SlideShare une entreprise Scribd logo
1  sur  29
Dell World User Forum
UFIL513: Inventory Tips & Tricks
Ron Colson, Senior Trainer
Peter Doerfer, Senior Trainer
Dell World
User Forum
Dell World User Forum
Agenda
• Agent Overview
• Inventory Overview
• Relationship between Inventory-Assets
• Custom Inventory and why we need it
• Inventory that isn’t computers
Dell World User Forum
Agent Overview
Dell World User Forum
Agent Executables
• What executables?
• AMPAgent
• AMPKickstart
• AMPTools
• Inventory
• Kcopy
• Kdeploy
• Kinventory
• KLaunch
• KLaunchSvc
• KSWMeterSvc
• KUserAlert
• runkbot
• Executables folder locations
– Win (x86) – C:Program FilesDellKACE
– Win (x64) – C:Program Files (x86)DellKACE
– Linux - /opt/dell/kace/bin
– OS X - /Library/Application Support/Dell/KACE/bin
*Not all executables present on all OSes
Dell World User Forum
Agent - runkbot
• runkbot commands
• Windows
– runkbot.exe 1 0 – Bootstrap
– runkbot.exe 3 0 – Update KBot Scripts
– runkbot.exe 4 0 – Inventory
› runkbot.exe -s 4 0 (as local system account)
– runkbot.exe 5 0 – Upgrade Agent
– runkbot.exe 6 0 – MI’s and FS’s
• OS X & Linux
– sudo ./runkbot 2 0 – Inventory
– runkbot 3 0 – Update KBot Scripts
– runkbot 6 0 – MI’s and FS’s
– runkbot 7 0 – Upgrade Agent
Dell World User Forum
K1000 Agent and SSL
• SSL impacts the agent, too…
– SSL ‘instructions’ sent to agent after it is enabled on the appliance
– Agent uses port 80 to communicate until first check-in after SSL is implemented
– SSL Certificate MUST be trusted by the client machines
Dell World User Forum
Managed Installs
• kcopy.exe copies files from K1000 or Replication Share
• Agent Copies File
• KUserAlert.exe alerts user that an MI is
in progress (also used for additional
optional alerts)
• Agent Alerts User
• kdeploy.exe handles running the install
command for the MI
• Agent Installs Software
Dell World User Forum
Scripting
• runkbot.exe runs the script and leverages klaunch.exe for ‘run as’ functionality
• runkbot
• kdeploy.exe is used if software is being
deployed with a script
• kdeploy (installing software)
• runkbot.exe handles other scripting
tasks (processes, registry, file
manipulation, etc.)
• runkbot (other tasks)
Dell World User Forum
Patching
• kpatch.exe runs to detect the need for
patches
• Patch Detection
• kcopy.exe runs to copy patch files to
the local machine
• Copy Patch Files
• kpatch.exe runs to deploy patches,
KUserAlert.exe runs if alerts are
defined.
• Patch Deployment
Dell World User Forum
Agent Logs
• What Logs? Is there a configuration file, too?
• amp.conf
• amp.log
• kcopy.log
• kdeploy.log
• kinventory.log
• klaunch.log
• kpatch.log
• ksmeter.log
• kuseralert.log
• runkbot.log
• Log Files folder locations
– Windows – C:programdatadellkace
– Linux – /var/dell/kace
– OS X – /Library/Application Support/Dell/KACE/data
• KAgent.log
– ‘Master’ client log for 6.0 agent
*Additional logs created during agent install
Dell World User Forum
Agent Logs - Debug
• What does debugging do for me?
• More verbose logging
– Why did it fail?
• Troubleshooting
– Replication Shares
– Managed Installs
– Patching
– Scripting
– Custom Inventory
• Log file locations
– Windows – C:programdatadellkace
– Linux – /var/dell/kace
– OS X – /Library/Application Support/Dell/KACE/data
• To enable:
– From command-line: amptools.exe debug=true
OR
– Add debug=true to amp.conf file and restart Dell KACE Agent
Dell World User Forum
Demo: Enable Agent
Debug Mode
Dell World User Forum
Inventory Overview
Dell World User Forum
Inventory Process Overview
Upload Task
Results
Perform File
Sync Tasks
Upload
Inventory
Custom
Inventory
Perform
Managed
Install Tasks
Apply
Smart/LDAP
Labels
Default
Inventory
Clear
Smart/LDAP
Labels
Agent
Update
Check-in
Dell World User Forum
Two Software Inventories?SoftwareCatalog
Software
• Discovers Software
