KACE SMA 9.1 AdminGuide en-US PDF
KACE SMA 9.1 AdminGuide en-US PDF
KACE SMA 9.1 AdminGuide en-US PDF
Administrator Guide
Table of Contents
About the KACE Systems Management Appliance (SMA)...................................................................27
About KACE SMA components.....................................................................................................27
About the Administrator Console...................................................................................................28
Components available in Admin mode without the Organization component........................32
Components available in Admin mode with the Organization component enabled............... 35
Components available in System mode with the Organization component enabled............. 37
Using the Home component.................................................................................................. 39
About Dashboards..........................................................................................................39
View the Dashboard in Admin mode............................................................................. 39
View the Dashboard in System mode........................................................................... 40
Customize Dashboard pages.........................................................................................41
About Dashboard widgets.............................................................................................. 42
View Dashboard details................................................................................................. 49
View task schedules.......................................................................................................50
View the KACE SMA version, model, and license information...................................... 51
View KACE SMA license information............................................................................ 52
About appliance software updates.................................................................................53
About labels....................................................................................................................53
Searching for information and filtering lists........................................................................... 54
Search at the Admin level..............................................................................................54
Search at the page level................................................................................................55
Searching at the page level with advanced options...................................................... 55
Create Custom Views using Advanced Search criteria................................................. 58
Access product documentation...................................................................................... 58
Log in to the Administrator Console: First login following initial network configuration.......... 61
Getting started....................................................................................................................................... 63
Configuring the appliance..............................................................................................................63
Requirements and specifications........................................................................................... 63
Power-on the appliance and log in to the Administrator Console..........................................63
Access the Command Line Console..................................................................................... 66
Tracking configuration changes............................................................................................. 66
Configuring System-level and Admin-level General Settings................................................ 67
Configure appliance General Settings with the Organization component enabled........ 67
Configure Admin-level or organization-specific General Settings.................................. 72
Configure appliance General Settings without the Organization component.................77
Configure appliance date and time settings.......................................................................... 82
Component Description
Virtual appliance The KACE SMA is available as a virtual appliance that uses a VMware®
or Microsoft® Hyper-V® infrastructure. For the latest information about
requirements for managed devices, and browser requirements for
accessing the Administrator Console, see the technical specifications:
• For virtual appliances: Go to https://support.quest.com/technical-
documents/kace-systems-management-appliance/8.1-common-
documents/technical-specifications-for-virtual-appliances/.
• For KACE as a Service: Go to https://support.quest.com/technical-
documents/kace-systems-management-appliance/8.1-common-
documents/technical-specifications-for-kace-as-a-service/.
Command Line Console The Command Line Console is a terminal window interface to the KACE
SMA. The interface is designed primarily to configure the appliance
and enforce policies. See Power-on the appliance and log in to the
Administrator Console.
User Console The User Console is the web-based interface that makes applications
available to users on a self-service basis. It also enables users to file
Service Desk support tickets to request help or report issues. To access
KACE SMA Agent The KACE SMA Agent is an application that can be installed on devices
to enable device management through the KACE SMA. Agents that are
installed on managed devices communicate with the KACE SMA through
AMP (Agent Messaging Protocol). Agents perform scheduled tasks, such
as collecting inventory information from, and distributing software to,
managed devices. Agentless management is available for devices that
cannot have Agent software installed, such as printers and devices with
operating systems that are not supported by the Agent.
See Provisioning the KACE SMA Agent.
NOTE: Your license key determines whether the Organization component is enabled or disabled. See
View KACE SMA license information and About organizations.
• Detail pages. These pages enable you to view and edit details of the selected item.
About Dashboards
Dashboards provide overviews of organization or appliance activity. They also provide alerts and links to news
and Knowledge Base articles.
If the Organization component is enabled on the appliance, and you are logged in to the Administrator Console
(http://KACE_SMA_hostname/admin), the Dashboard shows information for the selected organization.
When you are logged in to the System Administration Console (http://KACE_SMA_hostname/system), the
Dashboard shows information for the appliance, including all organizations.
TIP: The appliance updates the summary widgets periodically. To update all of the widgets any time, click
the Refresh button in the upper right of the page: . To update individual widgets, hover over the widget,
then click the Refresh button above the widget.
Widget Description
General widgets This section provides a high-level overview of your appliance activity. The information
appearing in these widgets allows you to focus on specific indicators that can help
you understand any potential issues.
Latest News These widgets provide links to news and information from Quest. News articles are
Articles and Top displayed according to date or importance. Knowledge Base articles are displayed
Knowledge Base according to their priority in the Technical Support system.
Articles
Connections This widget shows the number of connections to the KACE SMA web server. A high
number indicates a high load on the server, which might reduce appliance response
time. If the Organization component is enabled on your appliance, the widget shows
the information for the selected organization.
File This widget shows the number of File Synchronizations that are in progress on Agent-
Synchronizations managed devices. If the Organization component is enabled on your appliance, the
widget shows the information for the selected organization.
Managed This widget shows the number of Managed Installations that are in progress
Installations on Agent-managed devices. If the Organization component is enabled on your
appliance, the widget shows the information for the selected organization.
Current Scripts This widget shows the number of scripts that are enabled to run on Agent-managed
devices. If the Organization component is enabled on your appliance, the widget
shows the information for the selected organization.
Patch Installation This widget shows the progress of patching tasks that are running on managed
Progress devices. If the Organization component is enabled on your appliance, the widget
shows the information for the selected organization.
Patching Tasks This widget shows the progress of patching tasks, such as detect, deploy, and
Completed rollback tasks, on managed devices. If the Organization component is enabled on
your appliance, the widget shows the information for the selected organization.
Critical Patch This widget shows the deployment progress of patches that are marked as critical.
Compliance If the Organization component is enabled on your appliance, the widget shows the
information for the selected organization.
License If you have created License assets for software, this widget shows the number of
Compliance Agent-managed devices that have a particular licensed software installed, and the
number of licenses available. If the Organization component is enabled on your
appliance, the widget shows the information for the selected organization.
License assets can be created for applications listed on the Software page and the
Software Catalog page, and the license mode for applications must be Unit License
or Enterprise for license information to appear on this widget. Applications with other
license modes, such as Shareware, Freeware, or Not Specified, are not displayed on
this widget.
This widget is for information only, and the KACE SMA does not enforce license
compliance. For example, the appliance does not prevent software from being
installed on Agent-managed devices if a license is expired or otherwise out of
compliance.
The following colors indicate threshold levels:
• Red: Usage is at or above the critical threshold setting.
• Orange: Usage is at or above the warning threshold setting but below the
critical threshold setting.
• Green: Usage is below the warning threshold setting.
To change the threshold levels, see Configure appliance General Settings without the
Organization component.
For information about managing License assets, see Managing inventory.
Provisioning This widget shows the status of KACE SMA Agent provisioning or installation tasks.
If the Organization component is enabled on your appliance, the widget shows the
information for the selected organization.
Provision Platforms This widget shows the percentage of operating systems installed on KACE SMA
Agent-managed devices. If the Organization component is enabled on your
appliance, the widget shows the information for the selected organization.
Tasks in Progress This widget displays the number of tasks in progress on the KACE SMA. This
number includes tasks related to scripting, inventory, metering, replication, patching,
bootstrapping, and cache queries. You can view the load average on the appliance,
and change the task throughput, as needed. See Configure Agent communication
and log settings.
If the Organization component is enabled on your appliance, the widget is available
on the System Dashboard page.
SCAP Summary This widget provides information about SCAP scans that have been performed on
devices. If the Organization component is enabled on your appliance, the widget
shows the information for the selected organization.
Device Check-In This widget displays the number of devices that have connected to the KACE SMA in
Rate the past 60 minutes. If the Organization component is enabled on your appliance, this
widget is available at the System level.
Software License If you set up License assets for software, and specify the license type, such as site,
Configuration subscription, or unit, that information is displayed in this widget. If the Organization
component is enabled on your appliance, the widget shows the information for the
selected organization.
Disk Capacity This widget displays the amount of disk space that is free or in use on the appliance.
If the Organization component is enabled on your appliance, this widget is available
at the System level.
Software This widget displays the publishers defined in the Software Catalog, with the
Publishers highest number of software titles installed on managed devices. If the Organization
component is enabled on your appliance, the widget shows the information for the
selected organization.
Software Titles This widget displays the software titles defined in the Software Catalog, with the
highest number of installations on managed devices. If the Organization component
is enabled on your appliance, the widget shows the information for the selected
organization.
Expiring Dell This widget displays information on any Dell Warranties, and links to the Reports list
Warranties page for Dell Warranty reports.
If the Organization component is enabled on your appliance, the widget shows the
information for the selected organization.
Dell Updates This widget displays the number of Dell applications, BIOSs, and firmware updates
that can be applied to managed devices. The updates are categorized as urgent,
recommended, or optional depending on the urgency of the update. After a Dell
Update schedule is created, data appears in the widget. See Create Dell Update
schedules.
If the Organization component is enabled on your appliance, the widget shows the
information for the selected organization.
Monitoring Alert This widget displays the number of unacknowledged alerts, grouped by alert level.
Summary The following icons indicate alert level:
• : Critical
• : Error
•
: Warning
•
: Information
•
: Recovered
If the Organization component is enabled on your appliance, the widget shows the
information for the selected organization.
Low-resource alerts.When the appliance resources are low, Critical alerts appear
on the Dashboard, providing the recommended course of action such as contacting
Support. These alerts are generated when the appliance is detected to use a high
Monitored Devices This widget displays the status of the devices for which monitoring has been enabled.
If the Organization component is enabled on your appliance, the widget shows the
information for the selected organization.
Monitoring Alerts This widget displays the alert messages for the devices being monitored. If the
Organization component is enabled on your appliance, the widget shows the
information for the selected organization.
Service Desk This section provides a high-level overview of your Service Desk ticket performance.
widgets Use it to quickly review the state of your tickets and look for any indicators that can
improve your customer experience. For example, you can review the numbers of
overdue tickets and focus on specific issues, as needed.
NOTE: Service Desk widgets display data for the default queue associated
with the logged-in user. If there is no default set for the user, or if All Queues is
set as the default, the widgets display data from all the queues owned by the
user.
NOTE: If the user does not own any queues, or if their default queue is no
longer valid, the widgets do not display any data.
Shortcuts This widget contains links to common Service Desk actions. Use them to quickly
initiate specific tasks, such as creating a new KB (Knowledge Base) article,
scheduling a report, and so on.
Views This widget contains links to common Service Desk pages and wizards, including
any custom views that you created. Use them to quickly navigate to specific pages,
such as My Recent Tickets, All Unassigned Tickets, and Tickets Due Today. It
also displays link to custom views, as applicable. The list of custom views is sorted
alphabetically. If you want the custom views to appear in a specific order, you can
prefix their names with numbers, as needed.
Reports This widget contains links to common Service Desk reports. Use them to quickly
generate a specific report, such as Open Tickets last 7 days by Owner, Stalled/Open
Tickets by Owner, and others.
Tickets Opened This widget contains the number of Service Desk tickets that were opened today.
Today
Active Tickets By These widgets display the numbers of active, closed, overdue, overdue today,
Owner due, due today, or reopened Service Desk tickets grouped by any of the following
parameters:
Active Tickets By • Category
Category
• Priority
Active Tickets By • Owner
Priority
• Queue
Overdue Tickets By
Owner
Overdue Tickets
Today
Reopened Tickets
Average Ticket This widget displays the average ticket resolution times by any of the following
Resolution Time categories:
• Category
• Priority
• Owner
• Queue
• Month
The resulting data can appear in a Bar Chart or a Donut Chart.
To change the widget title, choose how you want to group the tickets, or select the
chart type, click in the widget. In the dialog box that appears, make your edits and
click Save.
Tickets Overdue This widget displays the number of Service Desk tickets that are currently overdue.
Device widgets This section provides a high-level overview of your managed devices. Use it to
quickly review the state of your devices and look for any indicators that can improve
their performance. For example, you can review the percentages of available disk
space, and focus on specific issues, as needed.
Devices By This widget shows a bar chart, where each bar represents a number of devices that
Memory have an indicated amount of RAM installed on them.
Devices By This widget shows a bar chart, where each bar represents a number of devices that
Processor have a specific processor configuration.
Devices by Disk This widget shows a donut chart, where each section of the chart indicates the
Capacity percentage of free disk space on the managed devices. Clicking the widget title
displays a report with links to the associated devices. Hovering over each section
of the chart displays the percentage of managed devices that have the selected
percentage of free disk space. For example, if you hover over the red part of the
chart, the widget displays the percentage of devices whose free disk space is lower
than 25%.
Managed Operating This widget shows the percentage of managed devices that are running each
Systems operating system. If the Organization component is enabled on your appliance, this
widget shows the percentage of devices in the selected organization.
Devices By This widget shows the top device manufacturers represented in device inventory.
Manufacturer If the Organization component is enabled on your appliance, this widget shows the
percentage of devices in the selected organization.
Devices By Model This widget shows the top device models represented in KACE SMA device
inventory. If the Organization component is enabled on your appliance, this widget
shows the percentage of devices in the selected organization.
Devices By This widget shows a donut chart, where each section of the chart indicates the
Subtype percentage of the managed devices by device subtype.
Asset This section provides a high-level overview of your asset usage. Use it to quickly
Management review the state of your assets and look for any indicators that can improve your
widgets asset configuration. For example, you can focus on how your software licenses are
used and identify which software titles need to have their license renewed.
Assets By Type This widget shows a donut chart, where each section of the chart indicates the
percentage of your assets by their asset type, such as device, software, location,
license, and others. Hovering over each section of the chart displays the percentage
of the assets of the selected type.
Assets By Status This widget shows a donut chart, where each section of the chart indicates the
percentage of your assets by their status, such as Active, Disposed, Missing, or
other. Hovering over each section of the chart displays the percentage of the assets
in the selected status.
Cost ($) of Unused This widget shows a bar chart, where each bar represents the cost of unused
Licenses By licenses for each product. You can use this information to reassign or cancel unused
Product licenses, and to redirect your resource where they are most needed.
License If you have created License assets for software, this widget shows the number of
Compliance Agent-managed devices that have a particular licensed software installed, and the
number of licenses available. If the Organization component is enabled on your
appliance, the widget shows the information for the selected organization.
License assets can be created for applications listed on the Software page and the
Software Catalog page, and the license mode for applications must be Unit License
or Enterprise for license information to appear on this widget. Applications with other
Software Titles This widget displays the software titles defined in the Software Catalog, with the
highest number of installations on managed devices. If the Organization component
is enabled on your appliance, the widget shows the information for the selected
organization.
Software This widget displays the publishers defined in the Software Catalog, with the
Publishers highest number of software titles installed on managed devices. If the Organization
component is enabled on your appliance, the widget shows the information for the
selected organization.
Assets by Location This widget shows a donut chart, where each section of the chart indicates the
percentage of your assets by their location. Hovering over each section of the chart
displays the percentage of the assets in the selected location.
Software Installed This widget shows a bar chart, where each bar represents a software title and the
But Not Used in 60 corresponding number of instances of that product that have not been in use in the
Days last 60 days. You can use this information to further investigate whether these titles
are needed, to reassign or uninstall unused software, and to redirect your resource
where they are most needed.
Expiring This widget shows a vertical bar chart, where each bar represents the number of
Software License software licenses that are about expire in the given time period.
Maintenance
Expired Software This widget shows a donut chart representing the ration of expired and current
License licenses. Hovering over each section of the chart displays the percentage of the
Maintenance software licenses that are either expired or current, as selected.
Expiring Contracts This widget shows a vertical bar chart, where each bar represents the number of
contracts that are about expire in the given time period.
Expired Contracts This widget shows a donut chart representing the ration of expired and current
contracts. Hovering over each section of the chart displays the percentage of the
contracts that are either expired or current, as selected.
Software License If you set up License assets for software, and specify the license type, such as site,
Configuration subscription, or unit, that information is displayed in this widget. If the Organization
component is enabled on your appliance, the widget shows the information for the
selected organization.
Alerts Information about license capacity and usage for managed devices in inventory.
Devices Information about managed devices, including a breakdown of the operating systems
in use.
In addition, if the number of managed devices exceeds the number allowed by your
license key, you are notified of it here.
Software A summary of the applications that are available in inventory on the appliance. This
includes applications listed on the Software page and the Software Catalog page.
Distributions The applications that have been distributed to managed devices, separated by
distribution method. This section also indicates the number of packages that are
enabled and disabled.
Monitoring Alerts The number of unacknowledged alerts for monitored devices, grouped by alert level.
Summary
Alert Summary The alerts that have been distributed to managed devices, separated by the alert
type. This summary also indicates the number of alerts that are active and expired.
The IT Advisory refers to the number of Knowledge Base articles in User Console.
Patches The patches received from software vendors such as Microsoft® and Apple. The
summary includes the date and time of the last patch (successful and attempted),
total patches, and total packages downloaded.
OVAL Information about the Open Vulnerability Assessment Language (OVAL), a battery
of tests that can be run to identify security vulnerabilities on managed devices. OVAL
information includes:
• The definitions received
• The date and time of the last OVAL download (attempted and successful)
• The number of OVAL tests in the appliance
• The number of devices scanned
• The number of vulnerabilities detected on managed devices
Discovery The results of Discovery scans that have run on the network, including the number of
(Network Scan) IP addresses scanned, the number of services discovered, and the number of scans
that have been performed.
NOTE: When this page is refreshed, the record count is updated. New KACE SMA installations
contain zero records.
For more information about OVAL, see Maintaining device and appliance security.
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
◦ Live Chat ( ): Starts a chat with a KACE System Management Appliance product specialist.
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
◦ Support ( ): Links to the Settings > Support page. This page provides resources for troubleshooting
system management issues and contacting Quest Support.
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
◦ KACE GO Mobile App ( ): Displays a dialog containing links for downloading the KACE GO Mobile
App. The app is available for iOS and Android platforms.
◦ About KACE SMA ( ): Displays information about your KACE System Management Appliance
installation.
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
3. Click the About KACE SMA link located at the bottom-right corner of the panel.
The KACE SMA license information is displayed.
◦ The appliance version, model, and serial numbers.
◦ The license expiration date, in month/day/year format.
◦ The number of Managed Computers, Monitored Servers, and Assets that your license entitles you to
manage.
Managed Computers are devices in KACE SMA inventory that 1) have Windows, Mac, Linux, or
UNIX operating systems, 2) are categorized as PCs or servers, and 3) were not added to inventory
manually, through the WSAPI, or through mobile device management.
Monitored Servers are servers that 1) meet the requirements for Managed Computers and 2) have
Monitoring enabled.
Assets that count toward your license limit include devices that 1) have been added to the KACE SMA
inventory but do not meet the definition of Managed Computers or Monitored Servers and 2) were
not added to inventory manually, through the WSAPI, or through mobile management. Examples of
Assets include printers, projectors, network gear, and storage devices. The assets you create and
manage using the Asset Management component do not count toward the license limit.
NOTE: Your KACE SMA license agreement entitles you to manage a specified number of
devices. Be aware that devices count toward these limits even if devices are MIA (missing in
action) or no longer in use. However, devices that are added to inventory manually, or through
the API, do not count toward license limits. For more information, see https://quest.com/docs/
Product_Guide.pdf.
NOTE: To increase your license capacity, go to the Quest website: https://quest.com/buy.
NOTE: Your KACE SMA license agreement entitles you to manage a specified number of
devices. Be aware that devices count toward these limits even if devices are MIA (missing in
action) or no longer in use. However, devices that are added to inventory manually, or through
the API, do not count toward license limits. For more information, see http://quest.com/docs/
Product_Guide.pdf.
NOTE: To increase your license capacity, go to the Quest website: https://quest.com/buy.
Related topics
Upload an update file to the appliance manually.
About labels
Labels are containers that enable you to organize and categorize items, such as devices, so that you can manage
them as a group.
For example, you can use labels to identify devices that have the same operating system or that are in the same
geographic location. You can then initiate actions, such as distributing software or deploying patches, on all of
the devices with that label. Labels can either be manually assigned to specific items or automatically assigned to
items when they are associated with criteria, such as SQL or LDAP queries.
You can add labels from the Labels section as well as from other sections of the Administrator Console where
labels are used, such as the Devices page.
The following labels are available:
• Labels: Labels that are applied manually and used to organize users, devices, software, Managed
Installations, and more. See Managing manual labels.
• Smart Labels: Labels that are applied and removed automatically based on criteria you specify. For
example, to track laptops in a specific office, you could use a label called “San Francisco Office,” and add
KACE Systems Management Appliance 9.1 Administrator Guide
53
About labels
a Smart Label based on the IP address range or subnet for devices located in the San Francisco office.
Whenever a device that falls within the IP address range is inventoried, the Smart Label “San Francisco” is
automatically applied. When the device leaves the IP address range, and is inventoried again, the label is
automatically removed. See Managing Smart Labels.
• LDAP Labels: Labels that are applied to and removed from users and devices automatically based on
LDAP or Active Directory® queries. See Managing LDAP Labels.
Related topics
Managing Smart Labels
Managing LDAP Labels
• Click Home > Search. Then type at least four characters in the Search field that appears above the
list on the right, and press Enter or Return. The following illustration shows this Search field:
TIP: Use the percent sign (%) as a wildcard. For example, you can use the percent sign in a search string
to find all items that match the criteria before and after the percent sign.
TIP: Use the percent sign (%) as a wildcard. For example, you can use the percent sign in a search string
to find all items that match the criteria before and after the percent sign.
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
NOTE: Press Enter or Return after you enter a new Smart Label name to move the text from the
search field to the label field.
6. Click Create.
Smart Labels are applied as follows:
◦ Smart Labels are automatically applied to or removed from devices when devices check in to the
appliance, based on whether the devices meet the specified criteria.
◦ If a specific application Smart Label is edited using Home > Labels > Smart Labels, it is applied to or
removed from all applications immediately.
◦ Smart Labels are automatically applied to or removed from applications when the items are updated
on the Inventory > Software page, based on whether the items meet the specified criteria.
7. Click the Notification tab above the list on the right.
Title The information that you want to appear in the Subject line of the email.
Recipient The email address or addresses of intended recipients. Email addresses must be fully
qualified email addresses. To send email to multiple addresses, use commas to separate
each address, or use email distribution lists.
Frequency The interval at which the appliance runs the query to compare the selected criteria with
items in inventory. If criteria are met, the notification is sent.
6. Optional: Click Test to refresh the list to show items that match the specified criteria.
7. In the View Name field, type a name for the Custom View, then click Create.
The Custom View appears in the View By drop-down list.
Related topics
Example: Search for managed devices using Advanced Search criteria
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
◦ Live Chat ( ): Starts a chat with a KACE System Management Appliance product specialist.
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
◦ Support ( ): Links to the Settings > Support page. This page provides resources for troubleshooting
system management issues and contacting Quest Support.
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
◦ KACE GO Mobile App ( ): Displays a dialog containing links for downloading the KACE GO Mobile
App. The app is available for iOS and Android platforms.
NOTE: This option is available if the appliance is configured to interact with the K1 GO Mobile
App. It only appears in the Administrator Console and the System Console. It does not appear
in the User Console For more information on enabling mobile access, see Configuring Mobile
Device Access.
◦ About KACE SMA ( ): Displays information about your KACE System Management Appliance
installation.
NOTE: This option is only available in the Administrator Console and the System Console. It does
not appear in the User Console.
3. Click a link in the page-level Help topic.
The main Help system appears, displaying the selected topic.
4. Click the Search tab in the left pane of the Help system.
All search terms use an implicit Boolean AND statement. For example, if you search for Windows
provisioning, Search displays results that contain both words.
TIP: For a PDF version of the Help system, click the Acrobat button on the right side of the main
Help system navigation bar ( ).
5. Administrator or System Console only. Search for Knowledge Base articles associated with the related
Administrator Console or the System Console page.
a. At the bottom of the help pane, click .
The help pane displays a list of related Knowledge Base articles.
IMPORTANT: To see the article contents, you must log in to the Quest Support site using your
Quest user name and password.
6. Administrator or System Console only. Chat with a product specialist.
a. Click .
The Chat with Support dialog box appears.
b. Type your Full Name, Email Address, and Purpose of your Chat, as applicable, and click Start
Chat.
The Chat with Support dialog box refreshes, showing a list of existing Knowledge Base (KB)
articles that may contain information about the specified topic. The list of topics may appear on
multiple pages, depending on the type of the requested information.
c. Review the list of KB articles. Use the page navigation controls at the bottom of the list, if
applicable. To read a KB article, click the title in the list.
d. If none of the listed KB articles provide the information you need, click None of the solutions
above solved my issue, continue with chat.
NOTE: You can only use this feature when product specialists are available to respond to your
questions. If Live Chat is not available, this is indicated in the dialog box.
The LIVE CHAT dialog box appears. The Full Name, Email Address, Product and Purpose of
your Chat boxes are populated using the information specified in the Chat with Support dialog
box.
e. Click Start Chat.
The LIVE CHAT dialog box refreshes.
f. In the LIVE CHAT dialog box, type your question, and click SEND to start chatting with a product
specialist.
7. Administrator or System Console only. Open a Support ticket.
a. Click .
Your browser displays the Submit a Service Request page (https://support.quest.com/create-
service-request) in a new tab or window.
b. Use this page to open a service ticket, as required.
8. Administrator or System Console only. Click .
The Settings > Support page appears. This page provides resources for troubleshooting system
management issues and contacting Quest Support.
9. Administrator or System Console only, when mobile access is enabled on the appliance.
NOTE: For more information on enabling mobile access, see Configuring Mobile Device Access.
a. Click .
A dialog box appears, allowing you to download KACE GO. The app is available for iOS and
Android platforms from their respective app stores.
b. Click the link for your mobile device OS, as needed, to download the app.
NOTE: Your browser setting determines the language displayed in the Administrator Console the first time
you log in. To change this setting after you log in, see Configuring locale settings.
1. Open a web browser and enter the Administrator Console URL:
http://KACE_SMA_hostname/admin. For example, http://kace_sma/admin.
2. Provide the following information:
Option Description
License Key Enter the license key you received in the Welcome email from Quest. Include the dashes. If
you do not have a license key, contact Quest Support at https://support.quest.com/contact-
support.
Password Enter a password for the default admin account, which is the account you use to log in to
the appliance Administrator Console. The default admin account is the only account on the
appliance at this time. If you forget the password for this account, the system might have to
be reset to factory defaults which can result in loss of data.
NOTE: If you have multiple KACE SMA or SDA appliances, Quest recommends
that you use the same password for the admin account on all appliances. Using a
common password enables you to link the appliances later.
Enable Quest Enable Quest to send security notifications to the email address of this administrator.
Security This feature is available only to System-level administrator accounts. It is not available to
Notifications Admin-level administrator accounts, or non-administrator user accounts.
Enable Quest Enable Quest to send sales and marketing notifications to the email address of this
Sales and administrator. This feature is available only to System-level administrator accounts; it is not
Marketing available to Admin-level administrator accounts, or non-administrator user accounts.
Notifications
The Administrator Console appears and the appliance is ready for use.
NOTE: To run Device Actions, you must have the Administrator Console open in Internet Explorer®,
because ActiveX® is required to launch these programs on the local device. Other browsers do not support
ActiveX.
NOTE: For information about logging in to KACE as a Service, see the KACE as a Service Setup Guide.
Go to https://support.quest.com/kace-systems-management-appliance/release-notes-guides.
1. If you are configuring the physical version of the appliance:
a. Install the appliance in its rack and connect a monitor directly to the appliance.
b. Connect a network cable to the port indicated:
License Key The license key you received in the Welcome email
from Quest. Include the dashes. If you do not have
a license key, contact Quest Support at https://
support.quest.com/contact-support.
Related topics
About history settings
Default Locale Select the language to use in the Command Line Console, which uses the konfig
user account.
Company Email Enter the domain from which your users send email. For example: quest.com.
Suffix
Appliance Enter the email address of the appliance administrator. System-related messages,
Administrator including critical alerts, are sent to this address.
Email
Session Timeout Set the number of inactive hours to allow before closing user sessions and requiring
users to log in again. The default is 1. The User Console and Administrator Console
have Timeout Session counters to alert users of this time limit. Only periods of
inactivity are counted. The counter restarts when the user performs any action
that causes the console to interact with the appliance server, such as refreshing a
window, saving changes, and changing windows. When the counter reaches the limit,
Enable mobile Enable or disable Mobile Device Access to the appliance. Mobile device access
device access enables you to interact with the KACE SMA using the KACE GO app on iOS and
Android smart phones and tablets. Administrators can use the app to access Service
Desk, inventory, and application deployment features. See Configuring Mobile Device
Access.
Require Display the Organization drop-down list on the Administrator Console login
organization page, http://KACE_SMA_hostname/admin, where KACE_SMA_hostname
selection at login is the hostname of your appliance. This enables you to choose an organization
when you log in. If this option is disabled, the Organization drop-down list is not
displayed on the login page, and you can only log in to the Default organization from
http://KACE_SMA_hostname/admin. If organization fast switching is enabled,
however, you can switch between organizations after you log in to the Default
organization.
Show Display the fast-switching drop-down list in the top-right corner of the Administrator
organization Console next to the login information. This drop-down list makes it possible to bypass
menu in admin the login page when you switch from one organization to another. To appear in
header the drop-down list, organizations must have the same admin account password;
only those organizations whose admin account passwords match appear in the list.
Changes to the drop-down list are displayed only after you log out and then log in
again.
Enable linked Select to allow the generation of reports from Federated (linked) KACE SMAs.
reporting
3. In the Agent section, view or configure KACE SMA Agent task throughput:
Option Description
Last Task This value indicates the date and time when the appliance task throughput was last
Throughput updated.
Update
Current Load The value in this field depicts the load on an appliance at any given point of time. For
Average the appliance to run normally, the value in this field must be between 0.0 and 10.0.
Task Throughput The value that controls how scheduled tasks, such as inventory collection, scripting,
and patching updates, are balanced by the appliance.
NOTE: This value can be increased only if the value in the Current Load
Average is not more than 10.0, and the Last Task Throughput Update time is
more than 15 minutes.
Title The heading that appears on the User Console login page.
Welcome Message A welcome note or description of the User Console. This text appears below the title
on the User Console login page.
Enabled Enable the appliance to display your policy, and require users to accept the terms
of your policy, when they access the Administrator Console, User Console, or
Command Line Console, or log in using SSH or FTP.
Title The heading of the policy to be displayed on the login page of the User Console.
Message Details of the policy, which are displayed below the Title on the login page. Users
must agree to the terms of the policy before they can log in to the User Console.
6. In the Reporting section, specify the password for the reporting system:
Option Description
Username (Read-only) The username used to generate reports. The report username provides
access to the database (for additional reporting tools), but does not give write access
to anyone.
User Password The report user password. This password is used only by the reporting system and
MySQL™.
7. In the Log Retention section, select the number of days to retain log information. Log entries that are older
than the selected number of days are automatically deleted from the log. See View appliance logs.
8. In the Share with Us section, select data sharing options:
To validate the KACE SMA product license, Quest collects minimal license-related information, such as the
MAC Address of the KACE SMA, the version of the KACE SMA software, the license key, and the number
of managed devices, regardless of the data sharing options selected in this section.
Option Description
Share summary (Recommended) Share summary information with Quest. This information includes
usage data... appliance status, uptime, and load averages, as well as the number of devices,
Managed Installations, and applications being managed by the appliance. This option
is recommended because it provides additional information to Quest Support if you
need assistance. In addition, data shared with Quest is used when planning product
enhancements.
Share detailed (Recommended) Share detailed information with Quest and share anonymous
usage data... information with ITNinja.com. This information includes Agent and appliance crash
reports, user interface usage statistics, and inventory information, such as application
titles. Quest uses this information to help improve the Software Catalog, and ITNinja
uses anonymous data to identify relevant content on http://www.itninja.com for
dynamic feeds to the KACE SMA Administrator Console.
ITNinja.com is a community website where IT professionals can share information
and research on a wide variety of systems management and deployment topics. The
ITNinja feed is a feature that dynamically displays software deployment tips and other
contextual information on relevant pages in the KACE SMA Administrator Console.
To enable the ITNinja feed, you need to select Share detailed Usage data.... This
setting shares information anonymously with ITNinja. The ITNinja feed is available
only if Share Summary Usage Data... is selected, and it is available only on pages
related to software or deployment, such as the software, Managed Installation, and
File Synchronization detail pages. The feed is not available on the Software Catalog
detail page.
Clear this option to prevent the appliance from sharing inventory data with the ITNinja
community. However, clearing this option does not remove any information that has
already been shared. For more information, contact Quest Support.
9. To use a custom logo in the User Console, select images in the Logo Overrides section. Click Browse or
Choose File to select the logo file.
NOTE: You can change the logo in the User Console only; you cannot change the logo in the
Administrator Console.
Option Description
User Console The logo or other graphic displayed at the top of the User Console. The User
Console is the web-based interface that makes applications available to users
on a self-service basis. It also enables users to file Service Desk support tickets
to request help or report issues. To access the User Console, go to http://
<KACE_SMA_hostname>/user where <KACE_SMA_hostname> is the hostname of
your appliance. Follow these guidelines for User Console graphics:
• 224 pixels wide by 50 pixels high is the default size.
• 104 pixels wide by 50 pixels high stays inside the blue highlight around the Log
Out link.
• 300 pixels wide by 75 pixels high is the maximum size that does not impact the
layout.
Report This setting controls the logo used when generating System-level reports.
Upload a logo or other graphic to be displayed at the top of reports. The graphic must
be 201 pixels wide by 63 pixels high as specified in the auto-generated XML layout.
To use a different size, adjust the output of the XML report.
To see the default report logo and a customized version, refer to the following
illustrations.
When configured, the device warranty information appears on the Device Details page in the Inventory
Information group when you select an HP or Lenovo device. For more information, see Groups and
sections of items in device details.
Option Description
Hewlett-Packard Select this option if you want to obtain warranty information for your managed HP
devices. If this option is selected and you clear it, the HP API key and secret are
removed from the database.
Key The API key for obtaining warranty information for managed HP devices.
Secret The secret for obtaining warranty information for managed HP devices.
Lenovo Select this option if you want to obtain warranty information for your managed Lenovo
devices. If this option is selected and you clear it, the Lenovo key is removed from the
database.
Key The API key for obtaining warranty information for managed Lenovo devices.
Last Updated (Read-only) The date the information was changed and the name of the organization.
and Organization Organization Name can be edited at the System level. See Add or edit organizations.
Name
Administrator Enter the email address of the appliance administrator. System-related messages,
Email including critical alerts, are sent to this address.
Company Email Enter the domain from which your users send email. For example: example.com.
Suffix
3. Optional: In the Locale Settings section, specify locale settings. See Configuring locale settings.
Option Description
Organization Select the locale to use for the selected organization’s Administrator Console and
Locale User Console. If you have multiple organizations, you can select different locales for
each one. See:
• Adding, editing, and deleting organizations
• Configuring locale settings
4. Optional: In the Samba Share Settings section, select file sharing options then click Save Samba Settings.
If File Shares are disabled, you need to enable them at the System level before you can enable them for
the organization. See Configure security settings for the appliance.
Option Description
Enable File Use the appliance's client share to store files, such as files used to install applications
Sharing on managed devices.
The appliance’s client share is a built-in Windows file server that can be used by
the provisioning service to assist in distributing the Samba client on your network.
Quest recommends that this file server only be enabled when you perform application
installations on managed devices.
File Share User Enter the password to use for admin account access to the file share directory.
‘admin’ Password
5. In the Ignore Client IP Address Settings section, enter the IP address or addresses to ignore. Separate
each address with a comma. Ignoring IP addresses is useful when multiple devices could report
themselves with the same IP address, such as a proxy address.
6. In the License Usage Warning Configurations section, select the percentage to use for the warning
threshold and critical threshold for software license usage. If you have configured software License assets,
threshold information is displayed on the license-related widgets on the Dashboard
7. In the Data Retention section, select the options for retaining data in the KACE SMA database.
Retain Device The number of months that device uptime information is retained in the KACE SMA
Uptime Data database.
Device uptime refers to the number of hours of each day that managed devices are
running. You can retain this data for a specified number of months, Forever, or never
save it (Disabled).
Retain Metering The number of months that metering data is retained in the KACE SMA database.
Data Metering data is information about how applications are installed and used on the
Windows and Mac devices that you manage. Metering data that is older than the
selected number of months is deleted on the first day of every month. See About
metering information.
Retain Whether to retain information about Uncataloged applications in the KACE SMA
Uncataloged data database.
in the Software Uncataloged applications are executables that are in the KACE SMA inventory but
Catalog that do not appear in the Software Catalog, and the KACE SMA retains information
about those applications by default. For organizations with a large number of
managed devices, however, retaining this data might greatly increase the size of the
database. This size increase could increase the time it takes to load pages in the
Administrator Console and the time it takes to perform database backups.
Select this check box to retain data for Uncataloged software in the KACE SMA
database. Clear the check box to disable data retention.
If data retention for Uncataloged software is disabled:
• Agents on managed devices continue to upload full inventory information, and
raw data related to applications is fingerprinted. If data sharing is enabled, data
is also uploaded to the Quest KACE Software Catalog. See Configure data
sharing preferences.
• The appliance continues to store information related to Cataloged applications
and Locally Cataloged applications in the organization database.
• Information related to Uncataloged applications is not stored in the organization
database, and the Uncataloged applications list in the Administrator Console is
empty.
• Reports for Cataloged applications continue to work as expected. However,
reports related to Uncataloged applications show only those applications that
are part of Cataloged software titles.
8. In the Asset Archive section, type the number of days that you want to keep the assets marked for
archiving, before actually archiving them. The default value is 3 days.
9. In the User Archive section, indicate if you want to enable user archival, as needed.
a. To have the ability to archive user accounts, select the Enable User Archival check box.
NOTE: When user archival is enabled, user accounts can only be deleted only if they are marked
as archived.
b. In the Archive Tag field, type a label that you want to associate with the state of archived users.
For example, Archived or Inactive.
NOTE: Most actions in the Action drop-down list require you to install additional applications for them
to function. For example, using DameWare requires you to install TightVNC on your device as well as
on the device you want to access.
This feature is only supported on Windows devices. If you enable ActiveX in Microsoft Internet Explorer,
the device action runs using ActiveX. If ActiveX is disabled, or you want to use a different browser, the
Windows device you are running the device action from must have the KACE Agent version 9.0 or later
agent installed and connected.
When you initiate device through the agent, the action executable must be placed in your %PATH%. The
agent is 32-bit, so on 64-bit Windows devices, use %windir%/System32 as an alias to the %windir
%/Wow64 directory. If you need to run a program that's located in the %windir%/System32 directory
on a 64-bit Windows system, you must use the %windir%/SysNative virtual directory. You can either
add %windir%/SysNative to your %PATH% environment variable or provide a fully-qualified path by
prepending %windir%/SysNative to your executable when defining your machine action.
12. In the Patch Schedule section, if you want disable administrators to apply patches to all devices, select the
Hide All Devices check box.
NOTE: You can only apply this setting if you do not have any patch schedules set up to run against all
devices. Otherwise, a warning appears.
13. In the Allowed Bulk Actions section, indicate if you want to enable bulk actions against KACE Cloud
Mobile Device Manager (MDM) and VMware virtual machine devices. When bulk actions are enabled, the
associated KACE Cloud MDM and VMware virtual machine commands become available from the Choose
Action menu on the Devices list page.
Enable Bulk Select this check box to enable commands against multiple KACE Cloud MDM
KACE Cloud MDM devices on the Devices list page.
Actions
Enable Bulk Select this check box to enable commands against multiple VMware virtual machine
Virtual Machine devices on the Devices list page.
Actions
14. To use a custom logo in the User Console, select images in the Logo Overrides section.
NOTE: You can change the logo in the User Console only; you cannot change the logo in the
Administrator Console.
Option Description
User Console The logo or other graphic displayed at the top of the User Console. Follow these
guidelines for graphics:
• 224 pixels wide by 50 pixels high is the default size.
• 104 pixels wide by 50 pixels high stays inside the blue highlight around the Log
Out link.
• 300 pixels wide by 75 pixels high is the maximum size that does not impact the
layout.
To see the default login page and a customized version, see Configure appliance
General Settings with the Organization component enabled.
Report This setting controls the logo used when generating reports for the selected
organization.
Upload a logo or other graphic to be displayed at the top of reports. The graphic must
be 201 pixels wide by 63 pixels high as specified in the auto-generated XML layout.
To use a different size, adjust the output of the XML report.
To see the default report logo and a customized version, see Configure appliance
General Settings with the Organization component enabled.
If the Organization component is enabled on your appliance, you can specify different
logos for the reports produced for each organization and for the System.
For information about using custom logos at the System level, see Configure
appliance General Settings with the Organization component enabled.
Last updated Read-only: The date the information was changed and the name of the organization.
Administrator Enter the email address of the appliance administrator. System-related messages,
Email including critical alerts, are sent to this address.
Company Email Enter the domain from which your users send email. For example: example.com.
Suffix
Enable mobile Enable or disable Mobile Device Access to the appliance. Mobile device access
device access enables you to interact with the KACE SMA appliance using the KACE GO app on
iOS and Android smart phones and tablets. Administrators can use the app to access
Service Desk, inventory, and application deployment features.
See Configuring Mobile Device Access.
Session Timeout Set the number of inactive hours to allow before closing user sessions and requiring
users to log in again. The default is 1. The User Console and Administrator Console
have Timeout Session counters to alert users of this time limit. Only periods of
inactivity are counted. The counter restarts when the user performs any action
that causes the console to interact with the appliance server, such as refreshing a
window, saving changes, and changing windows. When the counter reaches the limit,
the user is logged out, unsaved changes are lost, and the login screen appears. The
Timeout Session counter appears in the upper right of each console.
3. In the Client Drop File Size Filter section, specify a file size.
Options Description
Client Drop File A file-size filter for the organization's Client Drop location.
Size Filter The Client Drop location is a storage area (Samba share) for the organization on
the KACE SMA appliance. This storage area is used to upload large files, such as
application installers and appliance backup files, to the appliance. Uploading files to
the Client Drop location is an alternative to uploading files through the Administrator
Console using the default HTTP mechanism, which can result in browser timeouts for
large files.
The Client Drop Size filter determines whether files uploaded to the organization's
Client Drop location are displayed on the Upload and Associate Client Drop File list
on the Software Detail page. For example, if the Client Drop Size filter is set to 1 GB,
4. In the User Console section, specify customizations for the User Console text:
Option Description
Title The heading that appears on the User Console login page. The User Console
is the web-based interface that makes applications available to users on a
self-service basis. It also enables users to file Service Desk support tickets to
request help or report issues. To access the User Console, go to http://
<KACE_SMA_hostname>/user where <KACE_SMA_hostname> is the hostname of
your appliance.
Welcome Message A welcome note or description of the User Console. This text appears below the title
on the User Console login page.
Enabled Enable the appliance to display your policy, and require users to accept the terms
of your policy, when they access the Administrator Console, User Console, or
Command Line Console, or log in using SSH or FTP.
Title The heading of the policy to be displayed on the login page of the User Console.
Message Details of the policy, which are displayed below the Title on the login page. Users
must agree to the terms of the policy before they can log in to the User Console.
6. In the Log Retention section, select the number of days to retain log information. Log entries that are older
than the selected number of days are automatically deleted from the log. See Access appliance logs to
view Microsoft Exchange Server errors.
7. In the Share With Us section, specify data sharing options.
NOTE: To validate the KACE SMA product license, Quest collects minimal license-related information,
such as the MAC Address of the KACE SMA appliance, the version of the KACE SMA software, the
license key, and the number of managed devices, regardless of the data sharing options selected in
this section.
Option Description
Share summary (Recommended) Share summary information with Quest. This information includes
usage data... appliance status, uptime, and load averages, as well as the number of devices,
Managed Installations, and applications being managed by the appliance. This option
is recommended because it provides additional information to Quest Support if you
need assistance. In addition, data shared with Quest is used when planning product
enhancements.
Share detailed (Recommended) Share detailed information with Quest and share anonymous
usage data... information with ITNinja.com. This information includes Agent and appliance crash
8. In the Locale Settings section, specify locale preferences. These preferences determine the formats used
for date and time information displayed in the Administrator Console.
Option Description
Organization The locale to use for the organization’s Administrator Console and User Console.
Locale
Command Line The locale to use in the Command Line Console, which uses the konfig user
Console Locale account.
9. In the Ignore Client IP Address Settings section, enter the IP address or addresses to ignore. Separate
each address with a comma. Ignoring IP addresses is useful when multiple devices could report
themselves with the same IP address, such as a proxy address.
10. In the License Usage Warning Configurations section, select the percentage to use for the warning
threshold and critical threshold for software license usage. If you have configured software License assets,
threshold information is displayed on the license-related widgets on the Dashboard.
11. In the Update Reporting User Password section, provide the password of the account required to run
reports on the organization. You cannot change the Database Name or the Report Username.
12. In the Data Retention section, select the options for retaining data on the appliance. You can retain this
data for a specified number of months, Forever, or never save it (Disabled).
Option Description
Retain Device The amount of uptime data to save for devices. Device uptime data refers to the
Uptime Data number of hours of each day that your managed devices are running. You can retain
this data for a specified number of months, Forever, or never save it (Disabled).
Retain Metering The number of months that metering data is retained in the KACE SMA appliance
Data database.
Metering data is information about how applications are installed and used on the
Windows and Mac devices that you manage. Metering data that is older than the
selected number of months is deleted on the first day of every month. See About
metering information.
Retain Whether or not to retain information about Uncataloged applications in the KACE
Uncataloged data SMA appliance database.
in the Software Uncataloged applications are executables that are in the KACE SMA inventory but
Catalog that do not appear in the Software Catalog, and the KACE SMA retains information
about those applications by default. For organizations with a large number of
managed devices, however, retaining this data might greatly increase the size of the
database. This could increase the time it takes to load pages in the Administrator
Console and the time it takes to perform database backups.
Select this check box to retain data for Uncataloged software in the KACE SMA
database. Clear the check box to disable data retention.
If data retention for Uncataloged software is disabled:
• Agents on managed devices continue to upload full inventory information, and
raw data related to applications is fingerprinted. If data sharing is enabled, data
is also uploaded to the Quest KACE Software Catalog. See Configure data
sharing preferences.
• The appliance continues to store information related to Cataloged applications
and Locally Cataloged applications in the organization database.
• Information related to Uncataloged applications is not stored in the organization
database, and the Uncataloged applications list in the Administrator Console is
empty.
• Reports for Cataloged applications continue to work as expected. However,
reports related to Uncataloged applications show only those applications that
are part of Cataloged software titles.
13. In the Device Actions section, click Add New Action, the select the scripted actions to enable.
Device Actions are scripted actions that can be performed on managed devices. There are several pre-
programmed actions available. To add your own action, select Custom Action in the Action menu, then
enter the command in the Command Line text box.
The following variables are available for device actions:
KACE_HOST_IP
KACE_HOST_NAME
KACE_CUSTOM_INVENTORY_*
When device actions run, the appliance replaces variables with their appropriate values.
For KACE_CUSTOM_INVENTORY_ * replace the asterisk (*) with the name of a software application
associated with a custom inventory rule. When the device action runs, the name is replaced with the
custom inventory rule value for the device. Enter the software application name in uppercase characters.
The allowed characters are: [A-Z0-9.-]."
If you are using Internet Explorer, you can define any valid statement to perform a task on a remote device,
then assign a name to it to use the next time you want to perform that task. For example, you can enter
the statement, ping.exe –t KACEHOSTIP and name it Ping. A valid statement is a maximum of 150
characters, and the name that you assign to it must be any printable character of up to 20 characters. For
information about running Device Actions, see Run actions on devices.
NOTE: Most actions in the Action drop-down list require you to install additional applications for them
to function. For example, using DameWare requires you to install TightVNC on your device as well as
on the device you want to access.
This feature is only supported on Windows devices. If you enable ActiveX in Microsoft Internet Explorer,
the device action runs using ActiveX. If ActiveX is disabled, or you want to use a different browser, the
Option Description
User Console The logo or other graphic displayed at the top of the User Console. Follow these
guidelines for graphics:
• 224 pixels wide by 50 pixels high is the default size.
• 104 pixels wide by 50 pixels high stays inside the blue highlight around the Log
Out link.
• 300 pixels wide by 75 pixels high is the maximum size that does not impact the
layout.
To see the default login page and a customized version, see Configure appliance
General Settings with the Organization component enabled.
Report This setting controls the logo used when generating reports for the selected
organization.
Upload a logo or other graphic to be displayed at the top of reports. The graphic must
be 201 pixels wide by 63 pixels high as specified in the auto-generated XML layout.
To use a different size, adjust the output of the XML report.
To see the default report logo and a customized version, see Configure appliance
General Settings with the Organization component enabled.
If the Organization component is enabled on your appliance, you can specify different
logos for the reports produced for each organization and for the System.
For information about using custom logos at the System level, see Configure
appliance General Settings with the Organization component enabled.
15. If you manage Hewlett-Packard (HP) or Lenovo devices, you can retrieve their warranty information. To do
that, in the Manufacturer Warranty API Keys section, provide the HP and/or Lenovo API keys to obtain the
warranty data. Lenovo requires only a key whereas HP requires both a key and a secret. These values are
stored encrypted in the database.
When configured, the device warranty information appears on the Device Details page in the Inventory
Information group when you select an HP or Lenovo device. For more information, see Groups and
sections of items in device details.
Option Description
Hewlett-Packard Select this option if you want to obtain warranty information for your managed HP
devices. If this option is selected and you clear it, the HP API key and secret are
removed from the database.
Key The API key for obtaining warranty information for managed HP devices.
Secret The secret for obtaining warranty information for managed HP devices.
Lenovo Select this option if you want to obtain warranty information for your managed Lenovo
devices. If this option is selected and you clear it, the Lenovo key is removed from the
database.
Key The API key for obtaining warranty information for managed Lenovo devices.
Server Use an Internet time server to set the appliance time. Enter the web address of the
time server in the text box. For example: time.example.com.
110 (Optional) Used for POP3 email (non- Inbound to the appliance
SSL)
161 (Optional) Used for SNMP monitoring. Outbound from the appliance
See Discovering devices on your
network.
443 (Required) Used for SSL access. Devices Inbound to the appliance
use this port when they check in to the
appliance using HTTPS.
587 (Optional) Used by the appliance SMTP Outbound from the appliance
server for secure email (SSL enabled).
This is required only if you configure
secure SMTP email. See Configuring
SMTP email servers.
995 (Optional) Used for POP3 email (SSL Inbound to the appliance
enabled).
• Ensure that the appropriate device ports are accessible to the appliance:
Port Use
7 (Optional) Used by the appliance for UDP traffic on the network, which is used for Wake-
on-LAN. See Using Wake-on-LAN.
139 (Optional) Used during KACE SMA Agent provisioning on Windows devices.
161 (Optional) Used for SNMP monitoring. This port should be open and bound to SNMP. See
Discovering devices on your network.
445 (Optional) Used during KACE SMA Agent provisioning. See Provisioning the KACE SMA
Agent.
• To use an LDAP server for authentication, ensure that the appropriate ports are accessible from the
appliance:
Port Use
https://twitter.com/quest Twitter®
https://www.facebook.com/questsoftware Facebook®
http://linkedin.com/ LinkedIn®
TIP: Testing an external SMTP server does not require the appliance reboot. You can test the SMTP
configuration before saving your changes.
1. Go to the appliance Control Panel:
• If the Organization component is not enabled on the appliance, log in to the KACE SMA Administrator
Console, http://KACE_SMA_hostname/admin, then click Settings.
• If the Organization component is enabled on the appliance, log in to the KACE SMA System
Administration Console, http://KACE_SMA_hostname/system, or select System in the drop-
down list in the top-right corner of the page, then click Settings.
2. Click Network Settings to display the Network Settings page.
3. On the Network Settings page, in the Appliance Network Configuration section, provide the following
information:
Option Description
DNS Hostname Enter the hostname of the appliance. The default is k1000.
Web Server Name Enter the fully-qualified domain name of the appliance. This is the Hostname
concatenated with Domain. For example: k1000.example.com. Devices connect
to the appliance using this name. Quest recommends that you add a static IP
Automatically Select this check box to enable the system to generate the KACE SMA web server
generate server name using this format: Hostname.Domain. For example: k1000.example.com.
name Clear this check box to enter a custom web server name.
Configure Select this option if you want to use DHCP (Dynamic Host Configuration Protocol) to
Network Using automatically obtain the IPv4 address and other network configuration information for
DHCP the appliance.
Configure Select this option if you want to manually specify the IPv4 address, domain, subnet
Network Manually mask, default gateway, and DNS settings for the appliance:
• IP Address: Enter the static IP address of the appliance.
• Domain: Enter the domain that the appliance is on. For example,
example.com.
• Subnet Mask: Enter the subnet (network segment) that the appliance is on.
The default is 255.255.255.0.
• Default Gateway: Enter the network gateway for the appliance.
• Primary DNS: Enter the IP address of the primary DNS server the appliance
uses to resolve host names.
• Secondary DNS: (Optional) Enter the IP address of the secondary DNS server
the appliance uses to resolve host names.
Configure Select this option if you want to use the SLAAC (stateless address auto-
Network Using configuration), offered by IPv6, to configure the appliance's network settings.
SLAAC SLAAC allows devices to select their own IPv6 addresses based on the prefix that is
advertised from their connected interface.
Configure Select this option if you want to manually specify the IPv6 address, prefix length, and
Network Manually default gateway for the appliance:
• IPv6 Address: Enter the static IPv6 address of the appliance.
• Prefix Length: Enter the number of bits in the IPv6 address prefix. An IPv6
prefix typically consists of 64 bits.
• Default Gateway: Enter the network gateway for the appliance.
Disable IPv6 Select this option if you want to disable an IPv6 address for the appliance. This is the
default setting.
6. Optional: To set a proxy server, select the Enable Proxy Server in the Proxy Configuration section, then
specify proxy server settings:
Option Description
Port Enter the port for the proxy server. The default port is 8080.
Enable Select the check box to use the local credentials for accessing the proxy server.
Basic Proxy
Authentication
Password and Enter the password for accessing the proxy server.
Confirm Password
NOTE: The appliance supports proxy servers that use basic, realm-based authentication, requiring
usernames and passwords. If your proxy server uses a different kind of authentication, add the
appliance’s IP address to the proxy server’s exception list.
7. To use an external SMTP server, select Enable SMTP Server in the Email Configuration section, then
specify SMTP server options:
Option Description
Port Enter the port number to use for the external SMTP server. For standard SMTP, use
port 25. For secure SMTP, use port 587.
Login Enter the username of an account that has access to the external SMTP server, such
as your_account_name@gmail.com.
Destination Enter the IP address or network for the destination with which you want your KACE
SMA to communicate.
Subnet Mask or Enter the subnet mask of the specified network. For example: 24,
CIDR 255.255.240.0. This is applied to the host.
Gateway Enter the IP address of the router that routes traffic between the KACE SMA and the
destination network.
No access Select this option to allow access from any web address.
restrictions
Restrict access as Select this option to restrict access to web addresses on the Allow List. To whitelist IP
specified below addresses on the appliance’s subnet in addition to the specified destinations, select
Allow all IP addresses in the same subnet as the appliance.
4.
In the Allow List section, click the Add button to add an entry: .
5. Specify the following options.
Option Description
Enable SSH Permit SSH logins to the appliance. When SSH is enabled, SSH encrypted
communications are permitted over port 22.
Enable webserver Enable the appliance to compress web pages. This compression reduces the time it
compression takes to load Administrator Console and User Console pages in the browser.
Enable inventory Use API (application programming interface) commands to update inventory
API access information. If you want to upload device information using the API, you must enable
this setting. See Adding devices manually using the API.
API Password The password for API (application programming interface) access to inventory
information. This password is used only for API access and it does not need to match
any other passwords.
Enable SNMP Enable unidirectional (read-only) SNMP access to managed devices on the network.
READ access
SNMP Community The SNMP community string that enables read-only SNMP access. The default value
String is public.
Enable SNMP Trap Enable SNMP (Simple Network Management Protocol), a protocol for monitoring
monitoring managed devices on a network. SNMP is supported by Dell Open Manage and many
third-party products. If you do not want to receive SNMP traps from network devices,
clear this option.
When you enable this feature on the appliance, and the related devices are also
enabled for monitoring, the appliance can receive SNMP traps from the monitored
network devices such as printers, projectors, and routers. This feature only applies to
network devices managed through the SNMP-managed devices, such as agentless
devices using SNMP connections.
For information on how to enable device monitoring, see Enable monitoring for one or
more devices.
SNMP traps are messages initiated by network devices and sent to the trap receiver
on the appliance. For example, a router can send a message when its power supply
fails. Or, a printer initiates a message when it runs out of paper. The appliance
receives these traps and generates alerts when certain pre-defined thresholds are
reached.
• SNMP version 1 or 2: This version only requires a valid community string.
A community string is required to allow the appliance to receive SNMP trap
messages from monitored network devices. The appliance supports multiple
security strings. To add a community string, open the v1/v2 tab, click , type
the community string, and click Save.
• SNMP version 3: This version implements enhanced security and remote
configuration features and requires a valid user name and encryption
information. To add a security name, open the v3 tab, click , and provide the
following information:
◦ Security Name: The name of the User-based Security Model (USM)
account that sends the SNMP trap.
◦ Engine ID: The ID of the SNMP application engine that sends the SNMP
trap.
◦ Authentication Password: The password associated with the Security
Name.
◦ Authentication Protocol: The protocol used for authenticating the user:
MD5 or SHA.
◦ Privacy Password: The encryption key for the data packet.
◦ Privacy Protocol: The encryption protocol: AES or DES.
◦ Security Level: Indicates the level of security:
▪ authPriv: The identity of the sender is verified and the information is
encrypted.
▪ authNoPriv: The identity of the sender is verified, but the information
is not.
▪ noAuthNoPriv: The identity of the sender is not verified and the
information is not encrypted.
MIB Files Upload vendor-specific MIB (management information base) files. A MIB file allows
the trap receiver on the appliance to translate SNMP traps into human-readable
messages. These files are optional.
• To upload a MIB file, on the Security Settings page, under MIB Files, in the
Upload MIB area, click Browse, and select a MIB file.
• A MIB file must meet certain standards. The appliance validates every MIB file
that you upload. If you upload an invalid MIB file, an error message appears
along the top of the Security Settings page. If you do not want to validate the
contents of the MIB file, select the Skip MIB validation check box.
Enable Secure Require username and password authentication for access to KACE SMA backup
backup files files, which are available by entering a URL in a browser.
Clear this option to enable access to backup files through a URL without username or
password authentication. This is useful for external process that require access. See
About appliance backups.
Enable backup via Enable access to the database backup files through a read-only FTP server. This
FTP enables you to create a process on another server to access the backup files.
If you do not need this access, clear this option.
Make FTP writable Enable the upload of backup files using FTP. FTP is useful for backup files that are
too large for the default HTTP mechanism and cause browser timeouts.
New FTP user Require a password for FTP access to the backup files.
password
Enable mDNS Enable the appliance to respond to multicast Domain Name System (mDNS) and
DNS Service Discovery (DNS-SD) requests. This option makes it easier for users and
administrators to locate the Administrator Console and User Console. If you do not
need the appliance to respond to these requests, clear this option.
Enable webserver Enable the KACE SMA to display usage information for the appliance web server,
diagnostic graphs such as Apache access and volume statistics. This information appears in graphs
in the System Performance log. If this option is cleared, the graphs are not updated.
See View appliance logs.
Enable database Enable users to run reports on the KACE SMA database using an external tool,
access such as Microsoft Access or Excel, over port 3306. If you do not need to expose the
database in this way, clear this option.
