Chatta subito con l'assistenza
Chat con il supporto

Enterprise Reporter 3.5.1 - Configuration Manager User Guide

Product Overview Configuring the Configuration Manager
Starting the Configuration Manager Finding answers and getting help Overview of Enterprise Reporter Communications and Credentials Required Using the Credential Manager Setting Up Your First Collection Computers (Nodes) Modifying Your Deployment Configuring Global Settings Customizing the Configuration Manager View
Understanding Discoveries Creating Discoveries
Step 1. Create the Discovery (Name) Step 2. Choose what to include in your discovery (Scopes) Step 2a. Choose scopes for your on-premises discoveries
Choosing your Active Directory Scopes Choosing your Computer Scopes Choosing Your Exchange Scopes Choosing Your File Storage Analysis Scopes Choosing Your Microsoft SQL Scopes Choosing Your NTFS Scopes Choosing Your Registry Scopes
Step 2b: Choose scopes for your cloud discoveries Step 3. Schedule your Discovery Step 4: Review the summary
Managing Discoveries Troubleshooting Issues with Enterprise Reporter Appendix: PowerShell cmdlets Appendix: Encryption Key Manager Appendix: Log Viewer

Exchange Discovery: Optionally refine your scope list with exclusions

Exclusions refine the inclusions you have defined. You can do this optional step in conjunction with inclusions. For full details, see Refining Your Scope with Exclusions .

1
Click Add.
3
Click Exclude

Exchange Discovery: Optionally select a domain controller

To enumerate your domain, Enterprise Reporter looks to the domain controller. Depending on the domain controller chosen, the time it takes to perform the collection may vary. You can either allow Enterprise Reporter to choose the first available domain controller returned by Active Directory, or you can select one that will optimize collection time. In this case, select a domain controller located physically close to the cluster you assigned to the discovery, or one that you know is a fast computer.

To assign a specific domain controller, choose Select an available domain controller, and then select a domain controller from the list.
To assign a specific domain controller from the current Sub-net, choose Select an available domain controller from current Sub-net, and then select a domain controller from the list.
4

Exchange Discovery: Decide what to collect from any server in the discovery

You can collect a variety of information from the computers in your discovery. Basic information from the root organization (the organization name and full LDAP path) is always collected.

The following table outlines the additional information that can be collected. Collecting additional information impacts discovery performance. Options with a high performance cost will slow discovery performance more than options with a medium or low performance cost.

 

Mailboxes

Collects basic information for Mailboxes, Public Folder Mailboxes, and Mailbox Stores.

 

Medium

If collecting mailboxes, you can enable this option to collect subfolders of Exchange mailboxes.

High

If collecting mailboxes, you can enable this option to collect mailbox delegates on Exchange mailboxes. This option excludes Mail-Enabled Users, Mail Contacts, Administrators, and Distribution Groups.

High

Mail-Enabled Users

Collects basic account information for Mail-Enabled Users.

Low

Mail Contacts

Collects basic account information for Mail Contacts.

Low

Public Folders

Collects basic information for Public Folders and, where applicable, Public Folder Stores.

Medium

If collecting public folders, you can enable this option to collect system public folders.

High

Distribution Groups

Collects basic account information for Distribution Groups.

Medium

Permissions

Collects permissions on Exchange objects such as mailboxes, public folders, organizations, administration groups, and servers. This option excludes permissions for Mail-Enabled Users, Mail Contacts, Administrators, and Distribution Groups.

Medium

If collecting permissions, you can enable this option to collect mailbox Active Directory permission information, including mailbox subfolder permissions.

High

If collecting permissions, you can enable this option to collect mailbox Exchange permission information.

High

If collecting permissions, you can enable this option to collect mailbox folder permission information.

High

If collecting permissions, you can enable this option to collect public folder permission information.

High

Nested group members

Recursively collects the members of any groups found in the Exchange discovery.

High

The following options further refine how collection tasks are handled. When collecting additional attributes, especially ones with a high performance cost, consider enabling these performance options to help improve collection performance.

Performance Options

When both sub-options are selected, one task per mailbox server is created. One additional task per object type (except Mailboxes) is also created.

When neither option is selected, one task is created for the entire collection.

One task per mailbox server is created. One additional task that contains all other object types is also created.

One task per object type is created. For example, if there are Mailboxes, Distribution Groups, Mail-Enabled Users, Mail Contacts, and Public Folders, 5 tasks are created.

Mailboxes

 

If collecting mailboxes, you can enable this option to collect all system delegates. Disabling this option will decrease collection time by excluding system delegates with the following account names from the collection:

Public Folders

 

Permissions

 

If collecting permissions, you can enable this option to collect permission information only for Exchange objects with explicit permissions.

The following options determine how target computers are resolved during discoveries.

 

Allow a configurable number of seconds for a target computer to respond to a ping request

Pings target computers at collection time to determine the existence of target computers on the network before processing tasks.

Resolve target computers with disjoint namespaces

Verifies the existence of target computers with disjoint namespaces by using their DNS host names and, if that fails, by using their NetBIOS names.

Choosing Your File Storage Analysis Scopes

File Storage Analysis scopes determine what information will be collected when you run the discovery. There are several steps you should take to properly design your discovery.

See also:

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione