Information Technology Reference
In-Depth Information
■
Enable Windows event log settings
Several Asset Intelligence reports rely on infor-
mation that Windows security event logs gather on client computers. To support these
reports, you must modify the event log settings for Windows security on clients so that
it logs all Success logon events. These reports include the following:
■
Hardware 03A - Primary computer users
■
Hardware 03B - Computers for a specific primary console user
■
Hardware 04A - Computers with multiple users (shared)
■
Hardware 05A - Console users on a specific computer
■
Import software license information
Use the Import Software Licenses Wizard to
import Microsoft Volume License Statements and General License Statements from
non-Microsoft vendors into the Asset Intelligence catalog.
■
Install an Asset Intelligence synchronization point
The site system role for the
Asset Intelligence synchronization point connects to System Center Online to down-
load and synchronize Asset Intelligence catalog information. You must install this role
on a site system in the central administration site for hierarchy configurations. This
requires Internet access by using Transmission Control Protocol (TCP) port 443. You can
configure a synchronization schedule, which by default is set to run every seven days.
■
Configure Asset Intelligence maintenance tasks
By default, this Asset Intelligence
feature uses two maintenance tasks:
■
Check Application Title With Inventory Information
Checks that the software
title the software inventory reports reconciles with the software title in the Asset
Intelligence catalog.
■
Summarize Installed Software Data
Provides information that appears in the
Inventoried Software node. This task is available only on primary sites.
■
Configure Asset Intelligence Security
You can use the Asset Manager security role
to provide the required permissions to manage the Asset Intelligence synchronization
point and modify the Asset Intelligence reporting classes and permissions related to
software inventory, hardware inventory, and software metering.
Software metering enables you to monitor program usage on Configuration Manager client
computers. You can summarize software-metering data to produce useful reports that can
help you plan for your organization's software purchases.
Software metering can collect the following information:
Program usage information
Includes start time, end time, meter data ID, resource
ID, user name, users of Terminal Services sessions, and whether Terminal Services is
running
■
File information
Includes file ID, file name, file version, file description, and file size
(in KB)
■