NOTE: The appliance database can be accessed from any ODBC-compliant
third-party tool if you have installed the (32bit) MySQL ODBC driver. You must
select this check box if you want to use this feature. In addition, you will need
to configure a data source for your MySQL ODBC driver, and provide the
appliance connection information. For more information, refer to your MySQL
ODBC driver documentation.
Enable secure Enable SSL access to the database and access additional SSL options.
database access
(SSL)
4. In the Two-Factor Authentication section, configure the Two-Factor Authentication (2FA) feature. 2FA
provides stronger security for users logging into the appliance by adding an extra step to the login process.
Disabled Prevent the KACE SMA from using single sign on. Single sign on enables users who
are logged on to the domain to access the KACE SMA Administrator Console and
Active Directory Use Active Directory for authentication. Active Directory uses the domain to
authenticate users on the network. See Using Active Directory for single sign on.
For appliances with Use the appliance's client share to store files, such as files used to install applications
the Organization on managed devices.
component The appliance’s client share is a built-in Windows file server that can be used by
enabled: the provisioning service to assist in distributing the Samba client on your network.
Enable Quest recommends that this file server only be enabled when you perform application
Organization File installations on managed devices.
Shares
NOTE: If the Organization component is enabled on your appliance, you can
For appliances select additional file sharing options for each organization. See Enable file
without the sharing at the System level.
Organization
component:
Enable File
Sharing
Require NTLMv2 Enable NTLMv2 authentication for the KACE SMA files shares. When this is enabled,
to appliance file managed devices connecting to the KACE SMA File Shares require support for
shares NTLMv2 and they authenticate to the KACE SMA using NTLMv2. Although NTLMv2
is more secure than NTLM and LANMAN, non-NTLMv2 configurations are more
common and this option is usually turned off. Enabling this option disables lanman
auth and ntlm auth on the Samba server. NTLMv2 Levels 1-4 are supported. If you
need NTLM v2 Level 5, consider manually provisioning the KACE SMA Agent. See
Manually deploying the KACE SMA Agent.
Require NTLMv2 Force certain KACE SMA functions that are supported through the Samba client,
to off-board file such as Agent Provisioning, to authenticate to off-board network file shares using
shares NTLMv2. Even though NTLMv2 is more secure than NTLM and LANMAN, non-
NTLMv2 configurations are more common and this option is usually disabled.
Enabling this option enables the client ntlmv2 auth option for Samba client
functions.
Option Description
Enable SSL Enable managed devices to connect to the appliance using SSL (HTTPS).
Enable this setting only after you have properly deployed the appliance on your LAN
in non-SSL mode.
Domain The host name of the domain of your Active Directory® server, such as example.com.
Username The user name of the administrator account on the Active Directory server. For
example, username@example.com.
Password The password of the administrator account on the Active Directory server.
Computer Object The name of the computer object container of the administrator account on the Active
Container Directory server.
Computer Object The name of the computer object container of the administrator account on the Active
Name Directory server.
Service Account The name of the service account container of the administrator account on the Active
Container Directory server.
3. Click Join.
The appliance performs the following tests, which require read-only permission, to determine whether the
domain is configured correctly to allow the KACE SMA to join the domain:
◦ Check for supported operating system and correct operating system patches
◦ Check for sufficient disk space to install QAS
◦ Check that the hostname of the system is not 'localhost'
◦ Check if the name service is configured to use DNS
◦ Check resolv.conf for proper formatting of name service entries and that
the host can be resolved
◦ Check for a name server that has the appropriate DNS SRV records for Active
Directory
◦ Detect a writable domain controller with UDP port 389 open
◦ Detect Active Directory site if available
◦ Check if TCP port 464 is open for Kerberos kpasswd
◦ Check if UDP port 88 and TCP port 88 are open for Kerberos traffic
◦ Check if TCP port 389 is open for LDAP
◦ Check for a global catalog server and if TCP port 3268 is open for
communication with global catalog servers
◦ Check for a valid time skew against Active Directory
◦ Check for the QAS application configuration in Active Directory
◦ Check if TCP port 445 is open for Microsoft CIFS traffic
These tests do not need write access and they do not check for permission to write to any directory. In
addition, these tests do not verify username and password credentials. If the credentials are incorrect, the
KACE SMA might not be able to join the domain even if the tests are successful.
A message appears stating the results of the test. To view errors, if any, click Logs, then in the Log drop-
down list, select Server Errors.
4. Optional: Select Force Join to join the server to ignore errors and join the domain.
5. Click Save and Restart Services.
When users are logged in to devices that are joined to the Active Directory domain, they can access the KACE
SMA User Console without having to re-enter their credentials. If users are on devices that are not joined to the
NOTE: To use single sign on with Internet Explorer and Firefox browsers, users must configure their
browser settings to use the appropriate authentication. See Configuring browser settings for single sign on.
Common Name The common name of the appliance you are creating the SSL certificate for.
6. Click Save.
If this is the first time the SSL Certificate Form has been saved, the Certificate Signing Request section
appears. If the form has previously been saved, the Certificate Signing Request section is updated.
7. Do one of the following:
• To generate a certificate using a third-party certificate issuer:
1. Copy all of the text in the Certificate Signing Request section, including the lines "-----BEGIN
CERTIFICATE REQUEST-----" and "-----END CERTIFICATE REQUEST-----" and
everything in between, then send it to the certificate issuer or the person who provides your
company with web server certificates.
About Konea
Konea is a component that enables the communication between the KACE SMA Agent, which is installed on
Agent-managed devices, and the KACE SMA.
Konea provides optimized real-time communications for systems-management operations.
Enable Pre-7.0 Select this option if you want to enable the appliance to communicate with KACE
Agent Support SMA Agents version 6.4.x and earlier.
Enable SSL (Read only) Agent SSL settings are controlled by the appliance security settings. See
Configure security settings for the appliance.
Require SSL Configure the KACE SMA Agent to use secure connections. SSL (Secure Sockets
Layer) connections allow the Agent to establish encrypted link to ensure that all data
passed from and to the Agent remains private and integral.
IMPORTANT: After changing this setting, you must restart the Agent manually
using the AMPTools restart command, to ensure these changes are reflected
on the Client machine.
Verify SSL Verify SSL certificates prior to establishing a connection. An SSL certificate contains
Certificates a public key used to encrypt and information about its owner identity.
IMPORTANT: After changing this setting, you must restart the Agent manually
using the AMPTools restart command, to ensure these changes are reflected
on the Client machine.
Enable server Enable different levels of server debugging or logging to the server's log file. See
debug Troubleshooting appliance issues.
Compress Server Indicate if you want to compress the files uploaded by the appliance. This can help
Uploads the overall Agent performance.
Disable Duplicate Disable the process that detects duplicate devices in the inventory. In some unique
Device Detection cases, this process is too aggressive and needs to be disabled.
CAUTION: Do not select this check box unless instructed by Quest Support.
Process Timeouts Specify the amount of time after which the Agent suspends a running process.
File Transfer Specify the amount of time after which the Agent suspends a file transfer process.
Timeout
Read/Write The length of time that the messaging protocol processor waits before determining
Connection that KACE SMA Agents have disconnected.
Timeout
IMPORTANT: Do not adjust this parameter unless you have discussed the
ramifications with Quest Support.
The messaging protocol processor monitors KACE SMA Agent connections, and
it assumes that Agents are connected while it waits for responses. If Agents do
not respond within the timeout period, the processor concludes that they have
disconnected.
For appliances that have fewer than 1,500 managed devices, a 40-second timeout
would be appropriate. In environments with network limitations, or for appliances with
more than 1,500 managed devices, a timeout of 90-120 seconds might be better. The
minimum timeout is 30 seconds, and the maximum is 180 seconds.
Disable duplicate Prevent the Agent from detecting duplicate devices. In some unique cases, this
device detection duplicate detection is too aggressive and needs to be disabled.
IMPORTANT: Do not select this setting unless you have discussed the
ramifications with Quest Support.
Connected Agents The number of KACE SMA Agents currently connected to the appliance.
4. Click Save and Restart Services to save the settings and restart the messaging protocol processor.
5. To restart the messaging protocol processor without saving settings, click Restart services.
NOTE: Restarting the processor does not restart the KACE SMA.
Related topics
Configure security settings for the appliance
Troubleshooting appliance issues
Optional: Configure Agent communication settings, which determine the frequency at which Agents communicate
with the appliance. See Managing Agent communications.
Session Timeout Set the number of inactive hours to allow before closing user sessions and requiring
users to log in again. The default is 1. The User Console and Administrator Console
have Timeout Session counters to alert users of this time limit. Only periods of
inactivity are counted. The counter restarts when the user performs any action
that causes the console to interact with the appliance server, such as refreshing a
window, saving changes, and changing windows. When the counter reaches the limit,
the user is logged out, unsaved changes are lost, and the login screen appears. The
Timeout Session counter appears in the upper right of each console.
NOTE: Reports always appear with a white background, regardless of which theme is selected.
NOTE: For newly created users, the Administrator Console uses the default theme. This can be
changed on the next login. For more information, see Configure the default theme for a user.
Share summary (Recommended) Share summary information with Quest. This information includes
usage data... appliance status, uptime, and load averages, as well as the number of devices,
Managed Installations, and applications being managed by the appliance. This option
is recommended because it provides additional information to Quest Support if you
need assistance. In addition, data shared with Quest is used when planning product
enhancements.
Share detailed (Recommended) Share detailed information with Quest and share anonymous
usage data... information with ITNinja.com. This information includes Agent and appliance crash
reports, user interface usage statistics, and inventory information, such as application
titles. Quest uses this information to help improve the Software Catalog, and ITNinja
uses anonymous data to identify relevant content on http://www.itninja.com for
dynamic feeds to the KACE SMA Administrator Console.
ITNinja.com is a community website where IT professionals can share information
and research on a wide variety of systems management and deployment topics. The
ITNinja feed is a feature that dynamically displays software deployment tips and other
contextual information on relevant pages in the KACE SMA Administrator Console.
To enable the ITNinja feed, you need to select Share detailed Usage data.... This
setting shares information anonymously with ITNinja. The ITNinja feed is available
only if Share Summary Usage Data... is selected, and it is available only on pages
related to software or deployment, such as the software, Managed Installation, and
File Synchronization detail pages. The feed is not available on Software Catalog
detail page.
Clear this option to prevent the appliance from sharing inventory data with the ITNinja
community. However, clearing this option does not remove any information that has
already been shared. For more information, contact Quest Support.
Enabled Enable the appliance to display your policy, and require users to accept the terms
of your policy, when they access the Administrator Console, User Console, or
Command Line Console, or log in using SSH or FTP.
Title The heading of the policy to be displayed on the login page of the User Console.
Message Details of the policy, which are displayed below the Title on the login page. Users
must agree to the terms of the policy before they can log in to the User Console.
TIP: You can also access this dialog box from the help pane. For more information, see
Access product documentation.
b. Click the link for your mobile device OS, as needed, to download the app.
For more information about downloading and configuring KACE GO, seeDownload and use KACE
GO.
5. Click Save and Restart Services.
Mobile Device Access is enabled on the appliance. Before users can access the KACE SMA using the
KACE GO app, however, you must enable Mobile Device Access for their accounts. See Enable Mobile
Device Access for users.
If the Organization component is enabled on your appliance, enable Mobile Device Access for user
accounts at the Organization or Admin level. Mobile Device Access cannot be enabled or disabled for user
accounts at the System level.
KACE SMA URL The IP address or fully qualified domain name of the appliance.
User name and Password The username and password of an account that has Mobile Device
Access enabled.
Save Password Enable the app to remember your password on the device. If you choose
this option, Quest requires that you create a PIN (personal identification
number) for security. KACE GO does not cache or save user data unless
you select Save Password.
Use SSL Enable SSL communications between the device and the KACE SMA. To
use this setting, SSL must be enabled on the KACE SMA. If SSL is not
enabled on the appliance, and you select Use SSL, the login fails.
For more information, see the Help Center in the KACE GO app or go to https://quest.com/products/kace-
systems-management-appliance/.
Related topics
Configure email triggers
Configure security settings for the appliance
NOTE: If you have multiple Quest KACE SMA or SDA appliances, and you plan to link them, the admin
user account for each appliance must have the same password.
Name A unique, logical name for this appliance. This name appears in the drop-down list
in the top-right corner of the page next to the login information when appliances are
linked.
Login Expiration The number of minutes to keep the link open. When this time period expires, you
need to provide login credentials when switching to a linked appliance. The default is
120 minutes.
Timeout The number of minutes the appliance waits for a remote appliance to respond to a
linking request. The default is ten seconds.
About labels
Labels are containers that enable you to organize and categorize items, such as devices, so that you can manage
them as a group.
For example, you can use labels to identify devices that have the same operating system or that are in the same
geographic location. You can then initiate actions, such as distributing software or deploying patches, on all of the
devices that in that label. Labels can either be manually assigned to specific items or automatically assigned to
TIP: Avoid using backslashes (\) in label names. If you need to use a backslash in a label
name, add a second backslash (\\) to escape it.
2. Provide the following information:
Option Description
Name The name of the label. This name appears on the Labels list.
Alternate Location (Optional) The alternate download location for Managed Installations, File
Synchronizations, and other deployments that are performed on items assigned to
this label. The location you specify replaces the string KACE_ALT_LOCATION.
CAUTION: You should not have a device in two labels that both specify a
value in this field.
Path If you specify an alternate download location, specify the path to the location.
Login If you specify an alternate download location, specify the username and password for
Password the location.
Restrict Label (Optional) The categories of items to which the label or label group can be applied.
Usage To If you do not restrict label usage, the label or label group can be applied to any item.
However, if you restrict the label or label group to categories such as Applications
and Patches, that label or label group can be applied only to Applications and
Patches; it cannot be applied to other items, such as Devices.
Meter Software Enable metering on devices that have the label assigned. This enables metering on
Usage the devices only. To meter software, you need to also enable metering for individual
applications.
Allow Application Enable Application Control on devices. Software marked as Not Allowed is prevented
Control from running on devices to which the label is applied.
Label Group (Optional) The label group to which the label is assigned. To assign the label to a
label group, click Edit next to the Label Group field, then select a label group. This is
useful if you have a large number of labels and you want to organize them into sub-
labels. For example, you could include the labels of your licensed applications in a
group label named Licenses. In addition, labels inherit any restrictions of the groups
to which they belong.
Scoped to User The user role associated with this label. When a label is associated with a user role,
Role the user actions are limited to only those devices, scripts, and schedules that are
3. Click Save.
Related topics
Apply the Application Control label to devices
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
CAUTION: If you manually edit the SQL of a Smart Label, you can no longer edit the label
using the Smart Label template. This is because the wizard cannot be used to edit custom
SQL.
3. Optional: Click Duplicate to create a new Smart Label that uses the same SQL query.
4. Click Save.
NOTE: When you click Duplicate to create a label, you can assign it to a new label only.
Name The name of the label. This name appears on the Labels list.
Type a name such as All Ticket Owners.
3. Click Save.
The new label is available in the Choose Action > Apply Label menu on the Users page. To assign the label to
Service Desk staff when you import user data, see Importing users from an LDAP server.
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
NOTE: Press Enter or Return after you enter a new Smart Label name to move the text from the
search field to the label field.
7. Click Save.
The Smart Label is applied to existing patches that meet the criteria. The label is added to new patches that meet
the criteria when they are downloaded.
Subscribe to patches. See Subscribing to and downloading patches.
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
NOTE: Press Enter or Return after you enter a new Smart Label name to move the text from the
search field to the label field.
6. Click Save.
The Smart Label is applied to existing patches that meet the criteria. The label is added to new patches that
meet the criteria when they are downloaded.
Subscribe to patches. See Subscribing to and downloading patches.
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
NOTE: Press Enter or Return after you enter a new Smart Label name to move the text from the
search field to the label field.
8. Click Save.
The Smart Label is automatically applied to or removed from Discovery Results that meet the specified criteria.
The next time the Discovery Schedule runs, the Smart Label is applied to discovered devices.
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
NOTE: Press Enter or Return after you enter a new Smart Label name to move the text from the
search field to the label field.
6. Click Save to create the Smart Label.
7. Optional: To confirm that the new label appears on the Labels list, select Home > Labels > Smart Labels
or Label Management.
The new label appears empty at first. When devices are inventoried, the label is applied to them if they
match the Smart Label criteria.
8. Test the Smart Label:
a. Click Inventory to display the Devices page.
b. Click the name of a device that matches the criteria, but to which the label has not yet been
applied.
c. On the Device Detail page, click Force Inventory.
If the Smart Label is working correctly, the device checks in, and the label is applied to it.
Force Inventory is available only if the AMP connection to an Agent-managed device is active, or for
Agentless devices, if the device is reachable.
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
NOTE: Press Enter or Return after you enter a new Smart Label name to move the text from the
search field to the label field.
6. Click Save.
7. Optional: To confirm that the new label appears on the Labels list, select Home > Labels > Smart Labels
or Label Management.
The new label appears empty at first. When devices are inventoried, the label is applied to them if they
match the Smart Label criteria.
8. Test the Smart Label:
a. Click Inventory to display the Devices page.
b. Click the name of a device that matches the criteria, but to which the label has not yet been
applied.
c. On the Device Detail page, click Force Inventory.
If the Smart Label is working correctly, the device checks in, and the label is applied to it.
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
NOTE: Press Enter or Return after you enter a new Smart Label name to move the text from the
search field to the label field.
6. Click Save to create the Smart Label.
7. Optional: To confirm that the new label appears on the Labels list, select Home > Labels > Smart Labels
or Label Management.
The new label appears empty at first. When devices are inventoried, the label is applied to them if they
match the Smart Label criteria.
8. Test the Smart Label:
Restrict Label (Optional) The categories of items to which the label or label group can be applied.
Group Usage To If you do not restrict label usage, the label or label group can be applied to any item.
However, if you restrict the label or label group to categories such as Applications
and Patches, that label or label group can be applied only to Applications and
Patches; it cannot be applied to other items, such as Devices.
Meter Software Select or clear this check box to enable or disable metering for Device labels.
Usage
Allow Application Enable Application Control on devices. Software marked as Not Allowed is prevented
Control from running on devices to which the label is applied.
Label Group (Optional) The label group to which the label is assigned. To assign the label to a
label group, click Edit next to the Label Group field, then select a label group. This is
useful if you have a large number of labels and you want to organize them into sub-
labels. For example, you could include the labels of your licensed applications in a
group label named Licenses. In addition, labels inherit any restrictions of the groups
to which they belong.
3. Click Save.
Related topics
Apply the Application Control label to devices
Type The LDAP Label type. There are two types of LDAP Labels:
• Device: Labels applied to device records. This is useful if you want to
automatically group devices by name, description, and other LDAP criteria.
When devices are inventoried, this query runs against the LDAP server to
determine whether any devices contain LDAP attributes with values that
correspond to the LDAP search filter criteria. If a result is returned, the device
is assigned the label specified in the Associated Label Name field.
You must include at least one KACE SMA variable, such as
KBOX_COMPUTER_NAME, in device labels for the LDAP label to be applied to
a device. During LDAP label processing, the variable is used to compare an
attribute's value in the LDAP directory to determine whether relationships exists
between the LDAP object and a KACE SMA object. See LDAP variables.
• User: Labels applied to user records. This is useful if you want to automatically
group users by domain, location, budget code, or other LDAP criteria. LDAP
Labels are applied to or removed from user records when users are imported
to the appliance manually or according to a schedule. You can use user
variables, such as KBOX_USER_NAME, in user labels. During LDAP label
processing, the variable is used to compare an attribute's value in the LDAP
TIP: To test a label, replace the KBOX_ variables with the appropriate
values for your environment, then select Test.
Associated Label The manual label, or container label, to associate with this LDAP Label. Each LDAP
Label must have an associated label.
Associated Label Notes from the label selected in the Associated Label Name field.
Description
Server The IP address or the hostname of the LDAP server. If the IP address is not valid, the
appliance waits to timeout, resulting in login delays during LDAP authentication.
NOTE: To connect through SSL, use an IP address or hostname. For
example: ldaps://hostname.
Port The LDAP port number, which is usually 389 (LDAP) or 636 (secure LDAP).
Login The credentials of the account the KACE SMA uses to log in to the LDAP server to
read accounts. For example:
LDAP Login:CN=service_account,CN=Users,DC=company,DC=com.
If user name and password are not provided, the tree lookup is not performed. Each
LDAP Label can connect to a different LDAP or Active Directory server.
Password The password of the account the KACE SMA uses to log in to the LDAP server.
Label Attribute For User-type labels: Enter a label attribute, such as: memberOf.
This setting returns a list of groups this user is a member of. The union of all the label
attributes forms the list of labels you can import. If the search filter contains both the
label names and user names, the label attribute is not required.
Label Prefix For User-type labels only: Enter the label prefix. For example: ldap_
The label prefix is a string that is added to the beginning of all the labels.
If you are unsure of the Base DN and Advanced Search information, use the LDAP Browser. See Use the
LDAP Browser.
IP Address or The IP address or the hostname of the LDAP server. If the IP address is not valid, the
Hostname appliance waits to timeout, resulting in login delays during LDAP authentication.
NOTE: To connect through SSL, use an IP address or hostname. For
example: ldaps://hostname.
Port The LDAP port number, which is usually 389 (LDAP) or 636 (secure LDAP).
Login The credentials of the account the KACE SMA uses to log in to the LDAP server to
read accounts. For example:
LDAP Login:CN=service_account,CN=Users,
DC=company,DC=com.
If user name and password are not provided, the tree lookup is not performed. Each
LDAP Label can connect to a different LDAP or Active Directory server.
Password The password of the account the KACE SMA uses to log in to the LDAP server.
3. Click Test.
Upon successful connection to the LDAP server, the Next button becomes active.
If the operation fails, verify the following:
◦ The IP address or hostname is correct.
◦ The LDAP server is running.
◦ The login credentials are correct.
4. Click Next.
The Narrow the Search window appears.
5. Enter a search filter to limit the number of results displayed at the bottom of the screen.
Option Description
Other attributes Type a comma-separated list of Active Directory fields that you want to
search for.
NOTE: The search does not check if the specified fields actually
exist in the Active Directory.
6. Click Go.
NOTE: You cannot change the username of the default admin account, and you cannot delete the
account. However, you can change the password of the admin account. See Add or edit System-level user
accounts.
NOTE: In addition, if the Organization component is enabled on your appliance, or if you want to link
multiple K-Series appliances, use caution when changing the password of the admin account. The admin
account passwords on all linked appliances and organizations must be the same if you want to switch
among them using the drop-down list in the top-right corner of the Administrator Console. The drop-down
list shows only those appliances and organizations whose admin account passwords are the same.
NOTE: See Enable fast switching for organizations and linked appliances.
1. Go to the Administrator Detail page:
a. Log in to the KACE SMA System Administration Console, http://KACE_SMA_hostname/
system, or select System from the drop-down list in the top-right corner of the page.
b. On the left navigation bar, click Settings, then click Administrators.
c. Display the Administrator Detail page by doing one of the following:
▪ Click the name of an administrator
▪ Select Choose Action > New.
2. Enter or change the user information.
Option Description
Login (Required) The name the user types in the Login ID field on the login page.
You cannot change the login of the default admin account.
Budget Code The code of the financial department associated with the user.
Location The name of the work site or building where the user is located.
Custom 1-4 Any additional information about the user or the user’s account.
Password and (Required) The password the user types when logging in.
Confirm Password If the Organization component is enabled on your appliance, or if you want to link
multiple K-Series appliances, use caution when changing the password of the admin
account. Admin account passwords for the System-level, for organizations, and for
linked appliances must be the same if you want to switch among them using the drop-
down list in the top-right corner of the Administrator Console. The drop-down list
shows only those organizations and appliances whose admin account passwords are
the same.
Role (Required) Roles are assigned to user accounts to control access to the Administrator
Console and User Console. Default administrator roles include:
• Administrator: This user can log in to and access all features in the
Administrator Console.
• Read Only Administrator: This user can log in but cannot modify any settings
in the Administrator Console.
You cannot change the role of the default admin account.
Make default Select this option if you want the selected role to become the default role for new
users.
Locale The locale to use for the Administrator Console and User Console for the user. You
cannot change the locale of the default admin account.
Enable KACE Enable Quest to send security notifications to the email address of this administrator.
Security This feature is available only to System-level administrator accounts. It is not
Notifications available to Admin-level administrator accounts, or non-administrator user accounts.
Enable KACE Enable Quest to send sales and marketing notifications to the email address of this
Sales and administrator. This feature is available only to System-level administrator accounts;
Marketing it is not available to Admin-level administrator accounts, or non-administrator user
Notifications accounts.
3. Click Save.
4. Click Save.
TIP: Labels are containers that enable you to organize and categorize items, such as devices, so
that you can manage them as a group. For more information about labels, see About labels.
◦ To grant access to all devices in the appliance or organization (as applicable), select All Devices.
◦ To grant access only to devices associated with a specific label, click Manage Associated Labels,
and select a label, as required.
8. Click Save.
The Roles page appears. When a user who is assigned to the role logs in, the appliance component bar shows
the available features.
NOTE: There can be a maximum of 50 organization in your system. Any attempts to create more
organizations result in an error message.
2. Add or edit the following information:
Option Description
Login (Required) The name the user types in the Login ID field on the login page.
You cannot change the login of the default admin account.
Additional Emails One or more additional emails the user has access to. Separate multiple entries with
commas.
Budget Code The code of the financial department associated with the user.
Location The name of the work site or building where the user is located. Click and select a
location from the drop-down list that appears.
Custom 1-4 Any additional information about the user or the user’s account.
Password and (Required) The password the user types when logging in.
Confirm Password
Role (Required) The role associated with the user. Roles are assigned to user accounts to
control access to the Administrator Console and User Console. Default system roles
include:
• Administrator: This user can log in to and access all features in the
Administrator Console.
• Read Only Administrator: This user can log in but cannot modify any settings
in the Administrator Console.
• Administrator Console only: This user can log in to the Administrator
Console only.
• No Access: The user cannot log in to the Administrator Console or the User
Console.
You cannot change the role of the default admin account.
Locale The locale that is displayed when the user logs in to the Administrator Console or the
User Console.
Default Queue The queue used as the default for Service Desk tickets submitted by the user.
Mobile Device Enable or disable Mobile Device Access for the user. Mobile device access enables
Access you to interact with the KACE SMA using the KACE GO app on iOS and Android
smart phones and tablets. Administrators can use the app to access Service Desk,
inventory, and application deployment features.
NOTE: This field is available when mobile device access is enabled on the
appliance. See Configuring Mobile Device Access.
Associated (Read only) Assets assigned to the user. For each user, the list shows the asset
Assets name, its type (for example, Software or Device), and the asset subtype (if
applicable). You can sort the list by any column heading, as needed.
Assigned Devices Devices assigned to the user. For each user, the list shows the device name, its
subtype (if applicable), and an indication of whether a device is a primary user's
device. You can sort the list by any column heading, as needed.
To assign a device to a user, click , and select an asset. If you choose a device
that is already assigned to another user, the ownership of that device shifts to this
user.
The first device assigned to the user becomes the primary device by default. When
multiple devices are assigned to a user, any device can be set as a primary device.
3. Click Save.
Related topics
Add or edit User Roles
Configuring locale settings
About labels
Configuring Mobile Device Access
4. Manage the collection of custom fields, as needed, using the available controls.
5. Click Save.
NOTE: When user archival is enabled, user accounts can only be deleted only if they are marked as
archived.
1. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin. Or, if the
Show organization menu in admin header option is enabled in the appliance General Settings, select an
organization in the drop-down list in the top-right corner of the page next to the login information.
2. On the left navigation bar, click Control Panel > Users.
3. Complete one of the following steps:
• On the Users list, select one or more user accounts that you want to archive and select Choose
Action > Archive.
• On the Users list, click the name of the user that you want to archive. On the User Detail page that
appears, click Archive.
4. In the dialog box that appears, click Confirm.
The dialog box closes, and the Users list refreshes, indicating that the user is in the Archived state ( ).
5. If you want to review the details for an archived user, on the Users list, in the Name column, click the user
name.
The User Details page appears, showing the user details in read-only mode.
Next, you can delete archived user accounts, if needed.
Profile Login The name the user types in the Login ID field on
the login page.
NOTE: You cannot change the login of the
default admin account.
Update Password The password the user types when logging in.
If the Organization component is enabled on
your appliance, or if you want to link multiple K-
Series appliances, use caution when changing
the password of the admin account. Admin
account passwords for the System-level, for
organizations, and for linked appliances must be
the same if you want to switch among them using
the drop-down list in the top-right corner. The
drop-down list shows only those organizations
and appliances whose admin account passwords
are the same.
Service Desk Number The number of the Service Desk ticket the user
Tickets logged.
4. Optional. To access the User Detail page, in the top-left corner, click View Full Profile, and continue
reviewing and editing the user profile on that page.
NOTE: This link only appears if your account has administrative privileges.
5. To save your changes, click Update.
Local Enable local authentication (the default). If local authentication is enabled, the
Authentication password is authenticated against the existing entries in the local database at
Settings > Users.
LDAP Enable external user authentication using an LDAP server or Active Directory server.
Authentication If LDAP Authentication is enabled, the password is authenticated against the external
LDAP server.
For assistance with authentication, contact Quest Support at https://
support.quest.com/contact-support.
3. Click the buttons next to the server names to perform the following actions:
Button Action
Modify the server definition. For information about the fields in this section, see Table
5.
4. Optional: Click New to add an LDAP server. You can have more than one LDAP server configured.
NOTE: All servers must have a valid IP address or hostname. Otherwise, the operation times out,
which results in login delays when using LDAP authentication.
5. To add a server, provide the following information:
Table 5. Server information
Option Description
Host Name or IP The IP address or the hostname of the LDAP server. If the IP address is not valid, the
Address appliance waits to timeout, resulting in login delays during LDAP authentication.
NOTE: To connect through SSL, use an IP address or hostname. For
example: ldaps://hostname.
Port The LDAP port number, which is usually 389 (LDAP) or 636 (secure LDAP).
Login The credentials of the account the KACE SMA uses to log in to the LDAP server to
read accounts. For example:
LDAP Login:CN=service_account,CN=Users,
DC=company,DC=com.
If user name and password are not provided, the tree lookup is not performed.
Each LDAP Label can connect to a different LDAP or Active Directory server.
Password The password of the account the KACE SMA uses to log in to the LDAP server.
NOTE: These roles are predefined and you cannot edit them. However, you
can create and edit custom roles as needed.
NOTE: Record the search and filtering criteria you use for filling out this form. You use this same
information to import user data, and later to schedule user import on a regular basis.
6. Click Save.
7. Test authentication on an external LDAP server as follows:
a. Select the LDAP Authentication.
NOTE: User information is overwritten each time users are imported to the appliance. Password
information, however, is not imported. Users must enter their passwords each time they log in to the
Administrator Console or User Console.
Option Description
Server The IP address or the hostname of the LDAP server. If the IP address is not valid, the
appliance waits to timeout, resulting in login delays during LDAP authentication.
NOTE: To connect through SSL, use an IP address or hostname. For
example: ldaps://hostname.
Port The LDAP port number, which is usually 389 (LDAP) or 636 (secure LDAP).
OU=end_users,DC=company,DC=com.
NOTE: Use the LDAP Browser to specify the Search Base DN and Search
Filter. Use the LDAP Browser.
Login The credentials of the account the KACE SMA uses to log in to the LDAP server to
read accounts. For example:
LDAP Login:CN=service_account,CN=Users,
DC=company,DC=com.
If user name and password are not provided, the tree lookup is not performed. Each
LDAP Label can connect to a different LDAP or Active Directory server.
Password The password of the account the KACE SMA uses to log in to the LDAP server.
Maximum Number Enter the maximum number of rows to retrieve. This limits the result set that is
of Rows returned in the next step.
Debug Output Select the check box to view the debug output.
4. Click Next.
Option Description
Ldap Uid The identifier for the user. Recommended value: objectguid.
Email The email address for the user. Recommended value: mail.
Manager The manager of the user. This mapping is mandatory only if you want to retrieve the
manager information. Recommended value: manager.
IMPORTANT: To retrieve the manager object associated with the user, you
must also add the manager attribute to the Attributes to retrieve box.
The following attribute mappings are not required, but they are recommended:
Option Description
Api Enabled Whether users are enabled to access the KACE SMA using the KACE GO app.
Access is enabled if the field contains a numerical value. Access is disabled if the
field contains no value. Therefore, to enable access, select an attribute that returns a
numerical value. To disable access, select No Value.
Ams Id Not used in the KACE SMA 6.4 release. Recommended value: No Value.
6. Optional: In the Role drop-down list, select the role for the imported users. See Add or edit User Roles.
7. Optional: In the Labels drop-down list, select the label to apply to imported users. See About labels.
8. In the Search Results section below the attribute mapping drop-down lists, verify that the list of users to
import is correct, and the information listed for each user is what you expect. To refine your search, click the
Back button and revise the search parameters and attributes.
For example, to change the number of Search Results, change the Maximum Number of Rows on the
Choose attributes to import page.
9. Click Next to display the Import Data into the KACE SMA page.
10. Review the tables of users to ensure that the data is valid and includes the data that you expect.
Only users with values for the required attributes, Ldap Uid, User Name, Email, and Manager are imported.
Records that do not have these values are listed in the Users with invalid data section.
11. Click Import Now to start the import.
The Users page appears, and the imported users appear on the list. The imported users can access the features
of the Administrator Console, User Console based on the role to which they are assigned.
Option Description
Server The IP address or the hostname of the LDAP server. If the IP address is not valid, the
appliance waits to timeout, resulting in login delays during LDAP authentication.
NOTE: To connect through SSL, use an IP address or hostname. For
example: ldaps://hostname.
Port The LDAP port number, which is usually 389 (LDAP) or 636 (secure LDAP).
Login The credentials of the account the KACE SMA uses to log in to the LDAP server to
read accounts. For example:
LDAP Login:CN=service_account,CN=Users,
DC=company,DC=com.
If user name and password are not provided, the tree lookup is not performed. Each
LDAP Label can connect to a different LDAP or Active Directory server.
Password The password of the account the KACE SMA uses to log in to the LDAP server.
IMPORTANT: To retrieve the manager object associated with the user, you
must add the manager attribute to the list, and to specify this mapping in a
later step.
Maximum Number Enter the maximum number of rows to retrieve. This limits the result set that is
of Rows returned in the next step.
Debug Output Select the check box to view the debug output.
4.
In the Email Recipients section, click the Edit button to enter the recipient’s email address .
5. Select users in the Recipients drop-down list.
6. In the Schedule section, specify schedule options:
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
This option is useful if you want to patch servers manually, or perform patch actions
that you do not want to run on a schedule.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the nth day every month, (for example, the first or the second) day of every
of every month/ month, or a specific month, at the specified time.
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
7. Click Next to display the User Import: Schedule - Define mapping between User attributes and LDAP
Attributes page.
8. In the drop-down list next each attribute, select the value to use for KACE SMA User attributes during
import. Values in the drop-down list are the values specified in the Attributes to retrieve field on the previous
page.
The following attribute mappings are required:
Option Description
Ldap Uid The identifier for the user. Recommended value: objectguid.
Email The email address for the user. Recommended value: mail.
Manager The manager of the user. This mapping is mandatory only if you want to retrieve the
manager information. Recommended value: manager.
IMPORTANT: To retrieve the manager object associated with the user, you
must also add the manager attribute to the Attributes to retrieve box.
The following attribute mappings are not required, but they are recommended:
Api Enabled Whether users are enabled to access the KACE SMA using the KACE GO app.
Access is enabled if the field contains a numerical value. Access is disabled if the
field contains no value. Therefore, to enable access, select an attribute that returns a
numerical value. To disable access, select No Value.
Ams Id Not used in the KACE SMA 6.4 release. Recommended value: No Value.
9. Optional: In the Role drop-down list, select the role for the imported users. See Add or edit User Roles.
10. If you want the selected role to be a default role for new roles, select the Make default check box.
11. Optional: In the Labels drop-down list, select the label to apply to imported users. See About labels.
12. In the Search Results section below the attribute mapping drop-down lists, verify that the list of users to
import is correct, and the information listed for each user is what you expect. To refine your search, click the
Back button and revise the search parameters and attributes.
For example, to change the number of Search Results, change the Maximum Number of Rows on the
Choose attributes to import page.
13. Click Next to display the Import Data into the KACE SMA page.
14. Review the tables of users to ensure that the data is valid and includes the data that you expect.
Only users with values for the required attributes, Ldap Uid, User Name, Email, and Manager, are imported.
Records that do not have these values are listed in the Users with invalid data section.
15. Do one of the following:
• Click Back to change settings.
• Click Import to save the schedule and import user information immediately. The import begins, and
the schedule is set to run according to the options selected in Scheduling section.
• Click Finish to save the schedule without importing user information. The schedule is set to run
according to the options selected in the Scheduling section.
User information is imported according to the specified schedule.
Domain The host name of the domain of your Active Directory® server, such as example.com.
Username The user name of the administrator account on the Active Directory server. For
example, username@example.com.
Password The password of the administrator account on the Active Directory server.
Computer Object The name of the computer object container of the administrator account on the Active
Container Directory server.
Computer Object The name of the computer object container of the administrator account on the Active
Name Directory server.
Service Account The name of the service account container of the administrator account on the Active
Container Directory server.
3. Click Join.
The appliance performs the following tests, which require read-only permission, to determine whether the
domain is configured correctly to allow the KACE SMA to join the domain:
◦ Check for supported operating system and correct operating system patches
◦ Check for sufficient disk space to install QAS
◦ Check that the hostname of the system is not 'localhost'
◦ Check if the name service is configured to use DNS
◦ Check resolv.conf for proper formatting of name service entries and that
the host can be resolved
◦ Check for a name server that has the appropriate DNS SRV records for Active
Directory
◦ Detect a writable domain controller with UDP port 389 open
◦ Detect Active Directory site if available
◦ Check if TCP port 464 is open for Kerberos kpasswd
◦ Check if UDP port 88 and TCP port 88 are open for Kerberos traffic
◦ Check if TCP port 389 is open for LDAP
◦ Check for a global catalog server and if TCP port 3268 is open for
communication with global catalog servers
◦ Check for a valid time skew against Active Directory
◦ Check for the QAS application configuration in Active Directory
◦ Check if TCP port 445 is open for Microsoft CIFS traffic
These tests do not need write access and they do not check for permission to write to any directory. In
addition, these tests do not verify username and password credentials. If the credentials are incorrect, the
KACE SMA might not be able to join the domain even if the tests are successful.
A message appears stating the results of the test. To view errors, if any, click Logs, then in the Log drop-
down list, select Server Errors.
4. Optional: Select Force Join to join the server to ignore errors and join the domain.
5. Click Save and Restart Services.
When users are logged in to devices that are joined to the Active Directory domain, they can access the KACE
SMA User Console without having to re-enter their credentials. If users are on devices that are not joined to the
Active Directory domain, the login window appears and they can log in using a local KACE SMA user account.
See Add or edit System-level user accounts.
NOTE: To use single sign on with Internet Explorer and Firefox browsers, users must configure their
browser settings to use the appropriate authentication. See Configuring browser settings for single sign on.
The Administrator Console or User Console appears, depending on user account privileges.
To create a Replication Share, identify one device at each remote location to act as a Replication Device.
The appliance copies all the replication items to the Replication Device at the specified destination path. The
replication process automatically restarts if it is stopped due to a network failure or replication schedule. If
stopped, the replication process restarts at the point it was stopped.
Sneaker net share: You can create a folder and copy the contents of an existing replication folder to it. You can
then specify this folder as the new replication folder in the appliance. The appliance determines whether the new
folder has all the replication items present and replicates only the new ones, which conserves bandwidth. You can
Path The path the Replication device uses for the Replication Share. Applications are
copied from the KACE SMA to this location. For a local drive, use local drive syntax,
for example: C:\kace_sma_share
For a network drive, use UNC format, for example: \\kaceRep\kace_sma_share\
NOTE: $ notation, for example \\KaceRep\e$, is not supported.
Credentials The details of the service account required to connect to the device and run
commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed.
See Add and edit User/Password credentials.
Label The label of the devices using the Replication Share. Verify that the selected label
does not have KACE_ALT_LOCATION specified. KACE_ALT_LOCATION takes
precedence over the Replication Share for downloading files to devices.
Path The path used by devices in the replication label to copy items from the replication
drive.
For example, a UNC path:
\\fileservername\directory\kace_sma\
Other devices need read permission to copy replication items from this shared folder.
Credentials The details of the service account required to connect to the device and run
commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed.
See Add and edit User/Password credentials.
High Bandwidth The maximum bandwidth to use for replication. If this field is blank, the maximum
bandwidth available for replication is used. This field is specified in bytes per second.
Low Bandwidth The restricted bandwidth to use for replication. If this field is blank, the maximum
bandwidth available for replication is used. This field is specified in bytes per second.
Schedule table The bandwidth used for each hour of the day (24-hour clock format) and each day of
the week.
• To change the bandwidth selection, click in a square.
• To select hours (columns), click the hour number.
• To select days (rows), click the day of the week.
Bandwidth is color-coded:
• White: Replication is off
• Light blue: Replication is on with low bandwidth
• Blue: Replication is on with high bandwidth
Copy Schedule Select an existing Replication Schedule in the drop-down list to replicate items
From according to that schedule.
NOTE: The Credentials Management drop-down list is not available on LDAP configuration pages, and
the feature is not used to manage user credentials for accessing the KACE SMA Administrator Console
or User Console, which use single sign on and LDAP authentication. See About user accounts and user
authentication.
Option Description
Name A unique name for the credential. This name appears on the Credentials
Management list and in the credential selection drop-down lists in component
sections, such as Scripting. This name is used for identification in Administrator
Console, and it is not part of the actual credential on the target device.
Type The classification of the credential. Select Secret Key to specify credentials that
contain secret keys from the KACE Cloud Mobile Device Manager.
Secret The secret key of the KACE Cloud Mobile Device Manager environment.
Show typing Show the characters in the Password field on the Add Credential form. This option is
available only when you are adding credentials. If you are editing existing credentials,
the password characters cannot be displayed.
Notes Any additional information you want to provide about the credential.
4. Click Save.
The credential appears on the Credentials Management list and it is available for selection in components
that use credentials.
Name A unique name for the credential. This name appears on the Credentials
Management list and in the credential selection drop-down lists in component
sections, such as Scripting. This name is used for identification in Administrator
Console, and it is not part of the actual credential on the target device.
Type The classification of the credential. Select User/Password to specify credentials that
have usernames and passwords.
Show typing Show the characters in the Password field on the Add Credential form. This option is
available only when you are adding credentials. If you are editing existing credentials,
the password characters cannot be displayed.
Notes Any additional information you want to provide about the credential.
4. Click Save.
The credential appears on the Credentials Management list and it is available for selection in components
that use credentials.
Name A unique name for the credential. This name appears on the Credentials
Management list and in the credential selection drop-down lists in component
sections, such as Scripting. This name is used for identification in Administrator
Console, and it is not part of the actual credential.
Type The classification of the credential. Select Google OAuth to specify credentials for
Chrome devices.
Show typing Show the characters in the Client Secret field on the Add Credential form. This
option is available only when you are adding credentials. If you are editing existing
credentials, the characters in the Client Secret field cannot be displayed.
Approval Code The approval code for access. To obtain this code, provide your Client ID and Client
Secret, then click Generate a new code.
Notes Any additional information you want to provide about the credential.
4. Click Save.
The credential is available for selection in components that use credentials.
Name A unique name for the credential. This name appears on the Credentials
Management list and in the credential selection drop-down lists in component
sections, such as Scripting. This name is used for identification in Administrator
Console, and it is not part of the actual credential.
Type The classification of the credential. Select SNMP to specify SNMP credentials.
Community String For SNMP v1 or v2c, the community string to query. The default is Public. The Public
String is required for SNMP v1 or v2c.
Notes Any additional information you want to provide about the credential.
SNMP v3 SNMP credentials that require authentication and encryption algorithms to increase
security.
Security Name For SNMP v3, the name of the USM (user-based security model) user account. This
account, and any passwords required for authentication and encryption, must be set
up on target devices.
Security Level For SNMP v3, the level of security. Security levels include:
• authPriv: The highest level of SNMP v3 security, which uses both
authentication and encryption. To use this level, you must specify all the SNMP
V3 Authentication and Privacy settings.
• authNoPriv: The mid-range of SNMP v3 security, which uses authentication
only. Communications are not encrypted. To use this level, you must specify
the Authentication settings.
• noAuthNoPriv: The lowest level of SNMP v3 security. Communications are
not encrypted.
Authentication For SNMP v3, the password used to authenticate communications when authPriv or
Password authNoPriv security levels are selected. This password is associated with the USM
user and must be set up on target devices.
Protocol For SNMP v3, the protocol used for communications. Protocols include:
• SHA: Secure hash algorithm, SHA-1.
• MD5: Message Digest 5. Faster than SHA, but considered to be less secure.
Privacy Password For SNMP v3, the password used to authenticate communications when the authPriv
security level is selected. This password is associated with the USM user and must
be set up on target devices.
Protocol For SNMP v3, the protocol used for the privacy password. Protocols include:
• DES: Data Encryption Standard. This algorithm has a 56-bit key size and is
considered to be less secure than AES.
• AES: Advanced Encryption Standard. The appliance supports the 128-bit key
size.
Notes Any additional information you want to provide about the credential.
6. Click Save.
The credential is available for selection in components that use credentials.
NOTE: If the Organization component is enabled on your appliance, you create credential reports for each
organization separately.
1. Go to the Credentials Management page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Settings, then click Credentials.
2. Select Choose Action > Create Report.
3. On the Report Detail page, provide a name for the report.
4. Select additional report settings, then click Save. See Create reports from list pages.
The report appears on the Reports list.
5. To generate the report, select a format in the Generate Report column.
NOTE: If the Organization component is enabled on your appliance, you export credential information for
each organization separately.
1. Go to the Credentials Management page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Settings, then click Credentials.
2. Select Choose Action > Export, then select whether to export all credentials or only the selected
credentials, and select the format for the exported information.
3. Open or save the exported file.
Delete credentials
You can delete credentials provided that they are not being used in any components, such as Inventory,
Distribution, or Scripting.
• Credentials have been removed from any components that are using them. See View credential usage.
• You have administrator privileges in the Administrator Console
1. Go to the Credentials Management page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
Configuring assets
You can configure assets and Asset Types as needed.
Widget Description
Assets By Type This widget shows a donut chart, where each section of the chart indicates the
percentage of your assets by their asset type, such as device, software, location,
license, and others. Hovering over each section of the chart displays the percentage
of the assets of the selected type.
Assets By Status This widget shows a donut chart, where each section of the chart indicates the
percentage of your assets by their status, such as Active, Disposed, Missing, or
other. Hovering over each section of the chart displays the percentage of the assets
in the selected status.
Cost ($) of Unused This widget shows a bar chart, where each bar represents the cost of unused
Licenses By licenses for each product. You can use this information to reassign or cancel unused
Product licenses, and to redirect your resource where they are most needed.
License If you have created License assets for software, this widget shows the number of
Compliance Agent-managed devices that have a particular licensed software installed, and the
number of licenses available. If the Organization component is enabled on your
appliance, the widget shows the information for the selected organization.
License assets can be created for applications listed on the Software page and the
Software Catalog page, and the license mode for applications must be Unit License
or Enterprise for license information to appear on this widget. Applications with other
license modes, such as Shareware, Freeware, or Not Specified, are not displayed on
this widget.
This widget is for information only, and the KACE SMA does not enforce license
compliance. For example, the appliance does not prevent software from being
installed on Agent-managed devices if a license is expired or otherwise out of
compliance.
The following colors indicate threshold levels:
• Red: Usage is at or above the critical threshold setting.
• Orange: Usage is at or above the warning threshold setting but below the
critical threshold setting.
• Green: Usage is below the warning threshold setting.
To change the threshold levels, see Configure appliance General Settings without the
Organization component.
Software Titles This widget displays the software titles defined in the Software Catalog, with the
highest number of installations on managed devices. If the Organization component
is enabled on your appliance, the widget shows the information for the selected
organization.
Software This widget displays the publishers defined in the Software Catalog, with the
Publishers highest number of software titles installed on managed devices. If the Organization
component is enabled on your appliance, the widget shows the information for the
selected organization.
Assets by Location This widget shows a donut chart, where each section of the chart indicates the
percentage of your assets by their location. Hovering over each section of the chart
displays the percentage of the assets in the selected location.
Software Installed This widget shows a bar chart, where each bar represents a software title and the
But Not Used in 60 corresponding number of instances of that product that have not been in use in the
Days last 60 days. You can use this information to further investigate whether these titles
are needed, to reassign or uninstall unused software, and to redirect your resource
where they are most needed.
Expiring This widget shows a vertical bar chart, where each bar represents the number of
Software License software licenses that are about expire in the given time period.
Maintenance
Expired Software This widget shows a donut chart representing the ration of expired and current
License licenses. Hovering over each section of the chart displays the percentage of the
Maintenance software licenses that are either expired or current, as selected.
Expiring Contracts This widget shows a vertical bar chart, where each bar represents the number of
contracts that are about expire in the given time period.
Expired Contracts This widget shows a donut chart representing the ration of expired and current
contracts. Hovering over each section of the chart displays the percentage of the
contracts that are either expired or current, as selected.
Software License If you set up License assets for software, and specify the license type, such as site,
Configuration subscription, or unit, that information is displayed in this widget. If the Organization
component is enabled on your appliance, the widget shows the information for the
selected organization.
The type of Asset information includes details Inventory information includes details
information about devices, software, licenses, about devices and the software,
managed physical assets, logical assets, and the processes, startup programs, and
relationships between them. services on managed devices. The
Software Catalog provides additional
information about applications that
are categorized as Discovered or Not
Discovered.
How the Asset information is static and changes Inventory information is automatically
information is only when you import data or change it generated and overwritten each time
managed manually. Device assets are exceptions managed devices report data to the
to this rule, because Device assets are appliance.
updated whenever managed devices
report inventory. For License assets,
however, the number of installations or
seats is updated when managed devices
How licenses are The Asset Management component On the Software page, inventory
tracked enables you to manage software License information includes the number of
Compliance as well as physical and Software assets, but it does not show the
logical assets. number of licenses.
On the Software Catalog page, license
information is displayed if License assets
are associated with applications.
Barcode Data The barcode number. Barcode numbers are always unique, they cannot
be shared between multiple assets. However, it is possible for an active
asset to share a barcode with an archived asset.
Barcode Name The barcode tag associated with this asset type. There can be only one
barcode of the same type per asset.
Barcode Format The barcode format. For example, UPC-A, Code 11, or UPC-E.
TIP: Alternatively, you can change the asset or device owner on the Asset Detail or Device Detail
page.
To add a barcode, click , type the barcode name, and click Save.
6.
In the Asset Fields area, click .
A new line appears.
7. Provide the following information:
Item Description
Name The name of the custom asset field, such as Asset Code, Purchase Date, or Building
Address Line 1. This name appears on the form used to create assets of the selected
Asset Type.
Available Values The values that appear in fields that contain lists of values. This field is enabled when
you select Single Select or Multiple Select from the Type drop-down list. If you
select Single Select or Multiple Select, you must enter at least one value in this
field. To use multiple values, separate each value with a comma.
Default Values The value that appears in the field by default. If you select Single Select or Multiple
Select from the Type drop-down list, you must type one of the values given in the
Available Values field.
Required Whether the field is mandatory or optional. If this check box is selected, users must
enter a value in the field when creating assets of the selected type.
Multiselect Whether the asset field points to other assets. A check box is enabled when you
select Assets Asset Type from the Type drop-down list. Select the check box to allow
this custom field to point to multiple records.
For example, you might want a field to point to multiple devices that are approved for
a particular license. In that case, you would select the check box. To create a single
relationship field, such as a printer that is used by only one department, clear the
check box.
NOTE: When you create an asset, this field is populated with the available
assets of the specified Asset Type. The field is empty if there are no assets of
the specified type.
Section License assets only. The tab on which this field appears on the License Detail page:
General, Purchase, Maintenance, Related, Custom, or Notes. For more information
about the tabs appearing on the License Detail page, see Add or edit licenses.
Device Section Device assets only. The location, on the Device Detail page, where the field is
reported. For example, if you are creating a printer Asset Subtype, with a field
named Toner Level, you might select Hardware because that field is related to printer
hardware. However, you can choose any section in the drop-down list for any field.
8. Click Save at the end of the row, then click Save at the bottom of the page.
CAUTION: If you change the default Asset Type, you lose the asset history prior to the change because
the appliance automatically creates assets with the new information. Therefore, it is important to decide
whether you want to change the default values as early as possible in the setup process.
In addition, you can choose whether to show or hide the details that appear for each Device Asset Subtype on
the Device Detail page. For example, you can hide information that is irrelevant to printers, such as Installed
Programs, Discovered Software, and Metered Software, from the Device Detail page of assets with the subtype
Printer.
NOTE: If the Organization component is enabled on your appliance, you manage Asset Subtypes for each
organization separately.
1. Go to the Asset Type Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Asset Management, then click Asset Types.
c. Display the Asset Type Detail page by doing one of the following:
▪ Click the name of an Asset Type.
▪ Select Choose Action > New.
2. In the Subtypes section, click Add Subtype.
NOTE: In a default installation, Device Assets include two Asset Subtypes for printer devices: Laser
Printer: Color and Laser Printer: Monochrome. Each of these subtypes provides a common set of
fields that apply to most printers. The appliance also comes with a set of printer templates for typical
SNMP-enabled printer models, based on these Asset Subtypes. You can edit these templates or
add new ones, as needed. When you apply a printer template to a device, the data defined in the
template, such as toner levels or descriptions, is collected for the printer in the next inventory cycle.
For more information, see About printer templates.
The Asset Subtype Detail page appears. The Inherited Fields section shows fields that are available to the
Asset Subtype because they have been added to the Asset Type.
3. In the top section, provide the following information and choose whether to make the Asset Subtype the
default:
Option Description
4.
In the Subtype Fields section, click the Add button in the heading row on the right side of the table: .
5. Provide the following information:
Item Description
Name The name of the Asset Subtype. This name identifies the Asset Subtype on the Asset
Detail page.
Available Values The values that appear in fields that contain lists of values. This field is enabled when
you select Single Select or Multiple Select from the Type drop-down list. If you
Default Values The value that appears in the field by default. If you select Single Select or Multiple
Select from the Type drop-down list, you must type one of the values given in the
Available Values field.
Required Whether the field is mandatory or optional. If this check box is selected, users must
enter a value in the field when creating assets of the selected type.
Multiselect Whether the asset field points to other assets. A check box is enabled when you
select Assets Asset Type from the Type drop-down list. Select the check box to allow
this custom field to point to multiple records.
For example, you might want a field to point to multiple devices that are approved for
a particular license. In that case, you would select the check box. To create a single
relationship field, such as a printer that is used by only one department, clear the
check box.
NOTE: When you create an asset, this field is populated with the available
assets of the specified Asset Type. The field is empty if there are no assets of
the specified type.
Device Section The location, on the Device Detail page, where the field is reported. For example, if
you are creating a printer Asset Subtype, with a field named Toner Level, you might
IMPORTANT: For SNMP devices, you must assign the appropriate Asset Subtype when the device is
configured. You cannot add or change SNMP Asset Subtypes after they have been configured.
1. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin. Or, if the
Show organization menu in admin header option is enabled in the appliance General Settings, select an
organization in the drop-down list in the top-right corner of the page next to the login information.
2. Click Inventory to display the Devices page.
3. To filter the list to show only those devices that are assigned to a subtype:
a. Click the Advanced Search tab above the list on the right to display the Advanced Search panel.
b. Specify the criteria required to find devices.
c. Click Search.
TIP: You can also use the View By drop-down list to identify devices that belong to a specific
Asset Subtype.
4. Select the check boxes next to the devices you want to assign to a subtype. To select all devices, click the
check box next to Name at the top of the table.
5. Select Choose Action > Change Subtype to.
The subtype is selected, and the change is reflected on the Device Detail page the next time inventory is
reported for the device.
IMPORTANT: For SNMP devices, you must assign the appropriate Asset Subtype when the device is
configured. You cannot add or change SNMP Asset Subtypes after they have been configured.
1. Go to the Assets list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Asset Management, then click Assets.
2. To filter the list to show only those assets that are assigned to a subtype:
a. Click the Advanced Search tab above the list on the right to display the Advanced Search panel.
b. Specify the criteria required to find the assets whose subtypes you want to assign or change.
c. Click Search.
TIP: You can also use the View By drop-down list to identify assets that belong to a specific
Asset Subtype.
3. Select the check boxes next to the assets you want to assign to a subtype. To select all assets, click the
check box next to Name at the top of the table.
4. Select View By > Asset Type > Device, and select one of the available entries in the list. For example, to
display all device assets, select All Device Subtypes.
5. Select Choose Action > Change Subtype to.
The selected assets are assigned to the selected subtype.
TIP: As an alternative to manually updating custom assets fields, you can import information from
spreadsheets. See Importing license data in CSV files.
1. Go to the Asset Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Asset Management, then click Assets.
c. Click the name of the asset you want to update.
2. Modify the custom asset fields as needed.
3. Click Save.
NOTE: Software assets are not required to set up License Compliance for applications in the Software
Catalog inventory. See About License Compliance for Software Catalog applications.
If the Organization component is enabled on your appliance, you create Software assets for each organization
separately.
Location Select the location for this asset from the drop-
down list. The values in this list contain all locations
defined on the appliance. See Managing locations
TIP: Locations can be defined for all default
asset types, including Cost Centers,
Departments, Devices, Licenses, Software,
and Vendors.
Software Label Select a label from the drop-down list. The list is
empty unless you have created a Smart Label. You
can type in the box to look for specific labels.
Barcode Format
a. In the Name field, enter a name for the asset. For example, Office Pro SW Asset.
b. Optional: In the Software field, select the name of the application to associate with the asset. To
search for items, begin typing in the field.
c. Optional: In the Software Label field, select a label in the Select label drop-down list. The list is
empty unless you have created a Smart Label. To filter the labels list, enter a few characters of
the label name in the Filter field.
3. Click Save.
The new asset appears on the Assets list.
Barcode Data The barcode number. Barcode numbers are always unique, they cannot
be shared between multiple assets. However, it is possible for an active
asset to share a barcode with an archived asset.
Barcode Name The barcode tag associated with this asset type. There can be only one
barcode of the same type per asset.
Barcode Format The barcode format. For example, UPC-A, Code 11, or UPC-E.
Pending Archive state ( ). When the Pending Archive period expires, the appliance archives the device
Asset, and it enters the Archived state ( ).
5. If you want to remove a device Asset from the Pending Archive state:
TIP: Before importing new data, consider running a report to export the current data. That way you can
return to the original data if there is anything wrong with the structure of the new data.
Manage locations
Locations represents physical sites containing one or more of your assets. They are based on location types.
You can add, move, or delete location entities, or export location details into a file, as needed.
1. Go to the Locations list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Asset Management, then click Locations.
2. To add a location, select Choose Action > New.
See Add or edit locations for more information.
3. To delete a location:
a. Select the row containing the location that you want to delete.
b. Select Choose Action > Delete.
c. Optional. In the Delete location dialog box that appears, specify the replacement location to
which you want to move all the assets associated with the location you are about to delete.
d. Click Confirm.
NOTE: Deleting a parent location does not remove its child locations from the system.
4. To move a location:
a. Select the row containing the location that you want to move.
b. Select Choose Action > Move.
c. In the Move location dialog box that appears, specify the parent location to which you want to
move the location.
d. Click Confirm.
The Locations list refreshes, no longer showing the newly moved locations. To view child locations
associated with the specific parent, in the row containing the parent location, click on the right of the
location name.
5. In the Name field, add or change the name as needed.
TIP: Additional options are available for Device and License Asset Types. See About customizing
the Device Asset Type and Customize the License Asset Type.
6. To export one or more locations to a file:
a. Select the rows containing the locations that you want to export.
b. Select Choose Action > Export, and then choose the appropriate option.
For example, to export all locations to a CSV file, select them in the list, and then select Choose
ActionExportExport All To CSV Format.
You can import location information from a file using the Import Assets wizard. For more information, see
Importing asset data using CSV files.
Name The name of the Location Subtype. This name appears in the list on the Location
Detail page.
Default Indicates whether to use the Location Subtype as the default for new locations. If you
select this check box, new locations are automatically assigned to this Asset Subtype.
You can change this setting any time.
Inherited Fields This section displays the default location fields. You cannot make any changes to this
section.
Subtype Fields
Add any fields that are specific to this Subtype, as needed. To add a field, click ,
and specify the required information.
c. Click Save.
3. If you want the locations to use barcodes, specify one or more tags in the Barcode Tags area.
Any locations that you create going forward will have the barcode tags available for configuration. For
example, if you specify a Corporate Tag and a Dell Location Tag, barcodes identified with these two tags
will be available for selection in on the Location Detail page, when you create or edit a location.
To add a barcode, click , type the barcode name, and click Save.
4. Specify additional location fields, as needed.
a.
To add a field, in the Asset Fields area, click .
b. Provide the following information for each new field:
Option Description
Available Values The values that appear in fields that contain lists of values. This field is enabled when
you select Single Select or Multiple Select from the Type drop-down list. If you
select Single Select or Multiple Select, you must enter at least one value in this
field. To use multiple values, separate each value with a comma.
Required Indicates whether the field is mandatory or optional. If this check box is selected,
users must enter a value in the field when creating assets of the selected type.
c. Click Save.
5. Click Save.
Managing contracts
A contract is a form of purchase agreement between the vendor and the end user, that describes the usage
terms. Contracts can be associated with software and hardware items your business uses, and also for physical
items such as office furniture or coffee machines.
You can add, edit, or delete contracts, as needed.
Manage contracts
Contracts represent purchase or service agreements for hardware and software items your business uses, and
also for any physical products or services, such as office chairs or coffee suppliers.
You can add, edit, or delete contracts, or export contract details into a file, as needed.
1. Go to the Contracts list:
Option Description
Subtype The subtype assignment for this contract asset, if applicable. None
indicates that the asset is not assigned to a subtype.
You can specify the contract subtypes in the applicable contract Asset
Subtype (Contract-Software, Contract-Hardware, or Contract-Other).
For more information about asset subtypes, see About Asset Subtypes,
custom fields, and device detail preferences.
Asset Status The contract status, if applicable. You can select a default asset status,
or a custom one (if they exist). A default installation of the KACE SMA
includes the following asset statuses:
• Active: Any asset that is deployed, active, or in use.
• Disposed: An asset that is no longer available for use.
• Expired: A software license or contract asset that has expired.
• In Stock: A recently received asset.
• Missing: Any asset that cannot be located.
• Repair: An asset that is being repaired.
• Reserved: An asset that is set aside for a specific person or use.
• Retired: Any asset that reached its end-of-life state, or is no longer
in use.
• Stolen: An asset that has been reported as stolen.
For more information, see View and configure asset lifecycle settings.
Publisher Program Software contracts only. The entries available for selection are
populated from the Software Catalog, depending on what you set in the
Publisher field. When you select a Publisher, the entries available for
selection in this field are populated with the program entries associated
with the selected Publisher, that exist in your Software Catalog.
Vendor The name of the vendor associated with the contract. You can select from
the available vendor entries.
Vendor Agreement Number The number of the vendor agreement associated with the contract.
Hardware Type Hardware contracts only. The type of the hardware device associated
with this contract, such as laptop or server.
Hardware Series Hardware contracts only. The series of the hardware device associated
with this contract.
Hardware Model Hardware contracts only. The model number of the hardware device
associated with this contract.
Purchase Order Number The number of the purchase order associated with the contract.
Purchase Order Date The date of the purchase order associated with the contract.
Linked Contract Another contract that is associated with this contract entry.
Contact Email The contact email address associated with the contract.
Contact Phone The contact phone number associated with the contract.
Barcode Data The barcode number. Barcode numbers are always unique, they cannot
be shared between multiple assets. However, it is possible for an active
asset to share a barcode with an archived asset.
Barcode Name The barcode tag associated with this asset type. There can be only one
barcode of the same type per asset.
Barcode Format The barcode format. For example, UPC-A, Code 11, or UPC-E.
4. Review the information in the Service Desk section. If you are editing an existing contract associated with
one or more Service Desk tickets, they are listed in this section.
5. Review the information in the Related Assets section. If you are editing an existing contract associated with
one or more licenses, they are listed in this section.
6. Click Save.
Managing licenses
A license agreement allows you to use a logical or physical asset, such as software or hardware.
You can add, edit, or delete licenses, as needed, and associate them with your physical or logical assets.
Subtype The Asset Subtype to associate with the license. See About Asset Subtypes, custom
fields, and device detail preferences.
Asset Status The license status, if applicable. You can select a default asset status, or a custom
one (if they exist). A default installation of the KACE SMA includes the following asset
statuses:
• Active: Any asset that is deployed, active, or in use.
• Disposed: An asset that is no longer available for use.
• Expired: A software license or contract asset that has expired.
• In Stock: A recently received asset.
• Missing: Any asset that cannot be located.
• Repair: An asset that is being repaired.
• Reserved: An asset that is set aside for a specific person or use.
• Retired: Any asset that reached its end-of-life state, or is no longer in use.
• Stolen: An asset that has been reported as stolen.
For more information, see View and configure asset lifecycle settings.
Location The name of the location where the asset is located. See Managing locations.
Name The name of the license, such as Office Professional PO #1234. This is the name
that you use to find the asset. If you plan to have multiple licenses associated with an
application, provide the purchase order number or purchase date in the fields below to
differentiate the licenses.
License Count The number of installations or seats the license allows. For example, 50.
Applies to Applications in the Software Catalog inventory to which the license applies. You
Cataloged can associate License assets with multiple applications in the Software Catalog if
Software necessary. However, it is not necessary to associate a License asset with multiple
versions of the same application because the appliance does this automatically to
support upgrades and downgrades. You can simply associate the current version with
the License asset when you add the license information.
In addition, if you assign applications from different publishers, such as Microsoft Office
and Adobe Acrobat, to the same License asset, the total number of seats specified in
the License asset is assigned to each application. For example, if the License asset
has 100 seats, both Microsoft Office and Adobe Acrobat are assigned 100 seats.
Applies to Leave this field blank. A software license cannot be associated with applications from
Software the Software Catalog inventory and the Software page inventory at the same time.
For more information on how to create license assets for cataloged software, see Add
License assets for Software page inventory.
License Mode The mode of the License asset. For applications that require licenses, and to display
license usage information on the License Compliance page, select either Enterprise or
Unit License.
NOTE: Most modes, including Not Specified, Client License, Subscription,
Shareware, Freeware, OpenSource, No Licensing, and Site License, are not
used for License Compliance.
3. Click Next.
4. On the License Asset Detail page, on the Purchase tab, provide the following information:
Option Description
Applies to Applications in the Software Catalog inventory to which the license applies. You
Cataloged can associate License assets with multiple applications in the Software Catalog if
Software necessary. However, it is not necessary to associate a License asset with multiple
versions of the same application because the appliance does this automatically to
support upgrades and downgrades. You can simply associate the current version with
the License asset when you add the license information.
In addition, if you assign applications from different publishers, such as Microsoft Office
and Adobe Acrobat, to the same License asset, the total number of seats specified in
the License asset is assigned to each application. For example, if the License asset
has 100 seats, both Microsoft Office and Adobe Acrobat are assigned 100 seats.
Product Key The product key associated with the license. You can modify and edit the default
information, which can be captured for a License Asset Type.
Unit Cost The unit cost associated with the license. You can modify and edit the default
information, which can be captured for a License Asset Type.
Vendor The name of the Vendor asset you want to associate with the application. the Vendor
drop-down list is empty unless you have added a Vendor asset. To search for a vendor,
begin typing in the list.
NOTE: Assigning multiple vendors to a single software License asset is
not recommended because it can result in inaccurate License Compliance
information.
Purchase Order The purchase order number associated with the license.
Number
Purchase Date The date the purchase was made. Click in the field, then select a date on the calendar.
Purchase Select one or more purchase records associated with this license. See Managing
purchase records.
5. Click Next.
6. On the License Asset Detail page, on the Maintenance tab, provide the following information:
Option Description
Includes Indicates if the license includes upgrade rights. Upgrade rights refer to the ability to
Upgrade Rights upgrade to a newer version of the licensed software, when such versions become
Includes Whether the license entitles users to upgrade the installed version of the application.
Maintenance See About License Compliance for Software Catalog applications.
Expiration Date If the license includes maintenance, the expiration date of the maintenance period.
The KACE SMA License Compliance feature leverages Software Catalog information,
such as application release dates. If new application versions are released during the
maintenance period, they are automatically covered by this License asset.
Includes Indicates if the license includes downgrade rights. Downgrade rights refer to the ability
Downgrade to apply licenses for newer software versions to older versions of the same software.
Rights For more information, see About license downgrades. Select one of the following
options:
• Yes: Downgrade rights are calculated by comparing the number of existing
licenses for the selected software with the counts of available licenses for older
versions of the same software.
• Yes - Select from list: Choose one or more software versions for which you
want to grant downgrade rights. Under Downgrade Software list, click Select
cataloged software to add. The list that appears is populated with lower
versions of the selected software to which the license can be downgraded. When
you click an entry in the list, your selection appears in the Downgrade Software
list box. You can add one or more versions, as needed. To delete an item from
the list, select it in the Downgrade Software list box, and click Remove.
• No: If you do not want to grant downgrade rights to the selected software, select
this option.
7. Click Next.
8. On the License Asset Detail page, on the Related tab, provide the following information:
Option Description
Cost Center The cost center associated with the department that owns the application.
Approved for The devices that are approved to use the license. This information is used in License
Device Compliance reporting. For example, if devices have the application installed, but
are not on the list of approved devices, the devices are listed in the report titled,
Barcodes Add or edit barcodes associated with this license, as required. For more information,
see Add barcodes to assets.
9. Click Next.
10. On the License Asset Detail page, on the Custom tab, provide additional custom data. You can modify the
License Asset Type to include as many additional fields as necessary to meet your business objectives. For
more information, see Add or customize Asset Types.
11. Click Next.
12. On the License Asset Detail page, on the Notes tab, provide the following information:
Option Description
License Text Any supplemental information about the license, such as a license number.
Subtype The Asset Subtype to associate with the purchase record. You can create purchase
records for Hardware or Software items. See About Asset Subtypes, custom fields, and
device detail preferences.
Asset Status The purchase record status, if applicable. You can select a default asset status, or a
custom one (if they exist). A default installation of the KACE SMA includes the following
asset statuses:
• Active: Any asset that is deployed, active, or in use.
• Disposed: An asset that is no longer available for use.
• Expired: A software license or contract asset that has expired.
• In Stock: A recently received asset.
• Missing: Any asset that cannot be located.
• Repair: An asset that is being repaired.
• Reserved: An asset that is set aside for a specific person or use.
• Retired: Any asset that reached its end-of-life state, or is no longer in use.
• Stolen: An asset that has been reported as stolen.
For more information, see View and configure asset lifecycle settings.
Location The name of the location where the asset obtained with this purchase is located. See
Managing locations.
Name The name of the purchase record, such as Office Professional PO #1234. This is
the name that you use to associate this purchase order with a license agreement, as
applicable.
Purchase Order The number of the purchase order issued by your organization.
Number
Purchase Order The date on which your organization issued the purchase order.
Date
Vendor The name of the vendor that the unit is purchased from.
Vendor Order The number of the purchase order issued by the vendor.
Number
Vendor Order The date on which the vendor issued the purchase order.
Date
Contract Software only. The contract associated with the software purchase.
Product Key Software only. The product key of the purchased software.
Maintenance Software only. The date on which the maintenance for the purchased software ends.
Expiration Date
Proof of Software only. An image containing the photo of the maintenance agreement.
Maintenance
Model Hardware only. The model name of the purchased hardware item.
Specifications Hardware only. Any specifications for the purchased hardware item, as applicable.
Serial Number Hardware only. The serial number of the purchased hardware item.
Contract Hardware only. The contract associated with the purchased hardware item.
Warranty Start Hardware only. The date on which manufacturer's warranty for purchased hardware
Date item starts.
Warranty End Hardware only. The date on which manufacturer's warranty for purchased hardware
Date item ends.
Support End Hardware only. The date on which the support for the purchased hardware item ends.
Date
Barcodes Add or edit barcodes associated the items acquired with this purchase order, as
required. For more information, see Add barcodes to assets.
In addition, when you select a field, you can choose the values, if any, you want to ignore in the
License Compliance chart. Values that are ignored are listed at 100 percent usage and displayed in
gray.
By default License Mode is the only single- or multiple-select field available, so it is the only field
listed. If you add single- or multiple-select fields on the Asset Fields table, they appear in this list as
well, and they appear on the Asset Detail page when you add a License asset. However, only the
selected field, or the first field on the Asset Fields list, is used in the License Compliance widget.
7. Optional: Modify the License Mode field or values on the Asset Fields table.
a.
Click the Edit button at the end of a row: .
b. Change the field information as needed, then click Save at the end of the row.
c.
To add a field, click the Add button in the table heading: . Add field information, then click
Save at the end of the row.
TIP: To add License assets for multiple applications at once, you can import the information from
spreadsheets or CSV files. See Example: Import license data from prepared spreadsheets.
1. Go to the Software Catalog list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Software Catalog.
2. Click the name of an application to display the Software Catalog Detail page.
3. Near the bottom of the page, click Add New License to display the License Asset Detail page.
4. On the License Asset Detail page, on the General tab, provide the following information:
Option Description
Subtype The Asset Subtype to associate with the license. See About Asset Subtypes, custom
fields, and device detail preferences.
Asset Status The license status, if applicable. You can select a default asset status, or a custom
one (if they exist). A default installation of the KACE SMA includes the following asset
statuses:
• Active: Any asset that is deployed, active, or in use.
• Disposed: An asset that is no longer available for use.
• Expired: A software license or contract asset that has expired.
• In Stock: A recently received asset.
• Missing: Any asset that cannot be located.
• Repair: An asset that is being repaired.
• Reserved: An asset that is set aside for a specific person or use.
• Retired: Any asset that reached its end-of-life state, or is no longer in use.
• Stolen: An asset that has been reported as stolen.
For more information, see View and configure asset lifecycle settings.
Location The name of the location where the asset is located. See Managing locations.
Name The name of the license, such as Office Professional PO #1234. This is the name
that you use to find the asset. If you plan to have multiple licenses associated with an
application, provide the purchase order number or purchase date in the fields below to
differentiate the licenses.
License Count The number of installations or seats the license allows. For example, 50.
Applies to Applications in the Software Catalog inventory to which the license applies. You
Cataloged can associate License assets with multiple applications in the Software Catalog if
Software necessary. However, it is not necessary to associate a License asset with multiple
versions of the same application because the appliance does this automatically to
support upgrades and downgrades. You can simply associate the current version with
the License asset when you add the license information.
In addition, if you assign applications from different publishers, such as Microsoft Office
and Adobe Acrobat, to the same License asset, the total number of seats specified in
the License asset is assigned to each application. For example, if the License asset
has 100 seats, both Microsoft Office and Adobe Acrobat are assigned 100 seats.
Applies to Leave this field blank. A software license cannot be associated with applications from
Software the Software Catalog inventory and the Software page inventory at the same time.
For more information on how to create license assets for cataloged software, see Add
License assets for Software page inventory.
License Mode The mode of the License asset. For applications that require licenses, and to display
license usage information on the License Compliance page, select either Enterprise or
Unit License.
NOTE: Most modes, including Not Specified, Client License, Subscription,
Shareware, Freeware, OpenSource, No Licensing, and Site License, are not
used for License Compliance.
The license mode is used in these sections of the Administrator Console:
• The License Compliance list. See View License Compliance information for
Software Catalog applications.
• The License Compliance chart that is displayed on the Dashboard. Values that
are marked as ignored on the Asset Detail page are shown with a usage level of
100 percent. See About Dashboard widgets.
5. Click Next.
6. On the License Asset Detail page, on the Purchase tab, provide the following information:
Option Description
Applies to Applications in the Software Catalog inventory to which the license applies. You
Cataloged can associate License assets with multiple applications in the Software Catalog if
Software necessary. However, it is not necessary to associate a License asset with multiple
versions of the same application because the appliance does this automatically to
Product Key The product key associated with the license. You can modify and edit the default
information, which can be captured for a License Asset Type.
Unit Cost The unit cost associated with the license. You can modify and edit the default
information, which can be captured for a License Asset Type.
Vendor The name of the Vendor asset you want to associate with the application. the Vendor
drop-down list is empty unless you have added a Vendor asset. To search for a vendor,
begin typing in the list.
NOTE: Assigning multiple vendors to a single software License asset is
not recommended because it can result in inaccurate License Compliance
information.
Purchase Order The purchase order number associated with the license.
Number
Purchase Date The date the purchase was made. Click in the field, then select a date on the calendar.
Purchase Select one or more purchase records associated with this license. See Managing
purchase records.
7. Click Next.
8. On the License Asset Detail page, on the Maintenance tab, provide the following information:
Option Description
Includes Indicates if the license includes upgrade rights. Upgrade rights refer to the ability to
Upgrade Rights upgrade to a newer version of the licensed software, when such versions become
available. For more information, see About license upgrades. Select one of the
following options:
• Yes: Upgrade rights are calculated by comparing the number of existing licenses
for the selected software with the counts of available licenses for newer versions
of the same software.
• Yes - Select from list: Choose one or more software versions for which
you want to grant upgrade rights. Under Upgrade Software list, click Select
cataloged software to add. The list that appears is populated with higher
versions of the selected software to which the license can be upgraded. When
you click an entry in the list, your selection appears in the Upgrade Software list
box. You can add one or more versions, as needed. To delete an item from the
list, select it in the Upgrade Software list box, and click Remove.
• No: If you do not want to grant upgrade rights to the selected software, select this
option.
Includes Whether the license entitles users to upgrade the installed version of the application.
Maintenance See About License Compliance for Software Catalog applications.
Expiration Date If the license includes maintenance, the expiration date of the maintenance period.
The KACE SMA License Compliance feature leverages Software Catalog information,
such as application release dates. If new application versions are released during the
maintenance period, they are automatically covered by this License asset.
Includes Indicates if the license includes downgrade rights. Downgrade rights refer to the ability
Downgrade to apply licenses for newer software versions to older versions of the same software.
Rights For more information, see About license downgrades. Select one of the following
options:
• Yes: Downgrade rights are calculated by comparing the number of existing
licenses for the selected software with the counts of available licenses for older
versions of the same software.
• Yes - Select from list: Choose one or more software versions for which you
want to grant downgrade rights. Under Downgrade Software list, click Select
cataloged software to add. The list that appears is populated with lower
versions of the selected software to which the license can be downgraded. When
you click an entry in the list, your selection appears in the Downgrade Software
list box. You can add one or more versions, as needed. To delete an item from
the list, select it in the Downgrade Software list box, and click Remove.
• No: If you do not want to grant downgrade rights to the selected software, select
this option.
9. Click Next.
10. On the License Asset Detail page, on the Related tab, provide the following information:
Option Description
Cost Center The cost center associated with the department that owns the application.
Approved for The devices that are approved to use the license. This information is used in License
Device Compliance reporting. For example, if devices have the application installed, but
are not on the list of approved devices, the devices are listed in the report titled,
Unapproved Software Installation. However, the KACE SMA does not enforce license
compliance. For example, the appliance does not prevent applications from being
installed on managed devices if a license is expired or otherwise out of compliance.
Barcodes Add or edit barcodes associated with this license, as required. For more information,
see Add barcodes to assets.
License Text Any supplemental information about the license, such as a license number.
NOTE: To create License assets for applications in the Software page inventory, you first must create
Software assets for those applications. You do not need to create Software assets for applications in the
Software Catalog page inventory.
If the Organization component is enabled on your appliance, you can create License assets for each organization
separately.
TIP: You can customize License Asset Types to meet your needs. See Customize the License Asset Type.
1. Go to the License Asset Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. Do one of the following:
▪ On the left navigation bar, click Licenses. Select Choose Action > New.
▪ On the left navigation bar, click Inventory, then click Software Catalog. Click the name of an
application. On the Software Catalog Detail page, click Add New License.
2. On the License Asset Detail page, on the General tab, provide the following information:
Option Description
Subtype The Asset Subtype to associate with the license. See About Asset Subtypes, custom
fields, and device detail preferences.
Asset Status The license status, if applicable. You can select a default asset status, or a custom
one (if they exist). A default installation of the KACE SMA includes the following asset
statuses:
• Active: Any asset that is deployed, active, or in use.
• Disposed: An asset that is no longer available for use.
• Expired: A software license or contract asset that has expired.
• In Stock: A recently received asset.
• Missing: Any asset that cannot be located.
• Repair: An asset that is being repaired.
• Reserved: An asset that is set aside for a specific person or use.
• Retired: Any asset that reached its end-of-life state, or is no longer in use.
• Stolen: An asset that has been reported as stolen.
For more information, see View and configure asset lifecycle settings.
Location The name of the location where the asset is located. See Managing locations.
Name The name of the license, such as Office Professional PO #1234. This is the name
that you use to find the asset. If you plan to have multiple licenses associated with an
application, provide the purchase order number or purchase date in the fields below to
differentiate the licenses.
License Count The number of installations or seats the license allows. For example, 50.
Applies to Applications in the Software Catalog inventory to which the license applies. You
Cataloged can associate License assets with multiple applications in the Software Catalog if
Software necessary. However, it is not necessary to associate a License asset with multiple
versions of the same application because the appliance does this automatically to
support upgrades and downgrades. You can simply associate the current version with
the License asset when you add the license information.
In addition, if you assign applications from different publishers, such as Microsoft Office
and Adobe Acrobat, to the same License asset, the total number of seats specified in
the License asset is assigned to each application. For example, if the License asset
has 100 seats, both Microsoft Office and Adobe Acrobat are assigned 100 seats.
Applies to Leave this field blank. A software license cannot be associated with applications from
Software the Software Catalog inventory and the Software page inventory at the same time.
For more information on how to create license assets for cataloged software, see Add
License assets for Software page inventory.
License Mode The mode of the License asset. For applications that require licenses, and to display
license usage information on the License Compliance page, select either Enterprise or
Unit License.
NOTE: Most modes, including Not Specified, Client License, Subscription,
Shareware, Freeware, OpenSource, No Licensing, and Site License, are not
used for License Compliance.
3. Click Next.
4. On the License Asset Detail page, on the Purchase tab, provide the following information:
Option Description
Applies to Applications in the Software Catalog inventory to which the license applies. You
Cataloged can associate License assets with multiple applications in the Software Catalog if
Software necessary. However, it is not necessary to associate a License asset with multiple
versions of the same application because the appliance does this automatically to
support upgrades and downgrades. You can simply associate the current version with
the License asset when you add the license information.
In addition, if you assign applications from different publishers, such as Microsoft Office
and Adobe Acrobat, to the same License asset, the total number of seats specified in
the License asset is assigned to each application. For example, if the License asset
has 100 seats, both Microsoft Office and Adobe Acrobat are assigned 100 seats.
Product Key The product key associated with the license. You can modify and edit the default
information, which can be captured for a License Asset Type.
Unit Cost The unit cost associated with the license. You can modify and edit the default
information, which can be captured for a License Asset Type.
Vendor The name of the Vendor asset you want to associate with the application. the Vendor
drop-down list is empty unless you have added a Vendor asset. To search for a vendor,
begin typing in the list.
NOTE: Assigning multiple vendors to a single software License asset is
not recommended because it can result in inaccurate License Compliance
information.
Purchase Order The purchase order number associated with the license.
Number
Purchase Date The date the purchase was made. Click in the field, then select a date on the calendar.
Purchase Select one or more purchase records associated with this license. See Managing
purchase records.
5. Click Next.
6. On the License Asset Detail page, on the Maintenance tab, provide the following information:
Option Description
Includes Indicates if the license includes upgrade rights. Upgrade rights refer to the ability to
Upgrade Rights upgrade to a newer version of the licensed software, when such versions become
Includes Whether the license entitles users to upgrade the installed version of the application.
Maintenance See About License Compliance for Software Catalog applications.
Expiration Date If the license includes maintenance, the expiration date of the maintenance period.
The KACE SMA License Compliance feature leverages Software Catalog information,
such as application release dates. If new application versions are released during the
maintenance period, they are automatically covered by this License asset.
Includes Indicates if the license includes downgrade rights. Downgrade rights refer to the ability
Downgrade to apply licenses for newer software versions to older versions of the same software.
Rights For more information, see About license downgrades. Select one of the following
options:
• Yes: Downgrade rights are calculated by comparing the number of existing
licenses for the selected software with the counts of available licenses for older
versions of the same software.
• Yes - Select from list: Choose one or more software versions for which you
want to grant downgrade rights. Under Downgrade Software list, click Select
cataloged software to add. The list that appears is populated with lower
versions of the selected software to which the license can be downgraded. When
you click an entry in the list, your selection appears in the Downgrade Software
list box. You can add one or more versions, as needed. To delete an item from
the list, select it in the Downgrade Software list box, and click Remove.
• No: If you do not want to grant downgrade rights to the selected software, select
this option.
7. Click Next.
8. On the License Asset Detail page, on the Related tab, provide the following information:
Option Description
Cost Center The cost center associated with the department that owns the application.
Approved for The devices that are approved to use the license. This information is used in License
Device Compliance reporting. For example, if devices have the application installed, but
are not on the list of approved devices, the devices are listed in the report titled,
Barcodes Add or edit barcodes associated with this license, as required. For more information,
see Add barcodes to assets.
9. Click Next.
10. On the License Asset Detail page, on the Custom tab, provide additional custom data. You can modify the
License Asset Type to include as many additional fields as necessary to meet your business objectives. For
more information, see Add or customize Asset Types.
11. Click Next.
12. On the License Asset Detail page, on the Notes tab, provide the following information:
Option Description
License Text Any supplemental information about the license, such as a license number.
TIP: To view default fields go to the Asset Detail page. See Customizing Asset Types.
4. Decide what field or fields to use for the primary key (PK) for the imported assets.
Primary Keys are the fields, or combinations of fields, used as unique identifiers for assets being imported.
When assets are imported, the appliance uses Primary Keys to determine whether to update an existing
record or create a record. You can select one field, or a combination of fields, as the PK.
5. Save the spreadsheet as a CSV file, in a location you can access from the Administrator Console.
Update asset barcodes with selected Check if the barcodes supplied in this area already
exist, and if they do, update them. If they do not
exist, they are created for the specified assets.
Replace all asset barcodes with selected Replace the existing barcodes with the specified
barcodes.
Barcode Data The field in the CSV file that contains the barcode.
There can be only one barcode of the same type per
asset.
Barcode Name The field in the CSV file that contains the barcode
tag. Barcode numbers are always unique, they
cannot be shared between multiple assets.
However, it is possible for an active asset to share a
barcode with an archived asset.
Barcode Format The field in the CSV file that contains the barcode
format. For example, UPC-A, Code 11, or UPC-E.
Variance The difference, if any, between the number of license seats available and the number
of application installations. A negative number indicates that the application has
been installed on more devices than the license allows, and therefore it is out of
compliance.
Used Last 90 Days The number of application installations that have been launched in the previous 90,
Used Last 60 Days 60, or 30 days. A dash in this column indicates that metering is not enabled for the
application.
Used Last 30 Days
NOTE: To obtain accurate usage information, metering must be enabled for
the application and for the devices on which the application is installed. See
Enabling and configuring metering for devices and applications.
Not Used Last 90 The number of application installations that have not been launched in the previous
Days 90, 60, or 30 days. A dash in this column indicates that metering is not enabled for
Not Used Last 60 the application.
Days NOTE: To obtain accurate usage information, metering must be enabled for
Not Used Last 30
the application and for the devices on which the application is installed. See
Days Enabling and configuring metering for devices and applications.
Edition The name of the edition related to the application, such as Professional Edition or
Standard Edition.
TIP: When a group, such as Office, is collapsed to show only the top-level item, a warning icon
is displayed to the left of the Name column if any item in the group has a negative variance or is
using more seats than the license allows: .
4. To view the License Compliance widget, click Home on the left navigation bar to go to the Admin-level
Dashboard page.
TIP: If the License Compliance widget is not visible, click Customize in the upper right to install
it. See Customize Dashboard pages.
5. To view or change information about the number of seats available under a license, go to the detail page
for the License asset. See View assets and search for asset information.
NOTE: If you have not added License assets for applications in inventory, the License Compliance page
shows the number of seats available to applications as 0, and the variance is the number of software
installations.
1. Go to the License Compliance page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Asset Management, then click License Compliance.
2. Click Update Now above the list.
The appliance checks for the latest license usage information and the list is updated.
TIP: Clicking the Refresh button above the list on the right simply redisplays the information
already collected. It does not obtain new license usage information.
Related topics
Add License assets for Software page inventory
View License Compliance and Configuration information
NOTE: The appliance updates the data in the License Compliance widget every eight hours. Clicking
the Refresh button, however, does not update the data; it simply redisplays the data that has already
been collected.
Color Description
Orange Usage is at or above the warning threshold setting but below the critical threshold setting.
The Software License Configuration widget displays the percentage of software licenses that are
categorized as unit licenses, site licenses, and other license modes.
Optional: View additional information on the License Compliance page. See View License Compliance information
for Software Catalog applications.
Role Description
Organization Organization Roles are supersets of permissions that are assigned to organizations,
Roles and they define the permissions that are available to organization users. For
example, if an organization is assigned an Organization Role that has the Distribution
tab hidden, users in that organization, including the Admin user, cannot access the
Distribution tab.
NOTE: Organization Roles are available only on appliances with the
Organization component enabled.
Default Role The Default Role in the Organization Roles section has Write and Read permission
for all tabs. You can create additional Organization Roles, but you cannot edit or
delete the Default Role.
User Roles Roles assigned to users to control their access to the Administrator Console and
User Console. If the Organization component is enabled on your appliance, the
Administrator The most powerful user role on the KACE SMA. By default, users with the
Administrator role have permission to see or change information and settings.
This includes promoting or demoting other users by changing their roles. The
Administrator role cannot be altered or deleted. Assign this role only to trusted
administrators.
Staff members assigned the Administrator role have permission to manage and
modify Service Desk tickets from the Tickets tab in the Administrator Console, though
they might not be able to own tickets themselves.
Users with the Administrator role can also use the security, scripting, and distribution
features to resolve Service Desk tickets, then document the issues in the Knowledge
Base.
The Administrator role primarily interacts with the KACE SMA through the
Administrator Console.
No Access Users with this role cannot log on to the Administrator Console or User Console.
Read Only This role has the ability to view but not change any information or settings in the
Administrator KACE SMA. This role is useful for oversight personnel, such as supervisors.
This role primarily interacts with the KACE SMA through the Administrator Console.
User ConsoleOnly This role is for appliance users. By default, this role has permission to create, view,
and modify Service Desk tickets.
This role interacts with the appliance exclusively through the User Console.
Software WRITE
Processes HIDE
Services HIDE
Alerts WRITE
Profiles HIDE
Announcements WRITE
Archive READ
Configuration READ
6. Click Save.
The Roles page shows the new role. When a user who is assigned to this role logs in, the appliance component
bar shows the available features.
Login DefaultTicketOwners
Name DefaultTicketOwners
Email DefaultTicketOwners@mydomain.com
Role No Access
3. Click Save.
4. To assign this new user as the default ticket owner, choose the DefaultTicketOwners as described in
Configuring ticket settings.
NOTE: The first default owner always remains the default owner of a ticket. For example, if you move
an existing ticket to another category with a different default owner, the default owner of the ticket
does not change.
NOTE: Email messages are prepended with: +++++ Please reply above this line to add a comment +
++++.
• When managed devices or user accounts are deleted from inventory, email notifications for any Service
Desk tickets related to those devices are suppressed to avoid unnecessary notifications.
IMPORTANT: The SMA appliance POP3 email server must pass authentication information and the email
text itself as clear text.
Option Description
Total Emails The maximum number of all emails the Service Desk receives and responds with
email notifications. The default value is 100 emails.
Received within the The time interval in minutes during which the specified number of emails are
interval of x minutes received. The default value is one minute.
To disable this restriction, you can set to a high number such as 99999.
5. Configure the thresholds for inbound email notifications per ticket, during a specific period. When these
levels are reached, the Service Desk will stop sending email notifications.
Option Description
Total Emails per Ticket The maximum number of all emails the Service Desk receives for each ticket,
and responds with email notifications. The default value is 5 emails per ticket.
Received within the Specify the time interval in minutes during which the specified number of emails
interval of x minutes for each ticket are received. The default value is one minute. To disable this
restriction, set this option to a high number such as 99999.
6. Click Save.
Next, you can configure POP3 email accounts for specific Service Desk queues. For more information, see
Configure queue-specific email settings.
Approver The person who can approve or reject the ticket for
processing.
NOTE: If users have the KACE GO mobile app installed on their smart phone or tablet, the system
sends push notifications for the selected Service Desk ticket events.
Option Description
SLA Violation The ticket has not been resolved by its due date.
New Ticket Via Email A user sends an email message to the Service Desk
and a ticket is created.
New Ticket Via Portal A ticket is created through the User Console.
4. Click Save.
Related topics
Configuring Mobile Device Access
Ticket Escalated Used to send periodic notifications according to the Owners, the ticket CC list, and
Escalation Time configured for the ticket priority in ticket Category CC list
the queue. For example, if tickets with the priority
of High have an Escalation Time of 30 minutes,
this email is sent every 30 minutes for High priority
tickets until the ticket priority changes or until the
ticket is closed.
Ticket Created Used to acknowledge that a ticket has been created Submitters
from Email through email.
Ticket Modified Used to notify recipients when ticket information is Owners and the ticket CC list
changed or added.
Comment Used to notify recipients that comments have been Owners, submitters,
Submitted added to tickets. approvers, the ticket CC list,
and the ticket Category CC list
Email Ticket Used to for messages that are forwarded using the Manually entered by the
Manually Email Ticket action on Ticket Detail pages. sender
TIP: If you use HTML/Markdown, the
$ticket_fields_visible token must be enclosed
in the <pre> tag to prevent formatting, such
as line breaks, from being discarded. For
example:
<pre>$ticket_fields_visible</pre>
SLA Violated Used to notify recipients that a ticket has remained None. Configurable on the
open past the due date calculated using the SLA Queue Detail page
(Service Level Agreement) settings and the ticket
priority.
Error Creating Ticket from Used to notify senders that the ticket could not be created for Submitters
Email reasons other than unknown email address.
Unknown Email Address Used to notify senders that the ticket could not be created Submitters
Response because the submitter's email address is unknown.
Token Description
$helpdesk_email The email address associated with the Service Desk queue. This
address is configured on the Queue Detail page.
$helpdesk_name The name of the Service Desk queue. This name is configured on
the Queue Detail page.
$userui_url A link to the User Console. Access to the User Console requires
login credentials.
Token Description
$mobile_ticket_url A link to the ticket KACE GO mobile app. When displayed in an email
on an Android or iOS mobile device, this links opens the associated
ticket in the KACE GO mobile app.
$process_type The type of the process. In a default installation, only the Service
Desk process type is included. You can create new process types,
as required. For example, you can create a process type for
accessing a specific application, or a group of applications. For more
information, see Define process types.
$ticket_approver_email The email address of the ticket approver. Having this address is
especially useful for Comments email notifications.
$ticket_custom_X_label The label and value used for a custom field, where X represents the
$ticket_custom_X_value index number of the custom field.
For example, if a queue has a ticket field labeled, CUSTOM_5, and
that field is configured with the label Location Name, the system
replaces $ticket_custom_5_label with the text, Location
Name. The token, $ticket_custom_5_value is replaced with the
ticket value that was saved for the Location Name field, such as,
Topeka or Albuquerque.
By default, all ticket queues are configured with 15 custom fields, but
this number can be increased as needed.
NOTE: Each queue can have different custom fields and
different email template configurations.
$ticket_due_date The due date as saved on the ticket. Administrators can override
automatic due dates with manual due dates if necessary.
$ticket_fields_visible Include all the ticket fields that are visible for the user who is
forwarding the ticket by email.
TIP: If you use HTML/Markdown, the $ticket_fields_visible
token must be enclosed in the <pre> tag to prevent
formatting, such as line breaks, from being discarded. For
example:
<pre>$ticket_fields_visible</pre>
$ticket_id A unique identifier assigned to the ticket, also called the ticket
number. Using this identifier is the primary method for users to
identify tickets.
$ticket_number A formatted version of the ticket ID. This version begins with TICK
followed by a minimum of five digits. For example, a ticket with ID
4321 is displayed as TICK:04321. This format is especially useful
in email Subject lines to make sure that email replies link to the
correct tickets.
$ticket_owner_email The email address of the Service Desk administrator assigned to the
ticket.
$ticket_owner_name The name of the Service Desk administrator assigned to the ticket.
NOTE: The owner name and contact information is derived
from the USER record associated with the fields on the ticket.
$ticket_priority The priority assigned to the ticket. Default values include High,
Medium, and Low.
$ticket_resolution Information about what was done to resolve the ticket as described in
the ticket’s Resolution field.
$ticket_status The status of the ticket. Defaults include New, Opened, Closed,
Need More Info, Reopened, Waiting Overdue, Waiting on Customer,
and Waiting on Third Party.
$ticket_title The title of the ticket as it appears on the Ticket Detail page.
$ticket_url A link to the ticket in the User Console. Access to the User Console
requires login credentials.
$ticket_http_url A link to the ticket in the User Console. This format is used for
backward compatibility on older systems. Access to the User
Console requires login credentials.
$ticket_https_url A secure link to the ticket in the User Console. Use this token if SSL
is enabled on your appliance. This ensures that links sent through
email work correctly.
$userui_url A link to the home page of the User Console. Access to the User
Console requires login credentials.
Token Description
$error_text Used to identify a problem processing the submitted tokens. This error appears when:
• The system does not recognize a variable
• A variable is recognized, but the user does not have permission to change the
field
• The variable attempts to change the approval status of the ticket but the user is
not the approver
NOTE: Tokens that are invalid are ignored and they are not replaced in email messages. For
example, if you add an unknown token such as $today, it is ignored, and it appears in the email
message as $today.
5. Optional: Select Use HTML/Markdown to use a simple HTML-based email instead of plain text.
NOTE: To use HTML/Markdown feature, the email text must be fully formatted in HTML/Markdown.
The default email text will not automatically convert to HTML/Markdown without the appropriate tags
in the email text.
For example:
6. Click Save.
For instructions on how to configure the appliance to use SMTP email, see Configuring SMTP email servers.
NOTE: If your Service Desk was created on a KACE SMA running version 6.3 or earlier, this setting is
disabled by default. If the Organization component is enabled on your system, and you create a new
organization, however, the setting is enabled by default. The setting is also enabled on new KACE SMAs
running version 6.4 or later.
1. Go to the Service Desk Settings page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Service Desk, then click Configuration.
c. On the Configuration panel, click Settings.
2. In the Inbound Email section, select the check box next to Add email addresses from the CC List to ticket.
3. Click Save.
Configure the email exclusion list to prevent Service Desk from automatically adding unwanted email addresses
to ticket CC List fields. See Exclude addresses from ticket CC List fields.
NOTE: The email addresses associated with Service Desk queues are never automatically added to ticket
CC List fields, because sending messages to these addresses could result in new tickets being opened
inadvertently. You do not need to add these addresses to the exclusion list.
1. Go to the Service Desk Settings page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Service Desk, then click Configuration.
c. On the Configuration panel, click Settings.
2. In the Inbound Email section, click Define System Email Exclusion List to display the Define System
Email Exclusion List page.
3.
To add an email address to the list, click add: .
4. In the Add Email dialog, type an email address, then click Save.
The email address is added to the exclusion list.
Option Description
Total Emails The maximum number of all emails the Service Desk receives and responds with
email notifications. The default value is 100 emails.
Received within the The time interval in minutes during which the specified number of emails are
interval of x minutes received. The default value is one minute.
To disable this restriction, you can set to a high number such as 99999.
4. Configure the thresholds for inbound email notifications per ticket, during a specific period. When these
levels are reached, the Service Desk will stop sending email notifications.
Option Description
Total Emails per Ticket The maximum number of all emails the Service Desk receives for each ticket,
and responds with email notifications. The default value is 5 emails per ticket.
Received within the Specify the time interval in minutes during which the specified number of emails
interval of x minutes for each ticket are received. The default value is one minute. To disable this
restriction, set this option to a high number such as 99999.
5. Click Save.
About organizations
Organizations are logical instances of a KACE SMA that run on a single appliance. Each organization is
supported by its own database, and you manage each organization’s inventory and other components separately.
For example, in a school environment, you could create one organization for teachers and another organization
for students. You could then automatically assign managed devices to each organization and manage them
separately. Further, you could assign organization-specific roles to administrators and users to control their
access to the KACE SMA Administrator Console and User Console. Administrators in one organization would not
need to view the devices and inventory items in the other organization. You can add up to 50 organizations on a
single KACE SMA.
For information about configuring general organization settings for the appliance, see Configure appliance
General Settings with the Organization component enabled.
Role Description
Organization Organization Roles are supersets of permissions that are assigned to organizations,
Roles and they define the permissions that are available to organization users. For
example, if an organization is assigned an Organization Role that has the Distribution
tab hidden, users in that organization, including the Admin user, cannot access the
Distribution tab.
NOTE: Organization Roles are available only on appliances with the
Organization component enabled.
Default Role The Default Role in the Organization Roles section has Write and Read permission
for all tabs. You can create additional Organization Roles, but you cannot edit or
delete the Default Role.
User Roles Roles assigned to users to control their access to the Administrator Console and
User Console. If the Organization component is enabled on your appliance, the
permissions available to these roles depends on the Organization Role assigned to
the organization.
Administrator The most powerful user role on the KACE SMA. By default, users with the
Administrator role have permission to see or change information and settings.
This includes promoting or demoting other users by changing their roles. The
No Access Users with this role cannot log on to the Administrator Console or User Console.
Read Only This role has the ability to view but not change any information or settings in the
Administrator KACE SMA. This role is useful for oversight personnel, such as supervisors.
This role primarily interacts with the KACE SMA through the Administrator Console.
User Console Only This role is for appliance users. By default, this role has permission to create, view,
and modify Service Desk tickets.
This role interacts with the appliance exclusively through the User Console.
The role appears on the Roles page. When you add an organization, the role appears on the Role drop-down list.
See Adding, editing, and deleting organizations.
Delete roles
With the exception of the Default Role, you can delete Organization Roles as needed. You cannot delete the
Default Role, and you cannot delete a role if it is assigned to an organization.
The following roles cannot be deleted:
• the Default Role
• any roles assigned to an organization
• any roles associated with a label
1. Go to the Roles list:
a. Log in to the KACE SMA System Administration Console, http://KACE_SMA_hostname/
system, or select System from the drop-down list in the top-right corner of the page.
b. On the left navigation bar, click Organizations, then click Roles.
2. Select the check box next to one or more roles.
3. Select Choose Action > Delete, then click Yes to confirm.
Name Enter a name for the organization. You can modify the name later if required. If the
fast switching option is enabled, this name appears in the drop-down list in the top-
right corner of the page. See Enable fast switching for organizations and linked
appliances.
Description A description of the organization. You can modify the description later if necessary.
Role The user role you want to assign to the organization. You can modify this selection
later if required.
NOTE: To create a role, go to Organizations > Roles.
Client Drop Size A file-size filter for the organization's Client Drop location.
The Client Drop location is a storage area (Samba share) for the organization on
the KACE SMA. This storage area is used to upload large files, such as application
installers and appliance backup files, to the appliance. Uploading files to the Client
Drop location is an alternative to uploading files through the Administrator Console
using the default HTTP mechanism, which can result in browser timeouts for large
files.
The Client Drop Size filter determines whether files uploaded to the organization's
Client Drop location are displayed on the Upload and Associate Client Drop File list
on the Software Detail page. For example, if the Client Drop Size filter is set to 1 GB,
the Upload and Associate Client Drop File list shows files that are 1 GB in size or
larger. Files that are less than 1 GB in size are not displayed on the list.
Application files are moved from the organization's Client Drop location to the
appropriate area when the file is selected on the Software Detail page and saved.
Appliance backup files that are placed in the Client Drop location are automatically
identified as appliance backup files, and they become available for selection on the
Backup Settings page within five minutes.
If you have multiple organizations, each organization has its own Client Drop location
and Client Drop Size filter setting. See Copy files to the KACE SMA Client Drop
location.
Name Modify the name of the organization as needed. If the fast switching option is
enabled, this name appears in the drop-down list in the top-right corner of the page.
See Enable fast switching for organizations and linked appliances.
Locale The language to use for the organization’s Administrator Console and User Console.
Description A description of the organization. You can modify the description later if necessary.
Database Name (Read-only) Displays the name of the database the organization is using.
Report User (Read-only) The username used to generate reports. The report username provides
access to the database (for additional reporting tools), but does not give write access
to anyone.
Report User The report user password. This password is used only by the reporting system and
Password MySQL.
Role The user role you want to assign to the organization. You can modify this selection
later if required.
NOTE: To create a role, go to Organizations > Roles.
Client Drop Size A file-size filter for the organization's Client Drop location.
The Client Drop location is a storage area (Samba share) for the organization on
the KACE SMA. This storage area is used to upload large files, such as application
installers and appliance backup files, to the appliance. Uploading files to the Client
Drop location is an alternative to uploading files through the Administrator Console
using the default HTTP mechanism, which can result in browser timeouts for large
files.
The Client Drop Size filter determines whether files uploaded to the organization's
Client Drop location are displayed on the Upload and Associate Client Drop File list
on the Software Detail page. For example, if the Client Drop Size filter is set to 1 GB,
the Upload and Associate Client Drop File list shows files that are 1 GB in size or
larger. Files that are less than 1 GB in size are not displayed on the list.
Application files are moved from the organization's Client Drop location to the
appropriate area when the file is selected on the Software Detail page and saved.
Appliance backup files that are placed in the Client Drop location are automatically
identified as appliance backup files, and they become available for selection on the
Backup Settings page within five minutes.
If you have multiple organizations, each organization has its own Client Drop location
and Client Drop Size filter setting. See Copy files to the KACE SMA Client Drop
location.
Filters The filters you want to use to assign new devices to the organization when devices
check in to the appliance. To select multiple filters, use Ctrl-click or Command-click.
Agent Enabled Whether the KACE SMA stores scripting results provided by Agents
Logging installed on managed devices. Agent logs can consume as much as 1GB
of disk space in the database. If disk space is not an issue, enable Agent
Logging to keep all log information for Agent-managed devices. These
logs can be useful during troubleshooting. To save disk space, and enable
faster Agent communication, disable Agent Logging.
Agent 12 hours The frequency at which Agents on managed devices report inventory. This
Inventory information is displayed in the Inventory section.
Agentless 1 Day The frequency at which Agentless devices report inventory. This
Inventory information is displayed in the Inventory section.
Catalog 24 hours The frequency at which managed devices report inventory to the Software
Inventory Catalog page.
Metering 4 hours The frequency at which managed devices report metering information
to the KACE SMA. Requires metering to be enabled on devices and
applications.
Scripting 4 hours The frequency at which Agents on managed devices request updated
Update copies of scripts that are enabled on managed devices. This interval does
not affect how often scripts run.
Disable Wait Disabled If selected, this option stops the agent from executing bootup tasks.
for Bootup
Tasks
Disable Wait Disabled If selected, this option stops the agent from executing login tasks.
for Login
Tasks
5. In the Notify section, specify the message to use for Agent communications:
Option Suggested Setting Notes
Agent Splash As required The path to an existing .bmp file that you
Bitmap want to use as the splash logo.
Agent Splash Default text: The message that appears to users when
Page Message KACE Systems Management Agents are performing tasks, such as
Appliance (SMA) is verifying running scripts, on their devices.
your PC Configuration and
managing software updates.
Please Wait...
6. In the Schedule section, specify the Communication Window for Agent-managed devices:
Communication 00:00 to 00:00 (+1 The period of time during which Agents on managed devices
Window day) are allowed to connect with the KACE SMA. For example, to
allow Agents to connect between the hours of 01:00 and 06:00
only, select 01:00 from the first drop-down list, and 06:00 from
the second drop-down list.
You can set the communications window to avoid times when
your devices are busiest.
SSH Timeout The time, in seconds, after which the connection is closed if there is no activity.
SNMP Timeout The time, in seconds, after which the connection is closed if there is no activity.
WinRM Timeout The time, in seconds, after which the connection is closed if there is no activity.
VMware Timeout The amount of time in seconds to wait for a connection to the VMware vSphere API
service running on a VMware host.
8. Click Save.
The organization is added. If fast switching is enabled, and the default admin account passwords for the
System and for your organizations are the same, you can switch between organizations and the System
using the drop-down list in the top-right corner of the page. To see new organizations in the list, you need
to log out of the Administrator Console and then log back in. In addition, if the option to require organization
selection at login is enabled at the System level, the organization is available in the drop-down list on the
Administrator Console login page, http://KACE SMA_hostname/admin, where KACE SMA_hostname
is the hostname of your appliance.
NOTE: For new organizations, the password for the default admin account is the same as the
password for the default admin account at the System level. This is assigned automatically. To
change the admin account password, edit the admin user account.
NOTE: However, be aware that organizations with different admin account passwords are not
available for fast switching using the drop-down list in the top-right corner of the page.
For more information about System-level settings, see Configure appliance General Settings with the
Organization component enabled.
Related topics
Managing organization filters
View appliance logs
Managing user accounts for organizations
Delete organizations
You can delete organizations as needed. However, if you have a single organization on your appliance, you
cannot delete that organization until you add another one. The appliance must always have at least one
organization available.
1. Go to the Organization Detail page:
a. Log in to the KACE SMA System Administration Console, http://KACE_SMA_hostname/
system, or select System from the drop-down list in the top-right corner of the page.
b. On the left navigation bar, click Organizations.
c. Click the name of an organization.
2. Select Choose Action > Delete, then click Yes to confirm.
The organization, including information in the organization database, is removed from the appliance.
CAUTION: Use caution when changing the password for the default admin account of an
organization. Organizations whose admin account passwords differ are not available for fast switching
using the drop-down list in the top-right corner of the page.
CAUTION: See Enable fast switching for organizations and linked appliances.
Enabled Whether the filter is enabled. Filters have to be enabled before they can be applied.
Name The name of the filter. This name appears on the Organization Filters list.
Order The run order of the filter. Filters run according to the number specified. Low numbers
run before high numbers.
TIP: The KACE SMA supports both IPv6 (Internet Protocol version 6) and IPv4 addresses.
b. Select a condition in the second drop-down list.
For example: contains.
c. In the text box, enter a value for the attribute.
For example, to find devices from a specified IP address range, such as the entire subnet
67.18.250.255, use the percent sign (%) as a wildcard as follows: 67.18.250.%.
d. Optional: To add attributes, select an operator, such as [and ], in the left-most drop-down list of
the second row.
The fields in the row become active.
e. Optional: To add rows to the criteria section, click Add Criteria.
An additional row appears.
4. Click Save.
Enabled Whether the filter is enabled. Filters have to be enabled before they can be applied.
Name The name of the filter. This name appears on the Organization Filters list.
Evaluation Order The run order of the filter. Filters run according to the number specified. Low numbers
run before high numbers.
LDAP Server The IP address or the hostname of the LDAP server. If the IP address is not valid, the
appliance waits to timeout, resulting in login delays during LDAP authentication.
NOTE: To connect through SSL, use an IP address or hostname. For
example: ldaps://hostname.
Port The LDAP port number, which is usually 389 (LDAP) or 636 (secure LDAP).
Base Dn The LDAP criteria used to filter the main location for devices.
This criteria specifies a location or container in the LDAP or Active Directory
structure, and the criteria should include all the devices that you want to identify.
Enter the most specific combination of OUs, DCs, or CNs that match your criteria,
ranging from left (most specific) to right (most general). For example, this path might
lead to the container with devices that you want to identify:
OU=computers,DC=company,DC=com.
LDAP Login The credentials of the account the KACE SMA uses to log in to the LDAP server to
read accounts. For example:
LDAP Login:CN=service_account,CN=Users,DC=company,DC=com.
If no username is provided, an anonymous bind is attempted. Each LDAP Label can
connect to a different LDAP or Active Directory server.
LDAP Password The password of the account the KACE SMA uses to log in to the LDAP server.
During the filter processing, the KACE SMA will replace all KBOX_ defined variables with their respective
runtime values.
Currently supported variables for organization device filters:
KBOX_COMPUTER_NAME
KBOX_COMPUTER_DESCRIPTION
KBOX_COMPUTER_MAC
KBOX_COMPUTER_IP
KBOX_USERNAME
KBOX_USER_DOMAIN
KBOX_DOMAINUSER
Should the external server require credentials for administrative login (aka non-anonymous login) please
supply those credentials. If no LDAP user name is given then an anonymous bind will be attempted. Each
LDAP filter may connect to a different LDAP/AD server.
NOTE: To test your Filter, replace any KBOX_ variables with real values. Click Test and review the
results.
4. Click Save.
Filter devices
If you have organization filters, you can filter devices to verify that the filters are being applied correctly.
1. Go to the Organization Devices list:
a. Log in to the KACE SMA System Administration Console, http://KACE_SMA_hostname/
system, or select System from the drop-down list in the top-right corner of the page.
b. On the left navigation bar, click Organizations, then click Devices.
2. Select the check box next to one or more devices.
3. Select Choose Action > Apply Filter.
The selected devices are checked against existing filters. If devices were reassigned to organizations, the
new organization name appears next to the old organization name in the Organization column.
Redirect devices
You can redirect, or manually reassign, devices to organizations as needed.
For example, a device that has been assigned to organization A can be manually redirected to organization B so
that it appears in the organization B inventory.
1. Go to the Organization Devices list:
a. Log in to the KACE SMA System Administration Console, http://KACE_SMA_hostname/
system, or select System from the drop-down list in the top-right corner of the page.
b. On the left navigation bar, click Organizations, then click Devices.
2. Select the check box next to one or more devices.
3. Select Choose Action > Assign, then select an organization name to redirect the selected devices to the
organization.
NOTE: Select Export to Network Share to save the data to a shared location that exists on the
network and can be accessed from other devices. Select Export to Local Share to save the data to a
location on a device that is only accessible from that device.
7. Optional: On the Annotate Exported Resource(s) page, enter any additional information in the Note field.
8. Click Save.
The exported resources first appear on the Resource Sharing Status page with a Status of New Request.
When the export is complete, the Status changes to Completed. The exported resources are available on the
Samba share for import. See Import resources to organizations.
Most import and export tasks take only a moment to complete, but very large resources take more time.
TIP: The appliance updates the summary widgets periodically. To update most of the widgets any time,
click the Refresh button in the upper right of the page: . To update most individual widgets, hover over
the widget, then click the Refresh button above the widget. Some widgets may require additional steps.
Widget Description
Device Reports This widget contains links to common inventory reports. Use them to quickly generate
a specific report, such as Devices by memory, Devices by OS, and others.
Connections This widget shows the number of connections to the KACE SMA web server. A high
number indicates a high load on the server, which might reduce appliance response
time. If the Organization component is enabled on your appliance, the widget shows
the information for the selected organization.
Device Check-In This widget displays the number of devices that have connected to the KACE SMA in
Rate the past 60 minutes. If the Organization component is enabled on your appliance, this
widget is available at the System level.
Provisioning This widget shows the status of KACE SMA Agent provisioning or installation tasks.
If the Organization component is enabled on your appliance, the widget shows the
information for the selected organization.
Shortcuts This widget contains links to common Inventory pages and wizards. Use them to
quickly navigate to specific pages, such as the Agent Provisioning Assistant, the
Discovery Schedules page, and others.
Agent Version This widget show the counts of agents for each version. This information can be
Counts useful during an upgrade.
Inventory Counts This widget displays the counts of devices associated with each device management
method, such as Agent Managed, Agentless, and others. It also shows the number of
Agents that have been updated in the last eight hours.
Devices by Disk This widget shows a donut chart, where each section of the chart indicates the
Capacity percentage of free disk space on the managed devices. Clicking the widget title
displays a report with links to the associated devices. Hovering over each section
of the chart displays the percentage of managed devices that have the selected
percentage of free disk space. For example, if you hover over the red part of the
chart, the widget displays the percentage of devices whose free disk space is lower
than 25%.
Managed Operating This widget shows the percentage of managed devices that are running each
Systems operating system. If the Organization component is enabled on your appliance, this
widget shows the percentage of devices in the selected organization.
Provision Platforms This widget shows the percentage of operating systems installed on KACE SMA
Agent-managed devices. If the Organization component is enabled on your
appliance, the widget shows the information for the selected organization.
Devices By This widget shows the top device manufacturers represented in device inventory.
Manufacturer If the Organization component is enabled on your appliance, this widget shows the
percentage of devices in the selected organization.
Devices By Model This widget shows the top device models represented in KACE SMA device
inventory. If the Organization component is enabled on your appliance, this widget
shows the percentage of devices in the selected organization.
Devices By This widget shows a bar chart, where each bar represents a number of devices that
Memory have an indicated amount of RAM installed on them.
Devices By This widget shows a bar chart, where each bar represents a number of devices that
Processor have a specific processor configuration.
Devices By This widget shows a donut chart, where each section of the chart indicates the
Subtype percentage of the managed devices by device subtype.
NOTE: Any devices discovered through External Integration such as KACE Mobile Device
Manager, G Suite, AirWatch devices do not count toward the KACE SMA license limit.
◦ Authenticated [WinRM, SNMP, SSH, VMware]. DNS Lookup, Relay, WinRM, SNMP, SSH, and
VMware discovery options appear.
◦ Nmap. DNS Lookup and Nmap discovery options appear.
◦ Custom. DNS Lookup, Ping, Nmap, WinRM, SNMP, SSH, and VMware discovery options appear.
3. In the Name field, enter a name for the scan.
This name appears on the Discovery Schedules page.
4. In the IP Address Range field, enter an IP address range to scan. Use hyphens to specify individual
IP address class ranges. For example, type 192.168.2-5.1-200 to scan for all IP addresses between
192.168.2-5.1 and 192.168.2-5.200, inclusive.
TIP: The KACE SMA supports both IPv6 (Internet Protocol version 6) and IPv4 addresses.
CAUTION: A maximum of 25,000 IP addresses is supported. If you specify an IP range that results in
more than 25,000 addresses, a warning appears when you attempt to save the provisioning schedule.
5. Select the Discovery options. The options that appear depend on the Discovery Type you have chosen:
Option Item Description
DNS Lookup Enable Discovery to identify the name of the device. DNS Lookup
is important if you want device names to appear in the Discovery
Results and Inventory lists. You can select the DNS Lookup options
for each Discovery type.
Relay Enable a KACE SMA Agent to act as a tunnel WinRM, SSH and
SNMP traffic to the agent connection protocol for WinRM, SSH
and SNMP discovery schedules, agentless inventory, and agent
provisioning.
Relay Device Specify the device that you want to use as a relay for agentless
device inventory.
Ping Perform a ping test during the network scan. During this test,
the appliance sends a ping test to determine whether a system
responds.
Socket Perform a connection test during the network scan. During this test,
the appliance sends a packet to the port to determine whether the
port is open.
TCP Port List Enable a port scan using TCP (Transmission Control Protocol). Use
a comma to separate each port number.
UDP Port List Enable a port scan using UDP (User Datagram Protocol). Use a
comma to separate each port number.
Active Directory Enable the appliance to check for device information on an Active
Directory server. During Active Directory scans, the status is
indicated as an approximate percentage instead of the number of
devices scanned.
