Windows Admin Guide PDF
Windows Admin Guide PDF
Windows Admin Guide PDF
Version 6.1.03
iii
• sequence of events leading to the problem
• commands and options that you used
• messages received (and the time and date that you received them)
— product error messages
— messages from the operating system, such as file system full
— messages from related software
Contents
Contents v
Western European Languages . . . . . . . . . . . . . . . . . . . . . . . . . . .2-26
Japanese . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .2-27
Chapter 4 Utilities
Timeout Intervals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2
Specifying Utility Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-2
Format for Command Lines With Spaces . . . . . . . . . . . . . . . . . . . . .4-3
Directing Output From Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-3
Invoking A Utility On A Computer With Multiple Agents . . . . . . . .4-4
Utility Descriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-5
ag_ping Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-7
ctmagcfg Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-8
ctmfw Utility (File Watcher) . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-10
ctmpwd Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-17
ctmwincfg Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .4-19
Index
Figures
Figures vii
BMC Software, Inc., Confidential and Proprietary Information
Tables
Tables ix
BMC Software, Inc., Confidential and Proprietary Information
Abbreviation Description
CM CONTROL-M/Control Module
A product library for a specific application or operating
system used by CONTROL-M/Agent to support that
application or operating system.
CONTROL-M/EM CONTROL-M/Enterprise Manager
Convention Description
<key> When describing keystrokes, angle brackets are used to
enclose the name of a key (for example, <F1>). When
two keys are joined with “+” as in <Shift>+<F1>, hold
down <Shift> while pressing <F1>.
Menu => Option This represents an option selection sequence.
For example:
Users and Groups => Groups => Add
means that you first select Users and Groups from the
menu bar; then select the Groups option from the
submenu. Finally, select the Add option from the
Groups submenu.
{Option A|Option B} The vertical bar is used to separate choices. For
example, when used as part of a parameter, {AND|OR}
means that you specify either AND or OR.
[Parameter] Square brackets are used to enclose parameters that
are optional.
<variable> In commands and parameters, angle brackets are used
to enclose variable information. For example, the
command:
cd <controlm_path>
means that you specify cd followed by the path of
CONTROL-M.
italic An italic font is used for the name of publications.
Understanding CONTROL-M/Agent 1
Product Description
CONTROL-M/EM GUI-based control center from which you can
manage all scheduling and workflow activities.
CONTROL-M/Server Engine (on a Unix or Microsoft Windows computer)
used to drive scheduling in a data center. Each
CONTROL-M/Server can manage multiple
CONTROL-M/Agents on various computers.
CONTROL-M/Agent Software responsible for job submission and
execution. An Agent must exist on each computer
that is used to execute CONTROL-M jobs.
CONTROL-M/eTrigger Web-based product that creates and runs jobs
under CONTROL-M using input from a web page.
CONTROL-M/Control CONTROL-M Control Modules enable
Modules CONTROL-M/Agents to interface with other
applications (for example SAP and Oracle
Applications).
• Requests for information about jobs on the Agent computer that have
been submitted, are currently executing, or have recently completed.
Item Description
Installation Information about installing and upgrading
CONTROL-M/Agent for Microsoft Windows is described in
the CONTROL-M Installation Guide.
Configuration CONTROL-M/Agent configuration parameters are assigned
Parameters values during the installation procedure.
• Table A-1 on page A-1 lists these parameters and their
default values.
• BMC recommends using the ctmagcfg utility (described on
page 4-8) to modify these parameters. However, some of
these parameters can also be modified by using the
CONTROL-M/Agent GUI described on page 2-9.
Command-Line Many CONTROL-M tasks can be implemented from a DOS
Utilities command-line using utilities. For more information, see
Chapter 4, “Utilities”.
Control A Control Module (CM) is a DLL component that enables
Modules CONTROL-M/Agent to interface with other applications in
your data center. For example, the CM for SAP interfaces
between CONTROL-M/Agent and SAP.
• The CONTROL-M/Agent installation procedure installs a
Control Module for Microsoft Windows operating systems
and assigns values to its configuration parameters.
Note: Control Modules are installed only on the default
CONTROL-M/Agent.
• Table A-2 on page A-4 lists these parameters and their
default values.
• BMC recommends using the ctmwincfg utility (described
on page 4-19) to modify these parameters. However,
some of these parameters can also be modified by using
the CONTROL-M/Agent GUI described on page 2-9.
For most utilities if the -agent parameter is not specified, the default
CONTROL-M/Agent for that computer is used. However, if a
configuration utility is run without specifying the -agent parameter, the
user is prompted to select the CONTROL-M/Agent. For more
information about invoking CONTROL-M/Agent utilities, see “Invoking
A Utility On A Computer With Multiple Agents” on page 4-4.
Method Description
Upgrade When upgrading CONTROL-M/Agent from an earlier
version, that Agent is automatically set as the default.
Installation Procedure During installation of the first CONTROL-M/Agent, the
user can select the Agent as default.
• If selected, this CONTROL-M/Agent is set as
Default. If the user specifies a name for the Agent,
the Agent must be referred to by that name when
specifying the -agent parameter. For more
information about the -agent parameter, see
Chapter 4, “Utilities”.
Note: The name Default (not case sensitive) is a
reserved name.
• If not selected, a subsequent CONTROL-M/Agent
can be selected as default.
Note
Control Modules can be installed only on Default CONTROL-M/Agent.
Implementing CONTROL-M/Agent 2
The procedures and facilities described in this chapter enable you to keep
CONTROL-M/Agent running efficiently.
The Log On panel prompts you to select Local System account or This
Account. For more information, see “Configuring Agent and Tracker
Service Properties” on page 2-4.
These options enable the Agent service and Tracker service to open
windows in the Microsoft Windows desktop. However, the Local
System Account cannot access files across a network and cannot
send a Shout message to an e-mail destination.
In either case, the service’s logon on account must have these user rights
(see “How to Assign User Rights to Agent Users” on page 2-8):
• The profile must reside on the network. If the network path includes
the environment variable, CONTROL-M/Agent expands the path and
loads the User Profile from the expanded path.
Summary: You can modify Agent service and Tracker service properties in the
Log On panel of the CONTROL-M Agent (or Tracker) Properties
window. BMC recommends that the same properties be specified for both
the Agent service and the Tracker service.
Default values for Agent and Tracker service properties were set during
the CONTROL-M/Agent installation. You can modify these properties.
Note
If the owner of any CONTROL-M jobs has a “roaming profile”, the
Logon mode must be set to This Account. Otherwise, the Local System
Account logon mode is recommended.
Step 1 Choose Start => Settings => Control Panel => Administrative Tools
=> Services.
Step 4 The Log On panel is displayed. Select the desired properties and click
OK.
BMC Software recommends that you do not make any changes to this
service.
Summary: The Agent and Tracker services operate as background processes that are
not visible to the user. When the computer is turned on or rebooted, these
services start automatically if the Startup Type configuration parameter is
set to Automatic. (See “Startup Type” on page A-6.) These services
remain active as long as Microsoft Windows is running.
If you stop these services, you can restart them manually (as described
below), or you can reboot the system (if Startup Type is Automatic). If
the Startup Type is set to Manual, you must start these services manually
(as described below).
You can modify the Startup Type value. BMC recommends that the
Agent service and the Tracker service be treated the same way. The
recommended Startup Type is Automatic.
Step 1 Select Start => Settings => Control Panel => Administrative Tools.
Step 1 Select Start => Settings => Control Panel => Administrative Tools.
• If Logon As User is set to N, the owner of the job is the user account
for the CONTROL-M/Agent service: the Local System account or
the This Account user. For more information, see “Specifying the
Agent Service and Tracker Service User Account” on page 2-2.