• Updated once a day (by default)
• Scans for executable files from
local drives
• Compares against Dell catalog
• Ability to add to local catalog
• Is used for license compliance,
metering and application control
• Installed Programs
• Runs at every inventory cycle
(every 2 hours by default)
• Lists applications registered with
the OS (Registry, plist, WMI, etc.)
• Is used for software distribution
• Ability to define custom inventory
Dell World User Forum
Demo 2: Device
Inventory Details
Dell World User Forum
Relationship between
Inventory-Assets
Dell World User Forum
Inventory Tips & Tricks
• KUID: Important!
• Relation: Inventory - Assets
Dell World User Forum
Custom Inventory
and why we need it
Dell World User Forum
Custom Inventory Rules
• Why do we need them?
• Allow us to capture items in inventory that are not picked up by traditional methods.
• Doesn’t show up at all…
OR
• Doesn’t show up the way you want it to….
• Makes Virtually Anything Display in Inventory:
• Software Related…
OR
Hardware Related….
• If the Machine Knows it….You can use Custom Inventory to detect & display it!
Dell World User Forum
Agent Executables
• Why do we need them?
• Allow us to capture items in Inventory that:
– Don’t show up at all…
OR
– Don’t show up the way you want it to….
• Makes Virtually Anything Display in Inventory:
– Software Related…
– OR
– Hardware Related….
• If the Machine Knows it….You can use Custom Inventory to detect & display it!
Dell World User Forum
Custom Inventory Rule (CIR) ~ Custom Inventory Field (CIF)
CIR
Boolean in nature
…Exists,
…Equals
…Less Than,
…Greater Than
Software Title
Conditionally Displayed
CIF
Displays returned values
…Return
TEXT, NUMBER, DATE
Software Title
Always Displayed
Dell World User Forum
CIR - General Rules about Rules
• Each value MUST be separated by commas
• Commas are not allowed anywhere else in the string
• No quotes, single or double
• Key must exist under LocalMachine, like the other tests
• Failure to specify everything correctly will result in the test evaluating to FALSE
• All comparisons happen as strings, testing other registry value types may or may not work as
you'd expect.
Dell World User Forum
CIR - General Rules about Rules
• Type can be: TEXT, NUMBER, or DATE
• attribute on Windows can be:
– Comments, Language, CompanyName, LegalCopyright, FileBuildPart, LegalTrademarks, FileDescription,
OriginalFilename, FileMajorPart, PrivateBuild, FileMinorPart, ProductBuildPart, FileName, ProductMajorPart,
FilePrivatePart, ProductMinorPart, FileVersion, ProductName, InternalName, ProductPrivatePart, IsDebug,
ProductVersion, IsPatched, SpecialBuild, IsPreRelease, CreatedDate, IsPrivateBuild, ModifiedDate, IsSpecialBuild,
AccessedDate
• Linux/OS X can be:
– device_number, inode, number_links, owner, group, size, access_time, modification_time, creation_time,
block_size, blocks
• AND/OR Statements are acceptable
Dell World User Forum
Demo: Custom
Inventory
Dell World User Forum
A final word…
Dell World User Forum
Agentless - There’s a DWUF class for that!
• The agentless capability in K1000 v6.0 can help you…
• Use your K1000 to collect info from devices broadcasting SNMP data –
routers, switches, printers, etc…
• Use your K1000 to collect info from devices that can be communicated
with using SSH or Telnet.
• Report against more than what the agent can provide on its own or what
you input via asset management.
Dell World User Forum
Thank you.
Dell World User Forum
KACE Support Portal Migrating to Dell Software Support Portal
• Starting in November, all KACE
Support Portal material will be
migrated to the Dell Software Support
Portal
• All service requests will be submitted
online or by phone
• Same great content
– Knowledge base articles
– Video tutorials
– Product documentation
– JumpStart training
• Check out the Support Portal Getting
Started videos