Search The criteria used to search for devices. This criteria specifies a
Context location or container in the Active Directory structure to be searched.
Enter the most specific combination of OUs, DCs, or CNs that match
your criteria, ranging from left (most specific) to right (most general).
For example: DC=company,DC=com
KACE Cloud This option allows you to access mobile devices such as smart
Mobile Device phones and tablets connected to the KACE Cloud Mobile Device
Manager Manager (MDM). You must obtain a tenant name and a Secret
Tenant Name The name of the tenant on the KACE Cloud MDM associated with
the devices that you want to manage.
Credentials The details of the account that is used to connect to the KACE Cloud
MDM device. Select an existing credential from the drop-down list, or
select Add new credential to add a new credential, as required.
For more information, see Add and edit Secret Key credentials.
Auto Provision If selected, all mobile devices discovered in the next scan are added
Devices to inventory.
NOTE: Use this option with care, to avoid expanding your
inventory to an unexpected extent.
G Suite Working with G Suite devices requires credentials that grant the
KACE SMA access to a Google Apps Domain using the Admin SDK
API. You must obtain a Client ID and a Client Secret from Google so
that you can get an approval code for the KACE SMA to use.
Discover If selected, any Chrome devices will be discovered in the next scan.
Chrome
Devices
Discover If selected, any G Suite mobile devices will be discovered in the next
Mobile scan.
Devices
Credentials The details of the account that is used to connect to the Chrome
device. Select an existing credential from the drop-down list, or
select Add new credential to add a new credential, as required.
The selected credential must have an approval code that can be
associated with the appropriate device type. For example, if you
want to discover G Suite mobile devices, you cannot use a credential
whose approval code is generated for Chrome devices.
For more information, see Add and edit Google OAuth credentials.
Auto Provision If selected, all Chrome and mobile devices discovered in the next
Devices scan are added to inventory.
NOTE: Use this option with care, to avoid expanding your
inventory to an unexpected extent.
REST API The REST API key, available in the AirWatch administration console.
Key The key must be provided to enable integration with AirWatch
through API calls.
Credentials The details of the service account required to connect to the device
and run commands. Select an existing credential from the drop-
down list, or select Add new credential to add a new credential, as
required.
See Add and edit User/Password credentials.
Auto Provision If selected, all AirWatch devices discovered in the next scan are
Devices added to inventory.
NOTE: Use this option with care, to avoid expanding your
inventory to an unexpected extent.
Port If this field is left blank, the default port 5985 is used.
Credentials The details of the service account required to connect to the device
and run commands. Select an existing credential from the drop-
down list, or select Add new credential to add a new credential, as
required.
See Add and edit User/Password credentials.
SNMP Full Enable a Full Walk of data in the MIB (management information
Walk base) on devices. If this option is cleared, the appliance does a Bulk
GET, which searches three core OIDs (object identifiers). When
selecting this option, be aware that a Full Walk can take up to 20
minutes per device. The default, Bulk GET, takes approximately one
second and acquires all of the information needed for Discovery.
IMPORTANT: SNMP inventory walk does not support non-
English characters on Windows devices. If it encounters non-
English characters, the SNMP inventory process reports an
error and stops loading inventory information.
Timeout The time, in seconds, after which the scan ends if no response is
returned.
Credentials(SNMPv1/
The details of the SNMP v1/v2 credentials required to connect to
v2) the device and run commands. Select an existing credential from
the drop-down list, or select Add new credential to add a new
credential, as required.
See Add and edit SNMP credentials.
Credentials(SNMPv3)
The details of the SNMP v3 credentials required to connect to
the device and run commands. Select an existing credential from
the drop-down list, or select Add new credential to add a new
credential, as required.
See Add and edit SNMP credentials.
Try SSH2 Enable the SSH2 protocol for connecting to and communicating with
Connection devices.
Use SSH2 if you want device communications to be more secure
(recommended).
Credentials The details of the service account required to connect to the device
and run commands. Select an existing credential from the drop-
down list, or select Add new credential to add a new credential, as
required.
See Add and edit User/Password credentials.
VMware Timeout The time after which the scan ends if no response is returned.
Credentials The details of the service account required to connect to the device
and run commands. Select an existing credential from the drop-
down list, or select Add new credential to add a new credential, as
required.
See Add and edit User/Password credentials.
Nmap NOTE: Running more than one of the four Nmap discovery
types at a time, although possible, is not recommended. It can
extend the length of a run and can cause erratic OS detection
results.
Timeout The time after which the scan ends if no response is returned.
Fast Scan Enable the appliance to quickly scan 100 commonly used ports. If
this option is cleared, all available TCP ports are scanned, which can
take much longer than the fast scan.
Nmap Enable the appliance to detect the operating system of the device
Operating based on fingerprinting and port information. This option might
System increase the time required for the scan.
Detection
(Best Guess)
TCP Port Enable a port scan using TCP (Transmission Control Protocol) of
Scan 1000 commonly used TCP ports. If this option is cleared, and UDP is
selected, the appliance performs a UDP scan. If both TCP and UDP
are cleared, the appliance uses a TCP scan.
If you select this option, Quest recommends that you set the Timeout
value to 10 minutes to decrease the likelihood of erroneous results.
Do not combine this scan with the Fast Scan option. Doing so results
in only 100 commonly used ports being scanned.
UDP Port Enable a port scan using UDP (User Datagram Protocol) of up to
Scan 1000 UDP ports. UDP scans are generally less reliable, and have
lower processor overhead, than TCP scans because TCP requires
a handshake when communicating with devices whereas UDP
does not. However, UDP scans might take longer than TCP scans,
because UDP sends multiple packets to detect ports, whereas TCP
sends a single packet.
If you select this option, Quest recommends that you set the Timeout
value to 30 minutes to decrease the likelihood of erroneous results.
Do not combine this scan with the Fast Scan option. Doing so results
in only 100 commonly used ports being scanned.
If this option is cleared, the appliance does not scan ports using
UDP.
6. Optional: Enter an email address for being notified of when the discovery scan completes. The email
includes the name of the discovery schedule.
7. Specify the scan schedule:
TIP: To maintain the scan inventory without scanning, set the schedule of the scan configuration
to None.
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
8. Click Save.
Related topics
About Discovery Results
View and search Discovery Results
Stop a running discovery scan
Delete Discovery Schedules
TIP: The KACE SMA supports both IPv6 (Internet Protocol version 6) and IPv4 addresses.
CAUTION: A maximum of 25,000 IP addresses is supported. If you specify an IP range that
results in more than 25,000 addresses, a warning appears when you attempt to save the
provisioning schedule.
5. Select the Discovery options. The options that appear depend on the Discovery Type you have chosen:
Option Item Description
DNS Lookup Enable Discovery to identify the name of the device. DNS Lookup is
important if you want device names to appear in the Discovery Results
and Inventory lists. You can select the DNS Lookup options for each
Discovery type.
Timeout The time, in seconds, after which a DNS lookup expires. If an address is
not found during this time, the process “times out.”
Relay Enable a KACE SMA Agent to act as a tunnel WinRM, SSH and SNMP
traffic to the agent connection protocol for WinRM, SSH and SNMP
discovery schedules, agentless inventory, and agent provisioning.
Relay Device Specify the device that you want to use as a relay for agentless device
inventory.
A relay device that is used during discovery as a relay is used for
agentless inventory, when a new device is provisioned automatically from
discovery results.
Selected relay devices are listed on the following pages:
• On the Agentless Device Connection Details page, when a new
device is provisioned automatically from discovery results. For more
Privileged The username of the administrator account on the Active Directory server.
User For example, username@example.com.
Privileged The password of the administrator account on the Active Directory server.
User
Password
Search The criteria used to search for devices. This criteria specifies a location or
Context container in the Active Directory structure to be searched. Enter the most
specific combination of OUs, DCs, or CNs that match your criteria, ranging
from left (most specific) to right (most general). For example:
DC=company,DC=com.
Timeout The time, in seconds, up to 1 minute, after which the connection is closed
if there is no activity.
Require If selected, Kerberos is required for authentication. NTLM will not be used
Kerberos as an alternative when Kerberos is unavailable.
Using Kerberos requires DNS Lookup to be enabled in the same discovery
configuration. The DNS Server is also required in the local KACE SMA
network settings.
Port If this field is left blank, the default port 5985 is used.
Credentials The details of the service account required to connect to the device and
run commands. Select existing credentials from the drop-down list, or
select Add new credential to add credentials not already listed.
See Add and edit User/Password credentials.
Timeout The time, up to 5 minutes, after which the connection is closed if there is
no activity.
Try SSH2 Enable the SSH2 protocol for connecting to and communicating with
Connection devices.
Use SSH2 if you want device communications to be more secure
(recommended).
Credentials The details of the service account required to connect to the device and
run commands. Select existing credentials from the drop-down list, or
select Add new credential to add credentials not already listed.
See Add and edit User/Password credentials.
6. Optional: Enter an email address for being notified of when the discovery scan completes. The email
includes the name of the discovery schedule.
7. Specify the scan schedule:
TIP: To maintain the scan inventory without scanning, set the schedule of the scan configuration
to None.
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
8. Click Save.
Related topics
About Discovery Results
View and search Discovery Results
Stop a running discovery scan
Delete Discovery Schedules
Tenant Name The name of the tenant on the KACE Cloud MDM associated with the devices that
you want to manage.
Credentials The details of the account that is used to connect to the KACE Cloud MDM device.
Select an existing credential from the drop-down list, or select Add new credential to
add a new credential, as required.
For more information, see Add and edit Secret Key credentials.
Auto Provision If selected, all mobile devices discovered in the next scan are added to inventory.
Devices
NOTE: Use this option with care, to avoid expanding your inventory to an
unexpected extent.
5. Optional: In the Notify section, enter an email address for being notified of when the discovery scan
completes. The email includes the name of the discovery schedule.
6. Specify the scan schedule:
TIP: To maintain the scan inventory without scanning, set the schedule of the scan configuration
to None.
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
7. Click Save.
Related topics
About Discovery Results
View and search Discovery Results
Stop a running discovery scan
Delete Discovery Schedules
NOTE: Any G Suite devices discovered using this method do not count toward the KACE SMA license
limit.
1. Go to the Discovery Schedule Detail page:
Discover Chrome If selected, any Chrome devices will be discovered in the next scan.
Devices
Discover Mobile If selected, any G Suite mobile devices will be discovered in the next scan.
Devices
Credentials The details of the account that is used to connect to the Chrome device. Select
existing credentials from the drop-down list, or select Add new credential to add
credentials not already listed.
IMPORTANT: The selected credential must have an approval code that can
be associated with the appropriate device type. For example, if you want to
discover G Suite mobile devices, you cannot use a credential whose approval
code is generated for Chrome devices.
For more information, see Add and edit Google OAuth credentials.
Auto Provision If selected, all Chrome devices discovered in the next scan are added to inventory.
Devices
NOTE: Use this option with care, to avoid expanding your inventory to an
unexpected extent.
5. Optional: In the Notify section, enter an email address for being notified of when the discovery scan
completes. The email includes the name of the discovery schedule.
6. Specify the scan schedule:
TIP: To maintain the scan inventory without scanning, set the schedule of the scan configuration
to None.
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
7. Click Save.
Related topics
About Discovery Results
View and search Discovery Results
Stop a running discovery scan
Delete Discovery Schedules
REST API Key The REST API key, available in the AirWatch administration console. The key must
be provided to enable integration with AirWatch through API calls.
Credentials The details of the service account required to connect to the device and run
commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed.
See Add and edit User/Password credentials.
Auto Provision If selected, all AirWatch devices discovered in the next scan are added to inventory.
Devices
NOTE: Use this option with care, to avoid expanding your inventory to an
unexpected extent.
5. Optional: In the Notify section, enter an email address for being notified of when the discovery scan
completes. The email includes the name of the discovery schedule.
6. Specify the scan schedule:
TIP: To maintain the scan inventory without scanning, set the schedule of the scan configuration
to None.
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
7. Click Save.
Related topics
About Discovery Results
View and search Discovery Results
Stop a running discovery scan
Timeout The time after which the scan ends if no response is returned.
Credentials The details of the service account required to connect to the device and run
commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed.
See Add and edit User/Password credentials.
5. Optional: In the Notify section, enter an email address for being notified of when the discovery scan
completes. The email includes the name of the discovery schedule.
6. Specify the scan schedule:
TIP: To maintain the scan inventory without scanning, set the schedule of the scan configuration
to None.
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
7. Click Save.
Related topics
About Discovery Results
View and search Discovery Results
Stop a running discovery scan
Delete Discovery Schedules
NOTE: After a Discovery Schedule is saved, you cannot change SNMP to SSH authentication.
1. Go to the Discovery Schedule Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Discovery Schedules.
c. Select Choose Action > New.
2. Select the Discovery Type to display the form with the options for the selected type, in this case
Authenticated [WinRM, SNMP, SSH, VMware].
The following options appear before the Notify section:
◦ DNS Lookup
◦ Relay
◦ WinRM
◦ SSH
◦ SNMP
For this procedure only DNS Lookup and SNMP are pertinent
3. In the Name field, enter a name for the scan.
This name appears on the Discovery Schedules page.
4. In the IP Address Range field, enter an IP address range to scan. Use hyphens to specify individual
IP address class ranges. For example, type 192.168.2-5.1-200 to scan for all IP addresses between
192.168.2-5.1 and 192.168.2-5.200, inclusive.
TIP: The KACE SMA supports both IPv6 (Internet Protocol version 6) and IPv4 addresses.
CAUTION: A maximum of 25,000 IP addresses is supported. If you specify an IP range that results in
more than 25,000 addresses, a warning appears when you attempt to save the provisioning schedule.
5. Expand DNS Lookup and select the Discovery options.
Including DNS Lookup enables Discovery to identify the name of the device. DNS Lookup is important if
you want device names to appear in the Discovery Results and Inventory lists.
Timeout The time, in seconds, after which a DNS lookup expires. If an address is not found
during this time, the process “times out.”
Option Description
Relay Device Specify the device that you want to use as a relay for agentless device inventory.
A relay device that is used during discovery as a relay is used for agentless inventory,
when a new device is provisioned automatically from discovery results.
Selected relay devices are listed on the following pages:
• On the Agentless Device Connection Details page, when a new device is
provisioned automatically from discovery results. For more information about
this page, see Enable Agentless management by entering device information
manually.
• On the Provisioning Schedule Detail page, when agent provisioning is initiated
from discovery results. For more information, see Install the KACE SMA Agent
on a device or multiple devices.
• On the Agentless Device Connection Details page, when a new device is
provisioned automatically from discovery results. For more information about
this page, see Enable Agentless management by entering device information
manually.
SNMP Full Walk Enable a Full Walk of data in the MIB (management information base) on devices.
If this option is cleared, the appliance does a Bulk GET, which searches three core
OIDs (object identifiers). When selecting this option, be aware that a Full Walk can
take up to 20 minutes per device. The default, Bulk GET, takes approximately one
second and acquires all of the information needed for Discovery.
NOTE: SNMP inventory walk does not support non-English characters on
Windows devices. If it encounters non-English characters, the SNMP inventory
process reports an error and stops loading inventory information.
Timeout The time, in seconds, after which the scan ends if no response is returned.
Credentials The details of the SNMP v1/v2 credentials required to connect to the device and run
(SNMPv1/v2) commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed.
Credentials The details of the SNMP v3 credentials required to connect to the device and run
(SNMPv3) commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed.
See Add and edit SNMP credentials.
8. Optional: In the Notify section, enter an email address for being notified of when the discovery scan
completes. The email includes the name of the discovery schedule.
9. Specify the scan schedule:
TIP: To maintain the scan inventory without scanning, set the schedule of the scan configuration
to None.
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
NOTE: For information about browser requirements for Device Actions, go to https://support.quest.com/
kb/148787.
Discovery Results are a "point-in-time" view, and any newly defined devices for management will reflect their state
the next time discovery is run.
See Managing inventory information.
The results showing the IP address at the time of the scan might not reflect the current IP address of a given
device if the DHCP-assigned IP address has changed.
NOTE: Your KACE SMA license agreement entitles you to manage a specified number of devices that
are classified as Managed Computers, Assets, and Monitored Servers. Devices count toward these limits
even if such devices are MIA (missing in action) or no longer in use. However, devices that are added to
inventory manually, or through the API, do not count toward license limits. See View KACE SMA license
information.
For information about the KACE SMA features available to devices, see Features available for each device
management method.
NOTE: Under Agentless, the Non-Win OSs are Mac OS X, AIX®, CentOS™, Debian®, FreeBSD®, HP-
UX, Oracle® Enterprise Linux, Red Hat Enterprise Linux, SUSE, Solaris®, and Ubuntu.
WSAPI
Feature or component Agent Agentless manual
Home
Inventory
Windows
and Mac
only
SNMP Inventory X
Configurations: List of devices
can be expanded. See Using
SNMP Inventory Configurations
to identify specific SNMP objects
and non-computer devices to add
to inventory.
Monitoring
Assets
Distribution
Scripting
Windows
and Mac
only
Security
Service Desk
Reporting
Organizations
Agent Logging Enabled Whether the KACE SMA stores scripting results provided by
Agents installed on managed devices. Agent logs can consume
as much as 1GB of disk space in the database. If disk space is
not an issue, enable Agent Logging to keep all log information
for Agent-managed devices. These logs can be useful during
troubleshooting. To save disk space, and enable faster Agent
communication, disable Agent Logging.
Agent Inventory 12 hours The frequency at which Agents on managed devices report
inventory. This information is displayed in the Inventory section.
Catalog Inventory 24 hours The frequency at which managed devices report inventory to
the Software Catalog page.
Scripting Update 4 hours The frequency at which Agents on managed devices request
updated copies of scripts that are enabled on managed
devices. This interval does not affect how often scripts run.
3. In the Notify section, specify the message to use for Agent communications:
Option Suggested Setting Notes
Agent Splash Default text: The message that appears to users when
Page Message Quest KACE Systems Management Agents are performing tasks, such as
Appliance is verifying your running scripts, on their devices.
PC Configuration and managing
software updates. Please
Wait...
4. In the Schedule section, specify the Communication Window for Agent-managed devices:
Option Suggested Setting Notes
Communication 00:00 to 00:00 (+1 The period during which Agents on managed devices are
Window day) allowed to connect with the KACE SMA. For example, to allow
Agents to connect between the hours of 01:00 and 06:00 only,
select 01:00 from the first drop-down list, and 06:00 from the
second drop-down list.
SSH Timeout The time, in seconds or minutes, after which the connection is closed if there is no
activity.
SNMP Timeout The time, in seconds, after which the connection is closed if there is no activity.
WinRM Timeout The time, in seconds or minutes, after which the connection is closed if there is no
activity.
6. If the Organization component is not enabled on your appliance, specify Agent settings.
NOTE: If the Organization component is enabled on your appliance, Agent settings are located on the
appliance General Settings page.
Option Description
Last Task This value indicates the date and time when the appliance task throughput was last
Throughput updated.
Update
Current Load The value in this field depicts the load on an appliance at any given time. For the
Average appliance to run normally, the value in this field must be between 0.0 and 10.0.
Task Throughput The value that controls how scheduled tasks, such as inventory collection, scripting,
and patching updates, are balanced by the appliance.
NOTE: This value can be increased only if the value in the Current Load
Average is not more than 10.0 and the Last Task Throughput Update time is
more than 15 minutes.
7. Click Save.
The changes take effect when Agents check in to the appliance.
8. If you have multiple organizations, repeat the preceding steps for each organization.
Related topics
View appliance logs
Configure appliance General Settings with the Organization component enabled
Scoped users can see the details of all devices, but can only edit the details of those devices that are associated
with their role. For more information about user roles, see Add or edit User Roles.
The following groups can appear on the Device Details page:
• Summary group
• Inventory Information group
• Software group
• Activities group
• Security group
• Dell Command | Monitor group
• Dell Updates group
• Logs group
• Asset group
Summary group
Basic device identification information. The items are not separated into sections as in the other groups on the
page. The entries that appear on the Device Detail page vary depending on the device, operating system (if
relevant), connection type, and so on.
Asset Subtype The Asset Subtype for this device, if one has been
assigned. Asset Subtypes are subcategories of
assets that you can add to any Asset Type, including
custom Asset Types. This enables you to identify
and manage subtypes of assets, such as Device
assets that are computers, printers, or routers.
Manual Entry A field that indicates the inventory information was MANUAL_ENTRY
added manually, either through WSAPI or XML
upload. click Edit to modify the information.
Device Entry Type A field that indicates how the device is being N/A
managed: Agent Device, Agentless Device, or
Manually Entered Record. Click Edit to change
connection protocols.
MAC Address The device’s Media Access Control (MAC) address MAC
number.
Uptime Since Last The amount of time the device has been running UPTIME
Reboot since it was restarted.
Agent Version The version number of the KACE SMA Agent CLIENT_VERSION
installed on the device.
Device Timezone The timezone used by the KACE SMA Agent TZ_AGENT
installed on the device.
User Name The name of the most recent user who logged in to USER
the device. Some devices might have multiple users.
Agent Connection The time the Agent Messaging Protocol (AMP) KBSYS.SMMP_CONNECTION
service on the device connected to the KACE SMA
and the current connection status (available for
Agent-managed devices only). Connection status
information includes:
Last Inventory The time of the most recent inventory report. LAST_SYNC
Device Created The date and time that the device’s first inventory CREATED
record was created.
Device Modified The date and time that the device’s inventory record MODIFIED
was modified.
Volume n The type and size of the disk drive’s file system, MACHINE_DISKS
and amount of space used on the disk drive. To
view changes to the drive usage, click Show Usage
History link in this field. This information is updated
when usage increases or decreases by 5% or more.
There is one entry for each volume.
For VMware® ESXi® host devices, each datastore
associated with the ESXi host is listed as a volume.
VMware UUID This field is only visible when you select a VMware INSTANCE_UUID
device. The UUID is a globally unique identifier for
the vCenter Server or the ESXi host.
KACE Cloud Mobile When you integrate with the KACE Cloud MDM and N/A
Device Manager select a KACE Cloud MDM device, an additional set
(MDM) commands of commands is available in this section.
• Force Inventory: Requests from the KACE
Cloud MDM to initiate a new inventory for
the device. When complete, the KACE SMA
synchronizes the inventory information.
• Lock: Blocks access to the selected device.
Next time the user interacts with the device,
they are prompted to provide the device's
passcode.
• Set Passcode: Allows you to specify a new
passcode for the selected device.
Asset Tag Windows and KACE MDM devices only. The ASSET_TAG
BIOS Asset Tag of a system. An Admin can use a
bios utility to set this value on the system.
Virtual Device Used to identify devices that are virtual, such as VIRTUAL
devices running on VMware platforms. Not displayed
for physical devices, such as laptops and servers.
Intel AMT Device On Intel-based Windows devices with Intel AMT INTEL_AMT
technology present, displays information about
configuration.
See About Intel AMT information in device details.
Boot ROM Version The Boot ROM or Firmware version of the device. BIOS_VERSION
BIOS Release Date The date the BIOS version was released. BIOS_DATE
Black Toner - Printers only. The make and model of the black
Description toner.
Black Toner - Printers only. The maximum level of the black toner
Maximum Level powder.
Black Toner - Printers only. The current level of the black toner
Current Level powder. If the toner is not installed, a message
appears in this field.
Cyan Toner - Color printers only. The make and model of the
Description cyan toner.
Cyan Toner - Color printers only. The maximum level of the cyan
Maximum Level toner powder.
Cyan Toner - Color printers only. The current level of the cyan
Current Level toner powder. If the toner is not installed, a message
appears in this field.
Magenta Toner - Color printers only. The make and model of the
Description magenta toner.
Yellow Toner - Color printers only. The make and model of the
Description yellow toner.
Yellow Toner - Color printers only. The current level of the yellow
Current Level toner powder. If the toner is not installed, a message
appears in this field.
Volume n The type and size of the disk drive’s file system, MACHINE_DISKS
and amount of space used on the disk drive. To
view changes to the drive usage, click Show Usage
History link in this field. This information is updated
when usage changes by plus or minus 5%.
There is one entry for each volume.
SNMP Data The results of a SNMP Full Walk of data in the MIB
(management information base) on a device, if you
set up the Authenticated device discovery type to
perform a Full Walk. This section does not appear if
discovery was made with a Bulk GET.
Last Sync The date and time the device was last synchronized LAST_SYNC
with the policy settings in the Google Admin console.
Support End Date The final date the device will be supported. This is SUPPORT_END_DATE
applicable only for those devices purchased directly
from Google.
Annotated User The user of the device as noted by the administrator. ANNOTATED_USER
Order Number The device's order number. Only devices directly ORDER_NUMBER
purchased from Google have an order number.
Last Enrollment The date and time the device was last enrolled with LAST_ENROLLMENT_TIME
Time the Google Admin console.
Org Unit Path The full parent path with the Google organization ORG_UNIT_PATH
unit's name associated with the device.
Device type DMM devices only. The type of mobile device. DEVICE_TYPE
Examples include iPhone, iPad, iPod, Android
Phone, and Android Tablet.
ICCID KACE MDM and DMM devices only. The unique ICCID
serial number for the device’s SIM card.
Phone Number DMM devices only. Phone number associated with PHONE_NUMBER
the device.
Mobile Operator KACE MDM and DMM devices only. The mobile CARRIER
network carrier.
Bluetooth MAC DMM devices only. Media access control address BLUETOOTH_MAC
Address for Bluetooth on the device.
Battery Level KACE MDM and DMM devices only. Amount of BATTERY_LEVEL
battery charge at last update, in percent.
Last Check-in The time stamp of when the device information was LAST_CHECK_IN
last updated.
DEP Managed KACE MDM iOS devices only. Indicates if the IS_DEP_MANAGED
device is managed by the Apple Device Enrollment
Program (DEP).
DEP Profile KACE MDM iOS DEP-managed devices only. The DEP_PROFILE
name of the DEP profile associated with the device.
DEP Profile KACE MDM iOS DEP-managed devices only. The DEP_ASSIGNED_BY
Assigned By name of the user account that assigned the DEP
profile to the device.
DEP Profile KACE MDM iOS DEP-managed devices only. The DEP_ASSIGNED_DATE
Assigned Date date when the DEP profile is assigned to the device.
DEP Profile Status KACE MDM iOS DEP-managed devices only. The DEP_PROFILE_STATUS
management status of the device:
• Assigned: Apple DEP received a profile and it
is ready to be assigned to the device.
• Empty: profile is not assigned to the device.
• Pushed: A profile is delivered to the activated
device.
• Removed: A profile was assigned to the
device but has been removed. When the
device reactivates, KACE MDM will no longer
manage the device.
First Enrolled The date when the device was enrolled in KACE ENROLLMENT_DATE
MDM.
iCloud Enabled KACE MDM iOS devices only. Indicates if cloud is ICLOUD_ENABLED
enabled on the devices.
Last iCloud Backup KACE MDM iOS devices only. The date when ICLOUD_LAST_BACKUP
Apple iCloud was last backed up on the device.
Logged into iTunes KACE MDM iOS devices only. Indicates if the IS_ITUNES_ACCOUNT_ACTIVE
device is logged in to iCloud.
Wi-Fi Received KACE MDM Android devices only. The number of WIFI_BYTES_RECV
bytes the device received through a Wi-Fi network.
Wi-Fi Sent KACE MDM Android devices only. The number of WIFI_BYTES_SENT
bytes the device sent through a Wi-Fi network.
WWAN Received KACE MDM Android devices only. The number of WWAN_BYTES_RECV
bytes the device received through a mobile network.
WWAN Sent KACE MDM Android devices only. The number of WWAN_BYTES_SENT
bytes the device sent through a mobile network.
Agent Version The version number of the KACE SMA Agent CLIENT_VERSION
installed on the device.
Manual Entry A field that indicates the inventory information was MANUAL_ENTRY
added manually, either through WSAPI or XML
upload.
Device Entry Type A field that indicates how the device is being N/A
managed: Agent Device, Agentless Device, or
Manually Entered Record. Click Edit to change
connection protocols.
Last Inventory The time of the most recent inventory report. LAST_INVENTORY
Last Sync For Agent-managed devices, the time the device LAST_SYNC
last checked in to the KACE SMA. For Agentless
devices, the time the KACE SMA last connected to
the device and collected inventory.
Last Agent Update The time of the most recent update to the KACE LAST_CLIENT_UPDATE
SMA Agent, if any.
User Logged The user currently logged in to the device. This entry USER_LOGGED
includes the username and the domain to which the
user belongs.
User Fullname The full name of the user who owns the device. USER_FULLNAME
Operating System The date the operating system was installed. OS_INSTALLED_DATE
Installed On
Last Startup The length of time the operating system has been LAST_REBOOT
running.
Uptime Since Last The amount of time the device has been running UPTIME
Reboot since it was restarted.
Pagefile Max Size The maximum size of the Windows Pagefile. PAGEFILE_MAX_SIZE
Latitude The latitude of the device detected during the last LATITUDE
update.
Longitude The longitude of the device detected during the last LONGITUDE
update.
Last Update The time stamp of when the device information was LAST_UPDATE
last updated.
Virtual Machines When an ESXi host is selected, this group lists the
virtual machines running on the ESXi host. Some of
the information in this list is only available if VMware
tools are installed on the virtual machines. If some
columns are not populated, this is because VMware
tools are not installed on that virtual machine.
Hostname The host name assigned to the ESXi host. If an ESXi N/A
device is already added to the inventory, its name in
this column appears as a hyperlink. When you click
the link, the page is updated to display device details
for the monitored ESXi device.
Software group
Details on the applications installed on the device, including patching information, running processes, and startup
programs.
Metered Software Applications for which metering has been enabled. N/A
Custom Inventory A list of Custom Inventory fields for this device, along with the N/A
Fields field name and value.
Uploaded Files The files that have been uploaded to the appliance from this N/A
device using the upload a file script action.
Patches Reported Microsoft patches that have been installed on the device. N/A
Installed in If change history is enabled for this section, and the information
Software Inventory in this section has changed, the Show Changes link appears
next to the heading. Click Show Changes to view only those
items that have changed. Click Hide Changes to view all items.
Activities group
Information about actions to be performed on the device.
Profiles Any alert criteria profiles that are assigned to this device. N/A
Maintenance Any Maintenance Windows that are assigned to this device. N/A
Windows
Level/Alert Alerts that are active for this device, with icons indicating the N/A
level of alert.
Labels The labels assigned to this device. Labels are used to organize N/A
and categorize inventory and assets.
Failed Managed A list of Managed Installations that have failed to install. To N/A
Installations access details of the Managed Installations, click the Managed
Installation Detail link.
Managed Install A list of Managed Installations that are scheduled to be sent to N/A
List the device the next time it connects with the appliance.
Service Desk A list of the tickets associated with this device. These can either N/A
Tickets be tickets assigned to the device owner or tickets submitted by
the device owner. To view ticket details, click the ticket ID (for
example, TICK:0032).
Security group
Information related to patching and device vulnerabilities.
Patching Detect/ A list of the patches detected and deployed on the device. N/A
Deploy Status If patch attempts have been made, but they have failed, you
can click Reset Tries to reset the number of patch attempts to
the maximum allowed.
Threat Level 5 List Threats that are harmful to applications, processes, startup N/A
items, or services on the device.
Alerts DCM log entries. These can indicate hardware errors detected N/A
by firmware.
Hardware Collected information that includes detailed battery specs and N/A
usage data, service processor presence and configuration,
memory inventory, and attached Dell monitors.
For classes and properties queried by the KACE SMA using Dell Command | Monitor, see About Dell Command |
Monitor.
Agent Logs The logs for the KACE SMA Agent. A question mark indicates N/A
that its status is unknown.
User Console Details about User Console packages installed on this device. N/A
Installation Logs
Scripting Logs Scripts, such as Configuration Policy scripts, that have run on N/A
this device, along with the available status of any scripts in
progress.
Asset group
This section displays the details of the Asset associated with this device. Clicking the Edit this Asset link enables
you to edit the asset information.
Windows 7, 8, 8.1
MACHINE_DDPE
Item Description Database field
Server Hostname Hostname of the DDP|E server managing this DDP| SERVER_HOSTNAME
E client.
Last Inventory Timestamp of when the last DDP|E client inventory PROTECTION_STATUS_UPDATED
Generated occurred. Not to be confused with K1 inventory.
Table 12. DDP|E Volume information displayed on the Device Detail page
MACHINE_DDPE_VOLUME
Item Description Database field
Protection Reason Manner of protection used on the DDP|E client. The PROTECTION_REASON
option is typically VendorProtected, which indicates
DDP|E or BitLocker.
BitLocker
BitLocker is a full disk encryption feature included with Windows.
Table 13. Supported OSs for BitLocker
MACHINE_BITLOCKER_VOLUME
Item Description Database field
FileVault 2
FileVault 2 is a full disk encryption feature included with Mac OS X.
Table 15. Supported OSs for FileVault 2
MACHINE_FILEVAULT_VOLUME
Item Description Database field
Authorized Users A list of accounts that can unlock the drive in EFI. AUTHORIZED_USERS
Version VERSION
MACHINE_TPM
Item Description Database field
NOTE: After you set the registry key, the DDP|E service requires a full policy update schedule before the
KACE SMA is able to collect inventory.
1. Go to the Script Detail page for the KACE SMA Enable Detailed DDPE Inventory (Windows) script.
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Scripting.
c. From the list, select KACE SMA Enable Detailed DDPE Inventory (Windows).
2. In the Configure section, specify script settings:
Option Description
Name KACE SMA Enable Detailed DDPE Inventory (Windows), the name of this default
script.
Enabled Select this check box to run the script on the target devices. Do not enable a script
until you are finished testing it and are ready to run it. Enable the script on a test label
before you enable it on all devices.
Status Indicates the readiness of the script to be rolled out to the network. Set the status to
Production.
Description Contains the brief description of the actions the default script performs.
All Devices Deploy to all devices. Clear the check box to limit the deployment to specific labels or
devices.
Labels Limit deployment to devices that belong to specified labels. To select labels, click
Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location,
the appliance copies digital assets from that Replication Share or alternate download
location instead of downloading them directly from the appliance.
NOTE: The appliance uses a Replication Share before it uses the KACE Alt
Location.
Devices Limit deployment to one or more devices. To find devices, begin typing in the field.
Operating LThe operating systems on which the application runs. Applications are deployed
Systems only to devices with the selected operating systems.
a. Click Manage Operating Systems.
b. In the Operating Systems dialog box that appears, select the OS versions in
the navigation tree, as applicable.
You have an option to select OS versions by their family, product, architecture,
or build version. You can choose a specific build versions, or a parent node, as
needed. Selecting a parent node in the tree automatically selects the associated
child nodes. This behavior allows you to select any future OS versions, as
devices are added or upgraded in your managed environment. For example, to
select all build current and future versions associated with the Windows 10 x64
architecture, under All > Windows > Windows 10, select x64.
4. In the Schedule section, specify run options:
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
IMPORTANT: You should test the GPO on a specific computer or set of computers before deploying it to
all systems.
NOTE: The data collection discussed here is separate from the vPro and AMT data that the KACE SMA
collects using Dell Command | Monitor. See About Dell Command | Monitor.
MACHINE_INTEL_AMT
Item Description Database field
Win7 Low Disk Windows 7 devices with less than 1 GB of free hard disk space
WS2012 No 2916993 Windows Server 2012 devices without Hotfix 2916993 installed
NOTE: This feature is only supported on Windows devices. If you enable ActiveX in Microsoft Internet
Explorer, the device action runs using ActiveX. If ActiveX is disabled, or you want to use a different
browser, the Windows device you are running the device action from must have the KACE Agent version
9.0 or later agent installed and connected.
NOTE: When you initiate device through the agent, the action executable must be placed in your %PATH%.
The agent is 32-bit, so on 64-bit Windows devices, use %windir%/System32 as an alias to the %windir
%/Wow64 directory. If you need to run a program that's located in the %windir%/System32 directory
on a 64-bit Windows system, you must use the %windir%/SysNative virtual directory. You can either
add %windir%/SysNative to your %PATH% environment variable or provide a fully-qualified path by
prepending %windir%/SysNative to your executable when defining your machine action.
1. Go to the Device Detail page for a device:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Devices.
c. On the Devices list, in the row that contains the required device, select the check box.
2. Select an action in the Actions drop-down list.
NOTE: If no Device Actions have been created, the Actions drop-down list does not appear.
TIP: Assigning devices to a user (Choose Action > Assign To) causes all of the assigned
devices to appear listed for the selected user on the My Devices page in the User Console.
When the user attempts to download and install software, they can select a target device, as
required.
Operator is
c. Click Search.
Devices that have been added manually are displayed.
For appliances with Use the appliance's client share to store files, such as files used to install applications
the Organization on managed devices.
component The appliance’s client share is a built-in Windows file server that the provisioning
enabled: service can use to assist in distributing the Samba client on your network. Quest
Enable recommends that this file server only be enabled when you perform application
Organization File installations on managed devices.
Shares
Require NTLMv2 Enable NTLMv2 authentication for the KACE SMA files shares. When this setting
authentication is enabled, managed devices connecting to the KACE SMA File Shares require
to appliance file support for NTLMv2 and authenticate to the KACE SMA using NTLMv2. Even though
shares NTLMv2 is more secure than NTLM and LANMAN, non-NTLMv2 configurations are
more common and this option is usually turned off. Enabling this option disables
lanman auth and ntlm auth on the Samba server. NTLMv2 Levels 1-4 are
supported. If you need NTLM v2 Level 5, consider manually provisioning the KACE
SMA Agent. See Manually deploying the KACE SMA Agent.
Require NTLMv2 Force certain KACE SMA functions that are supported through the Samba client,
to off-board file such as Agent Provisioning, to authenticate to offboard network file shares using
shares NTLMv2. Even though NTLMv2 is more secure than NTLM and LANMAN, non-
NTLMv2 configurations are more common and this option is usually disabled.
Enabling this option enables the client ntlmv2 auth option for Samba client
functions.
3. Click Save.
4. If prompted, restart the appliance.
When the appliance restarts, enable file sharing at the organization level. See Enable organization-level file
sharing with the Organization component enabled.
Require NTLMv2 Enable NTLMv2 authentication for the KACE SMA files shares. When this setting
to authenticate is enabled, managed devices connecting to the KACE SMA File Shares require
appliance file support for NTLMv2 and authenticate to the KACE SMA using NTLMv2. Even though
shares NTLMv2 is more secure than NTLM and LANMAN, non-NTLMv2 configurations are
more common and this option is usually turned off. Enabling this option disables
lanman auth and ntlm auth on the Samba server. NTLMv2 Levels 1-4 are
supported. If you need NTLM v2 Level 5, consider manually provisioning the KACE
SMA Agent. See Manually deploying the KACE SMA Agent.
Require NTLMv2 Force certain KACE SMA functions that are supported through the Samba client,
authentication such as Agent Provisioning, to authenticate to offboard network file shares using
to off-board file NTLMv2. Even though NTLMv2 is more secure than NTLM and LANMAN, non-
shares NTLMv2 configurations are more common and this option is usually disabled.
Enabling this option enables the client ntlmv2 auth option for Samba client
functions.
4. Click Save.
5. If prompted, restart the appliance.
Provision KACE SMA Agents using the KACE SMA GPO Provisioning Tool
You can install the KACE SMA Agent on a single device, or on multiple devices by using the KACE SMA GPO
Provisioning Tool, starting within the Agent Provisioning Assistant. You can use this method to provision Windows
devices.
• You have an Active Directory environment.
• You have appropriate access to set up software installations.
• You have met the system requirement spelled out in Prepare to use the GPO Provisioning Tool for Agent
deployment.
To complete this task, you leave the KACE SMA to work in the Windows Group Policy Management Console or
the Windows Administrative Tools using the KACE SMA GPO Provisioning Tool before returning to the appliance.
1. Go to the Agent Provisioning Assistant:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Settings, then click Provisioning.
c. On the Provisioning panel, click Agent Provisioning Assistant.
The Agent Provisioning Assistant: Step 1 of 3 page appears.
2. Select the check box for Provisioning Using Windows Group Policy (recommended), and click Next to
display the Agent Provisioning Assistant: Step 2 of 3 page.
3. Click the link to the Knowledge Base article about using the KACE SMA GPO Provisioning Tool for Agent
deployment at https://support.quest.com/kb/133776.
The Knowledge Base article provides a link to download the MSI for the GPO Provisioning Tool.
Installing and starting the tool requires leaving the KACE SMA interface.
4. Download the MSI, and start it to install the tool.
5. Start the installed tool from the Start menu.
The deployment wizard leads you through steps to configure and apply a GPO for software deployment.
Where possible, the wizard attempts to use defaults that reduce the amount of configuration required.
NOTE: On Windows devices, ports 139 and 445, File and Print Sharing, and Administrator credentials
are required only during Agent installation. You can disable access to these ports and services after
installation if necessary. The Agent uses port 52230 for ongoing communications.
NOTE: After installation, the Agent runs within the context of the Local System Account, which is a
built-in account used by Windows operating systems.
Name A unique name that identifies this configuration. The name appears on the
Provisioning Schedules page.
Enabled Enable provisioning schedules. Schedules run only if this check box is selected.
Install/Uninstall Indicates whether the provisioning schedule deals with installing or uninstalling
Agents.
Credentials Separate rows for the credentials needed to connect to the device and run
commands for the particular platform targeted by the schedule. The first column
contains the operating system. The second column contains the Agent Version in
place for installation. The third column contains a drop-down list from which to select
existing credentials. You can select Add new credential to add credentials not
already listed.
See Add and edit User/Password credentials.
Target IP A comma-separated list of the IP addresses or host names of the target devices. Use
addresses or hyphens to specify individual IP address class ranges.
hostnames
TIP: The KACE SMA supports both IPv6 (Internet Protocol version 6) and IPv4
addresses.
The Help me pick devices link enables you to add devices to the Target IP
addresses or Hostnames list:
• Provisioning IP Range: Use hyphens to specify individual IP address class
ranges. For example:
◦ IPv6: fdef:22b9:e8ae:14a9::1a0:f000-f0aa
◦ IPv4: 192.168.2-5.1-200
After specifying a range, click Add All
• Select Devices from Discovery: This drop-down list is populated from
the Discovery Results. To filter the contents, start typing in the field. After
selecting a device, click Add All.
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
Option Description
Name The name of the provisioning schedule (links to the Provisioning Schedule Detail
page).
Targeted The total number of target devices in the configuration (links to the Provisioning
Results page).
Running The total number of target devices on which provisioning is running (links to the
Provisioning Results page).
Pending The total number of target devices on which provisioning has not yet started (links to
the Provisioning Results page).
Succeeded The total number of target devices on which provisioning has succeeded (links to the
Provisioning Results page).
Failed The total number of target devices on which provisioning has failed (links to the
Provisioning Results page).
Success Rate The total number of target devices on which provisioning has succeeded as a
percentage.
Schedule The specified provisioning schedule. For example: Everyn minutes, Every n hours, or
Never.
Enabled Whether the configuration is enabled or disabled. A check mark indicates that the
provisioning schedule is enabled.
Item Description
Hostname The hostname of the target device. Click the Remote Connection button to open a
Remote Desktop Connection to the target device (Internet Explorer only):
Agent Logging Enabled Whether the KACE SMA stores scripting results provided by
Agents installed on managed devices. Agent logs can consume
as much as 1GB of disk space in the database. If disk space is
not an issue, enable Agent Logging to keep all log information
for Agent-managed devices. These logs can be useful during
troubleshooting. To save disk space, and enable faster Agent
communication, disable Agent Logging.
Agent Debug Enabled If selected, this option allows you to record the Agent's debug
Trace trace. This information allows administrators to monitor the
Agent's performance, and to diagnose common problems.
Agent Inventory 12 hours The frequency at which Agents on managed devices report
inventory. This information is displayed in the Inventory section.
Catalog Inventory 1 day The frequency at which managed devices report inventory to
the Software Catalog page.
Agent Status on Enabled Indicates if the KACE SMA Agent application displays in the
Device system tray (Windows devices) or the menu bar (Mac devices)
on the system on which the agent is running.
Scripting Update 4 hours The frequency at which Agents on managed devices request
updated copies of scripts that are enabled on managed
devices. This interval does not affect how often scripts run.
Max Download As required The maximum download speed, as required. Choose from the
Speed available options.
Disable Wait for Disabled If selected, this option stops the Agent from executing boot-up
Bootup Tasks tasks.
Disable Wait for Disabled If selected, this option stops the agent from executing login
Login Tasks tasks.
3. In the Notify section, specify the message to use for Agent communications:
Option Suggested Setting Notes
Agent Splash Default text: The message that appears to users when
Page Message KACE Systems Management Agents are performing tasks, such as
Appliance (SMA) is verifying running scripts, on their devices.
your PC Configuration and
managing software updates.
Please Wait...
Agent Splash As required The path to an existing .bmp file that you
Bitmap want to use as the splash logo.
Communication 00:00 to 00:00 (+1 The period during which Agents on managed devices are
Window day) allowed to connect with the KACE SMA. For example, to allow
Agents to connect between the hours of 01:00 and 06:00 only,
select 01:00 from the first drop-down list, and 06:00 from the
second drop-down list.
You can set the communications window to avoid times when
your devices are busiest.
5. In the Agentless Settings section, specify communications settings for Agentless devices:
Option Description
SNMP Timeout The time, in seconds or minutes, after which the connection is closed if there is no
activity.
SSH Timeout The time, in seconds, after which the connection is closed if there is no activity.
WinRM Timeout The time, in seconds or minutes, after which the connection is closed if there is no
activity.
6. If the Organization component is not enabled on your appliance, specify Agent settings.
NOTE: If the Organization component is enabled on your appliance, these Agent settings are located
on the appliance KACE SMA System Administration Console General Settings page.
Option Description
Last Task This value indicates the date and time when the appliance task throughput was last
Throughput updated.
Update
Current Load The value in this field depicts the load on an appliance at any given time. For the
Average appliance to run normally, the value in this field must be between 0.0 and 10.0.
Task Throughput The value that controls how scheduled tasks, such as inventory collection, scripting,
and patching updates, are balanced by the appliance.
NOTE: This value can be increased only if the value in the Current Load
Average is not more than 10.0 and the Last Task Throughput Update time is
more than 15 minutes.
7. Click Save.
The changes take effect when Agents check in to the appliance.
8. If you have multiple organizations, repeat the preceding steps for each organization.
Related topics
View appliance logs
Configure appliance General Settings with the Organization component enabled
Device Name The name of the device that is the target of the task.
Type The type of task. Depending on appliance configuration, task types include alerts,
inventory, kbot, krash upload, and scripting updates.
Next Run The next scheduled run time for the task.
The options displayed depend on type of tasks available on your appliance. Typical options include:
◦ Ready to Run (connected): Tasks that are connected through the messaging protocol and about to
run.
◦ Ready to Run: Tasks that are queued to run when an messaging protocol connection is established.
◦ Longer than 10 minutes: Tasks that have been waiting longer than 10 minutes for a protocol
connection.
4. To view details about a device, click its name in the Device Name column.
The Device Detail page appears.
Option Description
Device Name The name of the device. Click a name to view device details.
Expiration The date and time when the message expires, also called Keep Alive time. Messages
are deleted from the queue automatically when they expire.
Related topics
Broadcasting alerts to managed devices
Enabled Deploy the update to the selected KACE SMA devices during the next scheduled
inventory interval. Clear the check box to prevent updates from being installed.
Modified Read-only: The time the most recent Agent bundle was downloaded.
All Devices Deploy the update to all devices that have the KACE SMA Agent installed. If this
option is selected, the Devices and Labels elements do not appear on the page.
Devices Update only specific devices. Select the device names in the drop-down list that
appears when you click in the field, or type the first few characters of a device
name to sort the list. For example, type Dev to list matching device names such
as Device-1, Device-2, and so on. This option is not available when you select All
Devices.
Manage Display the Edit Labels dialog. Search for and select labels, and update devices
Associated Labels assigned to the selected labels. This option is not available when you select All
Devices.
4. Click Save.
The update is deployed to the selected devices during the next scheduled inventory interval. If you use
Replication Shares, and failover to the KACE SMA is not selected, Agents are updated after the Replication
Shares are updated.
5. If you limited deployment to specified devices for testing, select additional devices in the Agent Settings
section of the Update Agent Settings page when your testing is complete.
The update is deployed to the selected devices during the next scheduled inventory interval.
6. If you have multiple organizations, repeat the preceding steps for each organization.
NOTE: File sharing must be enabled to access the installers. See Enable file sharing at the System level.
Manually deploy the KACE SMA Agent on Windows devices using the
installation wizard
You can manually deploy the KACE SMA Agent on Windows devices by running the installation wizard on
devices.
1. Go to the shared directory of the appliance:
\\KACE_SMA_hostname\client\agent_provisioning\windows_platform
2. Copy the ampagent-6.x.xxxxx-x86.msi file to the device.
3. Double-click the file to start the installation and follow the instructions in the installation wizard.
The device information appears in the appliance Inventory within a few minutes. See Managing applications on
the Software page.
Description Parameter
Install flag /i
Example:
msiexec /i ampagent-6.x.xxxxx-x86
Uninstall flag /x
Example:
msiexec /x ampagent-6.x.xxxxx-x86
set KACE_SERVER=kboxmsiexec /i
ampagent-6.x.xxxxx-x86
The system looks for the value of host in these locations in the order shown:
1. The installer file
2. The HOST property value
3. KACE_SERVER (environment variable)
4. The amp.conf file
CAUTION: If you leave the host value empty, you must set the environment variable. Otherwise, the Agent
will not connect to the appliance. Quest recommends that you use the fully qualified domain name as the
hostname.
Manage the KACE SMA Agent on Windows devices using the Windows system
tray
You can view the status of the KACE SMA Agent, force inventory, and display agent information using the
Windows system tray.
To access the KACE SMA Agent status using the system tray, you must enable the Agent Status On Device
option in the Communication Settings section. For more information, see Configure Agent communication and log
settings.
1. On the Windows device where KACE SMA Agent is running, in the Windows system tray, click .
The agent menu appears.
2. To find out if the agent is connected to the appliance, observe the icon on the right of the Status option in
the menu.
3. To run the device inventory, click Inventory in the menu.
4. To find out more information about the agent application in the system tray, click About.
Deploy or upgrade the KACE SMA Agent to Mac devices using the Agent
installer
You can manually deploy the KACE SMA Agent on Mac devices by copying the Agent installation files to the
devices and running the installer.
1. Copy the KACE SMA Agent installation file to the device.
See Obtaining Agent installation files.
2. Double-click ampagent-6.x.build_number.dmg.
3. Double-click AMPAgent.pkg.
4. Follow the instructions in the installer.
Be sure to enter the name of your KACE SMA.
The installer creates the following directories on your device:
• /Library/Application Support/Quest/KACE/bin where the Agent executable files are installed.
• /Library/Application Support/Quest/KACE/data/ where the Agent configuration, logs, and
other data is stored.
NOTE: The export call must proceed the install call. For example: sudo export
KACE_SERVER=kace_sma_name installer -pkg '/Volumes/Dell KACE/AMPAgent.pkg'
-target /
CAUTION: If you leave the host value empty, you must set the environment variable. Otherwise, the Agent
will not connect to the appliance. Quest KACE recommends that you use the fully qualified domain name
as the hostname.
Manage the KACE SMA Agent on Mac devices using the menu bar
You can view the status of the KACE SMA Agent, force inventory, and display agent information using the Mac
menu bar.
To access the KACE SMA Agent status using the system tray, you must enable the Agent Status On Device
option in the Communication Settings section. For more information, see Configure Agent communication and log
settings.
1. On the Mac device where the KACE SMA Agent is running, in the Mac menu bar, click .
The color of the icon indicates if the agent is connected to the appliance. A red icon is displayed if the agent
is disconnected. If the agent is connected, a green icon appears.
The agent menu appears.
2. To run the device inventory, click Run Inventory in the menu.
3. To restart the agent, click Restart Agent in the menu.
4. To find out more information about the agent application in the system tray, click About.
5. To remove the agent application from the Mac menu bar, click Quit.
The agent icon is removed from the menu bar. To display it again, log off, then log on. Alternatively, you
can install the agent again from the Application directory.
Operating system
AIX
CentOS
Chrome OS
Debian
Fedora
FreeBSD
HP-UX
Mac OS X
SUSE*
Solaris
Ubuntu*
Windows
Windows Server
*Most recent versions can also be managed with the KACE SMA Agent.
NOTE: For non-computer devices such as assets, or devices without operating systems that Agentless
management supports, you can map SNMP (Simple Network Management Protocol) OIDs (Object
Identifiers) to particular fields in the KACE SMA inventory table. As a result, you can identify specific
devices to be inventoried so that you can expand the inventory of Agentless-managed devices. See Using
SNMP Inventory Configurations to identify specific SNMP objects and non-computer devices to add to
inventory.
: Agentless management is enabled for the device, but the device is not currently reachable.
Depending on the device, the appliance uses various connection types to run commands on the selected
devices, obtain inventory information, and display that information on the Device Detail page. Information is
updated according to the inventory schedule for Agentless devices. See:
◦ Managing inventory information
◦ Schedule inventory data collection for managed devices
Option Description
Asset Subtype The asset subcategory, if applicable. This information enables you to identify and
manage subtypes of assets, such as Device assets that are computers, printers,
routers, and Software assets that run on Windows, Mac, or Linux systems in the
KACE SMA inventory. See About Asset Subtypes, custom fields, and device detail
preferences.
NOTE: In a default installation, Device Assets include two Asset Subtypes for
printer devices: Laser Printer: Color and Laser Printer: Monochrome. Each of
these subtypes provides a common set of fields that apply to most printers.
The appliance also comes with a set of printer templates for typical SNMP-
enabled printer models, based on these Asset Subtypes. You can edit these
templates or add new ones, as needed. When you apply a printer template to
a device, the data defined in the template, such as toner levels or descriptions,
is collected for the printer in the next inventory cycle. For more information,
see About printer templates.
Connection Type The connection method to use to connect to the device and obtain inventory
information, in this case, SSH.
Port The port number the appliance uses to connect to the device. No input is required for
the following the default port number (22).
Credentials The details of the service account required to connect to the device and run
commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed.
See Add and edit User/Password credentials.
Sudo Password The name of a service user account with permission to connect to devices. Using
a service account and Sudo Password is useful when you want to avoid using root
credentials to access devices. On some devices, however, higher privileges enable
the appliance to retrieve more detailed inventory information.
Shell The shell to use during connections. See Shell support for SSH connections.
Log Level The level of information to display on the Device Detail page. To see only the most
important messages, select Critical. To see all messages, select Debug.
Enable Inventory The inventory collection option. If this option is selected, the appliance collects
inventory information for the device according to the Agentless device inventory
schedule. If this option is cleared, inventory information is not collected. In both
cases, however, Agentless devices are counted.
DNS Server The hostname of the DNS server to use when identifying the device hostname and
other information. Providing the DNS server information enables the appliance to
match the device to existing inventory information during updates. If the appliance
cannot detect the device due to changes made to its hostname or IP address,
inventory fails.
Relay Device The name of the device that you want to use as a relay for agentless device
inventory.
A relay device that is used during discovery as a relay is used for agentless inventory,
when a new device is provisioned automatically from discovery results. You can
select a relay device on the Discovery Schedule Detail page. For more information,
see Add a Discovery Schedule to perform a quick "what and where" scan of your
network.
Option Description
Asset Subtype The asset subcategory, if applicable. This information enables you to identify and
manage subtypes of assets, such as Device assets that are computers, printers,
or routers, and Software assets that run on Windows, Mac, or Linux systems in the
KACE SMA inventory. See About Asset Subtypes, custom fields, and device detail
preferences.
NOTE: In a default installation, Device Assets include two Asset Subtypes for
printer devices: Laser Printer: Color and Laser Printer: Monochrome. Each of
these subtypes provides a common set of fields that apply to most printers.
The appliance also comes with a set of printer templates for typical SNMP-
enabled printer models, based on these Asset Subtypes. You can edit these
templates or add new ones, as needed. When you apply a printer template to
a device, the data defined in the template, such as toner levels or descriptions,
is collected for the printer in the next inventory cycle. For more information,
see About printer templates.
Connection Type The connection method to use to connect to the device and obtain inventory
information, in this case, SNMP.
SNMP (Simple Network Management Protocol) is a protocol for monitoring managed
devices on a network. To enable SNMP, port 161 must be open on the appliance and
on the device.
SNMP scan results include all SNMP capable devices. Remote shell extensions
enable the KACE SMA to connect, run commands, and capture information that can
be managed as inventory. For more information about SNMP options, see Add a
Discovery Schedule for SNMP-enabled non-computer devices.
SNMP Version The version of SNMP to use for connections. SNMPv1 and SNMPv2c do not use
authentication or encryption.
SNMP v3 uses authentication and encryption algorithms to increase the security of
SNMP communications. When you configure the SNMP v3 options, the appliance
performs an SNMP v3 scan on selected devices. If that scan fails, the appliance
attempts an SNMP v1 scan using the specified Public String
Read Community (SNMP v1, SNMP v2c) The community string to query. The default is Public. The
Public String is required if authentication is not required. When authentication is
required, the scan returns SNMP enabled with no system data.
Credentials The details of the service account required to connect to the device and run
commands using SNMP v3. Select existing credentials from the drop-down list, or
click Add new credential to add credentials not already listed. Credentials are not
required for SNMPv1 and SNMPv2c.
See Add and edit User/Password credentials.
Inventory One or more inventory configurations for the new SNMP agentless device, such as
Configurations Brother Laser Printer: Color, and others.
Log Level The level of information to display on the Device Detail page. To see only the most
important messages, select Critical. To see all messages, select Debug.
Enable Inventory The inventory collection option. If this option is selected, the appliance collects
inventory information for the device according to the Agentless device inventory
schedule. If this option is cleared, inventory information is not collected. In both
cases, however, Agentless devices are counted.
DNS Server The hostname of the DNS server to use when identifying the device hostname and
other information. Providing the DNS server information enables the appliance to
match the device to existing inventory information during updates. If the appliance
cannot detect the device due to changes made to its hostname or IP address,
inventory fails.
Relay Device The name of the device that you want to use as a relay for agentless device
inventory.
A relay device that is used during discovery as a relay is used for agentless inventory,
when a new device is provisioned automatically from discovery results. You can
select a relay device on the Discovery Schedule Detail page. For more information,
see Add a Discovery Schedule to perform a quick "what and where" scan of your
network.
Option Description
Asset Subtype The asset subcategory, if applicable. This information enables you to identify and
manage subtypes of assets, such as Device assets that are computers, printers,
Connection Type The connection method to use to connect to the Windows device and obtain inventory
information, in this case, WinRM.
Port The port number the appliance uses to connect to the device. No input is required for
the following default port number: 5985.
Credentials The details of the service account required to connect to the device and run
commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed.
See Add and edit User/Password credentials.
Require Kerberos If selected, Kerberos is required for authentication. NTLM will not be used as an
alternative when Kerberos is unavailable.
Using Kerberos requires DNS Lookup to be enabled in the same discovery
configuration. The DNS Server is also required in the local KACE SMA network
settings.
Log Level The level of information to display on the Device Detail page. To see only the most
important messages, select Critical. To see all messages, select Debug.
Enable Inventory The inventory collection option. If this option is selected, the appliance collects
inventory information for the device according to the Agentless device inventory
schedule. If this option is cleared, inventory information is not collected. In both
cases, however, Agentless devices are counted.
DNS Server The hostname of the DNS server to use when identifying the device hostname and
other information. Providing the DNS server information enables the appliance to
match the device to existing inventory information during updates. If the appliance
cannot detect the device due to changes made to its hostname or IP address,
inventory fails.
Relay Device The name of the device that you want to use as a relay for agentless device
inventory.
