Service Manager powered by HEAT

How HEAT Discovery and Inventory Auditing Work

The following diagram illustrates how the different components involved in inventory management communicate with each other:

Inventory Management Components

ISM Discovery and the creation of configuration item records is accomplished by:

Performing an Active Directory scan from a Ivanti Service Manager gateway.

Doing a ping discovery on the IP address ranges using a module called Netscan, (included in the data center gateway installation). Netscan IP ranges are set on the gateway.

Running a client agent process called Netscan, that listens for network traffic and then queries devices on the network using SNMP. SNMP queries are set on the gateway.

Gathering data via SCCM and other external sources that communicate directly with the asset processor and other adapters.

Importing data from ISM Discovery Release 9.3.x or later, using the utility.

Importing from an external file using the business object uploader.

Manually entering the data.

The following table displays various discovery methods available with ISM Discovery methods included with ISM Discovery:

Method

Deployed From

Discovers

OS Support

CI Types Discovered
Client Agent

Audits the machine on which it is installed. Set polling interval from inventory settings.

See also Service Manager powered by HEAT.

device name

MAC/IP address

operating system

software

hardware

Windows

Mac

UNIX: HP UX, AIX, Solaris

Linux: Ubuntu, Red Hat, SUSE

Servers

Workstation

VirtualServer

VirtualWorkstation

Agentless Audit or Remote Scan

From a gateway, audits other machines on the network. This only works for the Windows operating system using a WMI query.

See also Service Manager powered by HEAT.

device name

MAC/IP address

operating system

software

hardware

Windows OS only

Servers

Workstation

VirtualServer

VirtualWorkstation

LanProbe

Client agent installed on machines. Collects information to update CI records. LanProbe settings (including polling frequency) are configured from the Details tab. See Using the Inventory Settings Workspace and Working with LanProbe for more information.

device name

MAC/IP address

Scans for any device within a client's subnet or configured subnets that have SNMP-enabled devices.

It also discovers the MAC address and host name from DNS and ARP

Collects deltas and updates previously created CI records.

Computers

Servers

Workstations (physical and virtual)

Routers

Switches

VOIP

Printers

Scanner

Access Point

UPS

Firewall

SAN

Hub

Netscan

Scans for Window-based or SNMP-enabled devices connected to the network.

Is scheduled and runs only from a Gateway Data Center Edition workspace. Set ranges from the Netscan IP-Ranges tab in the Gateway Data Center Edition workspace. For more information see Using Netscan

device name

MAC/IP address

operating system

Only used for Windows or SNMP enabled devices

Computers

Servers

Workstations (physical and virtual)

Routers

Switches

VOIP

Printers

Scanner

Access Point

UPS

Firewall

SAN

Hub

Active Directory Scan

Gateway and Gateway Data Center Edition

works only with Windows Server or workstations on Active Directory

device name

MAC/IP address

operating system

 

Windows machines listed on Active Directory

Servers

Workstations

VirtualServer

VirtualWorkstation

After initial discovery, the system audits assets to collect additional data. Auditing of the discovered assets is accomplished by:

Installing the ISM Discovery client agent on the computer to be audited.

Remotely auditing via a WMI scanner that runs on the Ivanti Service Manager gateway.

Performing an SCCM import.

Performing an import from ISM Discovery Release 9.3.x or later.

Uploading a file.

The following table compares information gathered by audits using the installed ISM Discovery client agent versus remote scan:

Method

Operating System Support

Hardware

Software

Software Usage

File Info

Deltas

ISM Discovery Client Agent

Windows

Mac

UNIX: HP, AIX, Solaris

Linux: Ubuntu, Red Hat, SUSE

Yes

Yes (both Add/Remove programs entries and software files) Greynet software is identified by comparing the discovered software to a pre-defined table.

Yes

Yes

Yes

Remote Scan (WMI)

Available only for Windows

Yes

Yes (only Add/Remove programs entries)

No

No

No

Active discovery involves installing the Ivanti Service Manager gateway on a computer or doing a ping sweep to establish a range of IP addresses that map to live hosts, and then doing an Active Directory scan.

Passive discovery uses LanProbe (an installed client agent) to listen to your network activity and identify new devices when they are added or connected to the network.

For clients and gateways, the Ivanti Service Manager gateway communicates via HTTPS to the client data web service. The data is in turn processed by ISM Discovery processors, that populate the configuration management database with inventory information. Inventory data is also gathered by SCCM and other external sources, which communicate directly with the ISM Discovery processors and other adapters. In case of a gateway proxy, the client sends messages to the proxy which in turn forwards the messages to the server. Gateway proxy is usually used in environments where there is limited network access.

The Ivanti Service Manager gateway must be installed on one or more computers (or servers) or on a proxy server in your network in order to use discovery methods (such as ADScan, Deploy Agent, NetScan etc.). To install a gateway, see Service Manager powered by HEAT. SeeManaging Gateway Workspace Settings to learn more about your gateway settings.

If you are using the Ivanti Service Manager gateway to deploy agents to other client machines, you must have full administrator rights and privileges on those client machines.

To manage the computers that are currently not audited: You need to deploy a client agent to the computers as described in Deploying Agents to Other Computers. This agent allows the subsequent Inventory process to discover all network computers. You can also install agents on remote computers, as described in About Installing Agents on Remote Computers.

When the gateway has been installed: It can deploy client agents to other computers. When a client agent has been installed on a computer, it automatically performs an initial full audit (see Running an Active Directory Scan). You can also use the gateway computer to do a remote audit on the client computers without the need to install client agents (see About Agentless Audits).

In cases where it is not feasible to install a client agent on a networked computer: You can remotely audit the machine by using Microsoft WMI infrastructure (Windows Management Instrumentation), which allows the gateway to audit computers remotely. Agentless auditing is done by a gateway machine running WMI queries against the target computers. See About Running Agentless Audits.

When data is gathered for inventory either by the agent audit or by remote auditing from the agent or the gateway: The audit data is sent to the Ivanti Service Manager data center web service via a secure HTTPS protocol. The received data is processed in two steps: the raw ISM Discovery agent data and is processed into a generic format (for example, the names of publishers and hardware are normalized); then the normalized data is populated into the configuration management database.

The Ivanti Service Manager agent and the Ivanti Service Manager gateway also communicate with the message processor to determine if there are tasks to process. The message processor is a component on the Ivanti Service Manager server, which provides tasks for the gateways and for the clients through a web service. A task for a gateway can be, for example, "install Ivanti Service Manager client on machine X" or "update configuration." A task for a client can be, for example, "update configuration" or "audit computer now."

The following diagrams show how data flows from the audited computer to the data center without a proxy and then with a proxy:

Data Flow Without a Proxy

Data Flow With a Proxy


Was this article useful?    

The topic was:

Inaccurate

Incomplete

Not what I expected

Other