Contenu connexe

Tendances

شبكات الكمبيوتر
شبكات الكمبيوترشبكات الكمبيوتر
شبكات الكمبيوترasmaa saso
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopCisco Canada
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1SolarWinds
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptxsyedasadraza13
 
Seguridad Informatica y Gestión de Riesgos
Seguridad Informatica y Gestión de RiesgosSeguridad Informatica y Gestión de Riesgos
Seguridad Informatica y Gestión de Riesgosdaylisyfran
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating SystemMeghaj Mallick
 
عرض تقديمي - معتز حاج محمد - اساسيات البرمجة.pptx
عرض تقديمي - معتز حاج محمد - اساسيات البرمجة.pptxعرض تقديمي - معتز حاج محمد - اساسيات البرمجة.pptx
عرض تقديمي - معتز حاج محمد - اساسيات البرمجة.pptxMoetazHM
 
Conhecendo o Windows Server 2012
Conhecendo o Windows Server 2012Conhecendo o Windows Server 2012
Conhecendo o Windows Server 2012Eduardo Sena
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Aplicacion remota any desk exposicion
Aplicacion remota any desk exposicionAplicacion remota any desk exposicion
Aplicacion remota any desk exposicionFelix Gonzalez Marte
 
IBM Standards Research Presentation.pdf
IBM Standards Research Presentation.pdfIBM Standards Research Presentation.pdf
IBM Standards Research Presentation.pdfssusere9d9791
 
Interfaces de los Discapacitados
Interfaces de los DiscapacitadosInterfaces de los Discapacitados
Interfaces de los Discapacitadosmariiajo
 
Cyber security " الأمن السيبراني "
Cyber security " الأمن السيبراني  " Cyber security " الأمن السيبراني  "
Cyber security " الأمن السيبراني " Mamdouh Sakr
 
ThousandEyes Alerting Essentials for Your Network
ThousandEyes Alerting Essentials for Your NetworkThousandEyes Alerting Essentials for Your Network
ThousandEyes Alerting Essentials for Your NetworkThousandEyes
 
active directory
active directory active directory
active directory akram12120
 

Tendances (20)

شبكات الكمبيوتر
شبكات الكمبيوترشبكات الكمبيوتر
شبكات الكمبيوتر
 
Meraki Cloud Networking Workshop
Meraki Cloud Networking WorkshopMeraki Cloud Networking Workshop
Meraki Cloud Networking Workshop
 
Network Troubleshooting - Part 1
Network Troubleshooting - Part 1Network Troubleshooting - Part 1
Network Troubleshooting - Part 1
 
Active Directory Domain Services.pptx
Active Directory Domain Services.pptxActive Directory Domain Services.pptx
Active Directory Domain Services.pptx
 
Seguridad Informatica y Gestión de Riesgos
Seguridad Informatica y Gestión de RiesgosSeguridad Informatica y Gestión de Riesgos
Seguridad Informatica y Gestión de Riesgos
 
Windows Security in Operating System
Windows Security in Operating SystemWindows Security in Operating System
Windows Security in Operating System
 
عرض تقديمي - معتز حاج محمد - اساسيات البرمجة.pptx
عرض تقديمي - معتز حاج محمد - اساسيات البرمجة.pptxعرض تقديمي - معتز حاج محمد - اساسيات البرمجة.pptx
عرض تقديمي - معتز حاج محمد - اساسيات البرمجة.pptx
 
Windows 2019
Windows 2019Windows 2019
Windows 2019
 
Conhecendo o Windows Server 2012
Conhecendo o Windows Server 2012Conhecendo o Windows Server 2012
Conhecendo o Windows Server 2012
 
TrendMicro
TrendMicroTrendMicro
TrendMicro
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Aplicacion remota any desk exposicion
Aplicacion remota any desk exposicionAplicacion remota any desk exposicion
Aplicacion remota any desk exposicion
 
Zimbra Overview
Zimbra OverviewZimbra Overview
Zimbra Overview
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
IBM Standards Research Presentation.pdf
IBM Standards Research Presentation.pdfIBM Standards Research Presentation.pdf
IBM Standards Research Presentation.pdf
 
Interfaces de los Discapacitados
Interfaces de los DiscapacitadosInterfaces de los Discapacitados
Interfaces de los Discapacitados
 
Cyber security " الأمن السيبراني "
Cyber security " الأمن السيبراني  " Cyber security " الأمن السيبراني  "
Cyber security " الأمن السيبراني "
 
Dmz aa aioug
Dmz aa aiougDmz aa aioug
Dmz aa aioug
 
ThousandEyes Alerting Essentials for Your Network
ThousandEyes Alerting Essentials for Your NetworkThousandEyes Alerting Essentials for Your Network
ThousandEyes Alerting Essentials for Your Network
 
active directory
active directory active directory
active directory
 

Similaire à Dell World User Forum Inventory Tips & Tricks

Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeDenis Gundarev
 
Software Distribution
Software DistributionSoftware Distribution
Software DistributionDell World
 
DCRUG: Achieving Development-Production Parity
DCRUG: Achieving Development-Production ParityDCRUG: Achieving Development-Production Parity
DCRUG: Achieving Development-Production ParityGeoff Harcourt
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidMatthew Johnson
 
Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0Michael Gough
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...Hackito Ergo Sum
 
Reverse Engineering.pptx
Reverse Engineering.pptxReverse Engineering.pptx
Reverse Engineering.pptxSameer Sapra
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsTakahiro Haruyama
 
Adding Security and Compliance to Your Workflow with InSpec
Adding Security and Compliance to Your Workflow with InSpecAdding Security and Compliance to Your Workflow with InSpec
Adding Security and Compliance to Your Workflow with InSpecMandi Walls
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0Michael Gough
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsNatraj G
 