A relay device that is used during discovery as a relay is used for agentless inventory,
when a new device is provisioned automatically from discovery results. You can
select a relay device on the Discovery Schedule Detail page. For more information,
see Add a Discovery Schedule to perform a quick "what and where" scan of your
network.
Name The host name or IP address of the ESXi host or the vCenter Server.
Asset Subtype The asset subcategory, if applicable. This information enables you to identify and
manage subtypes of assets, such as VMware devices. For example, hypervisors
(ESXi hosts). See About Asset Subtypes, custom fields, and device detail
preferences.
Connection Type The connection method to use to connect to the VMware device and obtain inventory
information.
Credentials The details of the service account required to connect to the device and run
commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed. An account with read-only access
can be used. See Add and edit User/Password credentials.
Log Level The level of information to display on the Device Detail page. To see only the most
important messages, select Critical. To see all messages, select Debug.
Enable Inventory The inventory collection option. If this option is selected, the appliance collects
inventory information for the device according to the Agentless device inventory
schedule. If this option is cleared, inventory information is not collected. In both
cases, however, Agentless devices are counted.
DNS Server The hostname of the DNS server to use when identifying the device hostname and
other information. Providing the DNS server information enables the appliance to
match the device to existing inventory information during updates. If the appliance
cannot detect the device due to changes made to its hostname or IP address,
inventory fails.
HP-UX sh ksh, sh
Mac OS X sh bash, sh
NOTE: You can apply SNMP Inventory Configurations only to SNMP-managed Agentless devices.
1. Go to the Devices page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory to display the Devices page.
2. Select the check boxes next to one or more devices.
3. Select Choose Action > Apply SNMP Configurations to display the Apply SNMP Configurations dialog.
4. Drag the configurations you want to apply into the Apply these SNMP configurations box.
NOTE: Your KACE SMA license agreement entitles you to manage a specified number of devices that
are classified as Managed Computers, Assets, and Monitored Servers. Devices count toward these limits
even if such devices are MIA (missing in action) or no longer in use. However, devices that are added to
inventory manually, or through the API, do not count toward license limits. See View KACE SMA license
information.
For information about the KACE SMA features available to devices, see Features available for each device
management method.
Service Pack The service pack version number (Windows only). SERVICE_PACK
Device Timezone The KACE SMA Agent installed on the device uses TZ_AGENT
this timezone.
Virtual Device Used to identify devices that are virtual, such as VIRTUAL
devices running on VMware platforms. Not displayed
for physical devices, such as laptops and servers.
BIOS Release The date the BIOS version was released. BIOS_RELEASE_DATE
Date
User Logged The user currently logged in to the device. This entry USER_LOGGED
includes the username and the domain to which the
user belongs.
User Fullname The full name of the user who owns the device. USER_FULLNAME
Last User The name of the most recent user who logged in to USER
the device. Some devices might have multiple users.
8. In the Operating System section, provide information about the operating system installed on the device.
Major Version The number that identifies the major version of the OS_MAJOR
operating system.
Minor Version The number that identifies the minor version of the OS_MINOR
operating system.
Installed Date The date the operating system was installed. OS_INSTALLED_DATE
Last Reboot The length of time the operating system has been LAST_REBOOT
running.
Last Startup The last time the operating system was turned off. LAST_REBOOT
The manual device icon appears in the device’s Status column on the Devices page: . Inventory for
manual devices must be updated manually.
NOTE: The inventory API supports HTTP and HTTPS communications, depending on your
appliance configuration. To upload inventory information, use the following URL: http://KACE
SMA_hostname/service/wsapi.php, where KACE SMA_hostname is the hostname of your
appliance.
NOTE: To submit inventory information using the API, you must enable inventory API access. See Enable
inventory API access.
1. (Required) Request a session key:
Submit keyreq=true in the body of the request to get a session string in response.
2. (Required) Construct the authentication token:
a. Construct the auth string as:
session_string + '|' + MD5 of API password
b. Run MD5 on the auth string.
3. (Required for new devices) Request a device UUID:
Submit req=newuuid&key=$auth in the body of the request to get a UUID in response.
4. (Required) Submit inventory XML data:
Submit req=loadxml&key=$auth&KUID=$uuid&version=6.0 in the GET line and inventory XML in
the body of the request.
See Sample Perl script.
NOTE: For Windows Vista and later, use Run as Administrator when running the command.
3. Enter the following command:
runkbot -s 4 0
Inventory information is updated.
Automatically Archive or delete managed devices that are MIA (missing in action) after the specified
Remove MIA period of time. Clear the check box to prevent MIA devices from being Archived or
Devices deleted automatically.
After n days The number of days MIA devices remain in inventory if Automatically Relete MIA
Devices is selected. Managed devices that do not communicate with the appliance for
the specified number of days are automatically deleted or archived, as specified.
Archive MIA Select this option to archive the MIA devices after the specified number of days.
Asset-Devices
Delete MIA Select this option to permanently delete the MIA devices after the specified number of
Devices days.
4. Click Save.
Devices are deleted when the deletion process runs daily at 03:45. The process can delete up to 100
devices during a run.
If there are more than 100 MIA devices to be deleted, or if you must delete devices immediately, consider deleting
devices manually. See Delete MIA devices manually.
Windows ACUConfig.exe
AMPAgent.exe
AMPKickstart.exe
AMPTools.exe
AMPWatchDog.exe
Inventory.exe
KCopy.exe
KDeploy.exe
KInventory.exe
konea.exe
kpatch.exe
KSWMeterSvc.exe
KUserAlert.exe
runkbot.exe
NOTE: The Dell warranty information is available only for Dell computers that are in inventory. In addition,
the appliance must be able to reach the following domain to gather warranty information: api.dell.com.
See Make necessary websites accessible to the KACE SMA.
TIP: Applications that are added manually are displayed on the Software page, but they are not displayed
on the Software Catalog page. You cannot add applications manually to the Software Catalog page.
1. Go to the Software Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Software.
c. Select Choose Action > New.
2. Provide general information: Name, Version, Publisher.
For proper downstream reporting, enter this information consistently across software inventory.
3. Provide the following information:
Option Description
Supported The operating systems on which the application runs. Applications are deployed only
Operating to devices with the selected operating systems.
Systems a. Click Manage Operating Systems.
b. In the Operating Systems dialog box that appears, select the OS versions in
the navigation tree, as applicable.
You have an option to select OS versions by their family, product, architecture,
or build version. You can choose a specific build versions, or a parent node, as
needed. Selecting a parent node in the tree automatically selects the associated
child nodes. This behavior allows you to select any future OS versions, as
devices are added or upgraded in your managed environment. For example, to
select all build current and future versions associated with the Windows 10 x64
architecture, under All > Windows > Windows 10, select x64.
Custom Inventory (Optional) The custom inventory rules to apply to the application. Custom inventory
Rule rules enable you to detect applications and other items on a device and capture
details for reporting.
For example, the appliance first verifies whether an application is present on a device
before deploying that application. In some instances, however, installed programs
do not register in Add/Remove Programs or in standard areas of the registry. In such
cases, the appliance might not be able to detect the presence of the application
without additional information from the administrator. Therefore, the appliance might
repeat the installation each time the device connects. Custom Inventory rules can
prevent this.
The following rule verifies that the version of the Network Associates VirusScan
installed on a device is newer than a given version before deploying it:
RegistryValueGreaterThan(HKEY_LOCAL_MACHINE\Software
\Network Associates\TVD\Shared Components\VirusScan Engine
\4.0.xx,szDatVersion,4.0.44)
See Getting values from a device (Custom Inventory Field).
4. Next to Upload and Associate File, click Browse or Choose File to locate a file, then click Open or
Choose.
To distribute applications using Managed Installations or File Synchronizations, you need to associate the
actual application files with the application.
5. To prevent the file from being copied to Replication Shares, select Don’t Replicate Associated File.
This is useful for large files that you do not want users to install from Replication Shares, such as software
suites.
6. Optional: Select a Category and Threat Level for the software.
7. Click Save.
Related topics
Using software threat levels and categories
Delete applications
Deleting applications from the Software page removes them from the Software page inventory, and also removes
Managed Installations or File Synchronizations that are associated with applications.
However, if the deleted applications are installed on managed devices, the records for those applications
are recreated, with new IDs, when the devices update inventory information. Managed Installations and File
Synchronizations that were associated with the deleted applications, however, are not recreated.
1. Go to the Software list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Software.
2. Select the check box next to one or more applications.
3. Select Choose Action > Delete, then click Yes to confirm.
NOTE: Software assets are not required to set up License Compliance for applications on the Software
Catalog page.
If the Organization component is enabled on your appliance, you create Software assets for each organization
separately.
2. If prompted, provide your login credentials for the Client Drop location. These credentials are specified in
the appliance security settings. See Configure security settings for the appliance.
TIP: If you are connecting from a Windows device, type \admin in the Username field. This
prevents the system from using workgroup\admin or domain\admin during authentication.
3. Copy your files to the Client Drop location. If the Organization component is enabled on your appliance,
copy the files to the Client Drop location for the organization where you want to select the files.
The files are available as follows:
◦ Application files: Files are available for selection on the Software Detail page provided that they
are larger than the size configured for the appliance in the Client Drop File Size Filter or for the
organization in the Client Drop Size. If the Organization component is enabled on your appliance, files
are available to the selected organization only. To make files available to multiple organizations, copy
the files to the Client Drop location for each organization.
◦ Appliance backup files: Appliance backup files that are placed in any Client Drop location are
automatically identified as appliance backup files, and they become available for selection on the
Backup Settings page within five minutes.
If you are uploading application files to be selected on the Software Detail page, verify the Client Drop location
filter setting. The filter setting determines whether files are displayed on the Software Detail page, based on their
size. See Configure appliance General Settings without the Organization component or Add or edit organizations.
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
NOTE: Press Enter or Return after you enter a new Smart Label name to move the text from the
search field to the label field.
8. Click Create.
Smart Labels are automatically applied to or removed from applications when the applications are updated on the
Inventory > Software page, based on whether the applications meet the specified criteria.
NOTE: ITNinja information is available for software on the Software page, but it is not available for
software on the Software Catalog page.
Application classifications
Applications that appear on the Software Catalog page are classified as Discovered, Not Discovered (Cataloged),
and Uncataloged. The classification determines the kinds of actions you can perform and the type of information
that is available for the applications.
Discovered applications
Discovered applications are executables in the KACE SMA inventory that match the definitions of applications
in the Software Catalog. You can enable metering for Discovered applications and suites, mark them as Not
Allowed, and add license information for them. In addition, the Discovered application list can be exported in CSV
format. You can export the Discovered application list, the Uncataloged list, and the Locally Cataloged list; you
cannot export the entire Software Catalog.
Uncataloged applications
Uncataloged applications are executables that are in the KACE SMA inventory but that do not appear in the
Software Catalog. You can view applications that are listed as Uncataloged on the Software Catalog page.
However, you cannot enable metering for Uncataloged applications, mark them as Not Allowed, or add license
information for them.
Uncataloged applications must be added to the local or public Software Catalog before they can be metered,
marked as Not Allowed, or associated with license information. See Adding applications to the Software Catalog.
NOTE: If data retention is disabled for Uncataloged applications, the Uncataloged applications list is
empty. See Configure Admin-level or organization-specific General Settings.
Application categories
Applications in the Software Catalog are grouped into categories, such as Productivity Applications and Antivirus
Utilities.
These categories are useful for Reporting and License Compliance. In addition, applications in the Operating
System category cannot be metered.
Inventory collection process Uses the classic inventory Uses an inventory collection
collection process available in process introduced in version 5.5
version 5.4 of the KACE SMA. of the KACE SMA. This process
Managed devices that are running gathers information about every
Agent version 5.4 and lower executable installed on managed
report inventory only to the devices.
Software page; they do not reportManaged devices must be
inventory to the Software Catalogrunning Agent version 5.5 or
page. higher to report inventory to the
Managed devices that are running Software Catalog page.
Agent version 5.5 and higher
report inventory to both the
Software page and the Software
Catalog page.
Viewing software inventory The Software page displays Software inventory information
information information about all of the is presented on the Software
applications found on managed Catalog page as:
devices or added to KACE SMA
• Discovered: Applications
inventory manually or through
WSAPI. installed on managed
devices that match
application information in
the Software Catalog.
• Not Discovered:
Applications in the Software
Catalog that are not
installed on managed
devices.
• Uncataloged: Applications
that are installed on
managed devices but that
are not in the Software
Catalog.
Inventory information added to the
KACE SMA manually or through
WSAPI is not available under the
Software Catalog page.
Tracking license information for Enabled by creating a Software Enabled by creating a License
applications asset and a License asset asset and associating it with
for the application. License an application in the Software
information appears on the Catalog. License information
License Compliance Dashboard appears on both the License
widget. It does not appear on the Compliance page and the License
Licence Compliance page. Compliance Dashboard widget.
See About License Compliance
for Software Catalog applications.
Setting threat levels for Available on the Software list. See Not available.
software Using software threat levels and
categories.
Setting software categories Available on Software Detail Predefined by the Quest KACE
pages. See Assign categories to Software Catalog team.
applications.
Name The name and version of the application. If the application is a suite, the name
appears in bold. For example, Microsoft Office 2010 Professional.
Category The category of the application as established by the Software Catalog team.
Installed The number of managed devices that have the application installed. Click a number
to view device information.
Licenses The number of licenses available for the application. This information is available only
if a License asset has been associated with the application. See Add License assets
for Software Catalog inventory.
Variance The number of unused licenses remaining. This information is available only if a
License asset has been associated with the application.
Recently Added The number of devices on which the application has been added in the past seven
days.
Recently The number of devices from which the application has been removed in the past
Removed seven days.
Name The name and version of the application. If the application is a suite, the name
appears in bold. For example, Microsoft Office 2010 Professional.
Category The category of the application as established by the Software Catalog team.
Platform The operating system on which the application is designed to run. For example,
Windows.
4. To include or exclude a software catalog item from the License Compliance page, or from selected reports,
select it in the list, click Choose Action, and select one of the following options, as required:
• Exclude from License Compliance
• Include in License Compliance
• Exclude from Reports
• Include in Reports
5. To view additional details, click the application name.
See View details of Software Catalog applications.
TIP: On the Software Catalog page, you can search for applications using Advanced Search and Custom
Views based on Advanced Search criteria. See Searching at the page level with advanced options.
3. To include or exclude a software catalog item from the License Compliance page, or from selected reports,
select it in the list, click Choose Action, and select one of the following options, as required:
• Exclude from License Compliance
• Include in License Compliance
• Exclude from Reports
• Include in Reports
4. To view additional details, click the application name.
See View details of Software Catalog applications.
Item Description
Name The name and version of the application. If the application is a suite, the name
appears in bold. For example, Microsoft Office 2010 Professional.
Type The classification of the application in the Software Catalog. Locally Cataloged
applications are classified as Discovered.
Installed The number of managed devices that have the application installed.
Category The category of the application as established by the Software Catalog team.
Platform The operating system on which the application is designed to run. For example,
Windows.
TIP: For information about license compliance, go to the License Compliance page. See View License
Compliance information for Software Catalog applications.
1. Go to the Software Catalog list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Software Catalog.
2. Click the name of a suite or application to display the Software Catalog Detail page.
Information on this page includes:
Item Description
Summary
Not allowed Indicates if the suite or application is marked as Not Allowed. Marking applications as
Not Allowed prevents them from running on Agent-managed devices.
Metered Indicates if metering is enabled for the suite or application. If metering is enabled
for the application, usage data is collected for Agent-managed devices that also
have metering enabled. See Enabling and configuring metering for devices and
applications.
Installed The number of Agent-managed devices on which the suite or application is installed.
Licenses The number of License assets associated with the suite or application.
Expired Licenses The number of expired License assets associated with the suite or application.
Exclude Indicates if the suite or application appears on the License Compliance page.
from License
Compliance
Properties
Publisher The publisher of the suite or application. This information is normalized to ensure
accurate reporting. For example, Microsoft Corp. and Microsoft Inc. are reported as
Microsoft Corporation.
Platform The operating system on which the suite or application is designed to run. For
example, Windows.
Software Type Indicates if the suite or application is an individual application, such as Microsoft
Word, or a suite of applications, such as Microsoft Office.
Publisher License The suggested license type for the suite or application.
Type
Category The category of the suite or application as established by the Software Catalog team.
For applications that are Locally Cataloged, this is specified when the cataloging
request is submitted.
General Availability The date the suite or application was first released to customers.
End of Life The date that support for the suite or application was discontinued.
MSRP ($) The Manufacturer's Suggested Retail Price of the suite or application.
Metering Enabled The date and time when metering was enabled for the suite or application.
Versions or
Applications
Installed
Category The category of the suite or application as established by the Software Catalog team.
For applications that are Locally Cataloged, this is specified when the cataloging
request is submitted.
Language The language for which the suite or application is designed. For example, English.
Applications that are not designed for a specific language are designated as
Language Neutral.
Installed The number of managed devices that have the suite or application installed. Click a
number to view device information.
Associated Files One or more files that are associated with the selected version and attached to the
software catalog. To attach a file, click , and select the file location. You can edit or
delete attached files, as needed.
• To associate a file with a software version, navigate to the file using a file
browser.
• Alternatively, for larger files, use a Samba share.
• Provide a note about the file. For example, Script Host 5.8 - x86 or Script Host
5.8 - x64
• To copy the file to the Replication Share, ensure the Replicate Associated
File check box is selected.
Licenses Available only if a License asset has been added for the suite or application.
Name The name of the license, such as Office Professional PO #1234. This is the name
that you use to find the asset. If you plan to have multiple licenses associated with an
application consider including a purchase order number or purchase date.
Count The number of installations or seats the license allows. For example, 50.
Mode The mode of the License asset. The mode is used in the License Compliance chart
that is displayed on the Dashboard of the Administrator Console. Values that are
marked as ignored on the Asset Detail page are shown with a usage level of 100
percent.
Key, Unit Cost, and Additional information about the license. You can modify and edit the default
Expiration information, which can be captured for a License Asset Type.
Vendor The name of the Vendor asset you want to associate with the suite or application. the
Vendor drop-down list is empty unless you have added a Vendor asset. To search for
a vendor, begin typing in the list.
Order Number The purchase order number associated with the license.
Purchased The date the license was obtained. Click in the field, then select a date on the
calendar.
Metering
Last Used (days The number of managed devices that have launched the suite or application in the
ago) past 24 hours.
1-7 The number of managed devices that have launched the suite or application in the
past 7 days.
8-30 The number of managed devices that have launched the suite or application in the
past 8-30 days.
31-90 The number of managed devices that have launched the suite or application in the
past 31-90 days.
Not Used The number of managed devices that have not launched the suite or application in
the last 90 days.
IMPORTANT: Cataloging requests can be submitted only if data retention for Uncataloged applications is
enabled for the organization. See Configure Admin-level or organization-specific General Settings.
TIP: You can help improve the cataloging request process by sharing your KACE SMA inventory data with
Quest. The Software Catalog team uses this data to identify new applications and standardize application
names and versions. See Configure data sharing preferences.
1. Go to the Software Catalog list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
Software Title The name you want to use to identify the application. See How custom names
are resolved when Locally Cataloged applications are added to the Software
Catalog.
Category The category of the application. Categories can be useful for organizing and
managing applications.
Contact Details Provide your contact information. The Software Catalog team uses this
information to contact you if they have questions about the request.
7. Click Save.
The cataloging request is sent to Quest. The button, Remove from local Software Catalog, appears on the
Software Catalog Detail page. When cataloging requests are added to the public Software Catalog, and that
catalog is updated on your KACE SMA, the Remove from local software catalog button no longer appears on
the Software Catalog Detail page. Tracking for cataloging requests is not currently available.
NOTE: Information for titles that are added to the public catalog might differ from the information originally
submitted. This is because titles are standardized when they are added to the public catalog.
TIP: To add License assets for multiple applications at once, you can import the information from
spreadsheets or CSV files. See Example: Import license data from prepared spreadsheets.
1. Go to the Software Catalog list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Software Catalog.
2. Click the name of an application to display the Software Catalog Detail page.
3. Near the bottom of the page, click Add New License to display the License Asset Detail page.
4. On the License Asset Detail page, on the General tab, provide the following information:
Subtype The Asset Subtype to associate with the license. See About Asset Subtypes, custom
fields, and device detail preferences.
Asset Status The license status, if applicable. You can select a default asset status, or a custom
one (if they exist). A default installation of the KACE SMA includes the following asset
statuses:
• Active: Any asset that is deployed, active, or in use.
• Disposed: An asset that is no longer available for use.
• Expired: A software license or contract asset that has expired.
• In Stock: A recently received asset.
• Missing: Any asset that cannot be located.
• Repair: An asset that is being repaired.
• Reserved: An asset that is set aside for a specific person or use.
• Retired: Any asset that reached its end-of-life state, or is no longer in use.
• Stolen: An asset that has been reported as stolen.
For more information, see View and configure asset lifecycle settings.
Location The name of the location where the asset is located. See Managing locations.
Name The name of the license, such as Office Professional PO #1234. This is the name
that you use to find the asset. If you plan to have multiple licenses associated with an
application, provide the purchase order number or purchase date in the fields below to
differentiate the licenses.
License Count The number of installations or seats the license allows. For example, 50.
Applies to Applications in the Software Catalog inventory to which the license applies. You
Cataloged can associate License assets with multiple applications in the Software Catalog if
Software necessary. However, it is not necessary to associate a License asset with multiple
versions of the same application because the appliance does this automatically to
support upgrades and downgrades. You can simply associate the current version with
the License asset when you add the license information.
In addition, if you assign applications from different publishers, such as Microsoft Office
and Adobe Acrobat, to the same License asset, the total number of seats specified in
the License asset is assigned to each application. For example, if the License asset
has 100 seats, both Microsoft Office and Adobe Acrobat are assigned 100 seats.
Applies to Leave this field blank. A software license cannot be associated with applications from
Software the Software Catalog inventory and the Software page inventory at the same time.
For more information on how to create license assets for cataloged software, see Add
License assets for Software page inventory.
License Mode The mode of the License asset. For applications that require licenses, and to display
license usage information on the License Compliance page, select either Enterprise or
Unit License.
NOTE: Most modes, including Not Specified, Client License, Subscription,
Shareware, Freeware, OpenSource, No Licensing, and Site License, are not
used for License Compliance.
5. Click Next.
6. On the License Asset Detail page, on the Purchase tab, provide the following information:
Option Description
Applies to Applications in the Software Catalog inventory to which the license applies. You
Cataloged can associate License assets with multiple applications in the Software Catalog if
Software necessary. However, it is not necessary to associate a License asset with multiple
versions of the same application because the appliance does this automatically to
support upgrades and downgrades. You can simply associate the current version with
the License asset when you add the license information.
In addition, if you assign applications from different publishers, such as Microsoft Office
and Adobe Acrobat, to the same License asset, the total number of seats specified in
the License asset is assigned to each application. For example, if the License asset
has 100 seats, both Microsoft Office and Adobe Acrobat are assigned 100 seats.
Product Key The product key associated with the license. You can modify and edit the default
information, which can be captured for a License Asset Type.
Unit Cost The unit cost associated with the license. You can modify and edit the default
information, which can be captured for a License Asset Type.
Vendor The name of the Vendor asset you want to associate with the application. the Vendor
drop-down list is empty unless you have added a Vendor asset. To search for a vendor,
begin typing in the list.
NOTE: Assigning multiple vendors to a single software License asset is
not recommended because it can result in inaccurate License Compliance
information.
Purchase Order The purchase order number associated with the license.
Number
Purchase Date The date the purchase was made. Click in the field, then select a date on the calendar.
Purchase Select one or more purchase records associated with this license. See Managing
purchase records.
7. Click Next.
8. On the License Asset Detail page, on the Maintenance tab, provide the following information:
Option Description
Includes Indicates if the license includes upgrade rights. Upgrade rights refer to the ability to
Upgrade Rights upgrade to a newer version of the licensed software, when such versions become
Includes Whether the license entitles users to upgrade the installed version of the application.
Maintenance See About License Compliance for Software Catalog applications.
Expiration Date If the license includes maintenance, the expiration date of the maintenance period.
The KACE SMA License Compliance feature leverages Software Catalog information,
such as application release dates. If new application versions are released during the
maintenance period, they are automatically covered by this License asset.
Includes Indicates if the license includes downgrade rights. Downgrade rights refer to the ability
Downgrade to apply licenses for newer software versions to older versions of the same software.
Rights For more information, see About license downgrades. Select one of the following
options:
• Yes: Downgrade rights are calculated by comparing the number of existing
licenses for the selected software with the counts of available licenses for older
versions of the same software.
• Yes - Select from list: Choose one or more software versions for which you
want to grant downgrade rights. Under Downgrade Software list, click Select
cataloged software to add. The list that appears is populated with lower
versions of the selected software to which the license can be downgraded. When
you click an entry in the list, your selection appears in the Downgrade Software
list box. You can add one or more versions, as needed. To delete an item from
the list, select it in the Downgrade Software list box, and click Remove.
• No: If you do not want to grant downgrade rights to the selected software, select
this option.
9. Click Next.
10. On the License Asset Detail page, on the Related tab, provide the following information:
Option Description
Cost Center The cost center associated with the department that owns the application.
Approved for The devices that are approved to use the license. This information is used in License
Device Compliance reporting. For example, if devices have the application installed, but
are not on the list of approved devices, the devices are listed in the report titled,
Barcodes Add or edit barcodes associated with this license, as required. For more information,
see Add barcodes to assets.
License Text Any supplemental information about the license, such as a license number.
TIP: To enable metering on managed devices, you can use manual labels or Smart Labels, but you must
use labels. Metering can be enabled at the label level only; metering cannot be enabled in the settings of
individual devices.
Alternate Location (Optional) The alternate download location for Managed Installations, File
Synchronizations, and other deployments that are performed on items assigned to
this label. The location you specify replaces the string KACE_ALT_LOCATION.
CAUTION: You should not have a device in two labels that both specify a
value in this field.
Path If you specify an alternate download location, specify the path to the location.
Login If you specify an alternate download location, specify the username and password for
Password the location.
Restrict Label The type of label. To create a label that enables metering, select the Device Inventory
Usage To check box. You can select additional label types as needed, but Metering can be
enabled only if the Devices label type is selected.
Meter Software Enable metering on devices that have the label assigned. This enables metering on
Usage the devices only. To meter software, you need to also enable metering for individual
applications.
Allow Application Enable Application Control on devices. Software marked as Not Allowed is prevented
Control from running on devices to which the label is applied.
See Using Application Control.
Label Group (Optional) The label group to which the label is assigned. To assign the label to a
label group, click Edit next to the Label Group field, then select a label group. This is
useful if you have a large number of labels and you want to organize them into sub-
labels. For example, you could include the labels of your licensed applications in a
group label named Licenses. In addition, labels inherit any restrictions of the groups
to which they belong.
4. Click Save.
The Labels page appears, and the new label appears on the list. The metering icon appears in the metering
column next to the label: .
5. Manually apply the label to managed devices:
a. Click Inventory.
The Devices page appears.
b. Select the check box next to one or more devices.
c. Select Choose Action > Label > Apply Labels.
One of the following metering icons appears next to the device name on the Devices list:
Icon Description
Metering is enabled on the device, and the KACE SMA Agent is scheduled to report
metering information for Software Catalog applications that also have metering
enabled. See Enabling and configuring metering for devices and applications.
It might take as long as 24 hours for the appliance to display metering information
in the Administrator Console, depending on the metering interval. To change the
metering interval, see Enable metering for Software Catalog applications.
Metering is scheduled to begin. This icon appears when the metering label is
applied to a device, but that device has not yet reported metering information to the
appliance. If the metering label has been applied to devices running Linux or other
operating systems that are not supported, metering icons are not displayed.
NOTE: If you select a label group instead of a label, you will not be able to apply the Smart Label
to a patching schedule. Patching schedules can only use Smart Labels based on a single item.
• Enter a new name for the Smart Label in the Choose label field, then press Enter or Return.
NOTE: Press Enter or Return after you enter a new Smart Label name to move the text from the
search field to the label field.
8. Click Create.
When managed devices are inventoried, the Smart Label is applied if the devices match the specified
criteria. When the label is applied to a device, one of the following metering icons appears next to the
device name on the Devices list:
Icon Description
Metering is enabled on the device, and the KACE SMA Agent is scheduled to report
metering information for Software Catalog applications that also have metering
enabled. See Enabling and configuring metering for devices and applications.
It might take as long as 24 hours for the appliance to display metering information
in the Administrator Console, depending on the metering interval. To change the
metering interval, see Enable metering for Software Catalog applications.
Metering is scheduled to begin. This icon appears when the metering label is applied
to a device, but metering information is not yet available to the appliance. If the
metering label has been applied to devices running Linux or other operating systems
that are not supported, metering icons are not displayed.
CAUTION: Metering is not available for operating system software, applications installed on unsupported
operating systems, such as Linux, or for applications that are listed as Uncataloged in the Software
Catalog. However, you can enable metering for Uncataloged applications after you add the applications to
the local version of the Software Catalog.
1. Go to the Software Catalog list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Software Catalog.
2. Select the check box next to an application that is Discovered, or Not Discovered.
3. Select Choose Action > Enable Metering.
A metering icon appears in the metering column next to the selected applications: . Provided that metering
is enabled for devices with the application installed, metering information is reported according to the metering
schedule. See:
• Enabling metering on devices
• Configure options for metering Software Catalog applications
Agent Logging
Agent Inventory
Agentless Inventory
Catalog Inventory
Metering
Scripting Update
3. Click Save.
4. To configure data retention settings for metering, go to the Admin-level General Settings page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Settings, then click General Settings.
5. In the Data Retention section, select the options for retaining data on the appliance.
Option Description
Retain Metering The number of months that metering data is retained in the KACE SMA database.
Data Metering data that is older than the selected number of months is deleted from the
database on the first day of every month. See About metering information.
6. At the bottom of the page, click Save or Save and Restart Services, depending on whether the
Organization component is enabled on your appliance.
7. If you have multiple organizations, repeat the preceding steps for each organization.
Versions or
Applications
Installed
Language The language for which the application is designed. For example, English.
Applications that are not designed for a specific language are designated as
Language Neutral.
Installed The number of managed devices that have the application installed. Click a number
to view device information.
Metering
Last Day The number of managed devices that have launched the application in the past 24
hours.
1-7 Days Ago The number of managed devices that have launched the application in the past 7
days.
8-30 Days Ago The number of managed devices that have launched the application in the past 8-30
days.
Application The name of the metered application. Click the application name to go to the detail
page for the application.
Version The version of the application installed. Major versions are listed separately in the
Software Catalog, and they are metered separately. For example, version 4.1 and
version 4.2 of an application appear as separate entries. This enables you to manage
them and meter their usage separately. Minor versions, such as 4.123, 4.134, and
Hours Used The length of time the application has been running on the device in the past seven
days, expressed as a decimal. For example, 0.75 indicates that the application has
been running for 45 minutes.
Launches The number of times the application has been launched on the device in the past
seven days.
Last Launch The date and time of the most recent launch in the past seven days.
NOTE: If new applications are installed between the time the inventory is collected from a device
and the time the metering report is generated, those applications are not reported until the next time
inventory is collected.
Agent Logging Enabled Whether the KACE SMA stores scripting results provided by
Agents installed on managed devices. Agent logs can consume
as much as 1GB of disk space in the database. If disk space is
not an issue, enable Agent Logging to keep all log information
for Agent-managed devices. These logs can be useful during
troubleshooting. To save disk space, and enable faster Agent
communication, disable Agent Logging.
Agent Inventory 12 hours The frequency at which Agents on managed devices report
inventory. This information is displayed in the Inventory section.
Catalog Inventory 24 hours The frequency at which managed devices report inventory to
the Software Catalog page.
Scripting Update 4 hours The frequency at which Agents on managed devices request
updated copies of scripts that are enabled on managed
devices. This interval does not affect how often scripts run.
3. Click Save.
Category Software.
Show Line Numbers (Optional) Select the check box to add a column with line numbers to the report.
Subtopic Device
TIP: By default, applications are allowed unless you mark them as Not Allowed.
1. Go to the Software Catalog list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Software Catalog.
2. Select the check box next to one or more applications.
3. Select Choose Action > Mark Allowed.
The applications are marked as Allowed and the Not Allowed symbol is removed.
NOTE: When catalog updates are downloaded, the appliance determines whether any Locally Cataloged
applications have been added to the public Software Catalog. If applications have been added, Local
Cataloging is removed. Otherwise, Local Cataloging is preserved.
1. Go to the appliance Control Panel:
• If the Organization component is not enabled on the appliance, log in to the KACE SMA Administrator
Console, http://KACE_SMA_hostname/admin, then click Settings.
• If the Organization component is enabled on the appliance, log in to the KACE SMA System
Administration Console, http://KACE_SMA_hostname/system, or select System in the drop-
down list in the top-right corner of the page, then click Settings.
2. Click Appliance Updates to display the Appliance Updates page.
3. Do one of the following:
• In the Software Catalog section, click Check for Update.
If the Software Catalog is up to date, the Logs page appears showing the version information. If an
update is available, installation information is displayed. The full catalog might be installed if any of the
following are true: If there is no baseline catalog present on the appliance, if there is no pathway to
updating the full catalog, or if there are more than five updates available
• In the Software Catalog section, click Reinstall.
The version of the Software Catalog that is stored on the KACE SMA is replaced with the latest
Software Catalog available from Quest KACE. The full Software Catalog includes the latest full
b. Fairly Safe
c. Unknown
d. Could be harmful
e. Harmful
3. Click Save.
Categorize processes
To organize and manage processes in inventory, you can manually assign them to categories.
1. Go to the Processes list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Processes.
2. Select the check box next to one or more processes.
3. Select Choose Action > Set Category, and then select a category.
Delete processes
You can manually delete processes from inventory as needed.
However, if the deleted processes are found on managed devices, the records for those processes are recreated,
with new IDs, when the devices update inventory information.
1. Go to the Processes list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Processes.
2. Do one of the following:
• Select the check box next to one or more processes, then select Choose Action > Delete.
• Click a process name, then on the Process Detail page, click Delete.
3. Click Yes to confirm.
3. Click Save.
3. Click Save.
Categorize services
To organize and manage services in inventory, you can manually assign them to categories.
1. Go to the Services list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Services.
2. Select the check box next to one or more services.
3. Select Choose Action > Set Category, and then select a category.
Delete services
You can manually delete services from inventory as needed.
However, if the deleted services are found on managed devices, the records for those services are recreated, with
new IDs, when the devices update inventory information.
1. Go to the Services list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory, then click Services.
2. Select the check box next to one or more services.
3. Do one of the following:
• Select the check box next to one or more programs, then select Choose Action > Delete.
• Click a program name, then on the Startup Program Detail page, click Delete.
4. Select Yes to confirm.
Supported The operating systems on which the application runs. Applications are deployed only
Operating to devices with the selected operating systems.
Systems
Custom Inventory (Optional) The custom inventory rules to apply to the application. Custom inventory
Rule rules enable you to detect applications and other items on a device and capture
details for reporting.
For example, the appliance first verifies whether an application is present on a device
before deploying that application. In some instances, however, installed programs
do not register in Add/Remove Programs or in standard areas of the registry. In such
cases, the appliance might not be able to detect the presence of the application
without additional information from the administrator. Therefore, the appliance might
repeat the installation each time the device connects. Custom Inventory rules can
prevent this repetition.
The following rule verifies that the version of the Network Associates VirusScan
installed on a device is newer than a given version before deploying it:
RegistryValueGreaterThan(HKEY_LOCAL_MACHINE\
NOTE: The applications with Value Return rules that set a Custom Inventory Field also appear as Installed
Programs.
If results are not what you expect, verify that the device has been inventoried recently. The inventory time is
shown in the Last Inventory field of the device detail page.
Function syntax
Enter the functionName followed by an opening parenthesis, enclose the arguments with a closing parenthesis.
No spaces are allowed between the name of the function and the opening parenthesis.
TIP: You can view a list of devices that have the item installed on the Inventory > Software > Custom_item:
Detail page.
FilenamesMatchingRegex NUMBER
FileVersion TEXT
ProductVersion TEXT
RegistryValue TEXT
The following table lists available conditional rules with links to specific details on how to specify the arguments.
Table 25. Conditional rule reference
X
EnvironmentalVariableGreaterThan X X Verifies that the environment
(var, type, value) variable definition is higher than the
value you specify.
All three types are valid, TEXT,
DATE (in the full format mm/dd/
yyyy hh:mm:ss), and NUMBER.
For information on Equals, GreaterThan, and LessThan for FilenamesMatchingRegex, see Regular
Expression Rule Reference.
NOTE: The following example verifies that the pad executable file exists on the device:
FileExists(C:\WINDOWS\notepad.exe)
NOTE: Using both AND and OR operators in the same Custom Inventory rule is not supported. Set up
separate applications.
IMPORTANT: Do not enter rules on separate lines. Separate the rules by space only. Having rules on
separate lines invalidates the compound rule.
NOTE: The KACE SMA Agent only provides functions that compare filenames using regular expressions.
The following table provides an overview of the regular expression syntax used to match filenames:
X
FilenamesMatchingRegexGreaterThan X X True if the number of files that
(fullpath,regex,value) match is more than the value.
X
FilenamesMatchingRegexLessThan X X True if the number of files that
(fullpath,regex,value) match is less than the value.
Specifying a version
version is an integer (type is TEXT) that the KACE SMA Agent compares to the version of the item being tested
on the device.
For example, the FileVersionGreaterThan test returns ‘true’ if the value you specify is higher than the
version number of the file or folder and otherwise returns ‘false’.
To test a range, join a Less Than and Greater Than rule as follows:
FileVersionGreaterThan(C:\Program Files\Adobe\Acrobat\7.0\Acrobat\Acrobat.exe, 6.99)
AND FileVersionLessThan(C:\Program Files\Adobe\Acrobat\7.0\
Acrobat\Acrobat.exe, 8.00)
AccessedDate DATE Last date and time the file was accessed.
InternalName TEXT Internal name of the file, if one exists, such as the
component name.
If the file has no internal name, it is equal to the
original filename, without an extension.
ModifiedDate DATE Last day and time the file was modified.
OriginalFilename TEXT Provides the full name of the file when it was put or
installed on the device.
access_time DATE The last time the user or system accessed the file
device_number NUMBER The identification number of the device (disk) containing the file
modification_time DATE The last time a change was made and saved
owner TEXT The username of the person who owns the file
Defining commands
The shell command functions allow you to specify the command you want to run on the device. The guidelines
for writing rule arguments do not apply to commands. However, white space after the opening parenthesis, and
immediately before the closing parenthesis, is stripped from the command.
The figure shows a high-level example of a software distribution process. You can modify this process as needed.
CAUTION: If the display name of the application inventory item does not exactly match the name that
the application registers in Add/Remove programs, the appliance might attempt to deploy a package
repeatedly even though it is already there. To solve this problem, add the application to the Software
inventory list, then use the registered application name in the Managed Installation.
NOTE: Agent deployment is discussed in Provisioning the KACE SMA Agent. For information about
updating an existing version of the Agent, see Upload Agent updates manually.
Name A name that identifies the Managed Installation. This name appears on the Managed
Installations page.
• After login: Deploy the package after the user logs in but before the desktop
loads.
• While user logged in: Deploy the package while the user is logged on.
• While user logged off: Deploy the package only when the device is running
and the user is logged off.
Inventory Indicate if you want to deploy the software title from Cataloged Software or all
Software by selecting one of these options.
• To search for a specific title, begin typing in the Software or Cataloged
Software field.
• If you want to display only the software that has one or more associated files,
select Only Display Software With an Associated File.
Associated File A Software and Cataloged Software title can have one or more files attached to them,
as needed. Indicate if you want to select a specific file associated with the selected
software title.
• Choose associated file: Select this option if you want to associate a file. You
can select a file in the list. If you know the file name, start typing it in the box,
and select it from the available entries in the list.
• Do not associate file: Select this option if you do not want to associate a file.
Alternate Location Specify a location from which files can be downloaded for a specific Managed
Installation.
Path: Enter the location where the KACE SMA Agent can retrieve digital installation
files.
Checksum: Enter an alternate checksum (MD5) that matches the MD5 checksum
on the remote file share. If no checksum is entered, the digital asset on the file
share must match the digital asset associated with the deployment package on the
appliance. Also, the target path must include the complete filename (for example, \
Override Default Specify the full command-line parameters. See the MSI Command Line
Installation documentation for available runtime options.
• Uninstall: Uninstall the application from the command line.
• Run Command Only (do not download file): Run the command line only.
• Don’t Prepend msiexec.exe: Prevent the appliance from adding
msiexec.exe to the beginning of the file.
ITNinja Deployment tips from ITNinja. These tips are available only if you share usage data.
See Configure data sharing preferences.
All Devices Deploy to all devices. Clear the check box to limit the deployment to specific labels or
devices.
Labels Limit deployment to devices that belong to specified labels. To select labels, click
Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location,
the appliance copies digital assets from that Replication Share or alternate download
location instead of downloading them directly from the appliance.
NOTE: The appliance uses a Replication Share before it uses the KACE Alt
Location.
Devices Limit deployment to specific devices. In the drop-down list, select the devices to
which you want to deploy the application. To filter the list, type a few characters in the
Devices field. The number next to the field indicates the number of devices available.
NOTE: Reclaiming unused software licenses only. Any devices from which
you want to remove the applicable software are listed. You can edit the list of
devices, as needed. To remove the software from all devices, simply select ,
as described above. For more information, see Reclaim unused software
licenses.
Alert user before Display a message on managed devices before installation. When you select this
run option, the following fields appear:
• Message: The message that appears on managed devices before installation
begins.
• Timeout: The length of time, in minutes, during which the message appears.
• Action: The action that takes place at the end of the Initial Message Timeout
period. Options include Install later or Install now. Select Install now to install
the application immediately, or select Install later to postpone the installation
until a user responds. Install later is useful when you want to notify users of an
installation or reboot before it occurs.
Initial Message Display a message on managed devices before installation. When you select this
option, the following fields appear:
• Message: The message that appears on managed devices before installation
begins.
• Timeout: The length of time, in minutes, during which the message appears.
• Action: The action that takes place at the end of the Initial Message Timeout
period. Options include Install later or Install now. Select Install now to install
the application immediately, or select Install later to postpone the installation
Completion Display a message on managed devices after the installation is complete. When you
Message select this option, the following fields appear:
• Message: The message that appears on managed devices when the
installation is complete.
• Timeout: The length of time, in minutes, during which the message appears.
Deployment The time, in 24-hour clock format, for package deployment to start and end. The
Window Deployment Window time affects all Action options. Also, the run intervals defined
Start in the appliance Settings interact with or override the deployment window of specific
packages.
End
Order The order in which to install or uninstall applications. The lowest value is deployed
first. If an install action and an uninstall action both have the same order value, the
uninstall action is performed first.
Maximum The maximum number of attempts, between 0 and 99, to indicate the number
Attempts of times the appliance tries to install the package. If you specify 0, the appliance
attempts to install the package indefinitely.
6. Click Save.
NOTE: To use parameters with MSI files, all your target devices must have the same version of Windows
Installer (available from Microsoft). Some switches might not be active on older versions. The most up-to-
date version of Windows Installer can be distributed to devices from the appliance.
TIP: If you are using Windows Installer 3.0 or higher, you can identify the supported parameters by
selecting the Run program available from the Start menu. Enter msiexec in the pop-up window. A window
that shows the supported parameters list appears.
NOTE: The KACE SMA Agent automatically runs deployment packages with MSI and EXE extensions.
NOTE: In addition, you can create a ZIP archive that contains many files and direct the appliance to
unpack the archive and run a specific file. Place the name of the file that you want to run in the command
(executable) field within the deployment package (for example, runthis.exe).
To distribute applications to managed devices, you must attach the digital assets, which are the files required for
installation, to applications. In addition, you must select the supported operating systems for applications. See
Attach digital assets to applications and select supported operating systems.
1. Browse to the location that contains the necessary installation files, select all the files and create a ZIP file
using a utility such as WinZIP®.
2. Log in to the appliance Administrator Console.
3. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin. Or, if the
Show organization menu in admin header option is enabled in the appliance General Settings, select an
organization in the drop-down list in the top-right corner of the page next to the login information.
4. Create an inventory item for the target deployment.
You can do this manually from the Inventory > Software page or by installing the package on a device that
regularly connects to the appliance. See About the Software page.
5. Associate the ZIP file with the inventory item and upload it to the appliance:
a. On the left navigation bar, click Distribution.
b. Select Choose Action > New.
c. Select the application title that the ZIP file is associated with from the Software drop-down list. To
see all application titles, clear the check box Only display records with an associated file.
6. In the Run Parameters field, specify the complete command with arguments.
For example: setup.exe /qn
7. Specify additional settings as needed.
See Create Managed Installations for Windows devices.
8. Click Save.
NOTE: On Red Hat Linux, if you only want to run your script, you do not need to include any other
files in your archive.
If the path environment variable of your root account does not include the current working directory, and
you want to run a shell script or other executable that you have included inside an archive, specify the
relative path to the executable in the Full Command Line field. The command runs inside a directory
alongside the files that have been extracted.
For example, to run a shell script called installThis.sh, package it alongside an RPM file, and then
enter the command: ./installThis.sh in the Installation Command field. If you archive it inside another
directory, the Installation Command field is:
./dir/filename.sh
Both these examples, as well as some other KACE SMA functions, assume that sh is in the root's path. If
you are using another scripting language, you might need to specify the full path to the command processor
you want to run in the installation command, such as:
/bin/sh ./filename.sh
Include appropriate arguments for an unattended, batch script.
If you select the uninstall check box in the MI detail, the KACE SMA Agent runs the following command
on either your standalone RPM file or each RPM file it finds in the archive, removing the packages
automatically:
//usr/sbin/rpm -e packagename.rpm
The package is removed only if the archive or package has been downloaded to the device. If you select
the Uninstall Using Full Command Line check box, specify a full command line in the Installation Command
field to ensure the correct removal command runs on the correct package. Because no package is
downloaded in this case, specify the path in the installation database where the package receipt is stored.
3. If your package requires additional options, provide the following information:
Option Description
Name A name that identifies the Managed Installation. This name appears on the Managed
Installations page.
Execution Select the most appropriate time for this package to be deployed. For the Linux
platform, the options are Execute anytime (next available) and Disabled.
Inventory Indicate if you want to deploy the software title from Cataloged Software or all
Software by selecting one of these options.
• To search for a specific title, begin typing in the Software or Cataloged
Software field.
• If you want to display only the software that has one or more associated files,
select Only Display Software With an Associated File.
Associated File A Software and Cataloged Software title can have one or more files attached to them,
as needed. Indicate if you want to select a specific file associated with the selected
software title.
• Choose associated file: Select this option if you want to associate a file. You
can select a file in the list. If you know the file name, start typing it in the box,
and select it from the available entries in the list.
• Do not associate file: Select this option if you do not want to associate a file.
Alternate Location Specify a location from which files can be downloaded for a specific Managed
Installation.
Path: Enter the location where the KACE SMA Agent can retrieve digital installation
files.
Checksum: Enter an alternate checksum (MD5) that matches the MD5 checksum
on the remote file share. If no checksum is entered, the digital asset on the file
share must match the digital asset associated with the deployment package on the
appliance. Also, the target path must include the complete filename (for example,\
\fileserver_one\software\adobe.exe). You can create the checksum using
any tool, including KDeploy.exe, which is installed with the KACE SMA Agent.
To create the checksum using KDeploy.exe:
a. On a device with the KACE SMA Agent installed, open a command prompt or
terminal window.
b. Go to the Quest KACE installation directory. For example:
Windows 32-bit devices: C:\Program Files\Quest\KACE
Windows 64-bit devices: C:\Program Files (x86)\Quest\KACE
Mac OS X devices: /Library/Application Support/Quest/KACE/bin
c. Enter the following command: KDeploy -hash=filename
Where filename is the UNC path to the file. If the path contains spaces, enclose
the entire path in double quotation marks.
d. Press Ctrl C or Command C to copy the MD5 checksum. You can then paste
it into other files, such as Notepad.
Credential: The details of the service account required to connect to the device
and run commands. Select existing credentials from the drop-down list, or select
Add new credential to add credentials not already listed. See Add and edit User/
Password credentials.
NOTE: If the target device is part of a replication label, the appliance does
not fetch applications from the alternate download location. You can edit
an existing label or create a label to specify the alternate location globally.
Because that label cannot be specific to any Managed Installation, you cannot
specify an alternate checksum that matches the checksum on the remote file
share.
See Distributing packages from alternate download locations and Replication Shares
and Add or edit manual labels.
Default Select this option if you have an RPM file and you want the appliance to run
Installation the default installation command. Linux devices use: rpm [-U | Run Parameters]
"packagename.tgz"
Run Parameters: (Optional) If you select Use Default, specify the parameters to
use. Run parameters are not required if you have an RPM file.
Enter a value to override (Default -U default).
For example, if you set Run Parameters to: -ivh --replacepkgs, then the command
that runs on the device is:
rpm -ivh –replacepkgs package.rpm
Override Default Select this option to specify the complete command line here. If you are using an
Installation archive file, this command runs against all of the RPM files it finds.
Uninstall Remove the package from the device using the command line. If you specified a
command in the Full Command Line field, the command runs. Otherwise, the KACE
SMA Agent attempts to run the command, which is generally expected to remove the
package.
Run Command Run the command only. This does not download the actual digital asset.
Only (do not
download file)
ITNinja Deployment tips from ITNinja. These tips are available only if you share usage data.
See Configure data sharing preferences.
All Devices Deploy to all devices. Clear the check box to limit the deployment to specific labels or
devices.
Labels Limit deployment to devices that belong to specified labels. To select labels, click
Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location,
the appliance copies digital assets from that Replication Share or alternate download
location instead of downloading them directly from the appliance.
NOTE: The appliance uses a Replication Share before it uses the KACE Alt
Location.
Devices Limit deployment to specific devices. In the drop-down list, select the devices to
which you want to deploy the application. To filter the list, type a few characters in the
Devices field. The number next to the field indicates the number of devices available.
NOTE: Reclaiming unused software licenses only. Any devices from which
you want to remove the applicable software are listed. You can edit the list of
devices, as needed. To remove the software from all devices, simply select ,
as described above. For more information, see Reclaim unused software
licenses.
Alert user before Display a message on managed devices before installation. When you select this
run option, the following fields appear:
• Message: The message that appears on managed devices before installation
begins.
• Timeout: The length of time, in minutes, during which the message appears.
• Action: The action that takes place at the end of the Initial Message Timeout
period. Options include Install later or Install now. Select Install now to install
the application immediately, or select Install later to postpone the installation
until a user responds. Install later is useful when you want to notify users of an
installation or reboot before it occurs.
Initial Message Display a message on managed devices before installation. When you select this
option, the following fields appear:
• Message: The message that appears on managed devices before installation
begins.
• Timeout: The length of time, in minutes, during which the message appears.
• Action: The action that takes place at the end of the Initial Message Timeout
period. Options include Install later or Install now. Select Install now to install
the application immediately, or select Install later to postpone the installation
until a user responds. Install later is useful when you want to notify users of an
installation or reboot before it occurs.
Completion Display a message on managed devices after the installation is complete. When you
Message select this option, the following fields appear:
• Message: The message that appears on managed devices when the
installation is complete.
• Timeout: The length of time, in minutes, during which the message appears.
Deployment The time, in 24-hour clock format, for package deployment to start and end. The
Window Deployment Window time affects all Action options. Also, the run intervals defined
Start
End in the appliance Settings interact with or override the deployment window of specific
packages.
Order The order in which to install or uninstall applications. The lowest value is deployed
first. If an install action and an uninstall action both have the same order value, the
uninstall action is performed first.
Maximum The maximum number of attempts, between 0 and 99, to indicate the number
Attempts of times the appliance tries to install the package. If you specify 0, the appliance
attempts to install the package indefinitely.
7. Click Save.
TIP: If you only want to run your script on Mac OS X, you do not need to include any other files in
your archive.
3. If the package requires additional options, provide the following information:
Option Description
Name A name that identifies the Managed Installation. This name appears on the Managed
Installations page.
• After login: Deploy the package after the user logs in but before the desktop
loads.
• While user logged in: Deploy the package while the user is logged on.
• While user logged off: Deploy the package only when the device is running
and the user is logged off.
Inventory Indicate if you want to deploy the software title from Cataloged Software or all
Software by selecting one of these options.
• To search for a specific title, begin typing in the Software or Cataloged
Software field.
• If you want to display only the software that has one or more associated files,
select Only Display Software With an Associated File.
Associated File A Software and Cataloged Software title can have one or more files attached to them,
as needed. Indicate if you want to select a specific file associated with the selected
software title.
• Choose associated file: Select this option if you want to associate a file. You
can select a file in the list. If you know the file name, start typing it in the box,
and select it from the available entries in the list.
• Do not associate file: Select this option if you do not want to associate a file.
Alternate Location Specify a location from which files can be downloaded for a specific Managed
Installation.
Path: Enter the location where the KACE SMA Agent can retrieve digital installation
files.
Checksum: Enter an alternate checksum (MD5) that matches the MD5 checksum
on the remote file share. If no checksum is entered, the digital asset on the file
share must match the digital asset associated with the deployment package on the
appliance. Also, the target path must include the complete filename (for example, \
\fileserver_one\software\adobe.exe). You can create the checksum using
any tool, including KDeploy.exe, which is installed with the KACE SMA Agent.
To create the checksum using KDeploy.exe:
a. On a device with the KACE SMA Agent installed, open a command prompt or
terminal window.
b. Go to the Quest KACE installation directory. For example:
Windows 32-bit devices: C:\Program Files\Quest\KACE
Windows 64-bit devices: C:\Program Files (x86)\Quest\KACE
Mac OS X devices: /Library/Application Support/Quest/KACE/bin
c. Enter the following command: KDeploy -hash=filename
Where filename is the UNC path to the file. If the path contains spaces, enclose
the entire path in double quotation marks.
d. Press Ctrl C or Command C to copy the MD5 checksum. You can then paste
it into other files, such as Notepad.
Credential: The details of the service account required to connect to the device
and run commands. Select existing credentials from the drop-down list, or select
Add new credential to add credentials not already listed. See Add and edit User/
Password credentials.
NOTE: If the target device is part of a replication label, the appliance does
not fetch applications from the alternate download location. You can edit
an existing label or create a label to specify the alternate location globally.
Because that label cannot be specific to any Managed Installation, you cannot
specify an alternate checksum that matches the checksum on the remote file
share.
See Distributing packages from alternate download locations and Replication Shares
and Add or edit manual labels.
Default You do not need to specify an installation command. The server runs the installation
Installation command by itself. The Mac OS X device tries to install the package using this
command:
installer -pkg packagename.pkg -target / [Run Parameters]
or
ditto -rsrc packagename.app /Applications/theapp
If you have specified an archive file, this command runs against all of the PKG files or
APP files it can find.
Override Default Specify the full command-line parameters. See the MSI Command Line
Installation documentation for available runtime options.
NOTE: When using a DMG package, the command line should be relative to
the file path of the mounted DMG file.
ITNinja Deployment tips from ITNinja. These tips are available only if you share usage data.
See Configure data sharing preferences.
All Devices Deploy to all devices. Clear the check box to limit the deployment to specific labels or
devices.
Labels Limit deployment to devices that belong to specified labels. To select labels, click
Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location,
the appliance copies digital assets from that Replication Share or alternate download
location instead of downloading them directly from the appliance.
NOTE: The appliance uses a Replication Share before it uses the KACE Alt
Location.
Devices Limit deployment to specific devices. In the drop-down list, select the devices to
which you want to deploy the application. To filter the list, type a few characters in the
Devices field. The number next to the field indicates the number of devices available.
NOTE: Reclaiming unused software licenses only. Any devices from which
you want to remove the applicable software are listed. You can edit the list of
devices, as needed. To remove the software from all devices, simply select ,
as described above. For more information, see Reclaim unused software
licenses.
Deployment The time, in 24-hour clock format, for package deployment to start and end. The
Window Deployment Window time affects all Action options. Also, the run intervals defined
Start in the appliance Settings interact with or override the deployment window of specific
packages.
End
Order The order in which to install or uninstall applications. The lowest value is deployed
first. If an install action and an uninstall action both have the same order value, the
uninstall action is performed first.
Maximum The maximum number of attempts, between 0 and 99, to indicate the number
Attempts of times the appliance tries to install the package. If you specify 0, the appliance
attempts to install the package indefinitely.
6. Click Save.
For more information, see:
• Distributing software and using Wake-on-LAN
• Using Managed Installations
Enabled Enable the File Synchronization. When the KACE SMA Agents on selected devices
check in to the appliance, the file is distributed.
Name A name that identifies the File Synchronization. This name appears on the File
Synchronizations page.
Path The directory location, on target devices, to which you want to save the file.
Create Path Create the location specified in the Path field if it does not already exist.
Credentials The details of the service account required to connect to the device and run
commands. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed. See Add and edit User/Password
credentials.
File The file to be distributed to target devices. To appear on the list, applications must
have associated files in inventory. See Attach digital assets to applications and select
supported operating systems.
Persist Confirm that the file does not already exist on target devices before attempting to
distribute it.
Create Shortcut Create a desktop shortcut to the file location on the device.
ITNinja Deployment tips from ITNinja. These tips are available only if you share usage data.
See Configure data sharing preferences.
All Devices Deploy to all devices. Clear the check box to limit the deployment to specific labels or
devices.
Labels Limit deployment to devices that belong to specified labels. To select labels, click
Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location,
the appliance copies digital assets from that Replication Share or alternate download
location instead of downloading them directly from the appliance.
NOTE: The appliance uses a Replication Share before it uses the KACE Alt
Location.
Devices Limit deployment to specific devices. In the drop-down list, select the devices to
which you want to deploy the application. To filter the list, type a few characters in the
Devices field. The number next to the field indicates the number of devices available.
Blackout Window The time during which Agents on managed devices are prevented from performing
File Synchronizations.
Alternate Location Specify a location from which files can be downloaded for a specific Managed
Installation.
Path: Enter the location where the KACE SMA Agent can retrieve digital installation
files.
Checksum: Enter an alternate checksum (MD5) that matches the MD5 checksum
on the remote file share. If no checksum is entered, the digital asset on the file
share must match the digital asset associated with the deployment package on the
appliance. Also, the target path must include the complete filename (for example, \
\fileserver_one\software\adobe.exe). You can create the checksum using
any tool, including KDeploy.exe, which is installed with the KACE SMA Agent.
To create the checksum using KDeploy.exe:
a. On a device with the KACE SMA Agent installed, open a command prompt or
terminal window.
b. Go to the Quest KACE installation directory. For example:
Windows 32-bit devices: C:\Program Files\Quest\KACE
Windows 64-bit devices: C:\Program Files (x86)\Quest\KACE
Mac OS X devices: /Library/Application Support/Quest/KACE/bin
c. Enter the following command: KDeploy -hash=filename
Where filename is the UNC path to the file. If the path contains spaces, enclose
the entire path in double quotation marks.
d. Press Ctrl C or Command C to copy the MD5 checksum. You can then paste
it into other files, such as Notepad.
Credential: The details of the service account required to connect to the device
and run commands. Select existing credentials from the drop-down list, or select
Add new credential to add credentials not already listed. See Add and edit User/
Password credentials.
NOTE: If the target device is part of a replication label, the appliance does
not fetch applications from the alternate download location. You can edit
an existing label or create a label to specify the alternate location globally.
Because that label cannot be specific to any Managed Installation, you cannot
specify an alternate checksum that matches the checksum on the remote file
share.
See Distributing packages from alternate download locations and Replication Shares
and Add or edit manual labels.
4. Click Save.
TIP: To distribute files previously deployed after the deployment window has closed, go to the File
Synchronization Detail page for the File Synchronization, then click Save and Resend Files at the bottom
of the page.
Using Wake-on-LAN
Wake-on-LAN enables you to power-on devices remotely from the KACE SMA regardless of whether the devices
have the KACE SMA Agent installed.
NOTE: To use Wake-on-LAN, devices must be equipped with Wake-on-LAN-enabled network interface
card (NIC) and BIOS.
For Wake-on-LAN, the KACE SMA broadcasts UDP traffic on your network on port 7. The KACE SMA sends 16
packets per Wake-on-LAN request because it must guess the broadcast address that is required to get the “Magic
Packet” to the target device. This traffic is ignored by devices that are not being powered-on remotely, and the
traffic should not have a noticeable impact on the network.
You can power on devices belonging to the same subnet as the KACE SMA, or on different subnets. To power on
a device associated with a different subnet, you must designate a KACE SMA agent as a Wake-on LAN Relay.
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
6. Click Save.
The Wake-on-LAN page appears with the scheduled request listed.
Troubleshooting Wake-on-LAN
Under certain conditions, a Wake-on-LAN request might fail.
NOTE: Displaying a message on a managed device requires a connection between the Agent and the
appliance. For information about Agent connections, see Configuring Agent settings.
NOTE: This type of alert is generated at the KACE SMA, to be broadcast to Agent-managed devices. The
other type of alert is the monitoring alert, which comes into the KACE SMA from your server devices if you
have enabled monitoring on them to perform basic performance monitoring. See Monitoring servers.
Message Type the content of the alert to be displayed. The message can contain up to 500
characters.
All Devices Display the message on all devices whose KACE SMA Agents are connected to the
appliance.
Devices Display the message on specified devices. Use Ctrl-click or Command-click to select
multiple devices.
Labels Display the message only on devices assigned to selected labels. click Manage
Associated Labels to select device labels. Use Ctrl-click or Command-click to
select multiple labels.
Expiration Specify the length of time for the message to be valid. When target devices are
connected to the KACE SMA, the message is broadcast and is displayed until the
user acknowledges the message by clicking OK.
NOTE: If a device is not connected to the KACE SMA, the alert message
is sent to the Agent Command Queue, and it remains there until the device
connects to the KACE SMA. When the target device connects, the message
appears regardless of whether the Expiration time has elapsed.
None Run in combination with an event rather than on a specific date or at a specific time.
Run Every day/ Run daily at a specified time, or run on a designated day of the week at a specified
specific day at time.
HH:MM
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
4. Click Save.
About scripts
Scripts provide a point-and-click interface to perform tasks that typically require a manual process or advanced
programming. You can create scripts and run them to perform tasks on target devices across your network.
Scripts automate tasks such as:
• Configuring power management settings
• Installing software
• Checking antivirus status
• Changing registry settings
• Scheduling software deployment
You can create these types of scripts:
Offline KScripts Scripts that run at a scheduled time, based on the target device's clock. Offline
KScripts can run even when target devices are not connected to the appliance, such
as when devices start up or when users log in. You can create these scripts using the
scripting templates.
Online KScripts Scripts that run only when a target device is connected to the appliance. Online
KScripts run at scheduled times based on the appliance clock. You can create these
scripts using the scripting templates.
Online shell Scripts that run at scheduled times based on the appliance clock, but that run
scripts only when the target device is connected to the appliance. Online shell scripts are
created using simple text-based scripts, such as Bash, Perl, batch, and so on, that
are supported by the target device’s operating system. Batch files are supported
on Windows, along with the different shell script formats supported by the specific
operating system of the target devices.
Force Check-In Forces Windows devices with the KACE SMA Agent installed to take
inventory and sync with the KACE SMA.
WARNING: Do not run Force Check-In with more than 50 devices
selected because it can overload the appliance with requests.
Force Check-In (Mac/Linux) Force Mac and Linux devices with the KACE SMA Agent installed to take
inventory and sync with the KACE SMA.
WARNING: Do not run Force Check-In with more than 50 devices
selected because it can overload the appliance with requests.
Inventory Startup Programs On some devices, a missing registry entry causes all the contents of the
Fix system32 directory to be reported as Startup Programs. This script fixes
the registry entry if it is missing.
Issue a DOS Command Issues the DOS-DIR command on a Windows device. Used as an
Example example for how to run a DOS command.
Issue a Mac Command Issues the AppDir.txt command to list the contents of the Mac OS X
Example Applications directory. Used as an example of how to run a command on
Mac OS X.
KACE SMA Agent Debug Log On Mac and Linux devices, disables the debug switch used with the KACE
Disable (Mac/Linux) SMA Agent debug logs.
KACE SMA Agent Debug Log On Windows devices, disables the debug switch used with the KACE SMA
Disable (Windows) Agent debug logs.
KACE SMA Agent Debug Log On Mac and Linux devices, if the KACE SMA Agent is checking in,
Enable (Mac/Linux) but something is still not quite right, this script enables the debug flag.
This option provides additional debugging information for Agent-related
activities such as AMP, Inventory, and Scripting, and sends the output
back to the KACE SMA. It does not enable debugging of the scheduling
service.
KACE SMA Agent Debug Log On Windows devices, if the KACE SMA Agent is checking in, but
Enable (Windows) something is still not quite right, this script enables the debug flag. This
option provides additional debugging information for Agent-related
activities such as AMP, Inventory, and Scripting, and sends the output
back to the KACE SMA. It does not enable debugging of the scheduling
service.
KACE SMA Enable detailed Sets a registry key that causes the Dell Data Protection | Encryption agent
DDPE Inventory (Windows) to write policy data to the file system, which enables the KACE SMA Agent
to perform more detailed inventory collection. Windows PowerShell 2.0 or
higher is required.
KACE SMA Remote Control Disables the appliance Remote Control functionality on Windows XP
Disabler Professional by configuring Terminal Services properly.
KACE SMA Remote Control Enables the appliance Remote Control functionality on Windows XP
Enabler Professional by configuring Terminal Services properly.
Make Removable Drives Allows removable drives to be mounted only as read-only. This action
Read-Only controls unauthorized access to data.
Make Removable Drives Sets the properties of removable drives so that they can be mounted as
Read-Write read-write enabled.
Message Window Script Illustrates the use of the Message Window. Your script must have properly
Example paired create/destroy Message Window commands to work properly. The
Message Window appears until one of the following occurs:
• The user dismisses the message.
• The script runs to completion.
• A timeout period expires.
Reset KUID Deletes the registry key that identifies a Windows device so that a new key
can be generated. Runs once per device using the ResetKUIDRunOnce
registry flag.
Shutdown a Mac with snooze An example online KScript that uses the Alert user before run feature to
allow administrators to snooze the shutdown.
Shutdown a Windows system Specifies a delay (in seconds) while the message in quotes is displayed
to the user. Omit the -t parameter to silently and immediately shut down
devices.
Shutdown a Windows system An example online KScript that uses the Alert User Before Run feature to
with Snooze allow the administrator to snooze the shutdown.
TIP: The process of creating scripts is an iterative one. After creating a script, deploy it to a limited number
of devices to verify that it runs as expected before deploying it to all managed devices. You can create a
test label to do this verification. Enable scripts only after you have tested them.
Item Description
Name A meaningful name for the script that distinguishes it from others on the Scripts list.
Enabled Whether the script is enabled to run on the target devices. Do not enable a script until
you are finished editing and testing it and are ready to run it. Enable the script on a
test label before you enable it on all devices.
Status Whether the script is in development (Draft) or has been rolled out to your network
(Production). Use the Template status if you are building a script to use as the basis
for future scripts.
Description (Optional) A brief description of the actions the script performs. This field helps you to
distinguish one script from another on the Scripts list.
All Devices Deploy to all devices. Clear the check box to limit the deployment to specific labels or
devices.
Labels Limit deployment to devices that belong to specified labels. To select labels, click
Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location,
the appliance copies digital assets from that Replication Share or alternate download
location instead of downloading them directly from the appliance.
NOTE: The appliance uses a Replication Share before it uses the KACE Alt
Location.
Devices Limit deployment to one or more devices. To find devices, begin typing in the field.
Operating LThe operating systems on which the application runs. Applications are deployed
Systems only to devices with the selected operating systems.
a. Click Manage Operating Systems.
b. In the Operating Systems dialog box that appears, select the OS versions in
the navigation tree, as applicable.
You have an option to select OS versions by their family, product, architecture,
or build version. You can choose a specific build versions, or a parent node, as
needed. Selecting a parent node in the tree automatically selects the associated
child nodes. This behavior allows you to select any future OS versions, as
devices are added or upgraded in your managed environment. For example, to
select all build current and future versions associated with the Windows 10 x64
architecture, under All > Windows > Windows 10, select x64.
4. Specify Windows Run As settings (for online shell scripts and KScripts that run on Windows devices only):
Option Description
Local System Run the script with administrative privileges on the local device. Use this setting for all
scripts created with a template.
Logged-in user Run the script as the user who is logged in to the local device. This affects the user’s
profile.
All logged-in Run the script once for every user that is logged in to the device. This affects the
users profiles of all users.
Credentials Run the Online Shell Script and KScripts in the context of credentials that are
specified here. Select existing credentials from the drop-down list, or select Add new
credential to add credentials not already listed.
See Add and edit User/Password credentials.
5. In the Notify section, specify user alert settings. Alerts are available only for online KScripts and online shell
scripts on Windows and Mac devices running the KACE SMA Agent version 5.1 and higher:
Option Description
Alert User Before Allow the user to run, cancel, or delay the action. This is especially important when
Run reboots are required. If no user is logged in, the script runs immediately.
Options Options presented to the user in the alert dialog (available when you select Alert
user before run):
• OK: Run immediately.
• Cancel: Cancel until the next scheduled run.
• Snooze: Prompt the user again after the Snooze Duration.
If the time specified in the Timeout elapses without a user response, the script runs at
that time.
Interaction with Run As:
• Only the console user can see the alert dialog, and therefore choose to Snooze
or Cancel, regardless of the Run As setting.
• Enabling an alert prompts the console user even if the script is set to run as all
users or another user.
Timeout The amount of time, in minutes, for the dialog to be displayed before an action
is performed. If this time period elapses without the user pressing a button, the
appliance performs the action specified in the Timeout drop-down list.
Timeout Action The action to be performed when the Timeout period elapses without the user
choosing an option.
Snooze Duration The amount of time, in minutes, for the period after the user clicks Snooze. When this
period elapses, the dialog appears again.
Initial Message The message to be displayed to users before the action runs.
To customize the logo that appears in the dialog, see Configure appliance General
Settings without the Organization component.
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
Also run once Runs the offline KScript once when new scripts are downloaded from the appliance.
at next device
checkin (for offline
KScripts only)
Also Execute Runs the offline KScript when devices start up. This might cause devices to start up
before login (for more slowly than normal.
offline KScripts
NOTE: If a device has an Active Directory or Group Policy Object setting that
only) displays a message that the user must acknowledge before logging on, scripts
do not run until the message is acknowledged.
Also Execute Runs the offline KScript after users enter Windows login credentials.
after login (before
desktop loads)
(for offline KScripts
only)
Allow run while Allows the offline KScript to run even if the target device cannot contact the appliance
disconnected (for to report results. In such a case, results are stored on the device and uploaded to the
offline KScripts appliance during the next connection.
only)
Allow run without Allows the script to run even if a user is not logged in. To run the script only when the
a logged-in user user is logged in to the device, clear this option.
Run on next For online KScripts or Shell Scripts, this option enables the script to run on offline
connection if machines when they become online again.
offline When a script runs, it calculates the number of machines it is supposed to run on
based on their labels, or their operating systems, or by manually identifying selected
machines. Given that set of machines, the script then determines which of those
machines are currently online, and then queues up a task for the online machines in
the Konductor.
When you select this option, the script skips the step that identifies online machines
and it runs on the online machines. For the offline machines, the task is added to the
Konductor's queue, and it runs when those machine become online.
Any subsequent tasks for running the same script (for example, for an offline machine
that already exists in the Konductor's queue) overwrite the existing tasks, so there
can never be more than one task in the Konductor's queue for the same machine.
Having a high number of tasks in the Konductor may affect the appliance's
performance, so the best practice is to use offline scripts for those machines that are
typically offline, and only use this option with online scripts when the target machines
are expected to be online, to avoid an overpopulating the Konductor's queue.
By default, this option is disabled.
NOTE: If the Replication Share is inaccessible, the dependencies are downloaded from the
appliance. To enable this setting, select the Failover To Appliance check box on the Replication
Schedule Detail page. See Create Replication Shares.
Repeat this step to add dependencies as needed.
9. In the Tasks section, click New Task to add a task.
Attempts Enter the number of times the appliance attempts to run the script.
If the script fails but remediation is successful, you might want to run the task again to
confirm the remediation step. To do this, set the number of attempts to 2 or more. If
the Verify section fails, the script runs the number of times specified in this field.
b. In the Verify section, click Add to add a step, then select one or more steps to perform.
See Adding steps to task sections of scripts.
c. In the On Success and Remediation sections, select one or more steps to perform.
See Adding steps to task sections of scripts.
d. In the On Remediation Success and On Remediation Failure sections, select one or more steps
to perform.
See Adding steps to task sections of scripts.
TIP: To remove a dependency, click the Delete button next to the item: . This button
appears when you mouse over an item.
TIP: Click the Edit button next to Policy or Job Rules to view the token replacement variables
that can be used anywhere in the script: . The variables are replaced at runtime with
appropriate values.
TIP: See Token replacement variables.
10. Do one of the following:
• Click Run Now to immediately push the script to all devices.
Use this option with caution. See Using the Run and Run Now commands.
• Click Save.
Edit scripts
You can edit the three types of scripts: offline KScripts, online KScripts, and online Shell Scripts. You can also edit
offline KScripts and online KScripts with the XML editor.
Scoped users can view the details of all scripts, but they can save changes only to those to scripts that affect the
devices or labels that are associated with their scope. For more information about scoped users, see Add or edit
User Roles.
1. Go to the Script Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
TIP: To create a script that performs some of the same tasks as an existing script, duplicate the existing
script, and open it in an XML editor. The script’s <compliance> element gives you an idea of how the script
works, and how you can change it. See Duplicate scripts.
Import scripts
You can import scripts to the appliance as needed.
1. Go to the Scripts list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Scripting.
2. Select Choose Action > Import.
3. Paste the existing script into the space provided, then click Save.
Duplicate scripts
If there is a script that is similar to a script you want to create, you can duplicate that script and edit it as needed.
Using duplication can be faster than creating a script from scratch.
1. Go to the Script Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Scripting.
c. Click the name of a script.
2. At the bottom of the page, click Duplicate to display the Scripts page.
The duplicated script appears on the list.
3. Click the linked name of the duplicated script to open it for editing.
See Edit scripts.
TIP: To minimize the risk of deploying scripts to unintended devices, create a label that represents the
devices on which you want to perform the Run Now command.
NOTE: In case you encounter an error while running a script, refer to Error codes caused by patching and
scripting for a list of error codes that may help you diagnose the issue.
Labels Limit deployment to devices that belong to specified labels. To select labels, click
Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location,
the appliance copies digital assets from that Replication Share or alternate download
location instead of downloading them directly from the appliance.
NOTE: The appliance uses a Replication Share before it uses the KACE Alt
Location.
Devices Limit deployment to one or more devices. To find devices, begin typing in the field.
Scoped users can see only those devices that are associated with their role, when
the role is assigned a label. For more information about scoping devices to user roles,
see Add or edit User Roles.
Name A name that identifies the script. This name appears on the Scripts page.
Download Download updates, and provide installation options instead of installing updates
updates for me, automatically.
but let the end
user choose when
to install patches
Notify the end Receive notifications when updates are available, but prevent the appliance from
user but do not downloading or installing updates.
automatically
IMPORTANT: This setting might make your network more vulnerable to attack
download or if you neglect to retrieve and install the updates on a regular basis.
install patches
Turn off Automatic Prevent the device from using Windows Automatic Updates. This setting is
Updates recommended if you want to use the appliance patching feature to manage Windows
patch updates.
Remove Admin Provide users with control over the updates downloaded.
Policy and let end
IMPORTANT: Your network might be vulnerable to attacks if you select this
user configure option.
Reschedule Wait The interval, in minutes, to wait before rescheduling an update if the update fails.
Time
Do not reboot Prevent automatic reboots when users are logged in.
device while user
logged in
SUS Server The name of the server used for the Windows Server® Update Service.
SUS Statistics The name of the statistics server used for the Windows Server Update Service.
Server
Description Description
PrimaryStatus PrimaryStatus
ElementName Name
Manufacturer Manufacturer
Model Model
ElementName Name
Stepping Stepping
DCIM_ProcessorCapabilities
NumberOfHardwareThreads Hardware Threads
Name Name
RecordData
RecordFormat
Severity
Timestamp
NOTE: Although this topic refers to installation, you can also use the Dell Command | Monitor page to
remove Dell Command | Monitor from a device.
1. Go to the Windows Dell Command | Monitor page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Scripting, then click Configuration Policies.
c. On the Configuration Policies panel, in the Windows section, click Dell Command | Monitor.
2. Optional: Change the name if you require a more precise name than the default.
3. Set the Action, either keep the default Install, or change it to Uninstall.
4. Click Save to display the Managed Installation Detail page with the configuration information filled in for the
action you have chosen.
The KACE SMA automatically populates the Name, Software, Associated Software, and Full Command
Line fields.
Complete filling out the needed information on the Managed Installation Detail page. See Create Managed
Installations for Windows devices.
Name A name that identifies the script. This name appears on the Scripts page.
Use wallpaper Display the wallpaper file on the desktop of target devices.
Wallpaper bitmap file Click Browse or Choose File to select and upload the file to use for the
wallpaper. The file must be in BMP or JPG format.
Name The text label that appears below or next to the shortcut.
Target The full path to the application, file, or URL to be launched when the shortcut is
selected. For example:
To create shortcut for explorer.exe, use this format: C:\WINDOWS\explorer.exe
To create a shortcut from the UNC share for explorer.exe, use this format:
\\192.168.1.1\WINDOWS\explorer.exe
or
\\HostName\WINDOWS\explorer.exe
Parameters The command line parameters required for the shortcut. For example:
/S /IP=123.4
Working Directory The changes to the current working directory. For example: C:\Windows\Temp
Location The location where you want the shortcut to appear. Options include: Desktop and
Start Menu.
Name A name that identifies the script. This name appears on the Scripts page.
Output File Name The name of the log file created by the script.
Log File The type of log you want to query: Software, System, or Security.
Event Type The type of event you want to query: Information, Warning, or Error.
Source Name (Optional) The names of sources to which the query is restricted.
Name A name that identifies the script. This name appears on the Scripts page.
Action The task to be performed. Tasks include Install, Uninstall, Repair missing files,
and Reinstall all files.
Software The application to use for the script. To search for an application, begin typing in the
field.
MSI Filename The MSI filename (required if the file is a ZIP archive).
User Interaction How the installation appears to users. Options include: Default, Silent, Basic UI,
Reduced UI, and Full UI.
Install Directory The directory on the target device where the application is to be installed.
Additional Any additional installer switches. Additional switches are inserted between the
Switches msiexe.exe and the /i foo.msi arguments.
Additional Any additional properties. These properties are inserted at the end of the command
Properties line. For example:
msiexec.exe /s1 /switch2 /i patch123.msi TARGETDIR=C:\patcher
PROP=A PROP2=B
Store Config per Whether to store configuration information for individual devices.
device
Logging The information to record in the installation log. Use Ctrl-click or Command-click to
select multiple items.
Name A name that identifies the script. This name appears on the Scripts page.
Registry File The registry values to apply when the script runs.
Name A name that identifies the script. This name appears on the Scripts page.
Name A name that identifies the script. This name appears on the Scripts page.
Install Viewer Install the optional UltraVNC Viewer. Viewer is a tool used to connect to VNC
servers and remotely view desktops. Install Viewer only if you need to initiate remote
sessions from the managed device.
Disable tray icon Prevent the UltraVNC tray icon from appearing on the device.
Disable client Prevent client options from appearing in the tray icon menu on devices. This option is
options in tray available only if Disable Tray Icon is enabled.
icon menu
Require Windows Use Windows Logon authentication and export the ACL from your VNC® installation.
Logon Use MSLogonACL.exe /e acl.txt. Copy and paste the contents of the text file
into the ACL field.
Encryption Key Use key-based encryption. To use key-based encryption, create and upload a key:
a. In the UltraVNC Viewer, select the MSRC4Plugin from the DSPLugin list.
b. Click Config, then enter the full path where the key file will be placed.
c. Click Gen Key, then upload the key file.
Name A name that identifies the script. This name appears on the Scripts page.
Software The application to use for the script. To search for an application, begin typing in the
field.
File The command information. When you select the application, the template attempts to
provide the uninstall command directory, file, and parameters. Verify that the values
Parameters are correct.
Directory
Delete Directory The full name of the directory to be deleted after the uninstall command runs. For
example: C:\Program Files\Example_App\.
Kill Process The full name of the process to be stopped before the uninstall command runs. For
example: notepad.exe.
Name A name that identifies the script. This name appears on the Scripts page.
Action Specify whether you want to add or remove a device from the current domain.
Domain To Specify the LDAP domain name, user authentication information, and other
Configure information.
Name A name that identifies the script. This name appears on the Scripts page.
Operating System If you select Custom in the Profile drop-down list, specify, the operating system to
which this policy applies. the Profile Options update to show only those options that
are available to the selected version.
Name A name that identifies the script. This name appears on the Scripts page.
Operator Function
+ Use a leading plus sign to find entries that include the text.
- Use a leading minus sign to find entries that do not include the text.
* Use a trailing asterisk to find logs that contain words that begin with the specified
characters.
" Enclose text in double quotes to find exact matches for the phrase.
All uploaded logs Search all available scripting logs. If the Organization component is enabled on the
appliance, the search searches all logs for the selected organization.
NOTE: Scripting logs are deleted during appliance upgrades. If the appliance
has been upgraded, logs that were uploaded before the upgrade are no longer
available.
Last uploaded Search the most recent scripting logs. If the Organization component is enabled on
logs the appliance, the search searches all logs for the selected organization.
Script Search logs related to all scripts, or search only the specified script.
Label Search for logs uploaded by all devices, or search for logs uploaded by devices
associated with the specified label.
4. Click Search.
The search results display the logs and the devices that have uploaded those logs.
5. To apply a label to the devices that are displayed, select a label in the drop-down list under the search
results.
Exporting scripts
If you have multiple organizations or appliances, you can export scripts and transfer them among organizations
and appliances as needed.
See About importing and exporting resources.
NOTE: You can edit the payloads of profiles you have configured in the Administrator Console. However,
you cannot view or edit the payloads of profiles that have been uploaded to the Administrator Console.
1. Go to the Mac Profile Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Scripting, then click Mac Profiles.
c. Do one of the following:
▪ Click the name of a profile.
▪ Click Choose Action > New User Profile.
2. In the General Options section, provide the following information:
Option Description
User ability to remove profile Whether users can remove the profile from their
devices. Options include:
• Never: Users are not allowed to remove the
profile.
• Always: Users are allowed to remove the
profile any time without entering a password.
• With Password: Users are allowed to remove
the profile provided that they enter the
password associated with the profile.
3. Optional: In the Payloads section, add or edit configuration settings for Exchange, LDAP, or Mail.
◦ Add or edit Exchange configuration information:
NOTE: To prompt users to enter their own information, such as their user name, email address,
or password, leave fields blank. Some fields, such as Account Name, however, cannot be left
blank.
Option Description
Internal Exchange Host and Port The hostname of the internal Exchange server and
the port used for email communication.
External Exchange Host and Port The hostname of the external Exchange server and
the port used for email communication.
Internal Server Path The path to the server on the internal network.
External Server Path The path to the server on the external network.
Use SSL for Internal Exchange Host Whether to use Secure Sockets Layer for email
transmitted within the domain.
Use SSL for External Exchange Host Whether to use Secure Sockets Layer for email
transmitted outside the domain.
NOTE: To prompt users to enter their own information, such as their username or password,
leave fields blank. Some fields, such as Account Hostname, however, cannot be left blank.
Option Description
NOTE: To prompt users to enter their own information, such as their display name or email
address, leave fields blank. Some fields, such as Incoming Mail Server, however, cannot be left
blank.
Option Description
User Display Name How the user's name appears in the From field in
email messages.
Incoming Mail Server and Port The hostname or IP address and port number used
for incoming mail.
Outgoing Mail Server and Port The hostname or IP address and port number used
for outgoing mail. Use the following standard port
assignments:
• SMTP: 25 (465 with SSL)
• POP3: 110 (995 with SSL)
• IMAP: 143 (993 with SSL)
Incoming Mail User Name The username to use for the incoming mail server.
Outgoing Mail User Name The username to use for the outgoing mail server.
Incoming Mail Authentication Type The method of authenticating the user for incoming
mail. Authentication types include Password, MD5
Challenge-Response, NTLM, HTTP MD5 Digest.
Outgoing Mail Authentication Type The method of authenticating the user for outgoing
mail. Authentication types include Password, MD5
Challenge-Response, NTLM, HTTP MD5 Digest.
Incoming mail use SSL Whether to use Secure Socket Layer for mail
delivered to the user account.
Outgoing mail use SSL Whether to use Secure Socket Layer for mail sent
from the user account.
4. (Optional) In the Deploy section, select the target devices for the profile:
TIP: You can create a profile without selecting target devices. However, profiles cannot be
deployed until target devices are selected.
Option Description
Remove All Remove all selected devices from the Devices list in
this section.
5. In the Schedule section, select the options for distributing the profile to target devices:
Option Description
None Do not distribute the profile on a schedule. Profiles that have their schedules set to
None have a status of Disabled on the Mac Profiles list. However, profiles whose
schedule is set to None can still be deployed if you select Run Now at the bottom of
the page.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
6. In the Deployment Options section, select the options for prompting users about the profile installation:
Option Description
Runtime prompt When the Agent begins the profile installation, a prompt is displayed to users who are
for logged-in logged in to the target device.
users
Login prompt for Whenever users log in to the target device, they are prompted to install the profile if
all users they have not done so already.
Both runtime and When the Agent begins the profile installation, users who are logged in to the target
login prompts device are prompted to install the profile if they have not done so already. Users who
log in after the script runs are also prompted to install the profile.
Save Save the profile and return to the Mac Profiles list.
Run Now On target devices that have an active Agent connection to the appliance, install the
profile now according to the selected deployment options. See Using the Run and
Run Now commands.
Duplicate Create a copy of the profile with Copy of prepended to the profile name. This option
is not available for new profiles that have not yet been saved. See Add Mac profiles
using existing profiles as templates.
Remove Create a profile that can be used to remove the profile from target devices. This
option is not available for new profiles that have not yet been saved. See Remove
Mac profiles from managed devices.
Delete Remove the profile from the KACE SMA. This does not remove the profile from
devices on which it is installed, and this option is not available for new profiles that
have not yet been saved. See Delete Mac profiles from the KACE SMA.
NOTE: You can edit the payloads of system profiles you have configured in the Administrator Console.
However, you cannot view or edit the payloads of profiles that have been uploaded to the Administrator
Console.
1. Go to the Mac Profile Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Scripting, then click Mac Profiles.
c. Do one of the following:
▪ Click the name of a profile.
▪ Click Choose Action > New System Profile.
2. In the General Options section, provide the following information:
Option Description
User ability to remove profile Whether users can remove the profile from their
devices. Options include:
• Never: Users are not allowed to remove the
profile.
• Always: Users are allowed to remove the
profile any time without entering a password.
• With Password: Users are allowed to remove
the profile provided that they enter the
password associated with the profile.
Allow Apps Downloaded From Whether users are allowed to download apps from:
• Mac App Store: Users can download apps
only from the Mac App Store.
• Mac App Store and Identified Developers:
Users can download apps from the Mac App
Store and from developers who have digitally
signed their apps with a unique Developer ID
from Apple.
• Anywhere: Users can download apps from
anywhere without restriction.
Don't allow user to override Gatekeeper setting Whether users are allowed to modify the app
download settings.
Maximum number of failed attempts The number of times users can enter incorrect
passcodes to unlock devices before being locked out
of their accounts.
Maximum grace period for device lock When system settings specify that devices should
be locked after a period of inactivity, this setting
provides a window of time during which users
can unlock their devices without entering their
passcodes. After the grace period expires, users
must enter their passcodes to unlock devices.
Maximum passcode age in days The number of days after which passcodes must be
changed.
Delay after failed login attempts in minutes The number of minutes that must pass before users
can attempt to log in after reaching the maximum
number of failed login attempts.
5. In the Deploy section, select the target devices for the profile:
Option Description
Remove All Remove all devices from the Devices list in this
section.
6. In the Schedule section, select the options for distributing the profile to target devices:
Option Description
None Do not distribute the profile on a schedule. Profiles that have their schedules set to
None have a status of Disabled on the Mac Profiles list. However, profiles whose
schedule is set to None can still be deployed if you select Run Now at the bottom of
the page.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Save Save the profile and return to the Mac Profiles list.
Run Now On target devices that have an active Agent connection to the appliance, install the
profile now according to the selected deployment options. See Using the Run and
Run Now commands.
Duplicate Create a copy of the profile with Copy of prepended to the profile name. This option
is not available for new profiles that have not yet been saved. See Add Mac profiles
using existing profiles as templates.
Remove Create a profile that can be used to remove the profile from target devices. This
option is not available for new profiles that have not yet been saved. See Remove
Mac profiles from managed devices.
Delete Remove the profile from the KACE SMA. This does not remove the profile from
devices on which it is installed, and this option is not available for new profiles that
have not yet been saved. See Delete Mac profiles from the KACE SMA.
NOTE: You cannot view or edit the payloads of profiles that have been uploaded to the Administrator
Console. However, you can modify the payloads in the MOBILECONFIG file outside the Administrator
Console, then upload the edited file as a new profile.
1. Go to the Mac Profiles list page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Scripting, then click Mac Profiles.
2. Click Choose Action > Upload a Profile.
3. Click Browse or Choose File to locate the MOBILECONFIG file.
4. Click Upload
The profile appears on the Mac Profiles list with Imported in the Source column.
Select deployment and schedule options for the profile. See:
• Add or edit Mac user profiles
• Add or edit Mac system profiles
None Do not distribute the profile on a schedule. Profiles that have their schedules set to
None have a status of Disabled on the Mac Profiles list. However, profiles whose
schedule is set to None can still be deployed if you select Run Now at the bottom of
the page.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
3. Click Save.
The Mac Profiles page appears. The Targeted column shows the number of devices that are scheduled to
have the profile installed. The Succeeded column shows the number of devices on which the profile has
been installed. Agents on target devices receive instructions to install the profile at the next connection
according to the schedule and deployment options specified.
TIP: When you use the Run option to install Mac profiles on devices, profiles are installed only if devices
have an Agent connection to the appliance when the script runs. To ensure that profiles are installed on
devices that are offline, consider setting up schedules to deploy profiles. See Distribute Mac profiles on a
schedule.
1. Go to the Mac Profile Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Scripting, then click Mac Profiles.
IMPORTANT: If you delete a profile from the KACE SMA, you can no longer use the appliance to remove
that profile from managed devices.
1. Go to the Mac Profile Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Scripting, then click Mac Profiles.
c. Click the name of a profile.
2. At the bottom of the page, click Remove.
A dialog appears explaining the remove process.
3. Click Remove from Device.
The Mac Profile Detail page for a new profile, with the Action set to Remove, appears. The new profile has
the same Profile Name and Profile Identifier as the original profile. The original profile, with the Action set to
Add, remains on the list with its Schedule set to None. This prevents the same profile from being installed
on or removed from the same set of devices, and it enables you to reactivate the original profile later if
necessary.
4. On the Mac Profile Detail page in the Deploy section, select the devices from which you want to remove the
profile:
Option Description
All Devices Remove the profile from all KACE SMA Agent-
managed devices running a supported version
of Mac OS X (version 10.8, 10.9, or 10.10). If
the Organization component is enabled on your
appliance, this action includes all supported Mac
devices in the selected organization.
Remove All Remove all selected devices from the Devices list in
this section.
5. In the Schedule section, select the options for removing the profile from target devices:
Option Description
None Do not remove the profile on a schedule. Profiles that have their schedules set to
None have a status of Disabled on the Mac Profiles list. However, profiles whose
schedule is set to None can still be removed if you select Run Now at the bottom of
the page.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Save Save the profile and return to the Mac Profiles list.
Run Now On target devices that have an active Agent connection to the appliance, remove the
profile now according to the selected deployment options. See Using the Run and
Run Now commands.
Duplicate Create a copy of the profile with Copy of prepended to the profile name.
Delete Remove the profile from the KACE SMA. This action does not remove the profile from
devices on which it is installed. See Delete Mac profiles from the KACE SMA.
The Mac Profiles page appears. The Targeted column shows the number of devices that are scheduled
to have the profile removed. The Succeeded column shows the number of devices from which the profile
has been removed. On target devices that have an active Agent connection to the appliance, the profile is
removed according to the selected options.
NOTE: A WoL Task should always be scheduled as a first Task in a Task Chain. This causes WoL
packets to be pushed to all devices at once and the devices will wait for this task, since it is the first
Task. When a WoL task is not the first task in the Task Chain, WoL packets are pushed to all devices
at once regardless of the current state of the task running in the task chain.
Enabled Select this check box to allow this task chain to run.
4. Still in the Configure section, specify the devices on which you want the Task Chain to run.
• To choose devices that belong to labels, in the Configure section, under Labels, click Manage
Associated Labels. In the Select Labels dialog box that appears, select one or more labels
associated with the devices that you want to select. Close the dialog box.
• To choose devices by operating system, click Manage Operating Systems. In the Operating
Systems dialog box that appears, select the OS versions in the navigation tree, as applicable.
You have an option to select OS versions by their family, product, architecture, or build version. You
can choose a specific build versions, or a parent node, as needed. Selecting a parent node in the tree
automatically selects the associated child nodes. This behavior allows you to select any future OS
versions, as devices are added or upgraded in your managed environment. For example, to select
all build current and future versions associated with the Windows 10 x64 architecture, under All >
Windows > Windows 10, select x64.
5. In the Schedule section, specify the schedule settings:
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
NOTE: The Patch Management component is supported on Windows and Mac devices only. Patch
Management is not available for Linux devices.
Patching workflow
Patching workflow includes subscribing to patches, selecting patch download settings, using labels to identify
patches and the devices to be patched, and scheduling patching jobs.
The patching workflow includes the following tasks.
• Subscribing to the patches that you want to download. If the Organization component is installed on your
appliance, you set subscription settings for each organization separately. Additional workflow details are
available for first-time patch subscription. See Subscribing to patches and configuring download settings.
• Selecting patch download settings on the Patch Subscription Settings page. See Select patch download
settings.
• Creating Smart Labels to group devices for patching and patches for deployment. See Using Smart Labels
for patching.
• Creating patching schedules to detect and deploy packages. If the Organization component is installed
on your appliance, you create patch schedules for each organization separately. See Configuring patch
schedules.
1 Signature files for patches you subscribe to are downloaded to the appliance from
Lumension. Patch packages are downloaded from Lumension and from software
vendors.
Application testing
HEAT Software tests with various applications as necessary to ensure the requirements of the patch are satisfied.
Testing strategy
HEAT Software uses the following types of testing:
• General testing verifies the following:
◦ Patch-naming convention complies with the HEAT Software policy.
◦ The content supports the replication process: each patch created by the content team is validated with
the Global Subscription Service (GSS) distribution and Patch Server products.
• Assessment testing verifies the following:
◦ An applicable non-patched system shows applicable and not patched.
◦ An patched system shows installed and not applicable.
◦ False positives in the detection of digital fingerprint.
◦ The content complies with mandatory baselines.
◦ The patch is correctly displayed in Patch Server, including all filtering, sorting and other visual
functionality.
• Deployment testing verifies the following:
◦ The package can be successfully deployed.
◦ The suppress reboot functionality works correctly.
◦ The uninstall functionality works correctly.
◦ On-demand package caching works correctly.
◦ Automatic deployment scheduling works correctly.
◦ Agent package downloads.
◦ The package hash ensures the package integrity.
◦ The agent automatically runs assessment after each patch deployment.
◦ The agent restarts automatically after a reboot.
TIP: The KACE SMA enables you to create a policy that specifies whether or not managed
devices use Windows Update. See Using Windows configuration policies.
Activate New Mark new patches as Active. This setting enables patches that match your
Patches subscription settings after every download. If this option is not selected, new patches
are marked as Inactive. This enables you to test patches before they are deployed.
3. Specify the Subscription settings. The operating systems and locales specified in the subscription control
the patches that are downloaded.
Option Description
Windows Download patches for the selected Windows operating systems. Click the edit button
Operating
to manage the list of operating systems: . Select All Windows in Inventory
Systems
to select the Windows operating systems based on managed devices. To ignore
Windows operating system patches, select Disabled. Or, select the check boxes next
to one or more Windows operating systems.
Selected items are displayed after you save the settings.
Mac Operating Download patches for the selected Mac operating systems. Click the edit button
Systems
to manage the list of operating systems: . Select All Mac in Inventory to select
the Mac operating systems based on managed devices. To ignore Mac operating
system patches, select Disabled. Or, select the check boxes next to one or more
Mac operating systems.
Selected items are displayed after you save the settings.
Locales Download patches for the selected languages. Click the edit button to manage the
list of locales: . Select All Locales to download patches regardless of the locale or
select the check boxes next to one or more locales.
Selected items are displayed after you save the settings.
NOTE: At least one operating system and one locale must be selected for a patch subscription.
4. Specify the Operating System Patches settings. These settings are used to determine the patch status
once the patch files are downloaded. The patch status can be active, inactive, or disabled.
Types Subscribe to security or non-security type operating system patches. Click the edit
button to manage the selected types: . Select All Types to select both security and
non-security patches. To ignore the patch type, select Disabled. Or, select the check
boxes next to one or more patch types.
Selected items are displayed after you save the settings.
Impacts Subscribe to patches based on an operating system's patch impact. This can be
Critical or Recommended. Click the edit button to manage the selected impacts: .
Select All Impacts to select both Critical and Recommended patches. Or, select the
check boxes next to one or more patch impacts.
Selected items are displayed after you save the settings.
5. Specify the Application Patches settings. These settings are used to determine the patch status once the
patch files are downloaded. This can be active, inactive or disabled.
Option Description
Publishers Subscribe to applications patches based on its vendor. Click the edit button to
manage the selected types: . Select All Publishers to select patches from all
available publishers. Or, select the check boxes next to one or more publishers.
Selected items are displayed after you save the settings.
Impacts Subscribe to patches based on an applications patch impact. The impact can be
Critical or Recommended. Click the edit button to manage the selected impacts: .
Select All Impacts to select both Critical and Recommended patches. Or, select the
check boxes next to one or more patch impacts.
Selected items are displayed after you save the settings.
Labels Download only those patches that match the selected labels. Click Manage
Associated Labels to select the labels.
This refinement is important when disk space is limited. If the total disk space
required for selected patches exceeds the space available on the KACE SMA,
patches cannot be downloaded.
NOTE: Appliance disk space information appears in the Patch Status section
at the top of the page.
Disable Windows Identify and disable any embedded Windows patches. When this option is selected,
Embedded the signatures for embedded patches are downloaded, but they cannot be deployed
Patches unless they meet the subscription criteria.
Inactivate Mark patches that have been superseded to the Inactive state after every download.
Superseded Inactive Superseded Patches are identified with Inactive on the Patch Catalog page.
Patches
Detect Disabled Enable the appliance to identify disabled patches when it runs a Detect job. If this
Patches option is selected, the signatures for disabled patches are downloaded for detection
purposes only. Patches cannot be deployed unless they meet the subscription
criteria.
7. Click Save.
Selected patches are downloaded automatically at the next scheduled download time. If a patch does not match
the subscription settings after download, it appears as Disabled. If a patch matches the subscription settings but
it is either superseded or manually set to inactive, the state appears as Inactive.
Disabled Prevent the downloading of patch packages. This prevention includes the installers
that are required to install the patches.
All subscribed Maintain a full cache of subscribed packages on your KACE SMA. This option
files downloads all deployment packages to which you subscribe, without checking to
determine whether they are required for your environment.
It is important for some environments to maintain a full cache. For example, if you
select the Offline Target or Online Source option, full caching is required.
Files detected as Allow the appliance to determine which packages to download based on the results
missing of Detect jobs. If a patch detection signature has been detected as Not Patched on
any managed device, the patch package is downloaded. If no managed devices are
detected as Not Patched, no packages for this patch are downloaded.
Delete unused Delete patches that have not been deployed in the specified number of days. Patches
files after __ days that are marked as Inactive or Disabled are automatically deleted during the patch
download process.
Offline Update The action to take if the appliance is offline when the update process is scheduled to
start. Clear the Offline Update option if the appliance is expected to be connected to
the internet and can download patches directly.
Offline Target The Offline Target to use if the appliance is not connected to the internet, and you
want to upload the patch files from a local directory. If you have a KACE SMA that
is connected to the internet, you can configure that appliance as an Offline Source.
Then you can manually copy the patch files from the Offline Source Patches file
share to the following directory on the Offline Target: \\KACE_SMA_host\patches.
Click Upload to load patch TAR files.
Online Source Whether the appliance is used as a source for a different appliance. When this option
is selected, patch files are downloaded to the KACE SMA’s Patches file share.
4. Select schedule options for patch signatures in the Schedule section. Patch signatures include the security
bulletins and other files that define patches downloaded from Lumension.
Option Description
Every __ hours Download signatures at a specified interval. Use caution when specifying frequent
intervals (4, 8 or 12 hours), because this can increase bandwidth requirements.
Every day at the Select day to download patch detection signatures every day, or select a day of the
specified time week to download once a week.
Select the time to start the download. Time is displayed in 24-hour clock format,
where 0 is midnight, 1:00 a.m. is 1 and 11:00 p.m. is 23.
NOTE: When setting up patch downloads, timing is important. The appliance
activity log is created at 1:30, and maintenance tasks occur between 01:00
and 01:30. Quest recommends that you schedule patch downloads to occur
after the log and maintenance tasks are complete, which is about 3:00.
On the nth of Select the day of the month to download patch detection signatures on a monthly
every month or on basis.
a specific month
at HH:MM
After signature Download packages after the signatures have been downloaded. This option is not
download available if package download is disabled in the Patch Download Options section.
Every __ minutes Specify the frequency with which signatures and packages are downloaded. This
option is available only if Patches detected as missing in the Patch Download Options
section is selected.
Download Specify a time period during which patch detection signatures cannot be downloaded.
Blackout: Start __ For example, use an early morning stop time to prevent the process from using a
End __ large amount of network bandwidth during regular working hours.
If you select this option, the appliance stops patch downloads at the specified time.
It does not start patch downloads again until the next specified patch download
6. Click Save.
7. To immediately download the patches to which you have subscribed, regardless of the schedule, click Run
Now.
8. To immediately remove all patches from the appliance, click Delete. This can be useful if you no longer
need any patches and you want to quickly reclaim the disk space that they used.
To schedule patch detection and deployment for managed devices, see Creating and managing patch schedules.
Configure section
Option Description
Name A name that identifies the schedule. This name appears on the Patch Schedules
page.
Device Labels Restrict the patch actions to the devices in the labels that you select. Limiting the
run to labels, especially Smart Labels, helps to ensure that patches are applied
appropriately.
For example, some application patches have the ability to install applications as
well as update applications that are already installed. To prevent the appliance from
installing the application on devices that do not already have the application installed,
you can create a Smart Label to identify devices that have the application. You can
then limit the patch action to devices that have that label. The patch is then applied
only to devices that already have the application installed.
To use this option, you must already have created labels or Smart Labels. See Using
Smart Labels for patching.
NOTE: When a Device Smart Label is associated with a label group, the
Smart Label appears available for selection, but cannot be applied by dragging
it to the right. This is the default behavior for label groups. You can only select
and apply Smart Labels that are based on a single item.
Any labels that you select in this section only apply to the set of devices associated
with the scoped user (if applicable). Scoped users can see only those devices that
are associated with their role, when the role is assigned a label. For more information
about user roles, see Add or edit User Roles.
Devices Run detect and deploy patch actions on the devices that you select. To search for
devices, begin typing in the field. Scoped users can see only those devices that are
associated with their role, when the role is assigned a label. For more information
about user roles, see Add or edit User Roles.
Operating Select the operating systems of the devices on which you want to run the actions.
Systems The default is all operating systems.
Detect section
Option Description
All Patches Detect all available patches. This process can take a long time. Also, it might detect
patches for software that is not installed on, or required by, managed devices. For
example, if managed devices use anti-virus applications from only one vendor, you
might not need to detect patches for all anti-virus vendors. All Patches, however,
detects all missing patches regardless of whether they are required by managed
devices. To refine patch detection, set up labels for the patches you want to detect,
then use the Patch Labels option.
Patch Labels Restrict the action to the patches in the labels that you select. This is the most
commonly used patch detection option. To select labels, click Edit. To use this
option, you must already have labels or Smart Labels for the patches you want to
detect. See Using Smart Labels for patching.
Deploy section
Option Description
Patch Labels Restrict the action to the patches in the labels that you select. This option is the
most commonly used patch detection option. To select labels, click Edit. To use this
option, you must already have labels or Smart Labels for the patches you want to
detect. See Using Smart Labels for patching.
Maximum Deploy The maximum number of attempts the appliance deploys or rolls back the patch.
Attempts Specify a number between one '1' and ten "10". If you specify zero '0', the deployment
or rollback does not run. A value higher than ten "10" results in an error message.
As a last step in patch deployment or rollback, the appliance verifies whether the
patch was deployed or rolled back successfully. If a deployment or rollback fails, the
appliance attempts to deploy or rollback the patch again until one of the following
occurs:
• The deployment or rollback succeeds.
• The maximum number of attempts is reached.
• The scheduled deployment or rollback period ends and patching is suspended.
Rollback section
Option Description
Labels Restrict the action to the patches in the labels that you select. This option is the
most commonly used patch detection option. To select labels, click Edit. To use this
option, you must already have labels or Smart Labels for the patches you want to
detect. See Using Smart Labels for patching.
Maximum The maximum number of attempts, between 0 and 99, to indicate the number
Rollback Attempts of times the appliance tries to deploy or rollback the patch. If you specify 0, the
appliance attempts to deploy or rollback the patch indefinitely.
As a last step in patch deployment or rollback, the appliance verifies whether the
patch was deployed or rolled back successfully. If a deployment or rollback fails, the
appliance attempts to deploy or rollback the patch again until one of the following
occurs:
• The deployment or rollback succeeds.
• The maximum number of attempts is reached.
• The scheduled deployment or rollback period ends and patching is suspended.
Notify section
Option Description
Options The options displayed to users when patch actions run. To perform the action without
notifying the user, leave the Options field blank.
• OK: Run immediately.
• Cancel: Cancel until the next scheduled run.
• Snooze: Prompt the user again after the Snooze Duration.
Timeout The amount of time, in minutes, for the dialog to be displayed before an action
is performed. If this time period elapses without the user pressing a button, the
appliance performs the action specified in the Timeout drop-down list.
Timeout Action The action to be performed when the Timeout period elapses without the user
choosing an option.
Snooze Duration The amount of time, in minutes, for the period after the user clicks Snooze. When this
period elapses, the dialog appears again.
Snooze Until Limit Select the Snooze Until Limit check box to enable the user to Snooze the patch
action a specified number of times. Specify the number of Attempts.
Initial Message The message to be displayed to users before the action runs. To customize the
logo that appears in the dialog, see Configure appliance General Settings with the
Organization component enabled.
Progress Message The message displayed to users during the patch action.
Completion The message displayed to users when the patch action is complete.
Message
Reboot section
Option Description
No Reboot The device does not reboot even though a reboot might be required for the patch
to take effect. When this option is selected, the following occurs according to the
patching schedule:
• A Detect job runs.
• Patches are deployed.
• If no reboot is required, and the patch list is exhausted, a final Detect job runs
to verify patch status.
• If a reboot is required, patching stops. When the device is rebooted, patching
continues until either the patch list is exhausted, or a reboot is needed and
patching stops.
• When the patch list is exhausted, a final Detect job runs to verify patch status.
No Reboot is not recommended because deploying patches without rebooting when
required can leave systems unstable. Further, patches that require reboots are only
shown as deployed after the reboot.
Prompt User Wait for the user to accept the reboot before restarting the device. When this option is
selected, the following occurs according to the patching schedule:
• A Detect job runs to identify unwanted patches.
• If unwanted patches are found, the appliance attempts to remove them.
• If removal is unsuccessful after the maximum number of attempts, the rollback
fails and the device is ignored.
• If the rollback is successful, the user is prompted to reboot.
• If no user is logged in, the device is rebooted immediately.
• If the user clicks OK, the device reboots. The rollback process continues
until another reboot is required and the user is prompted again. The pattern
continues until the patch list is exhausted.
If the user snoozes or cancels the reboot, patching stops until a reboot occurs. When
a reboot occurs, rollback continues until the next reboot is needed, and the user is
prompted again. The pattern continues until the patch list is exhausted.
Force Reboot Reboot as soon as a patch requiring it is deployed. Forced reboots cannot be
canceled. Force Reboot works well for desktops and servers. You might not want to
force reboot on laptops. When this option is selected, the following occurs according
to the patching schedule:
• A Detect job runs.
• All patches are deployed and the device is rebooted as needed.
• After the last reboot, a final Detect job runs.
Force Reboot works well with servers because they usually have no dedicated users.
However, it is important to warn users that services will not be available when servers
are being patched and rebooted. See Best practices for patching.
Automatically Automatically reboot the managed device if no users are logged in.
reboot when no
one is logged in
Message The message to be displayed to the user before the device reboots. For information
about adding a custom logo to the message dialog, see Configure appliance General
Settings with the Organization component enabled.
Timeout The amount of time, in minutes, for the dialog to be displayed before an action
is performed. If this time period elapses without the user pressing a button, the
appliance performs the action specified in the Timeout drop-down list.
When Force Reboot is selected, the timeout behavior takes into consideration the
KUSerAlert and global KACE SMA Agent process timeouts. The global timeout,
set in amp.conf through the Agent Settings page, always determines how long
any agent-launched processes can run for, including the KUserAlert timeout. For
example, if the KUserAlert timeout is set to two hours, and you set the global
timeout to one hour, the agent will stop the KUserAlert because it runs too long.
Therefore the global timeout must be set to the desired timeout that is longer than the
KUserAlert timeout. This value must be set accordingly.
Timeout Action The action to be performed when the Timeout period elapses without the user
choosing an option.
Reboot Delay Postpone the reboot using a countdown. The countdown is in minutes.
(countdown)
Number of The number of prompts the user receives before the device reboots. For example,
prompts if you enter a value of 5, the device automatically reboots the fifth time the user
receives the reboot prompt. In other words, the user can delay the reboot only four
times if the Number of prompts value is set to 5.
Reprompt Interval The time that elapses before the user is reprompted to reboot.
Schedule section
Option Description
None Run in combination with an event rather than on a specific date or at a specific time.
This option is useful if you want to patch servers manually, or perform patch actions
that you do not want to run on a schedule.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the nth day every month, (for example, the first or the second) day of every
of every month/ month, or a specific month, at the specified time.
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
Timezone The timezone to use when scheduling the action. Select Server to use the timezone
of the appliance. Select Agent to use the timezone of the managed device.
Run on next Run the action the next time the managed device connects to the appliance, if the
connection if device is currently offline. This option is useful for laptops and other devices that are
offline periodically offline. If this option is not selected, and the device is offline, the action
does not run again until the next scheduled time.
Delay run after Delay the schedule by a specified amount of time. The time delay period begins when
reconnect the patch action is scheduled to run.
For example, if you schedule patches to run at 04:00, you might want all patching
actions to stop at 07:00 to prevent bandwidth issues when users start work. To do so,
you could specify 180 in the minutes box.
When this time limit is reached, any patching tasks that are in progress are
suspended, and their status on Security logs is Suspended.
These patching tasks do not resume on the next run and instead start from the
beginning with each scheduled patching action.
Error Description
code
23 Javascript unsupported
24 Out of memory
37 Unknown
Option Description
Last Update The date and time the patch schedule was updated.
3. (Optional) To change column visibility, select Column Visibility from the Table Options drop-down list
above the table on the right.
Column Description
Applicable View the patch list at the package level. This view shows the list of bulletins that apply
Packages to at least one managed device. This is the default filter.
All Packages View the patch list at the package level. This view shows the list of bulletins.
Individual View each downloaded patch separately. This list is not grouped by package.
Packages
• View By: Control the patches shown in the list based on the drop-down list selection.
Label View patches tagged with a label. This information is only visible if there are labels
created.
Impact Filter the patch list by the importance specified by Lumension. Impact levels include
Critical, Recommended, and so on.
Severity Filter the patch list by the importance specified by vendors, such as Microsoft.
Severity levels include Critical, Important, Low, and so on.
Type View Security, Non-Security, and Software Installer type patches. This
classification is specified by Lumension.
Year Filter the patch list by the year the patch was released.
Package The patch identification information. Labels applied to the patch are also displayed in
this column.
Severity The importance of the patch as determined by the publisher, such as Microsoft.
Missing The number of devices that have been detected as needing the patch and that are
waiting for deployment.
Error The number of devices that have failed the maximum number of deployment
attempts. The maximum number of deployment attempts is configured in the patch
schedule. See Configuring patch schedules.
Superseded Patches that have been replaced by other patches and are no longer required.
When showing by Applicable Packages or All Packages, (x of x) may show in the
superseded column if some patches within the bulletin are superseded. For example,
Yes (2 of 18) means 2 superseded out of 18.
Reset the number of patch deploy attempts from the patch Catalog
When a patch deployment has been attempted the configured maximum number of times, the number of retries
can be reset from the patch Catalog page.
1. Go to the patch Catalog page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Security.
c. On the Patch Management panel, click Catalog.
2. Select the check box next to one or more patches/bulletins in the list then select Choose Action > Reset
Tries.
The number of deploy attempts are reset to 0.
Reset the number of patch deploy attempts from the patch detail page
When a patch deployment has been attempted the configured maximum number of times, the number of retries
can be reset from the patch detail page.
1. Go to the Catalog list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Security.
c. On the Patch Management panel, click Catalog.
2. Do one of the following to display the Patch Detail page:
◦ If the Show drop-down list is set to Applicable Packages or All Packages, click the name of the
package, and then click the name of a patch within the package.
◦ If the Show drop-down list is set to Individual Patches, click the name of a patch.
3. Scroll down to the Deployment Status section and click the Reset Tries button.
The number of deploy attempts is reset to 0.
• You manage and run patching and Dell Updates from different places in the Administrator Console:
All Files Download all available updates. If you change operating systems or acquire new Dell
equipment frequently, it is best to keep all Dell Updates available.
Files detected as Download only the updates that you need for your managed devices.
missing
Unused files Click Delete Unused Files to remove only those files that are not needed. This helps
to limit the amount of disk space used by update files.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Check for Run on the same day every month, or a specific month, at the specified time.
changes On
the nth of every
5. In the Download Blackout section, select options to limit the amount of time the Dell Updates can run.
You might want to enforce a hard stop at a specific time, for example, when your users start working or if
bandwidth or network traffic is an issue.
6. Click Save.
NOTE: The Agent Timezone is only available if there is a Dell device in inventory to pull the
Timezone information from.
e. To select one or more OS versions to which you want to apply this scheduled update, click
Manage Operating Systems.
TIP: Before you enable a schedule, test it on a small subset of the devices to make sure
everything is working the way you expect.
g. To enable the schedule, select the check box next to the schedule name, then select Choose
Action > Enable.
The inventory and update runs according to the specified schedule.
Related topics
Managing patch inventory
Configure Dell Update catalog updates
Status Description
Draft Indicates that the definition is assigned an OVAL ID number and is under discussion
on the Community Forum and by the OVAL Board.
Interim Indicates that the definition is under review by the OVAL Board and available for
discussion on the Community Forum. Definitions are generally assigned this status
for two weeks, unless additional changes or discussions are required.
Accepted Indicates that the definition has passed the Interim stage and is posted on the OVAL
Definition pages. All history of discussions pertaining to Accepted definitions are
linked from the OVAL definition.
OVAL-ID The status of the vulnerability following the OVAL-ID. Possible values are Draft,
Interim, or Accepted.
Class The nature of the vulnerability. Possible values are: Compliance, Deprecated, Patch,
and Vulnerability.
Description The common definition of the vulnerability as found on the CVE list.
The table at the bottom of the OVAL Tests: Definition page displays the list of devices in your network that
contain the vulnerability. For convenience, a printer-friendly version of this data is available.
Enabled Run on the target devices. Only enabled configurations can run.
If OVAL tests are disabled, updates are stored on the appliance but they are not
pushed out to target devices until OVAL tests are enabled and scheduled.
Allow Run While Run even if no user is logged in. Clear this check box to run the item only when a
Logged Off user is logged in to the device.
Labels Limit deployment to devices that belong to specified labels. To select labels, click
Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location,
the appliance copies digital assets from that Replication Share or alternate download
location instead of downloading them directly from the appliance.
NOTE: The appliance uses a Replication Share before it uses the KACE Alt
Location.
Devices Limit deployment to specific devices. In the drop-down list, select the devices to
which you want to deploy the application. To filter the list, type a few characters in the
Devices field. The number next to the field indicates the number of devices available.
Scoped users can see only those devices that are associated with their role, when
the role is assigned a label. For more information about user roles, see Add or edit
User Roles.
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
5. Click Save.
6. Click Run Now to run the script immediately.
Tests run on the devices selected in the Deploy section.
About SCAP
SCAP (Secure Content Automation Protocol), is a set of open standards that enumerate software flaws,
monitor security-related configurations and product names, and examine systems to determine the presence of
vulnerabilities and rank (score) the impact of the discovered security issues on Windows devices.
SCAP is maintained by the National Institute of Standards and Technology (NIST), and its use is mandated by
government agencies such as the US OMB (United States Office of Management and Budget).
SCAP uses the US government’s National Vulnerability Database (NVD), which is a standards-based vulnerability
management data repository. NVD includes databases of security checklists, security-related software flaws,
misconfigurations, product names, and impact metrics. For more information on SCAP and NVD, go to the NIST
websites at http://scap.nist.gov/index.html and http://nvd.nist.gov/.
CVE Common Vulnerability and Exposures is a list or dictionary that provides standard
identifiers (common names) for publicly known security vulnerabilities and software
flaws.
The compliance checking results produced by the KACE SMA SCAP scan include
the relevant CVE ID references and OVAL definition for every rule checked in the
checklist definition.
For every patch or vulnerability, CVE ID references are provided in the appliance’s
SCAP Scan Result page.
The CVE information is stored in a patch result XML file generated by the scan. The
file is available for inspection and verification in the Agent’s working directory and on
the server’s SCAP Scan Results page.
SCAP Secure Content Automation Protocol is a set of open standards that enumerate
software flaws, monitor security-related configurations and product names, and
examine devices to determine the presence of vulnerabilities and rank (score) the
impact of the discovered security issues. See About SCAP.
About benchmarks
A SCAP benchmark is a security configuration checklist that contains a series of rules for evaluating the
vulnerabilities of a device in a particular operational environment.
You can access the Script Detail page from the Benchmark wizard, as described in Access SCAP Scan
information and from the SCAP Scan Schedules page, as described in View SCAP scan results.
Scanned The date and time that the scan was run.
Other The number of rules having other values such as error, unknown, not checked, not
applicable, and informational.
The XCCDF specification also defines “not selected”, which is excluded from the
results.
3. To view the details on a particular device, click its name in the Device column.
A page containing the details of the scan result for the selected device appears. The following table
describes each section in more detail:
Section Description
Test Results Test results in a tree structure that represents the grouping of the rules. Symbols
display the pass-fail status of a rule. You can click a rule to open a dialog box
containing the rule’s details.
Scores Compliance scores for each scoring model as defined for the benchmark.
Results by CCE Pass-fail results by CCE. The FDCC requires that compliance is reported by CCE.
Name A name that identifies the script. This name appears on the Scripts page.
User Home Page Enforce User home page policy: Force the user’s home page to the specified page.
Select the check box, then specify the URL to use as the home page.
Security • Enforce Internet Zone settings policy: Specify the security level for each
zone. Select the check box, then choose the security level from the Security
level drop-down list.
• Enforce Local Internet Zone settings policy: Specify the security level for
intranet zones. Select the check box, then choose the security level from the
Security level drop-down list and choose the sites to include.
• Enforce Trusted Zone settings policy: Specify the security level of trusted
zones. Select the check box, then choose the security level from the Security
level drop-down list.
• Enforce Zone Map: Select the check box, then specify the IP addresses or
ranges.
NOTE: Domains that are not listed default to the Internet Zone.
Privacy Control the cookies and pop-ups that are accepted by Internet Explorer from the
Internet Zone. Select from these options:
• Enforce Privacy settings policy: Select the check box, then set the Cookie
policy.
• Enforce Pop-up settings policy: Select the check box, then set the Pop-up
filter level.
Name A name that identifies the script. This name appears on the Scripts page.
Domain Policy The policy used when the device has authenticated with a domain controller. If you do
not have a domain controller, use the Standard Policy configuration.
Standard Policy The policy used when the device has not authenticated with a domain controller, for
example, when a device user is at home or using a Wi-Fi® hotspot. This configuration
is more restrictive than the Domain Policy.
NOTE: If the firewall is enabled, the policy settings override any settings the user might have set. If
the firewall is disabled, the user cannot enable the firewall. If the firewall is set toNo Policy, the user's
configurations for the firewall are used.
4. If you select the Enabled option for the firewall, specify the following options:
Option Description
Enable logging Enable the firewall to log information about the unsolicited incoming messages that
it receives. The firewall also records information about messages that it blocks and
successful inbound and outbound messages. Specify a location and name for the log
file. The default is: C:\Program Files\KACE\firewall.log
Allow WMI traffic Enable inbound TCP traffic on ports 135 and 445 to traverse the firewall. These
ports are necessary for using remote administration tools such as the Microsoft
Management Console (MMC) and Windows Management Instrumentation (WMI).
Allow Remote Enable inbound TCP traffic on port 3389 to traverse the firewall. This port is required
Desktop for the device to receive Remote Desktop requests.
Allow File and Enable inbound TCP traffic on ports 139 and 445, and inbound UDP traffic on ports
printer sharing 137 and 138. These ports are required for the device to act as a file or printer sharing
server.
Allow Universal Enable inbound TCP traffic on port 2869 and inbound UDP traffic on port 1900.
Plug-and-Play These ports are required for the device to receive messages from plug-and-play
(UPnP) network devices, such as routers with built-in firewalls.
Name A name that identifies the script. This name appears on the Scripts page.
McAfee 8.0 Setup The ZIP archive that contains the installation files to use for the script. click Browse
Zip or Choose File to select the ZIP archive. Click Software Inventory to go to the
Software Detail page to select the ZIP archive.
User Interaction How the installation appears to users. For a description of the available options, see
the McAfee documentation.
McAfee Features The features to be installed. Use Ctrl-click or Command-click to select multiple
features. To install the Alert Manager, use the McAfee tools to include the Alert
Manager installation files in the deployment package. See the McAfee documentation
for information about available features.
Enable On-Access Select this check box to start McAfee's automatic file scanner after the installation
Scanner is complete. The On-Access scanner scans files whenever they are accessed, for
example, when opening a file or running a program.
Preserve earlier Select this check box to preserve the present configuration settings for the On-
version settings Access Scanner before the update occurs.
Lockdown Select this check box to not display any VirusScan shortcuts in the Windows Start
VirusScan menu.
Shortcuts
Remove other Select this check box to remove competing anti-virus software that could conflict with
antivirus software McAfee.
Installation The directory on the target device where the application is to be installed.
Directory
Source Paths Provide the path to the source McAfee ZIP file uploaded to the appliance.
Logging The information to record in the installation log. Use Ctrl-click or Command-click to
select multiple items.
Name A name that identifies the script. This name appears on the Scripts page.
SDAT or XDAT file The installation files to use for the script. click Browse or Choose File to select the
ZIP archive. Click Software Inventory to go to the Software Detail page to select the
ZIP archive.
Install Silently The file is installed without displaying installation feedback or progress on the device.
Prompt For If the installation requires the device to be rebooted, prompt the user before
Reboot rebooting.
Reboot If Needed The device is rebooted as needed. Without this option, a silent installation does not
reboot the device.
Force Update All file versions are updated, even if the device already appears to have the latest
versions.
Name A name that identifies the script. This name appears on the Scripts page.
Action The task to be performed. Tasks include Install, Uninstall, Repair missing files,
and Reinstall all files.
Software The application to use for the script. To search for an application, begin typing in the
field.
MSI Filename The MSI filename (required if the file is a ZIP archive).
User Interaction How the installation appears to users. Options include: Default, Silent, Basic UI,
Reduced UI, and Full UI.
Install Directory The directory on the target device where the application is to be installed.
Additional Any additional installer switches. Additional switches are inserted between the
Switches msiexe.exe and the /i foo.msi arguments.
Additional Any additional properties. These are inserted at the end of the command line. For
Properties example:
msiexec.exe /s1 /switch2 /i patch123.msi TARGETDIR=C:\patcher
PROP=A PROP2=B
After Install What to do with the installation files when installation is complete.
Logging The information to record in the installation log. Use Ctrl-click or Command-click to
select multiple items.
Server Name If you select Managed from the Network Management drop-down list, specify the
server name.
Features to Install The features you want to install from the Features to Install list. Use Ctrl-click or
Command-click to select multiple features. See the Symantec documentation for
specific information about the options available here. You must include the SAVMain
NOTE: If you edit a template-based policy, keep the Run As setting as local system.
Name A name that identifies the script. This name appears on the Scripts page.
Enable Firewall Enable the firewall to log information about the unsolicited requests, blocked
Logging requests, and successful requests.
Enable Stealth Enable the firewall to drop packages that are denied without sending error messages
Mode to requesters.
Name A name that identifies the script. This name appears on the Scripts page.
Hide Profanity in Dictionary Prevent words identified as profanity from being displayed in the dictionary
on target devices.
URLs of approved websites If you select Allow access only to these websites, provide the URLs
of the websites you want to approve. Users on target devices can only
access approved websites.
Name A name that identifies the script. This name appears on the Scripts page.
About reports
The KACE SMA includes many standard reports for software, hardware, Service Desk, and other items.
If the Organization component is enabled on your appliance, you can create and run reports for each organization
and for the System-level separately. System-level reports include consolidated reports that aggregate information
from all organizations, as well as standard reports for various KACE SMA components.
About notifications
Notifications are email messages the appliance sends to administrators when devices, scan results, and assets
meet specified criteria.
For example, if you want to notify administrators when devices approach disk space limits, you can set up alerts
based on disk usage. Notifications are sent when devices meet the specified criteria.
The appliance checks inventory against the criteria in the notification schedules at the specified frequency. When
an item meets the criteria, the appliance sends email to the specified recipients.
By default, the appliance checks inventory every hour. To change the frequency, edit the notification schedule.
See Edit notification schedules.
NOTE: Notifications and daily reports come from the default address, Charlie Root, (root@KACE
SMA_hostname) and you cannot modify this address.
Creating reports
You can create reports to collect and analyze data, such as inventory information.
There are several ways to create reports:
• Use the report wizard on the Reports page. See Create reports using the report wizard.
• Use the SQL report form on the Reports page. See Create reports using SQL queries.
• Use the menu option on list pages, such as Devices, Assets, Managed Installations, and so on. See Create
reports from list pages.
In addition, you can create charts and graphs by generating reports in XSL (Microsoft Excel) or CSV (comma-
separated value) format, then importing the data into a tool such as Microsoft Excel.
NOTE: Be aware that multibyte characters, such as those used to support Japanese and Chinese
character sets, might display as "garbage characters" when CSV files are imported to Excel. For more
information, contact Quest Support at https://support.quest.com/contact-support.
Title The display name of the report, which appears on the report list. Make the title as
descriptive as possible, so you can distinguish the report from others in the list.
Category The category of the report. If the category does not already exist, it is added to the
drop-down list on the Reports page.
Topic The topic of the report. This setting determines the fields that are available for the
report.
add a subtopic Click this link to add up to two related topics to the report. This enables you to show
relationships between up to three types of data in the same report.
When you generate the report in HTML format, you can expand and collapse the
rows to drill down into the information as needed.
When you click add a subtopic, additional options become available, depending
on the topic you select. For example, if you select Device, Software, and File
Synchronization, the following two check boxes appear:
• Only show rows from Device with at least one File Synchronization row.
• Only show rows from File Synchronization with at least one Software row.
Selecting these check boxes would limit the report to devices and software that have
at least one child row. Device rows would appear in the report only if they have at
least one corresponding software row; Software rows would appear in the report only
if they have at least one corresponding File Synchronization row.
Clear these check boxes to show all device and software rows regardless of whether
they contain any software or File Synchronization rows, respectively.
Title The display name of the report, which appears on the report list. Make the title as
descriptive as possible, so you can distinguish the report from others in the list.
Category The category of the report. If the category does not already exist, it is added to the
drop-down list on the Reports page.
Break on Columns A comma-separated list of SQL column names. The report generates break headers
and subtotals for these columns.
SQL The query statement that generates the report data. For more information, go to the
MySQL documentation at http://dev.mysql.com/doc/refman/5.0/en/.
When writing a report or query against the Service Desk HD_Ticket table, be aware
that the User custom field stores the user ID from the USER table in the HD_TICKET
table, which is the table that holds the ticket record. If you want to display the
username instead of the user ID in the report, you need to JOIN on the USER table.
See Database table names.
Organization These settings are available only at the System level on appliances with the
settings Organization component enabled. Options include:
• All Organizations: The SQL Select statement is modified to iterate across all
organizations, and the report contains information for all organizations.
• Aggregate results: The SQL Select statement is modified to combine the
records of all organizations, and the report contains summary information for
all organizations. Standard reports of this type are categorized as Consolidated
Reports.
4. Click Save.
The appliance checks the report syntax and displays any errors.
5. To run the new report, click a format in the Generate Report column.
TIP: Charts and graphs cannot be created from within the KACE SMA reporting tool. To create
charts or graphs, generate a report in XLS (Microsoft Excel) or CSV (comma-separated value)
format, then import the data into a tool that has chart or graph capabilities, such as Microsoft
Excel.
Title The display name of the report, which appears on the report list. Make the title as
descriptive as possible, so you can distinguish the report from others in the list.
Category The category of the report. If the category does not already exist, it is added to the
drop-down list on the Reports page.
Break on Columns A comma-separated list of SQL column names. The report generates break headers
and subtotals for these columns.
SQL The query statement that generates the report data. For more information, go to the
MySQL documentation at http://dev.mysql.com/doc/refman/5.0/en/.
When writing a report or query against the Service Desk HD_Ticket table, be aware
that the User custom field stores the user ID from the USER table in the HD_TICKET
table, which is the table that holds the ticket record. If you want to display the
username instead of the user ID in the report, you need to JOIN on the USER table.
4. Click Save.
The report appears on the Reports page.
Duplicate reports
You can duplicate any report, including standard reports that are shipped with the appliance. If you are creating a
report that is similar to an existing report, duplicating the existing report can be faster than creating a report from
scratch.
1. Go to the Reports list by doing one of the following:
• If your KACE SMA has the Organization component enabled, and you want to access a System-level
report:
Log in to the KACE SMA System Administration Console, http://KACE_SMA_hostname/system,
or select System from the drop-down list in the top-right corner of the page. Then click Reporting.
System-level reports include consolidated reports that aggregate information from all organizations, as
well as standard reports for various KACE SMA components.
• If your KACE SMA does not have the Organization component enabled, or if you want
to access an organization-level report, log in to the KACE SMA Administrator Console,
http://KACE_SMA_hostname/admin. Or, if the Show organization menu in admin header option is
enabled in the appliance General Settings, select an organization in the drop-down list in the top-right
corner of the page next to the login information. Then click Reporting.
Organization-level reports include standard reports for various KACE SMA components. If the
Organization component is enabled on your appliance, these reports provide information specific to
the selected organization.
The Reports list appears.
2. Click the title of a report.
Depending on the type of report, either the Report Detail page or the first page in the report wizard appears.
3. At the bottom of the page, click Duplicate.
Depending on the type of report, either the Report Detail page or the first page in the report wizard appears.
4. Modify the report details as necessary, then click Save.
Modifying reports
You can modify or delete reports as needed.
Delete reports
You can delete any custom report, but you cannot delete standard reports shipped with the appliance.
1. Do one of the following:
• To delete organization-level reports, select an organization in the drop-down list in the top-right corner
of the page (if applicable), then click Reporting.
• To delete System-level reports, log in to the KACE SMA System Administration Console,
http://KACE SMA_hostname/system, or select System in the drop-down list in the top-right
corner of the page. Then click Reporting (for appliances with the Organization component enabled
only).
The Reports page appears.
2. Select the check box next to one or more reports.
3. Select Choose Action > Delete, then click Yes to confirm.
Title The display name of the report, which appears on the report list.
Make the title as descriptive as possible, so you can distinguish the
report from others in the list.
Category The category of the report. If the category does not already exist, it is
added to the drop-down list on the Linked Reports page.
5. Click Next.
6. On the Appliances to Run On page that appears, select the organizations on each appliance on which you
want to run the linked report.
NOTE: Do not select System together with one or more named organizations unless you are using a
specific report definition for which that combination is valid.
7. Click Next.
8. On the Report Definition page that appears, use the drop-down controls to select the report definition to use
to create the linked report.
The report definition specifies the table, fields, and processing data to use in the report. Some report
definitions are included with the product, others can be created using the Reports page. For more
information, see Creating and modifying reports.
Option Description
Select Appliance The drop-down list is populated with all appliances that are linked
with the current appliance. Select the appliance that contains the
required report definition. To choose the current appliance, select
Local.
Select Organization The drop-down list is populated with all organizations on the selected
appliance. Select the organization that contains the required report
definition. To choose the System-level organization, select System.
Select Category The drop-down list is populated with the categories for all report
definitions in the selected organization. If there are definitions
Select Report Definitions The report definition that is used to generate a linked report.
9. Click Finish.
The Edit Linked Report wizard closes, and the newly created report appears in the Linked Reports list.
10. To view the contents of the report, the Linked Reports list, in the Generate Report column, click the format
in which you want to display the report.
For example, to generate the report in HTML format click HTML.
The report appears in the browser window.
Scheduling reports
To monitor your environment, you can schedule the appliance to run reports and send them to administrators at
specified times and intervals. This is useful for tracking software, devices, and system health.
Name The display name for the schedule. Make this name as descriptive as possible, so
you can distinguish this schedule from others.
Report The name of the report you are scheduling. This name is provided automatically if
you click the Schedule button next to a report on the Reports page.
Description A description of the schedule. This description appears on the Schedule Reports
page.
Subject The subject line of the email message that contains the report.
Recipients The email addresses where the report is to be sent. Separate multiple addresses with
a comma.
Don’t send empty Whether the appliance should send the report every time, or only when results are
reports found. Select this option to prevent the appliance from sending the report if it is
empty.
Message Any information you want to provide in the body of the email message.
Attachment The format for the report. Choose Attachment to attach the file to the email
Options message, or choose Zipped Attachment to attach the file as a ZIP archive.
None Run in combination with an event rather than on a specific date or at a specific time.
Every day/specific Run daily at a specified time, or run on a designated day of the week at a specified
day at HH:MM time.
Run on the nth Run on the same day every month, or a specific month, at the specified time.
of every month/
specific month at
HH:MM
Run on the nth Run on the specific weekday of every month, or a specific month, at the specified
weekday of every time.
month/specific
month at HH:MM
View Task Click to view the task schedule. The Task Schedule dialog box displays a list of
Schedule scheduled. Click a task to review the task details. For more information, see View
task schedules.
6. Click Save.
3. Select notification criteria. For example, to send a notification when Windows 7 devices have not connected
to the KACE SMA within 24 hours, specify the following:
a. Specify the criteria required to find devices that have the Windows 7 operating system:
Operating System: Name | contains | Windows 7
b. With AND selected in the operator drop-down list, click Add Line.
c. Specify the criteria required to find devices that have not connected to the KACE SMA in the last
24 hours:
Device Identity Information: Last Sync Time | > | 24 hours
4. Provide the following information below the notification criteria:
Field Description
Title The information that you want to appear in the Subject line of the email. This also
appears as the name of the notification on the Notification Schedules page.
Recipient The email address or addresses of intended recipients. Email addresses must be
fully qualified email addresses. To send email to multiple addresses, use commas to
separate each address, or use email distribution lists.
Frequency The interval at which the appliance runs the query to compare the selected criteria
with items in inventory. If criteria are met, the notification is sent.
Title The information that you want to appear in the Subject line of the email. This title also
appears as the name of the notification on the Notification Schedules page.
Recipient The email address or addresses of intended recipients. Email addresses must be
fully qualified email addresses. To send email to multiple addresses, use commas to
separate each address, or use email distribution lists.
Frequency The interval at which the appliance runs the query to compare the selected criteria
with items in inventory. If criteria are met, the notification is sent.
Enabled Whether the notification is active or inactive. Select Enabled to permit the appliance
to run the query and send the appropriate notifications at the selected frequency.
Select Disabled to prevent the appliance from running the query and sending
notifications.
Name The information that you want to appear in the Subject line of the email. When you
create notifications on the Notification panel, you enter this information in the Title
field.
Recipients The email address or addresses of intended recipients. Email addresses must be
fully qualified email addresses. To send email to multiple addresses, use commas to
separate each address, or use email distribution lists.
Frequency The interval at which the appliance runs the query to compare the selected criteria
with items in inventory. If criteria are met, the notification is sent.
3. Optional: To edit the report using the wizard, select click here next to To re-edit the Notification using the
original editor above the Save button.
4. Optional: To change the SQL criteria that triggers the alert, click the check box labeled To edit the
Notification using this editor above the Save button.
If you edit the SQL query, make sure to use the following as statements:
MACHINE.NAME AS SYSTEM_NAME
MACHINE.ID as TOPIC_ID
For example:
SELECT MACHINE.NAME AS SYSTEM_NAME, SYSTEM_DESCRIPTION, MACHINE.IP,
MACHINE.MAC, MACHINE.ID as TOPIC_ID FROM MACHINE WHERE ((SYSTEM_DESCRIPTION =
'Test Computer'))
5. Click Save.
NOTE: Server monitoring is not supported for Raspberry Pi devices running Raspbian Linux OS.
For details on OS versions supported for server monitoring, see the Technical Specifications guides.
NOTE: For Agent-based monitoring to work on an RHEL device running Security-Enhanced Linux
(SELinux), SELinux must be either turned off or switched to "permissive mode." You can change
the SELinux mode by modifying the file /etc/selinux/config and rebooting the device. For
further information about enabling or disabling SELinux on Red Hat Enterprise Linux, go to https://
access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Security-Enhanced_Linux/
sect-Security-Enhanced_Linux-Working_with_SELinux-Enabling_and_Disabling_SELinux.html.
Table 30. Monitoring interface components under the Monitoring tab in the KACE SMA navigation bar
Section Description
Devices For each monitored device, displays most critical alert, alert count, bound profile
count, bound Maintenance Window count, and link to detail page to edit configuration
settings for the device. This section can also display time alert created and modified,
IP address of the monitored device, and whether Configuration Change Alert is
enabled.
Alerts Displays alert level, alert summary, link to detail of alert, date and time of alert
creation, most recent repeat time, repeat count, IP address, and status.
Profiles Displays profile name, list of default profiles and added profiles, count of devices to
which the profile is bound, and if the profile is automatically added to a device with a
particular operating system type.
A profile is where the criteria for triggering an alert is configured. In the profile, the log
path and file are defined, along with the search text to look for in the log, and what
severity is assigned to the alert.
You can bind multiple profiles to a device if there are multiple logs you want to
monitor.
Maintenance Displays Maintenance Window name, count of devices to which the Maintenance
Windows Window is bound, whether the Maintenance Window is automatically added to all
devices, and link to detail page to edit schedule and OS default settings. This section
can also display Maintenance Window description and time Maintenance Window
created and modified.
Log Enablement Displays a base set of Windows Reliability and Performance Monitor (PerfMon)
Packages templates and non-Windows open-source Perl scripts, so that you can extend your
monitoring capability, and identify system and application performance issues.
Monitoring profiles
With the default monitoring profiles and with profiles you can set up, your KACE SMA can provide:
• Windows event log monitoring
• Non-Windows file system log monitoring
• Configuration change monitoring
In addition, you can use Log Enablement Packages (LEPs) to provide:
• Threshold monitoring
• Application monitoring
You can download your profiles for others to use, and can upload custom profiles that are developed and made
available by others.
TIP: To display only the log monitoring profiles, in the top-right corner, click View By > Type > Log. To
display the monitoring profiles for SNMP trap devices, click View By > Type > SNMP Trap.
critical Critical
error Error
fatal Error
fail Error
warn Warning
unavailable Warning
Edit a profile
You can change, add, or remove alert criteria and log paths for any existing profile.
If you want to use an existing profile as a starting point for creating a profile, see Create a new profile using a
default profile as a template.
To identify events that you want raised as alerts, use strings or regular expressions in Include Text to specify the
appropriate message content. For instance, if you enter the string, Physical memory, an alert is raised for every
message with that exact string.
To cover multiple possibilities, you can use a regular expression. For example, if you want alerts for any drive
mount point that has drive errors, in the form, “Drive /dev/[any drive mount point] has drive errors”, you can use
Drive /dev/[a-z]{1,} has drive errors in Include Text. Alerts are raised for any messages that contain "Drive /dev/"
followed by any word of any length containing the characters a-z, followed by "has drive errors".
You can exclude specific events from being raised as alerts if you find them unnecessary or distracting. To filter
the alerts you do not want to receive, you use Exclude Text to indicate the content that identifies an unwanted
alert. You can use Exclude Text to filter whole categories of alerts, or use Exclude Text in conjunction with Include
Text to refine a subset of an alert category. See Examples of Include Text and Exclude Text for monitoring
profiles.
1. Go to the Profiles list page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Monitoring, then click Profiles.
2. Select the check box for the existing profile that you want to edit, and select Choose Action > Edit to
display the Profile Detail page.
3. Optional: Change or modify the Name and Description of the profile to indicate the edits.
NOTE: If you are editing one of the default profiles, you cannot make any change to the Add
Automatically To field.
4. Make changes to the Criteria settings, according to your needs.
• Change Include Filter (SNMP traps only) or Include Text (all other monitoring profiles).
1. On the line with the include search text (or filter for SNMP traps) you want to change, click the Edit
button: .
2. Type the new search text or filter.
• Optional. Change Exclude Filter (SNMP traps only) or Exclude Text (all other monitoring profiles).
1. On the line with the text (or filter for SNMP traps) you want to change in order to exclude certain
alerts, click the Edit button: .
2. Type the new exclude text or filter.
• If the provided search text is case sensitive, select Yes in the Case-sensitive drop-down list.
• SNMP traps only. Create a Service Desk ticket automatically each time the appliance receives a
specific SNMP alert.
▪ On the line containing an SNMP include and exclude filter (as configured), in the Create Ticket
column, click Select Queue, and select a ticket queue that you want to use to create a Service
Desk ticket. The appliance will create a Service Desk ticket in the specified ticket queue when it
Related topics
Filter alerts using the Include Text and Exclude Text capability from the Profile Details page
Examples of Include Text and Exclude Text for monitoring profiles
Element Description
%d Local day.
%m Local month.
%y Local year.
%h Local hour.
%i Local minute.
%s Local second.
%u Unix timestamp.
%Vd# Variable binding description (where '#' is a number representing the element's
position in the sequence).
%Vn# Variable binding name (where '#' is a number representing the element's position
in the sequence).
%Vo# Variable binding OID (where '#' is a number representing the element's position in
the sequence).
%Vt# Variable binding type (where '#' is a number representing the element's position in
the sequence).
%Vv# Variable binding value (where '#' is a number representing the element's position in
the sequence).
%Vz Shows all variable bindings (Name: Value, Name: Value, Name: Value). If a
Name is missing (due to a missing MIB file), the OID is displayed instead.
CentOS /var/log/messages
Debian /var/log/syslog
Fedora /var/log/messages
FreeBSD /var/log/messages
HP-UX /var/adm/syslog/syslog.log
IBM-AIX /var/adm/ras/syslog.caa
Mac OS X /var/log/system.log
openSUSE /var/log/messages
Solaris /var/adm/messages
Ubuntu /var/log/syslog
NOTE: Only one log path can be defined in a profile. You must create multiple profiles for multiple
logs.
6. Make changes to the Criteria settings, according to your needs.
• Change Include Text.
1.
On the line with the include search text you want to change, click the Edit button: .
2. Type the new search text, and, if necessary, select Yes in the Case-sensitive drop-down list.
3. Click Save at the right of the row.
• Optional: Change Exclude Text.
1. On the line with the text you want to change in order to exclude certain alerts, click the Edit button:
.
2. Type the new exclude text, and, if necessary, select Yes in the Case-sensitive drop-down list.
3. Click Save at the right of the row.
• Change alert Level.
1.
On the line with the alert level you want to change, click the Edit button: .
2. In the Level drop-down list, select the level from among the five choices: Critical, Error, Warning,
Info, and Recovered.
3. Click Save at the right of the row.
• Add an alert.
1.
On the Criteria category header, click the Add button: .
2. Set the level, search text, and case sensitivity, and click Save at the right of the row
3. Repeat for as many alerts as you want to add.
4.
Optional: Reorder the new alert criteria using the Drag button: .
7. Click Save at the bottom of the page.
The profile is available to be assigned to a device on that device's Monitoring Detail page.
NOTE: PerfMon templates for Microsoft Server 2003 are available from ITNinja.
NOTE: Following this procedure installs one package on one device. If you want to install multiple
packages with one procedure, you can find instructions on ITNinja for using PowerShell scripts to do so.
See http://itninja.com/community/k1000-monitoring.
1. Acquire the appropriate monitoring LEP from ITNinja.
a. Go to the ITNinja KACE SMA Monitoring community page: http://itninja.com/community/k1000-
monitoring.
b. From the Downloads tab, find the package for the Performance Category with the Performance
Counters you want to probe.
You can use Search to narrow your search.
c. Click Download to download the HTM file for the package.
d. Copy the HTM file <Performance_Category>_Alerts.htm to the device you want to monitor.
2. On the Windows Server 2003 device you want to monitor, start the Performance Monitor and expand the
Performance Logs and Alerts folder.
3. Under Performance Logs and Alerts, right-click Alerts and select New Alerts Settings From . . ..
4. In the Open dialog, browse to the location of the package, select it, and click Open.
5. In the New Alert Settings dialog, confirm the package name and click OK to display the property page for
the package.
6. Accept or edit the LEP properties:
• Leave the default settings, and click OK to leave the page.
• Optional: On the General tab of the property page, add or remove counters, and revise threshold
values, if you want, then click OK. See Edit the monitoring Log Enablement Package (LEP) for a
Windows Server 2003 device.
7. In the Performance window, right-click on the package name and select Start to start the monitoring.
With the device taken care of, you move to the KACE SMA to enable the monitoring feature, create a
profile, and bind the profile to the device.
8. On the KACE SMA, enable monitoring for this device.
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Inventory.
c. Click the name of the device to display its Device Detail page.
d. Scroll down and click Monitoring under Activities to expand the section.
e. Click Enable Monitoring to start monitoring and also display details of the default monitoring
setup for the device.
Alert Task If you want to set a task to run when the alert is
triggered, you define that task on this tab.
Members of the local Administrators group All Performance Monitor features are available
Members of the Users group • Can change the Performance Monitor display
properties
• Can view log files in Performance Monitor
• Cannot create an Alert Setting
Members of the Performance Monitor Users group • Can use all features available to the Users
group
• Can view real-time logs in Performance
Monitor and alter Performance Monitor display
properties in real time
• Cannot create or modify Alert Settings
Members of the Performance Log user group • Can use all features available to the
Performance Monitor Users group
• Can create and modify Alert Settings after the
group is assigned the log on as a batch user
If you want to pause or resume multiple devices at the same time, see Pause or resume monitoring for multiple
devices.
1. Go to the Monitoring Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Monitoring, then click Devices.
c. Click the device in the Device column to display its Monitoring Detail page.
2. Select the option button for Paused and click Save.
An icon in the Status column on the Device page in the Inventory section indicates the paused status:
•
: Server monitoring is paused on this Agent-managed device.
•
: Server monitoring is paused on this Agentless-managed device.
Name A name that identifies the Maintenance Window. The name appears on the
Maintenance Windows list.
Description Information that further identifies the purpose and subjects of the window.
Add Automatically • None: This Maintenance Window is not automatically added to a device when
To monitor is enabled on that device.
• All: This Maintenance Window is automatically added to a device when monitor
is enabled on that device.
Every day/specific day from HH:MM to HH:MM Start the window daily at a specified time and for a
specific duration, or start on a designated day of the
week at a specified time.
Run on the nth of every month/specific month Run on the same day every month, or a specific
from HH:MM to HH:MM month, at the specified time and duration.
NOTE: You cannot edit the predefined Roles: Administrator, No Access, Read Only Administrator, and
User.
1. Go to the Role Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Settings, then click Roles.
c. Select Choose Action > New to display the Role Detail page.
2. In the Name field, provide a name, such as Monitoring Alert Attendant.
3. In the Description field, provide a brief description of the role, such as Used for support staff with
responsibility for responding to alerts.
This description appears on the Roles list along with the name.
4. Click the Monitoring link below Administrator Console Permissions to display the permissions settings for
server monitoring.
5. Set permissions according to the level of access you want to assign to the role:
• All Write
• All Read
• All Hide
• Custom:
Title The information that you want to appear in the Subject line of the email.
Email Recipient The email address or addresses of intended recipients. Email addresses must be
fully qualified email addresses. To send email to multiple addresses, use commas to
separate each address, or use email distribution lists.
Frequency The interval at which the appliance runs the query to compare the selected criteria
with items in inventory. If criteria are met, the notification is sent.
5. Optional: Select the check box for Send to KACE GO if you want the alert to be pushed to a mobile device
that has the KACE GO app.
Mobile device access must be enabled for this option to be available. See Configuring Mobile Device
Access.
6. Optional: To verify the criteria, click Test.
The list is refreshed to show items that match the specified criteria. Notifications are not sent during the
test.
7. Click Save.
The notification is created and it appears on the Notification Schedule page. For information about scheduling the
frequency of the notification, see Edit notification schedules.
Related topics
About notifications
Scheduling notifications
Title (Required) A brief description of the issue. You can replace the monitoring-provided
title with one of your choosing.
Submitter The login name of the user submitting the ticket. The submitter can be changed by
selecting a different login name in the drop-down list. Click to view the submitter
contact information.
Asset The asset that the information in the ticket is about. Select an asset in the drop-down
list. Click to view the asset details.
Filter on submitter Filter the asset list based on the assets that are assigned to the submitter.
assigned assets
Device The device that the information in the ticket is about. Monitoring provides this
information. Click to view the device details.
Filter on submitter Filter the asset list based on the devices that are assigned to the submitter.
assigned devices
Status The current state of the ticket. This field does not appear if you are creating or editing
a ticket from a process template.
Owner The user responsible for managing the ticket through its lifecycle.
CC List A list of users who receive a notification email when a ticket event occurs. The CC
List is emailed based on the ticket event and Ticket CC being configured for the
queue Email on Events configuration.
Related Ticket This section does not appear if you are creating a ticket from a process template.
Information
Add Ticket Click to add an additional ticket to this ticket's related information.
Referrers The Referrer is a read-only field that holds a ticket reference to any ticket that
references this ticket by way of the See also section.
Merged Tickets This section allows you to edit the list of tickets merged with this ticket, as applicable.
Any tickets that you want to merge must belong to the same queue. When you merge
tickets using the Ticket Detail page, the open ticket becomes the master ticket. All
other merged tickets are archived when you merge them. For more details, see
Merging tickets.
To add a merged ticket, click Add Tickets to Merge/Edit Merged Tickets, and
select a ticket from the list that appears.
Process This section only appears if you are creating a ticket from a process template. All
Information of the settings appearing in this section are read-only. For complete information
about creating and configuring process templates, see Add, edit, and enable process
templates
Process The name of the process template associated with this ticket.
Process Status The status of the workflow associated with this process template. For example,
Pending Approval.
Parent The name of the parent ticket, as defined in the process template associated with this
ticket.
Process A list of users that are assigned as approvers for this ticket, if applicable. The
Approvals approvers are listed in stages, as defined in the process template. Each stage can
have one or more approvers, as needed. The settings related to each approver and
stage are also listed in this section, such as approval timeouts and notifications.
When you create a process ticket, the timeout period starts for the first approver.
When that user approves the ticket, the timeout starts for the next one, and so on.
Process Activities A list of process activities, each representing a child ticket, and listed in stages, as
defined in the process template. Multiple tickets can be assigned to the same stage,
if needed. For example, if the first stage is to obtain equipment and supplies for a
new-hire, you can have several separate child tickets for ordering devices, office
equipment, and supplies, all assigned to stage 1. When you create a process ticket,
all child tickets assigned to stage 1 are created automatically. Stage 2 tickets are
created when all stage 1 tickets are closed, stage 3 tickets are created when all stage
2 tickets are closed, and so on.
Add Ticket Click to add an additional ticket to this ticket's related information.
Referrers The Referrer is a read-only field that holds a ticket reference to any ticket that
references this ticket by way of the See also section.
Comments Comments that you want to add to the ticket. You can also add file attachments,
screenshots, provide automatic responses or Knowledge Base article contents as
ticket comments. For more information see:
• Add comments to tickets
• Add or delete screenshots and attachments to Service Desk tickets
If you want to add an automatic response as a resolution to this ticket, click
Predefined Response and select a response template.
The selected response template appears in the Resolution field. You can add
multiple response templates as resolution entries. They appear in the order you
selected them.
TIP: To create or edit a response template, save your changes and click
Manage. This will take you to the Response Templates page. For more
information about response templates, see View and edit response templates.
Knowledge Base Look up a Knowledge Base article and append its contents to the ticket comments.
Article For more information about Knowledge Base articles, see Managing Knowledge Base
articles.
Related topics
Managing Service Desk tickets, processes, and reports
Filter alerts using the Include Text and Exclude Text capability
from the Profile Details page
You can filter the alerts you receive based on the message text and severity level.
You can use Exclude Text to filter whole categories of alerts, or use Exclude Text in conjunction with Include Text
to refine a subset of an alert category.
NOTE: The criteria match text, for example, error, is matched in Windows event logs against both the
severity level and the message itself.
1. Go to the Profiles list page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Monitoring, then click Profiles.
2. Select the check box for the existing profile that you want to edit, and select Choose Action > Edit to
display the Profile Detail page.
3. Make changes to the include and exclude Criteria settings, as needed.
• Change Include Text.
1.
On the line with the include search text you want to change, click the Edit button: .
2. Type the new search text.
• Change Exclude Text.
1. On the line with the text you want to change in order to exclude certain alerts, click the Edit button:
.
2. Type the new exclude text.
• If necessary, select Yes in the Case-sensitive drop-down list.
• Add an alert Criteria.
1.
On the Criteria category header, click the Add button: .
2. Set the level, include text, exclude text, and case sensitivity.
4. Click Save at the bottom of the page.
5. Click Save.
The profile that generated the alert is modified with this exclude information.
Related topics
Examples of Include Text and Exclude Text for monitoring profiles
Filter alerts using the Include Text and Exclude Text capability from the Profile Details page
Examples of using Include Text and Exclude Text in conjunction to refine the alert output
Example A: String as exclude text
In this example, you are not interested in receiving alerts for disk errors about fragmented disks from a particular
drive mount point, but you want all other errors to come through.
NOTE: Include Text does not recognize line breaks within the text box. This means that if you entered
code 5
code 7
NOTE: the search would look for matches for code 5code 7. In this case you should use Add to create a
separate line for the second inclusion.
NOTE: However, Exclude Text does recognize line breaks within the text box. This means that if you
entered
code 5
code 7
NOTE: the search would look for matches for code 5 together with code 7. In this case you do not need
to use Add to create a separate line for the second exclusion.
Character Description
` back tick
\ backslash
Dismiss an alert
When you have dealt with an alert, you can dismiss it so that it does not appear in the lists of active alerts.
Dismissing an alert does not remove it from the database. If you want to delete the alert from the database, see
Delete alerts.
1. Go to the Monitoring Alerts list page in one of the following ways:
• If you have the Monitoring Alerts widget installed on your open Dashboard, click Monitoring Alerts.
• In the left navigation bar, select Monitoring > Alerts.
2. Select the check box for the row that contains the alert message, then select Choose Action > Dismiss.
The alert list no longer displays the alert.
Related topic
Retrieve and review alerts that have been dismissed from the alerts list
Delete alerts
After you have dealt satisfactorily with an alert, you can delete it from the database.
1. Go to the Monitoring Alerts list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Monitoring.
2. Select the check box next to one or more alerts.
3. Select Choose Action > Delete, then click Yes to confirm.
System requirements
To use the Service Desk, you must have a KACE SMA, an email server, and user account information.
• KACE SMA requirements: To use Service Desk, you must have a KACE Systems Management Appliance
(SMA) set up and configured. See information on setting up the appliance server in Configuring the
appliance.
• Email server requirements: You must have one of the following types of email servers for sending and
receiving Service Desk email:
◦ A POP3 email server. See About POP3 email accounts.
◦ An email server, such as the Microsoft Exchange Server. For instructions on configuring this server to
connect to the KACE SMA, see Configuring SMTP email servers.
• User account information: User account information can be stored in an LDAP-compliant directory service
such as Microsoft Active Directory. Storing user account information allows Service Desk to efficiently
find and import data that it uses to authorize users and identify anything else that you want to track. You
can filter groups of users or other entities by referencing their LDAP attributes, such as organizational
units, domain components, and relative distinguished names. See Configuring user accounts, LDAP
authentication, and SSO.
If your organization is small, you can eliminate this requirement by creating the required user account information
manually, one user at a time. For more information about creating users manually, see Setting up Service Desk.
Enabled Whether the SLA is enabled for the priority. Select the check box to enable the SLA,
clear the check box to disable it.
NOTE: If the Service Level Agreement is enabled for a Priority, the ticket due
date is calculated automatically based on the Resolution Time defined for that
priority. Any user who has Modify Permission on the DUE_DATE field is able
to override this automatically calculated date.
Resolution Time The time, in hours or minutes, for the enabled priority. This time period is used to
automatically calculate a ticket's due date and time based on the date and time the
ticket is submitted.
Use Business Whether to use the configured business hours and holidays when calculating ticket
Hours/Holidays due dates for each priority. Select the check boxes to use these settings. See
Configuring Service Desk business hours and holidays.
Notification The time, in hours or minutes, for email notifications to be sent. A recurring email
Recurrence notification is sent when a ticket has passed its due date and is not yet resolved. The
email is sent to the users specified in the SLA Violation email event, if configured in
the Email on Events section. See Configuring email triggers and email templates.
NOTE: To send a single email notification with no recurrence, enter 0.
4. Click Save.
Name The name of the Service Desk queue. This name appears in the From field when
users receive email messages from the Service Desk.
Email Address A fully qualified email address for the server. Users typically do not reply to this
address.
If you want to allow users to reply to KACE SMA email, specify an email address in
the Alternate Email Address field.
NOTE: As a valid email address, this address is subject to the same spam and
security vulnerabilities as any other email address.
3. Optional: Configure the SMTP/ POP3 server settings. Click Configure Queue Email Settings and specify
the SMTP/POP3 options on the Service Desk Queue Email Settings page, as required. See Configure
queue-specific email settings.
4. Click Save to create the queue and configure additional settings.
5. Specify User Preferences:
Field Description
Allow all users as Allow anyone who is a user on the KACE SMA to submit tickets through this Service
submitters Desk queue.
Restrict Select submitters by label only. Available only when Allow all users as submitters
Submitters by is not selected.
Label
Allow all users as Allow users on the appliance to approve tickets through this Service Desk queue.
approvers
Restrict Select approvers by label only. Available only when Allow all users as approvers is
Approvers by not selected.
Label
Owner Label If you want to enable all users to have the ability to approve tickets, select Allow all
users as approvers.
Identify the users who are allowed to own and manage tickets — typically, your IT
staff. You must have a Ticket Owner who is responsible for managing the ticket
through its life cycle.
To do that, click Manage Associated Labels. In the Select Labels dialog box that
appears, select one or more labels associated with the users that you want to select
as Ticket Owners. Close the dialog box.
Allow ticket Allow ticket owners and administrators to delete tickets. This setting is useful if you do
deletion not want staff to delete tickets. You can periodically select this check box to clean out
old tickets, then clear it again to prevent ticket deletion.
Allow parent Enable the system to automatically close child tickets when parent tickets are closed.
ticket to close
child tickets
Allow users with Grant read and write permissions to all users who are assigned to the Administrator
an Administrator role.
role to read
Default ticket Automatically select the Owners Only check box when comments are added to
owner comments tickets.
to Owners Only
visibility
Enable ticket Display a dialog, to administrators and ticket owners, that summarizes conflicts
conflict warning between the changes they are submitting and the changes submitted concurrently by
for ticket owners other users. When administrators and ticket owners click Save or Apply Changes
on the Ticket Detail page, the dialog appears if other users have edited and saved
the ticket while it was open for editing. This enables administrators and ticket owners
to choose whether to discard their changes, or overwrite the changes made by other
users if there are conflicts.
NOTE: By default, this warning is enabled on new queues and disabled on
queues that were created in KACE SMA version 6.3 or earlier.
The dialog is displayed only if other users have modified the ticket, and it is displayed
to administrators and ticket owners only. The dialog is not displayed to other users.
NOTE: The dialog summarizes all changes made by other users. However,
the current user's changes are summarized only if they conflict with changes
made by other users.
Allow managers Enable manager accounts to view and edit comments in the tickets submitted by their
to view and employees. For more information, see View ticket comments.
comment on their
employee's tickets
Allow Ticket CC Allow the users on the ticket CC list to add comments to the ticket.
list to view and
comment on the
ticket
Add any user Add any users that comment on a ticket to a CC list for that ticket, allowing them to be
to Ticket CC notified by email about further changes to the ticket.
list when they
comment on a
ticket
All users can Allow all users to edit or remove their own comments, including file attachments.
edit/delete their
own comments
(including
attachments)
User Label To allow specific users to edit or delete their own comments and attachments using
labels, click Manage Associated Labels. In the Select Labels dialog box that
appears, select one or more labels associated with the users that you want to select.
Close the dialog box.
All technicians Allow all technicians to edit or remove comments added by others, including file
can edit/delete attachments.
comments
entered by
others (including
attachments)
Technician Label To allow specific technicians to edit or delete their own comments and attachments
using labels, click Manage Associated Labels. In the Select Labels dialog box that
appears, select one or more labels associated with the technicians that you want to
select. Close the dialog box.
6. In the Archive Preferences section, select settings for ticket archival. Click the Settings link to enable ticket
archival.
NOTE: If Ticket Archival is turned off, see Enable ticket archival.
Option Description
Archive closed tickets older than The age of tickets to be archived. For example, if
you select 3 months, tickets are archived when
three months have passed since the tickets were
opened. To prevent tickets in the queue from being
archived, select Never. Archived tickets can be
restored to the queue if necessary. See Restore
archived tickets.
Delete archived tickets older than The age of tickets to be permanently removed from
the archive. For example, if you select 6 months,
archived tickets are deleted from the archive when
six months have passed since the tickets were
opened. To prevent tickets in the queue from being
deleted from the archive, select Never. Deleted
tickets cannot be restored to the queue.
7. In the Ticket Defaults section, select the default values for new tickets. For example:
◦ Category: Software
◦ Status: New
◦ Impact: 1 person cannot work
◦ Priority: Medium
NOTE: If any of these fields are marked as Required in the Customize Fields and Layout page, the
default value is ignored and users are required to select a value from the drop-down list.
8. In the Email on Events section, select the categories of users who will receive email when the specified
events occur. Each column represents a type of Service Desk user (role) and each row represents a ticket
event. See Configure email triggers.
9. Optional: Configure Service Level Agreement Settings. Here you can enable Service Level Agreement
(SLA) settings based on the ticket priority. When enabled, the due date of the ticket automatically takes into
account the resolution time, business hours, and holidays. See Configuring Service Level Agreements.
10. In the Ticket Rules section, enable the rules to apply to tickets in the queue. You can use any of the pre-
defined rules or customize your own. See Using Ticket Rules for more information about how to use and
customize ticket rules.
11. Click Save.
Name The name of the Service Desk queue. This name appears in the From field when
users receive email messages from the Service Desk.
4. If you want to use a POP3 server for incoming email associated with this queue, use the settings in the
POP3 Setting section.
a. Select the Use POP3 server for inbound emails check box.
b. Specify the following options:
Option Description
POP3 Server Enter the name of the POP3 server you want to use for the queue. For example,
pop.gmail.com.
Use SSL Select this option if you want the POP3 server to use a secure connection.
POP3 Username Enter the username and password of an account that has access to the POP3 server.
(email address)
POP3 Password
SMTP Server Specify the hostname or IP address of an external SMTP server, such as
smtp.gmail.com. External SMTP servers must allow anonymous (non-authenticated)
outbound email transport. Ensure that your network policies allow the appliance to
contact the SMTP server directly. In addition, the mail server must be configured to
allow the relaying of email from the appliance without authentication.
SMTP Port Enter the port number to use for the external SMTP server. For standard SMTP, use
port 25. For secure SMTP, use port 587.
SMTP Username Enter the username of an account that has access to the external SMTP server, such
as your_account_name@gmail.com.
6. On the Service Desk Queue Email Settings page, in the Email on Events section, select the options for
sending email when the specified events occur. Each column represents a type of Service Desk user (role)
and each row represents a ticket event.
Service Desk user (role) Description
Approver The person who can approve or reject the ticket for
processing.
When a ticket event occurs, email is sent to the selected roles or users. For example, if you select the Any
Change box in the Owner column, email is sent to the ticket owner whenever the ticket is changed. For the
Comment and Ticket Closed triggers, email is sent immediately. For other ticket changes, however, email is
sent every few minutes to prevent email overload.
NOTE: If users have the KACE GO mobile app installed on their smart phone or tablet, the system
sends push notifications for the selected Service Desk ticket events.
Option Description
SLA Violation The ticket has not been resolved by its due date.
New Ticket Via Email A user sends an email message to the Service Desk
and a ticket is created.
New Ticket Via Portal A ticket is created through the User Console.
7. Click Save.
The appliance is configured to forward email to the designated SMTP server. If you have multiple queues,
repeat the preceding steps for each queue.
Main Tab The text that appears on the component-level tab in the Administrator Console
and on the tab in the User Console. The default is Service Desk. However, if you
upgraded from an earlier version of the appliance, you might see Help Desk as the
default.
Queue The text that you want to display instead of Queue and Queues on the Service Desk
Queues Configuration page and on the Queue list in the Administrator Console. This text
also appears as an option in the Choose Action menu and as a heading on the Ticket
page in the User Console.
Ticket The text that you want to display instead of Ticket and Tickets on the Ticket tab and
Tickets Ticket page in the Administrator Console. This text also appears on the Ticket page in
the User Console.
Process The text that you want to display instead of Process and Processes on the Service
Processes Desk Configuration page and on the Process list in the Administrator Console.
3. Click Save.
Field Description
3. Click Save.
NOTE: Those queue owners who do not have access to the Queues configuration pages can access
the Response Templates page by clicking the Manage link that appears just above the Predefined
Response option in the Ticket Detail page.
2. Specify the following settings:
Field Description
Name The name of the response template. This name appears available for selection in the
Predefined Response field when you want to configure an automated response to
applicable Service Desk tickets.
Make Public Select this check box if you want to make this response template available for
selection to other users. Other users can view the contents of public response
templates, but cannot edit them.
Template The contents of the response message. This field supports plain text and tokens.
Category • Software
• Hardware
• Network
• Other (default)
Priority • High
• Medium (default)
• Low
Name The text that appears in the drop-down list. By default, this text is Please select a
category: This instructs users to select the category of the ticket.
CC List Select none to prevent the CC List from being displayed on tickets. Because
DefaultTicketOwners is the default owner, all potential ticket owners receive email
notifications when a ticket is created.
User Settable Make this category visible to users. When cleared, the appliance allows only the
Service Desk staff users to see this category.
Use this setting to present a simplified list of values to users and to provide a
comprehensive list to your administrators and Service Desk staff. Users might see
these categories as their tickets are processed, but they cannot set or change them.
6. Click Save.
NOTE: You can add ticket categories at any time. See Create ticket categories and subcategories.
7.
For the remaining categories in Category Values, click the Edit button: .
8. Make the following changes:
a. In the Default Owner column, select DefaultTicketOwners to make this user account the default
owner of all of these categories.
For more information about this account, see Create the DefaultTicketOwners account.
b. Remove anything in the CC List.
c. Click Save.
9. Create additional status values:
a.
In the Status Values section, click the Add button: .
The editable fields appear for the new value.
b. In the Name column, type Waiting on end user, then in the State column, select Stalled.
c. Click Save.
d.
In the Status Values section, click the Add button: .
e. In the Name column, type Waiting on Service Desk Staff, then in the State column, select
Stalled, then click Save .
f.
In the Status Values section, click the Add button: .
g. In the Name column, type Reopened, then in the State column, select Opened, then click Save.
NOTE: Only tickets with an Opened state can be escalated. See Using the ticket escalation
process.
10. Create a Critical priority with an escalation time of 15 minutes:
a.
In the Priority Values section, click the Add button: .
Change the User Console logo and text at the System level
If the Organization component is enabled on your appliance, you can change the title, welcome text, and logo of
the User Console at the System level.
The logos selected at the System level are used for every organization unless you configure the organization
settings separately at the Admin level. See Change the User Console logo and login text at the Admin-level.
1. Go to the System-level General Settings page:
a. Log in to the KACE SMA System Administration Console, http://KACE_SMA_hostname/
system, or select System from the drop-down list in the top-right corner of the page.
b. On the left navigation bar, click Settings.
c. On the Control Panel, click General Settings.
2. In the User Console section, customize the text in the following fields:
Option Description
Title The heading that appears on the User Console login page.
Welcome Message A welcome note or description of the User Console. This text appears following the
title on the User Console login page.
User Console The logo or other graphic displayed at the top of the User Console. Follow these
guidelines for graphics:
• 224 pixels wide by 50 pixels high is the default size.
• 104 pixels wide by 50 pixels high stays inside the blue highlight around the Log
Out link.
• 300 pixels wide by 75 pixels high is the maximum size that does not impact the
layout.
Report The logo or other graphic displayed at the top of each report.
Change the User Console logo and login text at the Admin-level
You can change the title, welcome text, and logo of the User Console to match your company's branding needs.
If the Organization component is enabled on your appliance, you can specify custom logos at the Admin
(organization) level as well as the System level. Admin-level logo settings, however, take precedence over
System-level logo settings, which enables you to specify different logos for each organization. If you do not select
a custom logo for an organization, the System-level setting is used. See Change the User Console logo and text
at the System level.
1. Go to the Admin-level General Settings page:
Option Description
Title The heading that appears on the User Console login page.
Welcome Message A welcome note or description of the User Console. This text appears following the
title on the User Console login page.
User Console The logo or other graphic displayed at the top of the User Console. Follow these
guidelines for graphics:
• 224 pixels wide by 50 pixels high is the default size.
• 104 pixels wide by 50 pixels high stays inside the blue highlight around the Log
Out link.
• 300 pixels wide by 75 pixels high is the maximum size that does not impact the
layout.
Report The logo or other graphic displayed at the top of each report.
Display Quick Actions Show or hide the quick-action links that appear on the User Console
download page. Text for these links includes:
• Ticket Quick Action
• Ticket Quick Action: Have a problem? Report it
• Downloads Page Quick
Action • Downloads Page Quick Action: Want software? Go to the
Downloads page
3. Click Save.
Quick Actions and widgets are shown or hidden on the User Console home page immediately. If users are
logged in and viewing the User Console home page, the link is displayed when the page is refreshed.
NOTE: Widgets are empty until announcements, links, or Knowledge Base articles are added.
Add announcements, links, and Knowledge Base articles. See:
• Add, edit, hide, or delete User Console announcements
• Add, edit, or delete custom links on the User Console home page
• Add, edit, or duplicate Knowledge Base articles
NOTE: The first 140 characters of each announcement are displayed on the User Console home
page. If announcements exceed 140 characters, a Show More link enables users to read the entire
announcement.
1. Go to the User Console Announcements page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
Message Title (Required) The title you want to use for the Announcement.
NOTE: Links cannot be used in the Message Title field.
Message Body (Optional) Any additional information you want to display, including links. This
information appears below the title.
When creating links for announcement messages, use any of these formats:
• http://example.com
• https://example.com
• http://www.example.com
• www.example.com
Hidden (Optional) Whether to show or hide the announcement on the User Console home
page. This action is useful when you have messages that you want to show or hide
periodically, such as announcements about system status or planned maintenance.
Select the check box to hide the announcement. Clear the check box to show the
announcement.
Assigned to (Optional) The user labels to which the announcement applies. If you select a label,
Labels the announcement is displayed to users only if the label is applied to their user
account. This action is useful if you want to display announcements to groups of
users, such as users located in different geographic locations, and you have created
and applied labels for those users.
c. Click Save.
If the Announcements widget is enabled for Service Desk, the Announcement appears on the
User Console Home page according to the settings you selected.
3. To edit an announcement, click Edit under the announcement title, then click Save.
The changes appear on the User Console home page immediately. If users are logged in and viewing the
User Console home page, the announcement is deleted when the page is refreshed.
4. To hide an announcement:
a. Click Edit under the announcement title.
b. Select the check box next to Hidden.
c. Click Save.
The announcement is hidden from the User Console home page immediately. If users are logged in and
viewing the User Console home page, the announcement is hidden when the page is refreshed.
5. To change the priority of an announcement, use the drag icon on the left side of the announcement. See
Prioritize User Console announcements or mark an announcement as urgent.
The announcement is hidden from the User Console home page immediately. If users are logged in and
viewing the User Console home page, the announcement is hidden when the page is refreshed.
6. To delete an announcement, click Delete under the announcement title, then click Yes in the confirmation
window.
NOTE: Only one announcement can appear in the Urgent Announcement banner at a time.
◦ To change the urgent announcement, drag a different announcement into the Urgent Announcement
box.
◦ To change an urgent announcement to a regular announcement, drag it out of the Urgent
Announcement box.
The announcements are prioritized accordingly on the User Console home page immediately. If users are
logged in and viewing the User Console home page, the announcement priority is updated when the page
is refreshed.
Title The text to display as the link text. You can use the URL itself, or any text string.
NOTE: You cannot use the same URL in more than one link.
c. Click Save at the right of the URL field, then click Save at the bottom of the page.
The link appears on the User Console home page immediately. If users are logged in and
viewing the User Console home page, the link is displayed when the page is refreshed.
3. To edit a link:
a.
Click .
b. Change the Title or URL as needed.
c. Click Save at the right of the URL field, then click Save at the bottom of the page.
The change appears on the User Console home page immediately. If users are logged in and viewing the
User Console home page, the link is displayed when the page is refreshed.
4. To change the order in which links are displayed on the User Console home page:
a. Drag the link up or down in the list using .
b. Click Save at the bottom of the page.
The change appears on the User Console home page immediately. If users are logged in and viewing the
User Console home page, the link order is changed when the page is refreshed.
5. To delete a link:
a.
Click .
b. In the dialog window, click Yes.
c. Click Save at the right of the URL field, then click Save at the bottom of the page.
The link is deleted from the User Console home page immediately. If users are logged in and
viewing the User Console home page, the link is deleted when the page is refreshed.
Widget Description
Shortcuts This widget contains links to common Service Desk actions. Use them to quickly
initiate specific tasks, such as creating a new KB (Knowledge Base) article,
scheduling a report, and so on.
Views This widget contains links to common Service Desk pages and wizards, including
any custom views that you created. Use them to quickly navigate to specific pages,
such as My Recent Tickets, All Unassigned Tickets, and Tickets Due Today. It
also displays link to custom views, as applicable. The list of custom views is sorted
alphabetically. If you want the custom views to appear in a specific order, you can
prefix their names with numbers, as needed.
Reports This widget contains links to common Service Desk reports. Use them to quickly
generate a specific report, such as Open Tickets last 7 days by Owner, Stalled/Open
Tickets by Owner, and others.
Tickets Opened This widget contains the number of Service Desk tickets that were opened today.
Today
Active Tickets By These widgets display the numbers of active, closed, overdue, overdue today,
Owner due, due today, or reopened Service Desk tickets grouped by any of the following
parameters:
Active Tickets By • Category
Category
• Priority
Active Tickets By • Owner
Priority
• Queue
Overdue Tickets By
Owner
Overdue Tickets
Today
Reopened Tickets
Average Ticket This widget displays the average ticket resolution times by any of the following
Resolution Time categories:
• Category
• Priority
• Owner
• Queue
• Month
The resulting data can appear in a Bar Chart or a Donut Chart.
To change the widget title, choose how you want to group the tickets, or select the
chart type, click in the widget. In the dialog box that appears, make your edits and
click Save.
Tickets Overdue This widget displays the number of Service Desk tickets that are currently overdue.
Submitter The login name of the user submitting the ticket. To change the submitter, select a
different login name in the drop-down list.
Attachments Files that you want to add to the ticket. You can paste up to five files. See Add or
delete screenshots and attachments to Service Desk tickets.
Screenshots Screenshots that you want to add to the ticket. You can paste up to five screenshots
to a ticket. See Add or delete screenshots and attachments to Service Desk tickets
This field includes a full range of text editing options for formatting your content, such
as buttons for bold text, hyperlinks, lists, or text color.
For example:
• To apply bold text to a text string, select it in the editor, and click .
• To add images, click , and provide the URL to the image file.
• To add external links, click .
• To embed externally hosted videos, click .
Submitter The login name of the user submitting the ticket. The submitter can be changed by
selecting a different login name in the drop-down list. To view the submitter contact
information, click .
If you are creating or editing a child ticket from a process template, you also have an
option to set this field to the Parent Owner or the Parent Submitter of the associated
parent ticket.
Asset The asset that the information in the ticket is about. Select an asset in the drop-down
list. To view the asset details, click .
Filter on submitter Filter the asset list based on the assets that are assigned to the submitter. This check
assigned assets box is selected by default.
Device The device that the information in the ticket is about. If any devices are assigned to
the ticket submitter, they are listed here, with the submitter's primary device selected
by default.
Select a device in the drop-down list, as needed. To view the device details, click .
Filter on submitter Filter the device list based on the devices that are assigned to the submitter. If any
assigned devices devices are assigned to the ticket submitter, this option appears selected by default
on this page. However, when you open this ticket on the Ticket Detail page, this
option is not selected, and the Device field shows the device selected when the
ticket was first created. This is default behavior. Leaving this check box cleared
prevents you from accidentally selecting a device that may not be related to the issue
associated with the ticket.
Status The current state of the ticket. This field does not appear if you are creating or editing
a ticket from a process template.
Owner The user responsible for managing the ticket through its lifecycle.
If you are creating or editing a child ticket from a process template, you also have an
option to set this field to the Parent Owner or the Parent Submitter of the associated
parent ticket.
CC List A list of users who receive a notification email when a ticket event occurs. The CC
List is emailed based on the ticket event and Ticket CC being configured for the
queue Email on Events configuration.
Predefined If you want to add an automatic response as a resolution to this ticket, click
Response Predefined Response and select a response template.
