Documente online.
Zona de administrare documente. Fisierele tale
Am uitat parola x Creaza cont nou
 HomeExploreaza
upload
Upload




Unicenter

software


Unicenter Asset Management

Asset Management Components



  • Asset Management consists of components that manage, control, collect, process, maintain, and hold the data used by the Asset Management system. The major components are:
    • Admin Console - Management interface for scheduling requests and actions, making queries, establishing policies, and more. The Admin Console is the graphical user interface (GUI) for the Asset Management System. The Admin Console can be run under Windows XP, Windows 2000, and Windows NT and utilizes the Java Option (also known as W2), which can run on multiple platforms, such as the Internet Explorer on NT or Netscape on UNIX.
    • Engine - Processor for distribution and collection of data. The Engine performs data processing tasks on behalf of the Admin Console. For example, the Engine can update the Domain Database with the status of actions, or make queries against the Domain Database to find data. The Engine runs as a service and is started automatically at startup time. The Engine is generally scheduled to always run.
    • Agent - Runs modules and scheduled jobs on target computers. The Agent Software acts as a nonresident agent for the Admin Console, performing the tasks that have been scheduled for either a computer or a user from the Admin Console. The Agent can perform a variety of tasks, from hardware and software inventory actions to running programs and utilities for software maintenance and distribution.
    • Domain (database) - Domain data repository for all units (computers and users)
    • Sector - Temporary storage area linking the Asset Management Agent with the domain database

Asset Management Installation

  • The Asset Management installation types can easily be executed using the wizard-like Asset Management setup program. The Asset Management Product Explorer provides the following types of software installation:
    • Express Manager installation
    • Express Agent installation
    • Custom installation
    • Add component
    • Configure component
    • Unattended Installation
    • Installation with an Advantage Ingres database

Admin Console

  • The Enterprise Admin Console lets you:
    • View and manage data in the Enterprise database and in domain databases
    • Schedule actions to units and groups at both the Enterprise level and Domain levels
  • From the Admin Console you can:
    • Create and maintain computers and users for configuration and scheduling purposes
    • Define jobs for performing actions on Agent computers
    • Utilize modules for collecting data from Agent computers
    • Monitoring software packages installed and started on Agent computers
    • Manage sector settings and properties
    • Specify and execute queries
    • Create and maintain policies
  • Asset Management can modify all files on all Agents, therefore a security system has been provided. Any person wishing to start the Asset Management Admin Console must enter a user name and password.

Unicenter Asset Management Engine

  • The Engine performs information processing for the Admin Console. Information processing includes:
    • Data collection
    • Data distribution
    • Job performance
  • The Engine usually runs as a Windows service on a dedicated Windows-based computer. However, it can also run on the same computer running the Admin Console. Running the Engine service on a dedicated computer will improve the response time of the Admin Console when queries are made, and when Inventory updated from many computers is processed.
  • The tasks performed by the Engine service include:
    • Updating databases with current information collected and provided by Asset Management agents
    • Querying the databases for any user-defined information on, for instance, computers or users
    • Sending the query results to the Admin Console

Units and Groups

  • A Unit can be a computer, a user, an engine, or any other type of equipment that you can define as a new unit type, and is represented in the domain database. Each unit has a name and area that identifies it. You can add new unit types or modify existing unit types in the Asset Management system.
  • For ease of configuration and scheduling, it is convenient to define more than one unit as a collection of units. This collection of units is called a Group. Asset Management is easier to use when you have created groups that meet the precise demands placed on your system.

Modules

  • A module collects data from the Agents. There are several different kinds of modules in Asset Management:
    • Inventory Configuration - With the Inventory Configuration module, you can define which hardware units from which you want to collect information, from where, and at what level, such as per user or group. An example of hardware you may want to monitor is the processor.
    • Template Configuration - With the Template Configuration module, you can maintain your templates. Templates are used to prompt end-users for information, usually about the computer or user, and to add additional information types to the inventory system.
    • Software Inventory - With the Software Configuration module, you can define which file information is to be collected, from where, and at what level, such as per user or group. Software inventory can also keep track of your application licenses. An example of software you may want to monitor is a word processing program. These modules can all be enabled or disabled. When enabled, a module has a predefined setup. The setup can be configured to suit your specific needs.

Jobs

  • A Job is used to direct agents or Engines to perform specific actions. You can, for example, use Jobs to perform all software maintenance, including software distribution. You can also schedule jobs to be executed on Agents.
  • Jobs can be scheduled to execute once, a specified number of times, or continuously. When you set up a job, for example, you can schedule the action to execute in different ways:
    • Repeatedly
    • At a specific date and time, or after a period of time
    • Based on day-of-the-week dependencies
    • Based on the execution of another job, or the existence of a file, or an end-user decision to execute the action now or later

Hardware Inventory

  • Asset Management uses a proprietary format and the DMI standard for collecting and updating the Inventory information for a unit in the Asset Management database. Desktop Management Interface (DMI) is a standard for managing the components of hardware and logical devices. Components must provide a Management Information Format (MIF) file to be DMI compliant.
  • The Inventory module examines computers connected to Asset Management on a scheduled basis. The module uses a number of different sub-modules such as:
    • Scanner for system hardware information and information on hardware properties
    • Scanner for specific network information
    • Agent for collection of MIF files, generated by applications that are not part of Asset Management. There are different modules for different operating systems.
  • All information collected by the Inventory module is stored in the domain database, and you can view it from the Asset Management Admin Console.

Software Inventory

  • You can use Asset Management Software Inventory from the Admin Console to obtain information about the software installed in your organization. The Software Inventory module can detect software packages on both UNIX and Windows based Agent computers by scanning the file system and comparing file signatures as well as by querying operating system-specific package registration information.
  • Once you have set up Software Inventory, the software available on a computer can be viewed in the Information window when Software is selected
  • The Detected Applications window can display:
    • Application name
    • Units with the application installed, and location
    • Total number of applications installed (one per Unit and total count) with multiple counts for a Unit when the application is installed in several different directories on the hard disk.

Software Metering

  • Software licensing administration is done with the Software Metering feature, which can be used to:
    • Monitor which software packages and applications installed in your organization are being used on an Agent
    • Measure the usage frequency of any application, whether it is executed from a server or local disk
    • Police the number of copies of software products that are running on the computers of your enterprise to comply with license agreements and to save upgrades to new software because the "real" users are easily identified
    • Detect any application (without specifying) that has been started and stopped on the computer (Software audit)
    • Prevent the use of unauthorized software (including prohibiting users from installing software on their own and ensuring that a company uses only the admissible number of licenses)
  • A Software Metering Agent must be installed and running on each client system. This Agent will log all necessary activities and communicate through CAM, RPC, or file share with a central Metering Server, managing the queuing system. The metering and audit information is logged locally and transferred to the Sector the next time the system runs the Asset Management Agent.
  • The Metering Agent installs as a service on Windows 2000/XP/NT computers. However, as a prerequisite, MSI 616b13g must be installed on this computer.

User Account Inventory

  • The User Account Inventory collects information about users and their state on their computers. It collects all local users on a computer. If the user is a member of a domain, domain controller properties like 'full name' or specific information such as locked user account will be read from the domain controller and displayed on the Admin Console.
  • The information collected by the inventory is as follows:
    • According domain controller if connected
    • All local profiles
    • Additional information about all local/domain accounts, which are found on the local system
    • All local groups.

Configuration Files Backup

  • Asset Management lets you centrally manage system configuration files on your network without leaving your desk. You can define the names and number of backup copies of key system configuration files, such as AUTOEXEC.BAT, CONFIG.SYS, WIN.INI, SYSTEM.INI, or NET.CFG. You can also define specific sets of backup files by groups, so that you can accommodate the needs of different network groups and users can be accommodated without having to spend hours configuring backups on a user-by-user basis.
  • Asset Management lets you schedule a backup or restore action of a specific system configuration, simplifying the management of multiple system configurations. Asset Management can back up configuration files in several versions.

Search Facilities

  • You can retrieve items from the database with a standard Find function or with a Query.
  • The Unit Type, Domain, Area, and Name fields are available to define the item to find.
  • The File Search option is available on a Domain console only. The File Search lets you search all files on the local computer as well as computers connected through the network.
  • For advanced searches in the database, you can set up Queries to find the information that is needed.

Policies

  • Asset Management collects a large amount of valuable data for the Admin Console administrator. It is often beneficial to have policies to help the administrator focus on critical data when certain threshold values are exceeded or events occur.
  • The Asset Management Policy System is based on user-defined queries and on predefined events.
  • Query-based policies are defined by designing a query that specifies which criteria must be met to invoke a policy. As the query checks only the delta data values sent by agents, continual querying of the database is not necessary.
  • Event-based policies consist of a predefined set of system policies. These predefined system policies are subdivided into several areas and cannot be deleted or created by the user. However, they can be modified, using the event policy designer.
  • A policy is defined by:
    • Linked Query
    • Tasks to perform
    • Whether policy is invoked
    • Header and description of policy

Asset Management Reporter

  • The Asset Management Reporter tool extracts inventory information from the Asset Management database. Using the Query Designer, the user is able to evaluate this data and specify which fields are provided on the reports. The information extracted can be filtered, sorted, summarized, and viewed immediately in the GUI, and can be utilized for report printouts or exporting to other applications (for example as CSV file or HTML file). Reports are displayed hierarchically in an Explorer-like tree view, and a number of predefined result sets can be kept for each report as auto history. In order to prevent a result set from getting deleted when obsolete, the user can choose to save it.
  • Report generation can be user initiated or scheduled. Scheduling of reports is done in the Reporter GUI. The Engine will then initiate the report generation itself, according to the scheduling properties.
  • Using the Asset Management Reporter, you can create reports based on the following data:
    • General - general unit information like Area, Type, Name, etc. can be included.
    • Additional Unit Properties - additional unit property fields like for example Domain Name or Sector Type can be included.
    • Inventory Fields - inventory fields from General, User, or Template inventory can be added to the report.
    • Application - application inventory information like file name, application version, etc. can be included.
    • Job - adds job property fields like for instance job status or last execution to the report.
    • Module - includes module property fields like status information, last execution, etc. to the report.
    • Metering - adds metering statistics information like started, stopped, usage to the report.

