Loading
{{ $GlobalService.$LoaderService.loadMsg }}

Please log in to view this menu.

Your Alerts ({{ $GlobalService.$FeedService.itemLists['userAlerts'].length }})

{{ alertItem.created_date | date:'medium' }}

Welcome, {{ $GlobalService.$UserService.userData.fname }} {{ $GlobalService.$UserService.userData.lname }}

You are not logged in

LabTech TV

Client Health Report Support Webinar

+

Tags:

  1. hard drives29:59, 30:03, 30:54
  2. operating systems18:05
  3. Joseph Smith20:57, 21:06, 21:13
  4. pre configured8:42
  5. virus scanner10:42, 11:17
  6. Knowledge Base articles36:08
  7. CPU usage16:39, 16:59, 17:03
  8. tech software16:13
  9. support channels23:46
  10. individual system22:17
+

Automatically Generated Transcript (may not be 100% accurate)

Hello and welcome to this week's support webinar. In this week's webinar we are focusing on the Client Health Report. Before we get started I want to make sure that everyone is comfortable with their virtual environments. In the navigation control window of the webinar you have the ability to ask questions. We will silence all communications during the webinar and use the questions window for primary interaction with the audience. We will conduct an overview then move into a demonstration followed by our live Q&A session. It is recommended to send in your questions as soon as you have them. Thanks for joining and let's get started. I would like to introduce our speaker for this weeks webinar, Bill Hennessey. Hello my name is bill Hennessey. And welcome to lab tech support webinar on the client health report. In this webinar we're gonna talk about how to update the current health -- Scripps. Will take a look at the health report overview. And we'll take a look at how the scores are compiled. Before we begin need to make sure the we have the right server control Centre version. In order to update to current script -- -- have version fifty point 170 install. You can find -- at support dot lab -- software dot com. Or I actually found mine on my RSS feed. In order to acquire the new. Daily health -- scripts and health reports will need to get them from the lab tech marketplace. To go to the marketplace you'll need to make sure that you're on your control center server. And go -- the tools. And lab tech marketplace. -- and it opens. So from here. Who wants you scroll down and highlight. Scripps. And look for. Now this is going -- -- to download other scripts that go along with that just go ahead and say yes. And you'll see them popularly down here. So now ready to update these scripts but we also need to make sure that we update. The results -- going to look a little bit different. So we'll go to. -- We need to walk grabbed. Each one of the -- to make sure we have all the updated Scripps. At our disposal. -- and you'll see that they as well population down here. From here you can go ahead and select update. I already have done this so I will. Move on. The first time your on the daily health check -- it creates all the new properties that dictate how the check performs. Once the health checks script runs increase the properties for even the dashboard. It's a good idea awaited near you -- -- the updated strip improperly gather the data. But for our example I'm obviously not going to wait so -- here will go ahead and schedule the health checks script. Will go to a group I'll select the all agents group. And go to scripts. As -- C area have -- scheduled. According to ignites it is a best practice to have this script scheduled. -- 6 AM. No need to add any parameters. You can't just go ahead and save this. Close that out. Now scheduled to report scripts. From the year will go to the dashboard. Go to management tabs. And -- is scheduled client Scripps. Once -- you can see add the schedule already. However according to lab tech ignites it is best practice to have the scheduled at 1:30 PM every day. This gives sufficient time in between both Scripps so you can get the most accurate data. Every day I need to repeat. And safe. See updates. Are close this out as it's ready. It'll open up my company. -- go to the info tab where these daily health check tab resides. On this -- you have many options. Server -- action workstations failed action. What these are asking is how you want the server workstation -- reacted if it gets a failing score in the health check. Do you want to do nothing do you want to record -- and raise alert or create ticket. It's best practice to at least record the stats that -- go back and add them to a report at some point. Some don't want the health -- record. AV or performance stats. For the servers. Here you can disable that. Same with the fire scanner. This works on both servers and workstations. Here you can decide which reports you want to run. And where you want -- -- to. Please note that it is important to have an email address. In putting heralds there will not be airport. Just some information for you. As you see -- several options here for reports. Full is not the most robust report. There's more information on all these reports individually it supports -- lab -- software dot com. However if you want the most robust report -- clearing now that is simply choose health report. And it's just another piece of information for you if reports -- days. -- tech will default to the most thorough report for instance if you have. Daily reports. Running and a monthly airports running the data at the monthly and the daily report -- -- It will default to the monthly. Make sure you save your work. And close out a client. Now we're gonna quickly go over the report itself. This is the first page in the client health report known -- the summary page. You'll notice the top left has overall client health score information for the day. Your top right has -- OS's. Middle left has what type of devices are detected. Mill rates at the -- -- space status. Bottom left is detected commands applications and alert information. And on the bottom right is the top five and the bottom five -- systems. Here you can see the detailed server report. On the top left is useful server information. Top rated CPU and ram usage and this is for the time period that the report -- Enron in this case it is -- the last 24 hours. In the middle is the record of the checks that -- run and the results. On the bottom left -- prevalence event log -- and next to that is available shares on the server. This is the workstation summary page and it gives summarized information on what workstations failed what checks. And the last page of the report -- a -- So where exactly do we get these scores from. Well -- based on properties their pre configured for you. The values can be modified to fit your needs. Each -- scores comprised of multiple checks each check is assigned a way to. The sum of all health check waits equals the health score. In these can be modified like I said at dashboard config configurations. Properties. And they will look like. What you see below you'll see script underscore DHC underscore and then the value. It does need to be noted that if you are. Making changes in the properties to not change the spelling of any of these properties because the check will -- not give you accurate results. If he do you go in and make changes to the properties I wanted -- -- Get an idea of what shall be looking at if you scroll down and find. The daily health check properties you'll notice that they look like this they'll say scripts underscored DHC -- begin with. Mod or -- and then followed by a value -- Mod stands for modify or and that's basically a -- -- -- threshold. And an example -- that would be a defrag percentage. And that value in there would be 15% so you didn't want to the defrag to go over 16%. And weights are used for compiling the actual score that goes in your reports -- an example of this would be if one of the checks is worth 50% -- the actual value of that property would be fifty and once again you can make changes to these. And it is important to note that if you do make changes to the weights. Make sure that if you have the health check weights and another health check way to make sure that -- equal 100. If you do not then -- report will return strange results. Now let's go through each check its weight and how it scored differently. -- start with the anti virus health Jack. This check will go looking for whether you have a virus scanner. Whether -- definitions are current and whether your fire Skinner auto protect. The feature is enabled. And you'll notice that to each one has a weight assigned to it to the -- scanner detected -- is worth 50%. So therefore if the check runs and it does not to detect -- scanner then your check is already down 60%. Next to it there's an example of the wait that is in the properties for this particular check script -- DHC underscore -- virus scanner found. Now like I said he could make changes to these. As long as with any -- they all equal 100% and as you can see in the -- -- fifty plus 25 plus 25 equals 100%. This chart explains the difference between the old way of scoring in the New York. You'll notice that computer one and -- were pretty self explanatory. Computer one passes all checks and to fails -- -- And in both methods -- new way of scoring and the old way of scoring they would either get 100%. Or a 1% failure. The difference comes in computer three. You'll notice that computers three has a scanner installed definitions are up to date to but the auto protect is not enabled. In the old message computer three would -- for the day with a 1%. In the new message -- you now have a 75%. Now let's say for example you didn't want auto protect and able to be part of the scoring. We would go to dashboard configured configurations. And properties. And redistribute this weight of 25%. As long as it equals 100% at the end of the day you can make changes in the properties. Another important note is that scores will not be applied retroactively when you update your health -- Scripps. Running the checks for weekly health report for instance. You'll have to have seven days of news scores to cycle out the old ones and receive accurate results. And we'll take a look at that here. You'll see that one and two produced the same results. If we take a look at day three we apply the new scoring. 3459%. The weekly however doesn't get the same bump yet because the scores are retroactive it's gonna take the rest of the week to cycle out the old scores. They'll take a look at the drive health check this one's a little bit more complicated. These are checked against each internal hard drive. For example the event -- drive check on a PC with three internal drives. Overall this check is -- 30%. With two out of three drives passing -- this check is only worth 20% -- The checks -- -- here are. Checking to see if there is a minimum drive space free and that's for a 15%. Is it below maximum amount of fragmentation and that's waited at 15%. Does it pass Smart tests and that's waited 40%. -- -- a recorded any dried -- errors. -- waited at 30%. They'll take another look at this chart. You'll notice that computer one and two pass and fail in both methods. Computer three has one drive that doesn't pass fragmentation check worth 15%. -- -- on computer three it's only going to receive half credits or seven point five for the frag check. In the old scoring the single drive would -- the entire computer for the entire day. Drive health checks are giving partial credit. All other -- checks like easier performance are pass fail or full or no credit. Now let's take a look at the virtual computer. Notice the big -- zero. The end to not get Smart checks in the old method this BM would return a sale on Smart and -- -- -- for the entire day. When the new health -- script runs it checks for -- If it returns true then the Smart check doesn't run and -- percentage for Smart is redistributed equally. Among the other checks. 13% is added to each of the other check waits for instance drive space is now worth twenty point 3% instead of fifteen. -- event errors is now worth 43 point 3% instead of just thirty. Here again you can see other weekly health scores applied. Computer three getting credit for the drives that passed and -- not taking Smart -- gives a significant bump once the new scoring has applied. You can see the weekly score slowly rise as we cycle out the old scores. Teachers and health Jack. This -- the event ID is representing a failed login attempt in the event log table. The default for this check is 25 which means that 26 would mean failure. -- you can adjust this in the properties that dashboard config configurations and properties. And there's a list of events that the lab tech looks for at support dot lab tech software dot com. Search how health scores are calculated. Now take a look at performance health. The first checked detects average CPU resource usage over a number of days and this is -- at 30%. The default number of days as -- there's another modify -- associated with this check and that's Max percentage threshold which is forty. So that means if average CPU usage over the last eight days is greater than forty but it fails. The next Jack is the number of hourly CPU spikes. And a CPU spike is defined as the Mac's CPU. Exceeding the average CPU by a certain percentage and this is weighted at 10%. -- -- -- CPU usage. And gets an average every hour -- -- CPU usage goes 10% over that hours average is defined as a spike the script counts how many of those have occurred in the past 24 hours. And if it's anything more than six and it equals the sale don't forget that these can be changed by going to the dashboard. Config configurations. And properties. Next check is to detect the average -- resource usage over a number of days. And this check is -- at 30% to. This works the same as the CPU and uses the same -- fire as CPU with an eight -- default. Again number of hourly -- spikes are rams -- is defined as Macs ran exceeding the average -- by certain percentage. And this is -- at 10% as well once again this works the same as the CPU spike. The last check done here is the minimum OS version and it's worth 20%. What this is looking for is operating systems at XP or 2003 server and above. Here's another example of how the new scoring is applied. Computer three -- checks one and two waited together at 40% -- the new score is 60%. Vs the old scoring which would fail them immediately. And get a 1% score. And again you can see how the -- scoring on. The service health check this checks for automatic critical service is not running since last -- -- Critical services are defined as windows services not drivers and not printers and not on the event blacklist. This check is on weighted so that means it's pass fail. -- take a look at the updates and health store. What this is looking for first is the outstanding critical patches that are not installs. Critical patches are defined. As critical updates and or anything with a critical severity rating. By Microsoft -- has a weight of 75%. It also looks for any outstanding elevated patches that are not install -- An elevated patch is defined as a security update or anything with the severity rating that is not listed -- critical this is listed at 20%. And lasting -- looks for -- any outstanding standard patches that are not installed. A standard patch is something that is not categorized as critical or a security and has no severity assigned to it. This has a weight of 5% to. The way that this is -- it is directly related to -- how many patches are available for each check. For instance if there -- ten standard patches available and you have nine of them installed. You automatically receive. 8090%. For that score because each -- is worth 10%. Here you can see the very large disparity between the old and the new scoring. Computers three has standard patches missing and it would resolve a failing score but not anymore now scores -- 95%. And you can also see what that does to your updated health scores over the course of a week. And as it has been said before the scores are not retroactive. So you see -- rising slowly. It'll take a look at the event health check. This is gonna look for any critical -- from the event logs that have been recorded from certain information gathering Scripps. This check is on waited so it's pass fail in any detected -- equals failing score. At this time I'd like to move to a question and answer session with one of our top developers Joseph Smith. Please feel free to type in your questions through the webinar and jolt you out. Would like to thank you for your participation -- my name's bill Hennessey and notes welcome Joseph Smith joked. This is Joseph Smith from the report developer with -- -- software and address and your culinary questions here we've already got a couple that we're gonna run through so let's go and jump into it. First question was when I go to get daily health checks for from the marketplace. It's listed as having local changes instead of update available how to update the script and that's -- -- Well but we can't do that is that you can just go ahead and check the daily health -- stripped. You'll load in all the dependency is the -- script go to the report you may see local changing on the air and set an update available go hand in just over -- -- and you'll and -- listen tomorrow and the marketplaces. -- update and a go ahead and update -- -- All right so our second question what is the difference between -- health and update helps this is a great question the -- we receive multiple terms -- the past that's part of the reason we update in the daily health check is that you could. Address the concerns that the existence of this difference between actual. It used to be that update -- was more focus on the number of critical patches that -- income on each individual system. If you had at least one credible patch outstanding would -- -- check automatic. Patch help is more focused on the number of hot fixes and patches are available for your windows systems. And we separate them out into three individual levels of critical elevated standard -- this has been -- -- of last year -- -- health impact review reports critic of the -- -- -- see -- patch was not installed and so -- So -- with this release we decided that. Wanted to fix that disparity between up to health -- parent -- partial -- same way. Update health now scores. The same exact message every day that passion health -- so for instance you look at your parents help on Monday that -- seventy check your update help for that day from -- computer is also gonna be at 70%. Instead of a 100% or 1% so you're gonna receive the same exact or that you see on her patch also TC that you're scores low. You insult you catch is you run the -- health reported in -- -- review reported in on that computer you get it up -- -- 95%. For that day the update health will be 95%. So now up to help his shifts from. Running measure of what your parents health has been over the time period for that report. All right so question at three. Hello I just the day of the week in the day of the month -- the health report is emailed us a great question we've had this several times through support channels. You look in the properties list that we direct you to earlier what you believe is the from the dashboard -- you. -- -- And then the properties -- you'll see that there are two properties there -- one is called health report email. -- month and health report -- -- week. Understood it to number values. Of those first one month is gonna be basically matching up -- in -- so if you set that value to -- it's gonna set it on the -- -- she said it's a fifteen minutes instead of on the fifteenth. You have to be careful about when you modify that number is it she said it's just -- 31. Because you want to -- at the end of the month won't not every month has 31 days so she tried to -- -- -- in September on the September 31 that it doesn't exist so people just skip over that instead of nailing it the next day so it's very important that you try to set back to mediate between the first of the twenty. The weekly email day it is a number based off of basic and that number can be sent anywhere between -- range of zero in 60. Representing Monday. So if you set that date due to which can mail it out on Tuesday she said to sixty may hold out on Sunday so on and so. All right so and so the next question. I assume that the updated scripts are already loaded for cloud version of lab -- we actually have not updated the cloud version of web -- for the daily health -- script hasn't yet he's been trying to make sure that a cloud installs are having universalist and that there -- affecting everybody the same time so to make sure that happens right from the -- first so we've held off on that on that version being installed and I believe it will be on the first of them. -- month I will need to double check that so if you have any questions on that you can contact support. The next question was why would you disabled EGM performance section of the reports costs a great question. That would disable section lets you choose for servers only whether you want to cover -- Eighty checks and performance -- throughout the -- process. There are some servers that you would want to disable the -- checks on their some servers he wanted to see what form -- -- excellent. -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- System automation folder search let's underscore -- daily health check folder open up the daily health. -- -- And there'll be to have on the right -- you can click on -- -- what you foreign scripts. Will pop up window rebels say do you want to include. All groups in this or something similar to -- question you click yes there until list out all the groups that are calling the script. I think this question might have actually come from an ignore user. You vignali. Agent automation scripts as -- actually calls the daily health -- script it's automated as part of the process within it so. -- questions idea of them. Reports sent email to different people but we've never received -- now what could be causing it not to -- we've had this question coming to support several times it's really difficult for us to tell without taking a closer look at the system it may be something as simple as the way that we entered emails into the health -- email parameters. Or could be something more complicated like -- connection issue with your change server. So in that situation I would recommend contacting support at lab tech and they'll be able to invest -- system walk through with you and see what would be causing them. Station. What can we do about the services war. I'm assuming that -- question is referring to what kind of changes that we make to the properties to table for model fires and waits for services services are pretty much set up the same way that they were before where -- -- service fails the entire -- fails for that day. Now if you have a service says that continues to reappear in your list you can have that service European blacklist. And that'll prevent it from firing your service pork. All right so the next question some of the health reports used to include back up in the health report is that still included if so how -- -- this from the report. Sure in the past is that the report shows 0% for back -- and some clients and are using a back up service from -- that's a great question the backup section of the health report has not been modified from the previous version that's been out for the past year. So we still include this is the way that we have back -- set -- is that that section only runs when we are actually collecting back up data via scripts. I believe there are stats gathering Scripps. In the -- section that you can run that will go ahead and gather that information to -- -- stats table the daily health check is designed to check -- -- and associate with each computer that has a back -- running that's what's actually given us the score for Beckham's successor backup fail. Report that showed a 0% -- backup and some clients -- -- -- -- of service may wanna contact support about that to see if we can find out if there's a script that's pushing the value in for backup health that you may not necessarily want to be pushing in the next question how can we exclude VH DS from health reports. -- is for virtual hard drives. But only exclusion were doing were virtual hard drives this through virtual machines so if we detect that key -- and machine that is a virtual machine system which she conceived fuel into the computer -- screen and in the operating quarter will be about shift to talks -- there's one of -- says virtual machine if that flag is checked -- we -- exclude. Around that virtual machine from the Smart checks are running against the drive. -- We actually don't exclude -- Smart checks we we distribute the -- waiting for that check across to the other three checks so we're basically saying okay you don't wanna run -- its virtual machine because you're gonna come back with false positive so word -- just re distributed and make everything else a little bit easier so that it compensates for the lost amount on that a Smart check. If you have suggestions for other ways that we can detect virtual hard drives or other -- them are being affected by our virtual hard drive for hidden contact customer support and will take that as a feature -- -- access into will be able to change its future. Okay next question daily health check is no longer running after updates. We have any ideas property security missing as well from the dashboard. Like a little bit of follow as we wanna look into that -- I wanna call tech support for this issue if you have downloaded and the newest version of the daily health check and -- Has stopped running those properties are not visible and that means of calling have a problem with the script itself from going through now the properties only appear in the dashboard. After the first time you run the daily health -- scripts what's actually happening in the first couple lines he call me another script called -- properties stashed daily health check. And -- -- goes through and -- the properties table to see if there are any additional properties that need to be added in that may have been deleted the previous day. It also checks to see if you if you have the properties in their at all if it sees the properties in there it's not -- updated policy if it doesn't see that property name listed as an added in. As if she's there with default values so hmmm if you're looking to -- properties you can go in and run the -- properties daily health -- script -- -- that you'll be able to find that under system automation. -- dysfunction is -- of another question do you have a list of services are checked for the service -- we actually do what I can tell you that we filter that list by whether it's -- driver or not it's it's it's it's a windows driver we excluded if its printer we excluded. And finally we look. Look for the of -- blacklist. This is -- blacklist just -- Even 2012 might have been a little bit earlier this event blacklist which you need that the service steps should be automatically running and is coming up the -- -- you run the check so any service that's on that list it is going to be skipped over as part of the -- process. Under tools reporting configure manage risk for. We can change weeks yours well does this do the same things change and in the properties there's also an update client health scores option here to. -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- teaching -- some questions user friendly -- the executive summary report in management report are also are actually health reports as part of -- health reports that the executive summary report it is actually the same as the monthly summary report in the management report is actually the same as the Motley -- reports so if you're looking to get those ports are -- scheduled you can go ahead and select those that names won't be the same but they are basically providing the same information. -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Scroll all the way down you should see script underscored THE underscore -- -- And there should be a total of five waits for the performance section. Obi -- -- CPU spikes memory -- Memory average CPU average and -- OS version costs you can go in. And and reduces CPU spikes. And 20 and the memory -- -- -- zero. A gesture -- three up bounce between them so that they all add up to a hundred. And at that point you'll have effectively remove the CPU spikes in memory -- from Europe for performance health -- checks will still be performed but they will not impact your overall score for performance. I want to thank everyone for attending this week's webinar. This webinar will be made available both on the forum under Lindsey corner, and on LabTech TV under support webinars. I also wanted to remind everyone about the resources we have available for you online. By going to support.labtechsotware.com we have a variety of educational resources, including documentation, Knowledge Base articles, and LabTech TV. On behalf of LabTech I want to thank everyone for attending and hopefully we see you at a future webinar.