InSpec For DevOpsDays Amsterdam 2017
InSpec For DevOpsDays Amsterdam 2017InSpec For DevOpsDays Amsterdam 2017
InSpec For DevOpsDays Amsterdam 2017Mandi Walls
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolMichael Gough
 
Inspec: Turn your compliance, security, and other policy requirements into au...
Inspec: Turn your compliance, security, and other policy requirements into au...Inspec: Turn your compliance, security, and other policy requirements into au...
Inspec: Turn your compliance, security, and other policy requirements into au...Kangaroot
 
InSpec - June 2018 at Open28.be
InSpec - June 2018 at Open28.beInSpec - June 2018 at Open28.be
InSpec - June 2018 at Open28.beMandi Walls
 
Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)Dell World
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andAlisa Esage Шевченко
 
Windows internals
Windows internalsWindows internals
Windows internalsPiyush Jain
 

Similaire à Dell World User Forum Inventory Tips & Tricks (20)

Application Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternativeApplication Streaming is dead. A smart way to choose an alternative
Application Streaming is dead. A smart way to choose an alternative
 
Software Distribution
Software DistributionSoftware Distribution
Software Distribution
 
DCRUG: Achieving Development-Production Parity
DCRUG: Achieving Development-Production ParityDCRUG: Achieving Development-Production Parity
DCRUG: Achieving Development-Production Parity
 
PowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue KidPowerShell - Be A Cool Blue Kid
PowerShell - Be A Cool Blue Kid
 
Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0Deeplook into apt and how to detect and defend v1.0
Deeplook into apt and how to detect and defend v1.0
 
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
[HES2013] Virtually secure, analysis to remote root 0day on an industry leadi...
 
Defending Your "Gold"
Defending Your "Gold"Defending Your "Gold"
Defending Your "Gold"
 
Reverse Engineering.pptx
Reverse Engineering.pptxReverse Engineering.pptx
Reverse Engineering.pptx
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensics
 
Adding Security and Compliance to Your Workflow with InSpec
Adding Security and Compliance to Your Workflow with InSpecAdding Security and Compliance to Your Workflow with InSpec
Adding Security and Compliance to Your Workflow with InSpec
 
Logging for Hackers v1.0
Logging for Hackers v1.0Logging for Hackers v1.0
Logging for Hackers v1.0
 
Concepts of Malicious Windows Programs
Concepts of Malicious Windows ProgramsConcepts of Malicious Windows Programs
Concepts of Malicious Windows Programs
 
InSpec For DevOpsDays Amsterdam 2017
InSpec For DevOpsDays Amsterdam 2017InSpec For DevOpsDays Amsterdam 2017
InSpec For DevOpsDays Amsterdam 2017
 
Diagnosing issues in your ASP.NET applications in production with Visual Stud...
Diagnosing issues in your ASP.NET applications in production with Visual Stud...Diagnosing issues in your ASP.NET applications in production with Visual Stud...
Diagnosing issues in your ASP.NET applications in production with Visual Stud...
 
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows toolIntroducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
Introducing ArTHIR - ATT&CK Remote Threat Hunting Incident Response Windows tool
 
Inspec: Turn your compliance, security, and other policy requirements into au...
Inspec: Turn your compliance, security, and other policy requirements into au...Inspec: Turn your compliance, security, and other policy requirements into au...
Inspec: Turn your compliance, security, and other policy requirements into au...
 
InSpec - June 2018 at Open28.be
InSpec - June 2018 at Open28.beInSpec - June 2018 at Open28.be
InSpec - June 2018 at Open28.be
 
Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)Getting Started with Patching (Patching 101)
Getting Started with Patching (Patching 101)
 
On non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits andOn non existent 0-days, stable binary exploits and
On non existent 0-days, stable binary exploits and
 
Windows internals
Windows internalsWindows internals
Windows internals
 

Plus de Dell World

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking OverviewDell World
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage ManagementDell World
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell World
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your NetworkDell World
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager OverviewDell World
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell World
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems ManagementDell World
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsDell World
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelDell World
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Dell World
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backupsDell World
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeDell World
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...Dell World
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsDell World
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notDell World
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Dell World
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDell World
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...Dell World
 

Plus de Dell World (20)

Dell Data Center Networking Overview
Dell Data Center Networking OverviewDell Data Center Networking Overview
Dell Data Center Networking Overview
 
Dell Storage Management
Dell Storage ManagementDell Storage Management
Dell Storage Management
 
Dell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions LabDell Networking Wired, Wireless and Security Solutions Lab
Dell Networking Wired, Wireless and Security Solutions Lab
 
2020 Vision For Your Network
2020 Vision For Your Network2020 Vision For Your Network
2020 Vision For Your Network
 
Dell Cloud Manager Overview
Dell Cloud Manager OverviewDell Cloud Manager Overview
Dell Cloud Manager Overview
 
Dell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch ProvisioningDell PowerEdge Zero Touch Provisioning
Dell PowerEdge Zero Touch Provisioning
 
Simplifying Systems Management
Simplifying Systems ManagementSimplifying Systems Management
Simplifying Systems Management
 
Channel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software SolutionsChannel Partners: Lead with Dell Software Solutions
Channel Partners: Lead with Dell Software Solutions
 
Innovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access ModelInnovating Teaching & Learning: Next Generation Student Access Model
Innovating Teaching & Learning: Next Generation Student Access Model
 
Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)Executing on the promise of the Internet of Things (IoT)
Executing on the promise of the Internet of Things (IoT)
 
Focus on business, not backups
Focus on business, not backupsFocus on business, not backups
Focus on business, not backups
 
NVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about TimeNVMe PCIe and TLC V-NAND It’s about Time
NVMe PCIe and TLC V-NAND It’s about Time
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...The Keys To A Successful Identity And Access Management Program: How Does You...
The Keys To A Successful Identity And Access Management Program: How Does You...
 
Client Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced ThreatsClient Security Strategies To Defeat Advanced Threats
Client Security Strategies To Defeat Advanced Threats
 
What a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do notWhat a data-centric strategy gives you that others do not
What a data-centric strategy gives you that others do not
 
Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?Cloud: To Build or Buy - Can You Justify On-Premises IT?
Cloud: To Build or Buy - Can You Justify On-Premises IT?
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Detecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the networkDetecting advanced and evasive threats on the network
Detecting advanced and evasive threats on the network
 
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
So You Need To Build A Private Cloud. What Now? Best Practices For Building Y...
 

Dernier

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Intelisync
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 

Dernier (20)

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)Introduction to Decentralized Applications (dApps)
Introduction to Decentralized Applications (dApps)
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 