• The owner must have access rights to the network and the Log on as
a batch job user right.
Note
To eliminate the need to assign user rights to every job owner on every
Microsoft Windows computer running CONTROL-M/Agent, BMC
recommends that you define a domain-level group for all job owners.
You can name this group “CONTROL-M Job Owners”. Assign network
access rights and the Logon as a batch job user right to this group.
Summary: You can use this procedure to assign the user rights listed on page 2-3 to
each user who needs them.
Step 2 Choose Start => Settings =>Control Panel=> Administrative Tools =>
Local Security Policy.
Step 5 Double-click the user right you want to assign. The Local Security
Policy Settings window for that user right is displayed.
5.A If the user who should have the selected user right is not listed in
this window, click Add.
5.C When the specified user is displayed in the lower panel, click
OK again.
Step 6 Restart the Agent service to make the user rights effective.
Note
The CONTROL-M/Agent GUI does not start the CONTROL-M Agent
service. To start the CONTROL-M Agent service, see “Starting/Stopping
Agent and Tracker Services” on page 2-5.
Note
The Agent-to-Server port number and the Server-to-Agent port
number are defined both on the Server computer and on each Agent
computer. These parameters must have matching values in both locations.
The following table describes tasks that are related to this one.
The parameters in this dialog box are described in Table A-2, “Control
Module Configuration Parameters,” on page A-4.
The following table describes tasks that are related to this one.
Step 3 Modify the Server computer host names as required. Click OK.
Step 4 Verify communication between the Agent computer and the primary or
authorized Server computers. The instructions for performing this task
are described in “Verifying Communication with the Server” on page
2-23.
The following table describes tasks that are related to this one.
Summary: Diagnostic messages are recorded in a diagnostics file. The detail and
content of the messages is dependent on the current diagnostic level.
Select the desired diagnostic level in the dialog box. Click OK.
Summary: You can view log files containing messages that are transmitted between
the Agent computer and CONTROL-M/Server, and log files containing
diagnostic messages recorded on the Agent computer.
When the log files are no longer required, you can delete them.
Step 1 Select File => Show Log Files from the menu bar.
Step 3 Double-click the required file. The log file is displayed in Notepad.
Step 1 Select File => Delete Log Files from the menu bar.
The following table describes tasks that are related to this one.
Summary: You can view diagnostics files containing messages that are generated
according to the diagnostics level specified. When the diagnostics files
are no longer required, they can be deleted.
Note
For more information about diagnostic levels, see “Specifying a
Diagnostic Level” on page 2-17.
Step 1 Select File => Show Diagnostic Files from the menu bar.
Step 3 Double-click the required file. The selected file is displayed in Notepad.
Step 1 Select File => Delete Diagnostic Files from the menu bar. A confirmation
window is displayed.
To change the default retention period for logs in the proclog directory,
see ctmsys utility in the CONTROL-M/Server Administrator Guide.
The following table describes tasks that are related to this one.
Step 3 Select or clear the Job Object Statistics check box as required. Click OK.
• If you select the check box, job object statistics are written to the
sysout file.
• If you clear the check box, job object statistics are not written.
The following table describes tasks that are related to this one.
Summary: BMC recommends that you verify the ability of the Microsoft Windows
Agent computer to communicate with the primary Server computer and
with all other authorized Server host computers. Use the following steps
to verify communication with a Server computer:
Step 2 If the ping is still unsuccessful and the Microsoft Windows computer
does not use DNS (Domain Name System) for host name resolution,
check that the host name is defined in the hosts file for the computer. The
hosts file is usually located under the following directory:
c:\winnt\system32\drivers\etc\
If the host name of the Server computer is not listed in the hosts file, you
can add an entry for the Server computer in the format:
<IP_address> <host_name>
Example
128.128.100.12 diana
BMC Software, Inc., Confidential and Proprietary Information
To view or change the user in the This Account field, see “Configuring
Agent and Tracker Service Properties” on page 2-4.
Writing Scripts 3
• Basic Guidelines
— On Statement/Code Parameter
— Utilization of Exit Codes by CONTROL-M/Server
• Script Utilities
— _exit
— _sleep
• Translating DOS Files and REXX Scripts to UNC
• Begin the script with the command echo on. This ensures that job
script statements will be written to the sysout file.
On Statement/Code Parameter
• Continuation Lines
Both DOS .bat scripts and REXX .cmd scripts can return an exit code to
CONTROL-M/Server upon completion. The _exit utility described below
is used by .bat scripts.
COMPSTAT=<value>
Example
exit 5
Stmt: *
Code: COMPSTAT=5
If this directory is not defined as part of the operating system search path,
specify the full path when using one of these utilities.
_exit
Format
Examples
Format
Note
If _sleep is specified, it is mandatory to specify a whole integer
number.
Example
Item Description
<batch_file_to_translate> Original .bat or .cmd script
<output_file_name> New script after translation
Example
Table 3-2 describes these scripts before and after executing the
CTMBAT2UNC utility.
Original
Owner Script Translated Script
A @echo off @echo off
dir M:\jobs REM Following line was changed
by CTMBAT2UNC
dir \\nt-A\share\jobs
B @echo off @echo off
dir M:\jobs REM Following line was changed
by CTMBAT2UNC
dir \\nt-B\share\jobs
Note
Under the current version of Microsoft Windows, command interpreters
do not change a current directory to a UNC path (for example,
cd \\nt-A\share\jobs will not be executed). BMC recommends
that you review the translated script after invoking the ctmbat2unc utility.
Utilities 4
Utilities are special programs that perform job definition, scheduling, and
maintenance functions. These utilities can be invoked from a command
line or by the Command parameter in a job processing definition.
Utilities 4-1
Note
If the primary CONTROL-M/Server does not respond to a
CONTROL-M/Agent request to execute a utility (other than ag_ping),
the request is automatically redirected to the first non-primary Server
listed in the Authorized CONTROL-M/Server Hosts parameter. If the
redirection is successful, that Agent continues to work with the
replacement Server.
Timeout Intervals
The Timeout for Agent utilities parameter is described on page A-3. If
the Agent invokes a utility that runs on the Server and there is no
response within the timeout interval, the requested action will fail.
The ctmagcfg utility (see page 4-8) can modify this timeout interval.
But, increasing this interval reduces CONTROL-M/Agent performance.
The total maximum length for all these parameters is 1000 characters.
Using an input file enables you to:
ctmcontb ctmorder
ctmcreate ctmshout
ctmdefine ctmvar
ctmkilljob ecaqrtab
ctmstvar
Add \” after the first quote at the beginning of the command, and add \”
at the end of the command (but prior to any parameters).
Example
“\”d:\program files\bmc software\control-m agent\util\_sleep\” 200”
Utilities 4-3
Invoking A Utility On A Computer With Multiple
Agents
All CONTROL-M/Agent utilities now support the -agent <agent name>
parameter. The variable <agent name> represents the name of the
CONTROL-M/Agent specified during the installation procedure.
Example
Assume a computer has two Agents, Default and Saturn. To add a user
to Default, use the following command:
-or-
Utility Description
_exit Sets the completion status for a job run from a .bat file. Exit code
0 is equivalent to Ended OK. Any other exit code is equivalent to
Ended NOTOK. For more data, see page 3-4.
_sleep Determines the sleep time for all CONTROL-M/Server processes
or for a specific process. For more information, see page 3-5.
ag_diag • Verifies that the primary CONTROL-M/Server host is active by
_comm pinging the host via the CONTROL-M port.
• Displays CONTROL-M system information.
For more information, see “Generating the Communication
Diagnostic Report” on page 2-24.
ag_ping Tries to communicate with CONTROL-M/Server and indicates
whether the attempt succeeded or failed. For more information,
see page 4-7.
ctmag Invokes the CONTROL-M/Agent GUI. For more information, see
“Using the CONTROL-M/Agent GUI” on page 2-9.
ctmagcfg Interactively modifies CONTROL-M/Agent configuration
parameters. For more information, see page 4-8.
ctmcontb Performs operations on the Prerequisite Conditions table. For
more information, see the CONTROL-M/Server Administrator
Guide.
ctmcreate Creates a job in the Active Jobs file. For more information, see
the CONTROL-M/Server Administrator Guide.
ctmdefine Creates job processing definitions. For more information, see the
CONTROL-M/Server Administrator Guide.
ctmfw Detects completion of file transfer activity. For more information,
see page 4-10.
ctmkilljob Terminates an executing CONTROL-M job and all of its
associated processes. For more information, see the
CONTROL-M/Server Administrator Guide.
Utilities 4-5
Table 4-2 CONTROL-M/Agent Utilities (Part 2 of 2)
Utility Description
ctmloadset Updates a Quantitative resource in the Resources table. You
must provide all the required parameters on the command line.
For more information, see the CONTROL-M/Server
Administrator Guide.
ctmorder Orders or forces one or more jobs from a CONTROL-M
scheduling table. For more information, see the
CONTROL-M/Server Administrator Guide.
ctmpwd Maintains CONTROL-M user and password information. For
more information, see page 4-17. (This utility replaces the
ctmcpt utility in earlier versions.)
ctmshout Issues a shout message to a specified destination. For more
information, see the CONTROL-M/Server Administrator Guide.
ctmstvar Displays the current value of an AutoEdit variable or function.
ctmudly Orders jobs for a specific User Daily name. For more
information, see the CONTROL-M/Server Administrator Guide.
ctmvar Maintains AutoEdit variables. For more information, see the
CONTROL-M/Server Administrator Guide.
Note: The value of parameter -filename is the full path and
name of a file that is accessible to CONTROL-M/Server.
ctmwincfg Interactively maintains Control Module configuration parameters.
For more information, see page 4-19.
ecactltb Displays a list of Control resources and the status of each one.
For more information, see the CONTROL-M/Server
Administrator Guide.
ecaqrtab Performs operations on the Quantitative resources table. You
must provide all the required parameters on the command line.
For more information, see the CONTROL-M/Server
Administrator Guide.
ag_ping
Output:
Server is alive.
Result: Success.
Utilities 4-7
ctmagcfg Utility
This interactive utility enables you to view and modify the parameters
listed in Table A-1 on page A-1. If the parameter you want to modify is
not listed in Table A-1, see the “ctmwincfg Utility” on page 4-19.
Note
BMC recommends to not access the Registry directly but to use ctmagcfg
or ctmwincfg instead.
Note
The default Protocol version (see option 14 above) is 06. This value
indicates that CONTROL-M/Agent will communicate with
CONTROL-M/Server version 6.1.03. Do not change this value.
Utilities 4-9
ctmfw Utility (File Watcher)
Usage as a Service
As a service, ctmfw takes its parameters (rules) during startup from the
rull.dat file whose full path name is specified in
<CONTROL-M/Agent>\data\ctmfw.cfg.
To change one or more rules, change the contents of the rull.dat file or
specify the full path name of a different file.
The full path name to the ctmfw.cfg configuration file must be specified
under the following Microsoft Windows registry key that is generated
automatically by the installation script:
HKEY_LOCAL_MACHINE\SOFTWARE\BMC Software\
CONTROL-M/FileWatcher\SYSPRM\File Watcher
Configuration File
Usage as a Utility
ctmfw FILE
< mode (CREATE|DELETE)> Default: CREATE
< minimum detected size <number>
[' '|Bytes|Kilo|Mega|Giga] > Default: 0Bytes
< interval between file searches (seconds) >
Default: 60sec
< interval between filesize comparison
iterations (seconds) > Default: 10 sec
< number of iterations while size is static >
Default: 3 iterations
< time limit for the process (minutes).
Default: 0 (no time limit)
Effective while the file does not exist or,
the file size is static and the minimum size
was not reached >
< monitor file size when wildcard is used >
Default: Y
-or-
Note
As of version 6.1.03, the ctmfw utility can be used to monitor files larger
than 4GB.
For more information about rule files, see “Rule File Structure” on page
4-15.
Utilities 4-11
The parameters of the ctmfw utility are described in Table 4-3.
Note
The parameters in the ctmfw command are identified by their sequence.
Although all parameters are optional, you cannot skip a parameter and
assign a value to a subsequent parameter. The first value is assumed to be
the desired mode, the second value is assumed to be the minimum
detected size, and so forth.
If only six values are specified, the default value for monitor file size
when wildcard is used is used. If five parameters are specified, default
values for time limit for the process and monitor file size when
wildcard are used, and so forth. For example:
Param Description
FILE Path of the file to be detected. The file name can include mask
character * to represent any number of characters (including no
characters) or ? to represent any one character. In this case,
enclose the full path name in quotation marks (for example,
“c:\ctm\a*.txt”). If a file name in a Rules file (see page 4-15)
contains a wildcard, the filename should not be enclosed in
quotation marks. When a wildcard is used, the ctmfw utility does
not monitor the size of the file unless the monitor file size
when wildcard is used parameter is set to Y.
Param Description
mode CREATE Detects creation of a file. Default. File size is
ignored if the filename parameter contains
wildcards (unless the monitor file size when
wildcard is used parameter is set to Y).
Note: If a mask is specified for the filename,
• and the monitor file size when wildcard is
used parameter is set to N, the ctmfw utility will
end OK after detection of the first file that
matches the specified mask.
• and the monitor file size when wildcard is
used parameter is set to Y, the ctmfw utility will
continue to monitor the size of the randomly
selected file.
For more information about monitor file size
when wildcard is used, see below.
DELETE Detects deletion of a file. When the ctmfw utility is
run in this mode, it first checks for files that match
the specified name. After a specified file is
detected, the ctmfw utility checks at the specified
interval for deletion of that file. Note: If a mask is
specified as the filename, the ctmfw utility will end
successfully only after all detected files that
match the specified mask have been deleted.
minimum Minimum file size in bytes. This parameter is ignored if the FILE
detected parameter contains wildcards (unless the monitor file size
size when wildcard is used parameter is set to Y) or if the mode
parameter is set to DELETE. Default: 0 (any size detected).
interval Interval between successive attempts to detect the
between file existence/deletion of a file (in seconds). Default: 60
searches
interval Interval between attempts to monitor the size of a file after it is
between detected (in seconds). This parameter is ignored when using
filesize wildcards in FILE or when using DELETE mode. Default: 10
comparison
iterations
number of Number of attempts to monitor file size where the size remains
iterations static and greater than or equal to minimum detected size
while size is (indicating successful creation of the file). This parameter is
static ignored when using wildcards in FILE or when using DELETE
mode. Default: 3
Utilities 4-13
Table 4-3 ctmfw – Parameters (Part 3 of 3)
Param Description
time limit for Maximum time (in minutes) to run the process without detecting
the process the file at its minimum size (CREATE) or detecting its deletion
(DELETE). If the file is not detected/deleted in this specified
time frame, the process terminates with an error return code, as
described in Table 4-4. Default: 0 (no time limit).
monitor file Indicates whether file size should be monitored if the filename
size when contains wildcards. This parameter is ignored if the filename
wildcard is does not contain a wildcard. Valid values:
used N – do not monitor file size.
Y – monitor the file size. Default.