Related Videos:

  1. Network Probe Configuration Part 1 Support Webinar

    Fri, 15 Aug 2014

    Hello and welcome to this week's support webinar. In this week's webinar we are focusing on the Network Probe Configuration Part 1. Before we get started I want to make sure that everyone is comfortable with their virtual environments. In the navigation control window of the webinar you have the ability to ask questions. We will silence all communications during the webinar and use the questions window for primary interaction with the audience. We will conduct an overview then move into a demonstration followed by our live Q&A session. It is recommended to send in your questions as soon as you have them. Thanks for joining and let's get started. I would like to introduce our speaker for this weeks webinar, Scott Logan. Welcome to the support webinar. For network probe configuration. Part one. The network probe is a service that runs on any -- -- agent. That allows that agent to discover other devices that are connected to the local network. Let that can be configured to push the agent to any windows devices we find. And also gather data via S and -- about any of the other devices that it encounters. Today we will take a look at enabling the probe. And making some configurations to enable the push. As well as detection of devices. Part of the -- being able to push the -- -- out to devices it finds. Is making sure that there -- passwords set at the client and or location mobile. Before making -- computer probe. It's a good idea to make sure that their passwords -- on the client and or location. When -- double click on this client. You could see on the passwords have. I have an account called location admin. And you can see here the format of that is domain backlash. Account name. If you're -- -- -- group environment this can also support using dot backlash. And in the account name. This one is set at the client level. And if I expand the client and double click on a location. I can also have password said that the location I was well. Once we're sure that we have valid credentials. In either the client or location on the -- were stabbed. We're ready to make a computer -- network -- -- double click on this computer. Here on the welcome to have. In the agent flags section. You can see that the network -- -- fox is currently unchecked. As soon as a project in the check box. It's going to ask me if I'm sure that I want to enable the network probe on this computer. -- click on yes and that will launch the probe -- set -- wizard. When -- click next here. The first green is the deployment setting screen. If you recognize these two accounts. Those are the accounts that were listed on the -- which have for the client and location. If I decide that neither one of these is a valid administrator account to be able to deploy. The -- occasion to any of -- computers at an probes found. I can right -- -- here. And add an entry. I'll go ahead and make a couple of selections on here notice how log in -- -- for administrator access has a drop down. I'll pick which one of these I want to use -- location have been. And I have to select a template to be included in the deployment package. All -- default selected. -- next. In our on the detection settings portion of the wizard. Here in the community strings field. We have to tell -- which community strings we wanted to use. It is preloaded with public private and -- them. If the environment. In which are enabling -- network probe has separate community strings. -- them here. Comma separated. By default these -- the -- that we are scanning we can add additional ports here also comma separated. And the -- frequency is set to one today. By default. Notice how the check box here for collection is currently turned on. That means this probe will attempt together data via as an MP form. If I don't want that function turned on I can uncheck it now. An average -- -- here to enable automatic. Agent insulation on its own devices. At this time it's not checked and I'll leave it -- -- for now we can revisit that after we complete this wizard. -- -- -- And quicker and finish to conclude the groups in a process. After I finish the wizard I can go to the commands have. Connect is to have -- program. And status of pending. Click on the -- to continue to refresh and notice that the status is changed to success. And it shows that probes installed. And even as -- saying that I now have a new network probe cap. Here on the network probe tab. I will start by going to be -- settings section. And we need to popularly. Which IP addresses we want the probe to scam. Please note we do not have the ability. To exclude certain ranges that we don't want scanned. If there is one entire subnet but there is a chunk of IP addresses in the middle of that that we don't want scanned. We need to set -- ranges to -- below -- them and above them. Thus omitting the -- we don't want -- There is no way to say simply do not scan these address. I'll put -- my address is now. -- -- that one. -- modify marine slightly. And on this one as well. And so here you can see I'm scanning from one to 49. And then. From 75 -- to 255. Thus omitting everything between fifty and 75. Notice here we -- that enable collection checkbox that also showed up during the wizard. This is what's going to allow the probe to be able to collect data from -- devices -- has detected. You could turn this off if you don't want to probe to collect data at this time. For with a checked it will attempt to collect that data. We will go into greater detail. About -- collection. In a future program and -- Back over here under remote push settings. You can see -- again. -- for credentials. That are available. To attempt to install galactic agent on devices that we find. Here's my drop down if I decided I wanted to add a different account I can select it. And that it. And I can even select. One of the passwords in this list. If more than one is present and choose to move it down or up. To change the order in which we attempt those particular. Credentials. Right now. The probe is not attempting to install the -- and tiny computers it -- Because enable automatic network installation. Is not checked. If I put a check in this box. Then every time the -- scans which is currently. One today by default. It would attempt. To install that -- tech agent on any windows computers it found. That currently do not have the agent on the if we scroll down a -- here. You can see we have. The S and MP settings that were available during the wizard. If I need at a later time. To add more strings. Or change some ports I can do that here. And notice now. On the screen we also have -- an MPV three settings. S and MPB three requires authentication if any of the as an MP -- devices at this network location have as an MPV three enabled. We'll specify -- -- an -- were. In this section. Okay let's take a quick look. -- some of the other tabs that are available. -- -- -- -- -- -- -- I have the -- command step. Commands have that exists on every computer. It will record actions that have been sent. By this group. So for example we attempted to install the agent. We would see the results in here and get feedback. If I can tie this into an example. We'll go back to the general -- I'll go back to the general tab and you can see here. I still look this check box unchecked to enable automatic network installation. Perhaps what I might do. Is go to the network segment for this location -- probe is. After the probe. Has scanned the IP address is selected. There will be devices showing up -- network. If I double clicked on -- device. I've gotten install button right here. So perhaps before. I enable automatic network installation on the probe that would come here and -- on install. That I can go straight back into my pro and I can go to the -- commands tab and watch the results here on the screen. If the results are successful. Perhaps -- come back here to the general tab and -- that enable automatic network installation. If that's my goal to get the let's take agent on any device -- -- Or perhaps there'll be. -- -- -- -- That will indicate there was a problem -- Deploying the agent. Perhaps indicating. There's a problem with this password. Or something else for -- to troubleshoot. So the probe commands have as were -- going to be able to see. Functions that the probes trying to perform. Okay S and MP traps. It's an MP traps are going to be available on certain as an MP enabled devices. On the network. If the probe. Has detected one of these -- and MP devices. And that device is capable of sending straps. You could tell that device to send -- -- To this program. And when I go back to the general tab. Appear in the identification section because -- the local address of this program. So if I went to some device perhaps a rotary switch that's capable of sending there as an MP traps to a specific address. And we'll tell what device send your traps to this IP address for my network -- Now back here on the it's an empty traps -- I need to tell this probe to trap. Any data that's being sent. Soared to -- -- Perhaps I would call it a catch all. If I don't specify any additional filtering in here at all. I can use this. She simply gather any traps that are being sent to this IP address of my network probe. By any machine. It's just a catch all. Alternatively. I may choose to -- a trap. For one particular. Device. -- -- -- -- -- -- -- -- -- I'm looking for traps -- coming from this device. I could save it. I deleted this one. Now I will only be trapping. -- data that is sent from this IP address. After that has been set up and the device has some points in the straps over that it is -- -- appear on the -- Ability information. IP address -- -- it is of of the term value was etc. -- -- Notice how I already have -- -- -- showing up on this tab. As soon as I made a machine a probe. It shows approved configuration and synchronized. Notice here I have other values such as starting -- system. Notice here have. Networks can cute. It's showing me that I have initiated scanned. If I want to see what the progress of the skin as. Within this -- computer. I can go to the tools tasks in groups have. Americans check the -- can position. For me reflects that has done. If it was not done you would see a certain number listed in this field to indicate. What position was and within the scam. The -- of -- have is going to show you. Probe activities that have been sensitive scan. Such as enabling the -- or changing settings. -- events. Are similar to what we saw back on the -- and MP -- step. The -- probe has the ability together syslog data. From certain devices. Right clicking here and -- -- trap. Once again maybe -- will say -- I want to know. -- information from this device. And save it. Now we're telling the network -- to try to reach out to. This address. And get through this -- logs. When they're gathered -- gonna show here in the syslog. -- -- The network -- can also serve as the TF TP server. I can use this to. Serve files out. Two computers on this network where the probe is located. And I can also use this to have computers upload their files. To the probe as a TF TP server. If I have recently added devices. To the network. At this particular location. -- -- re -- network. So for example if I went and installed 25 new computers. And I wanted to probe to find them and try to -- -- them as soon as I it's set up all 25 I could come back to my probe risk and the network. In double -- them. And if enable automatic network installation is. Checked. -- try to -- -- -- to them. Read tech devices. Is related to -- -- -- collection. That is a topic of network pro configuration. Part two and not something that would be included. During this conversation. There are also some commands that are available. That are specific to the network -- On this program for quick and begin. Commands. -- -- to probe. And we have a few options here. Disable. And enable collection. It's simply another way to. -- and check that checkbox. Fast -- -- -- the computer in fast talk. Current devices. Purge any network devices that this probe has found. For slept at two PC. If I could have -- slept at two PC. -- could specify the hostname or IP address. Of an individual computer wanna turn to use the probe. To -- the -- here. Refresh configuration. Means that perhaps I've come in here and made some changes. To some of the settings -- general tap. Refresh configuration. As telling the stroke to update the configuration settings and that's something you would see under the -- events have after the configuration have been -- Refresh push installer. Perhaps there have been some changes you've made through the push installer perhaps there'd been an update to -- tech and a new version of which installer is available. We will tell this probe to refresh the push installer so that when it tries to. -- epileptic agent it will take the changes you've made the changes related to the new version. Start networks can. Is identical to just come -- clicking -- re -- network. Tracing. Is going to give us a much -- detailed. Description of what's happening when this probe. Is out there scanning and attempting to perform actions such as pushing. And the tree -- Just used to -- the -- walks to say summer. That concludes this portion of the webinar. Hold -- turn -- -- question and answer session over to. Kevin Davis. So our first question is is it possible to exclude -- PC from the network probes automatic deployment. The ways these system currently works is that we scan. Via BIP address so if you happen to know the IP address. Of that machine. You'll excluded from the range. Next question. Is there a way to probe different view lands within a network. The probe is not capable of crossing the the aliens due to the -- cables. And -- switches. Work with passing packets from one network. Segment to another this is why we asked that each viewing and have its own corresponding location. In and you put a probe for each location. Next question. I am unable to delete a machine that was the network -- This is by design the reason being is that you are allowed only want. Network -- per location and an order to delete that machine humans first -- check it. As. A network probe. Then you can go ahead and remove it if you were having problems with this we do you have a script. That is located under the maintenance agent. Probe removed from an offline agent this can be run to correct this issue for you. Next question. Our servers the optimal location to install the network -- No. Network probe. In scanning functions. Are very processor intensive. We actually recommend and best practice is to use the least utilized machine. That it's on. Within the network to reform the network scans and act -- -- -- -- question how frequent can you skin I see the one -- but whats the Max scan frequency. DB once -- day. It's -- best practice however. You can go as slow as once an hour. Please realize that based on your network configuration. And approach configuration. That this may flood your network. As well as its over task. The machine designated as a -- again this is why we recommend once a day. Next question. -- remote agent deployments automatically update the -- package to be pushed after agent updates. Or does each probe enabled computer need you have to refresh Egypt and ran on. -- -- machine will deploy the most up to date. Package available from the system. It is also noted that the agent even if it is a previous version prior to an upgrade. The agents themselves will automatically upgrade. On this next subsequent check -- so it doesn't matter if you had. An older -- push from the probe because the -- Self updates based upon its templates addicts. Does the probe acting as a syslog server where we can have devices push lost the probe or does it cool -- from the device. When you designate a probe to be -- syslog server. It is just like any other syslog server package out there you must configure the -- device to point to. The probe machine IP address as the syslog server. It's a push operation not a pool operations. Pool is actually be accidentally templates. Which is covered in next week's advance. -- Is there's still an issue with the network probe and AVG. Version eight ethnic east cause a blue screen on the -- This was a problem with the EDT product not the -- -- network probe. This was due to do there. DO -- included. In their product. As far as I'm aware. This problem has been resolved but again this was a problem with the EDT product not the network -- Next question is there ever any reason to deployed more than one network pro that location. You -- its system actually prevent you from having. Multiple network probes per location. This -- single pro single probe per location. Should a probe also be configured as a master. It does not necessarily have to be again we are using a least utilized. System. Whether it is a master or not. Can the -- can be configured to automatically check. The external sync flat boxes such devices will automatically sync to connect -- For this operation I would actually recommend running. A script you could write a constant script that would actually interface with. But this is not within the scope. Of today's webinar in -- actually part of an advanced scripting. -- power. Next question is -- script that can run against the locations such probe that will alert me when it finds -- -- new device. What I would recommend. Doing is looking at our new computers detected internal marcher. And modifying it to look at the network devices table. -- questions -- how do you prevent the -- from shuttle and duplicates in the control center. IP addresses. It is clearing the inventory once per day. So if you have multiple skins. And DH CP you potentially could have -- computer. With different IPs listed one would be on one would be off. This is. Default behavior. And at this -- cannot be changed. Next question what traffic is required for the automatic -- of polish installations are PC. God this actually should be. Covered in next week's more advanced webinar. But it does not utilize just ER PC or -- 445. And 135. We have multiple methods to attempt a push from the probe to the endpoint. If we have a server set up as network probe but would like to change it to a less used management PC is this easy to do. I. Check on the other that is the correct operation he would first -- check the server designated as probe. Wait for the operation to complete. They -- she released PC that you want designated as -- management PC. Go ahead and select the network probe and allow. It to be in -- Can you please recap the difference between -- detect devices. And -- -- network. The -- detect devices. Will go ahead and -- -- list of devices currently listed in the network devices. The re skin network is when you want to change the IP range. -- to attracting or adding. X question does the probe deal with casting. And what is the best way of troubleshooting. -- Not sure exactly. Understanding what casting. Is to do with networking. If you're talking about -- -- and this is one of the reasons why we cannot cross the Orleans. Question can you save pro configurations. For changing pro machines. These probe configuration. Is stored at the location level. So if you. However. I would question why he -- constantly change -- probe. Machine or -- designation from one machine to another normally this would want to be said it wants configured. And then do not change and less required to. If the location has a large amount of clients and devices is it worth it to have -- dedicated PC for this. This would all depend upon the amount of information you wish to collect and if you wish to collect information about both desktops and servers. It would be best practice to have -- designated machine. However if you're only looking at its servers. You may not necessarily need to do this. The best course of action would be too. Baseline. The amount of information that is being collected as well as the resource usage. On the machine to determine whether or not you need a dedicated pro. What is the best practice when the probe identifies a host as a network PC when it is a piece. I believe you are referring to. Hypervisor source such as if sex is sex -- such accident and hyper V. In these instances. We have other methods. To designate them for VMware we actually have an action data field or additional info to designate. The machine. As. A hyper. Visor host. For the other. Hypervisor -- You can install -- Linux agent. And if the hyper V supports dot net 2.0 framework you can install an agent on those machines. However. If you can not get either those requirements. It will always stay as a network device. Well it seems that we have answered. All the questions so far if there's any more remember we will be doing in advance what the -- next week. Think you. Have a great day. I want to thank everyone for attending this week's webinar. This webinar will be made available both on the forum under Lindsey corner, and on LabTech TV under support webinars. I also wanted to remind everyone about the resources we have available for you online. By going to support.labtechsotware.com we have a variety of educational resources, including documentation, Knowledge Base articles, and LabTech TV. On behalf of LabTech I want to thank everyone for attending and hopefully we see you at a future webinar.