Agent Software

  • Asset Management Agent Software includes, among others, control programs that run on various Asset Management Agent computers. When it runs, such a control program examines the configuration of that computer, and executes the sub modules appropriate to the configuration. The Agent software is normally installed on a shared network drive, but it can also be installed on each computer locally.
  • The types of Asset Management Agent Software currently include:
    • PC Agents
    • Inventory Agents for UNIX and OpenVMS
    • Enhanced UNIX Agents
    • Windows CE Agents
    • Palm Agents
    • Docked Device Proxy Agents

Unicenter Remote Control

Remote Control Admin Console

  • Centralized Policy Management - Remote Control Admin Console brings remote control administration to a new level by enabling all clients to be configured from a central management console. The configuration management is based on policies that are easily applied to individuals or groups of clients. Administrators can create and manage different configuration profiles that can be pushed to users and groups requiring varying remote control capabilities. As new users are added to a system or group, their remote control capabilities can be automatically pre-configured and deployed on their desktop.
  • Centralized User Management - Remote Control Admin Console allows administrators to centrally manage remote control users and their access rights. In one easy-to-use interface, administrators can define preferences and capabilities different users or user groups have, as well as define which targets they can control. The centralized, policy-based approach makes it easy to change the remote control capabilities for a group of users, such as help desk staff, and ensures that none of them can take remote control of the IT Department's Windows NT Servers.
  • Unicenter Common Services Infrastructure - Remote Control is built on CA's Unicenter Common Services that provide Enterprise Discovery, Real World Interface, central alert and event monitoring features, and virus detection software to further enhance the manageability of remote systems. All the computers in your Remote Control environment are represented in WorldView, enabling you to view and manage all your computers from a single point. You can choose to display them within their Computer Group or as individual computers. This infrastructure also enables Remote Control users to seamlessly implement CA's other management applications including storage, virus protection, software delivery, asset management, and help desk solutions. Through Event Manager Services, Remote Control generates a log that provides a central view of all ongoing events.
  • User-Friendly Interface - Remote Control Admin Console provides the familiarity of a typical Explorer-type interface plus many unique and convenient features, including:
    • Tree-Structure Plus HTML Displays
    • Getting Started Taskpad Access
    • Product Information Access
    • Computer States Icons

Remote Control Managed Environment

  • The Remote Control environment consists of the Admin Console, management server, the management database, and an unlimited number of managed agents. Managed agents are computers running the Remote Control application that communicate with the management server. The management server retrieves and sends information about remote control sessions to the management database.
  • Communication between the management server and a managed agent is bidirectional. The management server sends information that governs remote control sessions from the database to the managed agents. The managed agents then send event information back to the management server for storage in the management database. This functionality provides easy, centralized management for your entire Remote Control enterprise.
  • A managed agent receives information from the management server about:
    • Computer Groups - Each managed agent participates in a Computer Group. Computer Groups are associated with Access Control Lists that determine user access to managed computers and Computer Settings that determine the settings for a remote control session. Unless otherwise specified, a computer inherits the Access Control List and Computer Settings from the Computer Group it belongs to.
    • Computer Settings - Computer Settings comprise a template of privileges and options that govern remote control sessions. These settings can be applied to a Computer Group or an individual computer. By simply changing the template, all computers associated with it automatically reflect the new settings.
    • Users and User Groups - Remote Control populates the management database with users and user groups selected from the Windows NT Primary Domain Controller. These users and user groups are assigned User Privileges that govern remote control privileges.
    • User Privileges - User Privileges comprise a template applied to users and user groups that determine access privileges for remotely controlled managed agents.

Computer Groups

  • A Computer Group is a collection of computers that can be managed by Remote Control. With Computer Groups, you can perform management functions available in Remote Control Admin Console on multiple remote computers simultaneously. These functions include applying Computer Settings that govern remote control sessions, rebooting computers, starting and stopping Remote Control, and placing computers in listening mode.
  • You can easily move computers from one group to another using drag-and-drop functionality. When you do, the associate group Computer Settings are automatically inherited, reducing administrative overhead by setting up the desired configurations once per group. If needed, you can also apply custom settings to a computer so that it can be controlled in a different manner than the other computers in the group.
  • Access Control List - For each Computer Group or individual computer, you can define a list of users or user groups that can access it. Users and groups are selected from NT Domain users populated to the Remote Control management database.

Computer Settings

  • Computer Settings are Remote Control preferences and access privileges that are applied to Computer Groups or individual computers during remote control sessions. Computer Settings act as a template that allows you to easily administer settings to a single computer or multiple computers from the Admin Console. By simply changing the template, all computers associated with it automatically reflect the new settings.
  • You can easily apply a Computer Setting to a Computer Group or an individual computer by using the drag-and-drop method or selecting it from the General tab on the Properties dialog.
  • When installed, Remote Control includes Default Settings. The Default Settings can be used as is or they can serve as a template from which you can evolve other user-defined settings. If needed, you can also apply custom settings to a computer so that it can be controlled in a different manner than the other computers in the group. Custom settings applied to a computer override the Computer Settings applied to the Computer Group that the computer is in. If a computer with custom settings is moved into a new Computer Group, the computer retains its original settings.

Remote Control Users and User Groups

  • Remote Control uses the Windows NT Primary Domain Controller to provide a list of groups and users. Through Remote Control's Directory Utility, you can select an NT primary domain, view its user accounts and groups, and select those that you want to populate to Remote Control. Remote Control stores information about the groups and users that you populate in its management database. To keep the information current, Remote Control provides a Synchronize Utility that updates the database with any changes that have occurred in NT User Manager.
  • Through the Admin Console, you can view information about Remote Control users and user groups. They are represented in the left pane of the main window as the Users resource with the overlapped profiles icon. When you expand Users, each domain is displayed with their Groups and Users in a tree structure. Domains and Groups are also represented by overlapped profiles; Users are represented by a single profile.
  • Once you have populated Groups and Users to Remote Control, you can associate properties with them that:
    • Govern their machine access rights (using an Access Control List)
    • Determine whether they can use certain Remote Control features (based on their User Privileges)

Remote Control User Privileges

  • User Privileges are a set of standard rules that govern how the Remote Control application behaves on viewer machines. For example, User Privileges determine:
    • The Remote Control functions that the viewer can perform, including chatting, sending and receiving files, recording Remote Control sessions
    • Whether the Host keyboard and monitor are disabled during a remote control session
    • Whether the Remote Control application is hidden during a Host session
  • User Privileges are used in conjunction with host preferences, viewer preferences, and computer access privileges to determine which options and settings the viewer will use when connecting to a remote host. After the viewer has successfully logged on and the username and password verified by the NT Domain Controller; the user, host, computer, and viewer privileges are combined to determine the access rights of the viewer.

Access Privileges

  • Access Rights determine the remote control settings a viewer uses when connecting to a host computer. Access Rights are comprised of four sets of privileges configured in the Admin Console and the viewer computer. Once a user attempting a remote control session has been authenticated by NT security and verified as a member of the appropriate Access Control List, Remote Control checks the Access Privileges.
  • The four sets of privileges that make up Access Privileges are:
    • Machine Access Privileges (MAP) - Machine Access Privileges determine the types of Remote Control functions (such as File Transfer and Chat) allowed on remotely controlled computers. These privileges can only be set in the Access Privileges folder in the Admin Console. Visible is the only attribute that can be assigned to Machine Access Privileges.
    • Host Preferences (HSP) - Host Preferences determine whether the viewer can control computer and peripheral operations on the host computer. Host Preferences include options such as printer redirection, behavior of the host mouse, and session recording. They are set in the Host folder. Host Preferences can be set to Visible, Agent Writable and Viewer Negotiable. If a privilege or option is set to Viewer Negotiable, User Group Privileges are applied.
    • User Group Privileges (UGP) - User Group Privileges determine the remote control functions (such as File Transfer and Chat) a user can perform. They also determine the computer and peripheral operations a user can control on the host computer. User Group Privileges can be set to Visible and Viewer Negotiable. If a privilege or option in User Group Privileges is set to Viewer Negotiable, then the Viewer Preference is applied. See Determining User Privileges, later in this chapter, for more information.
    • Viewer Preferences (VWP) - Viewer Preferences determine the computer and peripheral operations the viewer can control. If a privilege or option is set to Viewer Negotiable in Host Preferences and User Group Privileges, the settings in the Viewer Preferences apply. Viewer Preferences are set in the Viewer folder.

Remote Control Statistics

  • The Remote Control Admin Console stores two types of data about your managed environment - the Session Log and Session Information.
  • The Session Log records connection information forwarded from the Host's Event Log. This provides a centralized record of connections made within your environment for easy management. Connection information is stored in the RCSession.LOG file. It can also be written externally to the NT Event Log or the Unicenter Event Log.
  • Session Information automatically tracks the status changes of all managed nodes within your Remote Control environment and displays the computer connections information, including:
    • Host - Host name
    • Viewer - Viewer name
    • Started - Connection start time
    • Duration - Connection length
    • Remote User - Computer name

Advanced Installation

  • In addition to the Installation Wizard, Remote Control also provides you with the following alternative ways to install the product.
    • Silent Install - The silent install feature installs Remote Control on a target computer without any operator intervention. You can use it in a stand-alone environment or as part of a software delivery system. Using the silent install, you can install the manager, the agent, or both
    • Remote Install - Enables you to perform an unattended install on a group of remote computers

Unicenter Software Delivery

Features of Software Delivery

  • Software Delivery provides an automated solution to many of the problems inherent with performing manual distributions. Using Software Delivery you can:
    • Work with existing Windows and UNIX servers to access and administer programs installed on remote computers.
    • Track all software installed at a particular location and identify when, where, how, and by whom the programs were installed.
    • Distribute new software packages and upgrades of existing packages to all or to a selected group of computers from a central location or through local administrative computers.
    • Maintain a centralized record of all software installed in the Software Delivery network, regardless of whether or not it was installed through Software Delivery.
    • Monitor logged events that track the installation and activation of item procedures associated with programs registered in the Software Library.
    • Identify installed software that has not been distributed or registered through Software Delivery.
    • Generate an installable software image containing all required product files and system configuration changes, using the Software Management Packager, available for Windows and UNIX platforms.
    • Perform an unattended installation of Windows computers with PXEenabled network interface, using Operating System (OS) Installation Management.
    • Create and edit software distribution scripts and register them in the Software Library, using the Desktop Management Script Generator and Desktop Management Script Editor.
    • Implement security in your Software Delivery system, using Software Delivery Security features.
    • Expand Unicenter NSM capabilities, which include monitoring Software Delivery events and responding to selected event messages, customizing the view of your Software Delivery environment, securing resources, and generating reports.
    • Utilize the functionality of other products such as Unicenter Asset Management, Unicenter Remote Control, and Data Transport Service (DTS) to further enhance your Software Delivery capabilities.
    • Integrate with Unicenter ServicePlus Service Desk, to raise trouble tickets on job or distribution failures. The Software Delivery Administrator is enabled to context launch into the Unicenter Service Desk Web browser to view trouble tickets associated with a job target or job container.

Simplified Software Distribution

  • Software Delivery provides a flexible, scalable, and open means of handling software distribution and control across networked environments. Software programs are defined to the Software Delivery Software Libraries maintained on dedicated Windows and UNIX file servers; from there they can be distributed easily, as needed, to your target computers.
  • Software Delivery provides a flexible, scalable, and open means of handling software distribution and control across networked environments. Software programs are defined to the Software Delivery Software Libraries maintained on dedicated Windows and UNIX file servers; from there they can be distributed easily, as needed, to your target computers.

