Gathering inventory on managed computers

Article:HOWTO63513  |  Created: 2011-12-16  |  Updated: 2012-04-20  |  Article URL http://www.symantec.com/docs/HOWTO63513
Article Type
How To


Subject


Gathering inventory on managed computers

You can gather inventory data by running automated policies and tasks on managed computers. This method requires that you install the Symantec Management Agent and the Inventory Plug-in on target computers. The inventory policies and tasks use the Inventory Plug-in to perform the inventory scan on the target computer. The inventory data is sent to the CMDB.

See About gathering inventory on managed computers.

Table: Process for gathering inventory on managed computers

Step

Action

Description

Step 1

Prepare managed computers for inventory.

Target computers must be managed and have the Inventory Plug-in installed.

See Preparing managed computers for inventory and metering.

Step 2

Enable an inventory policy or create an inventory policy.

You need to enable and configure a policy to collect inventory. You can use an existing policy or create and configure your own policies or tasks.

See Using predefined inventory policies.

See Creating and configuring inventory policies and tasks.

Step 3

(Optional) Configure custom inventory policy schedules.

An inventory policy with the custom schedule does not run automatically as soon as possible after the custom schedule is created and on any new computer that joins the target collection. You can configure the two custom schedules to run the policy immediately once and on a recurring schedule later.

See Scheduling custom inventory policies to run immediately once and on a recurring schedule later.

Step 4

View inventory results.

You can view the gathered inventory data by viewing reports and data in the Resource Manager.

See Viewing inventory data in reports.

See Viewing inventory data in the Resource Manager.

See Viewing inventory data in the enhanced Symantec Management Console views.


Legacy ID



v13866611_v66534462


Article URL http://www.symantec.com/docs/HOWTO63513


Terms of use for this information are found in Legal Notices