  2. Web Control Center and Quick Connect Support Webinar

    Thu, 7 Aug 2014

    Welcome to this week's support webinar. My name zantops a trainer here LabTech and we're gonna be focusing on the web control center. And a quick connect support feature we have optic products. At the end of the session we will bring in the subject expert matter. To discuss any questions you may have. Following display. Before we get started. Let's go ahead and take a look at our software recording policies I'll give you a second to read through this and please don't reproduce this. Or use for any other purposes than what its attendant for. Okay it. So today's topic has an agenda. We're first gonna look over installation pre Rex what do we need in place in order to use the new style control center. We will also look at accessing the new web controls. Allowing client remote access using the web controls So there is a feature where you're able to allow your clients to remote into their own desktop machines. Via the web control center for no additional. expense. Or client expense And then last we'll talk about accessing the quick connect And what that can be for. So with the installation for Iraq's one of the things we must do right off the bat. obtain the wed control center configuration plugin. From the marketplace. So when we go out to the marketplace. We must be on the local text server. So I will need to come in here. Nineteen viewer hand. Q my server. Once I do when I go under tools. I have Atlantic marketplace available to. and launch that. How open it. Locate slogans. And find the web control center configuration. Which I already have updated my server. So once I selected an updated located under against is help. Plug in manager. We can see. That we already installed the web controls configuration. Plug. This is what allows me to access the new web controls the unit that export and Atlantic. So now I can go back into my lab system. I can go into the dashboard. And we would go. Configure. Emigration. And this is what allows me. Q brand and manipulate the new web control style look which will go back to and just a moment. Next thing we want to make sure for a pre is that any user we want to allow to have access to the web controls and her. All their permission Has the allow web access permission to login. Anonymous users will only be shown the main welcome screen. Where the users that have this allow web access permissions selected. Will be able to go in and download location specific installer packages. That are agents. So let's take a look this it is. We'll find our user. And we will make sure. That on the permissions. web access checkbox is selected. This will allow this user. Do have a run in of the web control center. So we just showed you after we do. Go to the marketplace. We download the web control center configuration plug it. We make sure user the allow web access permissions elected then we can access through the dashboard config integration. control senator. The interface that allows you to customize the web controls. Which looks just like this. Now an order for us to always. Have the new style web controls and are available to us which we're gonna take a look at it just a second. We would need to make a small change to a file locally on the server. So from the LabTech server and and navigate. To that C drive. And called. WW root folder. We're gonna open it up and some type of and a how to do this. And then we are gonna change the following line of text. Too didn't style web controls information this is what you're just gonna change a winner so you're always going to in the style controls. So we'll change this line of text that CCD fault. So long to equals WW CC two for pixels are too. So again we have to be locally on the web on the lab server so I'm gonna go through team to do so. I'm gonna locate. The file question. Which will go. You can see We go to the unit WW group. And this is the following need to change Shalala right click open with notepad. And this is the simple line of text that we need to change so I've already done this to reflect in the control center. This is what we change it to. This is what it look like prior. So we would say URL equals it would have this text you just grab this delete it. And then. Put in URL equals just WW CCC. To make sure you put quotes and close it. That will always point when you go to launched the web controls in any browser. It will point to. The new style controls which we're gonna demonstrate right now. So I'm gonna go back over here I'm just gonna go in the my system open up. A browser. Gonna navigate to my web control center which is fully qualified domain name. And as you can see it already changes it to the WWC So this is the new style web control You can log in. If you have access. On the permissions tab that says allow. Web. Access web control access If you cannot login and we have anonymous access the you can still get to this page. And you can see here you can download. Install agent so if I were just to select his default install where would that place that computer and that Texas. With not using location specific installer files using these people ones you'll always the machine. Under your first client which we always expect to be So I know which is one because I have the actual number appended to that client object. I can see these numbers because under tools. I have show IDs. So this is an important step you need to select this you know which one. Has that the fall. A client's it. So is Mikey client underneath I have a new computers container. And these computers and cells have been placed here. Because. They maybe were all using just. Did the phones package. I can do the same in my mobile devices down here have the ability. To grab. The it's all packed for them. So if I come up here. That's the password yes it is now I am inside. Of the new web controls Looks pretty slick. You can choose what color scheme that you want to display here I'll show you how to do that just seconds. But now you can understand that I don't just had fall skoler packages. Like I did on the main page which also here now I can select which is client specific. Installer package. Now this gets into agent deployment which were not covering in support webinar but I going on there. And I'm gonna go to travel times. Client. On executed travel location one and if there a packet set up there I'm gonna go ahead and wrap it. Now I have the windows EXC this is district default package. I'm now on site with this client shaken hands. And I'm sitting down and computer and since it's a four. Person shop after all work group maybe I'm just gonna come here and I'm gonna select this exe. That's gonna down each and my tray icon in start reporting net. Maybe it's a bigger environment. And they're using a domain environment which we always push if they're using a domain. Windows domain. You're gonna go ahead and use the MSI package. Which I can generate from the screen. And link it to a group policy object to windows. And that's gonna push down the agency machine. So this gives you different options for downloading. The agent. To a client's machine. We also have. This is I like to think of it as a watered down version of the controls. So I come over here on the main home page I System status. Servers that I have available which are five how many workstations. How many computers. I can come in to the dashboard. just a quick display. Kind of like a likelihood that we have a heads up displays and we have our clients'. Computers and so. I can go rate in the these tickets sold by select tickets. I can come into a ticket. I can double click a ticket. And actually see the information. And work the ticket if need be. To close it. I can also go back in his dashboard look at any of these activities such as computers network and running. If they're checking on check in and then they'll have an online status I can then double click on that. And bring up information about that machine. And you can see it's report CPU memory system drive. I can go an independent on what I allow for remote that the PC shut down. I can run scripts. Into a lot. The only time I would utilize this is any case where. I don't have. The control center installed on the laptop and I'm traveling and I can and it checksum. Information out so I can basic information I can do. Some work on some PC's. I can actually good mood and which is very nice. I'll go back to that dashboard again. And you can see my active tickets which are looking at whoever log into to control to work. to the tickets itself. work through any of these maybe read some information from past tickets that helpless working on client's machine. I can go to the clients that. I can filter this out so morning looking at specific client. Or can and select in the one. Now it's only gonna give me information. That's within that clients and now I'm looking within that client how many servers I have one how many workstations. And I'm getting basic information. I've got a password list that I could see some navy I was trying to do an agent appointment and then the correct password is not showing up on the client. I also have product keys that I can see. For that rate at my fingertips. I could also pull a report. So armed with in this client so I'm gonna hit view report. In that I could come in and for a software report. Give me your patch health not is automatically. Going to limits it to do justice particular client and I'm looking. So I wait. I get this. Up health report whatever I'm looking for. And I can get some more information talk to it. Declined so maybe I need this information he's asking you questions or let me get you that it. Some some more backup information on the okay so you can go ahead and take your time when you guys get back to your desk and just work through here and how. It's pretty easy to navigate that's what we like about the new control center. And we also can branded as you see idea what Dark guy and we can each I'll show you how to do that. Once we make change that a file that we spoke of course we're gonna save the file. We're gonna restart and the IS service on the lab tech server. You're gonna clear your history and cookies to see the changes. Because if I in here. And I change this. Mountain logo. But I my cookies. And delete the history. It's not gonna show so if you wanna see if it actually took effect make sure you go on whatever browser. And delete your history. cookies and restart the browser. So let's talk about customizing the way controls You see them mine is a green style content to reflect LabTech here. Com we can also upload any logos like it did with the nav tech User failed attempts are now available to the central's owner. In this was request directly from you guys are partners. And what we mean by this is go into the talk about. So here's a couple new features that were never available we have our it's elected to the pop up if I need to. Number of failed Logan attempts. Now if you go to the main page control sinner and I can't figure it five times it's gone to out. And I can put in minutes lock out. Aluminum people for fifteen minutes. And when that occurs. I did it five times I lock for fifteen minutes you'll see in the whatever users attempting. To log in here I can then highlight that user. And this will become unlock I was select unlock. Now I that users may be one of my technicians. And they're having a bad can't remember anything to you today don't worry about it I just unlock go ahead and try again make sure use this past work. Another big feature that our partners can't ask. And I agree with this it was a security answer. So I'm an admin on the arm pulled into the web controls and sitting at the site of a client. And I forgot to close out the window I get up in the and a smaller way back to the office and with that I do I've left the web controls that are sitting there. For anyone the comments or delete the tickets are remote and in the PC's. So we said we're gonna organs timeout. So if I wait for ten minutes minutes. And analogy I have this open. And I'm not do anything so if I stay stagnant for ten minutes in this page sits here. When I go to click on something to look at it. It's gonna go ahead and log me out. So it's not gonna just leave this session open and it's not gonna leave it just connected to our server where you can work when Up here this is where we current theme. The current It's whatever you want it to look like I'm using this green and background. Again trying to chew on you know. Push push out some LabTech do you guys right which you may use whatever color scheme you use for your company. Where can you get that. Well it tells you where to visit its rate here which I also have my browser so I'll bring you through that area. Okay so here's that steamroller you can go to the gallery section. You can select any color you want to use. Here's pretty much what I was using. Then you would it download. When you hit download this is a very important part. We do not support the top versions here we only support one point 92. So one of the major things you remember. Is the new theme must be saved on the one point ninety. And that's what's used in our back end for this to work. So I can select whatever I want. Check that one point 92 that I'm gonna go back and a dashboard. And I'm gonna to to upload from where wherever I saved it. Maybe desktop where points. In the same the logo very easy. To skills select upload. Find a pictured you wanna use. So I'll come back in the lab tech these are nearly two I have right now so I would select one of these. Hit open. And then that's what will be displayed. When I log into the control center which I'll have to do. That is the logo here. Now remember I changed this loco. This logo raid away through my dashboard. Once I make the change here and I hit upload I'm gonna have to go into the browser I'm gonna open it and I'm gonna have to. Basically go in and delete the cookies. This way it refreshes it grabbed in the logo displease Okay. So the next portion we're gonna talk about. This is a really helpful tool it can be uses a good sales. Technique. A specific contact grant access to their own machine. From the web controls So you may approach your clients and when you're trying to negotiate you're getting on your service plans you may also want to remind them. Maybe for the error couple specific people everybody. That I can also allow you for no additional cost access. To your own work machines. From the web controls you can go on the Internet I can give you an address and then you can access your computer it's gonna be a type of access. Is that the quickest exit team viewer fast now no it's not but it absolutely allow you to go access the farm to After hours so this is something that may get them excited again the on and future use you as their There's three parts to humans and the first part is we've got to create a contact. When we create the contact is very important that we give them an email address and we must give normal web password. That's what they're gonna log in to the controls. Remember contacts. Is not a user so we are not giving this person. Let's say daddy. At the dentist office any access and Texas. We're given access only to their specific machine by humans. The second thing we're gonna do. Is on the contact itself there's a permissions that when we select the permissions. We're gonna go ahead and tell them what they can working active when they remote into their PC. Using the web As you can see there's tickets and DNC. Install the agent them that shut down home. So I'm not gonna do anything with the so they view tickets I'm gonna deviancy. Reviewed shut down get them in three abilities. So I make that selection on the permissions tab. In the last thing we do. Is we go through LabTech in the map and navigation control. Sinner. We select the machine that we want to allow them to access Monaro. Outside office. And we make sure there name is the name that is selected here contacts. So let's look a lot of these three things via that. Go into the system. We will create contact. So I can create a contacts appear which are global contacts they can reach to any of these clients. Such as I did cleverly with alerts. Or to go a particular client because this is where the user is actually part of travel times contacts. And how many do you John Brown. When I select John Brown. The very important part is the email address. In the web password. These have these are case sensitive to this is how metal walled him into the web control center. Before I do that I'm gonna go to permissions tab around the DNC. it shut down. The next thing I will do. It's okay John Brown machine where is he actually located. Within my navigation tree. He's on there dislocation. Okay and he's this machine. I have to and make sure. He is selected here on contacts because this is what's and allow him. To access his machine through the web control center. Okay so once we have selected. On contacts the machine is checking in. And we have. Created a contact. Made sure we gave him an email Pittsburgh and set the permissions. already. To go in. And into the web controls with them. case sensitive values they lower case. Okay. So we go and you can see that there's the computer available. I will highlight the computer. And now I can go ahead and do whatever I told it was allowed to. I can remote into the PC rebuke shutdown. It refresh would ever doubted us. I can even toggle fast talks that we can have more response with that machine has were communicating. So this is a really good thing to make your clients where. You know this is helping them giving them remote access. Products within. You're lab tech product feature already. On delivering them painful. Great. The last thing we're gonna talk about is the quick connect This is a feature that many partners aren't where and it has a really good purpose. So we were just talking about how to use the web control senator. Thumb and how we want to deliver agents through the web controls that are presents install packages Let's say that EG. Is not reporting and at all. Let's say that you haven't had a chance to put an agent of a machine. And again we're gonna use Betty Betty at the dentist office. She's not really computer savvy so we try to tell her to go to the web controls that are and install this agent or machine. She's not follow us. So we'll say no problem you know go ahead and just click on the quick connect feature in even though there's not an On a particular system. I can use to quick connect feature to gain control for machine. So what do I mean by us. If we go out to the web controls and and even if we completely out. You have connect with a technician. Now this will only be able to be. You would only be able to click on this if a technician. So Tuesday. User in LabTech administrator. Is logged into the controls If for whatever reason it's Christmas off this is not even gonna be available peak But we told that no problem get upset we're gonna be able to help you anyway. having click on this for as connect with the technician DC that charity click on. Which he does it tends to install a small. Executable. To her machine. lost the executable. asked her to install she will and then simply put her name in such as I did here. And a quick messes. Felt that sounds good now she's gonna select ask for help. When she selects ask for help on our side because we are logged and we're gonna see. Under tools. Quick connect now we have to open it up once we open it up. I'm okay I see there's Betty she's asking for help let me double click When do that. That brings me to my quick connect such. Again this is no more additional charge. This is here to help users that we cannot. I'm sorry to help out clients. And particular people within that client. It has an agent that stop functioning correctly. Maybe I need to uninstall and reinstall the agent and I can't walk that particular person through that procedure. So I'm gonna come in here and I have a DNC agreement DNC and tour machine and do it for. Or RDP. I have a IE connection. Go ahead and bring her browser and work work through it that way I can also chat with the user the whole ambulance. You know Mattel. And it's a good idea working on this now does to people posted. So I can send information so on they're gonna be able to view that information. On their end. And we're gonna be able to get this resolved. So this is a really nice feature when I'm done because already installed the eighty. Or maybe I did something else for them I'm gonna go just close the session out. So the quick connect option will only be available with a technician is logged into the controls were not there to help them that's gonna be out on the main screen. So you wanna go ahead and select connect with the technicians that'll tell very small file machine. Which we can help them controlled machine. And and pretty much fix whatever the issue it is maybe just so we can do the rest still. Behind this it's. Okay so brings us to the end of the session. Thank you for your time. And I'll see you and another support web and