Dell World User Forum Inventory Tips & Tricks

  • 1. Dell World User Forum UFIL513: Inventory Tips & Tricks Ron Colson, Senior Trainer Peter Doerfer, Senior Trainer Dell World User Forum
  • 2. Dell World User Forum Agenda • Agent Overview • Inventory Overview • Relationship between Inventory-Assets • Custom Inventory and why we need it • Inventory that isn’t computers
  • 3. Dell World User Forum Agent Overview
  • 4. Dell World User Forum Agent Executables • What executables? • AMPAgent • AMPKickstart • AMPTools • Inventory • Kcopy • Kdeploy • Kinventory • KLaunch • KLaunchSvc • KSWMeterSvc • KUserAlert • runkbot • Executables folder locations – Win (x86) – C:Program FilesDellKACE – Win (x64) – C:Program Files (x86)DellKACE – Linux - /opt/dell/kace/bin – OS X - /Library/Application Support/Dell/KACE/bin *Not all executables present on all OSes
  • 5. Dell World User Forum Agent - runkbot • runkbot commands • Windows – runkbot.exe 1 0 – Bootstrap – runkbot.exe 3 0 – Update KBot Scripts – runkbot.exe 4 0 – Inventory › runkbot.exe -s 4 0 (as local system account) – runkbot.exe 5 0 – Upgrade Agent – runkbot.exe 6 0 – MI’s and FS’s • OS X & Linux – sudo ./runkbot 2 0 – Inventory – runkbot 3 0 – Update KBot Scripts – runkbot 6 0 – MI’s and FS’s – runkbot 7 0 – Upgrade Agent
  • 6. Dell World User Forum K1000 Agent and SSL • SSL impacts the agent, too… – SSL ‘instructions’ sent to agent after it is enabled on the appliance – Agent uses port 80 to communicate until first check-in after SSL is implemented – SSL Certificate MUST be trusted by the client machines
  • 7. Dell World User Forum Managed Installs • kcopy.exe copies files from K1000 or Replication Share • Agent Copies File • KUserAlert.exe alerts user that an MI is in progress (also used for additional optional alerts) • Agent Alerts User • kdeploy.exe handles running the install command for the MI • Agent Installs Software
  • 8. Dell World User Forum Scripting • runkbot.exe runs the script and leverages klaunch.exe for ‘run as’ functionality • runkbot • kdeploy.exe is used if software is being deployed with a script • kdeploy (installing software) • runkbot.exe handles other scripting tasks (processes, registry, file manipulation, etc.) • runkbot (other tasks)
  • 9. Dell World User Forum Patching • kpatch.exe runs to detect the need for patches • Patch Detection • kcopy.exe runs to copy patch files to the local machine • Copy Patch Files • kpatch.exe runs to deploy patches, KUserAlert.exe runs if alerts are defined. • Patch Deployment
  • 10. Dell World User Forum Agent Logs • What Logs? Is there a configuration file, too? • amp.conf • amp.log • kcopy.log • kdeploy.log • kinventory.log • klaunch.log • kpatch.log • ksmeter.log • kuseralert.log • runkbot.log • Log Files folder locations – Windows – C:programdatadellkace – Linux – /var/dell/kace – OS X – /Library/Application Support/Dell/KACE/data • KAgent.log – ‘Master’ client log for 6.0 agent *Additional logs created during agent install
  • 11. Dell World User Forum Agent Logs - Debug • What does debugging do for me? • More verbose logging – Why did it fail? • Troubleshooting – Replication Shares – Managed Installs – Patching – Scripting – Custom Inventory • Log file locations – Windows – C:programdatadellkace – Linux – /var/dell/kace – OS X – /Library/Application Support/Dell/KACE/data • To enable: – From command-line: amptools.exe debug=true OR – Add debug=true to amp.conf file and restart Dell KACE Agent
  • 12. Dell World User Forum Demo: Enable Agent Debug Mode
  • 13. Dell World User Forum Inventory Overview
  • 14. Dell World User Forum Inventory Process Overview Upload Task Results Perform File Sync Tasks Upload Inventory Custom Inventory Perform Managed Install Tasks Apply Smart/LDAP Labels Default Inventory Clear Smart/LDAP Labels Agent Update Check-in
  • 15. Dell World User Forum Two Software Inventories?SoftwareCatalog Software • Discovers Software • Updated once a day (by default) • Scans for executable files from local drives • Compares against Dell catalog • Ability to add to local catalog • Is used for license compliance, metering and application control • Installed Programs • Runs at every inventory cycle (every 2 hours by default) • Lists applications registered with the OS (Registry, plist, WMI, etc.) • Is used for software distribution • Ability to define custom inventory
  • 16. Dell World User Forum Demo 2: Device Inventory Details
  • 17. Dell World User Forum Relationship between Inventory-Assets
  • 18. Dell World User Forum Inventory Tips & Tricks • KUID: Important! • Relation: Inventory - Assets
  • 19. Dell World User Forum Custom Inventory and why we need it
  • 20. Dell World User Forum Custom Inventory Rules • Why do we need them? • Allow us to capture items in inventory that are not picked up by traditional methods. • Doesn’t show up at all… OR • Doesn’t show up the way you want it to…. • Makes Virtually Anything Display in Inventory: • Software Related… OR Hardware Related…. • If the Machine Knows it….You can use Custom Inventory to detect & display it!
  • 21. Dell World User Forum Agent Executables • Why do we need them? • Allow us to capture items in Inventory that: – Don’t show up at all… OR – Don’t show up the way you want it to…. • Makes Virtually Anything Display in Inventory: – Software Related… – OR – Hardware Related…. • If the Machine Knows it….You can use Custom Inventory to detect & display it!
  • 22. Dell World User Forum Custom Inventory Rule (CIR) ~ Custom Inventory Field (CIF) CIR Boolean in nature …Exists, …Equals …Less Than, …Greater Than Software Title Conditionally Displayed CIF Displays returned values …Return TEXT, NUMBER, DATE Software Title Always Displayed
  • 23. Dell World User Forum CIR - General Rules about Rules • Each value MUST be separated by commas • Commas are not allowed anywhere else in the string • No quotes, single or double • Key must exist under LocalMachine, like the other tests • Failure to specify everything correctly will result in the test evaluating to FALSE • All comparisons happen as strings, testing other registry value types may or may not work as you'd expect.
  • 24. Dell World User Forum CIR - General Rules about Rules • Type can be: TEXT, NUMBER, or DATE • attribute on Windows can be: – Comments, Language, CompanyName, LegalCopyright, FileBuildPart, LegalTrademarks, FileDescription, OriginalFilename, FileMajorPart, PrivateBuild, FileMinorPart, ProductBuildPart, FileName, ProductMajorPart, FilePrivatePart, ProductMinorPart, FileVersion, ProductName, InternalName, ProductPrivatePart, IsDebug, ProductVersion, IsPatched, SpecialBuild, IsPreRelease, CreatedDate, IsPrivateBuild, ModifiedDate, IsSpecialBuild, AccessedDate • Linux/OS X can be: – device_number, inode, number_links, owner, group, size, access_time, modification_time, creation_time, block_size, blocks • AND/OR Statements are acceptable
  • 25. Dell World User Forum Demo: Custom Inventory
  • 26. Dell World User Forum A final word…
  • 27. Dell World User Forum Agentless - There’s a DWUF class for that! • The agentless capability in K1000 v6.0 can help you… • Use your K1000 to collect info from devices broadcasting SNMP data – routers, switches, printers, etc… • Use your K1000 to collect info from devices that can be communicated with using SSH or Telnet. • Report against more than what the agent can provide on its own or what you input via asset management.
  • 28. Dell World User Forum Thank you.
  • 29. Dell World User Forum KACE Support Portal Migrating to Dell Software Support Portal • Starting in November, all KACE Support Portal material will be migrated to the Dell Software Support Portal • All service requests will be submitted online or by phone • Same great content – Knowledge base articles – Video tutorials – Product documentation – JumpStart training • Check out the Support Portal Getting Started videos