Control and Uniformity

  • In addition, Software Delivery provides control and uniformity in your network, allowing the Enterprise Administrator to keep track of all authorized program installations. You can schedule software packages to be delivered to, installed, activated, or configured on any computer in the network, and then check to see if all these tasks were performed. As part of this procedure, you can also make sure all users have the same version of a software package.
  • Moreover, you can search for and remove old versions of authorized software, clean up failed installations, or detect unauthorized versions of software, on any computer in the Software Delivery system.
  • All these capabilities provide a far greater measure of control and uniformity than any LAN or WAN alone can offer.

Centralized Distribution

  • Programs can be stored directly in a Local Library for distribution to all computers networked to the Local Server, or they can be initially stored in the Enterprise Library, where they can be distributed throughout the network of areas. Items that are first registered in the Enterprise Library can be distributed to Local Libraries.
  • Programs can also be stored in a Workgroup Library for distribution to all computers networked to the Workgroup Server. Jobs set up on a Local Server can also be distributed to the Agents of a downstream Workgroup Server.
  • Software Delivery also lets an administrator detect what programs are currently installed on a particular computer, regardless of whether or not they were installed using Software Delivery.

Inventory Database

  • A separate Software Delivery database is maintained on the Local, Workgroup, and Enterprise Servers and contains libraries, folders, and log files.
    • Software Libraries - Store the software programs that are available for distribution. The Enterprise Server contains the Enterprise Library, the Local Server contains the Local Library, the Workgroup Server contains the Workgroup Library, and the Staging Server contains the Staging Library.
    • Folders - Maintain records of important server data, such as computer attributes. The information recorded depends on the type of server.
    • Log files - Record the occurrence of events, such as the successful or unsuccessful installation of a product.

Inventory Discovery

  • Inventory Discovery is a tool that uses customizable detection and verification scripts to search for the presence, or optionally, the absence of particular software packages on a target computer. Inventory Discovery is most commonly used to determine which software programs were installed without intervention of Software Delivery.

Software Management

  • Software Management guarantees full control of heterogeneous environments and is the best way to maintain large infrastructures.
  • Software Management helps you to install, configure and remove software throughout a complex environment in a controlled and standardized way. Software Management is based on the components Packager and Installer that are both available for Windows and UNIX. Packager and Installer are Software Management tools that enable you to create software products, and to easily install and remove them unattended and reliably.
  • With the Packager component products can be created for Windows and UNIX platforms. During the packaging process, the product to be packaged is installed on the same computer as the Packager. Product files, installation parameters, and other necessary changes can be specified. The Packager then records the information required for a successful installation of the package, and generates an installable software image. Note that the software image can only be installed on target computers that run the same operating system as the packaging computer.
  • Software and data for Windows are packaged in the SXP format. For UNIX, software and data are packaged in the PIF (product interchange file) format.

Operating System (OS) Installation Management

  • Operating System (OS) Installation Management enables you to perform an unattended initial installation of a Windows computer with PXE-enabled network interface, and an automatic integration in Software Delivery. By using OS Installation Management, it is easy to deploy and to configure the infrastructure (that is, Boot Server, boot images, OS images, and configuration parameters) to be able to manage unattended a great number of Boot Servers and Target Computers. OS Installation Management consists of the following components:
    • Image Prepare System
    • Boot Management Explorer
    • Boot Management Server
    • Boot Server
    • Target Computer

Desktop Management Script Generator and Editor

  • The Desktop Management Script Generator is a tool that enables you to easily record configuration changes for an installed product, for example, registry modifications. The Script Generator takes a snapshot of the computer and builds an image and installation script. This script can then be registered in the Software Library, and installed on target computers that have the appropriate script interpreter installed. The Desktop Management Script Generator is not suitable for complex product installations.
  • The Desktop Management Script Editor can be used to write, syntax-check, debug, and run scripts.

Security

  • Software Delivery Security features can be used to secure your Software Delivery system. Using Software Delivery Security, you can create security groups to determine which operating system dependent groups and users will have access to the Software Delivery system. You can establish class permissions, as well as folder and object permissions. You can also use SD Security to restrict views within the SD Explorer.

Unicenter NSM Integration

  • Unicenter Software Delivery integrates with either Unicenter TNG 2.4 or Unicenter NSM, a comprehensive, open management solution that provides cohesive, integrated administration of all IT resources in your enterprise. Alternatively, for a true standalone solution, Software Delivery comes complete with CA Common Services (CCS). CCS offers all the crucial components of Unicenter NSM necessary to satisfy the requirements of Software Delivery. Specifically, CCS components supplied include Event Management, Calendars, WorldView and AutoDiscovery, Unicenter Explorer and Anti-Virus.

Asset Management and Remote Control Integration

  • Software Delivery can be integrated with Unicenter Asset Management and Unicenter Remote Control. The integration with Asset Management, for example, allows for computer group membership to be resolved using Asset Management queries.

Data Transport Service Integration

  • Data Transport Service (DTS) is the data transfer tool that controls the flow of data transfers in the Software Delivery system. Therefore, the Data Transport Service Administration Client is completely integrated in the SD Explorer (DTS Administration). Data Transport Service supports point-to-point data transfers, as well as point-to-many data transfers including Broadcast, Multicast, and Fanout. You can also optimize network performance by throttling parcel sends and restricting parcel size.
  • Additionally, through the integration of Data Transport Service with Software Delivery, you can halt, resume, and terminate data transfers from the Software Delivery dialogs.

Unicenter ServicePlus Service Desk Integration

  • Software Delivery can integrate with Unicenter ServicePlus Service Desk from Version 6.0, which provides a single solution to manage trouble tickets, that is, requests and change orders, throughout the enterprise. The Unicenter Service Desk integration allows Software Delivery to raise trouble tickets on job failure or distribution failure, and to attach logs to trouble tickets. The Software Delivery Administrator is enabled to context launch into the Unicenter Service Desk Web browser, so that he can immediately view trouble tickets associated with a job target or job container. On the other side, the Service Desk Analyst is enabled to locate failed job targets and job containers quickly.

Install Model

  • Open installation mode:
    • The open installation mode supports any software installation. Software Delivery relies on the vendor-provided install methods, for example to perform an upgrade, and thus only installs files that are new or changed from the previous installation. When using the most widely accepted install routines, such as Install Shield, only the necessary (new or updated) files are copied and installed.
    • The open installation mode also supports MSI, Windows CE, Palm, and Nokia software products. During registration of the product in the software library, you can choose one of the available installation methods.
  • Managed installation mode:
    • The managed installation mode is based on Software Management, and uses the Packager and Installer components. These tools are available for Windows and UNIX. The Packager is used to generate Software Management products (packages), and to register them in the Software Library. Using Software Delivery, these products are distributed to, and installed unattended on target computers.
    • Software Management enables you to install, configure and remove software throughout a complex network environment in a controlled and standardized way. Both the Packager for Windows and the Packager for UNIX, provide the delta packaging feature. A delta product contains only the differences between two software products or any data, so that reduction of data traffic can be accomplished.

Graphical User Interface (GUI)

  • The benefits and features of Software Delivery are available to you from the Software Delivery Explorer (SD Explorer), an easy-to-use graphical interface, and a Web GUI.
  • To simplify the access and performance of the day-to-day tasks of a Software Delivery Administrator, the SD Explorer on Local and Workgroup Servers provides you with the Tasks folder, and an incorporated tutorial. When you select Tasks, wizards will guide you, step-by-step, through each of the relevant administrative tasks. After installation of the Software Delivery Admin Console the tasks are available out of the box.

Command Line Interface (CLI)

  • Software Delivery supports a command line approach to managing software. Most of the Local Server administrative tasks performed through the Software Delivery GUI can also be performed using commands.

Unicenter NSM

Global Catalog

  • Every Unicenter NSM installation has a central catalog known as the Global Catalog. Created at installation, the Global Catalog contains information about the availability and location of all Unicenter NSM components. The Global Catalog should be installed on a high availability server before installing any other components such as WorldViewT, Event Management, or Agent Technology Distributed State Machine (DSM). WorldView, Enterprise
  • Management, DSM, and other information sources register with the Global Catalog as providers at installation. Providers enable applications, data, and business components to appear as native within the object infrastructure so that all data can be accessed and integrated, regardless of origin, format, or location. Any Unicenter Explorer Client pointing to the Global Catalog can see the entire Unicenter NSM installation. The Unicenter Explorer Client running on your PC, for example, may be using a Global catalog on a server somewhere else. Your local browser can access any provider known to the Global Catalog.
  • Using Unicenter NSM, organizations can create software agents for devices that do not support standard management protocols such as SNMP. In fact, you can create agents to monitor a wide range of devices, such as IDNX switches, modem banks, video multiplexors, long-range radio transceivers, secure telephone transceivers, frame relay switches, and DoD encryption devices. Unicenter NSM empowers organizations to monitor and manage their entire networking infrastructure, not just typical TCP/IP networks, allowing non-IT devices to be instrumented for management.
  • The robust management functions of Unicenter NSM span across traditionally discrete resources. The discovery services in Unicenter NSM, for example, discover systems, databases, and applications, in addition to network devices and topology. This complete inventory of IT resources allows administrators to manage from the perspective of "the big picture."
  • In addition to TCP/IP, management functions must support heterogeneous environments including SNA, DECnet, and IPX networks; Windows NT, UNIX/Linux, and proprietary servers; NCs, Windows desktops and mainframes; hierarchical, relational and object databases; diverse network devices; web servers from different vendors; and applications from many different companies. Unicenter NSM provides a solution that manages all of these resources in a cohesive, integrated manner.
  • The ability to extend and customize integrated functions is central to the concept of end-to-end management in Unicenter NSM. For example, discovery agents are extensible to discover any custom IT resource (such as in-house built applications) or even non-IT resources such as POS devices, telephony, and even transportation systems.

Scaleable Infrastructure

  • Providing end-to-end coverage requires a highly scaleable infrastructure to efficiently manage the diverse scope of resources, which can range from hundreds to thousands across every major computing platform.
  • The Unicenter NSM architecture makes it possible to develop and deploy both CA and non-CA management functions in a manner that best suits the enterprise and requirements of each individual IT organization.
  • To address scalability requirements, Unicenter NSM provides efficient agent architecture for monitoring resources and invoking policy. Unicenter NSM can correlate information across disciplines, devices, and the enterprise as a whole, not only taking automatic actions but also anticipating problems. Recent advances in software agents, based on adaptive pattern recognition, extend conventional technology.

Predictive Agents

  • Neural networking agents known as Neugents enable Unicenter NSM to behave as a self-learning system. Neugents can recognize complex patterns in vast amounts of data, correlate seemingly unrelated events, predict business outcomes, and learn and adapt continuously-even when faced with dynamic business changes. Through Neugents, Unicenter NSM integrates advanced business intelligence logic into eBusiness infrastructure.
  • Incorporating technologies from statistics and artificial intelligence, Neugents use pattern recognition to predict opportunities, detect problems, and offer solutions. The integration of "learning" agents with a cross enterprise framework is critical to the efficient management of huge, complex environments. Neugents are available as an option to Unicenter NSM.