The selected response template appears in the Resolution field. You can add
multiple response templates as resolution entries. They appear in the order you
selected them.
TIP: To create or edit a response template, save your changes and click
Manage. This will take you to the Response Templates page. For more
information about response templates, see View and edit response templates.
Related Ticket This section does not appear if you are creating a ticket from a process template.
Information
Add Ticket Click to add an additional ticket to this ticket's related information.
Referrers The Referrer is a read-only field that holds a ticket reference to any ticket that
references this ticket by way of the See also section.
Merged Tickets This section allows you to edit the list of tickets merged with this ticket, as applicable.
Any tickets that you want to merge must belong to the same queue. When you merge
tickets using the Ticket Detail page, the open ticket becomes the master ticket. All
other merged tickets are archived when you merge them. For more details, see
Merging tickets.
To add a merged ticket, click Add Tickets to Merge/Edit Merged Tickets, and
select a ticket from the list that appears.
Process This section only appears if you are creating a ticket from a process template. All
Information of the settings appearing in this section are read-only. For complete information
about creating and configuring process templates, see Add, edit, and enable process
templates.
Process The name of the process template associated with this ticket.
Process Type The type of the process. In a default installation, only the Service Desk and Software
Request: Approval Required process types are included. You can create new process
types, as required. For example, you can create a process type for accessing a
specific application, or a group of applications. For more information, see Define
process types.
Process Status The status of the workflow associated with this process template. For example,
Pending Approval.
Parent The name of the parent ticket, as defined in the process template associated with this
ticket.
Process A list of users that are assigned as approvers for this ticket, if applicable.
Approvals
• If all approvals for the ticket are received, this section appears collapsed by
default. To review them, click Expand.
• If one or more approvals are pending for this ticket, this section is displayed. To
hide it, click Collapse.
The approvers are listed in stages, as defined in the process template. Each stage
can have one or more approvers, as needed. The settings related to each approver
and stage are also listed in this section, such as approval timeouts and notifications.
When you create a process ticket, the timeout period starts for the first approver.
When that user approves the ticket, the timeout starts for the next one, and so on.
If the process template associated with this process indicates that the ticket
submitter's manager is an approver for one or more stages, and the logged-on user
has a manager's account associated with it, the manager's user name appears in the
list.
If the logged on user account is not associated with a manager, and the associated
process template specifies that the submitter's manager must approve the related
process tickets, an error is displayed when you attempt to save the ticket. However,
if the submitter's managers is just one of the approvers, the Process Approvals
section lists the other approvers, and you can save the ticket without any errors being
displayed.
Process Activities A list of process activities, each representing a child ticket, and listed in stages, as
defined in the process template. Multiple tickets can be assigned to the same stage,
if needed. For example, if the first stage is to obtain equipment and supplies for a
new-hire, you can have several separate child tickets for ordering devices, office
equipment, and supplies, all assigned to stage 1. When you create a process ticket,
all child tickets assigned to stage 1 are created automatically. Stage 2 tickets are
created when all stage 1 tickets are closed, stage 3 tickets are created when all stage
2 tickets are closed, and so on. If any of the approvals times out, none of the child
tickets related to that or any subsequent stages are created.
Add Ticket Click to add an additional ticket to this ticket's related information.
Referrers The Referrer is a read-only field that holds a ticket reference to any ticket that
references this ticket by way of the See also section.
Comments Comments that you want to add to the ticket. You can also add file attachments,
screenshots, provide automatic responses or Knowledge Base article contents as
ticket comments. For more information see:
• Add comments to tickets
• Add or delete screenshots and attachments to Service Desk tickets
If you want to add an automatic response as a resolution to this ticket, click
Predefined Response and select a response template.
The selected response template appears in the Resolution field. You can add
multiple response templates as resolution entries. They appear in the order you
selected them.
TIP: To create or edit a response template, save your changes and click
Manage. This will take you to the Response Templates page. For more
information about response templates, see View and edit response templates.
Knowledge Base Look up a Knowledge Base article and append its contents to the ticket comments.
Article For more information about Knowledge Base articles, see Managing Knowledge Base
articles.
NOTE: If a different user has modified a field, such as Category and you have not modified that
field, the change appears in the Modified! section. The Your Changes column displays - -, which
indicates that you have not modified the content, and the other user's changes will be preserved.
◦ Click Overwrite Conflicts to save changes you have made to the ticket. For any changes marked as
Conflict!, your changes overwrite the changes made by other users.
◦ Click Cancel to return to the Ticket Detail page and continue editing the ticket.
Title (Required) A brief description of the issue. You can replace the monitoring-provided
title with one of your choosing.
Submitter The login name of the user submitting the ticket. The submitter can be changed by
selecting a different login name in the drop-down list. Click to view the submitter
contact information.
Asset The asset that the information in the ticket is about. Select an asset in the drop-down
list. Click to view the asset details.
Filter on submitter Filter the asset list based on the assets that are assigned to the submitter.
assigned assets
Device The device that the information in the ticket is about. Monitoring provides this
information. Click to view the device details.
Filter on submitter Filter the asset list based on the devices that are assigned to the submitter.
assigned devices
Status The current state of the ticket. This field does not appear if you are creating or editing
a ticket from a process template.
Owner The user responsible for managing the ticket through its lifecycle.
CC List A list of users who receive a notification email when a ticket event occurs. The CC
List is emailed based on the ticket event and Ticket CC being configured for the
queue Email on Events configuration.
Related Ticket This section does not appear if you are creating a ticket from a process template.
Information
Add Ticket Click to add an additional ticket to this ticket's related information.
Referrers The Referrer is a read-only field that holds a ticket reference to any ticket that
references this ticket by way of the See also section.
Merged Tickets This section allows you to edit the list of tickets merged with this ticket, as applicable.
Any tickets that you want to merge must belong to the same queue. When you merge
tickets using the Ticket Detail page, the open ticket becomes the master ticket. All
other merged tickets are archived when you merge them. For more details, see
Merging tickets.
To add a merged ticket, click Add Tickets to Merge/Edit Merged Tickets, and
select a ticket from the list that appears.
Process This section only appears if you are creating a ticket from a process template. All
Information of the settings appearing in this section are read-only. For complete information
about creating and configuring process templates, see Add, edit, and enable process
templates
Process The name of the process template associated with this ticket.
Process Status The status of the workflow associated with this process template. For example,
Pending Approval.
Parent The name of the parent ticket, as defined in the process template associated with this
ticket.
Process A list of users that are assigned as approvers for this ticket, if applicable. The
Approvals approvers are listed in stages, as defined in the process template. Each stage can
have one or more approvers, as needed. The settings related to each approver and
stage are also listed in this section, such as approval timeouts and notifications.
When you create a process ticket, the timeout period starts for the first approver.
When that user approves the ticket, the timeout starts for the next one, and so on.
Process Activities A list of process activities, each representing a child ticket, and listed in stages, as
defined in the process template. Multiple tickets can be assigned to the same stage,
if needed. For example, if the first stage is to obtain equipment and supplies for a
new-hire, you can have several separate child tickets for ordering devices, office
equipment, and supplies, all assigned to stage 1. When you create a process ticket,
all child tickets assigned to stage 1 are created automatically. Stage 2 tickets are
created when all stage 1 tickets are closed, stage 3 tickets are created when all stage
2 tickets are closed, and so on.
Add Ticket Click to add an additional ticket to this ticket's related information.
Referrers The Referrer is a read-only field that holds a ticket reference to any ticket that
references this ticket by way of the See also section.
Comments Comments that you want to add to the ticket. You can also add file attachments,
screenshots, provide automatic responses or Knowledge Base article contents as
ticket comments. For more information see:
• Add comments to tickets
• Add or delete screenshots and attachments to Service Desk tickets
If you want to add an automatic response as a resolution to this ticket, click
Predefined Response and select a response template.
The selected response template appears in the Resolution field. You can add
multiple response templates as resolution entries. They appear in the order you
selected them.
TIP: To create or edit a response template, save your changes and click
Manage. This will take you to the Response Templates page. For more
information about response templates, see View and edit response templates.
Knowledge Base Look up a Knowledge Base article and append its contents to the ticket comments.
Article For more information about Knowledge Base articles, see Managing Knowledge Base
articles.
Related topics
Managing Service Desk tickets, processes, and reports
Field Description
@due_date A due date. The date can be in any format. For example, 4/3/2014, April 3, 2014, or
next Thursday.
@resolution A resolution.
@submitter The submitter's username, full name, or email address. The email address is used for
the username and email address fields. The full name is set to the Name portion of
the email address. For example, name@domain.com.
Field Description
@approval Modify the ticket. Use one of the following: Approved, Rejected, None, or More
Information Needed.
@approver Change the ticket approver. Enter a username from the ticket approval label. For
instructions on setting up the label of approvers, see Using ticket approvers.
Date The date work begins. To change the date, click in the date field and select a different
date. To remove the date, click Clear.
Adjustment The amount of time to add or subtract to the hours logged. This can be useful for
billing and tracking purposes. For example, work on a ticket might start at 08:00 and
end at 12:00. However, the actual time an administrator spent working on the ticket
might be 2 hours. You could enter -2.0 in this field to accurately report the actual time
spent.
Group View
My Tickets by NOTE: This option is only displayed when viewing a specific queue.
Status
My New Tickets
My Opened Tickets
My Closed Tickets
My Need More Info Tickets
All Tickets by NOTE: This option is only displayed when viewing a specific queue.
Status
All New Tickets
All Opened Tickets
All Closed Tickets
All Need More Info Tickets
NOTE: Administrators can turn off this feature on the Queue Settings page.
My Employee Tickets: Opened
My Employee Tickets: Stalled
My Employee Tickets: Closed
My Employee Tickets: Not Closed
Set the custom view as the default. See Set a view as the default view for tickets.
3. Specify the criteria to use for the custom view. For example, you could create a custom view that shows
open tickets with the priority of High.
4. Click Test to confirm the results.
5. Click Create to save the custom view.
Set the custom view as the default. See Set a view as the default view for tickets.
TIP: To create or edit a response template, save your changes and click Manage. This will take
you to the Response Templates page.
For more information about response templates, see View and edit response templates.
8. If you want to add the contents of a Knowledge Base article as a comment to this ticket, click Knowledge
Base Article and select an applicable topic.
The selected article contents appear in the Comments field.
NOTE: The paste screenshot feature is hidden if you are using an earlier or unsupported browser.
However, you can still attach screenshots to tickets as files.
To attach files you must be able to browse to the files from the Administrator Console. You can attach files that
are up to 8 MB in size.
1. With the content you want to capture visible, do one of the following to save a screenshot to your
computer's clipboard:
◦ On Windows, press the Prnt Scrn or Print Screen key.
◦ On Mac, hold the following keys: Command, Shift, and 3.
The screenshot is copied to your computer's clipboard.
2. Go to the Service Desk Ticket Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Service Desk, then click Tickets.
Merging tickets
If you have a number of related tickets that are still active, instead of managing them separately, you can merge
them into a single ticket and manage that one ticket without losing ticket trail of all the merged tickets.
NOTE: Ticket escalation and Service Level Agreements are two separate notification activities. Ticket
escalation notifications are based on the duration a ticket has been opened for, while Service Level
Agreement notifications are based on the due date of a ticket. Ticket escalation does not consider
Business Hours and Holidays.
NOTE: Using the default settings, tickets must have a priority of High and a status of Opened to be
escalated.
Name A name that describes the overall process, for example, New Hire, Employee
Termination, or Office Move.
Description A description of the process. For longer descriptions, this field expands automatically,
as you type.
HTML/Markdown An indicator of whether the description contains rich text. Some process descriptions
can be longer than others, so formatting specific text elements can improve the
overall readability and help the end user better understand the process. You can
use the Markdown project syntax to format the contents of the Description box. For
example:
<h1> Before you proceed:</h1>
<h1><ol>
<li>Ensure the new employee acquisition
process is finalized by HR.
<li>Ensure the Badge ID exists for the
new employee<br><br>
<b>If you do not have a Badge ID,
contact HR.</b>
</ol></h1>
For more information about the Markdown syntax, visit http://daringfireball.net/
projects/markdown/syntax.
Process Type The type of the process. In a default installation, only the Service Request and
Software Request: Approval Required process types are included. You can create
new process types, as required. For example, you can create a process type for
accessing a specific application, or a group of applications. For more information, see
Define process types.
Option Description
Approval Step
Approval Step 1 One or more ticket approvers. You can edit the list of approvers, as
required.
• New process templates. This field appears blank.
• Existing process templates. If one or more approvers are already
defined in the process template, they are listed in this field.
Approval Options
Approval Timeout Period The amount of time each ticket approver has to approve or decline a ticket
that is based on this process template.
Approval Timeout period does not span over multiple approval steps. For
example, if a process has two approval steps and the approval timeout
period is defined as eight hours:
• Step 1 approvers have 8 hours to approve.
• When all of the step 1 approvals are received, step 2 approvers are
given eight hours to act on their approval requests.
Approval Notification Indicates how often the system sends notifications to each approver about
Recurrence a ticket that is pending approval.
Leaving this option set to zero '0' causes one-time notification to be sent
without any recurrences.
Use business hours and Indicates if the system calculates the approval times using business hours.
holidays for approval
timeout and notification
frequency
Approval Override Overriding an approval advances the process ticket forward without
waiting on any pending approvals. After the override, any pending
approvals are closed out, a ticket history is written, and an Approval
Received email is sent to approvers, as defined in the email notification.
Allow All Admins to Any users with administrative access can override approvals.
Override
Specify Label Any users belonging to group with this label can override approvals.
TIP: To send email notifications to all recipients each time the ticket enters a new process stage,
in the top-left corner, click Select All. To select all ticket stages for a particular recipient, select
the check box in the recipient's column in the top row, as required. For example, to send email
notifications to the Submitter each time the ticket enters a new stage, select the Submitter check
box in the top row.
For each ticket stage, you can configure the process template to send an email notification to a Submitter,
Owner, Approver, and the contacts on the CC List, as required.
Some options appear pre-selected by default, but you can change that, if required. For example, by default,
when an approval is required, an email notification is sent to the ticket owner and the approver using the
predefined email template.
8. Optional. Customize the email template for one or more process stages.
a. On the Email Notifications page, in the row containing the stage whose email template you want
to edit, click .
b. In the Edit Email Template dialog box, specify the following information:
Option Description
Use HTML/Markdown An indicator of whether the description contains rich text. Some process
descriptions can be longer than others, so formatting specific text
elements can improve the overall readability and help the end user better
understand the process. You can use the Markdown project syntax to
format the contents of the Description box. For more information about the
Markdown syntax, visit http://daringfireball.net/projects/markdown/syntax.
TIP: If you want to reference some ticket- or process-specific information in the email subject
or message body, such as the ticket title or process status, you can use email tokens. For
more information about the available email tokens, see Configure email templates.
c. Click Save.
9. On the Email Notifications page, click Save and Continue.
10. On the Publish Options page that appears, select any publishing options, as required:
Option Description
Enabled Processes must be enabled before you can use them to create process
tickets. Select this check box if you want to enable users to create tickets
from this process template.
Hide approval information Select this option if you do not want the users who do not own the ticket to
from non-owner users view approval information.
Hide process steps from Select this option if you do not want to display the process steps (child
Submitters tickets) to submitters in the parent ticket details page.
Display process to all users This option is selected by default. If you want to restrict end user access to
this process, clear this option. Alternatively, select a label associated with
the group to which you want to grant access.
Display process description Select this option if you want to show the process description page when
page while creating new creating new tickets based on this process template.
process requests
Use process status When you want to take advantage of the approval and notification features
workflow instead of ticket available in the process template, you must select this option. If you
status already configured approvals or notifications, this option is selected
by default and cannot be cleared. Choosing to use the process status
workflows causes the parent ticket to automatically advance through
various process-specific states such as Pending Approval, Approval
Denied, Approval Timed Out, In Progress, or Process Complete.
If you choose not to select this option and continue to use the ticket status
workflows instead, you must create custom ticket rules to achieve desired
approval and notification functionality.
When you use process status workflows, the Status field does not appear
on the Ticket Detail page, even if that field is configured to appear for the
related queue. The ticket Status field is still displayed for the child tickets.
Parent Ticket Closed Status Select the status that you want to use when the parent ticket associated
with this process is closed.
When the last child activity is closed, the parent ticket is closed
automatically, and its status appears in this field.
WaitingOverdue Moves tickets that have been Change a ticket status after
dormant for 7 days to an Overdue waiting for a configurable time
status. period. You can also send an
email message when the status
change happens.
OverdueClose Closes tickets that have been Change a ticket status after
Overdue with no action for 7 days. waiting for a configurable time
period. You can also send an
email message when the status
change happens.
Option Description
Order A number specifying the evaluation order level. The Ticket Rule runs according to the
evaluation order specified. Lower numbers run before higher numbers.
Queue (Read only) The name of the queue to which the ticket belongs.
Enabled The Ticket Rule is available. The Ticket Rule runs only if it is enabled.
Select SQL Modify the SQL query as needed. The query is generated by the Ticket Rule wizard
based on the criteria specified on the Ticket Rule page. The query returns a set of
ticket IDs that the Update Query operates on.
The Select Query runs according to the specified frequency.
To view results of the query, click View Ticket Search Results.
IMPORTANT: Do not edit SQL queries without understanding the
consequences. Incorrect SQL statements might reduce appliance
performance.
Email results Send the results of the Select Query to the specified email addresses. All columns
returned by the Select Query are included in the email.
Enter the email addresses in the Email field; use commas to separate addresses.
Append comment Add a comment to each ticket returned by the Select Query. This action is useful
to ticket in case the Update Query specified later updates a ticket without logging that
information. For example, add a message such as Ticket Rule: Increase Priority to
High triggered. Having this message gives you an indication of which tickets have
changed.
Enter any comments in the Comment field.
Email each Send text to the email addresses returned by the Select Query. An email is sent to
recipient in query each email address returned by the Select Query in the Email column.
results Variables are evaluated in the subject line or body of the email. Strings such as $title
and $due_date are replaced by the values in the TITLE and DUE_DATE columns
respectively. Any column returned by the Select Query can be replaced in that way.
The SQL generated by the Ticket Rule wizard supplies OWNER_, SUBMITTER_,
and CC_LIST as possible values.
Enter the subject in the Subject field.
Enter the email column name in the Email field, for example, OWNER_. Email is sent
to each email address returned by the Select Query in this Email column.
Enter an email message in the Email Body field.
Run update query Run a second database query using the results from Update Query field as input.
Use this field to run an additional SQL UPDATE statement using the comma-
separated list of tickets returned by the Select Query as input. For example, “update
HD_TICKET set TITLE = 'changed' where HD_TICKET.ID in (<TICKET_IDS>)” turns
into “update HD_TICKET set TITLE = 'changed' where HD_TICKET.ID in (1,2,3)”
Modify the SQL query as needed. The query is generated by the Ticket Rule wizard
based on the criteria specified on the Ticket Rule page. This query operates on the
tickets selected by the Select Query.
The Update Query runs according to the specified frequency.
IMPORTANT: Do not edit SQL queries without understanding the
consequences. Incorrect SQL statements might reduce appliance
performance.
Recalculate Due Select this option only if your update query involves updating the priority of existing
Dates tickets. Selecting this option recalculates the due dates based on the new priority
being set by the ticket rule.
NOTE: If any of the tickets contain a manually overridden due date, it will not
be overridden by ticket rules.
Last Run Log The last query results, including any failures or errors. These results are updated
each time the Ticket Rule runs.
Next Run The date and time the Ticket Rule is scheduled to run again.
Option Description
Every day/specific day at Run daily at a specified time, or run on a designated day of the week at a
HH:MM specified time.
Run on the nth of every Run on the same day every month, or a specific month, at the specified
month/specific month at time.
HH:MM
Run on the nth weekday of Run on the specific weekday of every month, or a specific month, at the
every month/specific month specified time.
at HH:MM
View Task Schedule Click to view the task schedule. The Task Schedule dialog box displays
a list of scheduled. Click a task to review the task details. For more
information, see View task schedules.
Archive closed tickets older than The age of tickets to be archived. For example, if
you select 3 months, tickets are archived when
three months have passed since the tickets were
opened. To prevent tickets in the queue from being
archived, select Never. Archived tickets can be
restored to the queue if necessary. See Restore
archived tickets.
Delete archived tickets older than The age of tickets to be permanently removed from
the archive. For example, if you select 6 months,
archived tickets are deleted from the archive when
six months have passed since the tickets were
opened. To prevent tickets in the queue from being
deleted from the archive, select Never. Deleted
tickets cannot be restored to the queue.
TIP: Selecting tickets to archive is useful when you want to archive specific tickets, or if you do not set
archiving to occur on a schedule, as discussed in Enable ticket archival.
1. Go to the Service Desk Tickets list:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Service Desk, then click Tickets.
2. Select the check box next to one or more tickets.
3. Select Choose Action > Archive.
4. On the confirmation dialog, click Yes.
5. To access archived tickets, click Service Desk > Archive, then click the link for the ticket you want to view.
Add a queue
You can add Service Desk ticket queues as needed.
If you plan to move Service Desk tickets from one queue to another, be sure to use the same values, including
custom fields, in each queue. Otherwise, data from the old queue is altered to match the new queue. See Move
tickets between queues.
1. Go to the Service Desk Queue Detail page:
TIP: When using POP to download email to the KACE SMA, you can use any valid mailbox.
4. For the POP3 authentication, you can apply Secure Sockets Layer (SSL) to the queue by selecting the SSL
check box.
Whether you select this check box depends on how you have configured your POP3 account.
5. Click Save.
6. Choose additional settings for the queue as needed. See Configuring Service Desk ticket queues.
No Default Use no default when displaying queues. When this is selected, the first queue that
was added to the system is displayed by default when users select Service Desk >
Tickets. This setting is disregarded if a setting is specified at the user level.
All Queues Display the All Queues view by default. When this is selected, the All Queues view is
displayed when users select Service Desk > Tickets . This setting is disregarded if a
setting is specified at the user level.
<Queue Name> Display the selected queue by default. When this is selected, the specified queue is
displayed when users select Service Desk > Tickets . This setting is disregarded if a
setting is specified at the user level. If a queue does not appear on this list, verify that
you have permission to view it.
TIP: These settings can be overridden at the user level. See Set the default queue at the user
level.
3. Click Save.
No Default Use no default when displaying queues. When this is selected, the first queue that
was added to the system is displayed by default when the selected user selects
Service Desk > Tickets.
All Queues Display the All Queues view by default. When this is selected, the All Queues view is
displayed when the selected user selects Service Desk > Tickets.
<Queue Name> Display the selected queue by default. When this is selected, the specified queue is
displayed when the selected user selects Service Desk > Tickets. If a queue does
not appear on this list, verify that you have permission to view it.
3. Click Save.
Set the default fields for the All Queues ticket list
You can specify the ticket fields you want to display in the All Queues view.
If you have multiple queues, the All Queues view is a useful way to view all of the tickets in your system on a
single list.
For example, each queue might have different names for ticket fields. One queue might use the ticket field Priority
and another queue might use the ticket field Business Impact. You can choose which field to display in the All
Queues view.
Fields are displayed according to these settings:
• The field names used in the queue selected as the Default Queue for All Queues View Field Labels
• The fields specified in the Customize List Layout for All Queues View setting
1. Go to the Service Desk Settings page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Service Desk, then click Configuration.
c. On the Configuration panel, click Settings.
2. In the Queue Preferences section, select a queue in the Ticket List Layout for All Queues drop-down list.
The field names from this queue appear on the Tickets page.
3. Click Save.
4. Click Customize List Layout for All Queues View to display the Layout page.
5. Modify the fields using the following icons:
◦
: Add a field.
◦
: Change the field name or the width of the field column.
NOTE: The width indicates the amount of available page width that is assigned to the field
column. For example, if you have 10 columns, and each column is assigned a width of 10, the
total of all numbers in the Width column would be 100. Therefore, each field column would have
a width of 10 percent of the available page width. If the total of all numbers in the Width column
is more or less than 100, the numbers are normalized to percentages to determine the width. For
example, if you have three columns, and you assign a width of 10 to each column, the total of all
numbers in the Width column would be 30. However, when normalized to percentages, the width
of each column would be approximately 33.3 percent.
◦
: Drag and change the order in which the fields are displayed.
◦
: Delete the field.
6. For each field you edit, click Save at the end of the row.
The default queue settings are saved.
7. To see the new settings:
a. Select Service Desk > Tickets to display the page.
b. In the Queue drop-down list, select All Queues. In the View By drop-down list, select All Tickets.
Fields from the selected queue appear on the list in the order specified in the queue settings.
CAUTION: When the system displays Active Tickets or All Tickets in the All Queues view, the
Choose Action menu and View By drop-down list use default settings. Customizations that
appear in individual queues are not available in the All Queues view.
TIP: Software distribution is available for items on the Software page and for Agent-managed devices only.
It is not available for items on the Software Catalog page or Agentless devices.
1. Go to the User Downloads Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Service Desk, then click User Downloads.
c. Select Choose Action > New.
2. Select the Enabled check box to make the item visible on the User Console; clear the check box to hide the
item.
3. In the Configure section, select a Type:
Option Description
For more information about cataloged software, see About the Software Catalog
and View details of Software Catalog applications.
• Software: Create an item that downloads documentation, files, or other
software that does not install automatically.
Install Create an item that runs a software program on the user’s device. A device must
have the Agent installed to run installations. Select one of the following options:
• Use existing Managed Install: Choose this option to select an existing
Managed Installation (MI). Each MI includes a specific application title and
version to be installed or removed, including installation commands, installation
files, and target devices (identified by label). For more information, see Using
Managed Installations.
• Default Installation: Choose from the programs available in Inventory >
Software. For more information, see About the Software page.
Script Create an item that runs a script on the user’s device. Choose from the scripts
available in Scripting > Scripts. Devices must have the Agent software installed to
run scripts.
4. If you selected the Install package type in the previous step, enter the parameters required to run the
installation, including any necessary installation switches or parameters.
5. Specify the information to include:
Field Description
Product Key Send the product key to users when they download the application. To
view Asset Detail license information, click Assets.
Installation Instructions Instructions, legal notes, or any other information you want to upload to the
User Console along with the application.
Email Product Key to End Send the product key to users when they download the application. To
User view Asset Detail license information, click Assets.
Notify Manager Require users to enter their manager’s email address before enabling
them to download or install applications.
Attachment (Optional) The file to be included as documentation. The file size appears
after the item is saved.
Labels (Optional) Click Edit to select a label and limit application deployment to
users who are included in the label.
Requires Approval (Optional) Select this check box if you want to the end user to obtain one
or more approvals to download the software, and configure the following
fields:
• Approval Process Template: Select the process template
containing the desired approval process. The process template
must be based on the Software Request: Approval Required
process type which applies to software download requests.
• Approval Frequency: Indicate how often you want the user to
request a permission to download the selected software: One-time
Approval or Every Download Approval.
7. Click Save.
Title A specific description of the issue covered in the Knowledge Base article. Write
descriptive titles and use common terms to make it easy for users to find information.
Category A general description of the type of issue, for example, “printing” or “network access.”
Platform The operating systems to which this Knowledge Base article applies.
Importance The value of the Knowledge Base article. For example, “reference” or “low”; or
“critical” or “high.”
Assign to Labels To limit access to the article to specific sets of users, select the appropriate user
labels from the list. If this field is empty, all users who have access to the User
Console can see the Knowledge Base article.
3. Optional: In the Attachments section, click Add, then click Browse or Choose File to add an attachment.
4. Click Save.
TIP: To create a Knowledge Base article from the comments in a ticket, click Create KB article
on the Ticket Detail page.
The KACE SMA assigns the Knowledge Base article an Article ID and displays it on the Knowledge Base
page. To see how the Knowledge Base article appears to users in the User Console, click the Knowledge
Base article’s title on the Knowledge Base page, then click the User URL on the Article Detail page.
5. Optional: Click Duplicate.
View user ratings and the number of views for Knowledge Base
articles
You can view user ratings for Knowledge Base articles as well as the number of times Knowledge Base articles
have been viewed.
1. Go to the Knowledge Base Article Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Service Desk, then click Knowledge Base.
c. Click the name of an article.
The current user rating for the article and the number of page views appear at the bottom of the page.
2. Mouse over the stars to view the definitions of the five-star rating system.
On the scale, 1 star is low, 5 stars are high.
NOTE: Users can change their ratings. However, the database stores only the user’s most recent
rating for each article.
When users select the Monitor subcategory, you might want to display additional subcategories, such as model
information:
Most customers use a two-tiered approach to categories and subcategories. They create general categories and
subcategories for users, such as:
• Hardware – Monitor
Then they create additional subcategories with model information for Service Desk staff, such as:
• Hardware – Monitor – AceElectronics – V4500
• Hardware – Monitor – AceElectronics – V4600
1. Go to the Service Desk Queue Detail page:
a. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin.
Or, if the Show organization menu in admin header option is enabled in the appliance General
Settings, select an organization in the drop-down list in the top-right corner of the page next to the
login information.
b. On the left navigation bar, click Service Desk, then click Configuration.
c. On the Configuration panel, click Queues.
d. To display the Queue Detail page, do one of the following:
▪ Click the name of a queue.
▪ Select Choose Action > New.
2. In the Ticket Defaults section, click Customize These Values to display the Queue Customization page.
3.
In the Category Values section, click the Add button: .
A new row appears.
4. Provide the following information in the row:
Field Description
Name The name of the category or subcategory. To create a subcategory, use this syntax:
Category 1::Subcategory A
Default Owner The user that is automatically assigned as owner of the ticket category or
subcategory when tickets are created. If you move an existing ticket to a category
with a different default owner, the owner of the ticket does not automatically change.
The owner of the ticket must be changed manually.
CC List Clear this check box to prevent the CC List from being displayed on tickets. Because
DefaultTicketOwners is the default owner, all potential ticket owners receive an
email when a ticket is created.
User Settable Allow users to change the corresponding category. Clear the check box to reserve
the action for Service Desk staff only. Users see categories even if they cannot
change them.
NOTE: You cannot remove a value if it is in use, or if it is the default ticket value. To remove a
value that is being used, add a value, then, in the ticket where the value is used, change the old
value to the new value. When the old value is no longer in use, the Delete button appears next to
the value: .
6. Click Save at the bottom of the page or continue editing ticket values.
NOTE: You cannot remove a value if it is in use, or if it is the default ticket value. To remove a
value that is being used, add a value, then, in the ticket where the value is used, change the old
value to the new value. When the old value is no longer in use, the Delete button appears next to
the value: .
6. Click Save at the bottom of the page or continue editing ticket values.
Color (Optional) Select a color to use for this status on the ticket list pages.
Escalation Time (Optional) Enter a time limit, after which an open ticket of this priority is escalated.
Enter a time integer and a unit from the drop-down list. See Using the ticket
escalation process.
Use Business (Optional) Whether to use the settings for business hours and holidays when
Hours/Holidays calculating the priority of tickets in the queue. If business hours and holidays are
configured for the Service Desk, select this check box to take these hours and
holidays into account when determining whether to escalate tickets based on their
NOTE: You cannot remove a value if it is in use, or if it is the default ticket value. To remove a
value that is being used, add a value, then, in the ticket where the value is used, change the old
value to the new value. When the old value is no longer in use, the Delete button appears next to
the value: .
7. Click Save at the bottom of the page to save changes and return to the Queue Detail page.
NOTE: You cannot remove a value if it is in use, or if it is the default ticket value. To remove a
value that is being used, add a value, then, in the ticket where the value is used, change the old
value to the new value. When the old value is no longer in use, the Delete button appears next to
the value: .
6. Click Save at the bottom of the page or continue editing ticket values.
TIP: Remember that the changes you make here are automatically propagated to all existing
tickets in the queue.
Layout Ticket This section includes the Survey, Title, and Summary fields, the Submitter, Asset,
Fields and Device sections, and any other fields that are not displayed in the Related Ticket
Fields section. This section also includes any custom fields. Fields in this section can
be freely moved around within this section and they appear on the Ticket page in the
specified order. All fields in this section are displayed in a two-fields-per-row format
except the Resolution field, which occupies a full row.
NOTE: If the Summary field is hidden, the Comment field is displayed on
the New Ticket page. Text entered in the Summary field is stored as the first
comment, and the first comment is stored as the Summary in order to maintain
backward compatibility.
Related Ticket This section includes fields that capture information about related tickets. You can
Fields hide these fields, but you cannot change their position.
• PARENT_INFO: Tickets that have a parental relationship to the selected ticket.
• SEE_ALSO: Tickets that are similar to, or provide additional information about,
the selected ticket.
• REFERERS: Users who have referenced the ticket.
3.
Click the Edit button next to the field you want to customize .
4. In the Label and Required fields, choose options to use:
Section Description
Label The name you want to appear next to the field on the Ticket Detail page.
Owners Only - Visible Users, Ticket Owners, Ticket Owners, Ticket Owners,
to Users Administrators* Administrators* Administrators*
User Create Users, Ticket Owners, Ticket Owners, Users, Ticket Owners,
Administrators* Administrators* Administrators*
User Modify Users, Ticket Owners, Users, Ticket Owners, Users, Ticket Owners,
Administrators* Administrators* Administrators*
* Indicates the default setting. You can remove this default setting by clearing the following check box
on the Queue Detail page: Allow users with an Administrator role to read and edit tickets in this queue
(Administrator Console only).
6. Optional: Use the following controls to change field display:
•
: Change the sort order of columns.
•
: Change the order of values.
7. Click Save in the row.
8. At the bottom of the page, click Save to apply your changes.
NOTE: The User custom field stores the user ID from the USER table in the HD_TICKET
table, which is the table that holds the ticket record. When writing a report or query against the
HD_TICKET table, you need to JOIN on the USER table if you want to display the username
instead of the user ID in the report.
5. In the Select Values field, specify the allowed values.
Use the Select Values field for the Single Select or Multiple Select custom field types. Enter multiple values
as comma-separated strings.
You can use a database query to specify values for this field with the syntax: query:query_instructions.
Select the Help button next to Custom Fields to view an example: .
7. Click Save.
8. Scroll to the Layout Ticket Fields section, then click the Edit button next to the custom field you configured:
.
The custom field behavior options become editable.
9. Enter a name in the Label field.
10. In the Required field select the option to use:
• Not Required. The field is not required.
• Always Required. Fields with this option must be completed before a ticket can be saved and
submitted.
• Required on Close. Fields with this option must be completed before a ticket can be closed.
11. In the Permissions field, choose the permission setting to use:
Permission setting Can be viewed by Can be changed by Can be created by
Owners Only - Visible Users, Ticket Owners, Ticket Owners, Ticket Owners,
to Users Administrators* Administrators* Administrators*
User Create Users, Ticket Owners, Ticket Owners, Users, Ticket Owners,
Administrators* Administrators* Administrators*
User Modify Users, Ticket Owners, Users, Ticket Owners, Users, Ticket Owners,
Administrators* Administrators* Administrators*
* Indicates the default setting. You can remove this default setting by clearing the Allow users with an
Administrator role to read and edit tickets in this queue (Administrator Console only) check box on the
Queue Detail page.
12.
Optional: Use the Sort button at the top of a column, or drag the move icon, , to change the order in
which the fields are displayed.
13. Click Save in the row.
14. At the bottom of the page, click Save to apply your changes.
6. Click Preview.
The Confirm dialog box appears, asking you to save your changes before displaying a preview.
7. In the Confirm dialog box, click Save.
The dialog box closes and your preview appears. A note at the top of the page indicates that your changes
are saved and that you are previewing the selected page.
8. To return to the Queue Customization page, in the top-right corner, click Back to Queue Configuration
page.
NOTE: The width indicates the amount of available page width that is assigned to the field
column. For example, if you have 10 columns, and each column is assigned a width of 10, the
total of all numbers in the Width column would be 100. Therefore, each field column would have
a width of 10 percent of the available page width. If the total of all numbers in the Width column
is more or less than 100, the numbers are normalized to percentages to determine the width. For
example, if you have three columns, and you assign a width of 10 to each column, the total of all
numbers in the Width column would be 30. However, when normalized to percentages, the width
of each column would be approximately 33.3 percent.
◦
: Add a ticket field to the ticket layout.
◦
: Delete the field from the ticket list.
4. Click Save at the bottom of the page.
NOTE: You can create many levels of parent-child ticket relationships, but closing child tickets by closing
their parent ticket works for only one parent-child level.
TIP: If you expect a multi-phase task to be repeated regularly, consider making it a process ticket. See
Using Service Desk processes.
1. Create a ticket to serve as a parent. See Designate tickets as parents and add existing tickets as their
children.
2. From the parent ticket, add child tickets for each required task on the to-do list.
3. Close each child ticket as tasks are completed.
4. When prompted, close the parent ticket. This prompt appears when the last child task is closed.
NOTE: If the resolution for the parent ticket is empty, the resolution from the child ticket will be added
to the parent resolution.
NOTE: Approvers only have access to the Approval and Approval Note fields on a ticket. The Approval
field has the following options:
• Approved
• Rejected
• More Information Needed
NOTE: The Approval field must be set before the ticket can be opened or closed, depending on how the
Required option is configured. The Approval Note field is optional. Approvers can see all of the tickets they
need to approve by clicking Service Desk > Tickets, then clicking View By > My Approvals.
Port Enter the port number to use for the external SMTP server. For standard SMTP, use
port 25. For secure SMTP, use port 587.
Login Enter the username of an account that has access to the external SMTP server, such
as your_account_name@gmail.com.
POP3 Server Enter the name of the POP3 server you want to use for the queue. For example,
pop.gmail.com.
Use SSL Select this option if you want the POP3 server to use a secure connection.
POP3 Username Enter the username and password of an account that has access to the POP3 server.
(email address)
POP3 Password
SMTP Server Specify the hostname or IP address of an external SMTP server, such as
smtp.gmail.com. External SMTP servers must allow anonymous (non-authenticated)
outbound email transport. Ensure that your network policies allow the appliance to
contact the SMTP server directly. In addition, the mail server must be configured to
allow the relaying of email from the appliance without authentication.
SMTP Port Enter the port number to use for the external SMTP server. For standard SMTP, use
port 25. For secure SMTP, use port 587.
SMTP Username Enter the username of an account that has access to the external SMTP server, such
as your_account_name@gmail.com.
9. Click Save.
The appliance is configured to forward email to the designated SMTP server. If you have multiple queues,
repeat the preceding steps for each queue.
TIP: By default, the appliance accepts Service Desk email only when the sender’s email address matches
a user account on the KACE SMA. To change this setting, see the setting, Accept email from unknown
users in the section Configuring Service Desk ticket queues.
NOTE: Beginning with the 6.4 release of the KACE SMA, backups are created while the KACE SMA is
running. The appliance is not taken offline during the backup process. Restoring the appliance to a backup
and resetting the appliance to factory settings, however, continue to require that the appliance be taken
offline.
TIP: Always back up appliance data before installing updates or upgrading appliance software.
Daily The number of daily backups to retain on the appliance. You can retain up to seven
daily backups.
Monthly The number of monthly backups to retain on the appliance. You can retain up to
two monthly backups. Monthly backups occur on the last day of the month, and you
cannot change the schedule of monthly backups.
4. In the Schedule section, specify the schedule for running daily backups.
Times are listed in the 24-hour clock format, and you can select intervals of 5 minutes. For example, to
schedule the daily backup for 5 minutes past midnight, select 0:05.
TIP: To ensure that backup logs are not turned over during daily log maintenance, schedule daily
backups to occur after midnight.
5. Click Save.
The settings are applied. When the next scheduled backup runs, older backup files are removed if the number of
backups retained on the appliance exceeds the number specified in the Retention section.
NOTE: To restore files, you must have a matched pair of Differential and Base backup files. Paired backup
files reference the same KACE SMA version number and date, and only paired backup files can be used to
restore the appliance.
1. Go to the appliance Control Panel:
• If the Organization component is not enabled on the appliance, log in to the KACE SMA Administrator
Console, http://KACE_SMA_hostname/admin, then click Settings.
• If the Organization component is enabled on the appliance, log in to the KACE SMA System
Administration Console, http://KACE_SMA_hostname/system, or select System in the drop-
down list in the top-right corner of the page, then click Settings.
2. Click Backup Settings to display the Backup Settings page.
3. In the Backups section download a matched pair of Differential and Base backup files:
a. Click the name of a backup file with incr in the filename. For example:
<date>_k1_incr_<version>.tgz.
b. If prompted, select a download location for the file.
c. Click the name of a backup file with base in the filename. For example
<date>_k1_base_<version>.tgz.
d. If prompted, select a download location for the file.
NOTE: The saved backup files reflect the appliance data from the most recent automatic backup time
(2:00 AM by default) for a selected date. If you need a backup that reflects the current appliance state,
you can perform a manual backup. For more information, see Back up the appliance manually.
NOTE: To change the FTP password, see Configure security settings for the appliance. You cannot
change the FTP username.
4. To access the backup files from a command prompt, enter the following commands:
> type binary
> get k1_base.tg
> get k1_base.tgz
> get k1_incr.tgz
>close
>quit
IMPORTANT: Disabling backups prevents you from restoring appliance settings and data from the
Administrator Console in the event of a disaster. As a result, you should disable appliance backups only if
you are using an alternative method of backing up data, such as virtual machine snapshots for the virtual
KACE SMA. Disabling backups is not recommended for physical versions of the KACE SMA.
IMPORTANT: Disabling backups prevents you from restoring appliance settings and data from the
Administrator Console in the event of a disaster. As a result, you should disable appliance backups only if
you are using an alternative method of backing up data, such as virtual machine snapshots for the virtual
KACE SMA. Disabling backups is not recommended for physical versions of the KACE SMA.
1. Optional: To preserve the ability to restore data and settings in the event of a disaster, download the
latest backup files from the Administrator Console and save them to a different location before you disable
backups. See Download backup files from the Administrator Console.
2. Go to the appliance Control Panel:
• If the Organization component is not enabled on the appliance, log in to the KACE SMA Administrator
Console, http://KACE_SMA_hostname/admin, then click Settings.
• If the Organization component is enabled on the appliance, log in to the KACE SMA System
Administration Console, http://KACE_SMA_hostname/system, or select System in the drop-
down list in the top-right corner of the page, then click Settings.
3. Click Backup Settings to display the Backup Settings page.
4. In the Retention section, select Disable Backups.
5. Click Save.
Disable Offboard Indicates if offboard backup transfer is disabled or enabled. Clear this check box to
Backup Transfer enable offboard backup transfer.
Offboard Backup The protocol that you want to use to transfer the backup files: Samba, FTP, or
Transfer Protocol Secure FTP.
Offboard Backup The host name or the IP address of the machine to which you want to copy the
Transfer Server backup files.
Path or Share The path of the directory on the machine to which you want to copy the backup files.
Name
User Name The name of the user account that you want to use to access the destination
machine.
5. To verify if you can access the destination machine using the provided address and credentials, click Test.
A message appears, indicating the success of the operation. If access to the destination server fails, this is
indicated in the message. Verify your configuration and make changes, as applicable.
6. Click Save.
NOTE: To restore files, you must have a matched pair of Differential and Base backup files. Paired backup
files reference the same KACE SMA version number and date, and only paired backup files can be used to
restore the appliance.
NOTE: To restore files, you must have a matched pair of Differential and Base backup files. Paired backup
files reference the same KACE SMA version number and date, and only paired backup files can be used to
restore the appliance.
The uploaded files appear in the Backups section of the Backup Settings page.
• To use the Client Drop location method for uploading backup files, place your backup files in the Client Drop
location on the appliance.
Files placed in the Client Drop location are automatically identified as backup files and they become
available for selection on the Backup Settings page within five minutes. See Copy files to the KACE SMA
Client Drop location.
Restore the appliance using the uploaded backup files. See Restore the appliance from backups.
TIP: Always back up appliance data before installing updates or upgrading the appliance software. For
instructions, see About appliance backups.
1. Go to the appliance Control Panel:
• If the Organization component is not enabled on the appliance, log in to the KACE SMA Administrator
Console, http://KACE_SMA_hostname/admin, then click Settings.
• If the Organization component is enabled on the appliance, log in to the KACE SMA System
Administration Console, http://KACE_SMA_hostname/system, or select System in the drop-
down list in the top-right corner of the page, then click Settings.
2. On the left navigation bar, click Appliance Updates to display the Appliance Updates page.
3. In the Server section, click Check for Update to display the Logs page.
Results of the check appear in the log.
4. When an update is available, back up your database and files.
See About appliance backups.
5. Click Update.
The update is applied. The Administrator Console is unavailable until the update is complete. Progress appears in
the browser window and in the Administrator Console.
Disk status
The daily run output report, which is automatically emailed to the system administrator every day, includes a Disk
status table.
Filesystem Size Used Avail Capacity Mounted on
Size The amount of disk space allocated to the specified file system.
Used The amount of disk space in use by the specified file system.
Avail The amount of free disk space available to the specified file system.
Capacity The percentage of disk space available to the specified file system.
Mounted on The disk partition on which the specified file system is located.
TIP: In most cases, this problem can be cleared by simply restarting the device.
• Failure to write to amp.conf.
For more information about these issues, visit https://support.quest.com/kace-systems-management-appliance/
kb.
1. Log in to the KACE SMA Administrator Console, http://KACE_SMA_hostname/admin. Or, if the
Show organization menu in admin header option is enabled in the appliance General Settings, select an
organization in the drop-down list in the top-right corner of the page next to the login information.
2. In the Troubleshooting Tools section, click Device Issues to display the Device Issues page.
3. Review the list of faulty devices on the Device Issues, and take any steps to resolve these issues, as
required.
Hardware Disk Status The status of the physical appliance disk array (not available for
virtual appliances).
Patch Download Information about patches that have been downloaded to the
Log appliance.
Opcode Cache Opcode cache log information (not available for virtual appliances).
Monitoring Log Information related to monitored servers and their connections to the
KACE SMA.
Mail Service Desk Information related to problems encountered by the Exim Server
Incoming Mail Log (Mail Transfer agent) while processing email for Service Desk
queues. For example, invalid email addresses and Service Desk
licensing issues.
Service Desk PHP errors encountered when inbound email messages are
Incoming Mail processed.
Error Log
Service Desk Errors encountered by the Mail Daemon while sending outgoing
Outgoing Mail Log email messages. For example, invalid email addresses.
Service Desk PHP errors encountered when outgoing email notifications are
Outgoing Mail processed.
Error Log
If the Organization component is enabled on your system, you can change the number of days logs are retained.
This setting appears in the Log Retention section of the appliance General Settings. See Configure appliance
General Settings with the Organization component enabled.
Table Component
DASHBOARD Dashboard
DASHBOARD_CACHE Dashboard
FILTER Labels
FS File Synchronization
KBOT Scripting
KBOT_CRON_SCHEDULE Scripting
KBOT_DEPENDENCY Scripting
KBOT_EVENT_SCHEDULE Scripting
KBOT_FORM Scripting
KBOT_FORM_DATA Scripting
KBOT_LABEL_JT Scripting
KBOT_LOG Scripting
KBOT_LOG_DETAIL Scripting
KBOT_LOG_LATEST Scripting
KBOT_OS_FAMILY_JT Scripting
KBOT_OS_JT Scripting
KBOT_RUN Scripting
KBOT_RUN_MACHINE Scripting
KBOT_RUN_TOKEN Scripting
KBOT_SHELL_SCRIPT Scripting
KBOT_UPLOAD Scripting
KBOT_VERIFY Scripting
KBOT_VERIFY_STEPS Scripting
KMON_ALERT Monitoring
KMON_CONDITION Monitoring
KMON_CONFIG Monitoring
KMON_CONFIG_DEFAULT Monitoring
KMON_CONFIG_DETAIL Monitoring
KMON_CONFIG_DEVICE_JT Monitoring
KMON_LOG_CONFIG Monitoring
KMON_MAINT_CONFIG Monitoring
KMON_MONITORED_DEVICE Monitoring
LABEL Labels
LABEL_LABEL_JT Labels
REPORT_FIELD Reporting
REPORT_FIELD_GROUP Reporting
REPORT_JOIN Reporting
REPORT_OBJECT Reporting
REPORT_OBJECT_JOIN Reporting
REPORT_SCHEDULE Reporting
SETTINGS Settings
SMARTY_REPORT Reporting
Table Component
AGENTLESS_TASK Inventory
DASHBOARD Dashboard
DASHBOARD_BASE_WIDGETS Dashboard
DASHBOARD_CACHE Dashboard
DASHBOARD_CUSTOM_WIDGETS Dashboard
DASHBOARD_DATASOURCES Dashboard
DASHBOARD_WIDGET_TYPES Dashboard
INVENTORY Inventory
INVENTORY_FAILURES Inventory
KBOT_GRAMMAR Scripting
KBOT_GRAMMAR_ATTRIBUTE Scripting
KBOT_UPLOAD_TOKENS Scripting
KBOX Scripting
KBOX_VERSION Scripting
MSI_ERROR_CODES Distribution
ORGANIZATION Organizations
REPORT_FIELD Reporting
REPORT_FIELD_GROUP Reporting
REPORT_JOIN Reporting
REPORT_OBJECT Reporting
REPORT_OBJECT_JOIN Reporting
REPORT_SCHEDULE Reporting
SETTINGS Settings
SMARTY_REPORT Reporting
SMMP_CONNECTION Discovery
SMMP_CONNECTION_PLUGIN_JT Discovery
SMMP_MSG_Q Discovery
SMMP_NIC Discovery
SMMP_PLUGIN Discovery
SOFTWARE_INVENTORY Inventory
SOFTWARE_INVENTORY_FAILURES Inventory
ASSET_CLASS Added
AUTH_CREDENTIALS Removed
AUTH_GOOGLE_API Removed
AUTH_NT_USER Removed
AUTH_SNMP_V3 Removed
AUTH_USER_PWD Removed
CREDENTIAL Added
DEVICE_DETAIL_FIELD Added
DEVICE_DETAIL_GROUP Added
DEVICE_DETAIL_GROUP_ASSET_CLASS_JT Added
DEVICE_DETAIL_SECTION Added
DEVICE_DETAIL_SECTION_ASSET_CLASS_JT Added
DEVP_PROFILE_APPLIED Added
DEVP_PROFILE_APPLIED_MACHINE Added
DEVP_PROFILE_APPLIED_PAYLOAD Added
DEVP_PROFILE_APPLIED_PAYLOAD_ATTRIBUTE Added
HD_ANNOUNCEMENT Added
HD_ANNOUNCEMENT_LABEL_JT Added
HD_HOME_PAGE_WIDGET Added
HD_LINK Added
KMON_INSTALL_LEP_DEVICE_JT Added
KMON_LEP Added
KMON_LEP_INSTALL Added
MACHINE_BITLOCKER_VOLUME Added
MACHINE_DCM_AMT_SETTINGS Added
MACHINE_DCM_BATTERY Added
MACHINE_DCM_DESKTOP_MONITOR Added
MACHINE_DCM_FLAT_PANEL Added
MACHINE_DCM_LOG_ENTRY Added
MACHINE_DCM_PHYSICAL_MEMORY Added
MACHINE_DCM_PROCESSOR Added
MACHINE_DCM_VPRO_SETTINGS Added
MACHINE_DDPE Added
MACHINE_DDPE_VOLUME Added
MACHINE_DRIVE_ENCRYPTION_SUMMARY Added
MACHINE_FILEVAULT_VOLUME Added
MACHINE_LOCATION Added
MACHINE_MOBILE Added
MACHINE_TPM Added
MSP_MI_TEMPLATE Removed
REMOTE_DMM_HOST Added
REPORT Removed
SAM_COMPLIANCE_DETAIL Added
SAM_COMPLIANCE_SUMMARY Added
SAM_COMPLIANCE_DETAIL Added
SAM_COMPLIANCE_SUMMARY Added
SAM_VIEW_ALL_SOFTWARE Removed
SAM_VIEW_DISCOVERED_APPLICATIONS Removed
SAM_VIEW_DISCOVERED_SOFTWARE Removed
SAM_VIEW_DISCOVERED_SUITES Removed
SAM_VIEW_INVENTORY_ADD_REMOVE_ Removed
PROGRAMS
SAM_VIEW_INVENTORY_MOBILE_APPS Removed
SAM_VIEW_MACHINE_DISCOVERED_SOFTWARE Removed
SAM_VIEW_TITLED_SOFTWARE Removed
AGENTLESS_TASK_LOG Removed
CREDENTIAL_CONSUMER Added
DAC_AGENTLESS Removed
HD_EMAIL_EXCLUSION Added
JOIN_METADATA Added
REPORT Removed
PATCH_SETTINGS Removed
SAM_ADD_REMOVE_PROGRAM
SAM_APPLICATION_FILE Removed
SAM_HARDWARE Added
SAM_MOBILE_APPLICATION_FILE
SAM_SOFTWARE_TAG Added
SHAPING_METADATA Added
Always fail X X
Update policy and Update policy and job schedule from the X
job schedule appliance.
Always fail X X
Update policy and Update policy and job schedule from the X
job schedule appliance.
Verify an X
environment
variable equals
Verify an X
environment
variable exists
Verify an X
environment
variable greater than
Verify an X
environment
variable less than
Verify count of X
filenames matching
regex is greater than
Verify count of X
filenames matching
regex is less than
Verify count of X
filenames matching
regex
Always fail X X
Update policy and Update policy and job schedule from the X
job schedule appliance.
Verify an X
environment
variable less than
Verify count of X
filenames matching
regex is greater than
Verify count of X
filenames matching
regex is less than
Verify count of X
filenames matching
regex
LDAP variables
The KACE SMA supports variables for use in LDAP Labels and database queries.
KACE SMA variable KACE SMA MACHINE database table LDAP attribute mapping
column
KBOX_COMPUTER_DESCRIPTIONSYSTEM_DESCRIPTION description
KBOX_COMPUTER_IP IP ipHostNumber
KBOX_USERNAME USER_NAME
KBOX_USER_DOMAIN USER_DOMAIN
KBOX_DOMAINUSER USER
KBOX_CUSTOM_INVENTORY_* CUSTOM_INVENTORY
The KBOX_CUSTOM_INVENTORY_* variable can be used to check a custom inventory value. The * is replaced
with the Display Name of the custom inventory rule. Allowed characters are [a-z0-9.-]. Any other characters are
replaced with an underscore (_).
User variables
User variables can be used in LDAP Labels and queries to automatically group users by domain, location, budget
code, or other LDAP criteria. During LDAP Label processing, the KACE SMA replaces all KBOX_ defined variables
with their respective runtime values. The following table shows supported user variables and their mapping to
columns in the USER database table and LDAP attributes.
Table 39. User variables and mappings
KACE SMA variable KACE SMA USER database table LDAP attribute mapping
column
KBOX_DOMAIN DOMAIN
KBOX_BUDGET_CODE BUDGET_CODE
KBOX_LOCATION LOCATION 1
KBOX_CUSTOM_1 CUSTOM_1
KBOX_CUSTOM_2 CUSTOM_2
KBOX_CUSTOM_3 CUSTOM_3
KBOX_CUSTOM_4 CUSTOM_4
KBOX_ROLE_ID ROLE_ID
KBOX_LOCALE_BROWSER_ID LOCALE_BROWSER_ID
KBOX_HD_DEFAULT_QUEUE_ID HD_DEFAULT_QUEUE_ID
A
Acceptable Use Policy
A statement or policy that is displayed to users when they log in to the Administrator Console, Command
Line Console, or User Console. See Enable or disable the Acceptable Use Policy.
add to catalog request
A cataloging request is a form you can submit to request that an application that is not included in the
Software Catalog (Uncataloged) be added to the public Software Catalog. When Quest receives a
cataloging request, that request is evaluated to determine whether or not the application should become
part of the public Software Catalog. In addition, applications are automatically added to the local version of
the Software Catalog on the KACE SMA when cataloging requests are submitted. See Adding applications
to the Software Catalog.
Administrator Console
The Administrator Console is the web-based interface used to control the KACE SMA. To access the
Administrator Console, go to http://<KACE_SMA_hostname>/admin where <KACE_SMA_hostname>
is the hostname of your appliance. If the Organization component is enabled, you can access the System-
level settings of the Administrator Console at http://<KACE_SMA_hostname>/system. To view the full
path of URLs in the Administrator Console, which can be useful when searching the database or sharing
links, add ui to the URL you use to log in. For example: http://<KACE_SMA_hostname>/admin.
Agent
The KACE SMA Agent is an application that can be installed on devices to enable device management
through the KACE SMA. Agents that are installed on managed devices communicate with the KACE SMA
through AMP (Agent Messaging Protocol). Agents perform scheduled tasks, such as collecting inventory
information from, and distributing software to, managed devices. Agentless management is available for
devices that cannot have Agent software installed, such as printers and devices with operating systems that
are not supported by the Agent. See Provisioning the KACE SMA Agent.
Agentless management
Agentless device management is a method of managing devices without the need to deploy and maintain
the KACE SMA Agent software on those devices. Agentless management uses SSH, SNMP, and other
methods to connect to Agent-intolerant devices, such as printers, network devices, and storage devices,
and report inventory in the KACE SMA Administrator Console. This is useful for operating system versions
and distributions that are not supported by the KACE SMA Agent, and where Agentless management is
preferred over installing the Agent. See Managing Agentless devices.
alerts
Broadcast alerts are messages, such as pop-ups, that can be broadcast from the KACE SMA to be
displayed on Agent-managed devices. Displaying alerts is useful when you need to communicate urgent
information, or notify users before running actions or scripts on their devices. See Broadcasting alerts to
managed devices.
Monitoring alerts are messages that are generated on supported server devices and sent to the KACE SMA to
alert staff about errors and issues being reported in the event and system logs of the devices. See Monitoring
servers.
alternate download location
An alternate download location can be any network location that has all the files required to install a
particular application. You can distribute packages from alternate download locations including a UNC
address or DFS source. The CIFS and SMB protocols, Samba servers, and file server appliances are
Classic Metering
Classic Metering is the metering system that was available on the KACE SMA prior to version 5.5. If you
upgraded to version 5.5 from version 5.4 or lower, and you enabled metering prior to the upgrade, you
can continue to access Classic Metering in the KACE SMA 5.5 release. However, the Software Catalog
metering system, which provides more detailed information than Classic Metering, replaced Classic
Metering in the 6.0 release. Classic Metering is no longer available in version 6.0 and higher. See metering
.
Classic Reports
The reporting feature available on the KACE SMA version 5.2 and lower. Classic Reports are no longer
available in version 5.5 and higher.
Client Drop location
The Client Drop location is a file share used for uploading large files, such as application installers and
appliance backup files, to the appliance. Uploading files to the Client Drop location is an alternative to
uploading files through the Administrator Console using the default HTTP mechanism, which can result in
browser timeouts for large files. See Copy files to the KACE SMA Client Drop location.
clients
See devices .
Command Line Console
The Command Line Console is a terminal window interface to the KACE SMA. The interface is designed
primarily to configure the appliance and enforce policies if the Administrator Console is not accessible. See
Power-on the appliance and log in to the Administrator Console.
Computers
Computers is a category of devices that can be managed by the KACE SMA. Examples of Computers
include personal computers, servers, laptops, tablets, and smart phones. Your KACE SMA license
agreement entitles you to manage a specified number of Computers. See Managed Computers .
Credentials Management
Credentials Management enables you to organize the usernames and passwords required for logging in to
other systems, such as managed computers and servers, and the information required for Google or SNMP
authentication. This streamlines the process of entering and managing credentials and authentication
information. See Managing credentials.
Trademarks
Quest, the Quest logo, Join the Innovation, and KACE are trademarks and registered trademarks of Quest
Software Inc. For a complete list of Quest marks, visit https://www.quest.com/legal/trademark-information.aspx.
All other trademarks and registered trademarks are property of their respective owners.
Legend
CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not
followed.
IMPORTANT, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information.
KACE Systems Management Appliance Administrator Guide
Updated - January 2019
Software Version - 9.1