Information Technology Reference
In-Depth Information
Enable Windows event log settings Several Asset Intelligence reports rely on infor-
mation that Windows security event logs gather on client computers. To support these
reports, you must modify the event log settings for Windows security on clients so that
it logs all Success logon events. These reports include the following:
Hardware 03A - Primary computer users
Hardware 03B - Computers for a specific primary console user
Hardware 04A - Computers with multiple users (shared)
Hardware 05A - Console users on a specific computer
Import software license information Use the Import Software Licenses Wizard to
import Microsoft Volume License Statements and General License Statements from
non-Microsoft vendors into the Asset Intelligence catalog.
Install an Asset Intelligence synchronization point The site system role for the
Asset Intelligence synchronization point connects to System Center Online to down-
load and synchronize Asset Intelligence catalog information. You must install this role
on a site system in the central administration site for hierarchy configurations. This
requires Internet access by using Transmission Control Protocol (TCP) port 443. You can
configure a synchronization schedule, which by default is set to run every seven days.
Configure Asset Intelligence maintenance tasks
By default, this Asset Intelligence
feature uses two maintenance tasks:
Check Application Title With Inventory Information Checks that the software
title the software inventory reports reconciles with the software title in the Asset
Intelligence catalog.
Summarize Installed Software Data Provides information that appears in the
Inventoried Software node. This task is available only on primary sites.
Configure Asset Intelligence Security You can use the Asset Manager security role
to provide the required permissions to manage the Asset Intelligence synchronization
point and modify the Asset Intelligence reporting classes and permissions related to
software inventory, hardware inventory, and software metering.
Software metering
Software metering enables you to monitor program usage on Configuration Manager client
computers. You can summarize software-metering data to produce useful reports that can
help you plan for your organization's software purchases.
Software metering can collect the following information:
Program usage information Includes start time, end time, meter data ID, resource
ID, user name, users of Terminal Services sessions, and whether Terminal Services is
running
File information Includes file ID, file name, file version, file description, and file size
(in KB)
 
 
Search WWH ::




Custom Search