Advanced Visualization

  • Unicenter NSM uses visualization technology to turn massive amounts of data into useful and relevant information. The WorldView component of Unicenter NSM presents a 2D and 3D view of the infrastructure to facilitate intuitive management of the enterprise. Anyone familiar with Explorer-style and browser-based GUIs can move effortlessly through systems and networks, without special navigational skills or prior knowledge of physical topology.
  • Organizations can use the interface that is most appropriate to their management requirements. For example, organizations that deploy the optional Neugents technology would probably prefer the 3D Map. The data visualization, animation and virtual reality capabilities of the 3D Map complement pattern recognition technology, and the underlying patterns detected in data, especially time sequences, are more easily depicted using an extra dimension. On the other hand, a network operator who is frequently on the road troubleshooting and opening new facilities may prefer a more conventional 2D view solely of network topology.
  • Delivering an extensible architecture with predictive and self-learning capabilities is just the beginning. Unicenter NSM also delivers a wide range of rich management functions for administering various IT resources. The integration of all management functions allows you to leverage your existing investments in technologies, tools, data, and proven business logic.

Network Management

  • Network managers struggle daily with the variety of devices supplied by different vendors, diverse communications protocols, and complex network topologies. The various platforms, communications protocols, application software, servers, mainframes, desktops, and databases that can be connected to a network are infinite.
  • Unicenter NSM blends the management of network elements with system, database, and application assets to provide a comprehensive, integrated enterprise management infrastructure. The system treats network elements as part of a continuum of interrelated components with a full understanding of the dependencies between them.
  • From a single, central console, Unicenter NSM can manage networks running every major protocol, automatically discover network elements using these protocols, and map their network topology.
  • You can visualize the network as a discrete entity in relation to other enterprise assets or within the context of business processes. Unicenter NSM makes network management accessible to multiple audiences within the enterprise.

Internet Management

  • By extending its robust management functionality to web sites and across the Internet, Unicenter NSM allows enterprises to conduct business with confidence in cyberspace.
  • The architecture of Unicenter NSM allows IT departments to transparently encompass web-based (Internet, extranet or intranet) resources. An effective web presence requires professionally managed servers in terms of reliability, availability and performance, including:
    • Securing content from loss or corruption, whether intentional or not
    • Eliminating network, systems, databases or applications choke points
    • Providing automated, policy-based responses to common events such as usage spikes and virus attacks
    • Planning for and positioning servers around the Internet to minimize traffic hops and application response time

User Interfaces

  • Unicenter Explorer
    • Implemented in Java, Unicenter Explorer integrates and hosts all user interface components and plug-ins for complete management. You can run the Unicenter Explorer management console on various platforms in a heterogeneous environment.
    • Unicenter Explorer includes standard menus, context menus, a left-hand pane for navigation and a right-hand pane for the display of information on objects selected in the left-hand pane, configurable caption titles, and a paper-look design. You can launch Unicenter Explorer through the Unicenter TND program group. UNIX/Linux users can run the uniexplorer script in $JI_SYSTEM/bin to access it.
  • Unicenter Browser
    • The Unicenter Browser is an Internet- and intranet-based user interface that provides virtually all of the functionality found in the WorldView Classic user interface. Since it is a Java applet, it does not require client installation, which makes it accessible from virtually anywhere. Windows users can access it locally on the system where the Common Object Repository resides through Start, Programs, Unicenter TND, Unicenter Browser Interface. UNIX/Linux users can run the tngui script in $CAIGLBL0000/wv/scripts to access it. Remote systems can access it by entering a URL address on any Java-enabled web browser in the form: https:// wvserver/ubi/ubi.html  where wvserver is the name or IP address of the web server on which the server components reside. You can use many of the procedures for the WorldView Classic GUI, contained in CA Procedures located in the Online Books program group, with this interface.
  • Unicenter Classic
    • Unicenter Classic refers to the traditional Windows-based user interface delivered with previous versions of Unicenter TNG. Unicenter Classic includes the WorldView and Enterprise Management program groups accessed through Start, Programs, Unicenter TND.
    • Unicenter Classic also includes the cautil command line interface.
  • WorldView Classic
    • WorldView Classic refers to the traditional Windows-based user interface. WorldView Classic includes the WorldView program group accessed through Start, Programs, Unicenter TND.
    • Using WorldView, you can do the following:

Discover all the devices in your network using the CA Discovery service and automatically add them to the Common Object Repository as managed objects.

Define new classes using the Class Wizard, allowing for characterization and modeling of practically anything.

See your entire network graphically represented on 2D and 3D maps, grouped into networks, subnetworks, and segments based on their logical relationships.

Create customized Business Process Views of specific processes based on different business needs, resource features, roles, geographical locations, organizational structures, and applications.

Trace all events reported by network devices on the Event Console Log, isolate faults, and display them on the WorldView maps so action may be taken for resolution.

    • WorldView Classic also includes the cautil command line interface.

End-to-End Management

  • End-to-end management is the ability to identify resources throughout your IT infrastructure and organize, monitor, and manage them. Typically, these resources are widely dispersed throughout the enterprise.
  • Unicenter NSM uses object technology to automatically identify and define many resources in your IT infrastructure.
  • Object Technology
    • The number of individual resources in an IT infrastructure may range from small (hundreds) to large (millions). Unicenter NSM uses an object-oriented approach to the management of these resources by automatically defining them as "managed objects" and storing them in the Unicenter Common Object Repository.
    • The Common Object Repository is used by all management functions to store information about managed objects, their properties, relationships, and the methods by which they are managed. Examples of managed objects are hardware devices, software applications, databases, and processes.
  • Common Object Repository
    • All of the objects in your enterprise, including network devices, agents, and software applications, are defined according to their Unicenter NSM class names, and are stored in the Unicenter NSM Common Object Repository (see Objects and Classes following). The Common Object Repository contains managed objects derived from many different classes, such as router, host, application, database, agent, and link. It also contains policies, methods, associations, and objects derived from non-managed object classes.
    • Building the Common Object Repository with information about the resources in your enterprise-also called "populating the repository"-is accomplished using the CA Discovery service.
  • Objects and Classes
    • Unicenter NSM uses two basic tools to manipulate data: objects and classes. Understanding this concept makes creating or modifying a class with Unicenter NSM much easier.

Unicenter NSM focuses on easily defined units, which together with their status, are referred to as objects. Examples of objects include SQL servers and CD-ROMs. Unicenter NSM lets you manage these objects.

A class is a collection of objects with the same characteristics and behavior. There are many types of classes.

A special type of class is the virtual class. A virtual class is not used to create objects, but rather used to help you organize other classes. For example, the ManagedObject class is a virtual class. In Unicenter NSM, you can use the Class Wizard to simplify the creation of classes.

Unicenter NSM provides classes for a variety of the most common entities found in heterogeneous environments. Each predefined class has all the characteristics defined and is ready to use.

  • Advanced Visualization Capability
    • Using any data source, you can transport your entire infrastructure to a virtual reality plane that simulates real world environments and is both easy to use and to understand.
    • The innovation of the Association Browser shows the dynamic container relationship and enterprise configuration through a wide array of views. This advanced browser allows you to traverse objects in your enterprise.
  • Time Dimension
    • Time dimension is achieved through the Historian technology of Unicenter NSM. Presented in a multidimensional format, Historian gives you unprecedented insight for the entire enterprise. This added intelligence increases service and efficiency thresholds.

Agent Technology

  • Unicenter NSM uses multi-level, manager/agent architecture. Agent Technology is critical to the management of large environments.
  • Agents perform remote monitoring to report to the manager when error conditions occur or certain threshold values are reached. Agents may also act when instructed to do so by the manager, or they may correlate information and act by themselves.
  • Unicenter NSM provides agents to monitor operating systems and databases. Using the Software Development Kit (SDK), you can also create agents for any device or process, as desired. Unicenter NSM is an open architecture into which you may add agents created by other software vendors.
  • You can create agents to instrument file systems, database applications, and other software applications. These agents significantly increase your ability to monitor and control such software processes.
  • Node View
    • You can use Node View to monitor the status of managed objects discovered by the Auto Discovery process. Managed resources on a node may include such entities as the operating system and its subsystems, databases, and software applications.
    • Because Node View displays the managed objects on a node in tree format, you can see both the overall status of the node, and the logical relationship and status of individual agents and objects at the same time.
  • DSM View
    • DSM View is a companion to Node View and provides detailed information about each managed object in the Distributed State Machine's domain. You can use DSM View to create new properties for a managed object as well as modify the values of existing properties. Using the DSM View windows, you can:

Display managed objects based on the class to which they belong.

Query the Object Store for managed objects.

Edit the properties of a managed object.

  • MIB Browser
    • The MIB Browser is a graphical user interface that can be used to view the values of MIB attributes. Using the MIB Browser, you can browse MIBs supported by SNMP agents running on any node connected to your Unicenter NSM workstation over a TCP/IP network, set the values of MIB attributes, and print MIB data.
  • Individual Agent Views
    • You use the individual agent views to drill down to the specific set of resources monitored by each Unicenter NSM agent. You can also use the controls provided by the views to add new resources for monitoring and to set the threshold values that determine the status of each of the monitored objects.
    • Each agent view is unique and provides a set of detail windows that reflect the different sets of monitored agent resources, such as database tables or file systems.

Performance Management

  • Performance Management provides the following graphical applications used for visualization of performance and resource consumption data:
    • Performance Configuration
    • Performance Scope
    • Performance Trend
    • Performance Chargeback
  • The Performance Management agents collect data from standard system utilities appropriate to the environment being managed. Using the tools provided, you may view this performance data in a context-sensitive fashion by pointing and clicking the managed objects on the Unicenter NSM WorldView Map.

Enterprise Management

  • Enterprise Management is a collection of integrated system management functions available through Unicenter NSM.
  • Using Enterprise Management, you can manage your system resources and add policy-based automation, security, reliability, and integrity to your environment.
  • This management can be accomplished in a centralized fashion, distributed throughout the network, or hybridized by combining different approaches to best match the unique structure of your organization.
  • Further, each Enterprise Management workstation can be customized to reflect the needs of a particular administrator. For example, one workstation can manage backup and archiving of storage, while security workstations can be placed throughout the network, bringing user administration closer to each business unit.
  • Most successful organizations operate according to established policies. As the organization becomes more complex, it becomes necessary to formalize and document these policies. Unicenter NSM allows these policies to be enforced by the systems management functions available in Enterprise Management. Some examples of these types of policies are:
    • When and how different types of data are backed up
    • Who has access to sensitive data
    • Who can change sensitive data
    • How often certain processes shall run
    • What to do if they fail

Enterprise Management Functions

  • Event Management is a status/exception management facility. Using Event Management, you can define policies that instruct Unicenter NSM to intercept selected messages requiring additional attention.
    • By defining Event Management policies, you can:

Respond to the message.