If this parameter is set to Y and more than one file matches the
specified mask, the ctmfw utility randomly selects one matching
file, monitors its file size, and ignores all other matching files.
Example
To monitor the file size of files starting with the name giga, issue the
following command:
Return Codes
The return codes listed in Table 4-4 are issued by the ctmfw utility after
detecting if a file is created or deleted in the specified time frame.
INTERVAL 5
FROM_TIME 0001
MIN_SIZE 50
MIN_DETECT 5
WAIT_TIME 2
ON_FILEWATCH NONEXIST CREATE 10 3 1
THEN
DO_CMD "BAD FILE WAS CREATED IN 1 MINUTE"
DO_COND ON_2 0101 +
ELSE
DO_CMD "GOOD FILE WAS NOT CREATED IN 1 MINUTE"
DO_CMD ctmshout -USER ECS -MESSAGE "Running the
Filewatcher with default configuration!"
END_ON
Any File Watcher command line option can be specified in a rule file. All
parameters must be delimited by the new line character.
HKEY_LOCAL_MACHINE\SOFTWARE\BMC_Software\
CONTROL-M\FileWatcher\SYSPRM\Silent_Mode
Utilities 4-15
Network Resources
The FileWatcher service running under the local system account cannot
detect network resources (files located on remote systems). If you want
the File Watcher to detect network resources, configure the FileWatcher
Service to run under a regular user account.
U_CTMFW_<process_id>.log
By default, logs in the proclog directory are retained for 3 days. If the
“maximum days to retain sysout” parameter is set to a number higher
than 3, then logs will be retained in this proclog directory for the number
of days specified in that parameter.
Note
Full Control access to CONTROL-M/Agent directories is automatically
given to new users. You must manually give Logon as a batch job rights
to a new user. (See “How to Assign User Rights to Agent Users” on page
2-8.)
Syntax
Examples
update a password
Utilities 4-17
delete a user
Parameter Description
action Function to be executed.
Valid values: add, update, delete, and list.
user Name of the user.
old_password Current password for the update function.
password Current password for the delete function.
New password for the add and update functions.
admin_password Password for the CONTROL-M/Agent administrator when
executing the update or delete function if the
old_password is not known.
agent Name of the Agent that the utility is designated to run on.
For more information, see “Invoking A Utility On A
Computer With Multiple Agents” on page 4-4.
Example
This interactive utility enables you to view and modify the parameters
listed in Table A-2 on page A-4. If the parameter you want to modify is
not listed in Table A-2, see the “ctmagcfg Utility” on page 4-8.
Note
BMC recommends to not access the Registry directly but to use ctmagcfg
or ctmwincfg instead.
Syntax
CM Name : WIN
CM Type : WIN2K
Specify values for the parameters you want to change, specify s after the
prompt “Please enter your choice”, and press <Enter>. If you quit
without saving, settings are not saved. If you save but do not quit,
settings are saved anyway.
Utilities 4-19
BMC Software, Inc., Confidential and Proprietary Information
The Job Editing form contains a series of panels. Each panel contains
parameters whose value you can specify using this form. A job skeleton
(template) determines the parameters that are included in the job.
Note
For more information about the Job Editing form and Job parameters,
see the CONTROL-M/Desktop User Guide and the CONTROL-M Job
Parameter and Variable Reference Guide.
Step 4 In the Application Group field, specify the Control Module you want to
work with (for example, WIN_GROUP).
Step 5 Either:
Note
If CONTROL-M/Desktop is not connected to CONTROL-M/EM, enter
the Application Type, Version, and CM Version information manually.
Subject Location
Defining a Skeleton For more information about defining a skeleton, see
Chapter 5 of the CONTROL-M/Desktop User Guide.
Defining a Job For information about defining a job, see “Creating a
Microsoft Windows Job” on page 5-6. Also see
Chapter 3 of the CONTROL-M/Desktop User Guide.
Summary: Use this procedure to define the CM in CONTROL-M and install the Job
Editing form using ctmgetcm.
In CONTROL-M/Server
Step 4 Define the <agent_name> in a node group of type WIN (WIN must be in
capital letters).
Step 1 Install the CONTROL-M/Agent for Microsoft Windows form. For more
information, see “Creating a Job Skeleton for Microsoft Windows Jobs”
on page 5-2.
Step 3 Click Load. The node groups available from CONTROL-M/Server are
displayed. Select the required node group.
Subject Location
Defining a Skeleton For more information about defining a skeleton, see
Chapter 5 of the CONTROL-M/Desktop User Guide.
Defining a Job For information about defining a job, see “Creating a
Microsoft Windows Job” on page 5-6. Also see
Chapter 3 of the CONTROL-M/Desktop User Guide.
• Ensure that a job skeleton was defined for Microsoft Windows jobs.
For more information, see “Creating a Job Skeleton for Microsoft
Windows Jobs” on page 5-2.
• The job name of the Windows job you want to create must contain
only characters (letters, digits, underscore) that can be used in a
Microsoft Windows file name.
Note
When CONTROL-M/Agent handles a large number of jobs on a
computer with Microsoft Windows 2000 Professional, the following
message may be displayed "Application error 142".
Step 1 Select a skeleton for Microsoft Windows jobs from the Current
Skeleton drop-down list in CONTROL-M/Desktop.
• Edit => Job => New Job from the menu bar
• Press Ctrl + J
Note
For descriptions of all panels in the Job Editing form, see Chapter 3 of
the CONTROL-M/Desktop User Guide.
The WIN panel is used to set parameter values for some Microsoft
Windows jobs. This process is described in “Setting Job Object Limits
for a Microsoft Windows Job” on page 5-8.
Note
For more information about the Job Editing form and Job Editing
parameters, see the CONTROL-M/Enterprise Manager User Guide or the
CONTROL-M/Desktop User Guide.
Summary: Use this procedure to specify values for job object limitation parameters
in the WIN panel of the Job Editing Form. If a value is not specified for a
parameter, that parameter does not limit the job in any way.
The WIN2K skeleton is used for defining job object limitations. If this
skeleton does not exist, see “Creating a Job Skeleton for Microsoft
Windows Jobs” on page 5-2.
Note
In messages, “job object” may be abbreviated as JO.
Step 1 Click the WIN tab of the Job Editing form. The WIN Panel is displayed.
Step 2 Specify new data or modify existing data in the WIN Panel.
Step 3 When you are satisfied with the data in the WIN panel, click Save to
Draft to save the parameter specifications.
The following table describes where you might find information about
tasks that are related to this one.
Subject Location
Defining additional You can now define additional Microsoft Windows
Microsoft Windows jobs jobs by clicking the WIN tab of the Job Editing form.
Viewing jobs you have Click Cancel to exit the WIN Panel and go to the
created or modified Active environment to view the jobs you have
created or modified.
Defining jobs For information about defining jobs, see Chapter 3
of the CONTROL-M/Desktop User Guide.
Note
Values entered in WIN panel fields are validity checked. Values entered
on the command line or in a parameter input file are not validity checked.
Except for Priority class and Scheduling class, all of these parameters
can have decimal values (real numbers). Unless stated otherwise,
maximum and minimum values are machine dependent.
Note
You can determine the amount of memory and CPU time required for a
job by viewing job object statistics in the job sysout. If a job exceeds job
object limitations, the job will end NOTOK and the same error message
will appear in the sysout and in the CONTROL-M/Server message log.
WIN panel parameters are used in CONTROL-M/Agent by the
SetInformationJobObject API. For more information, see Microsoft
documentation for the SetInformationJobObject API.
Summary: This Microsoft Windows procedure enables you to determine job object
characteristics of any CONTROL-M job. You can use these
characteristics to decide what job object limits should be specified.
