지금 지원 담당자와 채팅
지원 담당자와 채팅

Enterprise Reporter 3.6 - Configuration Manager User Guide

Product Overview Configuring the Configuration Manager
Starting the Configuration Manager Finding answers and getting help Overview of Enterprise Reporter Communications and Credentials Required Using the Credential Manager Setting Up Your First Collection Computers (Nodes) Modifying Your Deployment Configuring Global Settings Customizing the Configuration Manager View
Understanding Discoveries Creating Discoveries
Step 1. Create the Discovery (Name) Step 2. Choose what to include in your discovery (Scopes) Step 2a. Choose scopes for your on-premises discoveries
Choosing your Active Directory Scopes Choosing your Computer Scopes Choosing Your Exchange Scopes Choosing Your File Storage Analysis Scopes Choosing Your Microsoft SQL Scopes Choosing Your NTFS Scopes Choosing Your Registry Scopes
Step 2b: Choose scopes for your cloud discoveries Step 3. Schedule your Discovery Step 4: Review the summary
Managing Discoveries Troubleshooting Issues with Enterprise Reporter Appendix: PowerShell cmdlets Appendix: Encryption Key Manager Appendix: Log Viewer

Starting the Configuration Manager

When you open the Configuration Manager, your first step is to connect to a server. Connecting to a server gives you access to its associated clusters, nodes, and discoveries. You need to know the name of the server, and the port number. The server name is the name of the computer where the server is installed. The port number was configured during the server installation.

NOTE: To start the Configuration Manager, you must be a discovery administrator. For more information, see “Installing and Configuring the Configuration Manager and Role Based Security in Enterprise Reporter” in the Installation and Deployment Guide.

If this is your first time opening the Configuration Manager, you need to provide a license. For more information, see “Licensing Enterprise Reporter” in the Installation and Deployment Guide.

1
Click the Start menu and select Quest | Configuration Manager.
Click Browse, and locate the computer where the server is installed.
4
Click Log In.

Finding answers and getting help

When using Enterprise Reporter, you can press F1 from any screen for help. The documentation included with Enterprise Reporter will open and display the section of documentation most relevant to the screen you are viewing.

The Help menu provided in Enterprise Reporter also addresses frequently asked questions related to the screen you are viewing. Clicking on any of the topics provided will display the related section of documentation.

Enterprise Reporter also provides a tool for searching knowledge articles and community discussions.

1
Click the link for Online Support in the header bar of the console.
2
Select whether to search Knowledge Articles, Community Discussions, or both.
4
Press Enter or click the search icon.

Overview of Enterprise Reporter Communications and Credentials Required

There are many communication channels in Enterprise Reporter, involving different sets of credentials. This allows for controlled access to your environment, but you must understand where each set of credentials are used, and what permissions they need. See the Enterprise Reporter Release Notes for details.

Logged-In User Credentials

The following table shows the use of the logged-in user credentials and how to configure your environment to ensure successful data collection:

Configuration Manager

Enterprise Reporter Server

Must be a member of the Reporter_Discovery_Admins group in order to log in to the console.

Configuration Manager will send configuration and set up requests to the server.

Configuration is dependent on your deployment’s security group setup. See the Information page to determine the type of security in place.

For more information, see “Configuring the Database and Security Groups” in the Installation and Deployment Guide.

Configuration Manager

Targets

Must be able to enumerate the targets during scope selection, unless alternate credentials are provided for the discovery.

All domains with which the credentials have a forest or domain level trust will be enumerated.

On each target, grant the user read access.

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택