for your platform.

File share must be enabled to access the installers. See Enabling file sharing on page 67.

Administrator Guide, Version 5.3 301

Page 302: Dell KACE K1000 Admin Guide

E Manually Deploying Agents

• For 5.0 or earlier, you must first uninstall the Agent on each target computer. See the documentation included with your version of the K1000 Management Appliance.

Resources for troubleshootingIf you have one or more computers that don’t install or show up in Inventory:

• Go to Dell KACE Support. Support contains whitepapers, articles, and a Knowledge Base that can help you with this issue and many other issues.

• Windows platforms:

• Windows security issues, on page 304

• Windows debugging, on page 304

• Linux (Red Hat):

• Linux Debugging, on page 307

• Mac OS X:

• Macintosh Debugging, on page 309.

Manually installing the Agent on WindowsYou can install the Agent on Windows using the Install Wizard or command lines.

The Agent executable files are installed in:

• Windows XP or earlier: C:\Program Files\Dell\KACE\

• Window Vista and Windows 7: C:\Program Files (x86)\Dell\KACE\

The Agent configuration files, logs, and other data are stored in:

• Window Vista and Windows 7: C:\ProgramData\Dell\KACE

• Windows XP or earlier: C:\Documents and Settings\All Users\Dell\KACE

To manually install the Agent on Windows using the Install wizard1. Go to the shared directory of the appliance server:

\\k1000_hostname\client\agent_provisioning\windows_platform

2. Copy the ampagent-5.3.buildnumber-x86.msi file to your local computer.

3. Double-click the file to start the installation and follow the instructions in the install wizard. Be sure to enter the name of your K1000 server.

302 Administrator Guide, Version 5.3

Page 303: Dell KACE K1000 Admin Guide

Manually Deploying AgentsE

The node information appears in the appliance Inventory within a few minutes.

To manually install the Agent on Windows using command linesThe options listed in Table E-1 on page 303 provide several different ways for installing the Agents on Windows Platforms. For example:

• In a batch file, as part of a logon script, which runs the installer (msiexec) and sets various parameters, such as the value of the host.

• Set an environment variable for the server name and then run the installer.

• Change name of the installer, which automatically sets the server name during the install.

This method provides the following parameters:

Although the Agent automatically checks in, you can force a check in using the following command line:

runkbot 4 0

Table E-1: Command line parameters for the Agent

Description Parameter

Windows Installer Tool

msiexec or msiexec.exe

Install flag /i

Example: msiexec /i ampagent-5.3.12345-x86

Uninstall flag /x Example: msiexec /x ampagent-5.3.12345-x86

Silent install /qn

Example: msiexec /qn /i ampagent-5.3.12345-x86

Log verbose output /L*v log.txt

Auto set host name rename agent_installer.msi_hostname.msi

(Renames the install file to the name of the server name, which automatically sets the host name.)Example: msiexec /qn /i ampagent-5.3.32941-x86_k1000.kace.com.msi

Set properties PROPERTY=value (Must use ALL CAPS.)Example: msiexec /qn /i ampagent-5.3.32941-x86.msi HOST=k1000.kace.com

Administrator Guide, Version 5.3 303

Page 304: Dell KACE K1000 Admin Guide

E Manually Deploying Agents

The ordering of setting the host is as follows:

1. If the installer contains the name of host, use that.

2. If KACE_SERVER is set, use that.

3. If amp.conf has a server, use that.

4. If smmp.conf has a server, use that (when updating from 5.1).

Do not leave empty. Do not set to kbox. Otherwise, the agent will NOT connect to the server.

Windows security issuesWindows security may prevent the initial provisioning from the K1000. To allow provisioning, use the following command lines to open up the firewall and configure settings.

• reg add HKLM\SYSTEM\CurrentControlSet\Control\Lsa /v ForceGuest /t REG_DWORD /d 0 /f

• reg add HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system /v LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f

• reg add "HKLM\SYSTEM\CurrentControlSet\Control\Terminal Server" /v FdenyTSConnections /t REG_DWORD /d 0 /f

• netsh.exe firewall set service type=FILEANDPRINT mode=ENABLE scope=ALL

• netsh.exe firewall set service type=REMOTEADMIN mode=ENABLE scope=ALL

Windows debugging1. Open a command window. (Windows Vista and Windows 7 require Run as

administrator privileges.)

2. Stop the Agent:

net stop ampagent

3. Add the following line to the amp.conf file:

debug=true

This file is located in:

Window Vista and Windows 7: C:\ProgramData\Dell\KACE

Set server name set KACE_SERVER=k1000name (Must be followed by an msiexec call to install.)

Example: set KACE_SERVER=kbox msiexec /i ampagent-5.2.12345-x86

Table E-1: Command line parameters for the Agent

Description Parameter

304 Administrator Guide, Version 5.3

Page 305: Dell KACE K1000 Admin Guide

Manually Deploying AgentsE

Windows XP or earlier: C:\Documents and Settings\All Users\Dell\KACE

4. Start the Agent:

net start ampagent

The output is recorded in various K1000 Agent logs.

Installing and Configuring the Agent on LinuxThis section provides information for installing and configuring the Agent on Linux.

To install the AgentYou must have the K1000 Agent installation file on your computer.

1. Open a terminal from Applications > System Tools.

2. At the command prompt, set the name of the server and install the Agent:

sudo KACE_SERVER=k1000name rpm -ivh ampagent-5.2.35800-1.i386.rpm

The Agent is installed in the following directories:

• /opt/dell/kace/bin/ where the Agent executable files are installed.

• /var/dell/kace/ where the Agent configuration, logs, and other data is stored.

3. To force the Agent to check in, enter:

sudo /opt/dell/kace/bin/runkbot 2 0

To install from startup or loginYou can install the Agent for any user starting or logging in to a Linux system. You can set the name by adding the following command to the root directory:

export KACE_SERVER=k1000name

The export call must precede the call to the installer. For example: export KACE_SERVER=k1000name rpm -ivh k1000agent-12345.i386.rpm

The ordering of setting the host is as follows:

1. If the installer contains the name of host, use that.

2. If KACE_SERVER is set, use that.

3. If amp.conf has a server, use that.

The Agent normally checks in using the “Run Interval” schedule specified in the K1000 Agent Settings page. However, you can force a check in outside of the normal schedule by going to C:\Program Files\Dell\KACE\ or C:\Program Files (x86)\Dell\KACE\ and entering: runkbot 4 0

Administrator Guide, Version 5.3 305

Page 306: Dell KACE K1000 Admin Guide

E Manually Deploying Agents

4. If smmp.conf has a server, use that (when updating from 5.1).

Do not leave empty. Do not set to kbox. Otherwise, the agent will NOT connect to the server.

To upgrade the AgentYou must have the K1000 Agent installation file on your computer.

1. Open a terminal from Applications > System Tools.

2. At the command line prompt, enter:

rpm -uvh k1000agent-linux_buildnumber.rpm

To start and stop the Agent1. Open a terminal from Applications > System Tools.

2. Perform the following:

• To start the Agent, enter:

sudo /etc/rc.d/init.d/AMPctl start

• To stop the Agent, enter:

sudo /etc/rc.d/init.d/AMPctl stop

To manually remove the Agent1. Open a terminal from Applications > System Tools.

2. At the command line prompt, enter:

sudo rpm -e ampagent

3. (Optional) Remove the kace directory:

rm -rf /var/dell/kace/

Other Agent operationsThis section describes the various tasks you can perform to manage the Agent using a terminal.

To check that the Agent is running1. Open a terminal from Applications > System Tools.

2. At the command line prompt, enter:

ps aux | grep AMPAgent

This output indicates that the process is running:

306 Administrator Guide, Version 5.3

Page 307: Dell KACE K1000 Admin Guide

Manually Deploying AgentsE

root 6100 0.0 3.9 3110640 20384 ? Ssl Mar03 0:00 /opt/dell/kace/bin/AMPAgent --daemon

To check the version of the Agent1. Open a terminal from Applications > System Tools.

2. At the command line prompt, enter:

rpm -q ampagent

The version number is reported.

