Metering and denying applications
|Article:HOWTO63522|||||Created: 2011-12-16|||||Updated: 2012-04-20|||||Article URL http://www.symantec.com/docs/HOWTO63522|
Application metering lets you perform the following tasks on your managed computers:
Table: Process for metering and denying applications
Prepare computers for metering.
Target computers must be managed with the Symantec Management Agent and have the Inventory Plug-in and the Application Metering Plug-in installed.
Configure global metering options.
You can configure data purging options and software inventory integration.
You must also configure global email settings.
For more information see the topic about mail server and address settings in the Symantec Management Platform User Guide.
(Optional) Gather software inventory and manage the software product that you want to meter.
If you want to use the software-based usage tracking option that lets you meter software at the product level, the software must be discovered and managed in the Software Catalog.
Software inventory gathers the data about the software components that are installed and discovered in your environment.
If this installation is not a fresh installation of Inventory Solution, the software inventory must have been already gathered.
Use the following two methods for gathering software inventory:
When software inventory data is gathered and entered into the CMDB, you have the following options for making your software a managed software product:
Enable application metering or deny applications from running on target computers.
To enable application metering, you can use different options based on your needs:
To deny applications from running, you configure the predefined Blacklisted Applications policy. You can add as many applications to this policy as you want.
See Denying applications.
View application metering data.
You can view metering data in application metering reports.
You view the usage tracking data for the managed software that is metered at the product level in the usage tracking reports in the enhanced Symantec Management Console Software view.
Article URL http://www.symantec.com/docs/HOWTO63522