You can only view Job Object details for a job that is currently running.
Use the Order or Force option to run the job you want to evaluate.
Step 2 The Performance window (including its graph panel) is displayed. Click
the large + button.
3.B Choose All instances to display all existing job object instances.
or
Choose Select instances from list and select one or more of the
displayed instances.
3.C Choose Select counters from list. Then, select the characteristic
in the displayed list that you want to analyze.
The following table describes where to find information about tasks that
are related to this one.
Subject Location
Viewing a Job Object If you need to view other characteristics for the
same job object or view the characteristics of other
job objects, repeat Steps 3 and 4 of this procedure.
Setting Job Object limits Use the procedure on page 5-8 to specify values for
the parameters in the WIN tab of the Job Editing
form.
Defining additional You can create additional Microsoft Windows jobs
Microsoft Windows jobs by clicking the WIN tab of the Job Editing form. For
information about defining jobs, see Chapter 3 of
the CONTROL-M/Desktop User Guide.
Viewing jobs you have Click Cancel in the WIN tab the Job Editing form to
created or modified go to the Active environment to view the jobs you
have created or modified.
Configuration Parameters A
CONTROL-M/Agent Configuration
The CONTROL-M/Agent configuration parameters in Table A-1 can be
modified by using the ctmagcfg utility. For information about this utility,
see “ctmagcfg Utility” on page 4-8.
Parameter Description
Agent-to-Server CONTROL-M/Server and CONTROL-M/Agent communicate by means of two
Port Number TCP/IP ports. This parameter specifies the port in the Server computer that
receives data from the Agent computer.
• The value specified must match the value assigned to the Agent-to-Server Port
Number parameter on the Server computer.
• Verify that the specified port number is not used for any other purpose.
• Specify a numeric value from 1025 to 65535, inclusive. Default: 7005
Authorized Names of all CONTROL-M/Server hosts authorized to send requests to this
CONTROL-M/ Agent. The primary CONTROL-M/Server host must be included.
Server Hosts • Use the “|” symbol to separate host names.
• Do not include spaces between host names.
• Default: Name of the primary CONTROL-M/Server host.
Note: Specify names, not IP addresses.
Parameter Description
AutoEdit Inline Flag that indicates whether AutoEdit variables defined in a CONTROL-M job are
set as Environment variables in the user job environment. Valid values are:
Y = AutoEdit variables are set.
N = AutoEdit variables are not set. Default.
This parameter can only be changed after completing the installation.
Comm Trace Flag that indicates whether CONTROL-M/Agent – CONTROL-M/Server
communication packets are written to a file. Valid values: 1 (on), 0 (off).
Default: 0. If set to 1, log files are created for analysis by support staff.
Common Event Flag for specifying if all control modules, not just the default control module,
Mechanism should be able send messages to the Tracker process without waiting for the
tracker polling interval. Messages are sent using the port specified in the Tracker
Port parameter to inform the Tracker that a job ended. Valid values are:
Y = Use the Common Event Mechanism. Default.
N = Do not use the Common Event mechanism. Only the default control module
can send messages directly to the Tracker process.
Note: When CONTROL-M/Agent is upgraded from an earlier version, the default
is N for backward compatibility.
CTMS Address This flag enables you to handle situations in which the Agent can contact the
Mode Server by IP address but not by name. Valid values: null and IP. If set to IP, a
“track all” request from an authorized Server causes the value of the Primary
CONTROL-M/Server host configuration parameter to be set to the IP address of
the Server that sent the request.
Daily Log File Valid values: Y, N. Default: Y
Enabled If set to Y, a daily Log file with the name daily_PROCLOG_<YYYYMMDD>.log
is created in directory <CONTROL-M/Agent home>\DATA. Job begin, job end,
New Day procedure, and sysout copy messages are written to this log file.
Days to Retain Number of days to retain programmer debug, communication trace, and Daily log
Log Files files in the proclog directory. Default: 1
Diagnostic Flag that indicates whether to generate diagnostic messages. Valid values: 0–4
Level Level 0 generates no diagnostics. Level 4 generates maximum diagnostics. This
parameter is for systems support use and can only be changed after completing
the installation.
Primary Host computer for the CONTROL-M/Server that receives and executes requests
CONTROL-M/ from this Agent. Default: Computer on which the installation was made.
Server Host
Protocol version Server-Agent communication protocol version. Default: 06
Parameter Description
Listen to Net The network name or IP address for CONTROL-M/Agent for Microsoft Windows
Card 2000 support of multiple IP interfaces (network cards) for a single computer. Valid
values are:
• The network name or IP address of a specific card.
• The reserved value *ANY for all network cards.
This helps ensure that CONTROL-M/Agent will receive requests regardless of
which IP interface is used to send those requests.
Server-to-Agent CONTROL-M/Server and CONTROL-M/Agent communicate by means of two
Port Number TCP/IP ports. This parameter specifies the port in the Server computer that
sends data to the Agent computer.
• The value specified must match the value assigned to the Server-to-Agent Port
Number parameter on the Server computer.
• Verify that the specified port number is not used for any other purpose.
• Specify a numeric value from 1025 to 65535, inclusive. Default: 7006
SSL SSL support for CONTROL-M/Agent for Microsoft Windows. When SSL support
is implemented in CONTROL-M/Server it makes a one-time request to set this
parameter automatically for each associated Agent. This request requires 2 to 5
minutes for each Agent. Setting this parameter manually can save time if a large
number of Agents work with CONTROL-M/Server. For more information about
setting this parameter manually, see “ctmagcfg Utility” on page 4-8.
TCP/IP Timeout Communication timeout in seconds. Specify a numeric value greater than or
equal to zero. Default: 60
Timeout for Maximum time (in seconds) the Agent waits after sending a request to
Agent utilities CONTROL-M/Server. Default: 600
Tracker Time in seconds that the Tracker waits for a message from a running job before it
Polling Interval examines the status of all jobs for which no message was received. This
parameter can only be changed after completing the installation. Default: 60
Tracker Number of the port for sending messages to the Tracker process when jobs end.
Port This parameter is used in conjunction with the Common Event Mechanism
parameter.
Tracker Report Report the status of the job to CONTROL-M/Server. Use this parameter when
to Server CONTROL-M/Server is working behind a firewall. Valid values are:
• Y – Report the job status. If the Agent is not able to send this report, the job
remains in executing status.
• N – Do not report the job status. The job status changes to FINISHED when
the job has completed execution.
Parameter Description
Add Job Object Flag that indicates how to handle job object processing statistics.
Statistics to • Selected – Statistics are added to the end of the sysout file. Default.
Sysout • Not selected – Statistics are not added to the sysout file.
CD to user Indication if CONTROL-M/Agent should change the directory to the user home
'Home Dir' directory as defined in the user profile before the user job runs. Valid values:
• Y – The directory is changed.
• N – The directory is not changed.
Default Printer Default printer for job sysout files. Type a printer name in the field box or select a
name from the list box. Default: Blank
Domain Name of server managing access to resources and the database. Specify the
Controller name of the server in the field box. Default: Blank
E-mail User Password for the e-mail user account. This parameter can only be changed after
Password completing the installation.
E-mail User User e-mail account which the Agent uses to send e-mail. See the appropriate
Account Profile CONTROL-M/Server Administrator Guide for information about the Shout utility.
(MAPI profile) This parameter can only be changed after completing the installation.
Job children Flag that specifies if procedures invoked by a job can be run outside the Job
inside job object Object. If so, this prevents a situation in which the original job remains in
executing mode until the invoked procedure completes.
• N – All procedures invoked by the job are run outside the job object.