To run an Inventory check1. Open a terminal from Applications > System Tools.

2. Go to the following folder:

/opt/dell/kace/bin/

3. To run an inventory and send to the K1000:

sudo ./runkbot 2 0

4. To manually run an inventory:

sudo ./inventory

5. To save the inventory results to a file, enter:

sudo /opt/dell/kace/bin/inventory > `hostname`.txt

This command saves the inventory results to a file that is based on the name of your computer.

Linux Debugging1. Open a terminal from Applications > System Tools.

2. Stop the Agent:

sudo /etc/rc.d/init.d/AMPctl stop

3. Set debug to true in the amp.conf file in /var/dell/kace/data:

cat<<eof/var/dell/kace/data/amp.conf debug=true eof

4. Start the Agent:

sudo /etc/rc.d/init.d/AMPctl start

The output is recorded in various K1000 Agent Logs.

The Agent normally checks in using the “Run Interval” schedule specified in K1000 Agent Settings page. However, you can force a check in outside the normal schedule by going to /Library/Application Support/Dell/KACE/bin/ and running: runkbot 2 0

Administrator Guide, Version 5.3 307

Page 308: Dell KACE K1000 Admin Guide

E Manually Deploying Agents

To Install and Configure the Agent on Mac OS NodesThis section provides information for installing the Agent on Mac OS. Additional options are described in Using shell scripts to install the Agent, on page 310.

To install or upgrade the AgentYou must have the K1000 Agent installation file on your computer.

1. Double-click ampagent-5.3.buildnumber.dmg.

2. Double-click AMPAgent.pkg.

3. Follow the instructions in the installer. Be sure to enter the name of your K1000 server.

The installer creates the following directories on your computer:

• /Library/Application Support/Dell/KACE/ where the Agent executable files are installed.

• /Library/Application Support/Dell/KACE/data/ where the Agent configuration, logs, and other data is stored.

To start or stop the Agent1. Open a terminal from Applications > Utilities.

2. Go to the following folder:

cd Library/Application Support/Dell/KACE/bin

3. Perform the following:

• To start the Agent, enter:

./AMPctl start

• To stop the Agent, enter:

./AMPctl stop

To manually remove the Agent1. Open a terminal from Applications > Utilities.

2. Use su or sudo:

SystemStarter stop AMPAgent rm -rf /Library/Application\ Support/Dell rm -rf /Library/StartupItems/AMPAgent rm -rf /Library/LaunchDaemons/kace.ampagent.bootup.plist

Some commands must be run as root.

Proceed with su or sudo as required.

308 Administrator Guide, Version 5.3

Page 309: Dell KACE K1000 Admin Guide

Manually Deploying AgentsE

pkgutil --forget com.kace.ampagent

The agent is removed.

Other Agent operationsThis section describes the various tasks you can perform to manage the Agent using a terminal.

To check that the Agent is running1. Open a terminal from Applications > Utilities.

2. Enter the following command:

ps aux | grep AMPAgent

This output indicates that the process is running:

root 2159 0.0 1.1 94408 12044 p2 S 3:26PM 0:10.94 /Library/Application Support/Dell/KACE/AMPAgent

To check the version of the Agent1. Open a terminal from Applications > Utilities.

2. Enter:

cat /Library/Application\ Support/Dell/KACE/data/version

The version number is reported.

To run an Inventory check1. Open a terminal from Applications > Utilities.

2. Go to the following folder:

cd /Library/Application\ Support/Dell/KACE/bin/

3. To run an inventory and send to the K1000:

sudo ./runkbot 2 0

4. To manually run an inventory:

sudo ./inventory

5. To save the inventory results to a local file:

sudo ./inventory > computer_name.txt

This command saves the inventory results to a file named computer_name.txt, where computer_name is the computer name that you specified.

Macintosh Debugging1. Open a terminal from Applications > Utilities.

Administrator Guide, Version 5.3 309

Page 310: Dell KACE K1000 Admin Guide

E Manually Deploying Agents

2. Go to the following folder:

cd Library/Application Support/Dell/KACE/bin

3. Stop the Agent:

./AMPctl stop

4. Add the following line to the end of the amp.conf file in /Library/Application\ Support/Dell/KACE/data:

debug=true

5. Start the Agent:

./AMPctl start

The output is recorded in various K1000 Agent logs.

Using shell scripts to install the AgentThe K1000 Management Appliance provides options that are useful when using shells scripts to install the Agent:

1. hdiutil attach ./ampagent-5.3.12345-all.dmg

2. sudo sh -c 'KACE_SERVER=k1000name installer -pkg /Volumes/Dell_KACE/AMPAgent.pkg -target /'

3. hdiutil detach '/Volumes/Dell KACE'

The ordering of setting the host is as follows:

1. If the installer contains the name of host, use that.

2. If KACE_SERVER is set, use that.

3. If amp.conf has a server, use that.

4. If smmp.conf has a server, use that (when updating from 5.1).

Do not leave empty. Do not set to kbox. Otherwise, the agent will NOT connect to the server.

For information about using shell scripts and command lines, see http://developer.apple.com.

Information collected by the AgentThe Computers : Detail Item page displays the information collected by the Agent.

The Agent normally checks in using the “Run Interval” schedule specified in K1000 Agent Settings page. However, you can force a check in outside the normal schedule by going to /Library/Application Support/Dell/KACE/bin/ and running: runkbot 2 0

The export call must proceed the install call (for example, sudo export KACE_SERVER=k1000name installer -pkg '/Volumes/Dell KACE/AMPAgent.pkg' -target /

310 Administrator Guide, Version 5.3

Page 311: Dell KACE K1000 Admin Guide

Manually Deploying AgentsE

To access the Computers : Detail page1. Go to Inventory > Computers.

The Computer Inventory page appears.

2. Select a computer to view.

The Computers : Detail Item page appears.

The following table describes each of the detail areas on this page. To expand the sections, select Expand All.

The fields that are displayed depend on the type of computer and its operating system.

Item Description

Summary

Name Name of the computer.

Model Computer model.

Chassis Type Type of computer, such as desktop or laptop.

IP Address IP address of the computer.

MAC Media Access Control address number.

RAM Total Amount of Random-access memory.

Processors Number of CPUs and type.

OS Name Type of operating system, such as Windows, Macintosh, or Linux.

Service Pack Service Pack version number (Windows only).

Agent Version K1000 Agent version number.

User Name Name of most recent user. (Some computers might have multiple users).

AMP Connection Time of last connection to the K1000 Agent.

Last Inventory Time of latest inventory.

Record Created Time that the inventory record was created.

Disk Number of disk drives, type and size of the file system, and amount of disk space used.

Inventory Information

Hardware

RAM Total Total amount of RAM.

Ram Used How much RAM is used.

Manufacturer Computer manufacturer.

Model Computer model.

Administrator Guide, Version 5.3 311

Page 312: Dell KACE K1000 Admin Guide

E Manually Deploying Agents

Domain Name of domain.

Motherboard Main and peripheral buses.

Processors CPU count, type, and manufacturer.

CD/DVD Drives Configuration of drives installed on the computer.

Sound Devices Installed audio devices.

Video Controllers Installed video controllers

Monitor Type and manufacturer of the monitor.

BIOS Name BIOS version.

BIOS Version BIOS version.

BIOS Manufacturer BIOS Manufacturer.

BIOS Description BIOS Description.

BIOS Serial Number BIOS serial number.

Disk Number of disk drives, type and size of file system, and amount of disk space used.

Printers The printers that the computer is configured to use.

Network Interfaces Type of network interface, IP Address, MAC address, and whether DHCP is enabled or disabled.

K1000 Agent

Agent Version Agent Version.

AMP Version Version of Agent Messaging Protocol.

AMP Connected Time of the last connection to the K1000 Agent.

KACE ID KACE ID.

Database ID Database ID.

Last Inventory Time of latest inventory.

Last Sync Time the computer last checked in to the appliance.

Last Agent Update Time when the Agent was updated.

User

User Logged The user currently logged into the computer.

User Name User name.

User Domain The domain that the user belongs to.

Operating System

Name Name of the operating system.

Version Version number of the operating system.

Build Build of the operating system.

Item Description

312 Administrator Guide, Version 5.3

Page 313: Dell KACE K1000 Admin Guide

Manually Deploying AgentsE

Number Build number of the operating system.

Architecture Operating system architecture, such as PPC or x64.

Installed Date Date of operating system installation.

Last System Reboot Last time the operating system was rebooted.

Last System ShutDown Last time the operating system was turned off.

Uptime Since Last Reboot How long the operating system has been up.

System Directory Location of the system directory.

Registry Size Size of the registry.

Registry Max Size Maximum size of the registry.

Notes You can enter any additional information in this field.

Software

Installed Programs List of the software and versions installed on the computer.

Custom Inventory Fields. Lists any Custom Inventory fields created for this machine, along with the field name and value.

Virtual Application Kontainers

List any Virtual Kontainers on the computer. You use Virtual Kontainers to create virtual versions of supported applications, and deploy and run them on the nodes you administer.

Uploaded Files Lists the files that have been uploaded to the K1000 Management Appliance from this computer using the “upload a file” script action.

Installed Patches via Inventory

Installed Microsoft Patches.

Running Processes List of running processes.

Startup Programs List of startup programs.

Services List of services.

Activities

Labels The labels assigned to this computer. Labels are used to organize and categorize inventory and assets.

Failed Managed Installs Lists any failed managed installs. Managed installations allow deploying software that require installation files.

To Install List List of managed installations that will be sent to the computer the next time it connects with the appliance.

Service Desk Tickets Lists any Service Desk Tickets assigned or submitted by any user of the computer.

Security

Patching Detect/Deploy Status

Lists the patches detected and deployed on the computer.

Item Description

Administrator Guide, Version 5.3 313

Page 314: Dell KACE K1000 Admin Guide

E Manually Deploying Agents

Threat Level 5 List Lists any threats that are harmful to any software, process, startup item, or service.

OVAL Vulnerabilities Results of OVAL Vulnerability tests run on this computer.

FDCC/SCAP Configuration Scans

Results of FDCC/SCAP Configuration Scans run on this computer.

Logs

K1000 Agent Logs Contains the logs for the K1000 Agent application. A question mark indicates that its status is unknown.

Portal Install Logs Details about User Portal packages installed on this machine.

Scripting Logs Configuration Policy scripts that have been run on this computer, along with the available status of any scripts in progress.

Asset

Asset Information Lists when the record was created and last modified; the asset type, such as computer; and the name of the asset.

Related Assets Lists any related assets.

Asset History Lists the changes done to the asset of the computer along with the date and time when each change was done.

Item Description

314 Administrator Guide, Version 5.3

Page 315: Dell KACE K1000 Admin Guide

F

Understanding the Daily Run

Output

The daily run output is automatically sent to the System Administrator by email every night at 2:00 AM.

This appendix contains a sample of the daily run output. Your output may differ from the sample shown.

The following syntaxes are the standard freebsd maintenance messages:

• Removing stale files from /var/preserve:

• Cleaning out old system announcements:

• Removing stale files from /var/rwho:

• Backup password and group files:

• Verifying group file syntax:

• Backing up mail aliases:

• Disk status:

Filesystem 1K-blocks Used Avail Capacity Mounted on

/dev/twed0s1a

2026030 36780 1827168 2% /

devfs 1 1 0 100% /dev

/dev/twed0s1f

134105316 1003568 122373324 1% /kbox

/dev/twed0s1e

10154158 6365810 2976016 68% /usr

/dev/twed0s1d

2026030 3858 1860090 0% /var

/dev/twed1s1d

151368706 2722542 136536668 2% /kbackup

Administrator Guide, Version 5.3 315

Page 316: Dell KACE K1000 Admin Guide

F Understanding the Daily Run Output

Network interface status: Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Coll em0 1500 00:30:48:73:07:4c 332146 0 204673 0 0 em0 1500 192.168.2 kboxdev 308055 - 201832 - - em0 1500 fe80:1::230:4 fe80:1::230:48ff: 0 - 4 - - em1* 1500 00:30:48:73:07:4d 0 0 0 0 0 plip0 1500 0 0 0 0 0 lo0 16384 699 0 699 0 0 lo0 16384 your-net localhost 699 - 699 - - lo0 16384 localhost ::1 0 - 0 - - lo0 16384 fe80:4::1 fe80:4::1 0 - 0

The above table reports information about your disks.

Those of interest are /kbox and /kbackup.

/kbox contains all the software for the appliance server. It is also contains the software packages uploaded to the server. If this drive starts getting close to full you must remove old unused packages or contact KACE for an upgrade.

/kbackup is the drive where /kbox is backed up. It is generally as full as the /kbox. If it is close to full, you must remove old unused packages or contact KACE for an upgrade.

316 Administrator Guide, Version 5.3

Page 317: Dell KACE K1000 Admin Guide

Understanding the Daily Run OutputF

- -

Local system status: 3:04PM up 3 days, 4:12, 0 users, load averages: 0.05, 0.20, 0.15

Mail in local queue: /var/spool/mqueue is empty Total requests: 0 Mail in submit queue: /var/spool/clientmqueue is empty Total requests: 0 Security check: (output mailed separately) Checking for rejected mail hosts:

The above table reports information about the network status of the appliance.

Make sure the Ierrs/Oerrs are zero. Other values indicate some sort of network failure. If you notice consistent errors, contact KACE support for assistance.

The above indicates the amount of time the appliance has been up since the last time it was powered off.

There will not be any users logged onto the machine.

The load averages vary depending on the load on appliance was when this report was run.

Administrator Guide, Version 5.3 317

Page 318: Dell KACE K1000 Admin Guide

F Understanding the Daily Run Output

Checking for denied zone transfers (AXFR and IXFR): tar: Removing leading /' from member names

[Thu Mar 17 15:05:31 PST 2005] K1000 Backup: Backup Complete. Backup files available for off-box storage via ftp.

[Thu Mar 17 15:05:31 PST 2005] K1000 RAID Status Disk Array Detail Info not available during a rebuild. If Rebuild in progress,% completion listed below Disk Array Detail Status: Unit UnitType Status %Cmpl Port Stripe Size(GB) Blocks ----------------------------------------------------------------------- u0 RAID-1 OK - - - 149.05 312579760 u0-0 DISK OK - p0 - 149.05 312579760 u0-1 DISK OK - p1 - 149.05 312579760 Disk Array REBUILD Status: /c0/u0 is not rebuilding, its current state is OK

[Thu Mar 17 15:05:31 PST 2005] K1000 Database Maintenance Daily routines to maintain database performance. DB Table Maintenance Log: # Connecting to localhost... # Disconnecting from localhost... ORG.ADVISORY OK ORG.AUTHENTICATION OK ORG.CATEGORY OK ORG.CLIENT_DISTRIBUTION OK ORG.FILTER OK

The messages above are the standard freebsd messages regarding the health of the mail systems.

There should not be mail in the queues. However, if an item still exists, check your SMTP settings from the Settings > Network Settings page.

The above message indicates an appliance-specific message telling you that the backups have been successfully completed and are on the /kbackup disk, available through the ftp interface.

The above table indicates the status of your raid drives. If you ever see the disks degraded or not rebuilding properly, contact KACE support to address the problem.

318 Administrator Guide, Version 5.3

Page 319: Dell KACE K1000 Admin Guide

Understanding the Daily Run OutputF

ORG.FS OK ORG.FS_LABEL_JT OK ORG.GLOBAL_OPTIONS OK ORG.LABEL OK ORG.LDAP_FILTER OK ORG.LICENSE OK ORG.LICENSE_MODE OK ORG.MACHINE OK ORG.MACHINE_CUSTOM_INVENTORY OK ORG.MACHINE_DISKS OK ORG.MACHINE_LABEL_JT OK ORG.MACHINE_NICS OK ORG.MACHINE_PROCESS OK ORG.MACHINE_SOFTWARE_JT OK ORG.MACHINE_STARTUP_PROGRAMS OK ORG.MESSAGE OK ORG.MESSAGE_LABEL_JT OK ORG.MI OK ORG.MI_LABEL_JT OK ORG.NETWORK_SETTINGS OK ORG.NOTIFICATION OK ORG.OPERATING_SYSTEMS OK ORG.PORTAL OK ORG.PORTAL_LABEL_JT OK ORG.PRODUCT_LICENSE OK ORG.REPORT OK ORG.SCHEDULE OK ORG.SERVER_LOG OK ORG.SOFTWARE OK ORG.SOFTWARE_LABEL_JT OK ORG.SOFTWARE_OS_JT OK ORG.THROTTLE OK ORG.TIME_SETTINGS OK ORG.TIME_ZONE OK ORG.USER OK ORG.USER_HISTORY OK ORG.USER_KEYS OK ORG.USER_LABEL_JT OK -- End of daily output --

The database is checked every night for any inconsistencies, and these are automatically repaired.

