For complete information about the device fields appearing on the Device Details page, see Groups and sections of items in device details.
The Device Details page for a device contains inventory information presented in sections that are collected in groups. The extent and focus of information included on the page depends on the device and any subtypes indicated.
NOTE: If you have assigned an Asset Subtype, you can choose whether to show or hide the details that appear for each Device on the Device Detail page. For example, for the subtype Printer, information that is irrelevant to printers, such as the items Installed Programs, Discovered Software, and Metered Software, could be made hidden. Whole groups can be hidden as well. See Add Asset Subtypes and select Device Detail page preferences. |
Scoped users can see the details of all devices, but can only edit the details of those devices that are associated with their role. For more information about user roles, see Add or edit User Roles.
The following groups can appear on the Device Details page:
Basic device identification information. The items are not separated into sections as in the other groups on the page. The entries that appear on the Device Detail page vary depending on the device, operating system (if relevant), connection type, and so on.
A field that indicates the inventory information was added manually, either through WSAPI or XML upload. click Edit to modify the information. |
||||||||||||||||||||||||||||||||
A field that indicates how the device is being managed: Agent Device, Agentless Device, Manually Entered Record, or Agent/Agentless (hybrid KACE Cloud MDM inventory). Click Edit to change connection protocols. |
||||||||||||||||||||||||||||||||
A description of the device, populated by Agentless inventory for Windows and SNMP devices. |
||||||||||||||||||||||||||||||||
KACE MDM devices only. Indicates the ownership of the device: Company, Personal or Unknown. |
||||||||||||||||||||||||||||||||
The total amount of random-access memory (RAM) on the device. |
||||||||||||||||||||||||||||||||
The operating system of the device, such as Windows, Mac OS X®, or Linux. |
||||||||||||||||||||||||||||||||
The service pack version number (Windows or SUSE Linux Enterprise Server only). |
||||||||||||||||||||||||||||||||
The amount of time the device has been running since it was restarted. |
||||||||||||||||||||||||||||||||
The version number of the KACE Agent installed on the device. |
||||||||||||||||||||||||||||||||
The timezone used by the KACE Agent installed on the device. |
||||||||||||||||||||||||||||||||
The source of the collected device details.
|
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||
The protocol, such as SNMP, used to collect inventory information from the device. |
||||||||||||||||||||||||||||||||
The date and time that the device’s first inventory record was created. |
||||||||||||||||||||||||||||||||
The date and time that the device’s inventory record was modified. |
||||||||||||||||||||||||||||||||
Printers only. The contact information for the selected printer, such as an email address. This information is stored in the managed printer's SNMP sysContact field. |
||||||||||||||||||||||||||||||||
Printers only. The location of the selected printer, such as the name of the organization. This information is stored in the managed printer's SNMP sysLocation field. |
||||||||||||||||||||||||||||||||
Volume n |
The type and size of the disk drive’s file system, and amount of space used on the disk drive. To view changes to the drive usage, click Show Usage History link in this field. This information is updated when usage increases or decreases by 5% or more. There is one entry for each volume. For VMware® ESXi® host devices, each datastore associated with the ESXi host is listed as a volume. |
|||||||||||||||||||||||||||||||
Click Force Inventory to immediately update inventory information for the device and synchronize the device with the appliance. Force Inventory is available only if the agent messaging protocol connection to an Agent-managed device is active, or for Agentless devices, if the device is reachable. |
||||||||||||||||||||||||||||||||
The name of the managing vCenter (VMware devices) or SCVMM (Hyper-V devices). |
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||
The following commands are available when you select a provisioned VMware virtual machine.
|
||||||||||||||||||||||||||||||||
The following commands are available when you select a provisioned Hyper-V virtual machine.
For complete information about these virtual machine actions, refer to your Hyper-V documentation. |
||||||||||||||||||||||||||||||||
For complete information about these Chrome device actions, refer to the Google documentation. |
||||||||||||||||||||||||||||||||
The following commands are available:
|
Additional details on items in the Summary section.