Suppress the message.

Issue Unicenter NSM commands.

Start other programs or scripts.

Send information to a network management application.

Forward the message to other managed platforms.

Issue commands to be executed on other platforms.

Define or update objects in the Unicenter NSM Common Object Repository.

Administer the Unicenter NSM environment remotely using email and pager messages.

    • The CA Event ConsoleT lets you monitor system events across the network as they occur. All running programs and user processes can direct inquiries and informative messages to this facility.
    • You can process messages on individual servers and redirect them to a central server or other Unicenter NSM Event Management servers and, by extension, their consoles. You can collect related messages network-wide for display at a single location, or send them to multiple locations, as needed. Additionally, you can use Security Management options to restrict Console Log views to only authorized personnel.
  • Workload Management provides an effective tool for planning, organizing, and controlling your entire production workload. Workload Management allows you to automate background processing for execution during non-peak hours or according to pre-set schedules, dependencies on other jobs, calendar definitions, or a combination of these.
    • Using Workload Management, you can:

Define and maintain jobs.

View a list of related jobs.

Identify predecessor jobs, files, and manual tasks.

Schedule jobs with calendars and triggers.

Display job status.

Cancel or demand jobs.

    • Additionally, Unicenter NSM Security Management can be integrated to provide authority for each job, and to prevent unauthorized access to these facilities.
  • Tape Management provides comprehensive, yet easy to use tools to perform tasks associated with maintaining your tape library. These tasks include the following:

View lists of files, volumes, and storage vaults/areas so you can update or perform actions based on the information.

Change the expiration date of a volume.

Check a volume out to an out-of-area storage vault, or check a volume in that was previously out-of-area.

Print an external label for a volume by selecting either the volume serial number or the data set name.

Update the cleaning statistics.

Display the status and service description of a volume (in service, deleted, expired, scratch).

View lists of tape devices based on esoteric group or generic unit group name for which you want to receive detailed information.

Monitor tape device status to determine whether the device is online or offline.

Monitor the movement of tape volumes through the Vault Management system.

Place ANSI standard labels on tape volumes.

Protect against tape data destruction by malicious or accidental overwrites.

Maintain automatic tape file inventories.

Facilitate swift retrieval of the appropriate tape volume when a file is needed.

Provide for automatic recognition of mounted tape volumes and assignment of those devices to requesting applications.

  • Many installations require some type of facility for the storage of tape volumes containing critical files. Examples of such storage facilities include a fireproof vault or an off-site storage location. Working with Tape Management, Vault Management supports:

Vault creation

Media selection

Automated media movement

Manual media movement

Movement and inventory tracking

Audit trails

  • Storage Management comprises Brightstor ARCserve 2000 Backup Unicenter Edition. Brightstor ARCserve Backup is the backup and restore management solution for a local Windows or UNIX/Linux host server. Brightstor ARCserve Backup furnishes the following features:

The Job Status manager informs you of job activity and assists in controlling a specific Brightstor ARCserve Backup job.

Various options let you optimize basic functions, such as backing up specific files or scheduling a job's performance.

The Device Manager manages the devices and media needed to run Brightstor ARCserve Backup efficiently.

Brightstor ARCserve Backup enables you to optimize the use of your media, and designate a scheduled backup scheme to coordinate with specific requirements in your environment.

The server component monitors the Job, Tape, and Database engines of Brightstor ARCserve Backup, displaying the status of each.

The Alert manager reports on the status, results, and activities of Brightstor ARCserve Backup.

Brightstor ARCserve Backup recognizes ASM tapes and prevents the tapes from being overwritten.

  • Security Management protects valuable system resources. Using Security Management, you can identify authorized users and the conditions under which they may enter the system and access designated assets. By defining policies for Security Management, you can:

Prevent unauthorized individuals from gaining access (logging on) to your system.

Ensure that only authorized personnel can access system data, resources, and other assets.

Protect against access abuse by users with administrative privileges.

Provide a way to audit the use of data and resources. Securable assets may include physical resources, such as programs and files, and abstract resources, such as administrative privileges, and other user-definable assets, as well.

    • An optional feature, User Profile Synchronization (UPS), permits Windows, UNIX/Linux, OS/390, and z/OS nodes to participate in the sharing of password and status updates to user accounts.
  • Problem Management
    • Automates the definition, tracking, and resolution of problems. It provides a framework for accurate management of day-to-day problems and questions.
    • You can continuously improve the reliability of your computing environment by accurately identifying the cause of a problem and relating it to a specific hardware, software, or procedural source. Additionally, you can significantly reduce the time needed to correct problems by assigning ownership and tracking the progress of the resolution, and by automatically escalating a problem until it is resolved.
    • Further, as it is integrated with the other Unicenter NSM functions, Problem Management can identify problems and potential problems automatically.
  • Report Management
    • Report Management extends traditional report/print processes by enabling you to define rules under which selected pages of a report can be repackaged into "bundles" and redistributed to designated users using print or electronic mail facilities.
    • Report Management also tracks report delivery so that the system administrator can monitor the service provided to users.
  • Spool Management furnishes a simplified interface to the UNIX/Linux spooler lp (or AIX enq) to enable users to access and manage spooled files, and to provide the systems administrator with a graphical interface to spool functions.
    • Print devices are usually defined once and updated only when a new printer is added to the system. When you need to add a new printer, you probably spend an excessive amount of time just looking up the commands and syntax you need to make the update. Spool Management simplifies this process and expedites the overall task.
    • Using Spool Management, you can:

Define, add, and update print devices.

Manipulate the printer queues.

ManagedPC

  • The ManagedPC feature of Unicenter NSM lets you effectively administer your PC workstations. ManagedPC provides the following solutions:
    • Automatically detects ManagedPC operating system installation requests, and provides facilities to customize those requests.
    • Furnishes remote installation services for a Windows operating system.
    • During the Discovery process, automatically inventories all ManagedPCs in the Common Object Repository.
    • Secures images transferred to client computers using Intel's Boot Integrity Services (BIS) for those clients that support it.
    • Through the Unicenter WorldView GUI, offers you methods needed to monitor the status of your ManagedPCs.
    • Includes facilities in the Unicenter WorldView interface that can "awaken" a ManagedPC from a soft off or sleep mode.
    • Furnishes reports that are specifically customized for your ManagedPC administrative personnel.

The Software Development Kit

  • The CA Software Development Kit (CA SDK) lets you take advantage of the capabilities of Unicenter NSM in your own applications. The Application Programming Interfaces (APIs) provided allow access to the WorldView, Agent Technology, and Enterprise Management components of Unicenter NSM.
  • The CA SDK includes three API sets representing the major components of Unicenter NSM.
    • WorldView API - Includes functions and exits that enable user-written programs to interact with Unicenter NSM, the WorldView maps, and the Common Object Repository.
    • Agent Technology API - Lets you create multi-platform, scaleable manager/agent applications. The Agent Technology API library provides an environment in which you may develop agents that communicate with management applications using SNMP.
    • Enterprise Management API - Furnishes access to all of the management functions and common services supplied in Unicenter NSM, and facilitates cross-application integration. The Enterprise Management API library includes functions and exits that enable user-written programs to interact directly with Enterprise Management.

Unicenter Service Level Management

Distinctive Features

  • Java-enabled Web-based User Interface. You can access all administrative tasks and operational status monitoring through the web interface. You can get service level reports from any browser with access to the management console. Unicenter SLM can present collected data on resources in easy-to-understand report formats, including tables and graphs.
  • Generic ASCII Data Import Wizard. You can consolidate service management for disparate applications and services through an intuitive graphical interface, enabling Unicenter SLM to be the focus of your service level initiative. Importing external log data to SLA reports previously required advanced programming skills.
  • XML Data Import Interface. You can import configuration information and collected data into Unicenter SLM by formatting this information in XML. This information needs to comply with a specific XML schema. A SOAP-based interface lets you load this information easily from remote systems. This new interface and mechanism lets you more easily automate the configuration and maintenance of Unicenter SLM.
  • Report Wizard. You can define report groups and report definitions through an intuitive Report Wizard, which also simplifies report production.
  • Metrics. You can create your own SNMP or service metric to provide support for user-specific SLA reporting. Unicenter SLM supports Windows 2000, SAP/R3, MS Exchange agents, and Unicenter agents such as Unicenter Web Management.
  • Metric Charter. You can manage your metrics using the metric charter, which is an advanced visualization and analyzing tool for service management metrics. This Java application provides 2D and 3D animation and charts to highlight service trends. Visual correlation between service components, such as between services offered inside and outside a firewall, provides insights into service bottlenecks as well as useful information to aid capacity planning.
  • Report Configuration Tools. You can tailor reports to view data collected within intervals of interest only, such as business hours, days or weeks, and you can filter the reports to show the level of details to suit job function or interest. Unicenter SLM can present reports on a business' process, geography, organization, customers, service goals and business hours. Unicenter SLM depicts each group with descriptive, user-friendly names.
  • Extensible Data Collection. You can measure, collect, and import performance and SLA data from a wide range of sources, including performance cubes produced by the Unicenter® Performance Management option. SNMP and service metrics from applications and services extend service management to an entire eBusiness infrastructure. You can also import third-party network service performance data from other applications for end-to-end service management.
  • SNMP Metric Wizard. You can create SNMP-based metrics in Unicenter SLM more easily. The wizard also provides you with the ability to create an expression. Expressions (in this context) are MIB variables that together form an arithmetic expression. This can be single OIDs or combinations. The script language is a small subset of the Tool Command Language (TCL). The wizard also provides a MIB browser that can perform online browsing against SNMP agents.
  • Exportable Service Level Reports. You can generate service reports in batch mode and upload the reports automatically to a remote web server.
  • Service Incidents Highlights. You can monitor what factors affect noncompliance. Unicenter SLM highlights periods when external factors, such as power outages, are responsible for noncompliance with SLA.
  • Calendar. You can use the web-based GUI to create events. These events can be used by Unicenter SLM to schedule service incidents, but they may also contain other information. The calendar is designed to provide functionality needed to store and lookup calendar (date/time) related information.
  • Scalable. You can scale Unicenter SLM. Distributed data collection and measurement architecture makes Unicenter SLM a scalable solution for networks, regardless of size.
  • Integration. Unicenter SLM integrates with various Unicenter® Network and Systems Management (Unicenter NSM) agents and solutions for a unified service view of the entire ebusiness infrastructure. The ability of Unicenter SLM to integrate includes the following functions:
    • Collects service management data, automatically, from objects in predefined business process views, creating new report groups
    • Monitors the severity status of these objects for availability in the context of set SLAs
    • Sends potential breaches of SLAs to the Unicenter NSM Event Management console or to the notifications workspace in Unicenter® Management Portal (Unicenter MP)

Architecture

  • Unicenter SLM has a distributed architecture that includes the following components:
    • Console
    • Collectors
    • Report Repository
    • Database
  • The following illustration shows a console and two collectors. The report repository and database run on the console system:

Console

  • The console configures data collections and report groups, produces reports, and monitors current status. The console contains the configuration database and provides the following functionality:
    • Produces service level reports
    • Configures and maintains data collections
    • Displays collected system status
    • Defines and modifies data collections, report groups, report properties, batch report productions, and service incidents
    • Restarts and stops collectors
    • Displays the status of data collections and Unicenter SLM systems
    • Runs and displays reports
    • Maintains the report repository
    • Maintains the calendar service
  • User Interface
    • You access the Unicenter SLM user interface from any web browser with a network connection to the console. You access this interface through TCP port 6668.
  • Web Server
    • You can control access to the user interface by configuring access control on the Unicenter SLM web server. By default, access requires a user name and password. The default for this user name and password are slmo and slmo, respectively.
    • Unicenter SLM includes an interface where you can create user groups using Apache to control access to specific reports. By creating access groups, you can choose whether a user has read-only access or writable access to reports.
  • Daemon Processes
    • The daemon processes on a console system include the following:

Database engine (AdvantageTM Ingres® or Microsoft SQL)

Data collector (smmCollect)

Data loader (smmdbd)

Report server (smmReportd)

Web server (mhttpd)

Optionally, a standard web server (httpd)

Servlet runner (Tomcat)

RMI Server

SNMP MIB Browser

Collectors

  • The Unicenter SLM collector collects and measures data from a wide variety of sources. Unicenter SLM regularly uploads this data to the console system for reporting.
  • snmpCollect
    • The snmpCollect collector gathers data using an SNMP MIB variable or combination of variables. This collector can use advanced expressions prior to data logging.
  • pathagent
    • The pathagent collector measures IP network delay and availability. This collector sends SNMP traps for state changes to the management console.
  • appagent
    • The appagent collector measures system and service response time and availability. This collector sends SNMP traps for state changes to the management console and can measure a wide range of services such as FTP, HTTP, DNS, SMTP, NTTP, POP3, TCP echo, NFS, and so forth.
  • coreimport
    • The coreimport collector imports objects from a Unicenter® Network and Systems Management (Unicenter NSM) Common Object Repository (COR) and collects properties from these objects. This collector must run on the Unicenter SLM console.
  • import
    • The import collector imports configuration data, log files, or externally collected data from files.

Reports, Functions, and Services

  • Unicenter SLM produces service level reports and provides the functions and services needed to support their production. The services provide the following benefits:
    • The data model provides a flexible solution for maintaining, operating, and integrating collected data and configurations.
    • Data collectors gather and measure statistics from your IT infrastructure.
    • Data import reads and uses data collected by other systems, log files, or additional sources of information.
    • Automated data administration maintains collected data over time.
    • Status view of all data collections and systems involved provides information vital for maintenance.
    • The web-based user interface uses, configures, and maintains all aspects of the system.
    • Functions group data collections into report groups and assign them individual service goals and business hours.
    • An automated report production environment distributes service level reports as web documents.
    • Functions support your service level reporting process, including the ability to comment on and classify service incidents, export reports to other web servers and enforce quality control before reports are distributed or exported.

Report Repository

  • The report repository stores and organizes all produced reports. Installed with the Unicenter SLM console, the report repository contains reports as HTML documents organized into categories by group, period, and type. You access reports through the Unicenter SLM web server (port 6668) or a standard web server (port 80).
  • You can create user groups using Apache to control access to the report repository. When a user logs into Unicenter SLM, only those access groups that the user is a member of appear under the Report Repository node of the Unicenter SLM tree.

Database

  • The database stores and maintains all configuration information and collected data. During installation, you select whether Unicenter SLM bases the database on either the Advantage Ingres database or Microsoft SQL server product.
  • You can install your database remotely as a regular or clustered database. You must manually configure a remote database.

Unicenter ServicePlus Service Desk

Unicenter ServicePlus Service Desk Server

  • Your Unicenter ServicePlus Service Desk installation has one or more server components. The number of servers depends on your enterprise. Every installation has exactly one primary Unicenter ServicePlus Service Desk server that manages the overall functionality of the service desk, and installations can optionally have one or more secondary servers to manage specific features.
  • For example, your particular configuration may be as simple as a single machine on which all the needed services are installed. This would be the primary server. On the other hand, your installation may be spread out over several machines, each of which serves a specific function. For example, you may have one machine that runs as the primary service desk server, which also acts as your database server, while a separate web server machine runs the web interface, and yet another machine authenticates users as they come into your service desk system.

The Business Structure

  • ServicePlus Service Dsk has the following components:
    • Sites
    • Locations
    • Organizations
  • These objects have a relationship to each other, as shown in the following diagram:

  • Sites
    • A site is a grouping of locations. Because locations reference sites, you should define sites before locations. This lets you use the new site in the location.
  • Locations
    • Locations precisely identify a specific physical place, such as the address of a particular company, or an office address.
    • Locations are used to pinpoint where other system components reside, such as contacts and assets. A location can be any type of place, such as a city, a campus, a building, or even a floor of a building. Defining locations lets you keep track and administer the areas and locations where the items of concern to your enterprise reside. Locations are the only objects with which you can associate a physical address-all other objects, such as organizations, assets, and contacts, derive their address from the associated location.
    • Locations are also used for the purpose of automatically assigning requests. To base automatic assignment on location, you assign locations to request areas and groups. The request area locations are used to match a request to a location based on the location of the request's asset or affected end user. The group locations are then used to select a group that is eligible for automatic assignment of requests in that location.
  • Organizations
    • Organizations describe internal departments and divisions or external companies that can be assigned to tickets, asset classes, and contacts (for example, they are used to identify the company with which a customer is associated).
    • You can assign a default service type to an organization that is automatically assigned to tickets when the organization is specified. This lets you associate a specific level of service to a ticket based on the assigned organization.

The Business Infrastructure

  • An important aspect of implementing your service desk using Unicenter ServicePlus Service Desk, is to define your business infrastructure by setting up:
    • Asset families and classes
    • Manufacturers and models
    • Service statuses
    • Vendors and vendor types
    • Assets
  • These objects have a relationship to each other, as shown in the following diagram:

  • Asset Families and Classes
    • Asset families classify your system assets by type and assign meaningful attributes for each asset. Asset classes identify general categories of assets that your enterprise supports. Families are broad categories of assets, such as hardware, software, and services. Classes are more specific categories within the broader family category. For example, the asset family hardware might contain asset classes such as, modem, router, repeater, and bridge.
    • Organizing your assets into families and classes makes it easier to manage your assets. For example, you can generate a list of assets that belong to a particular family or class.
  • Manufacturer and Models
    • Manufacturers identify the manufacturers of the various assets of concern to your enterprise. Models contain specific information about the products that a particular manufacturer provides to your enterprise. For example, you might define as a manufacturer a particular software company. Then, you would define as models each one of the applications that the company provides for your enterprise.
    • Defining manufacturers and models makes it easier to manage your assets. For example, you can generate a list of models provided by a particular manufacturer and generate a list of assets of a particular model.
  • Service Statuses
    • Service statuses identify the readiness condition of assets, such as in service, in repair, or discontinued. Defining service statuses let you track the availability and use of assets in your enterprise. For example, you can generate a list of assets that are currently in repair.
  • Vendor Types and Vendors
    • Vendor types are classifications for vendors that identify the type of company providing assets. For example, you might classify vendors that you lease assets from as lessors, while classifying vendors that provide service to you as providers.
    • Vendors identify the companies that supply your enterprise, including the type of company and a primary contact. Besides being referenced by assets, you can also reference a vendor in a user's contact record.
    • Defining vendor types and vendors gives you a convenient way to organize your assets. For example, you can generate a list of vendors that fall under a particular vendor type and generate a list of assets from a particular vendor.
  • Assets
    • Assets are the devices, software, and services that make up your business infrastructure. The information associated with an asset uniquely identifies the asset and indicates its precise location. Assets are referenced in tickets and can be associated with contacts (private assets) and organizations (shared assets). Assets let you:

Identify assets by name, class, and family

Specify inventory information

Specify additional properties to define the asset

Log and view comments associated with the asset

Specify location information for the asset

Specify service information, such as a service type, for the asset

View and define contacts and organizations assigned to the asset

Identify hierarchical relationships between assets

View tickets associated with the asset

    • You can integrate your Unicenter ServicePlus Service Desk installation with other asset management tools such as Unicenter Network and Systems Management, Unicenter Asset Management, and Intraware's Argis IT Asset Management Suite.

Policies

  • A key component of running your service desk using Unicenter ServicePlus Service Desk is implementing your policies in a way that best matches your current business process. You define policies using the following features:
    • Notifications
    • Service level agreements
    • Security
    • Surveys
  • Unicenter ServicePlus SD provides an out-of-the-box policy implementation that is acceptable for some sites and serves as a good starting point for other sites. You will need to review the default implementation in all the policy definition areas to determine if it meets your needs and modify it accordingly, if it does not.
  • Notifications
    • With Unicenter ServicePlus SD, you can automatically notify key personnel about ticket activities (researching, escalating, and so forth) and events (opening a ticket, for example). When a significant activity or event occurs, Unicenter ServicePlus SD creates a notification message that does the following:

Identifies the ticket activity or the notification event

References the ticket

Optionally includes other information

Can identify potential contacts

  • Notifications Methods
    • The standard notification methods for Unicenter ServicePlus SD are as follows:

Email sends messages by electronic mail directly to the recipient through Simple Mail Transport Protocol (SMTP) mail. Messages are also sent to the recipient's notification log.

Fax sends messages to the recipient using the FAXserve product.

The notification function sends messages to the recipient's notification log that the recipient can access when Unicenter ServicePlus SD is running.

Pager email sends email to an address maintained by a paging system provider. The email text will typically display on an alphanumeric pager.

    • You can also create your own notification methods. For example, you can send notification to a particular printer for periodic collection or by pager.
  • Service Level Agreements
    • In Unicenter ServicePlus SD, you set up service level agreements (SLAs) using service types and events. You can

Monitor tickets using events

Keep track of vendor and organization commitments and schedules as they relate to specific tickets using service types

Establish date and time controls for processing events and service types

  • Security
    • Before you allow people to begin using Unicenter ServicePlus SD, it is important that you set up security to determine what aspects of the system you want users to be able to access, what level of access you want them to have, and how you want them to be authenticated when they log into the system.
    • Security that you establish for Unicenter ServicePlus SD applies to all interfaces to the product, including the administrative client, the web interface, and the email interface.
    • Access Types. Using access types, you can control all security-related aspects of your service desk, including:

Access and grant levels

Web interface defaults

Function access privileges

User authentication

Internal logs

Customization form group

Unicenter ServicePlus integration

Data partition

    • Access and Grant Levels. Each access type has an access level associated with it, as well as a grant level, which you choose from the following list of predefined access levels, ranked from the highest to lowest level:

Admin (highest)

Analyst

Cust/Emp

None (lowest)

    • Function Access Privileges. The access type also defines function access, which determines the Unicenter ServicePlus SD components a user can view or modify.
    • User Authentication. Unicenter ServicePlus SD provides a user authentication solution that you can customize as part of the access type. The same authentication is used by all Unicenter ServicePlus SD interfaces, as well as by other Unicenter ServicePlus products, such as Collaboration Tools (Unicenter ServicePlus CT) and Knowledge Tools (Unicenter ServicePlus KT).
  • Surveys
    • Customer surveys are a useful administrative feature of Unicenter ServicePlus SD, allowing you to systematically collect and analyze customer feedback about your service desk performance. As with most other features of Unicenter ServicePlus SD, you can tailor this one to suit the needs or your site.