If you see any failures from this output, contact Dell KACE Support for assistance.

Administrator Guide, Version 5.3 319

Page 320: Dell KACE K1000 Admin Guide

F Understanding the Daily Run Output

320 Administrator Guide, Version 5.3

Page 321: Dell KACE K1000 Admin Guide

G

K1000 Classic Reports

The Dell KACE K1000 Management Appliance 5.3 includes a new reporting engine. See Running the K1000 Appliance Reports on page 221. This appendix contains information on using Reporting from the 5.2 version. These reports are listed under the Classic Reports tab.

• Reporting Overview, on page 321

• Running Reports, on page 322

• Creating and Editing Reports, on page 322

• Scheduling Reports, on page 328

Reporting OverviewThe K1000 Management Appliance is shipped with many stock reports; select Reporting > Reports to view the list. The reporting engine utilizes XML-based report layouts to generate reports in HTML, PDF, CSV, TXT, and XSL formats. By default, the appliance provides reports in the following general categories:

• Compliance

• Dell updates

• Hardware

• Service Desk

• iPhone

• K1000

• Network

• Patching

• Power Management

Administrator Guide, Version 5.3 321

Page 322: Dell KACE K1000 Admin Guide

G K1000 Classic Reports

• Security

• Software

• Template

You can duplicate and modify these reports as necessary. However, a strong knowledge of SQL is required to successfully change a report.

Running ReportsTo run any of the K1000 Management Appliance reports, click the desired format type (HTML, PDF, CSV, XLS, or TXT). For the HTML format, the report is displayed in a new window. If you select PDF, CSV, XLS, or TXT formats, you can open the file or save it to your computer.

Creating and Editing ReportsIf you have other reporting needs not covered by default reports, you can:

• Create a new report from scratch.

• Modify one of the templates provided in the K1000 Management Appliance Template category.

• Duplicate an existing report—another way to create a report is to open an existing report and create a copy of it. You can modify the copy to suit your needs.

• Create a new report using the Report Wizard.

You can create a report using the Table or Chart presentation type:

• The Table presentation type is a tabular report with optional row groupings and summaries.

• The Chart presentation type is a bar, line, or pie chart.

To create a new report using the table presentation type

1. Click Reporting > Reports.

The K1000 Reports page appears.

Opening a CSV file containing multibyte characters with Microsoft Excel may yield "garbage characters" in the resulting worksheet. See Dell KACE Support for instructions on how to import the CSV file into an Excel worksheet.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

322 Administrator Guide, Version 5.3

Page 323: Dell KACE K1000 Admin Guide

K1000 Classic ReportsG

2. In the Choose Action menu, click Add New Report.

3. Enter the report details as shown:

4. Click the appropriate topic name from the Available Topics list. For example, software.

5. Click the Table presentation type icon.

6. Click Next.

7. Choose table columns:

a. Click the Appropriate column name from the Available columns list.

b. Click to add that column to the Display Columns list. You can change the column

order by clicking or .

c. To remove a column from the Display list, click the appropriate column and click .

8. Click Next.

9. To define the criteria for displaying records in the report:

a. Click the appropriate field name from the Available Fields list. Columns that you chose in the previous step appear under display fields. You can also choose a field from among all fields available for that topic. For example, Threat Level.

b. Click Add.

c. Select the appropriate operator from the comparison drop-down list. For example, Greater Than.

d. Enter the appropriate value in the text field, for example, 3.

This rule will filter the data and display only software that has Threat Level greater than 3.

e. Click OK. The rule is added in the list of Current Rules. You can add more than one rule.

f. Click to remove a rule from the list of Current Rules.

g. Select the Use Expanded logic check box to use expanded logic. Expanded logic enables you to define a syntactic structure for your rules to override operator precedence.

h. Click Check Syntax to check whether the rule syntax is valid.

i. Once you add more than one rule, you can click Move Up or Move Down to change the order of rules.

10. Click Next.

Report Title Enter a display name for the report. Make this as descriptive as possible, so you can distinguish this report from others.

Report Category Enter the category for the report. If the category does not already exist, it will be added to the drop-down list on the Reports list page.

Description Describe the information that the report will provide.

Administrator Guide, Version 5.3 323

Page 324: Dell KACE K1000 Admin Guide

G K1000 Classic Reports

11. To choose columns to be displayed in the report:

a. Click the Appropriate column name from the Available columns list.

b. Click to add that column to the Display Columns list. You can change the column

order by clicking or .

c. To remove a column from the Display list, click the appropriate column and click .

12. Click Next.

13. (Optional) Customize the report layout. You can drag to set column order, width and add spacers. You can drag and drop between columns as well as between columns and spacer. Click on the column and report headings for further menu of labels, grouping, summary, and other options.

The available options are:

14. Click Save to save the report.

The K1000 Reports page is displayed with the new report in the list. To run the new report, click the desired format (HTML, PDF, CSV, XLS, or TXT). For the HTML format, the report is displayed in a new window. If you select PDF, CSV, XLS, or TXT formats, you can open the file or save it to your computer.

To create a new report using the chart presentation type

1. Click Reporting > Reports.

The K1000 Reports page appears.

2. In the Choose Action menu, click Add New Report.

3. Enter the report details as shown below:

Title Click the report title to select title and page options.

Spacer Click spacer to add an empty column.

Column Click column to select various column options.

You can jump to steps 1-5 of the Reporting Wizard. Step 1 and Step 2 are mandatory and cannot be left blank.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Report Title Enter a display name for the report. Make this as descriptive as possible, so you can distinguish this report from others.

Report Category

Enter the category for the report. If the category does not already exist, it will be added to the drop-down list on the Reports list page.

Description Describe the information that the report will provide.

324 Administrator Guide, Version 5.3

Page 325: Dell KACE K1000 Admin Guide

K1000 Classic ReportsG

4. Click the appropriate topic name from the Available Topics list. For example, software.

5. Click the Chart presentation type icon.

6. Click Next.

7. To choose table columns:

a. Click the Appropriate column name from the Available columns list.

b. Click to add that column to the Display Columns list. You can change the column

order by clicking or .

c. To remove a column from the Display list, click the appropriate column and click .

8. Click Next.

9. To define the criteria for displaying records in the report:

a. Click the Appropriate field name from the Available Fields list. Columns that you chose in the previous step appear under display fields. You can also choose a field from among all fields available for that topic. For example, Threat Level.

b. Click Add.

c. Select the appropriate operator from the comparison drop-down list. For example, Greater Than.

d. Enter the appropriate value in the text field. For example, 3.

This rule will filter the data and display only software that has Threat Level greater than 3.

e. Click OK. The rule is added in the list of Current Rules. You can add more than one rule.

f. Click to remove a rule from the list of Current Rules.

g. Select the Use Expanded logic check box to use expanded logic. Expanded logic enables you to define a syntactic structure for your rules to override operator precedence.

h. Click Check Syntax to check whether the rule syntax is valid.

i. Once you add more than one rule, you can click Move Up or Move Down to change the order of rules.

10. Click Next.

11. Select the appropriate chart type from the following:

• Simple 3-D Bar: Displays categories along the X-axis, values along the Y-axis.

• 3-D Pie: Displays a slice for each category. The corresponding value determines the size of the slice.

• Line: Displays categories or dates along the X-axis, values along the Y-axis.

