Information Technology Reference
In-Depth Information
After agents collect hardware or software inventory information from Configuration
Manager client computers, you can view the results by using either Resource Explorer or
inventory reports. You also can obtain results by creating custom queries from within the
Configuration Manager console.
You can use Resource Explorer to display inventory information for one client at a time. To
start Resource Explorer, you must complete the following procedure:
1. From the Configuration Manager console, click the Assets And Compliance workspace.
2. Click the Devices node. Note that you also can click Device Collections, right-click a
device collection that contains the client device that you want to view, and then click
Show Members.
3. In the list view, right-click a client device, point to Start, and then click Resource
Explorer.
You also can use the reporting feature to view various types of reports pertaining to hard-
ware and software inventory. To access reports, complete the following procedure:
1. In the Configuration Manager console, click the Monitoring workspace.
2. Expand the Reporting node and then click and expand the Reports node. Notice that
reports are organized into category-based folders, enabling you to locate common
reports quickly.
You also can access reporting by using Internet Explorer to open the Report Manager URL.
By default, the URL for the Report Manager is http://servername/Reports .
If you configure management points to use HTTPS for client communication, all data trans-
mitted to the server is protected using Secure Sockets Layer (SSL). However, you can opt to
use HTTP to communicate with management points within your internal network. In this case,
HTTP sends client inventory data and collected files unencrypted and unsigned. As a result,
your organization would be exposed to threats such as someone intentionally sending invalid
data or excessively large data as a form of denial-of-service attack. In addition, because the
data is unencrypted, it is possible for someone to capture and read the collected inventory in
transit. As a best practice, consider implementing security measures to protect the inventory
process and data communication by using the following methods:
Enable Signing And Encryption To provide more secure communication between
client computers and the site, you can configure several signing and encryption
options, including:
Require Signing This option ensures that all data that is sent from the client to
the management point is signed.
Require Secure Hash Algorithm 256 (SHA-256) This option ensures that when
a client is communicating by using HTTP, the communication uses the SHA-256 hash
algorithm to sign the data. Note that only System Center 2012 Configuration
Manager client and newer Configuration Manager versions support SHA-256.
 
Search WWH ::




Custom Search