Notes de l'éditeur

  1. AMPAgent.exe The executable associated with Dell KACE Agent (AMP) service Establishes a connection on port 52230 to the K1000 Receives short instructions from the K1000 and delegates to one of the other K1000 Agent executables to handle the actual work associated with the task AMPKickstart.exe Restarts the AMPAgent service when it crashes Does not restart the AMPAgent service when it is stopped by a user In version 5.5 and later, the AMPAgent service is set to self-restart on first and second failures AMPTools.exe A command line utility to start/stop AMPAgent (AMP service) Can also be used to reconfigure amp.conf or uninstall the K1000 agent Inventory.exe The Dell Application Catalog (DAC or Software Catalog) software inventory tool Collects the raw file attributes of files in order to match into the Software Catalog and identify the software titles installed Kcopy.exe Copies files via HTTP or SMB between the K1000 and client, or between clients (replication server and targets) In version 5.5 and later agents, the upload to the K1000 is compressed by default Kdeploy.exe Handles Managed Installations, File Syncs, Custom Inventory and Software Installs via Scripts Can also generate an md5 hash of a file KInventory.exe A generic inventory tool to run WMI and other code to collect hardware, service, process and software attributes from the system K1000 output format is XML KLaunch.exe The process framework that launches other K1000 Agent executables on local or remote Windows machines Supports RunAs functionality, including Local System, Current User on Console, All Users and User/Password KLaunchSvc.exe The KLaunch service initiator kpatch.exe Handles K1000 patching tasks such as scanning, and deploying patch payloads KSWMeterSvc.exe The Dell Application Catalog (DAC or Software Catalog) software metering tool Monitors the creation/termination of processes on the system in an event-driven fashion Generates a metering report that is sent to the K1000 based on the K1000 Agent’s Metering interval configuration KUserAlert.exe The Windows GUI for K1000 Agent popup messages, snooze prompts and alerts runkbot.exe Runs K1000 (kbot) scripts A flexible scripting engine that can run processes, create/delete files, create/delete/update the registry and so on
  2. AMPAgent.exe The executable associated with Dell KACE Agent (AMP) service Establishes a connection on port 52230 to the K1000 Receives short instructions from the K1000 and delegates to one of the other K1000 Agent executables to handle the actual work associated with the task AMPKickstart.exe Restarts the AMPAgent service when it crashes Does not restart the AMPAgent service when it is stopped by a user In version 5.5 and later, the AMPAgent service is set to self-restart on first and second failures AMPTools.exe A command line utility to start/stop AMPAgent (AMP service) Can also be used to reconfigure amp.conf or uninstall the K1000 agent Inventory.exe The Dell Application Catalog (DAC or Software Catalog) software inventory tool Collects the raw file attributes of files in order to match into the Software Catalog and identify the software titles installed Kcopy.exe Copies files via HTTP or SMB between the K1000 and client, or between clients (replication server and targets) In version 5.5 and later agents, the upload to the K1000 is compressed by default Kdeploy.exe Handles Managed Installations, File Syncs, Custom Inventory and Software Installs via Scripts Can also generate an md5 hash of a file KInventory.exe A generic inventory tool to run WMI and other code to collect hardware, service, process and software attributes from the system K1000 output format is XML KLaunch.exe The process framework that launches other K1000 Agent executables on local or remote Windows machines Supports RunAs functionality, including Local System, Current User on Console, All Users and User/Password KLaunchSvc.exe The KLaunch service initiator kpatch.exe Handles K1000 patching tasks such as scanning, and deploying patch payloads KSWMeterSvc.exe The Dell Application Catalog (DAC or Software Catalog) software metering tool Monitors the creation/termination of processes on the system in an event-driven fashion Generates a metering report that is sent to the K1000 based on the K1000 Agent’s Metering interval configuration KUserAlert.exe The Windows GUI for K1000 Agent popup messages, snooze prompts and alerts runkbot.exe Runs K1000 (kbot) scripts A flexible scripting engine that can run processes, create/delete files, create/delete/update the registry and so on
  3. If SSL is enabled, be sure to verify Agent communications before disabling HTTP For ease of Agent deployment, leave port 80 enabled Can disable after provisioning
  4. Note that Kinventory runs first to collect and submit inventory data and KLaunch is what actually launces other exe’s