12. Select the appropriate category field from the Category Field drop-down list.

Administrator Guide, Version 5.3 325

Page 326: Dell KACE K1000 Admin Guide

G K1000 Classic Reports

13. Select the summary from the Summary drop-down list, beside appropriate Value field name. If you have more than one Value field, you can change the value field order by

clicking or .

14. Select the Show legend check box to display a legend in the chart.

15. Specify the Chart width and Chart height in pixels, in the text fields.

16. Click Save to save the report.

The K1000 Reports page is displayed with the new report in the list.

To duplicate an existing report

The steps for duplicating a regular report and a SQL report are similar. However, regular reports have a report wizard.

1. Click Reporting > Reports.

The K1000 Reports page appears.

2. Click the report title you want to duplicate.

Depending on the type of report, the K1000 Report: Edit Detail page or the Report Wizard page appears.

3. Click Duplicate.

4. Modify the report details as necessary.

5. Click Save.

Refer to Appendix B: Adding Steps to a Script, starting on page 265.

To create a new report from scratch

1. Click Reporting > Reports.

The K1000 Reports page appears.

2. In the Choose Action menu, click Add New SQL Report.

The K1000 Report: Edit Detail page appears.

3. Specify the following report details:

You can jump to steps 1-5 of the Reporting Wizard. Step 1 and Step 2 are mandatory and cannot be left blank.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Title A display name for the report. Make this as descriptive as possible to distinguish this report from others.

326 Administrator Guide, Version 5.3

Page 327: Dell KACE K1000 Admin Guide

K1000 Classic ReportsG

4. Click Save.

To edit a report using SQL Editor

1. Go to Reporting > Reports.

The K1000 Reports page appears.

2. Click the report you want to edit.

The Report Wizard page appears.

3. Click Edit SQL.

4. Click OK to proceed.

The K1000 Report: Edit Detail page appears.

5. Edit the following report details:

Report Category The category for the report. If the category does not already exist, it will be added to the drop-down list on the Reports list page.

Output File Name The name for the file generate when this report is run.

Description Describe the information that the report provides.

Output Types Select the appropriate formats that should be available for this report.

SQL Select Statement

The query statement that will generate the report data. For reference, consult the MYSQL documentation.

Break on Columns A comma-separated list of SQL column names. The report will generate break headers and sub totals for these columns. This setting refers to the auto-generated layout.

XML Report Layout Click this check box to regenerate the XML Report Layout using new columns. If you changed only a sort order or a where clause, you don't need to recreate the layout.If you changed the columns that the query returns, the XML Report Layout is regenerated based on your SQL.

The K1000 Management Appliance reports use JasperReports’ open source JRXML format. Use the JasperReports iReports tool to change the way your reports are formatted. Information and documentation are available at:

http://jasperforge.org/.

Once you click Save, the report wizard is disabled for that report.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Title Edit the display name for the report, if required. Make the title as descriptive as possible to distinguish this report from others.

Report Category Edit or enter the category for the report. If the category does not already exist, it will be added to the drop-down list on the Reports list page.

Administrator Guide, Version 5.3 327

Page 328: Dell KACE K1000 Admin Guide

G K1000 Classic Reports

6. Click Save.

Scheduling ReportsReports can be scheduled from the Schedule Reports tab. From the Report Schedules List page you can open existing schedules, create new schedules, or delete them. You can also search schedules using keywords.

To create a report schedule

1. Click Reporting > Schedule Reports.

The Report Schedules page appears.

2. In the Choose Action menu, click Create a New Schedule.

The Schedule Reports : Edit Detail page appears.

3. Specify the following schedule details:

Output File Name Edit or enter the name for the file generate when this report is run.

Description Describe the information that the report will provide.

Output Types Select the appropriate formats that should be available for this report.

SQL Select Statement

Edit or enter the query statement that will generate the report data. For reference, consult the MYSQL documentation.

Break on Columns A comma-separated list of SQL column names. The report will generate break headers and sub totals for these columns. This setting refers to the auto-generated layout.

XML Report Layout

Click this check box to regenerate the XML Report Layout using new columns. If you changed only a sort order or a where clause, you don't need to recreate the layout.If you changed the columns that the query returns, the XML Report Layout is regenerated based on your SQL.

If you manually change a report’s SQL statement, you cannot use the Report Wizard to change it later.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Schedule Title Enter a display name for the schedule. Make this as descriptive as possible, so you can distinguish this schedule from others.

Description Enter the information that the schedule would provide.

Report to Schedule Select the appropriate report you would like to schedule. You can filter the list by entering any filter options.

328 Administrator Guide, Version 5.3

Page 329: Dell KACE K1000 Admin Guide

K1000 Classic ReportsG

4. Specify the scan schedule as follows:

5. Click Save or Run Now to run the schedule reports immediately.

To run a schedule

1. Click Reporting > Schedule Reports.

The Report Schedules page appears.

2. Click the check boxes for the schedules you want to run.

3. In the Choose Action menu, click Run Selected Schedules Now.

To delete a schedule

1. Click Reporting > Schedule Reports.

Reports Select the Reports or Classic Reports radio button based on the type of report you are scheduling. This determines which of reports are listed in the Select report to schedule drop-down list.

Report Output Formats

Click the desired output report format (PDF, Excel, CSV, or TXT) that should be available for this scheduled report.

Email Notification Recipients Click the icon to enter the recipient’s e-mail address, or choose Select user to add from the drop-down list. This is a mandatory filed.

Subject Enter the subject of the schedule. The subject can help to quickly identify what the schedule is about.

Message Text Enter the message text in the notification.

Don’t Run on a Schedule Run in combination with an event rather than on a specific date or time.

Run Every n hours Run the scan at a specified hour interval.

Run Every day/specific day at hour:minute

Run daily at a specified time.-or-Run on specified day of the week at a specified time.

Run on the nth of every month/specific month at hour:minute

Run monthly at the specified time.-or-Run on a specified day of the month at a specified time.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

To perform these steps, be sure to select your organization from the Organization drop-down list in the top-right hand corner of the page.

Administrator Guide, Version 5.3 329

Page 330: Dell KACE K1000 Admin Guide

G K1000 Classic Reports

The Report Schedules page appears.

2. Click the check box for the schedules you want to delete.

3. In the Choose Action menu, click Delete Selected Item(s).

4. Click Yes to confirm deleting the schedules.

330 Administrator Guide, Version 5.3

Page 331: Dell KACE K1000 Admin Guide

H

Warranty, Licensing, and Support

Warranty And Support InformationInformation concerning hardware and software warranty, hardware replacement, product returns, technical support terms and product licensing can be found in the KACE End User License agreement accessible at:

HTTP://WWW.KACE.COM/LICENSE/STANDARD_EULA

Third Party Software NoticeDell KACE K1000 Management Appliance TM is licensed per the accompanying Third Party License Agreements in addition to the Dell KACE K1000 Management Appliance license noted above. Dell KACE K1000 Management Appliance includes software redistributed under license from the following vendors. In addition, Dell KACE K1000 Management Appliance contains paid licences to MySQL and RLib that have been purchased and embedded within Dell KACE K1000 Management Appliance by KACE. Copyright 2004, KACE Networks, Inc. and other copyrights.

• Apache

• EZ GPO

• FreeBSD

• Knoppix

• Microsoft Windows

• OpenSSL

• PHP

• Samba

• Sendmail

ApacheThis product (Dell KACE K1000 Management Appliance) includes software developed by The Apache Software Foundation (http://www.apache.org/). Apache License Version 2.0, January 2004 http://www.apache.org/licenses/

TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION

Administrator Guide, Version 5.3 331

Page 332: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

1. Definitions. “License” shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. “Licensor” shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. “Legal Entity” shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, “control” means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. “You” (or “Your”) shall mean an individual or Legal Entity exercising permissions granted by this License. “Source” form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. “Object” form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. “Work” shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). “Derivative Works” shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. “Contribution” shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, “submitted” means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as “Not a Contribution.” “Contributor” shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.

2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form.

3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You

332 Administrator Guide, Version 5.3

Page 333: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed.

