IT tutorials
 
Technology
 

System Center Configuration Manager 2007 : Configuring Client Agents (part 1) - Hardware Inventory

10/21/2013 1:28:00 AM
- Free product key for windows 10
- Free Product Key for Microsoft office 365
- Malwarebytes Premium 3.7.1 Serial Keys (LifeTime) 2019

You configure client agents to enable specific client features such as hardware inventory, software updates, and software distribution. Client agents are always configured at the primary site level, which means that all clients assigned to that site will receive the same client agent settings. All ConfigMgr clients are assigned to a primary site—although clients may use a secondary site for proxy management points and other client communication, the client agent configuration is from the primary site.

Managing Client Settings for Multiple Sites

Most environments with multiple primary sites attempt to configure client agents consistently throughout the hierarchy; you can manage this easily using the Transfer Site Settings Wizard.

Alternatively, some environments implement a new primary site just to configure the clients assigned to that site differently. As an example, you may have an office in a country that prohibits collecting user information. You could configure a new primary site in that office and disable the hardware inventory client agent, but still collect hardware inventory from client computers in other locations.


Figure 1 displays all the client agents, which are described in the next sections, along with configurations for consideration.

Figure 1. ConfigMgr client agents

After the client agents are configured, all clients assigned to that site will receive policy to enable (or disable) the appropriate agents. Most agents have a schedule for when they should perform an operation on the client.

Hardware Inventory

To a new ConfigMgr administrator, hardware inventory sounds like collecting specific hardware information for a client. Although true, that is only a small subset of the information you can collect in hardware inventory. Hardware information is collected from Windows Management Instrumentation (WMI) and the Windows Registry (via WMI). Refer to Figure 2, which displays the standard hardware inventory queried from a Windows XP Professional client named Tarzan in the SCCMUnleashed domain.

Figure 2. Resource Explorer for a Windows XP Professional client

As the Resource Explorer in Figure 2 shows, ConfigMgr inventories a significant amount of hardware by default, such as network adapters, SCSI controllers, disk drives, and partitions. You also see information such as Add/Remove Programs (software that appears in Add/Remove Programs), Services (Windows services on the inventoried system), and various operating system information. To launch the Resource Explorer, simply right-click a computer object in a collection and select Start -> Resource Explorer.

Once you are introduced to hardware inventory, you will probably find it to be vital information you want to collect in your environment. Perform the following steps to enable hardware inventory:

1.
Right-click Hardware Inventory Client Agent and then select Properties to view the General tab, displayed in Figure 3.

Figure 3. The Hardware Inventory Client agent


2.
Simply check the box “Enable hardware inventory on clients” to enable hardware inventory for the site. Most administrators will select the simple schedule for inventory.

Using a Simple Schedule

Some client agents (such as hardware inventory) perform actions on a recurring schedule. When you configure the client agent, you have the ability to determine the frequency of that recurrence. The two types of recurring schedules are simple and custom.

  • With a simple schedule, you specify the frequency that hardware inventory will run. By default, inventory will run every 7 days. The start time is configured from the ConfigMgr client install time. This means that if a client was installed at 7:00 a.m. on a Monday, and inventory is configured to run on a simple schedule every 7 days, hardware inventory will run every Monday at 7:00 a.m. Because not all clients were installed at exactly the same time, each client will have its own schedule for executing hardware inventory, which helps reduce peak usage times.

  • The alternative schedule is the custom schedule, which allows you to specify the exact time and day that inventory will run. When you configure a custom schedule for hardware inventory, it forces all clients to report inventory at the same time. This can cause an overload on your site, depending on the number of clients assigned to that site.


3.
The last option on the General tab of Figure 3 (Maximum custom MIF file size) is a bit confusing, because it really applies to the settings on the MIF Collection tab. You can specify the maximum size of MIF or NOIDMIF files that the site can process (choose between 1KB and 5,000KB). ConfigMgr moves MIF files that are larger than the specified size to the \inboxes\auth\dataldr.box\badmifs folder. For the MIF file size configuration to be used at all, you must enable at least one of the check boxes on the MIF Collection tab displayed in Figure 4.

Figure 4. The MIF Collection tab of the Hardware Inventory Client agent


Figure 4 shows you can collect IDMIF and NOIDMIF files. Both these file types are legacy, and should be avoided if possible.
 
Others
 
- System Center Configuration Manager 2007 : Client Management - Configuring the Management Point
- System Center Configuration Manager 2007 : Related Technologies and References - AMT and vPro
- Using the Windows PowerShell in an Exchange Server 2007 Environment : Understanding the EMS Syntax
- Using the Windows PowerShell in an Exchange Server 2007 Environment : Common Uses of EMS , Explaining the Difference Between PowerShell and EMS
- Using the Windows PowerShell in an Exchange Server 2007 Environment : Understanding the Exchange Task Model
- Sharepoint 2013 : Developing Applications with Access (part 2) - The Access 2013 Client Application, Access 2013 Web Applications
- Sharepoint 2013 : Developing Applications with Access (part 1) - Exploring Access 2013
- Windows 8 : Troubleshooting Startup and Shutdown
- Windows 8 : Backing Up and Recovering a Computer (part 3) - Creating and Using File History
- Windows 8 : Backing Up and Recovering a Computer (part 2)
 
 
Top 10
 
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 2) - Wireframes,Legends
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Finding containers and lists in Visio (part 1) - Swimlanes
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Formatting and sizing lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Adding shapes to lists
- Microsoft Visio 2013 : Adding Structure to Your Diagrams - Sizing containers
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 3) - The Other Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 2) - The Data Properties of a Control
- Microsoft Access 2010 : Control Properties and Why to Use Them (part 1) - The Format Properties of a Control
- Microsoft Access 2010 : Form Properties and Why Should You Use Them - Working with the Properties Window
- Microsoft Visio 2013 : Using the Organization Chart Wizard with new data
Technology FAQ
- Is possible to just to use a wireless router to extend wireless access to wireless access points?
- Ruby - Insert Struct to MySql
- how to find my Symantec pcAnywhere serial number
- About direct X / Open GL issue
- How to determine eclipse version?
- What SAN cert Exchange 2010 for UM, OA?
- How do I populate a SQL Express table from Excel file?
- code for express check out with Paypal.
- Problem with Templated User Control
- ShellExecute SW_HIDE
programming4us programming4us