• Y – All procedures invoked by the job are run inside the job object. Default.
Logon As User Flag that specifies which user account is used for the services to log on to.
• Selected – Jobs are submitted with the permissions and environment
variables of the specified user.
• Not selected – Jobs are submitted with the permissions and environment
variables of the local system account. Default.
See “Determining the Owner of Jobs Run on the Agent” on page 2-6.
Logon Domain The domain is determined by the value of this parameter if <domain> is not
specified in <domain>\<username> in the owner parameter of the job definition.
If the domain is not specified in the owner parameter or this parameter, the user
profile is searched in the trusted domains.
Note: BMC recommends that you do not specify a value for Logon Domain.
Parameter Description
Run user Indication if a user-defined logon script should be run by the CONTROL-M/Agent
’Logon Script’ before running the standard user logon script. Valid values:
• Y – The user-defined logon script is run, if it exists.
• N – The user-defined logon script is not run.
Sysout Name Flag that determines the prefix for the Sysout file name. Valid values:
• MEMNAME – The Sysout file prefix is the MEMNAME of the job.
• JOBNAME – The Sysout file prefix is the JOBNAME of the job.
This parameter can only be changed after completing the installation.
Wrap Indication of how parameter values (%%PARMn....%%PARMx) are handled in by
parameters with CONTROL-M/Agent for Microsoft Windows.Valid values are:
double quotes 1 – If a parameter value contains a blank, it is passed to the operating system
enclosed in double quotes. If no blank is in the parameter value, no quotes are
included.
2 – Parameter values are always passed to the operating system without quotes.
If quotes were specified in the job definition, they are removed before the
parameter is passed onward by the agent. This option is compatible with the way
that these parameters were handled in version 6.0.0x, or 6.1.01 with Fix Pack 1,
2, 3, or 4 installed. In this case, if a parameter value contains a blank, the
operating system may consider each string as a separate parameter.
3 – All parameters are passed to the operating system enclosed in
double-quotes. This causes the operating system to treat all parameter values as
strings (not numbers). This option is compatible with the way that parameters
were handled by version 6.1.01 with no Fix Pack installed.
4 – Parameters are passed to the operating system in exactly the same way that
they were specified in the job definition. No quotes are added or removed in this
case. This option is compatible with the way that parameters were handled by
version 2.24.0x.
• Agent service
• Tracker service
• FileWatcher service
Table A-3 System Configuration for CONTROL-M/Agent Services
Parameter Description
Log on as User account under which CONTROL-M Agent and CONTROL-M Tracker
services will run.
Valid values: Local System Account, This Account.
• Local System Account – Service will log on as the system account.
Default. Subparameter:
Allow Service to Interact with Desktop – This option can be selected
only if the service is running as a local system account. See
“Maintaining CONTROL-M/Agent Services” on page 2-2.
Selected – the service provides a user interface on a desktop that
can be used by whoever is logged in when the service is started.
Default.
Unselected – The service does not provide a user interface.
• This Account – User account under which CONTROL-M Agent and
CONTROL-M Tracker services will run. See “Logon As User” on page A-4.
Note: If the owner of any CONTROL-M jobs has a “roaming profile” or if job
output (sysout) will be copied to or from other computers, the Logon mode
must be set to This Account.
Startup Type How to install CONTROL-M/Agent and CONTROL-M Tracker services. Valid
values: Automatic, Manual, Disabled. Recommended value: Automatic.
• Automatic – Services should start when the system starts. Default.
• Manual – User or a dependent service can start services.
• Disabled – User or a dependent service cannot start services.
Index
A C
Add Job Object Statistics to Sysout
Comm Trace
Control Module configuration parameter
Agent configuration parameter A-2
A-4
communication
Address Book
diagnostic report 2-24
e-mail destination 2-25
matching value 2-11
ag_diag_ comm utility
protocol 2-11
summary 4-5
verifying 2-23
ag_ping utility
configuration parameters 2-10, A-1, A-4
summary 4-5
Control Module
Agent Configuration window 2-10
configuration parameters A-4
Agent Data Directory
Control Module (CM) Name
Agent Configuration window 2-11
Agent Configuration window 2-11
Agent services
CONTROL-M/Agent
Startup Type parameter 2-5
BMC Software, Inc., Confidential and Proprietary Information
Index 1
configuration parameters A-1 summary 4-6
description 1-1 ctmstvar utility
functions 1-3 summary 4-6
starting 2-5 ctmudly utility
stopping 2-5 summary 4-6
CONTROL-M/Agent Service Properties ctmvar utility
dialog box 2-4 summary 4-6
CONTROL-M/EM ctmwincfg utility
client components 5-4 description 4-19
CONTROL-M/Server summary 4-6
communication protocol 2-11
Server-to-Agent port number 2-11
CONTROL-M/Servers List D
modifying 2-15
viewing 2-15 Default
ctmag utility CONTROL-M/Agent 1-6
summary 4-5 Default Printer
ctmagcfg utility Agent Configuration window 2-11
summary 4-5 Control Module configuration parameter
ctmcontb utility A-4
summary 4-5 defining
ctmcreate utility Windows 2000 jobs 5-1
summary 4-5 deleting
ctmdefine utility Diagnostics files 2-21
summary 4-5 Log files 2-19
CTMFW utility destination, e-mail 2-25
execution log file 4-16 Diagnostic Level
ctmfw utility setting 2-17
description 4-10 diagnostic report 2-24
summary 4-5 Diagnostics files
ctmgetcm utility 5-4 deleting 2-21
ctmkilljob utility viewing 2-20
summary 4-5 Diagnostics Level
ctmloadset utility Agent configuration parameter A-2
summary 4-6 Domain Controller
ctmorder utility Control Module configuration parameter
summary 4-6 A-4
ctmpwd utility DOS batch files
summary 4-6 scripts 3-1
ctmshout utility
Index 3
Log On tab
Service Properties dialog box 2-4
O
Logon As On code parameter scripts 3-2
Agent configuration parameter A-6 On statement parameter scripts 3-2
Logon As User Open File dialog box 2-20
Control Module configuration parameter OS panel
A-4 parameters 5-8
Logon Domain Windows 2000 jobs 5-8
Control Module configuration parameter output parameters 4-3
A-4
P
M
parameter scripts
mailbox field On code 3-2
Windows Messaging Component 2-25 On statement 3-2
Maintenance GUI parameters
functions 2-9 -agent 4-4
starting 2-10, 2-13, 2-15, 2-17, 2-18 CONTROL-M 2-13
matching values output 4-3
communication 2-11 Windows 2000 jobs 5-8
Max work set size parameter permission
Windows 2000 jobs 5-10 user rights 2-6
messages pinging 2-23
JO 5-8 port number
job object 5-8 Agent-to-Server 2-11
Microsoft Outlook Server-to-Agent 2-11
e-mail destinations 2-25 Primary CONTROL-M/ Server Host
Microsoft Windows Agent configuration parameter A-2
CONTROL-M parameters 2-13, 2-22 Primary CONTROL-M/Server Host
Min work set size parameter Agent Configuration window 2-11
Windows 2000 jobs 5-10 Priority class parameter
modifying Windows 2000 jobs 5-10
CONTROL-M/Servers List 2-15 Process execution time parameter
multiple agents Windows 2000 jobs 5-10
-agent parameter 4-4 Process memory parameter
description 1-5 Windows 2000 jobs 5-10
installing 1-6 PROCLOG retention period 2-21
Product Directory
Agent Configuration window 2-11
Index 5
U parameters 5-8
skeleton 5-2
UNC Windows Messaging Component
description 3-6 Shout to e-mail 2-25
user interface, graphical 2-9 windows.xml file 5-4
user rights workflow utility 4-1
CONTROL-M/Agent 2-6
description 2-6
setting 2-8
utilities
batch mode 4-3
ctmfw 4-16
directing output 4-3
output parameter 4-3
parameter formats 4-3
scripts 3-4
summary 4-5
workflow 4-1
V
verifying communication
server platform 2-23
viewing
CONTROL-M/Servers List 2-15
Diagnostics files 2-20
Log files 2-18
W
Western European language characters 2-26
Western European languages
special characters 2-26
WIN2K skeleton
Windows 2000 jobs 5-8
Windows 2000 jobs
creating 5-6
defining 5-1
This Agreement (“Agreement”) is between the entity or individual entering into this Agreement (“You”) and BMC Software Distribution,
Inc., a Delaware corporation located at 2101 CityWest Blvd., Houston, Texas, 77042, USA or its affiliated local licensing entity (“BMC”).