A list of the software installed on the device. If change history is enabled for this section, and the information in this section has changed, the Show Changes link appears next to the heading. Click Show Changes to view only those items that have changed. Click Hide Changes to view all items. |
||
A list of Custom Inventory fields for this device, along with the field name and value. |
||
The files that have been uploaded to the appliance from this device using the upload a file script action. |
||
Microsoft patches that have been installed on the device. If change history is enabled for this section, and the information in this section has changed, the Show Changes link appears next to the heading. Click Show Changes to view only those items that have changed. Click Hide Changes to view all items. |
||
A list of processes running on the device. If change history is enabled for this section, and the information in this section has changed, the Show Changes link appears next to the heading. Click Show Changes to view only those items that have changed. Click Hide Changes to view all items. |
||
A list of startup programs on the device. If change history is enabled for this section, and the information in this section has changed, the Show Changes link appears next to the heading. Click Show Changes to view only those items that have changed. Click Hide Changes to view all items. |
||
A list of services that are running on the device. If change history is enabled for this section, and the information in this section has changed, the Show Changes link appears next to the heading. Click Show Changes to view only those items that have changed. Click Hide Changes to view all items. |
Information about actions to be performed on the device.
If the operating system is not supported, that fact is stated in a message. If the device is eligible for monitoring but does not have monitoring enabled, the Enable Monitoring button appears. |
||
Any alert criteria profiles that are assigned to this device. |
||
Alerts that are active for this device, with icons indicating the level of alert. |
||
The labels assigned to this device. Labels are used to organize and categorize inventory and assets. |
||
A list of Managed Installations that have failed to install. To access details of the Managed Installations, click the Managed Installation Detail link. |
||
A list of SNMP Inventory Configurations associated with this device. To access details of the configurations, or to add configurations, click Manage Associated SNMP Configurations. |
Information related to patching and device vulnerabilities.
A list of the patches detected and deployed on the device. If patch attempts have been made, but they have failed, you can click Reset Tries to reset the number of patch attempts to the maximum allowed. |
||
Threats that are harmful to applications, processes, startup items, or services on the device. |
||
A list of the Windows Feature Update tasks detected and deployed on the device. If updates attempts have been made, but they have failed, you can click Reset Tries to reset the number of patch attempts to the maximum allowed. |
||
A list of URL to the device-associated Linux package repositories. |
||
A list of the patches detected and deployed on the device. If patch attempts have been made, but they have failed, you can click Reset Tries to reset the number of patch attempts to the maximum allowed. |
||
Additional inventory information about selected Dell client systems using Dell Command | Monitor.
DCM log entries. These can indicate hardware errors detected by firmware. |
||
For classes and properties queried by the appliance using Dell Command | Monitor, see .
Information regarding updates and inventory (for Dell devices only).
A list of the Dell Updates detected and deployed on the device, and any related schedules. If update attempts have been made, but they have failed, you can click Reset Tries to reset the number of update attempts to the maximum allowed. |
Information related to appliance records.
• |
Management Service Logs: The primary role of appliance Management Service is to run the offline KScripts. The Management Service logs display the steps performed by Management |
• |
Bootstrap Logs: The appliance sends a bootstrap request to get inventory information for devices that have checked in for the first time. The logs related to this request are displayed in Bootstrap logs. |
• |
Client Logs: The appliance sends a request to the Agent to get inventory information periodically. A script runs on the device, then sends the inventory information to the appliance and inventory is uploaded to the appliance. The Agent logs display these actions. |
• |
Scripting Updater: A request is initiated periodically from the device to get the latest information related to the changes in offline KScripts. Scripting Updater logs display this information. |
• |
Agentless Inventory Status Messages: The log displays messages related to collecting and submitting inventory data from Agentless-managed devices. |
Files uploaded by selecting Choose Action > Upload Agent Fileson this page. |
||
Details about User Console packages installed on this device. |
||
Chrome devices only. It shows the date the device was last active, the length of time the device was active for, and the activity history. Each entry in the activity history shows the date and length or each user session. |
This section displays the details of the Asset associated with this device. Clicking the Edit this Asset link enables you to edit the asset information.
Assets that are related to this asset, such as parent or child assets. |
||
If devices in the network have the DDP|E client installed, the appliance can collect status and configuration information and display it on the Device Detail page.
A requirement for the appliance being able to collect detailed inventory from Windows DDP|E clients is to set the DumpXmlInventory key in the client.
This registry value causes DDP|E to write an inventory.xml file to the target device, which is then parsed by inventory. See Add a Dump Inventory registry key to permit inventory collection on Windows DDP|E client devices.
This requirement applies only to Windows.
DDP|E consists of applications that enable a user to:
An identification of the DDP|E client used by the DDP|E server. |
||
Example values are Protected and Unprotected. Values of Locked or Unknown might indicate a problem. |
||
Timestamp of when the last DDP|E client inventory occurred. Not to be confused with K1 inventory. |
Name of the device/volume as reported by the operating system. |
||
Indication of the current level/status of DDP|E protection on the DDP|E client. |
||
Manner of protection used on the DDP|E client. The option is typically VendorProtected, which indicates DDP|E or BitLocker. |
BitLocker is a full disk encryption feature included with Windows.
|
||||||||||
Type of encryption used. For example, AES-128. Possible values:
|
||||||||||
|
||||||||||
|
||||||||||
Status of the conversion. Possible values:
|
||||||||||
Status of any wiping of free space. Possible values:
|
||||||||||
Key protectors in place. Possible values:
|
FileVault 2 is a full disk encryption feature included with Mac OS X.
Indicates the existence of a corporate-provisioned X.509-based asymmetric key pair. |
||
The status of the encryption process. Examples include Pending Conversion, Converting, Encryption Paused, and Complete. |
||
Status of the encryption. For example, Locked or Unlocked. |
||
Additional version information that is specific to the manufacturer. |
||
The version of the Trusted Computing Group (TCG) specification that the TPM supports. |
||
If DumpXmlInventory is absent on a Windows DDP|E client, the appliance cannot get access to the inventory .xml file in order to collect the relevant field information.
Dell Data Protection | Encryption is installed on the Windows device. Go to http://www.dell.com/support/home/us/en/19/product-support/product/dell-data-protection-encryption/drivers.
You must add DumpXmlInventory to a Windows DDP|E client before the appliance can collect field information from that client's inventory.xml file.
1. |
a. |
Log in to the appliance Administrator Console, https://appliance_hostname/admin. Or, if the Show organization menu in admin header option is enabled in the appliance General Settings, select an organization in the drop-down list in the top-right corner of the page next to the login information. |
b. |
c. |
2. |
KACE SMA Enable Detailed DDPE Inventory (Windows), the name of this default script. | |
The script type is Offline KScripts. | |
Indicates the readiness of the script to be rolled out to the network. Set the status to Production. | |
Contains the brief description of the actions the default script performs. | |
3. |
Deploy to all devices. Clear the check box to limit the deployment to specific labels or devices. | |||||
Limit deployment to devices that belong to specified labels. To select labels, click Edit, drag labels to the Limit Deployment to window, then click OK. | |||||
Limit deployment to one or more devices. To find devices, begin typing in the field. | |||||
|
4. |
Run in combination with an event rather than on a specific date or at a specific time. | |||||||||||
Every n hours |
|||||||||||
Run daily at a specified time, or run on a designated day of the week at a specified time. | |||||||||||
Run on the nth of every month/specific month at HH:MM |
Run on the same day every month, or a specific month, at the specified time. | ||||||||||
Run on the nth weekday of every month/specific month at HH:MM |
Run on the specific weekday of every month, or a specific month, at the specified time. | ||||||||||
Run according to a custom schedule. Use standard 5-field cron format (extended cron format is not supported): Use the following when specifying values:
| |||||||||||
Click to view the task schedule. The Task Schedule dialog box displays a list of scheduled tasks. Click a task to review the task details. For more information, see View task schedules. |
5. |
◦ |
Click Run Now to immediately push the script to all devices. |
Use this option with caution. See Using the Run and Run Now commands.
◦ |
Click Save. |
You must add DumpXmlInventory to a Windows DDP|E client before the appliance can collect field information from that client's inventory.xml file.
1. |
2. |
3. |
Provide a description name for the new GPO (for instance, Dell Data Protection | Encryption: Inventory Registry Setting) and click OK. |
4. |
5. |
6. |
7. |
8. |
9. |
10. |
11. |
12. |
13. |
14. |
You can now link this new group policy object to a specific domain, Organizational Unit, and so on.
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. 利用規約 プライバシー Cookie Preference Center