  3. AV Detection Support Webinar

    Fri, 25 Jul 2014

     

  4. Virtualization Manager Support Webinar

    Fri, 11 Jul 2014

    Welcome this week's webinar. in Tucci on the at tech. In this week I'm excited to bring you the virtualization manager. Often times when I'm teaching classes. And workshops traveling. Partners. Constantly bring up the question. What does LabTech and become more proficient. And monitoring. My VM pentium machines. And this is the reference. So we're gonna go through the virtualization manager. And we're gonna talk about. Today's topics. The first thing we'll discuss. Is the installation pre Rex what do we have to have an image. Of the virtualization that. Next we're gonna go into. High level overview. Of the interface. And some of the configurations you can do. Third we're gonna give some troubleshooting tips. Of course you can call to support if you get but it's also good to know where these log files are. So maybe you can come in with a more intelligent questions and speed along your support engagement. The last thing we're gonna talk about. And show you is a demonstration. On some tweaks SSL. That may be done. If you're on a certain version. How what covered it's a little more in detail at the in this webinar. So let's look. At the first thing we're going to talk about which is the installation We must be on LabTech build. 2013. Dot one. Version sixty 276. So how do we make sure that that's the we have no problem. We're gonna go under our control center. We're gonna go on their help. About. And we're gonna verified. That we are on the correct version. Sixty 276. The next thing we're gonna do. Is we're gonna launch the marketplace. When we launch the marketplace. We're gonna go up to the solutions section. And we're gonna find. The virtualization. Manager solution. This will incorporate two audience. That is necessary. And that will be. Your virtualization manager. And you're virtualization monitor. Now the monitor is used for all the data collection that's gonna be needed by our troupe which department's second. And the virtual racing manager. Plug in is really use for the front end of the you So once we complete these and download them to our control We will be able. To launch it. For more. Control center at the top. For do that. Let's make sure. We stress. The pre Rex. So we made sure we had to build. We went to the marketplace. We selected solution virtualization manager. And we just retrieve the monitor and manager plug it through this. The list. Must If you must have a network probe at each location. Where the VM host live. This is gonna be an electrical part because the probe. Is gonna be the To make sure that we get all this information collect. let's move on. To our. You overview what does the virtualization. Manager look like well when I go into. The control center and for the first time. I'm gonna see the screen. very similar to what you're seeing now. And this is because it's a wizard and it's gonna ask you for some global settings. So you see are missing. That's fine because we actually having detected. So. What you detect some post and you get it setup which I have here. It's gonna look more like this. So now I switch to. The virtualization manager and actually has with. Okay so. Virtualization managers mainstream which were looking contains a quick glance of your virtual environment allows you to quickly locate the host a virtual machines which are having issues. Want to locate the issue using the virtualization manager mainstream. You can use the host dashboard in virtual mean churning machine screen. For associated machines to dig deeper into the issue. Controls are available to shut down or restart a host a virtual machine as well as allow access that computer management screen. So the first thing they wanna do is you wanna get familiar. With our virtualization manager screen. As you can see here. We have. Basically customize columns at the top. So you can coming here and you could say you know what I may need a different column for you can come here and grab whatever you wanna add. To make visible at a glance when you're looking at your environment. We have an refresh. We can check this so it checks every five minutes to refresh and when any new or additional audience. We can also look at our host that are available and then on on this plus sign we can look at. It the end guests which that happens. So this is a good quick glance on the right side of what type Indian over here on the left side we have a single pane. That basically showing us our health and our guest Can't we have monitors that are tied into our lab monitoring system on you can see I have one monitor fired off here. So if I select monitors. It puts a filter at the bottom and me that that it's actually triggered. If I were to select the hardware which we have no issues if it's gonna clear out those because nothing's been targeted triggered. So we're gonna get familiar with more of the U as we go along in this web. So the first thing we're gonna pay attention Is the global settings. The wizard pops up an issue for some global settings and we're gonna go through The most important thing is going to be the credentials. So we're gonna set two types credentials consent in this virtual. Virtualization Global and local credentials now to recommend to set the credentials at the location level. So let's take a look at uses. If I come up here on the global settings. I'm on the my credential manager. And here's where I can set my global credentials. Or my local credentials. credentials can always can also be set the voice level and we'll cover that towards the end. So sure I want to set credentials. That are consistent. Across all of my host machines. I'm gonna go ahead and set it. Globally. Select the dropdown fine which one I want to use but this isn't the best practice. We recommend that you set it at the location So I would come under here. Select my client select the location I wanna use. And then select credentials that board at that location. Now where is this associated with. Where are these credentials located let's take. So if pop back and I can come down on my client on the my locations. I'm gonna open my location. Go to the passwords and and this is actually where the credentials pool and the virtualization manager. Great. The next thing we're gonna look at. The global monitor settings. These can be override it. At the host level where the VM. Is located. In the global setting section on the virtual manager. So I'm gonna go back into this. Go in my global settings now looking at my monitor configuration. Then this is an important. Part here because we're telling their host and guessed this is how I want my monitors react from top down. So we don't we go after whose level or at the DMO. This is what takes president's. So I can come in here and I can see all the different monitors I'm running. CPU percentage disk reset. Memory usage. Bad these are for my host these are from IBM's. I can change some of the information. By just selecting here. And that's I don't want to be less than eighty and I wanted to be greater than or I can make these changes at this point. Or I can click on this to open up the monitor itself. And here you can see we have our operators that values. The The alert template. Which is you can see we have all to create an LT ticket. Out of the box by default. It set to default do nothing. So you can make them any way you want through the alert taken. Template and and you can add a message if necessary. Don't cancel that here. The same thing can be done under here no issues cancel that. Now let's look. At some other settings we need to use. So we looked at the global monitor so. Now we're gonna take at the other settings and that's literally what they're called. Here we're gonna talk about our history retention. Inventory general times. An RVM expiration So let's take a look at in the products. We've other settings. We have our history text pretty straightforward. Allows you to configure the amount of time that the historical data will be for these events. We can also look at the inventory and The period of time that determines when the probe will send a new inventory. Of that location to see if any new VMs and there. How's that says. Like it's 24 hours. We can go ahead and bring this down to whatever frequency. The last one here is your virtual machine expiration And really what we're saying is once the DN guests it's no longer part of a host. How long do you want it to be displayed in the virtualization manager. Before removing. Twelve hours. You can set this any So another we covered the virtualization manager main screen someone a global setting that's what we can do now. Is look at the host view. So if I'm looking at my host here. Again which captures all the virtual machines live on the service and I wanna get more in depth information about itself. simply double click on. This will bring up. Our host view. The host dashboard report on the health. Monitors dense storage and network information resource usage and information of the select items. commands can also be sent Such as putting the host and the maintenance. Restarting the host and inventory. And so. Let's take a look a couple of these options. So I can come up here. I can do show all should show me all the events this that on this machine. This can be a lot of information so you may choose leave that off. I can also resent. Inventory. This is important so one of the steps you wanna do when you coming here if you want to make sure you got a fresh said an inventory information. So if I select recent inventory. You can see that the command is pending. after a minute or so it will execute resent that information. Which fresh inventory information to our Another important step at the beginning once the installation has just taken effect. Once the pro. Is initiated we want to make sure that we go to the probe which we can do from the screen we can select And once or on the prove itself wanna go down to begin. Commands. We wanna do. Inventory. And we want to do a update configure first. And then we resent our system info. And last we want to do a LabTech. Update audience. Now what this is gonna accomplish. Is it's going to. Refresh all the information. For this network pro. And then it's also. Gonna give us the roles Detect it rolls. We it We're gonna have to make sure. That we have the VM manager proved Apply to this per machine that's the important thing and make sure that this all happens we're gonna review briefly again we talk about machines just But I wanna make sure you know that in the installation. You have to make sure that this is available. Okay great what we're looking at here on our host mainstream. Is the hardware health the monitor off as you can see we had a monitor that fired off. So rate underwear we can open the proved set in the maintenance mood or restart host. We want to view. Come under here and look at our hardware. Here's our processes. Power all over give different sensors. So we have all this information. And I'm looking here and I see down there are powers' answer. One of our replies. It's actually trip one of our monitors. So let's select this monitor. Something to take note of is you have this. Globe's style icon which means it's a global monitor. That's how it's been rate now. We did discuss how monitors can be override it. At the host level. And VM level trump whatever was set at the global level so what we mean by this is it doesn't over write anything at the global level it just. Allows to override it active yen or the host level. For this monitor as you can see here. It has a global style So I came in here and I want this. Operator value. Becoming one and not a zero. I would be overriding the global monitor setting here at the host level and watch what happens to icon uses. And here we see it is now showing computer icon that this is an override it. At the host level. I can save this and you could see it'll start refreshing down here and show a visual. That we override it is at the Also. The next thing we can do is just get basic information. On artist all general information is stored down here. We can get resource information for CPU memory usage. We can get our network in locations. Are stored information. And like we said we can also lower ends up here if necessary. So we just over the host view. Which could show or events. Are world status. host monitors which can override the global monitors. We can mandatory and we could show all events. The VM machine view which shows all the ends on the The DN monitors section. Which can override. The host monitors. An override the global monitors. Can be set this level So let's take a look at that. If I select virtual machine. Now I'm looking at all the different virtual machines and that on there that knows. In the virtual machine dashboard. Contains more in depth information on virtual machine specific to that machine. Export similar to the host export. But includes monitor status virtual machine resources and commands can be sent to the virtual machines. So as you can see. While I go through and I select a different virtual machine the information. Displayed is specific to one. So come back up here. The one thing that I can do which is really nice is I could open the computer. From the screen so I can select this That's gonna go ahead and bring up the machine questioned. I can shut down suspend or restart. ADM. Now a virtual machine that is currently not running or guess the restart using the start up options. It's the host intimate it's meant so we came back in the host that's actually. Set into a maintenance mode here. Then this would not be available. You cannot start or stop virtual machines until the host has been taken out of me it's better. Just something to keep in mind. But here we are looking our resources on our DN. We are looking at general information. On this guests. And we're looking virtual machine. Monitors. That are available on this VM as you can see here with this icon that looks a computer screen that we made an override at the DM level. So any change we make this level. Can override. The host monitors and the global monitors. So that's very important to understand the flow if I make a change here it over rights here to host level. And it will also override. The main monitor level which was configured here. Now we went over the U I we're gonna change our focus and start talking about the troubleshooting. So the first thing we hit on this already. When the network probe is established. And you. Want to make sure that you an approved use and the optic NT recent system into an update plugin. Commitments. So you wanna make sure you have the DM manager pro check via remote on roles. And if you want to let's take a local where that that is for refresh. So if we open up that probe. And we go to the tab we wanna make sure that we see like we do here the DM manager pro check remote. showing on the detect rules that. We also. Want to make sure. That it's The correct range. So as we go into the network group. We want to make sure that the range that we're scanning is gonna cover the range. For VM host Indian cast. Once this is established we're start collect information. It's gonna bring in some files. That are pretty important. So let's take a look at some of them file names. And will point out where they are. So files will be out the on the windows LT SBC. And a little plug in you're gonna see it is very important DLL file. This is the one that makes the magic happen. So we're having any issues in trying to get this thing work in the first thing you wanna check is make sure that that deal file was loot if not. You're gonna have an issue you're gonna need to calling for support. So how can we find that. We're going to. Go pro machine. We're gonna launch our follow explore. And gonna follow windows LT ES TC. Plug ends and we are gonna CR LT virtual monitor not deal well. This is an important file we just said the either. We could all of also go back to LT SVC. And a couple of other files that are going to be generated. Such your plug in the end all of which is this one. And this is gonna give you some good information. About. What it's detecting. From what I. Now we were to change. Any credentials. So one of the troubleshooting things we do have issue with. And it's a known issue that we're gonna talk about. So where to locate my host machine which is this one for us. And I go from the main through the virtualization which will be available. And I tried to set credentials here. Or an issue. With the credentials on the dropped out so this is a known bug. They are on top of it in the should be corrected. Urge you. To just do know that that is in their issue on because we did say you can set credentials. Remember at the global level. Or the recommended level would be at the location. You can further come down to the itself and credentials on it but at this point we have any known issue that were correct. Okay another thing is if I were to go credentials at a different level the one thing I would wanna do. For proper credentials. To make sure that they are saying. I could easily go to a search within control sinner. Under agents. Agents And send the command up bacon pig system info. that take up the plug it. Okay so that's gonna go ahead and make sure that we sync all the credentials anything was changed across all of our ports. I can demonstrate that real fast so we'll just go into our. Control center bull fine art searches. We will to agents. Will fight each probe. right click commands and then we'll start to send our system info. And we wanna do it in order so we will send hope they can take. Our system info. And they will go to lab tech. And we will do update markets. This would just make sure that all the synchronization is current property across all of our Very easy steps but powerful. Sometimes. You'll find out you have duplicate host. Within your virtualization manager. Now if had our classes before where that's an MP networking probe. We always get the question. Hey can we exclude a range I need to exclude the IP address to five. You can't exclude. Which you can it. So we can omit that range from the scan frequency. Said it doesn't look for that device. Let's take a look at that. I'm gonna go back into my probe. I'm gonna come down here to the scanned. And I'm gonna change my scanned again and one economists. That's exclude IP address to. attend that send out 01. I'll do it for an account of 203. Had. Course would remove this. And then I would come back in here. And do my range from. six. For account. And fifty. This would allow me to. Jump over. Or made it. QO five with scan frequency. So. Make sure. That if this is occurring for you where you want to exclude a certain range. From the scan frequency this is how you do we do there is no exclude button but this is. We'll get you that predictable result every time. Some other things to. Go over and our troubleshooting matter. How we already looked at the windows LT ES TC plug ins. We make sure that deal follows there. To plug in DM file we looked at. And there's an LT probe errors file that you fine. And that's what's being detected from what IP address and help you walk through if you have any issues. On the server itself we can go under windows temp and look for the LT AS This the troubleshooting file. Given there's a lot of information and our documentation which option you via. Go to as to sell them each patient. And or maintenance and road and restart. So were looking at the products. And we want to utilize. The maintenance so I'm gonna go into my virtual manager. I'm gonna be and let's say my. My host screen. And I wanna take advantage. Of the it's or maybe I'm in my virtual machine. Screen and I want to shut down or restart or so This will only work. If we're utilizing a paid version of So a lot of people would use a free version of the that does not give you functionality. To work with our its moods restarts. It's and that's a really good reason outside a whole lot about that you get with the papers. To incorporated if you want to manage sister act. So we're all gonna do now. Is we're going to give you a demonstration. On the ESX five point five version. So this process is only necessary if you're running this EXX. five point five. someone has changer SSL configuration. We're gonna go ahead. And run this demonstration. After words were gonna open up this webinar. To a question and answer period. With larceny. Matt read. So if you have questions go ahead and send When we're done viewing this him which again is only only viable to people that are actually using five point five. And has changed the SSL configuration. To either using five point five where you change yes and so configuration we need to. Tweak that so that our virtualization manager can still communicate. With news audience. I want to thank you for your time. And go ahead and watch this demonstration on how that hackers. Virtualization. Is fast becoming a must have technology. To help our partners manage these virtual environments for their clients LabTech has expanded its functionality for hyper visors. The virtualization manager is nearly plug and play for many types of ESX environments. And it supports ESX versions 3.5. To five point five. ESX environments you will need to make some changes to the SSL configuration. RB SX server. In order to take advantage of the virtualization manager. This video explains how to edit the configuration file for SX site five point five to accept communication from the virtualization manager. These steps except for different directory which is noted in the video. Worked for older versions of the SX as well. In order to edit the SSL settings you'll need a few things. You'll need a supported ESX server and you'll also need access to leave vsphere client that can log onto the SX you need to configure. Additionally. You'll need an SSH client you may use any SSH client that you're familiar I will be using putty in this video. And he's a free and portable SSH client can find at WW dot dot org. The first download listed for the basic version is fine for this task. Party does not need to be installed he simply download the small executable. And run it from the directory in which you saved it. So let's get started. You need to ensure that you have the SSH service started log into the host remotely by default VMware has turned this off. Let's double click the vsphere client enter your root username and root password and click login. After logging under the host. configuration tab in the grid view. New software section click security profile. And the services section. Click on properties to open the service properties window. Select SSH. Then options. And click start. Now you click OK to exit. And then close the service properties window. And minimize or close the vsphere client. Now you will be able to use to login to your host the SSH. double click the executable you've downloaded earlier. And when he receiving UAC prompt. Go ahead and click run. Ensure that the SSH radio button is selected and answer the FQDN or IP address of the server the host name field and leave 22 as the port. Then click open. Login as root and provide the root password that you use for vsphere. Enter the command CD. Space port slash ETC forward slash VMware. Forward slash RH TTP proxy. Then you may use the command LS to list the contents of this directory. Ensure that this directory has a got XML then enter the command VI configure got X and now. First we want to back up the original file. Suppressed a colon key to put the BI editor command mode then enter the command. W space configure got XML dot BK. To save this file. Use the arrow keys to scroll to the first set SSL code blocks. Do not edit this first section. And if you do not have this first section you'll need to re created to re enable SSL on your ESX server. scroll down to the second SSL block. The second has a cell block is a one we will need to edit so that the virtualization manager communicate with DSX server. Position the cursor anywhere between the SSL tax. Press GOP to insert a new mind. In this new line go ahead and enter the code block that is not displayed on the screen. Without the quotes. Paid particular attention to any capitalization as XML is case sensitive than he escaped he. And press call and put it in the command mode and then press the X key this will save and close the VI editor. Entered the command forward slash ETC. Or slash I N I T dot. RH TT. PP RO XY space restart this will restart the proxy service on the SX high server. And apply the changes that we have made. To configure that accent now. Now he may answer the command the go ahead and close the SSH session. Once that's done complaint. Has a current correctly configured to accept communication from the virtualization manager. Okay rates thank you for joining today's webinar. You can sign up for our support webinars at support dot software dot com. For additional training opportunities like becoming a certified lab tech professional. You can attend whatever camps please visit us on the web at upward dot com forward slash training. Thanks have a wonderful day.

  5. ESET Plugin Integration Support Webinar

    Fri, 11 Jul 2014

    The very first step to integration with an ethernet Is to actually go to the might not market place you can do this with a super admin account in optics server. It and it advocates tools. Mapped my fortunately I mine open and ready to go. Scroll down to the plug ins section. If it's a I Miami will not see it right no latest your best way ticket that's plug. So right here you're going to select threat from It's going to ask. Outside and then of course this is because of the eighty manager if you haven't manager in your X server. This is going to update it if you don't it's just going to added a new item over here. Click on discuss this going to take a little bit. In order to enable the ethernet plug in you will need to go to help. Plug in manage If you're spend dashboard is not enabled call him in this time going to make sure that you check it. Here's plug and you're going to check out. Can exit out. We want to see yes. Okay. It takes about a minute for this to load. I just want to ensure. That this true. True false that's exactly what we want but I'm going to do is I'm going to close control center. And reopen it. patent is is exactly what we were sixteen true true false. Once he have confirmed that you have an evil Isa plug in into LabTech control You'll need to go to your. ESET administrator console. Policy manager. If North America I you're going to see based TP policy. This is created by MA SP utility east any new policies that you create you will want to make sure our child to UP. If you are not in North America. use. An MSP utilities he can do this anywhere but for now since. ID use an MSP utilities. I need to create more Carmen policy on their base TP. Add new tell policy. This is called. Make and policy configuration. Okay so we aren't done with the Isa server sure that you click OK to exit out of the policy manager. Let's see half policy in eat rack he's ceremony in the center console. Finding ESET server agent in console can open that computer management screen. And noticed that you don't east that have yet this is OK to not panic. What you're going to do at this point go to inventory. You probably want to keep an island these commands are done. All of my complaints are done executing it so I am going to close. The computer management screen and am going to reopen. To see that that happy I had which in this case we can see it right With an exclamation point which is fine this is because I had a non I had any information. In it's going to go for here is my windows server information for that each sensor. We created are amend. In this policy it's only a it's what's going to connect the LabTech agent to the east database itself. Am going to enter my credentials. I am going to click He can keep in your commands over here. And once they are done. Which in this case they are he can go ahead and close the more time. Reopen it. If there are still any problems we're going to see that read In our air over here. It is good that I have an air because I can walk you through how it's Figure out what the problem so I am currently in the server. LT SBC folder location. I am going to treat a file called a text file. Called got each set in that could already tell that the columnists more than likely UH see it's not letting me create a text file away. Some just going to minimize this for now. I am going to a text file over here. Text documents. simply time AP done. It. I am going to paste this you know in the LT SPC. location. I'll go back to LabTech and I'm just going to click content fresh plug in it's. Once stunt I'm going to go back to my server and take a look at that him. We see that it has some content. See some years. Looks like credentials are good. But here's the main areas that I want take a look at this operation requires an interactive station. Any time you see that here it is Healy C excellent this point. You will want to disable U you can do it the registry server 2012 would definitely want to do it registry. So I'm going to open my registry. Yes. This going to be in H key local machine. Software. Microsoft. Wind moves. Current version. Policies. Once we get to it of course. And boom system can seeking billion. Anyway I'm going I'm going to set this to zero. And readily it's going to tell me that this needs to be this machine needs to be restarted. In order fourteen days to take effect some going to go ahead and that. When comedian has finished executing them going to close to you in time. Reopen. And look at that. No errors we can see one agent which is the only one ticket into my ethernet server and this was all because of UHC. Now I would like to talk about years that you run into issues amendment in in terms of integration with the plug So we sell one that's more than likely what's going to happen color it happens a lot viewing atheist any a lot of systems. Still. We are going to get an air. going to get a failure of course is our credentials are not valid make sure that you're using credentials that have access to program the allocation. In you'll see this reference here TEL error impersonation of a plug domain. Failed. This is the one that we just encounter failed and process start requires an interactive This article which can right over here. that's not ClickSoftware dot com. Four slash documentation forward slash. Knowledge base not slash article 5642. He can see right here. Walks you through how to disable Wi even server 2012. If you ever that look at that long in you see that the information is missing state doesn't finish more than likely it's because C. Blocking that communication from happening while. You only all sixteen. This right here. Can not be parts to what this means is can vampires to a policy description that spans over a single line. So in order to waste to pre salt back to school hand and make sure if you do health policy descriptions they only stay within one line. If you are an international partner server may be different that he here in North America of course. In a lot of times here list separated as defendant you must fix this in the server you will. Have instructions on how to go to your control panel and change status. To a that crater which this right here. Another problem international partners counter. Is it DS and missing so I'm just gonna go to 58 which is sent. Other article that talks about this issue. This company not have an MSP utilities which partners outside of North America do not. Send this article. You'll be locked federal and get that BBC connect created that. You shall leave it that gets created with and then list and it and that's going to be right here. Article and with finds 48. So apparently everything is working as intended. I only have one in my server and that's exactly what you're going to see. You should be if you have more than one of Allow more time at least up to one hour for this integration to get all your agents. Populated in this server information tab. The first portion of integration of the Isa plug in integration it's going to for threats to. That are detected in will actually carry over to optic and open tickets for you. Depending on how you how that. EV threat detection monitor it's going to your antivirus protection status. Which is right effort here and this machine does have installed so it's going to protect the status of This thread definition oppression. Anyone wants last time this definition was updated. Just as a site note this ESET pound is only available for view rain to super admin as any other user classes not going to be able to 82 C this ESET Also I wanted to point out that for integration to work. You need to ensure that in your Isa consulate eats it's her ESET mr. console. It an analytic tools. Server options. Make sure you click on this security use windows domain authentication. Click okay. And gotten past the first part of the integration the next part I'm going to be talking about is the policy integration. Which many do not mean I really want to emphasize that because it's a lot of times you have your own policies configured. Any fee to already manage your do you already have custom policies with your settings. Enabling them policy integration may not be a good idea for you. The settings that are available in that console. Are a lot more. Than what you have available. In the if you want to enable policy integration you have to to do so in the lab tech console. one of the ways it's going to be through the dashboard. Config. Configurations. And the very end AD policy. You'll only see this is the plug in is an evil if you don't see this. More than likely your plug and still turned So very quick note file system settings ever hear one of the options that we have an it. If you do enable it that you enable automatic real time file system protection startup if you leave this checked. Any times one when the machines to pick up the setting in the machine reboots you're telling it to disable real time scanning you pretty much disabling Something very important to user tools such as the product key got EXCE. Ten is on your telling ESET to stop the download. Of that type of applications so keep that in mind the planning on your environment They me take a look. In and about you what you turning on and off before you apply this in to a production environment. You also have other settings for here if just kind of go over any settings it has a manual enable. Definitely. Go over techniques for you. Also in the that console anytime that you have any questions about the policies I'll quickly show you. He can always open console. Policy manage and. If you ever have any questions of wide anything done it's. He can select it and you click F one. This will tell you what each setting But again this only wakes from console. So back to ESET policy in the dashboard. He can also set exclusions over here very important thing about exclusions. Only he version for when anti virus in security are the ones that can environment variables. I strongly encourage you to use apps in the past so you can have better performance better call com to your exclusions. You're going to see that you have of right of here so you have two options marriage. What this means is that there are other policies applying to the 188 and it's going to applying. All exclusions merge them into a single XM. All their writing it's only going to take a look at that last policy this specific policy it's going to win. Over the rest of the policies and only the exclusions here will apply. Make sure that you're to clean your LT SEC exclusions of course. I'm going to click on say if I'm only going to keep a file system settings. Safe. And okay. So in order to creek policies you seem templates of course study to your templates this is. In this case I already have. AD policy created but I am when I create one for that stops just double click on desktops. Antivirus policy. I get like a descent have one but I want to create a new one. I'm gonna and named this desktops. And see how it looks exactly like the passport very very similar. And that to file system settings and just gonna. Make sure that are turned Couldn't save my template. In this template I had like should be applying. To desktop strip. So my template is applying to desktop going to look at the desktops group. So I am in client have contract that might desktops template is the one that's applicable. In that forty. Very important with priority it's it is different from optic service on the optic service toxic priority. Highest courteous ten some servers is priority one. Or zero. And Wi don't know it just double click on your Atlantic agent. Go to effective policy. Glued it on templates and to not template. Is the highest still I'm going to sway it's. template. Priority. From nine gonna set it is something along the lines Same chords. It's kind of going impact that I CC that change just. So now I have friend might desktops template. Is higher. And that might rarity is actually zero rather than ten. After you've checked everything you'd set template I you already you already your passport policy. On the you can actually and the effect that policy tab on the agent in an antivirus policies that the theory and this is. Going to be kind of your kind as to what is applying when there. Unfortunately laughed does not Parse that actually ET used for your template. It's going to look very different in my said me. This one doesn't YX for some reason. But I have actually a three policies that are plain to this. Machines high exclusions I had and set to marriage that all exclusions for all these three policies will be in this machine. So in the end policy that we are gonna be looking for in each set is going to be 012. Tears at this gallery here is zero. This is one this is 12 in two. The one thing about policy integration is that it does not happen right only to you have to be a little patient with it. It doesn't stand Up the eighty become mean and every fifteen to twenty minutes he can not speed this process up it's not going to happen manually. This is hard in to this system and cannot be changed. So that already has been an update AD policy. I'm going to check my. Some confirm in my heat sensor. That policies where created in what is expected is that agents yet. The policies that where created in black pixel remember I mentioned earlier. Your policies are not going to have. The name that you assign the policy template itself but optics going to assign them assigned to name this one's the this is going to be that policy that I created. When you create policies amount techniques that if you use your own groups. Machines do belong in that group otherwise the policy is not going to be created over here. feed that 01 ticket to policy was created. Policy has associated with I can't see it right here. In the policy has been request and. On each so that's pretty much one integration in terms of policy. It's going to get accomplished for you. It's going to Ottawa flying machines to a specific policy that is why. My notes at the very beginning with the policy integration is very important that if you already manage your machines if you already have. Policies are assigned custom policies that are assigned to specific machines. Did not turn this on because we will take over. Because not only to create policies we create these tools and rules will police when whatever you have configured on your. If you wish to meet an AD policy XP templates of course. You can double click this content is qualities peaceful. And My testing policy. Keep in mind that I knew it from here anybody that's using that test policy. Will be on. Have two of them. The EX. And God EP policy template it's gone that's part. You may have run into the issue where you have created your template AB policies. In you have on your dashboard happier groups. Machines are assigned to those groups you have ensured that the priority. It's correct. But yet you do not see any policy creation happening in the ethernet remote administrator console the first thing you need to check is to that. Agent in This command to finish this command is going to occur every 1520 minutes left for a new policy creation. And depending on how many agents have a policy assigned to them that's as many commands that are going to be sent. To ESET a lot of times you're going to see that either there's Mike here and then it. Information do you have In more than likely integration has stopped working at this point a lot of times however everything seems to be working correctly. But when you go to the commands you're going to this has failed. You may see some errors such as a 3.5. Dot net framework it's missed seeing you know it's there. What you will need to do is just go to LabTech. Up the elegance. for the command to finish executing. Once the command is done executing. Give it 1520 minutes in contrast that this is exactly what it looks like if it fails you're going to see it in read instead. If the issue still happening. At that point you will need to be that the there a lot of times this happens because the server has been running for a long time. Thank you for joining today's webinar you can sign up for our support webinars at support dot software dot com. Please visit us on the web at that takes upward dot com forward slash training. have a wonderful day.