“You” includes you and your Affiliates. “Affiliate” is defined as an entity which controls, is controlled by or shares common control with a
party. IF MORE THAN ONE LICENSE AGREEMENT COULD APPLY TO THE PRODUCT, THE FOLLOWING ORDER OF LICENSE
AGREEMENT PRECEDENCE APPLIES: (1) WEB BASED LICENSE AGREEMENT WITH BMC, (2) WRITTEN LICENSE
AGREEMENT WITH BMC, (3) SHRINK-WRAP LICENSE AGREEMENT WITH BMC PROVIDED WITH THE PRODUCT, AND (4)THIS
ELECTRONIC LICENSE AGREEMENT WITH BMC. In addition to the restrictions imposed under this Agreement, any other usage
restrictions contained in the Product installation instructions or release notes shall apply to Your use of the Product.
PRODUCT AND CAPACITY. “Software” means the object code version of the computer programs provided, via delivery or electronic
transmission, to You. Software includes computer files, enhancements, maintenance modifications, upgrades, updates, bug fixes, and
error corrections.
“Documentation” means all written or graphical material provided by BMC in any medium, including any technical specifications,
relating to the functionality or operation of the Software.
“License Capacity” means the licensed capacity for the Software with the pricing and other license defining terms, including capacity
restrictions, such as tier limit, total allowed users, gigabyte limit, quantity of Software, and/or other capacity limitations regarding the
Software. For licenses based on the power of a computer, You agree to use BMC's current computer classification scheme, which is
available at http://www.bmc.com or can be provided to You upon request.
ACCEPTANCE. The Product is deemed accepted by You, on the date that You received the Product from BMC.
LICENSE. Subject to the terms of this Agreement, as well as Your payment of applicable fees, BMC grants You a non-exclusive,
non-transferable, perpetual (unless a term license is provided on an order) license for each copy of the Software, up to the License
Capacity, to do the following:
(a) install the Software on Your owned or leased hardware located at a facility owned or controlled by You in the country where You
acquired the license;
(b) operate the Software solely for processing Your own data in Your business operations; and
(c) make one copy of the Software for backup and archival purposes only (collectively a “License”).
If the Software is designed by BMC to permit you to modify such Software, then you agree to only use such modifications or new
software programs for Your internal purposes or otherwise consistent with the License. BMC grants You a license to use the
Documentation solely for Your internal use in Your operations.
LICENSE UPGRADES. You may expand the scope of the License Capacity only pursuant to a separate agreement with BMC for such
expanded usage and Your payment of applicable fees. There is no additional warranty period or free support period for license
upgrades.
(a) disassemble, reverse engineer, decompile or otherwise attempt to derive any Software from executable code;
(b) distribute or provide the Software to any third party (including without limitation, use in a service bureau, outsourcing environment,
or processing the data of third parties, or for rental, lease, or sublicense); or
(c) provide a third party with the results of any functional evaluation or benchmarking or performance tests, without BMC's prior written
approval, unless prohibited by local law.
TRIAL LICENSE. If, as part of the ordering process, the Product is provided on a trial basis, then these terms apply: (i) this license
consists solely of a non-exclusive, non-transferable evaluation license to operate the Software for the period of time specified from BMC
or, if not specified, a 30 day time period (“Trial Period”) only for evaluating whether You desire to acquire a capacity-based license to
the Product for a fee; and (ii) Your use of the Product is on an AS IS basis without any warranty, and BMC, ITS AFFILIATES AND
RESELLERS, AND LICENSORS DISCLAIM ANY AND ALL WARRANTIES (INCLUDING, WITHOUT LIMITATION, THE IMPLIED
WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT) AND HAVE NO
LIABILITY WHATSOEVER RESULTING FROM THE USE OF THIS PRODUCT UNDER THIS TRIAL LICENSE (“Trial License”).
BMC may terminate for its convenience a Trial License upon notice to You. When the Trial Period ends, Your right to use this Product
automatically expires. If You want to continue Your use of the Product beyond the Trial Period, contact BMC to acquire a
capacity-based license to the Product for a fee.
TERMINATION. This Agreement shall immediately terminate if You breach any of its terms. Upon termination, for any reason, You must
uninstall the Software, and either certify the destruction of the Product or return it to BMC.
OWNERSHIP OF THE PRODUCT. BMC or its Affiliates or licensors retain all right, title and interest to and in the BMC Product and all
intellectual property, informational, industrial property and proprietary rights therein. BMC neither grants nor otherwise transfers any
rights of ownership in the BMC Product to You. Products are protected by applicable copyright, trade secret, and industrial and
intellectual property laws. BMC reserves any rights not expressly granted to You herein.
CONFIDENTIAL AND PROPRIETARY INFORMATION. The Products are and contain valuable confidential information of BMC
(“Confidential Information”). Confidential Information means non-public technical and non-technical information relating to the
Products and Support, including, without limitation, trade secret and proprietary information, and the structure and organization of the
Software. You may not disclose the Confidential Information to third parties. You agree to use all reasonable efforts to prevent the
unauthorized use, copying, publication or dissemination of the Product.
WARRANTY. Except for a Trial License, BMC warrants that the Software will perform in substantial accordance with the Documentation
for a period of one year from the date of the order. This warranty shall not apply to any problems caused by software or hardware not
supplied by BMC or to any misuse of the Software.
EXCLUSIVE REMEDY. BMC’s entire liability, and Your exclusive remedy, for any defect in the Software during the warranty period or
breach of the warranty above shall be limited to the following: BMC shall use reasonable efforts to remedy defects covered by the
warranty or replace the defective Software within a reasonable period of time, or if BMC cannot remedy or replace such defective copy
of the Software, then BMC shall refund the amount paid by You for the License for that Software. BMC's obligations in this section are
conditioned upon Your providing BMC prompt access to the affected Software and full cooperation in resolving the claim.
DISCLAIMER. EXCEPT FOR THE EXPRESS WARRANTIES ABOVE, THE PRODUCT IS PROVIDED “AS IS.” BMC, ITS
AFFILIATES AND LICENSORS SPECIFICALLY DISCLAIM ALL OTHER WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE
IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. BMC
DOES NOT WARRANT THAT THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR FREE, OR THAT
ALL DEFECTS CAN BE CORRECTED.
DISCLAIMER OF DAMAGES. IN NO EVENT IS BMC, ITS AFFILIATES OR LICENSORS LIABLE FOR ANY SPECIAL, INDIRECT,
INCIDENTAL, PUNITIVE OR CONSEQUENTIAL DAMAGES RELATING TO OR ARISING OUT OF THIS AGREEMENT, SUPPORT,
AND/OR THE PRODUCT (INCLUDING, WITHOUT LIMITATION, LOST PROFITS, LOST COMPUTER USAGE TIME, AND DAMAGE
OR LOSS OF USE OF DATA), EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, AND IRRESPECTIVE OF ANY
NEGLIGENCE OF BMC OR WHETHER SUCH DAMAGES RESULT FROM A CLAIM ARISING UNDER TORT OR CONTRACT
LAW.