Users

  • An important part of establishing a working service desk is defining the users who are going to access it. In Unicenter ServicePlus Service Desk, users are called contacts.
  • Contact Types. Contact types are used to categorize service desk users into logical groupings based on how they use the system. For example, some of the many contact types that are predefined by the system are analyst, customer, and group. These predefined contact types will meet the needs of most service desk implementations; however, if your circumstances require it, you can create new contact types, as well as modify the predefined contact types.
  • A user's contact record defines all the information the system needs to know about the user, which in turn, is used in many ways throughout the system

Basic Identification Information

Login Information

Security Information

Service Type Information

Automatic Assignment Information

Information on How to Send Users Notification Messages

Information about the Assets Users Have in Their Environment

Groups to which a User Belongs

  • Groups.
    • A group is a collection of contacts that represent a specific area of responsibility within your service desk. Defining groups lets you assign responsibility for resolving a ticket when that responsibility is shared among several individuals. The individual that responds to the ticket in the group is irrelevant.
    • In Unicenter ServicePlus Service Desk, groups are implemented using the predefined group contact type, making a group just a special type of contact. A group has the same basic information as a contact, with the important additional feature that groups are one of the keys to automatically assigning requests.

Support Structure

  • The support structure of you service desk consists of the components that your users work with to resolve problems.
  • The support structure of you service desk consists of the components that your users work with to resolve problems.
  • Unicenter ServicePlus SD supports the following service desk models:
    • Internal
    • External
    • Both
  • Internal Model
    • An internal service desk supports employees who work for a company and have questions or problems with the products and services provided to them by the company. In Unicenter ServicePlus SD, the request is the basic unit of support when operating an internal service desk. Requests are tracking documents designed to handle the questions or problems of employees. They are oriented toward supporting an infrastructure owned and administered by the support organization.
  • External Model
    • An external service desk supports customers who buy products or services from your company and have questions or problems with those products or services. In Unicenter ServicePlus SD, the issue is the basic unit of support when operating an external service desk. Issues are tracking documents designed to handle the questions or problems of customers. They are oriented toward supporting products and services purchased by the customer.
  • Combined Model
    • Some companies have the need to operate both service desk models. In these cases, you can choose to separate these two functions with separate service desk installations, or you can set up Unicenter ServicePlus SD to support both models. The latter choice is convenient if your service desk analysts are cross-trained to support both employees and customers and if the distinction between internal and external support is not always clear. For example, you may have employees who purchase products from your company or customers who have problems and questions with the infrastructure of your company.

Reports

  • Unicenter ServicePlus SD provides a variety of reporting capabilities. Several reporting options are built directly into the Unicenter ServicePlus SD administrative client and web interfaces, including the ability to print forms for individual change orders, issues, requests, assets, and so on; to display summary or detail reports for lists of change orders, issues, requests, assets, and so on; and to display analysis reports.
  • In addition, you can install predefined Microsoft Access and Crystal Reports. These reports present you with information about the performance and status of your service desk and are available to you without the need to install any additional software-everything that you need to run them is installed for you automatically when you choose to install these reporting options with Unicenter ServicePlus SD.
  • Finally, because all of the information that you enter and use to run your service desk is stored in the Unicenter ServicePlus SD database, you can report on that data using any third-party reporting tool that is compatible with your database. To facilitate this type of reporting, several convenient views of the database are provided. Creating reports based on these views is quick and easy because the complex joins and selections are done for you, presenting the information that you, the Unicenter ServicePlus SD clients, have asked for most often.
  • Database Views
    • To allow you to create customized reports of the database quickly and easily, several database views are provided with Unicenter ServicePlus SD. Views simplify access to data by flattening normalized relational data to hide complex data relationships without increasing the size of the stored data.
  • Report Formatting
    • Unicenter ServicePlus SD gives you the ability to customize various data formats on the reports you print from the administrative client and web interfaces
  • Summary and Detail Reports
    • Summary and detail reporting options are built into the Unicenter ServicePlus SD administrative client and web interfaces. To print or view summary and detail reports, you must first select the records you want the report to include.
  • Analysis Reports
    • Analysis reporting options are also built into the Unicenter ServicePlus SD administrative client. Analysis reports help you to provide a global and detailed perspective on the service desk process. The following analysis reports are available:

Request Reports. Request reports provide you with statistics, such as number of requests opened, number of requests closed, average time open, and average time until closed for a specified period. This report is sorted by date, oldest to newest.

Request Area Reports. Request Area reports provide you with the number of requests opened in the specified period for each request area. This report is sorted alphabetically by request area.

Request Area Priority Reports. Request Area Priority reports provide you with the number of requests opened by priority in the specified period for each request area. This report is sorted by priority (highest to lowest) and then alphabetically by request area.

  • Microsoft Access and Crystal Reports
    • Unicenter ServicePlus SD includes several predefined Microsoft Access and Crystal Reports that you can use to generate a variety of graphical and text-based reports. When you install Unicenter ServicePlus SD, you can choose to install either or both of these types of reports-this reporting option is available on both client and server installations.

Options Manager

  • The Options Manager is a feature of the administrative client that lets you modify the functionality of Unicenter ServicePlus SD. For example, you can specify that service types are to be applied to requests but not to change orders.
  • All options can be installed, modified, or uninstalled. Some of them require a value to be specified when they are installed or modified. The detailed description of the option, available through the online help, indicates whether the option requires a value, and the values that are accepted by the Options Manager.
  • Using the Options Manager, you can:
    • Review the status of all options at the summary level
    • View the details of any specific option
    • Uninstall any of the available options
    • Install any defined option

Integrating Unicenter ServicePlus Products

  • Unicenter ServicePlus Service Desk is one of several Unicenter ServicePlus products and as such, is closely related to and integrated with other Unicenter ServicePlus products, such as Unicenter ServicePlus KT and Unicenter ServicePlus CT. Unicenter ServicePlus KT provides you with the tools you need to manage and search your knowledge base, and Unicenter ServicePlus CT gives you a personalized way to interact with customers and help them solve their problems. Used alone, each of the Unicenter ServicePlus products provides a powerful solution to help you service your customers-used together, they provide customers and analysts with all the tools they need to solve problems quickly and communicate effectively with one another.
  • There are a number of different combinations of the Unicenter ServicePlus products from which you can choose, depending on your requirements.

  • Software Delivery and Service Desk Integration
    • Unicenter Software Delivery provides a single solution for the distribution of software packages throughout the enterprise. The Unicenter Software Delivery integration with Service Desk lets Software Delivery raise trouble tickets, specifically in regards to requests and change orders on a Software Delivery job failure or distribution failure. Further, the Software Delivery Administrator is enabled to context launch into the Unicenter Service Desk Web Browser so that you can immediately view trouble tickets associated with a job target or job container. On the Service Desk side of the integration, the Service Desk Analyst is enabled to locate failed job targets and job containers quickly from the context of these tickets.
  • Service Desk and Asset Management Integration
    • Unicenter Asset Management provides a single solution for the discovery and management of IT assets throughout the enterprise. The Unicenter Asset Management integration with Service Desk lets Asset Management raise trouble tickets, specifically; requests and change orders in two ways:

Interactively. From an Asset Management asset, Asset Management analysts may launch the Unicenter Service Desk Web Browser to create new tickets associated with the Asset Management asset.

Non-interactively. Unicenter Asset Management analysts may define Asset Management policies (event or query based) that when violated, generate tickets from ticket templates in Service Desk.

Graphical User Interface

  • You can access all Unicenter ServicePlus SD functions through its graphical user interface (GUI), which provides a comprehensive and consistent interface for the Unicenter ServicePlus SD administrator and service desk analysts.
  • The Unicenter ServicePlus SD GUI and browser interfaces let you customize windows and view information according to the demands of your business. This lets your administrators and managers evaluate enterprise-wide problem management status instantly and respond with resource allocation adjustments when necessary. You can use the Screen Painter to change windows or create new windows according to the needs at your site.

Web Interface

  • The Unicenter ServicePlus Service Desk web interface (also called the browser interface) provides you with Unicenter ServicePlus Service Desk functionality through the World Wide Web, including the ability to open, update, or close tickets, display and post announcements, and access supporting data tables. It enables independent browsing of the knowledge base, thereby reducing the number of calls to the service desk and speeding resolution times. Web interface security is controlled by the use of access types. The interface can be fully tailored and can be used with many popular web browsers.
  • The Different Web Interfaces
    • Unicenter ServicePlus Service Desk provides several separate web interfaces for different types of users. These interfaces differ primarily in their level of access to the capabilities of the product and the types of tickets they use-interfaces geared primarily toward a user in an external service desk environment would work with issues, while internal service desk users would work with requests and change orders.
    • The supplied interface types are as follows:

Analyst Web Interface

Customer Web Interface

Employee Web Interface

Guest Web Interface

Mobile Device Web Interface

Keyword Search

  • Unicenter ServicePlus Service Desk - Keyword Search is part of the Unicenter ServicePlus suite of products from Computer Associates that offers a complete customer relationship management solution. Unicenter ServicePlus Service Desk - Keyword Search (Unicenter ServicePlus Service Desk KS) is a powerful knowledge management solution that offers multiple knowledge models, tailoring the right solution to the customer effectively and efficiently. It enables rapid searches of a dynamic knowledge base to quickly resolve customer issues.
  • Unicenter ServicePlus Service Desk - Keyword Search is composed of the following modules:
    • Search Tool. The Keyword Search method allows you to perform a search on words contained in the Problem field of knowledge base documents.
    • Managing Documents Functionality. An analyst and knowledge engineer can manage the content for all of the problem-solving models in the knowledge base. The Manage Documents function provides a mechanism for building and editing knowledge underlying the retrieval tools. Because it includes the ability to assign ownership of a particular knowledge solution to an expert, it ensures that the solution for a given problem is kept current and accurate.
    • Keyword Search Administration. Keyword Search Administration enables the knowledge manager and system administrator to manage the Keyword Search Tools system. A knowledge manager can manage the noise words, special terms, and synonyms that will be excluded or included in searches. The system administrator has access to all of the Keyword Search Administration features, which allows for the management of documents, attachments, and search terms.