  6. An Overview of User Permissions Support Webinar

    Fri, 4 Apr 2014

    Hello and welcome to this week's support In this week's webinar focusing on an overview of user permissions. Before we get started I want to make sure that everyone is comfortable with their virtual environments. In the navigation control window at this webinar you have the ability to ask us questions. We're going to silence all communication during the webinar and questions window for primary interaction with you. We will conduct a high level overview and technical presentation. And it a demonstration followed by a live Q enact. It is recommended to use in your questions as you have them. So if you have lab tech subjects in the future that you would like to see support webinars. Please send your webinar topics. To training at software dot com. Thanks for joining and let's get started. I would like to introduce our speaker for this week's support webinar Anton So we're gonna focus on user access. And We're talking about user permissions. This is gonna be an overview information. First thing lets get it very basic question out of the way. Who is a user Where they do. That's user going to be your technicians. We you can have varying access to the labtech control center but they are your technicians. So real that we're gonna understand that. You know we may go out and get a new client. But we're not gonna create user for that client. And we are the users that and their us to support their network. Every person. That will use the labtech control center should have unique market. Okay this way if you were part ways technicians. You can simply changed the password. That way you still have all of PM user permissions you want set for that person. He changed the password or username and you can bring some into that role. You can lock down user permissions based on rules technicians We can also provided detailed orchard which we'll talk about it's short. So let's take a look at the first parts. So when not managing your technicians. What are we through user access. What we control permissions for the controls. That's the main part We can also control permissions. To each group. Which you demonstration and to Which makes it very scalable. When you're dealing with different clients. To providing. Different servers ticket configuration. Alternate. So let's take a look at the first part user permissions. Permissions are set by user classes and So basically saying The permissions. That apply to user. Are also be Meaning if they had. Read. And they have right by two different user classes they're gonna combined so that that user can read. And the examples that says that. So first try to create user we're gonna go on there Select users. Right click. And say at We're gonna information. Which. create one on my user genes. I thought all the information that's valuable pertinent for this use. for an example. Here on the permissions We have the LT admin user class when I like this class I could see everything that this user is equal to. Now we were just talking about how permissions. With users can be communicative. So what we mean that is noticed that LT had user class does not have the security class can box. If I were too likely. At the bottom I can have I can select secure configuration. Which is a different user class built into the system. And then when I highlight just that one we see that he doesn't check box. So to point to make my point I can select effective permissions to see exactly. The combined permissions for these user classes. And law cnet's tech here all the availability of the LT admin. And then we also have the security configuration. When we CD affect production. That's great let's While this is a If you right click and delete a user class it will globally. out of the system. And achieve this. So what you want to do is double click the user class to remove it from the user profile. So I bring it back up. What am talking about okay security configuration I mean mystique. I want to remove this I right click delete class because that's. Normally how we get rid of things And any program but here if I were to say how would that really delete the security configuration. User class out of the entire at Texas. Don't think you guys wanna make that mistake that's gonna clothes out of that. If I made a mistake by adding simply double click. Now it's call but it still available by right come back down here still available system. If you fine. That the LT great but I do need just a couple other check boxes I don't like him to edit reports and so long remembered you can always right click. And adding new class. Basically creating own user class I've already created so come down here test. You can see and I highly it is easier just to check boxes that I had it for its class. I can I can double click the remove it. Or if I didn't want this in my system and all I could right click and delete that class which removed from the database I'm just. that question often and this is well. made a mistake and I did. Highlight this right click and I leave the class altogether. Is there way for me to know. What that class and and well we can't as of reproduces. But we can go to our documentation. Should you rate now. And here you have permissions field and descriptions. So if you come all the way down you also have a matrix. Of future classes so you can simply come back look at and follow what's been checked. Okay reached or support documentation. Number eleven user management. User access. Next look at some other use permissions. Allow web access. What is this used for. Access the web controls. So you can. If illustrate. The only way that I'm able to reach the web reported here. And Logan successfully. And now. Seemingly getting gears allows you to navigate through the web controls Americans locations certificates callers. All type of things here very helpful the download control center itself often meet page. The main point businesses. If I do not have. An web access checked here. For my user permissions will not be able to that website. Next is the allow tunnel. This allows use of commonly when troubleshooting managing the places and it also. miles due to log in from any laptop. And to the control center. So if you're out. As a technician you're out at a client site you use controls that are obviously don't have the servers skull laptop you can use. The control center to connect to. The actual circle texture and view all your information so this is very important all your technicians that The party's ticket security. And bring them back up the chain. If you select ticket based This user will only be allowed to work with tickets that are assigned to hand. This may be good if you have a high level technician. He never really deals with tickets to older escalated out of the regular level one level it. If he has the selected and he goes into the second looks and tickets. He sees my tickets now he news tickets that no one else in the company can handle. And that way you're not small and him with regular level one level it's just an example out Dashboard imagined settings this year allows for us. Back into the system. If that's checked in this user can access the passport. Which has a bunch of global settings for labtech. If he does not have any access. Selected. And user profile here he won't be able to. Access and manipulate anything in the passport. That's we're gonna look a command level. And here's a good example. Say you to technician to be able to sync commands to a specific machine but not all the commands. Let's say and this is definitely hypothetical. You're technician accidentally repeated his server in the middle today. Not good thing clients call on their very upset and you wanna him to be able to send commands on a consistent basis. But you also want to make sure that never happens again. How can we view that. Will focusing on this command level here. So the command level for this user is sent to. What does that tell. If I go into the system. I go on their dashboard. Managing it. In remote commands. These command levels drive. Of these particular actions so go down there are enough order to review. Hello. That's a level three. On the print out my. frowned user here review we don't want him to make that mistake again he would need a level three d.s so and he only has a level to that degree. That's the way want it now let's let's try assault for another situation. Let's say. Okay I want on the scale level to. But I also don't want any of my level two people to be able to So in this case in this would have to be global keep that in mind when you make a change in that for all users. But I'm comfortable with changing it says that when someone with level three. Command level can do promise that it. That will make a change directly to the database. And now my user. James Brown command level two will not be able to run for it. I'm gonna switch that back. And that should give you example. And here's a screen always looking at the command level. In court leaving that to the dashboard which is on their management remote commands. Now we're looking at the user group. That sat grouping clients The primary clients that is really gonna do one thing and that's fun bring forth. The clients that you deem more important. Than other clients. So let me give you an example if I switch over to my system. Patents. You see here. My groups in clients unable to take all my available clients and put them over into my primary clients so here I only had the I feel good That I say is the primary client what does that really gonna do it well it's like the clients. I can see both clients right now. If I right click and say limit to primary clients. Okay I just One of my clients but maybe in your example. Hoosiers are successful you have a hunter clients so you always keep 25 degrees as your primary. If something goes wrong rolled out and it's not the correct one while I wanna deal with my primary clients first. They obviously have the gold service that I provide well that's how you can to separate and very quickly visually by adding them again. primary. List on the site. And that will limit your view. Over here in the navigation feature. It's you can see go back and uncheck. And if I had fifty more than almost. It does not and I'm gonna repeat this. This field here. Does not. Allow. For what clients you when you can't that is taking all that information. Is at the bottom group membership. So if I go in the my user. Noticed James Brown has the I feel good client. He does not have the tech demo. So in this example. If I were to hold out as the admin them augment and Logan has gained brown. I would and that nearly always TV I feel good client I would not be able to get Atlantic Or any other clients would my system. Now turning on already. For the user. So it tracks. And monitors user actions performed in the controls Why do wanna do this. let's talk about this class. I try to tell people it's not a micro manager technicians. you may have Warren Atlantic and you wanna keep on call for 23 weeks. Which is really useful for. It is liability. Here's an example. You get a phone call it's what are your clients and you doesn't mean it's an exchange server on the site yesterday. And last night the thing blew up. Now you know this happens a La Apple's say hey you were in my system with QQ. You do you calls this happen or you can affix it. simply telling professional Sarah was in your machine. I can not perform any thing but it daily routine check up I can show proof this because all all my trials. And that would keep keep you out of hot water. So how does that happen. First look at the user. Go back to permissions in the audit I would recommend leaving it to everything. It's over right itself from the database after some. Weeks you can find makes occupation. But the everything what is it what's it gonna do it's not very detail but it's good enough. If we come in here into the forward. Google already. Lets say I select does do a lot of work and all actions. Now like it's the analogue in the time. Here you can prove inaccurate and out of that machine and that time And and just that little bit of what the actual user. Notice that says reversible so I went and and modify tapper template. Can be reversed yes if I hit on the records and undo whatever change user performs. So it's a quick way. To go and Alter your technicians often didn't seem right he was session. Let's look at this older. Window oh needed modify them there. Here's dealer ED software to exchange sure on your So I've been a little more into the actual permissions in this situation. We have. The general permissions which we set by user class so we we looked at data for right click and at a different one seat is not user. And we can see with easy. That's great because that's what the users can view and the system. Now I have the LT admin which can do all this stuff but if I want to make sure. I'm gonna go into the system. And I'm gonna go down to a client from the group and I'm gonna go to permissions tab here. And I'm gonna say for this specific client. The LT can normally dual ports so he can. Sniff the network traffic but you know at this client I have an agreement that says we will never do that client's network. Just anything else he also wants to edit monitors now offers not for supply. Using can we have very strict issues. I received its. When I say this. It's only gonna this LTE end user class on this particular client. Have tiger to another client and I opened up LT and then after a change fees such as delete monitor. of the LT demo. Permissions. LT and see still available. Because it doesn't copy through. Packaging in the second. But just to let you know you can get very granular. OK the LT yet can do this and all these clients but not on this car. To help this user can do all these we can add more dispatcher again you don't want double click. You get rid of it. The same goes with groups. So when we come down to a group. And were inside of a group I can go here to the permissions action. And I could say okay well in this particular group. The LT had been should be able to information. Sniff the network. Access command prompts in so and I could see that here again. What abilities this user class has at this particular group. I can open up any other groups and changed this particular LT to do different things and reports. the scalability is huge and that's program. So not what I said that. I'm gonna show you a trick which is worth the admission webinar. M gonna go back to my slide. To Copy client permissions. So we just looked at a client. Cleans itself. I'm in the I feel good client in the permissions action. I have all that stuff going on remember how I changed this well we when I change this does not reflect the scene. Atlantic demo. And I here and you can them delete marks itself. So what I'm gonna do. I'm gonna attempts. Now we change that I am going to produce. Copy and one client permissions to the other. I'm gonna open this back up permissions I'm gonna highlight this and I'm gonna show you that there's no deletes checked here corrects. On the at demo. Permissions. And I'm gonna check please. safeties. And we're gonna do is make sure that took. An case everybody sees this so what I'm gonna do. is I'm going to follow these directions. First thing. I'm gonna provide permissions that are standard for all clients and this is how we can do that I'm gonna right click on the client that I want to copy. And I'm gonna say clear all permissions. it doesn't sound correct. But this is the next one will come in here. And I opened up a client right click on this I today. Clear all permissions it's gonna jump up and say clear permissions for all clients but this one. Yes so that means it's gonna clear Atlantic and no one surety that. Now I'm gonna right click back on the same client. And I'm gonna say. Copy permissions. It's gonna say copy all clients without permissions. Of course because teachers and Tennessee yes. Now. down. I'm gonna open up feel good client I'm gonna look at the permissions. But nothing is selected like shooting now I'm gonna look at the lab tech demo. Permissions. Nothing has selected is what happen. It inherited it. I copied from I feel good I cleared all permissions still take them out and then apply to permissions that client. did that there are several hundred clients. If you have fifty clients and forty problem finally the permissions. It's better to do this approach could change the five in the goes through each of your client permissions and change Mac. I that was very helpful. Most partners believe that's very helpful. Said review. What we talked about today was used access. Is really created through user classes. That tech can edit user command levels. On profile to restrict them from being able to send shut down connects. So we're talking about is we can use the command levels in the passport. And the one on the user profile. To manipulate what type commands user consent. We just illustrate the copy client we can copy all the permissions from long climb down that tree. Also aren't. Already for user a lots tracking and monitoring the user actions but what else is it do. It coverage you in an instant. Where clients is of basically point fair chase and you do it it's not the answer is when I inundated. Here's screech out of this and you can see that formed outside the scope. And we also talked about client group permissions. K allows you to get very granular. Because in each client that you have that you can have that LT admin user class performed on each group differently. Okay I hope you find this very helpful. Thank you for joining today's webinar we support webinars every Thursday at 2 PM eastern standard time. You can sign up for our weekly webinars on our support website. Find this under weekly support are heading at support dot labtech software dot com. If you would like to view past support webinars or restaurants today's webinar. You can find our support archives. Also at support dot software dot com. Thanks in have a great day.

  7. Computer Management Screen Part 2 Support Webinar

    Fri, 7 Mar 2014

    Welcome to this week's webinar. My name is in teaching and I'll be doing the computer management screen part Q. This week we had a lovely error an Albertson's which did part one. So be you catch that on and you'll see how we are pretty much covering everything on the computer time. Okay so that's said that's to operate in and take a look at the computer screen. What the computer screen open I'm just gonna mention some parts that mention in the previous support. And some of them being in are simple check in times every time in machine checks again. And if it's non master it checks and every five minutes. If it is a master mean has this checkbox it'll check in every thirty seconds. When that occurs it will report its memory usage and CPU so that is what seen here. With that said. If I want to know. Basically a snapshot on show history. I can bring this up which is then going to utilize. Every check in for a single day up to 12 o'clock. AM that day so what I mean by this is every five minutes like we said thirty seconds depending on master not. will report your CPU and memory information. While the each day stitches on sixth when he 14 at 12 o'clock AM it's giving you a summary. Of the actual. Memory usage and CPU usage for that you can always find that to see how your is being. here on the show history about. Moving on we can always see. The contact information as we show here. So in the contact information we have James Brown the in the contact. For this particular agent. And we could change that by selecting a different user such as Dave Barnes when ID seeking information change screens. we're gonna show you later. A cool trick on how you can have your contacts remote into the room PC. Without ever making them user LabTech. Next we have our basic information such PC Logan information. And lovely she went over the information on how you can switch between one user and another so check that out part one computer screen. The network information this is very helpful guide for you guys trouble your IT text the other thing about all this information you see on the screen. It's not just information. Can be used with searches. Searches are very powerful to to. So I just want to stress that that even though you'll see. Some tabs which we have information information. They can be searched upon. So I can create a search. To say hey anybody from and insert router address. And apply them into a group in the it's certain pieces for anything you can dream not that much. Okay down theory government enhancements if you're not familiar with me Let's say I'm a technician I'm called out to site and I need to start my computer to fix it. Well one of the main things I want to do it's come over here to begin button. And I want to do. Because what that does it silences. Any monitors that would be running against this machine when I'm working. I stop a service and let's say the service monitors looking at this machine. It's color fire bottler created ticket to whatever you haven't. But that's really because on the technician working on this machine. So it's good practice to set the machine it's what do it'll change from late green light to a red And that will the value. To suppress. Alerts and scripts. So if we do that you can see alerts scripts or both. One thing you do you want to avoid doing is making sure you don't select. Both of these. And it's safe that will literally cancel out the means you have to select single selection here so it's everything I want to suppress alerts and script on this machine. I'm gonna go ahead and select everything selects. That will changes indication light from agreeing to a now allows you technician remember. Let's go ahead and take it out of me it's and then again. Now once we're done but if you do for it. Not that she would because you guys are excellent technicians. But if you were forget it would stay in maintenance for people sixty minutes and in the machine com Adam it's. And actually wanna bring your attention to do is these boxes these checkbox some you see great out. While we to talk about the master computer thirty seconds. Or five minutes. Network probe this allows this machine to be network pro which gives us that network tab. And it always uses the local system account that's why this is checked but you can also see let's say that this machine. Was community rebuke you could redo needed. Let's say we lock down a process. Which would initiate well. In this checkbox checked place you could see some of the state of how that machine's eight. I recent. These check boxes. we have OS and bios information again a lot of this is just informational can be utilized for searches. And this one is also very very good powerful here's a power profiles. So if I need to go into someone's machine. And changed the power profile because they want a high performance not a power that I can change this this will take effect. Within the next secondly when sends its inventory information which when they reverend part one. And then we have or alerts we can displays many alerts as we like or as is. In this you alerts have been fired off for this particular machine. Okay here's a list of some of the objectives where go over for the computer management the first thing we're gonna talk about. the effective policy And what the of policy tap does. Is allow you to see. A cumulative. Capture. At the behavior of that each so all the groups. All the templates that are applied any schedules everything that you need to know. Why is this agent behaving this way with LabTech. So let pop into the system here. Open up computer screen. And you can see I have the effective policy tab open. So when it comes up you can see things such as join groups that are applied to this machine. The templates. And any time if you wanna know what this template to do and you simply double click on the tablet. And now you're bitterly accessing the template that's controlling this machine. So you can see the branding is like. access button. And a lot of other hopeful information. When you're troubleshooting page. You can spend a lot of time on the screen. I do you suggest that you take your time and work through it you can see all the monitors that are applied to your internals. Your remotes. So remember if you're having an issue or you're just wondering is that remote monitor really being applied to this computer out take a look. Is this script running on this machine take a look how is the patches via. So this is a very important the effective policy I believe up on part one of the computer management screen if you select began. And you select this edit configuration. This shows you any template. Form. same thing in this effective policy to. Please don't be confused by the edit configuration you do not want to ever come in here and meet any changes. Template if you make changes here it'll literally just being written back over by the group. And the groups will always refresh every half an hour so you don't want to make changes to this. You want to make sure that you're making changes. On the target template. Or group if you need to modify behavior of that Another thing we'll look at. Is how to download a file. From your LabTech server. At the LT share. And put it all on the machine. So if you have a file that you have transfer directory on your LT share your server that server. You're sitting on an agent and that has the old drive Matt that's very important. Then you can go ahead and utilized file down. Mention that works. Just put it back to the welcome screen. can be and commands. File. And download far off file from LT share. Okay because I have maps on this agent. I am able to come here's my LT share I'm gonna highlight the file I want to download and I'm gonna select. This is Through the windows temp folder. Of this machine. So if I open up this each machine. decent virtual. I can go and to the directory now. And see if that file is visible. So I navigate to the scene. When there is temp folder. When I drill into it and there it is. Here is the file that actually. Download it from ILT share. And you might each and to my target to be very helpful for our. I'm sure you have a million reasons why we usenet news and utilize this. The next thing I wanted to discuss is the you can might tap the tab on each of LabTech each. Now you know you must be familiar with a little bit but let's go ahead and take a look at all the things we can modify. With the so flicker to the And I come and create a way we can see a lot of different things that we can we maybe silence on information searches. Hardware sensors about something monitors that that to fire all that it is not applicable for this machine. But you don't want to take it out of certain group because it's other. Monitors it from the so let me show you how we can do some list the first thing we know Israel that that is boarding complete. This means that this has went to the on boarding process. has grabbed the machine and placed it into the proper groups according to. So I came over to the computer role in let's say for some reason when this was all it showed it was a file server. It may also show it was a web But in my case. This machine they had some IS running on it for some other reason but it's not something I want to monitor for web server. So if it comes up and says hey I believe this role is part of this machine and you know that you're never gonna need monitor that role. we can go ahead and check this. wants uncheck you have to make sure anything you do and is there you select C additional information. So if they selected these two roles onboarding process. But I don't feel. And I need to monitor these rules on this particular machine ever I'm on on C additional information. That is the only thing it's an all out these anything on this screen on the night. You must select C additional information to captures your tweaks. I'm gonna set the exclusion this when you wanna paled on more tentative. Because you actually can do a lot of different exclusions. I have a monitor. Come and I don't want that monitor they're all want this machine never your monitors so I'm override to monitor I can disable sensor monitors. Some partners have problems with monsters we understand so great here on this particular machine. I can disable sensor monitors performance. The single server role protection altogether. So it doesn't come back and tried to do anything here which server world. computer models. Or how about health check. This particular agent is just a file server I don't too many things with that I don't wanted to be part of my my client health report. So I can check this skip health check and that's going to exclude to select this tab says for the health report so that's important. Valuable to fix overrides. Let's say that this machine can never be repeated. We don't want to make sure that if there's a script sentiment that says after your done reboot his machine that does not occur because this machine is very important. I only manually does she let's say high end server. As you can see here checking this box will stop the extreme beach on this computer. So this is a way and they you can still have this machine part of a group the maybe some monitors you'll fuel. I don't want this monitor repeat his machine but I still like this machine in this group. This is a way you can how to work around. And look at all fragmentation. Okay auto fix restart service wanted to restart service And you have the other ones come on fixed sites and fuel bad process. Will now the fake script to kill bit processes. That on this machine. To take your time go through these and you'll probably find some scenarios where there's really gonna help via. Now we have the monitoring override four cent dollars. So by default it's to create a ticket. So may I still want to be alerted about sensors on here but I don't wanted to create a ticket. I just wanted to reseller. I can select fat or. I find out I don't want to do anything. and compensate the nothing. Now not in any noise anything from sensor ports. Patching. Same idea. Maybe this machine is part of a group that that gets the IE eight. The I. So I can select this checkbox again additional information and anything that I And that automatically puts it into it deny group to the IE nine it's never be applied to this machine. Before you You cannot add to this list and I. 1011. That means LabTech that that to these extra data fields that There are ways you can create searches to deny IE eleven IE ten and you have to do that cost them with with yourself. And you can now. You know read about searches and look that. We'll give you some more information. The other technology and it is here is missed patch wonders. So this is not configurable. It may look like it as you can select four and so on but this is really. Get sent down from the location. From other locations. This Egypt launched in this is really informational purposes we do not want you to change. This window at this. Overrides. Talking about patching disable automatic patch install. Disable all patch approval maybe this is not a machines patched all. Exclude installed that is so you can get you know pretty flexible which like here. Okay I that was very helpful a lot of partners find that that are helpful information. The next I'm gonna look at. Is creating the user. I know everybody gets and sales and now we have that. Media at the dentist office constantly and herself out. computer. Can line and it's like every month. That's okay because your technicians it's easy quick ticket form that show where that is. Pop back into the system. Now it's not located and probably the most intuitive it's the hard work. So over here a hardware tab along with all this hardware information. You can use searches and utilized searches are accuse. Reports. You're processors so on under here you have your user accounts. The cool thing about user accounts here as you can right click a user accounts such as this when seven user. And you can. Change the password from here you can unlock the account you can reset a password. And this pretty you can make an administrator. So this particular user account is not an administrator but you'd need to freeze the level. For that particular user to have access you can do that by selecting S. Now be careful when you select that make administrator here. There is no right click and didn't go back. So does is a one way highway here if I make an administrator. I would have to go sending that command that level of user back down level administrative credentials. Now the cool thing I can do here is simply add user. When I add a user. Warning the user account And then we will put any nifty password. It's gonna he repeated. The other thing if you were utilizing a domain controller here. And we were on the hardware tab and this is a domain controller tied to a domain network I can create do mean accounts. Now they're gonna have to follow what ever complexity. you have for password settings user accounts. You know if you needed capital or Albertson's So that's something to remember you could make a couple user accounts in domain. And that would work test that obviously. user account name webinar. So we're gonna allow that to create in the background. And we'll go in and checked that in just a Now when you wanna refresh you can select the hardware here. Can't by selecting these tabs and up Monica murmured to commands tab. And it's gonna show me add user so rate now we know command is being sent to that agent. And every time I can highlight the commands that that's kind of how we refresh and here on a months and self on back on the hardware tab. I'm still waiting for my and out. So we're gonna go ahead and let that take place. And we're gonna move on. To another. Example. Which is locked down a process. This is a really cool concept. When you lock down a process. Why would we want to do this. You know that there are some stubborn viruses out there. You're trying to fix the buyers and at the same time this process Keeps trying to recreate itself and you're having issues will LabTech will allow you go to the processes tab. Like we do here. And locked down. A process. So with my calculator running. On the aging itself I can then go back into the process that. And see. The calculator process actually working as it is now. So we see that it's actually up here and it's working Americans do anything I want to do with this calculator. And what I'm gonna do is lock this process literally canceled a calculator from from. Actually And will not allow any. To start that process for calculator. Until I. Unlock the process which again would be very helpful were trying to troubleshooting malware or something buyers. So I'm gonna come in here I'm gonna uncheck calculator right click. Lock down process. When do you that it's gonna send the command through server down to the agent that says hey. A slot that process which you can see now every that I go to my commands and I can see how it's So while that takes a second let's go back to our hardware tab and see if we have our webinar. User created and its. So we have created the and our users we simply do that again might is right wing add users. It send to command down to the agent Egypt now has. A webinar user available for on that virtual. Can't let's go back the process Let's see it's to command executed. Successful locked down so that tells me that if I go back to my virtual. I should not have the calculator available. Which we don't and I'm gonna go ahead and attempt to restart. So appear calculator. It's not that media anything I can't come back here calculator. So there's a process or for whatever reason you wanna stop something like that from occurring in model how for a particular user. You can lock down that process and that will completely lock it down. It to you unlock it. So that's another one that you don't want to forget about because it would stay locked down to you figured that out now I go back in here like I said in the beginning. welcome screen. I'm gonna see a check box here there's a check box lock down. So I need to go back in the my process that. I'm gonna it's already right click and I'm gonna say. Disable locked out. So now I'm allowing them processed small. So in the real world maybe I fix the situation that that virus keeps attacking. And I can go ahead and allow processes to start respond to two or three I can't again. Okay lockdown still processing. And I'll show you how that works and second. The last thing I want to look at over which you So in the beginning. I said that I would show you how you can have a contact. Connected to an machine. And allow them to remote into their PC. Okay so we can. Not give them a user account and LabTech because that's one thing you want to really try to stay away from if possible. But you have this one. User. That just demands I need access I access parity pay you guys you do it. And there's no licensing problems are need. So not to get all subjects but you know contacts and mean we use for sending alerts. You have global contacts. Considerate top of all the different clients and you have location specific contacts. So if I pop into the system here to say you sample. Here's my contacts the ones that sit above my clients my global. So it is Alberts so cleverly named. Dave Barnes call technician so these guys global they can be called anything here. And then within a location such as the I feel good good and double click. Whoever we select here. On the dropdown our location you'll see invisibly there you can also have multiple location contacts rate here. And only have one. So if I go into that machine. As you can see here we do you have artwork and manage humans round here's the contacts. I wanna allowed James That user to into his PC. Have to do three things we're gonna and now. The first thing we're gonna have do. Is we're gonna go in that a contact itself we're gonna put an email address and we're gonna put web password. Must happens. The second thing we're gonna do. on the permission tab you'll have all the contact itself we're gonna tell them what they are able to do Wednesday. Remit and PC. The third thing is what I've already you. Make sure we drill down to machine. And we select that username rate here for the contacts. So let's take a look at the system. I'm gonna come and I'm gonna go to that contact. And I'm gonna make sure that this contact has an email address. Is case sensitive you know in the web controls that are. And a web password. Okay so this password and this is crucial. We select permission tab and we say what are we allow this person do when they reach into this. PC. Well or at all it shut down. In DNC. I'm not gonna allow this person it's not a user LabTech to mess with tickets. I'm not yell at them mom installed agent god forbid I'm just gonna let them to machine shut it down and DNC ecclesiastical work and audience So what we do then as we launch or web control center. Okay well I won't. Launch my web control center and this the new style looks great and I'm gonna go ahead and enter that name is I did on the contact itself brown. It's actually. And that strong password I have which is. This work on steel. I'm getting long. Now when I do this. I'm gonna scroll down here to computers and he's only gonna be able to see his And I'm gonna select that it may look like you can't select it that you can. And it will. Remote end that PC. I'm gonna select computers here on the left hand side. And that I'm able to highlight that single machine. Over here on the right toolbar. I'm gonna be able to Remote into the PC shut it down refresh. Okay. Again there's nothing about creating tickets. And I didn't them certain permissions that Google So this literally gives you a snapshot of house computers running and that person to boot into PC. Using apps. So that is something that they're pretty much held at all on I want my BC I don't think the picture you can make this happen. You don't want to probably advertise that out when you first went to a partner or clients are. But she do you wanna know that this is available for. Some people if the original site technician. They'll create contacts. Technician. And they can actually go in the each agent drop that down now in the get access into their PCs this way so that help. Okay. So let's go back and just check on our process list come back up here. I'm going to refresh the screen and notice when I do there's no more check box here lock that. So the down box says that I'm able to start out there let's make sure that took place commands to check. locked down that stops so we have an opt out issue. You know in my virtual. And we are going to you. Restart the if that system that stuff. I fire up that calculator no problem. Functions fine. So that is how you can. Do a couple things let's take a review what we actually did today. So in this webinar we actually looked at the effective policy tab. That's very important because it shows you how that machine is behaving groups are being apply templates anything you wanna know about Should be an effective policy to very good for a flat. We have the file downloads that we downloaded a file from our lab server 288. Maybe there is an important file we to get on that machine and that's just one way to do it if you look at computer management screen part one and other ways you can. Drag and drop files and she just want to cover. We then went into the A lot of useful information on the It wants the on boarding process is over night please group's media found computer ruled you don't be applied. Examples. Simply selects. That check and additional information always hit that additional information at the top. We created a user eleven our user here if we were on a domain controller we would have been able to create a domain account which is very We lock down a process we were working with a stubborn virus camps point process he couldn't get it clear out so we blocked. We went ahead and everything we needed and then we have to remember to unlock that process. The last thing we did. Was simply. Show you how to create a contact. That will allow into their systems. Should you have where the contact close. What permissions you wanna assigned so that user gets that machine was connected. And last make sure at the user itself. You select that user account to the contacts. Thank you for joining today's webinar we support webinars every Thursday at 2 PM eastern standard time. You can sign up for our weekly webinars on our support website. Find us under a weekly support webinar heading at support dot LabTech software dot com. If you would like to view past support webinars or restaurants today's webinar. You can find our support webinar archives also at support dot software dot com. Thanks and have a great day.

