Critical System Protection Pack for Altiris™ IT Analytics Solution 7.1 SP2 from Symantec™ User Guide

Article:DOC5712  |  Created: 2012-06-21  |  Updated: 2012-10-22  |  Article URL http://www.symantec.com/docs/DOC5712
Article Type
Documentation


Description



Critical System Protection Pack for Altiris™ IT Analytics Solution 7.1 SP2 from Symantec™ User Guide

Contents

1. Introducing IT Analytics Solution
About IT Analytics Solution
How IT Analytics works
About IT Analytics Critical System Protection Pack
Where to get more information
2. Getting Started
Installing and configuring IT Analytics Solution
Hardware prerequisites
Software prerequisites
Ports used by IT Analytics Solution
Installing IT Analytics Solution and packs
Configuring IT Analytics Solution
Configuring Critical System Protection connections
Critical System Protection connection fields
Adding Critical System Protection connections
Editing Critical System Protection connections
Deleting Critical System Protection connections
Adding cubes
Adding reports
Configuring the cube processing tasks
Verifying your installation
Purging resource event data
Uninstalling IT Analytics Solution and packs
Hosting Symantec Management Platform and SQL 2005 Reporting Services on the same server
3. Implementing IT Analytics Solution
Ways to access IT Analytics Solution
About cubes
Cube prerequisites
Cube fields
Top cube toolbar functions
Cube toolbar functions
Charts toolbar functions
Viewing a cube
Viewing a dashboard report
Viewing a detailed report
Creating a new report
Saving a cube view
Loading a table view
Modifying a table view
Deleting a view
Displaying cube data results in a chart or table
Exporting table results
Removing warning messages
Creating a table using the Critical System Protection Assets cube example
About Key Performance Indicators (KPIs)
Creating Key Performance Indicators (KPIs) - Critical System Protection
Setting the status of a KPI (advanced) - Critical System Protection
4. Granting access to IT Analytics Solution
About security
About the SQL Server Database Engine
About SQL Server Analysis Services
Granting access to cubes using the Symantec Management Console
Adding a user to a default role
Modifying role privileges
Creating a role
Deleting a role
Granting access to cubes using SQL Server Management Studio
About SQL Server Reporting Services
Granting access to reports using the Symantec Management Console
Granting access to reports using the Report Manager Web site
Granting access to the dashboards, cubes, and reports
Symantec Management Platform role-based privileges
Granting access to save and load views and create new reports
About configuring the Reporting Services data sources to use Stored Credentials or Windows Integrated Authentication to access the Analysis Services cubes
Reconfiguring the Reporting Services data sources to access the Analysis Services cubes
Configuring Kerberos on the Symantec Management Platform and SQL Server Analysis Services and Reporting Services servers
Configuring Kerberos for the SQL Server Analysis Services server to SQL Server Reporting Services server connection
A. Cube reference
B. Dashboard reference
Critical System Protection Client Dashboard
Critical System Protection Risk Dashboard
C. Report reference
Critical System Protection Client Details
Critical System Protection Event Details
Critical System Protection Events Trend
D. Dimension attribute reference
CSP Agent Created Date
CSP Agent Type
CSP Asset
CSP Asset Policy Protection Coverage
CSP Database Server
CSP Detection Event File Watch Filename
CSP Detection Event File Watch New Owner
CSP Detection Event File Watch New Permission Bitmask
CSP Detection Event File Watch New Primary Group
CSP Detection Event File Watch New Size
CSP Detection Event File Watch Number of Hardlinks
CSP Detection Event File Watch Old Owner
CSP Detection Event File Watch Old Permission Bitmask
CSP Detection Event File Watch Old Size
CSP Detection Event NT Log Event Category
CSP Detection Event NT Log Event Computer
CSP Detection Event NT Log Event ID
CSP Detection Event NT Log Event Source
CSP Detection Event NT Log Event Type
CSP Detection Event Registry Watch New Value
CSP Detection Event Registry Watch Old Value
CSP Detection Event Registry Watch Path
CSP Event Agent State
CSP Event Category
CSP Event Date
CSP Event Disposition
CSP Event ID
CSP Event Operation
CSP Event Post Date
CSP Event Post Delay
CSP Event Priority
CSP Event Process Id
CSP Event Process Name
CSP Event Process Path
CSP Event Resource Name
CSP Event Rule Id
CSP Event Rule Name
CSP Event Severity
CSP Event Source
CSP Event Type
CSP Group
CSP Last Contact Date
CSP Last Event Date
CSP Policy
CSP Policy Created Date
CSP Policy Modified Date
CSP Prevention Event File Access Filename
CSP Prevention Event File Access NT Create Disposition
CSP Prevention Event Memory Access Injectee Process ID
CSP Prevention Event Memory Access Injectee Process
CSP Prevention Event Memory Access Injectee Thread ID
CSP Prevention Event Memory Access Injector Thread ID
CSP Prevention Event Memory Access Mechanism
CSP Prevention Event Module Path
CSP Prevention Event Network Access Local IP
CSP Prevention Event Network Access Local Port
CSP Prevention Event Network Access Protocol
CSP Prevention Event Network Access Remote IP
CSP Prevention Event Network Access Remote Port
CSP Prevention Event Network Access Service Name
CSP Prevention Event OS Result
CSP Prevention Event Permission Requested
CSP Prevention Event Process Assignment Arguments
CSP Prevention Event Process Assignment Parent PID
CSP Prevention Event Process Assignment Parent Process
CSP Prevention Event Process Set
CSP Prevention Event Registry Access Registry Key
CSP Prevention Event SCSP Result
CSP Prevention Event Thread ID
CSP Role
CSP Service Start Date
CSP User

Attachments

ITAnalytics_CSP_user_guide.pdf (1.4 MBytes)

Legacy ID



v74024151_v75963071


Article URL http://www.symantec.com/docs/DOC5712


Terms of use for this information are found in Legal Notices