Auto Assignment

  • The Auto Assignment feature helps the Unicenter ServicePlus Service Desk manager become more productive by reducing the time it takes to administer the assignment of Requests. Fewer hours are required for manually balancing staff workloads and coordinating Analyst work schedules.
  • Auto Assignment can make logical choices when it comes to assigning Requests to Analysts, based on the following considerations:
    • Which group of analysts works on the requests
    • When different types of problems are worked on
    • Which locations service the various customers
    • Individual analyst workload and availability
  • Auto Assignment can be implemented gradually. In other words, you can avoid spending months on planning and then crossing your fingers when it comes time to start it. Using the Request Area, Auto Assignment is able to make decisions based on logical relationships between Analysts, Groups, Locations, and Workshifts. Whether you track Requests by customers or have an Asset-centric service desk, Auto Assignment can simplify even the busiest help center.

Unicenter Service Management

(Unicenter Service Catalog , Unicenter Service Accounting , Unicenter Service Assure , Unicenter Service Meter & Unicenter Service Fulfillment )

Unicenter Service Management is a fully automated and integrated, multi-vendor service management solution that lets you closely link IT operations with business requirements. With Unicenter Service Management software, you can track resource usage by user, Business Unit or line of business, set and manage service levels and gain visibility into the costs of the services that you provide.

  • Unicenter Service Management enables enterprises with:
    • Service Provisioning. The automatic activation of service requests to speed deployment and minimize the amount of time the IT staff spends on administrative procedures.
    • Accurate Accounting of IT Resource Utilization. Enables enterprises to consolidate and reallocate IT resources, based on actual IT resource usage. Enterprises gain the ability to manage all of their dedicated and shared infrastructure resources including network, storage, servers, and applications. Unicenter Service Management provides enterprises with an accurate account of how resources are being utilized (i.e. by what applications, user, or business function)
    • Cost Allocation and Chargeback. Enables enterprises to account for IT expenses and the true cost of providing services and distribute those costs among the business units using the services. Enterprises can provide their internal Business Units with web access to real time and historical charge back invoice information, as well as, detailed IT usage reports.
    • Budgeting and Planning. Enables enterprises to budget and forecast IT costs based on collected historical IT usage data. Business managers can view the variance between actual spending and budgeted projections providing greater visibility into future IT cost. Business managers gain the necessary information to accurately calculate and justify future IT budgets to meet their future business objectives.
    • End-to-End SLA Management. Ensures that service commitments are met and that appropriate levels of service are provided, which meet business requirements. Service packages suited to any business requirements can be created, and administrators can define and implement SLAs and then track performance verses the defined objectives. Service assurance can also be applied to monitor and enforce service levels for third-party services. SLA reports provide greater visibility into an enterprise's operation environment, and overall health of IT resources from an IT administration or end-user point of view.
    • Service Catalog. Users can access and request service, as well as review their account status. As an IT Administrator, you can track user activity, set up accounts, review service reports, and set service levels and rates for services provided. A service catalog also allows IT to brand its services in order to better communicate the value that IT is bringing to end-users and the enterprise.
  • Unicenter Service Catalog
    • Unicenter Service Catalog serves as the gateway through which information is made available anywhere via a Web Browser. Unicenter Service Catalog is also the access gateway to other components in Unicenter Service Management.
    • Unicenter Service Catalog lets IT managers create a service catalog through which they easily can administer and provide access to all their service offerings. Through the service portal, users can quickly access their current services, browse additional service offerings, subscribe to new services and review their account status. Through the administrator view, IT managers can track user activity, add and delete entries, review and publish service reports, create new accounts and set service levels. By using the catalog to define service parameters, managers can set technical and product standards. Unicenter Service Catalog's simple Web interface is highly customizable and displays can be viewed in multiple languages. Administrators can view user activity by application, resource, Business Unit, or any other defined organizational unit and can also brand service offerings for specific groups of end-users.
    • Unicenter Service Catalog consists of the following features:

Service catalog. Defines service offerings, captures and maintains IT service components.

Organization structure. Defines an enterprise's organizational structure, controlling access to and publishing information.

Web Based Service Portal. Acts as the gateway to information collected by the Unicenter Service Management system complete with access control settings, by role and business unit.

Scheduler. Schedules service management associated tasks.

Reporting Engine. Has the ability to create tables and charts with drill down capabilities from various data sources. Offline reporting is also available and may be used to free up server resources.

Branding. Allows the product look and feel to be customized by business unit and user without any coding.

Web Services Interface. Programmatic interfaces, allowing quick and easy integration to other enterprise applications.

    • Catalog Architecture

Pictured below is a representation of the service catalog architecture. This depiction demonstrates how an offering is comprised of rate plans, which in turn consist of assorted rate items. These rate items in conjunction with there varying associations constitute the inner workings of the service catalog:

    • Offerings. A product, application, service, or simply something you want to make available to your business units. An offering is then associated with a rate plan, which contains the cost associated with subscribing to it.
    • Rate Plans. A rate plan contains the cost associated with subscribing to an offering, based on transaction, usage based billing, rate and more. It can be composed of many types of chargeable and non-chargeable items, including applications, agreements, etc.
    • SLA Package. A Service Level Agreement (SLA) is a contract that specifies the level of service that will be provided while the agreement is in effect. It is a bundling of service level objectives for a particular enterprise resource. One of the main components of an SLA package is an application instance. You may define new SLA Packages through the Catalog configuration definitions.
    • Unicenter Service Catalog Portal is comprised of 2 components:

Content Library. The Portal Library, a directory of published information where data is defined, organized and customized. This data can be shared among users. Administrators can use role based and Business Unit based access control to manage Content Library data. Users can publish private data to the Content Library.

Presentation Dashboards. Used to view the information stored in the Content Library. Personal Dashboards allow users to organize, integrate and personalize data. Shared Dashboards are used to publish information to users.

  • Unicenter Service Fulfillment
    • Using Unicenter Service Fulfillment, an instance of a workflow process (also called a process instance) can be launched through Rule Management in response to an internal or external event or scheduled to be run on a regular basis using the scheduler.
    • Architecture. The Workflow architecture is shown below:

    • Workflow Components. Unicenter Service Fulfillment consists of a tool to define a business process model visually, various services for executing the business process model, and a user interface for managing and monitoring workflow processes and tasks.

Rule Management. Allows a Service Management administrator to define an action or actions (in the form of scripts, Java programs, E-mails, etc.) to be taken when a certain event is generated in Unicenter Service Fulfillment Workflow Management.

Workflow Management. Allows a Service Management administrator to monitor process instances executed by the Process engine. The process engine is the core of the workflow management system, which executes the process instances by following the flow in which they were defined. All the rules and regulations that constitute a workflow process are resolved and executed by the Workflow Engine.

Process Definition Tool. Sometimes referred to as the Workflow IDE or Workflow Design Tool, this is your primary tool for maintaining process definitions, managing workflow instances, and controlling workflow participant interaction.

Worklist. The Work list application lets you manage tasks that are currently in your queue as well as the group's queue to which you belong.

  • Unicenter Service Meter
    • Unicenter Service Meter is the architecture designed to collect and normalize data into a common format, preparing the data for business level applications, such as Unicenter Service Accounting and Unicenter Service Assure. Unicenter Serv ice Meter utilizes HTTP for data exchange, and is built on a lightweight, network friendly and scalable push technology.
    • Unicenter Service Meter functionality includes:

Real-time and batch data collection and aggregation

Monitoring capabilities of dedicated or shared resources

Proven methods of data collection

Data integrity methods.

Self-deployment, update and management of data collectors.

    • Unicenter Service Meter consist of the following features

Resource tracking

Out-of-the-box metering packages

Extendible Resource Tracking Customizations

Data Mediation

Failover Mechanisms

Load-Balancing

Pre-build metering reports

    • Host Administration. An enterprise resource is classified as a Host or Network Device. When creating a host through the Host Administration GUI, the host type denotes whether the device is of type net device or host. As an Administrator, you may add new hosts or drop hosts
    • Metric Request. Ucenter Service Meter is responsible for data collection. The metric request is a request to collect a particular metric on a particular resource. It denotes the actual metric to be collected on a resource and the data collection method used to collect metric data.
    • Metric Diagnostic Reports. Diagnostic reports give detailed information on every data collector and metric request. An administrator can monitor data collection from a central location and quickly pinpoint an error when an error in data collection occurs.
  • Unicenter Service Assure
    • With Unicenter Service Assure, IT managers can monitor service levels from their user's point of view. Known as end-to-end service-level reporting, the software allows them to track an array of IT functions in aggregate. So, instead of reporting on dropped CPU cycles, memory errors and network lag, they can demonstrate the end result of all this activity in terms meaningful to their end-users such as e-mail availability and response time.

    • Unicenter Service Assure Subcomponents. The Unicenter Service Assure Engine runs as a Windows Service or a UNIX daemon and hosts four sub-components. The components that can be installed during installation are:

Processor. Monitors SLO's (Service Level Objectives). The main SLO engine is designed to have multiple instances, allowing you to split the workload across multiple machines. The workload depends on the number of SLAs andSLOs you define in Unicenter Service Assure.

Database. Handles all database access. It can be installed on a single machine that has the database drivers installed to service the processors. Currently, the database component supports native Oracle client, native Ingres client, or MSQL Server on the Windows platform.

Unicenter Service Management Registry. Follows the same philosophy as the database component.

Gateway. Provides a central access point to allow external systems (for example Unicenter Service Meter) to send event data to the processors. The gateway component is designed to have only one instance.

  • Unicenter Service Accounting
    • Unicenter Service Accounting enables you to set up usage or transaction based billing through Unicenter Service Meter, credit for violations through Unicenter Service Assure, charge for subscriptions to the Catalog, and more.
    • Uncenter Service Accounting generates invoices based on real-time usage data and supports a variety of chargeback methodologies.
    • Unicenter Service Accounting offers extended usage based chargeback over a wide range of supported applications, networks, and applications, and other value added services, including email transaction count by user, CPU usage on shared UNIX or Windows servers by application , amount of storage used and allocated, etc.
    • Accounting Architecture

    • Accounting Configuration. You may change the configurations by clicking on the value and selecting a new value. The Accounting Configuration window displays the following groups of fields:

Accounting Profile Defaults

Invoice Engine Configuration

System Configuration

System Configuration

Subscription Configuration

Planning Configuration

Payment Methods

Invoice Methods

Billing Cycles


Document Info


Accesari: 5911
Apreciat: hand-up

Comenteaza documentul:

Nu esti inregistrat
Trebuie sa fii utilizator inregistrat pentru a putea comenta


Creaza cont nou

A fost util?

Daca documentul a fost util si crezi ca merita
sa adaugi un link catre el la tine in site


in pagina web a site-ului tau.




eCoduri.com - coduri postale, contabile, CAEN sau bancare

Politica de confidentialitate | Termenii si conditii de utilizare




Copyright © Contact (SCRIGROUP Int. 2024 )