  8. Computer Management Screen Part 1 Support Webinar

    Fri, 21 Feb 2014

    Hello and welcome to this week's support webinar in this week's we're going to focus on line at the computer management screen. This is a two part series this is part one dot. We will continue with the part two in the following. Thursday. So before we get started I want to make sure that everyone is comfortable with their virtual environment. In the navigation control windows at this you have the ability to ask questions. So we're gonna communication during the webinar and use that questions window for primary action with you guys. Ever gonna do is I am going to content to act. A presentation. Will pop into the control center for a live presentation. look what we just discussed. And then followed it. With our live Q a session. We have our support specialist with us today his name is Brian had a he will be here. To take your questions. So go ahead and submit those questions and our chat window ask you have them. If you have requests for feature webinar topics please send us email at training at lab techs dot com. So thanks for joining let's get started I would like to introduce our speaker for this weeks apart webinar myself. Albertson. A day I now trying to calm down it's very exciting are right let's get started. about the inventory schedules. So what we're talking about the computer management screen. Inventory schedules become very important when we are referring to the latest from the agent. All information like software running on the agent services running reported event logs X that are all of this is reported from the agent. Based on schedule. It is this data that directly feeds our internal monitors. So it's important to understand and agents inventory schedule. And how to access that on the fly for an individual agent that We can easily see that's from quick access toolbar at the bottom of the computer management screen you see a beacon button. Under that begin button you can access configuration. configuration. Is going to give a cumulative. View of all templates. Being sent to the agents. There are three main. Scheduling templates we had the desk top template that laptop and the server template. Each one of these houses a different type of inventory schedule. Saddle we can also manually past inventory commands down to the agent which will update the information we are viewing as well. In fact when we open an agent for troubleshooting purposes. You might want to start with passing inventory commands so that you can start working with the latest agent And here's what I mean let's pop into the control center. Here we navigated down to our client into location. And let's take a look at this machine. So. When we're on this agent were starting to troubleshoot maybe I have a bunch of alerts I need to resolve. That cumulative view templates. Is found here begin configuration. Again this is giving you a cumulative view of all those templates being applied to the agent. Templates controlled the behavior of the agent like. Where my checking in to. What kind of branding in my patching windows when am sending my inventory items ticks that are. So we come over here to the schedules tab we can which template. And if you those inventory scheduled templates are referred to where the desktops. The server and the laptop's. So here you can see that we are pending to the schedule if I select edit. I can see how often an agent that is detected. As a desktop. Will send me their information. So I'm concerned with troubleshooting processes. Maybe I'll take a look at the schedule and find out when the process list is being sent. Two are not server from this particular agent. Okay it's being repeated every two hours so every two hours I'm going to have updated process information for this particular computer. So if I'm troubleshooting a machine I don't want to have to wait two hours in order to that information. I can quickly pass inventory commitments and these inventory commands are basically. Telling the agent to report their information back to the server. So using the example of trouble processes running on the Maybe to ensure that I have the latest and greatest processes running on the agent I'll pass the and processes inventory commitment. Now when you select you can come over to the commands tab and you can see the status of those commands being passed down to the agents. Once you have a successful here. You know that you've got the latest and greatest process inventory and and you can come to the processes tab and to troubleshoot. Tips and tricks so. There's tips and tricks that I like to go over simply because god they're not really covered in a lot of places and people always seemed to like them. So the first tip or trick. RF eleven. So if you're. Got a computer management screen open may be. You know this particular location has fifty agents. you don't wanna sifts through the navigation tree you want to see where it resides very quickly. You can hop. And happy clients. Location. Expand it and when you the computer management screen open if you hit F eleven see how it's highlighting in the navigation tree. So Apple Levin is just going to be able to show you how you can quickly access particular agent that you have open. Within your navigation tree. The drag and drop desktop to desktop. This is critical. So you have the ability. Two when you have the computer management screen open on the welcome tab. You have your little screen window here you have the ability to drag and drop files directly into that screen let me show you what I mean. Let's see if I can. Successfully do this for Let's say I have this. File this PDF file. I need to get it onto the desk top of the other machine or not on the desktop but at the other agent in question. So I'm just gonna click and drag a By clicking and dragging. This will populated window. And it's gonna tell you exactly where it's going to copy got trial. It's going to copy it to local. Windows directory. Temp folder. So say yes. Maybe I'll shoot over to my commands tab. To see. The action of that file trying attempting to download on the agents. I can always highlight my commands tab and select you can see that I can it is much real time as possible CD. Execution of that process. Now. Let's navigate to the machine. I'll go ahead and log him. To the temp folder. So C windows. ten service. And there you go there's my PDF file that I copied over so again it's a real quick way. Two. The Apple to get. file on to a computer by dragging and dropping. Friendly names so there's another easy way to identify. Your computer within the navigation tree. Well not only your computer but those computers you're managing. I can add a friendly name under the info tab see how under my default tab I have friendly name. And if I a friendly name. And say if that is now going to update this name here in my navigation tree. I'm gonna go ahead and pass that reload system And hopes that it is going to update that navigation. Tree. Name for that eight. And as you can see what we reload system cast you can look at the bottom on your status toolbar to proceed the frequency for which. Our system is trying to update itself. And you can see the friendly name has now been changed. So again it's more easy to identify. With him navigation tree. Another trick is. Toppling between multiple users. So here I have a computer we just logged in as. The first user. So let me pop into the control senator and show you this is our machine that we're dealing Lance. If we come to the welcome screen. The agents. You can see from my user dropdown we are currently working with user number zero that is the default user logged into this machine. So let's go ahead and switch users quack. And logging and asked the administrator. So we can see multiple users logged into a machine. Now obviously this is not going to update for me. Why because this is directly tied to an inventory commands. What inventory command Q ask I want so glad you It is the system info. Anything on our welcome tab here is going to be related to system information. I can select edit configuration go back to that schedules. To see the desktop scheduled to see how often my system information. Is being sent. I don't want to wait an hour before I updated user. So maybe I'll come down here and manually past that system info commandment. Again I can watch as much real time as possible. To see that system info X commuting. It's successful I'll go back to my welcome screen now I should be updated with both my users'. I hop. There it is. So here I can actually toggle it between my users and communicate with them. So I use my toggle here. If I need to pass a command like maybe I'm going to open up and run a program. For the administrator. I need to ensure that I have the appropriate user selected here. And because I'm not as clever. On the fly here as. Some others I'm just going to use the example past that. Execute the notepad program for my administrator. User. So in a few minutes again I can come over to the commands tab and see how great that program. Running that program a success. Notice here in the parameters I have a pipe and then a number one. Said the parameters is telling me what program I'd just. Designated to run on the agent. But the number one after the is directly associated with the user I passed the commands him. Now as you can see I came back to my welcome tab and my user was set back to zero. Keep that in mind if you were going to use the user toggle and toggle between users. Another user user besides number zero and then I navigate away from this welcome tab. When I go back to the welcome tab it will always default to my users hero. Let's just popped to bet the yemen's if I pop there it is I love it it's. You know that's it folks I am I'm retiring for the day I don't like three demonstrations all work that says that just. I just earn my pay without one. Are idealists I was like that you know we got we got to continue forward support So that is a great way that we can toggle between users. Also you have the ability to see multiple screenshots for my users. Here I've got a screenshot related to the missed administrator logged again. I can right click it's request screenshot. For my administrator user. I can pop back over to my default user. Media minute just he would NC eight passed screenshot for that user. So again if you're dealing and look at that I've got the latest screenshot for the administrator now. right so list using file explored. We can share and edit files directly on the agent without ever having to directly remote into the machine. By taking advantage at the file explored. Beat to use file explorer on the agent is directly tied to template behavior on the agent. So you must check your edit configuration for the template behavior. If you can't access file explorer on the agent then check. The template behavior. On the quick access toolbar you'll be Apple to see that. You can do things like edit and notepad type of any dot texts. Or you could do things like transfer the file directly to your server. So let's take a look at that. So in our Windows 7 machine. I'm gonna come down to browsers. Open file explore. Now again I that was tied to template behavior. So if I can't access file explorer for the agent. The first thing I'm gonna look at is on the go back to that began attic configuration. I'm gonna go over to my access modes tab. Access is going to tell me whether I can utilize file explorer registry edit take a screenshot of the agent X that are. So according to disk cumulative view for this agent. With the setting up now for file explorer mode that means I should be able to get file explorer for this agent with no problem. Browsers. Open file explore. Now here you can. Open up different files on the agents out what you pay particular attention to the cache state. This cache is so old but sometimes it can be older. Altered that you're referencing. So if you a red. Exclamation point here you're dealing with very old data. You need to select re load the This will attempt to the information for this agent keeping the latest and greatest information. Reports work. File explore. So maybe I got to navigate down. Maybe I've got to find some sort of LabTech long I need to they don't log file X And as you can down at the bottom what is this trying to do it will give you a brief explanation. So that you can't have an understanding. Of what's happening. Okay it's trying to load the directory windows so it's reading on the remote machines. All right so let me navigate down to moonlit. Sea do. Can go that temp directory sure there's a text file in there somewhere. Great here's so with any dot text file that you find you actually right click edit. D.s. docs on the fly for the You don't have to transfer the file you don't have to make local copies. You can edit them. What we're doing is we're using lab labor of note patent. So maybe now I need to adjust error log. Delete items from the parent and then I can save my changes. Directly on the agent. Other items. Like PDF files or images it if need to get them off the agent relatively easy. You're gonna right click and select transfer files. This is going to attempt to transfer the file. Down from the agent down to your lab server and I'll show you where we can easily access that file once it has been sent. And again notice the bottom of your screen for status updates. OK it's transfer the file awesome. In order to see those files that you transfer am going to come to tools tasks and group. In the uploaded file section you can see in fact there is the file that use that we just attempted to transfer. So again it's a great way to easily work with files. You can and when you have file explorer open. You can drag and drop. As you can see thousand URLs upload them to to folder. So you can navigate to custom folders. Strike and drop information into those folders for the agent as well. let's talk about what it means to block list with. Regards to the computer management screen. like on the software weakened blacklist a piece of software. Which by definition would mean to select a software installed is bad and we want to remove it. So what we blacklist piece of software from the software tab. We are actually doing what we logically think we should be doing what we blacklist something we that piece of software is Any software detected. That has been blacklisted. Will be picked up. On the picked up by your software blacklisted install internal monitor. Now I must note here that we do not uninstall the software automatically the monitor will Lee alert Services. Next we have the service is Here we have the ability to blacklist service. But we go against that typical definition a black list equals bad service kind of like. Okay we blacklist a piece of software that means it's a bad piece of software. Let's just hold that scene meaning when we're talking about. Blacklisting service. When we blacklist service and tech we are actually setting and ignore with our SP seat. Auto service is stopped internal monitor. And don't worry I'm gonna pop into the control and we're going to take a look. At all of this stuff. Injustice Another place we black list item. Is. On the logs On the logs tab we have the ability to black list and walk. Now when we blacklisted events by selecting add to blacklist. We are actually instigating the possibility of two different types of blacklisted event internal monitors. Those are informational errors only and warnings and airs all. A cat so it's pop in here and we're gonna talk about that let's pop into the control center and let's take a look at apps so starting with software. Here on our Windows 7 machine. I'm gonna get to the software The software tab. Tells me all the software installed where the and if I right click on a particular piece of software. I can. Add to blacklist. Now when I add this particular piece of software to a black list. It got to to a list in the dashboard that I can manage It also highlights it and rats so at a glance on the agent on the I can quickly see hey. This piece of software price check by bailout has been deemed bad by somebody in my organization. Maybe I want to. Uninstall Now when blacklist a piece of software it does not automatically the application. We leave it up to you guys out there to do that or you can scripted out and it do it automatically. But when you add that to blacklist. It out to to a list in the dashboard. And then it's directly related to our internal monitor. Of SW guess what SW stands for that's right software. So we have SW black listed install. That is going to show less alert us on any software that we had deemed as blacklisted. Now it's important to understand that these monitors will never fire off agents and they belong to the appropriate group in which the monitors target. So I can double click to open up that internal monitor. I'm going to go to my monitor happen. My monitor target tells me what groups that is that has this internal monitor enabled. So if agents out there belonged to one of these groups. And they have a piece of software that we previously blacklisted. Guess what this monitor will fire off. Now if you have customized and service plans are groups out there and you want to had. internal monitor to a particular group you're gonna right click and find your group to addicts. Maybe I want call. My agents. With my consulting client to now make sure that they. I'm being warned if there's a blacklisted. Software install the agents. House save. And now I have just updated that internal monitor. Our it services. Services tab. Here. The internal monitor of SP CO services stopped. So that's this one here. SBC. As species is short for services. Now what this auto service is stopped is actually looking for is it's looking at states Andy startup. If we have they start ups set to auto. And service is currently stopped we not as bad if you have some service has the startup up auto. We expect that you want that service running. So if we have a service that is in the state stopped. We are firing off a monitor not that is our SVC. Auto services stopped. When we black list service here. I basically saying. It no DE GU update my Google update service. Ignore that with my auto service is stopped to monitor. I'm okay that my way Google update service is a stopped state but the startup is set top ought to. I don't want to be alerted. So I will blacklist that service so I do not get alerted based on that SBC internal monitor. Now again. It's important to understand where is that monitor active where is added that go to the monitor target And it's enabled on those groups that are listed there. you groups may look a little different from it's just based on my environment. But that is a quick way in which. You can quickly navigate. To what's being called out of the box here. Are the final place we talked about was the logs tab. Logs tab house's event log information. Again tied to an inventory command I have reset the event's. So here I can select any. Event to blacklist. Now blacklisting works with LabTech in the way it works with windows. Is windows. Kind of how it rises or sets an event type for these and that LabTech cast a process that information. So. He blacklist certain events. It adds to a place in the dashboard and so let's just launch the dashboard real And take a look at where that scouts. So we have a couple internal monitors that what blacklist an event it's going to come and look act and events. To see if they this list and config. Configurations. There it is blacklist. So here we can see DOC bands that have been already blacklisted. We can highlight any of them. And you the event type. The event up anything information warning. But you can see that categorizing. That event type by team number here. Okay and this just the way. Lab is utilizing. and processing. That type of function. So it's important to understand. That when you black events depending on what event type it is reporting TP. Will be which. Internal monitor fires off. So we have several. Blacklisted event internal monitors. As you can see we have some specific for exchange server semantic if you are utilizing that. We're concerned with our information. And warnings and errors. Now if we. Open up this internal monitor and we go to the configuration tab. You concede that our information all is looking for any event type equal to two. Our warnings. And errors are looking for the other numbers like 01. And theory. So that is quickly going to let you know that if on a computer here. And let me find. here one that I can find began its 72. K you guys remember that out there. So if I add to blacklist and I'm gonna suggest that. If you want to take advantage of this functionality. Only use this election without to blacklist. This is going to you. Associate category. And our internal monitors are not looking at category. They're looking at that event type. So lets you create a custom monitor to look at. That you could certainly do that but the internal monitors I'm referring to you are going to. Allow use to you utilize those if you select add to black list. So here select add to blacklist is what makes airports except to add to black Lance. Going to come to the dashboard. And blacklist. 46782. Little. See if we can find facts. I might not be able to find it folks this is where I might not be to succeeds. But what we can do is we can look at the event type. When we add this to our event. List. And know that if I have 01. Or three. I am going to utilize. My EB blacklisted warnings and errors only. How do I know that because I can look at the additional conditions. On the configuration. Of this. Monitor. C event type equal to is going to be our informational errors. And if we look at the event's. Warnings and areas. We are looking at the event. Blacklist ID greater than zero. But excluding. Two. I hope that kinda helps you guys out there understand. What the differences between the way that we black list items date. How they correspond with those internal monitors. another. Place. Within the computer management screen. That when classify. Something. We are calling upon an internal monitor and that does our processes tap. When we right click on a particular process and we classify it if we it anti virus or spyware. Automatically DP ROC. process is detected internal monitor will then fire off. Okay same type of functionality as we For software hardware. I'm sorry software services. So here on the processes tab. If I determine this to be process I'm going to classify it. When I select virus or spyware. It gets added to a list in the dashboard again. Called process list. And then the internal monitor directly associated with that is PR OC short for processes. That process is detected. And it can open these internal monitors. Navigate to the monitor target and see which groups are pushing out in enabling this monitor. So it's a quick way that you can utilized out of the box functionality. Our built in to your Texas Now one more thing to note before we go today is. On the processes. Tab on the services You have the ability to create process monitor on the fly so basically. I can create a remote monitor. Which means it's a monitor going to resides on this agent only. And I can start to monitor for this particular process on this agent only. Same goes for services. If I want to managed DH CP I want to create service monitor. Watching the DH CP service this agent only. Okay that creates a remote monitor on the agent's. I so it comes to that part did presentation. Where we get to take your questions. We have He is going to answer any questions that you may have based on the information that we had just gone over. So go ahead submit your questions. And will see in next time for. The computer management screen. Part to use. Brian taker way. Thank you for joining today's are we support webinars every Thursday at 2 PM eastern standard time. You can sign up for our weekly webinars on our support website. Find us under weekly support are heading at support dot LabTech software dot com. If you would like to view past support webinars or restaurants today's webinar. You can find our support webinar archives also at support dot software dot com. Thanks and have a great day.

News Feed

Loading
Failed to load the news items.
Click here to retry.
Still not working?
Click here to report it.