Converse agora com nosso suporte
Chat com o suporte

Enterprise Reporter 3.2.2 - Configuration Manager User Guide

Product Overview Understanding Discoveries Creating Discoveries
Step 1. Create the Discovery Step 2. Choose what to include in your discovery (Scopes) Step 2a. Choose scopes for your discoveries
Choosing your Active Directory Scopes Choosing your Computer Scopes Choosing Your Exchange Scopes Choosing Your File Storage Analysis Scopes Choosing Your Microsoft SQL Scopes Choosing Your NTFS Scopes Choosing Your Registry Scopes
Step 2b: Choose scopes for your Office 365 discoveries Step 3. Schedule your Discovery Step 4: Review the summary
Managing Discoveries Configuring the Configuration Manager
Starting the Configuration Manager Finding Answers and Getting Help An Overview of Enterprise Reporter Communications and Credentials Required Logged In User Details Setting Up Your First Collection Computers Modifying your Deployment Improving the Performance of Your Discoveries What does the status of a node or cluster indicate? Using the Credential Manager Changing the Credentials used by the Enterprise Reporter Server Configuring Global Settings Global Discovery Settings
Troubleshooting Issues with Enterprise Reporter Appendix: PowerShell cmdlets Appendix: Encryption Key Manager Appendix: Log Viewer

Step 2b: Choose scopes for your Office 365 discoveries

In this section, we will explore choosing scopes for each discovery type.

See also Step 2a. Choose scopes for your discoveries

 

Choosing Your Azure Active Directory Scopes

Azure Active Directory discoveries, by default, target the tenant that you specified with the credentials on the Name page in Step 1. Create the Discovery . You can edit the name of the Azure Active Directory tenant if it is different from the credentials specified. Information about your contacts, users, groups, group members, roles, and application service principals is collected based on the discovery options.

See also:

Azure AD Discovery: Configuring Enterprise Reporter Applications for Azure

You must register the applications used by Enterprise Reporter in your Azure environment. You can complete this process using the System | Configuration | Tenant Application Management option in the main menu before you create discoveries.

If the Enterprise Reporter Azure application has not yet been registered in your Azure environment, the Azure Active Directory Scopes page of the discovery will display a warning message above the Azure Tenant name at the top of the screen. If you have already configured the required tenant application and it indicates the option to Reconfigure, nothing further is necessary.

 

1
On the Azure discovery Scopes page, click Configure next to the tenant name to open the Tenant Application Manager.
1
Click Add.
3
2
Click Delete.
3
Click Yes to confirm that discoveries for any tenant that you delete will be unable to collect data
2
Click Configure or Reconfigure next to the application.
2
Click Configure next to the application.
2
Click Reconfigure next to the application.

Azure AD Discovery: Decide what to collect from the tenant in the discovery

You can collect a variety of information from the Office 365 tenant in your discovery. Basic information from the tenant (the tenant name and full LDAP path), subscriptions, licenses, and service plans is always collected.

The following table outlines the additional information that can be collected. Collecting additional information impacts discovery performance. Options with a high performance cost will slow discovery performance more than options with a medium or low performance cost.

 

Users

Collects basic information for all user accounts.

Medium

If collecting users, you can enable this option to collect additional attributes such as AboutMe, Birthday, HireDate, Interests, MySite, PastProjects, PreferredName, Responsibilities, Schools, and Skills.

High

If collecting users, you can enable this option to collect Multi-Factor Authentication information.

Medium

If collecting users, you can enable this option to collect users flagged for risk.

Medium

Groups

Collects basic information for all groups including direct members.

Medium

If collecting groups, you can enable this option to collect additional attributes such as AutoSubscribeNewMembers, and IsSubscribedByMail.

High

Contacts

Collects basic information for all contacts.

Low

Devices

Collects basic information for all devices and their users.

Medium

Roles

Collects basic information for all standard roles including role direct members.

Low

Applications and Service Principals

Collects information for all applications and service principals including the user and group assignments.

High

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação