Overview
1
11
n
ov
do
cx (e
n)
16
Ap
ril 20
10
1
Overview
Novell
®
ZENworks
®
10 Configuration Management Asset Inventory allows you to take an
inventory of all the devices in your Management Zone, including data on hardware, software, and
demographics.
The following sections contain additional information:
Section 1.1, “Scanning for Hardware Information,” on page 11
Section 1.2, “Scanning for Software Information,” on page 11
Section 1.3, “Scanning for Demographic Information,” on page 11
Section 1.4, “Security Considerations,” on page 11
1.1 Scanning for Hardware Information
Asset Inventory allows you to scan all the devices in your Management Zone and collect hardware
data for those devices. This data can then be viewed in a variety of ways using standard and custom
reports.
1.2 Scanning for Software Information
Asset Inventory allows you to scan all the devices in your Management Zone and collect data on
what software products are installed on those devices. Asset Inventory can identify thousands of
products and allows you to define additional products so they can be recognized on subsequent
scans and on other devices. Data can be displayed on a variety of reports. This data can be used for
general information, license compliance, and so on.
1.3 Scanning for Demographic Information
Asset Inventory allows you to collect demographic information by using one of the following:
Collection Data Form:
You can poll workstation users for demographic data, such as name,
phone number, department, cost center, and so on. This information is added to the inventory
data, giving you a complete picture of all the devices in your Management Zone.
LDAP Import Tasks:
You can import demographic data from Microsoft* Active Directory
TM
and Novell eDirectory
TM
to the Novell ZENworks database. You can set up tasks for different
Active Directory or e-Directory LDAP sources, and schedule each task individually.
1.4 Security Considerations
No integrity protection is provided for inventory data as it is collected from agents. Since access to
inventory data could provide information on how to attack a machine in the Management Zone,
Asset Inventory should only be used in a secure environment. Additionally, the database where the
inventory data is stored should also be protected.
Summary of Contents for ZENworks 10 Configuration Management Asset Inventory
Page 4: ...4 ZENworks 10 Configuration Management Asset Inventory Reference novdocx en 16 April 2010...
Page 8: ...8 ZENworks 10 Configuration Management Asset Inventory Reference novdocx en 16 April 2010...
Page 12: ...12 ZENworks 10 Configuration Management Asset Inventory Reference novdocx en 16 April 2010...
Page 94: ...94 ZENworks 10 Configuration Management Asset Inventory Reference novdocx en 16 April 2010...
Page 114: ...114 ZENworks 10 Configuration Management Asset Inventory Reference novdocx en 16 April 2010...
Page 128: ...128 ZENworks 10 Configuration Management Asset Inventory Reference novdocx en 16 April 2010...
Page 132: ...132 ZENworks 10 Configuration Management Asset Inventory Reference novdocx en 16 April 2010...
Page 138: ...138 ZENworks 10 Configuration Management Asset Inventory Reference novdocx en 16 April 2010...
Page 144: ...144 ZENworks 10 Configuration Management Asset Inventory Reference novdocx en 16 April 2010...