  5. Kace Agent log files amp.log Logs all of the messages going back and forth to the K1000 In version 6.0, this log has been incorporated into the AMPAgent sections of the KAgent.log user\ampmsi.log Logs information related to K1000 Agent provisioning user\ampinstaller.log Logs information related to K1000 Agent provisioning and manual installation user\KAgent.log This file did not exist in version 5.5 and earlier In version 6.0, all client-side logs (kcopy, kdeploy, kinventory, klaunch, kpatch and so on) have been consolidated into this log kcopy.log Logs file copy information between the K1000 and client, or between clients (replication server and targets) In version 6.0, this log has been incorporated into the KCopy sections of the KAgent.log kdeploy.log Logs deployment details for Managed Installations, File Syncs, Custom Inventory and Software Installs via Scripts In version 6.0, this log has been incorporated into the KDeploy sections of the KAgent.log kinventory.log Logs information related to the collection of data during the inventory process In version 6.0, this log has been incorporated into the KInventory sections of the KAgent.log klaunch.log Logs information related to the launch of other K1000 executables on local or remote Windows machines In version 6.0, this log has been incorporated into the KLaunch sections of the KAgent.log kpatch.log Logs information for K1000 patching tasks such as scanning, and deploying patch payloads In version 6.0, this log has been incorporated into the KPatch sections of the KAgent.log ksmeter.log Logs information for metering, such as indicating which applications should be metered In version 6.0, this log has been incorporated into the KSWMeterSVC_ sections of the KAgent.log kuseralert.log Logs information for K1000 Agent alerts, including the alert message In version 6.0, this log has been incorporated into KAgent.log user\kwinstart.log Logs agent initiation information for when the agent loads during the boot process pluginDesktopAlerts.log Logs information related to when the K1000 asks the agent to spawn and alert The work is eventually passed to KUserAlert.exe, but this plugin drives KUserAlert.exe to spawn broadcast and message alerts pluginPatching.log Logs information related to when the K1000 asks the agent to perform patch-related tasks, before the work is passed to kpatch.exe pluginRunProcess.log Logs information related to when the K1000 asks the agent to run any scripts, before the work is passed to runkbot.exe pluginWeb.log Logs information related to when the K1000 asks the agent to download/upload payloads Some work will be passed to Kcopy.exe, but some download/upload activity happens in this plugin directly runkbot.log Logs information related to the running of any scripts In version 6.0, this log has been incorporated into the runkbot sections of the KAgent.log
  6. Debugging is used to show how something failed (and how we got to that failure) instead of just the failure itself
  7. KUID!!!
  8. AMPAgent.exe The executable associated with Dell KACE Agent (AMP) service Establishes a connection on port 52230 to the K1000 Receives short instructions from the K1000 and delegates to one of the other K1000 Agent executables to handle the actual work associated with the task AMPKickstart.exe Restarts the AMPAgent service when it crashes Does not restart the AMPAgent service when it is stopped by a user In version 5.5 and later, the AMPAgent service is set to self-restart on first and second failures AMPTools.exe A command line utility to start/stop AMPAgent (AMP service) Can also be used to reconfigure amp.conf or uninstall the K1000 agent Inventory.exe The Dell Application Catalog (DAC or Software Catalog) software inventory tool Collects the raw file attributes of files in order to match into the Software Catalog and identify the software titles installed Kcopy.exe Copies files via HTTP or SMB between the K1000 and client, or between clients (replication server and targets) In version 5.5 and later agents, the upload to the K1000 is compressed by default Kdeploy.exe Handles Managed Installations, File Syncs, Custom Inventory and Software Installs via Scripts Can also generate an md5 hash of a file KInventory.exe A generic inventory tool to run WMI and other code to collect hardware, service, process and software attributes from the system K1000 output format is XML KLaunch.exe The process framework that launches other K1000 Agent executables on local or remote Windows machines Supports RunAs functionality, including Local System, Current User on Console, All Users and User/Password KLaunchSvc.exe The KLaunch service initiator kpatch.exe Handles K1000 patching tasks such as scanning, and deploying patch payloads KSWMeterSvc.exe The Dell Application Catalog (DAC or Software Catalog) software metering tool Monitors the creation/termination of processes on the system in an event-driven fashion Generates a metering report that is sent to the K1000 based on the K1000 Agent’s Metering interval configuration KUserAlert.exe The Windows GUI for K1000 Agent popup messages, snooze prompts and alerts runkbot.exe Runs K1000 (kbot) scripts A flexible scripting engine that can run processes, create/delete files, create/delete/update the registry and so on
  9. If SSL is enabled, be sure to verify Agent communications before disabling HTTP For ease of Agent deployment, leave port 80 enabled Can disable after provisioning
  10. Portal: http://www.software.dell.com/support Ticket Entry: https://support.software.dell.com/create-service-request Videos: https://support.software.dell.com/essentials/getting-started