4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:

a. You must give any other recipients of the Work or Derivative Works a copy of this License; and

b. You must cause any modified files to carry prominent notices stating that You changed the files; and

c. You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and

d. If the Work includes a “NOTICE” text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License.

e. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.

5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.

6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.

7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an “AS IS” BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of

Administrator Guide, Version 5.3 333

Page 334: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.

8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.

9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability.

EZ GPOCopyright (c) 2003-2007, The Environmental Protection Agency.

All of the documentation and software included in the EZ GPO PC Monitor Power Management Tool software is copyrighted by the Environmental Protection Agency.

All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

* Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

* Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

* Neither the name of the Environmental Protection Agency nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE ENVIRONMENTAL PROTECTION AGENCY AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FEDERAL GOVERMENT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR

334 Administrator Guide, Version 5.3

Page 335: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

FreeBSDThis product (Dell KACE K1000 Management Appliance) includes software developed by Free Software Foundation, Inc. GNU GENERAL PUBLIC LICENSE, Version 2, June 1991. Copyright (C) 1989, 1991 Free Software Foundation, Inc.,675 Mass Ave, Cambridge, MA 02139, USA.Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

PreambleThe licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must

Administrator Guide, Version 5.3 335

Page 336: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.

GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

1. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The “Program”, below, refers to any such program or work, and a “work based on the Program” means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term “modification”.) Each licensee is addressed as “you”. Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.

2. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

3. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:

a. You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.

b. You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.

c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do

336 Administrator Guide, Version 5.3

Page 337: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.

In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

4. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:

a. Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

b. Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

c. Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)

The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

5. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

Administrator Guide, Version 5.3 337

Page 338: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

6. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

7. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

8. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.

It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.

This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

9. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

10. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and “any later version”, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version

338 Administrator Guide, Version 5.3

Page 339: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

number of this License, you may choose any version ever published by the Free Software Foundation.

11. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

12. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS

KnoppixThis product (Dell KACE K1000 Management Appliance) includes the Knoppix software developed by Klaus Knopper. Knoppix is a registered trademark of Klaus Knopper. The KNOPPIX software collection and all included programs that are authored by Klaus Knopper, are subject to the terms and conditions of the GNU GENERAL PUBLIC LICENSE Version 2, as quoted herein.

Please note that this license does NOT automatically apply to third-party programs included on this CD. Check /usr/share/doc/*/copyright* and other supplied license files of each software package carefully for more information.

GNU GENERAL PUBLIC LICENSE Version 2, June 1991 Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is

Administrator Guide, Version 5.3 339

Page 340: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow.

GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION.

0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you". Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.

1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program. You may

340 Administrator Guide, Version 5.3

Page 341: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change. b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License. c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.) These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it. Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program. In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following: a) Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, b) Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or, c) Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)

The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the

Administrator Guide, Version 5.3 341

Page 342: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

executable. If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program. If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances. It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice. This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the

342 Administrator Guide, Version 5.3

Page 343: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

present version, but may differ in detail to address new problems or concerns. Each version is given a distinguishing version number.

If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.

10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY 1. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO

WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION. 12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. END OF TERMS AND CONDITIONS How to Apply These Terms to Your New Programs If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms. To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively convey the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found. <one line to give the program's name and a brief idea of what it does.> Copyright (C) <year> <name of author> This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 59 Temple Place, Suite

Administrator Guide, Version 5.3 343

Page 344: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

330, Boston, MA 02111-1307 USA Also add information on how to contact you by electronic and paper mail. If the program is interactive, make it output a short notice like this when it starts in an interactive mode: Gnomovision version 69, Copyright (C) year name of author Gnomovision comes with ABSOLUTELY NO WARRANTY; for details type `show w'. This is free software, and you are welcome to redistribute it under certain conditions; type `show c' for details. The hypothetical commands `show w' and `show c' should show the appropriate parts of the General Public License. Of course, the commands you use may be called something other than `show w' and `show c'; they could even be mouse-clicks or menu items--whatever suits your program. You should also get your employer (if you work as a programmer) or your school, if any, to sign a "copyright disclaimer" for the program, if necessary. Here is a sample; alter the names: Yoyodyne, Inc., hereby disclaims all copyright interest in the program `Gnomovision' (which makes passes at compilers) written by James Hacker. <signature of Ty Coon>, 1 April 1989 Ty Coon, President of Vice This General Public License does not permit incorporating your program into proprietary programs.

If your program is a subroutine library, you may consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Library General Public License instead of this License.

Microsoft WindowsThis Product is designed for use in supporting the deployment of the following operating systems: Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows 98 Second Edition, Microsoft Windows Millennium Edition, Microsoft Windows NT Workstation 4 Service Pack 5 or later, Microsoft Windows NT Server 4 Service Pack 5 or later, Microsoft Windows 2000 Professional, Microsoft Windows 2000 Server (Standard, Advanced and Datacenter Editions), Microsoft Windows XP Professional, Microsoft Windows XP Tablet PC Edition, Microsoft Windows XP Media Center Edition, or Microsoft Windows Server 2003 (Web, Standard, Enterprise and Datacenter Editions). This Product is designed for use on processor architectures supported by the operating system that the Product was built from: e.g., the x86 32-bit version may only deploy X86 32-bit Microsoft operating systems, the Intel Itanium version may only deploy versions of Microsoft Windows designed for this architecture, and the 64-bit extended version may only deploy versions of Microsoft Windows designed for this architecture. The Product may not function properly with other operating system products or other processor architectures.

OpenSSLThe OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact [email protected].

OpenSSL LicenseCopyright (c) 1998-2005 The OpenSSL Project. All rights reserved.

344 Administrator Guide, Version 5.3

Page 345: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgment:

"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/)"

4. The names "OpenSSL Toolkit" and "OpenSSL Project" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected].

5. Products derived from this software may not be called "OpenSSL" nor may "OpenSSL" appear in their names without prior written permission of the OpenSSL Project.

6. Redistributions of any form whatsoever must retain the following acknowledgment:

"This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)".

THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This product includes cryptographic software written by Eric Young ([email protected]). This product includes software written by Tim Hudson ([email protected]).

Original SSLeay LicenseCopyright (C) 1995-1998 Eric Young ([email protected]) All rights reserved.

This package is an SSL implementation written by Eric Young ([email protected]). The implementation was written so as to conform with Netscapes SSL.

This library is free for commercial and non-commercial use as long as the following conditions are aheared to. The following conditions apply to all code found in this distribution, be it the RC4, RSA, lhash, DES, etc., code; not just the SSL code. The SSL

Administrator Guide, Version 5.3 345

Page 346: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson ([email protected]).

Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed.

If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. All advertising materials mentioning features or use of this software must display the following acknowledgement:

"This product includes cryptographic software written by Eric Young ([email protected])". The word 'cryptographic' can be left out if the rouines from the library being used are not cryptographic related :-).

4. If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement:

"This product includes software written by Tim Hudson ([email protected])".

THIS SOFTWARE IS PROVIDED BY ERIC YOUNG ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The licence and distribution terms for any publically available version or derivative of this code cannot be changed, i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]

PHPThis product (Dell KACE K1000 Management Appliance) includes software developed by The PHP Group. The PHP License, version 3.0. Copyright (c) 1999 - 2004 The PHP Group. All rights reserved.

346 Administrator Guide, Version 5.3

Page 347: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

3. The name “PHP” must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact [email protected].

4. Products derived from this software may not be called “PHP”, nor may “PHP” appear in their name, without prior written permission from [email protected]. You may indicate that your software works in conjunction with PHP by saying “Foo for PHP” instead of calling it “PHP Foo” or “phpfoo”.

5. The PHP Group may publish revised and/or new versions of the license from time to time. Each version will be given a distinguishing version number. Once covered code has been published under a particular version of the license, you may always continue to use it under the terms of that version. You may also choose to use such covered code under the terms of any subsequent version of the license published by the PHP Group. No one other than the PHP Group has the right to modify the terms applicable to covered code created under this License.

6. Redistributions of any form whatsoever must retain the following acknowledgment: “This product includes PHP, freely available from <http://www.php.net/>”. THIS SOFTWARE IS PROVIDED BY THE PHP DEVELOPMENT TEAM ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE PHP DEVELOPMENT TEAM OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

This software consists of voluntary contributions made by many individuals on behalf of the PHP Group. The PHP Group can be contacted via Email at [email protected]. For more information on the PHP Group and the PHP project, please see <http://www.php.net>. This product includes the Zend Engine, freely available at <http://www.zend.com>.

Samba GNU GENERAL PUBLIC LICENSE

Version 2, June 1991

Copyright (C) 1989, 1991 Free Software Foundation, Inc. 675 Mass Ave, Cambridge, MA 02139, USA

Administrator Guide, Version 5.3 347

Page 348: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble

The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.

For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.

Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we

want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.

Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.

The precise terms and conditions for copying, distribution and modification follow.

GNU GENERAL PUBLIC LICENSE

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION

348 Administrator Guide, Version 5.3

Page 349: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The "Program", below, refers to any such program or work, and a "work based on the Program" means either the Program or any derivative work under copyright law:

that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term "modification".) Each licensee is addressed as "you".

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.

1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:

a. You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.

b. You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof, to be licensed as a whole at no charge to all third parties under the terms of this License.

c. If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the Program is not required to print an announcement.)

These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in

themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part regardless of who wrote it.

Administrator Guide, Version 5.3 349

Page 350: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the right to control the distribution of derivative or collective works based on the Program.

In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of a storage or distribution medium does not bring the other work under the scope of this License.

3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections 1 and 2 above provided that you also do one of the following:

a. Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

b. Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections 1 and 2 above on a medium customarily used for software interchange; or,

c. Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection b above.)

The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable.

If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along with the object code.

4. You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.

5. You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it.

350 Administrator Guide, Version 5.3

Page 351: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

6. Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients' exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.

7. If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License would be to refrain entirely from distribution of the Program.

If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and the section as a whole is intended to apply in other circumstances.

It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims; this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices. Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice.

This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.

8. If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the body of this License.

9. The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.

Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and "any later version", you have the option of following the terms and conditions either of that version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software Foundation.

10. If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make exceptions for this. Our decision will be

Administrator Guide, Version 5.3 351

Page 352: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

guided by the two goals of preserving the free status of all derivatives of our free software and of promoting the sharing and reuse of software generally.

NO WARRANTY

11. BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.

12. IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

END OF TERMS AND CONDITIONS

SendmailThis product (Dell KACE K1000 Management Appliance) includes software developed by Sendmail, Inc.

SENDMAIL LICENSE

The following license terms and conditions apply, unless a different license is obtained from Sendmail, Inc., 6425 Christie Ave, Fourth Floor, Emeryville, CA 94608, USA, or by electronic mail at [email protected].

License Terms:

Use, Modification and Redistribution (including distribution of any modified or derived work) in source and binary forms is permitted only if each of the following conditions is met:

1. Redistributions qualify as “freeware” or “Open Source Software” under one of the following terms:

a. Redistributions are made at no charge beyond the reasonable cost of materials and delivery.

b. Redistributions are accompanied by a copy of the Source Code or by an irrevocable offer to provide a copy of the Source Code for up to three years at the cost of materials and delivery. Such redistributions must allow further use, modification, and redistribution of the Source Code under substantially the same terms as this

352 Administrator Guide, Version 5.3

Page 353: Dell KACE K1000 Admin Guide

Warranty, Licensing, and SupportH

license. For the purposes of redistribution “Source Code” means the complete compilable and linkable source code of sendmail including all modifications.

2. Redistributions of source code must retain the copyright notices as they appear in each source code file, these license terms, and the disclaimer/limitation of liability set forth as paragraph 6 below.

3. Redistributions in binary form must reproduce the Copyright Notice, these license terms, and the disclaimer/limitation of liability set forth as paragraph 6 below, in the documentation and/or other materials provided with the distribution. For the purposes of binary distribution the “Copyright Notice” refers to the following language: “Copyright (c) 1998-2003 Sendmail, Inc. All rights reserved.”

4. Neither the name of Sendmail, Inc. nor the University of California nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission. The name “sendmail” is a trademark of Sendmail, Inc.

5. All redistributions must comply with the conditions imposed by the University of California on certain embedded code, whose copyright notice and conditions for redistribution are as follows:

a. Copyright (c) 1988, 1993 The Regents of the University of California. All rights reserved.

b. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: (i) Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. (ii) Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. (iii) Neither the name of the University nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

6. Disclaimer/Limitation of Liability: THIS SOFTWARE IS PROVIDED BY SENDMAIL, INC. AND CONTRIBUTORS “AS IS” AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL SENDMAIL, INC., THE REGENTS OF THE UNIVERSITY OF CALIFORNIA OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.

Administrator Guide, Version 5.3 353

Page 354: Dell KACE K1000 Admin Guide

H Warranty, Licensing, and Support

354 Administrator Guide, Version 5.3

Page 355: Dell KACE K1000 Admin Guide

Index

Aactive directory settings 192adding

software to inventory 92Administering 259administering Mac OS nodes 259administration

applying the server update 201backing up data 196disk logs, understanding 206k1000_dbdata.gz file 196k1000_file.tgz file 196logs, accessing 203restarting your appliance 202restoring appliance settings 198restoring factory settings 199restoring most recent backup 198troubleshooting 203troubleshooting your appliance 203updating appliance software 199updating OVAL definitions 202updating the license key 200upgrading server software 196verifying minimum server version 199

advanced searchusing for computer inventory 85

advanced search for software 91agent running confirmation 309agents

about 16operating system requirements 66

alert messages to usersusing 233

alert summarydescription 30

alertsAMP connection required for 233broadcast 233email 234email, creating 234license compliance 39with scripts 167

alternate download location 128AMP connection

about 80AMP Message Queue 80AMP message queue 80Apache software copyright 331AppDeploy

viewing live content 106AppDeploy Live 106

enabling for your appliance 106appliance administration

overview 195appliance agent logs 89appliance revision level 30applying the server update 201Auto Provisioning 69

Bbacking up appliance data 196backup files

downloading 197backups

manual 196bandwidth, replication

replicationbandwidth 151

Cclient bundle 78clients

check-in rate monitor 25connection meter 27

Clients Connected Meter 27command line deployment

Linux agent 305Mac OS agent 308Windows agent 302, 303

componentsfinding 30

compression mode 9 138computer detail page 87computer details

appliance agent logs 89viewing by label 55

computer inventory detail page 87computer notifications 86computers 86

adding to inventory 89inventory 83searching for in inventory 85statistics 29

configurationKACE K1200 35policies 178

configuration policesabout 178

configuration settings 35configuring Dell OpenManage catalog updates 158creating an LDAP label with the browser 211creating computer notifications 86creating IP scans 120Custom Data Fields 94Custom Inventory ID (rule) 273

DDaily Run Output 315data retention 39database tables 295debugging logs

Mac OS 309Default Role 245Delete a configuration 74Dell Open Manage, with Dell Updates tab 155Dell Updates

configuring the OpenManage catalog 158patching, compared 156replication 151using to maintain your Dell systems 155workflow 156

deploymentscompared with updates 156

desktop settingsdesktop shortcuts wizard 181

desktopssettings enforcement 180

Administrator Guide, Version 5.3 355

Page 356: Dell KACE K1000 Admin Guide

Index

wallpaper 180desktops, remote

troubleshooting 180detection

inventory term used instead 156Digital Asset 95disabling KACE K1000 links 51disk logs

understanding 206Distribution

Distributing Packages from the appliance 127Distributing Packages through an Alternate Location 128Types of Distribution Packages 126

distributions monitor 25download location, alternate 128downloading backup files 197Duplicate a configuration 74

EE-mail Alerts 234enabling KACE K1000 appliances for

switching between KACE K1000 consoles 51environmental policies

Mac OS 190Windows 188

Event Log Reporter 181exporting appliance resources 111exporting resources to other organizations 116EZ GPO copyright 334

Ffile synchronizations 143

creating 143filters

computers by organizational unit 87data filters 249organization filter 253testing 253

for computer inventory 86FreeBSD copyright 335FTP

making backups writable 44

Ggetting started 15

Hhardware

inventory, creating 83hardware specifications for KACE K1000 16Home component 23

Iimporting KACE K1000 resources 111inventory

advanced search 85agent logs 89computer notifications 86computers 84computers detail page 87

computers, adding 89computers, searching for 85creating smart labels 86detection term used instead 156overview 83, 84service 102software, managing 91startup programs 100

inventory tabusing 83

IP addressesscanning for 119

IP scan 119creating 120overview 119scheduling 119

IP scan inventoryin the IP Scan chapter 84

IP Scan Smart Label 123

KK1000

software deployment components 17K1000 Agent Update

Update K1000 Agent Automatically 79KACE K1000

components 15configuration settings 35hardware specifications 16installing 15server, setting up 18setting up 15

KACE K1000 appliance linkingabout 49configuring 49

KACE K1000 applianceslinking 50

KACE K1000 Modules 21KACE K1200

configuration 35KNOPPIX copyright 339KScripts

about 162

LLabel Groups 59Labels 105

Label Groups 59labels 53Labels tab

overview 32, 53LDAP

labels 32, 53labels, creating with the browser 211

LDAP Browser Wizard 214LDAP Easy Search 213LDAP Filters 209licence compliance

configuring alerts 39License Compliance 26License Compliance Gauge 39linking KACE K1000 appliances 50

356 Administrator Guide, Version 5.3

Page 357: Dell KACE K1000 Admin Guide

Index

disabling links 51enabling 50, 51

Linuxmanual deployment of KACE K1000 appliance agent on 305

log filesscript 177

Login Script 301logs

agent logs 89

MMac OS 259

administering 259distribution tab differences 260examples of common deployments on 260inventory tab differences 259managed installation for 260patching tab differences 263policies 189power management 190supported OSs 259supported releases 66VNC Settings for 192

Mac OS nodes 308, 309checking into active directory 193debugging logs 309manual agent version check 309manual inventory check 309manually removing agent 308verifying agent 309

Mac OS policiesenforce active directory settings 192

Mac OS UsersDistribution 260Inventory 259Patching 263

Macintosh 259manual deployment of KACE K1000 appliance agent on 308

make FTP writable 44managed installation 129managed installations

EXE example 137Linux examples 139Mac OS nodes 260Macintosh examples 143MSI Example 134parameters 129standard RPM Example 139standard TAR.GZ Example 142Windows platform 130ZIP example 137

Managed Operating Systems 27managing your MIA inventory 104managing your processes inventory 97managing your service inventory 102managing your software inventory 91managing your startup program inventory 100manual backups 196manual deployment

Linux Agent 305

Mac OS agent 308Windows agent 302, 303

Manual Deployment of KACE K1000 appliance agent 301

MIAinventory 104

MIA Computers 104MIA Settings 104Microsoft Windows copyright 344MSI Installer policy 182

Nnetwork scan summary

description 30Network Settings 40, 42Network Utilities 52nodes

check-in rate 25

OOffline KScripts 162Online KScripts 162

alerting users with 167online shell scripts

about 163Open Manager

Dell maintenance 155OpenSSL copyright 344operating system requirements 66Organization File Shares 45organization filter 253Organizational Components 17Organizational Filters 248

LDAP Filter 249organizational filters

data filters 249Organizational Management 237

upgrading KACE K1000 software with 31Organizational Roles 245Organizations 237organizations

transferring KACE K1000 resources between 115OVAL

information (description of field) 30

Ppackages

enabled and disabled 29patch agent 78patching

Dell Updates, compared 156replicating language patches 151replicating OS patches 151updating patch definitions from KACE 201

path bulletin informationdescription 30

PHP copyright 346policies

configuration 178Mac OS-based 189Windows-based, using 179

Port 443 45

Administrator Guide, Version 5.3 357

Page 358: Dell KACE K1000 Admin Guide

Index

Port 80 45Power Management

windows 188Windows configuration 189

power managementMac OS 190retaining information about 39

processesinventory, about 97

Provisioning Results 75provisioning results page 75

RRedirecting computer(s) 254Refiltering computer(s) 253registry settings

Windows, for 179remote desktops

behavior 180replication

copying schedulesreplication schedules

importing 152Dell Updates 151language patches 151OS patches 151scheduling 151stopping 152

replication schedule 151replication share 148

details 152procedure to create 149

replication sharesdeleting 152

Report Wizardlimitations 328

reports 221, 321creating a new SQL report 228creating and running 223creating using Report Wizard 225define email notifications 231delete a scheduled reports 233duplicating an existing report 229editing an existing report 229format types 222layout 223overview 221, 321running 221, 222, 321, 322schedule time report runs 232scheduling 229select a report if starting from the Schedule icon 230select a report if starting from the Schedule Reports tab 230SQL, editing 328

resourcesexporting 116transferring 111

restoring appliance settings 198revision of KACE K1000 software 30Run As feature 167run as Wizards 179Run Now function 174

Run Now tabusing to run scripts 175

running classic reports 321running reports 221

SSamba copyright 347SAMBA share

using to transfer resources between KACE K1000 appliances 111

scanning networks for IP addresses 119scheduling IP scans 119scripting

adding steps to 265tasks you can automate 162

scripting componentSearch Logs 177

scripting moduleoverview 161

scriptsadding 166adding steps to 265alerts with 167duplicating 174editing 172importing 173log files 177online shell scripts 163reusing 174Run Now function 174running as local admin 167running as user 167running immediately 174token replacement variables 165Windows registry settings 179Windows-based policy Wizards 179

searching for computers in your inventory 85searching for using computer notifications 86Security Settings 44Sendmail copyright 352servers

tasks in progress 28service

inventory, managing 102Service Desk

overview 16session timeout

about 36resetting 36

setting up your KACE K1000 series 15setting up your KACE K1000 server 18shell scripts 163single sign-on 51

configuring 49enabling 50, 51

Smart Labelscreating 60, 61editing 61IP Scan 123ordering 62

smart labels 53, 86software

358 Administrator Guide, Version 5.3

Page 359: Dell KACE K1000 Admin Guide

Index

inventory, creating 83statistics 29un-installer 186

Software Asset 94Software Deployment Components 17software deployment components 17software distribution summary 29software inventory 91software revision level 30Software Threat Level 26software threat level graph 26SQL

editing 328SSL Certificate File 45SSL Certificate Wizard 45start and stop the agent 308Startup 100startup

inventory, managing 100statistics, computer 29statistics, software 29Steps for Task sections 265support information

AppDeploy 106synchronizations, file 143System Admin Console Users 243system console 16System requirements 66

TTasks In Progress 28time limit on open inactive user sessions 36token replacement

variables 165transferring appliance resources between

organizations 115transferring resources

about 111transferring resources between KACE K1000

appliances 111troubleshooting

remote desktops 180Wake-on-LAN 147

Troubleshooting Tools 51troubleshooting your appliance 203types of reports 221, 321

UUltraVNC Wizard 184Unpacking the Appliance 18updates

compared with deployments 156Dell Updates and patching 156

updating OVAL definitions 202updating the license key 200upgrades, KACE K1000 31upgrading your appliance 196uploading files to restore settings 198uploading large FTP files

troubleshooting 44user alert messages

about 233

User Authentication 215users

time limit on sessions 36utility rebates

Mac OS 190Windows 188

Vverifying minimum server version 199viewing computer details by label 55VNC

controlling on Mac OS X 192VNC settings

Mac OS policies 192

WWake-on-LAN

overview 146request, issuing 146scheduling requests 147troubleshooting 147

wallpapercontrolling 180

warranty Information 331Windows

Automatic Update Settings 186configuring Power Management 189manual deployment of KACE K1000 appliance agent on 302, 303Power Management 188

Windows Debugging 204Windows operating system requirements 66Windows policies 179

enforce registry settings 179WinZip

compression levels 138

Administrator Guide, Version 5.3 359

Page 360: Dell KACE K1000 Admin Guide

Index

360 Administrator Guide, Version 5.3