LIMITS ON LIABILITY. BMC’S AGGREGATE LIABILITY FOR DAMAGES IS LIMITED TO THE AMOUNT PAID BY YOU FOR THE
LICENSE TO THE PRODUCT.
SUPPORT. If Your order includes support for the Software, then BMC agrees to provide support (24 hours a day/7 days a week)
(“Support”). You will be automatically re-enrolled in Support on an annual basis unless BMC receives notice of termination from You
as provided below. There is a free support period during the one year warranty period.
(a) Support Terms. BMC agrees to make commercially reasonable efforts to provide the following Support: (i) For malfunctions of
supported versions of the Software, BMC provides bug fixes, patches or workarounds in order to cause that copy of the Software to
operate in substantial conformity with its then-current operating specifications; and (ii) BMC provides new releases or versions, so long
as such new releases or versions are furnished by BMC to all other enrolled Support customers without additional charge. BMC may
refuse to provide Support for any versions or releases of the Software other than the most recent version or release of such Software
made available by BMC. Either party may terminate Your enrollment in Support upon providing notice to the other at least 30 days prior
to the next applicable Support anniversary date. If You re-enroll in Support, BMC may charge You a reinstatement fee of 1.5 times what
You would have paid if You were enrolled in Support during that time period.
(b) Fees. The annual fee for Support is 20% of the Software’s list price less the applicable discount or a flat capacity based annual fee.
BMC may change its prices for the Software and/or Support upon at least 30 days notice prior to Your support anniversary date.
VERIFICATION. If requested by BMC, You agree to deliver to BMC periodic written reports, whether generated manually or
electronically, detailing Your use of the Software in accordance with this Agreement, including, without limitation, the License Capacity.
BMC may, at its expense, perform an audit, at your facilities, of Your use of the Software to confirm Your compliance with the
Agreement. If an audit reveals that You have underpaid fees, You agree to pay such underpaid fees. If the underpaid fees exceed 5% of
the fees paid, then You agree to also pay BMC’s reasonable costs of conducting the audit.
EXPORT CONTROLS. You agree not to import, export, re-export, or transfer, directly or indirectly, any part of the Product or any
underlying information or technology except in full compliance with all United States, foreign and other applicable laws and regulations.
GOVERNING LAW. This Agreement is governed by the substantive laws in force, without regard to conflict of laws principles: (a) in the
State of New York, if you acquired the License in the United States, Puerto Rico, or any country in Central or South America; (b) in the
Province of Ontario, if you acquired the License in Canada (subsections (a) and (b) collectively referred to as the “Americas Region”);
(c) in Singapore, if you acquired the License in Japan, South Korea, Peoples Republic of China, Special Administrative Region of Hong
Kong, Republic of China, Philippines, Indonesia, Malaysia, Singapore, India, Australia, New Zealand, or Thailand (collectively, “Asia
Pacific Region”); or (d) in the Netherlands, if you acquired the License in any other country not described above. The United Nations
Convention on Contracts for the International Sale of Goods is specifically disclaimed in its entirety.
ARBITRATION. ANY DISPUTE BETWEEN YOU AND BMC ARISING OUT OF THIS AGREEMENT OR THE BREACH OR
ALLEGED BREACH, SHALL BE DETERMINED BY BINDING ARBITRATION CONDUCTED IN ENGLISH. IF THE DISPUTE IS
INITIATED IN THE AMERICAS REGION, THE ARBITRATION SHALL BE HELD IN NEW YORK, U.S.A., UNDER THE CURRENT
COMMERCIAL OR INTERNATIONAL, AS APPLICABLE, RULES OF THE AMERICAN ARBITRATION ASSOCIATION. IF THE
DISPUTE IS INITIATED IN A COUNTRY IN THE ASIA PACIFIC REGION, THE ARBITRATION SHALL BE HELD IN SINGAPORE,
SINGAPORE UNDER THE CURRENT UNCITRAL ARBITRATION RULES. IF THE DISPUTE IS INITIATED IN A COUNTRY
OUTSIDE OF THE AMERICAS REGION OR ASIA PACIFIC REGION, THE ARBITRATION SHALL BE HELD IN AMSTERDAM,
NETHERLANDS UNDER THE CURRENT UNCITRAL ARBITRATION RULES. THE COSTS OF THE ARBITRATION SHALL BE
BORNE EQUALLY PENDING THE ARBITRATOR’S AWARD. THE AWARD RENDERED SHALL BE FINAL AND BINDING UPON
THE PARTIES AND SHALL NOT BE SUBJECT TO APPEAL TO ANY COURT, AND MAY BE ENFORCED IN ANY COURT OF
COMPETENT JURISDICTION. NOTHING IN THIS AGREEMENT SHALL BE DEEMED AS PREVENTING EITHER PARTY FROM
SEEKING INJUNCTIVE RELIEF FROM ANY COURT HAVING JURISDICTION OVER THE PARTIES AND THE SUBJECT MATTER
OF THE DISPUTE AS NECESSARY TO PROTECT EITHER PARTY’S CONFIDENTIAL INFORMATION, OWNERSHIP, OR ANY
OTHER PROPRIETARY RIGHTS. ALL ARBITRATION PROCEEDINGS SHALL BE CONDUCTED IN CONFIDENCE, AND THE
PARTY PREVAILING IN ARBITRATION SHALL BE ENTITLED TO RECOVER ITS REASONABLE ATTORNEYS’ FEES AND
NECESSARY COSTS INCURRED RELATED THERETO FROM THE OTHER PARTY.
U.S. GOVERNMENT RESTRICTED RIGHTS. The Software under this Agreement is “commercial computer software” as that term is
described in 48 C.F.R. 252.227-7014(a)(1). If acquired by or on behalf of a civilian agency, the U.S. Government acquires this
commercial computer software and/or commercial computer software documentation subject to the terms of this Agreement as
specified in 48 C.F.R. 12.212 (Computer Software) and 12.211 (Technical Data) of the Federal Acquisition Regulations (“FAR”) and its
successors. If acquired by or on behalf of any agency within the Department of Defense (“DOD”), the U.S. Government acquires this
commercial computer software and/or commercial computer software documentation subject to the terms of this Agreement as
specified in 48 C.F.R. 227.7202 of the DOD FAR Supplement and its successors.
MISCELLANEOUS TERMS. You agree to pay BMC all amounts owed no later than 30 days from the date of the applicable invoice,
unless otherwise provided on the order for the License to the Products. You will pay, or reimburse BMC, for taxes of any kind, including
sales, use, duty, tariffs, customs, withholding, property, value-added (VAT), and other similar federal, state or local taxes (other than
taxes based on BMC’s net income) imposed in connection with the Product and/or the Support. This Agreement constitutes the entire
agreement between You and BMC and supersedes any prior or contemporaneous negotiations or agreements, whether oral, written or
displayed electronically, concerning the Product and related subject matter. No modification or waiver of any provision hereof will be
effective unless made in a writing signed by both BMC and You. You may not assign or transfer this Agreement or a License to a third
party without BMC’s prior written consent. Should any provision of this Agreement be invalid or unenforceable, the remainder of the
provisions will remain in effect. The parties have agreed that this Agreement and the documents related thereto be drawn up in the
English language. Les parties exigent que la présente convention ainsi que les documents qui s’y rattachent soient rédigés en anglais.