26
IBM Endpoint Manager for Software Use Analysis Version 2.2 Overview Guide

IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

  • Upload
    others

  • View
    13

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

IBM Endpoint Manager for Software Use AnalysisVersion 2.2

Overview Guide

���

Page 2: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and
Page 3: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

IBM Endpoint Manager for Software Use AnalysisVersion 2.2

Overview Guide

���

Page 4: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

Overview guide

This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57)and to all subsequent releases and modifications until otherwise indicated in new editions.

© Copyright IBM Corporation 2002, 2013.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contractwith IBM Corp.

Page 5: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

Contents

Overview . . . . . . . . . . . . . . 1What's new in this release . . . . . . . . . . 1Features and functions . . . . . . . . . . . 3Business benefits . . . . . . . . . . . . . 3Software Use Analysis infrastructure . . . . . . 4Company roles . . . . . . . . . . . . . 5Key concepts . . . . . . . . . . . . . . 7

Software catalog . . . . . . . . . . . . 7Raw data discovery and matched signatures. . . 8Contracts . . . . . . . . . . . . . . 9

Getting up and running . . . . . . . . . . 9Scenarios . . . . . . . . . . . . . . . 10

Discovering software within an IT infrastructure 10Maintaining catalog to improve software scans 10Discovering unused licensed copies of software 11

Documentation notices. . . . . . . . . . . 11Disclaimer . . . . . . . . . . . . . . 13Trademarks . . . . . . . . . . . . . 13

Notices . . . . . . . . . . . . . . 15Trademarks . . . . . . . . . . . . . . 16

Index . . . . . . . . . . . . . . . 17

© Copyright IBM Corp. 2002, 2013 iii

Page 6: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

iv

Page 7: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

OverviewUse this section to become familiar withSoftware Use Analysis infrastructure and keyconcepts that are necessary to understandhow the application works.

A well-planned software asset management process puts you in a strongernegotiating position with software vendors and reduces the risk of licensenoncompliance. With software asset management implementation in place, youalways know what software you have, where it is, and how it is used. Thisinformation is critical from both operational and strategic standpoints. It helps youto reduce costs, lower risk, and bring every IT asset into legal compliance.

Information about installed software, and hardware, as well as software use iscollected from monitored computers. Users can access the information from a webuser interface that includes a series of reporting options.

What's new in this releaseSoftware Use Analysis version 2.2 provides new features and enhancements thatfacilitate your work with the application.

Patch 8 Merged scanners

Starting from patch 8, the software inventory tool and Common InventoryTechnology scanners are merged into one. It simplifies scan management andreduces the related workload. Additionally, the merged scanner offers thefollowing enhancements:v You can choose the type of scan that is to be run: catalog-based, file system,

package data, or application usage statistics.v You can limit the amount of processor resources that the scanner consumes by

setting the CPU thresholdv You can change the scanner trace settingsv You can collect scanner diagnostic data that helps in investigating problems with

the software inventory

As a result of the change, fixlets for the software inventory tool and CommonInventory Technology scanners are deprecated. They are substituted with fixlets forthe merged scanner.

Improved server installer

The new server installer has an improved user interface that is built on theInstallAnywhere framework. It performs an extra validation of installationparameters. If you encounter a problem during the installation of the server, youcan easily diagnose and repair it, and then rerun the failed step.

© Copyright IBM Corp. 2002, 2013 1

Page 8: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

Simple catalog management

You can use the built-in catalog management functionality to create simplesignatures. They will be used to detect software products that are installed in yourinfrastructure but are not present in the IBM® catalog. You can add new entries aswell as edit and delete software publishers, products, versions, releases,components, and signatures that exist in your custom catalog. What is more, youcan now easily create software signatures that are based on scan data or registrydata with only one click. For detailed procedures, see: Creating signatures fromregistry data and Creating signatures from scan data.

Catalog with customizations can be exported into native format and uploaded intoa new Software Use Analysis installation before the initial import.

Restriction: Native format overwrites the existing catalog. It can only be importedinto a fresh Software Use Analysis installation.

Unrecognized files report

The report lists 1000 unrecognized files that are most frequently encountered inyour infrastructures. You can use this information to facilitate the process ofcreating signatures. For example, you deploy a new software item on 100computers in your infrastructure, and you want to create a signature to detect thatsoftware. You can view the list of the most common unrecognized files and lookfor a file that was found on 100 computers. It is likely that this file can be used todetect the new software.

Improved usage data monitoring

Scan Data report contains two new columns: Recognized and Caused Detection.The value in the Recognized column indicates whether a particular file is alreadydefined as a software signature. The value in the Caused Detection columnindicates whether the file caused that a software product was detected in yourinfrastructure. You can use this information to facilitate the process of creatingsignatures by eliminating duplication of signature definitions.

Contract Usage Data report contains two new columns: Entitled Computers andLicensed Computers. The first one shows the computers that are entitled to useparticular software, for example by being a part of a computer group specified inthe contract. The second column shows the computers that are entitled to use thesoftware and have this software installed. The values in the columns are links tosub-reports that list the computers.

Improved roles system

Software Use Analysis version 2.2 provides a flexible system of granting accessrights to the users. You can now create roles that are based on the business needsof the users. You can grant every user with most suitable permissions, such as theright to view endpoints or edit the software catalog.

Custom fields in contracts

You can now create an unlimited number of custom fields in which you canprovide extra information that pertains to your software contracts.

2

Page 9: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

Features and functionsSoftware Use Analysis features fall under three headings: scans and signaturediscovery, software catalog and signatures, and reports and contracts.

Scans and signature discovery

Software Use Analysis scans your infrastructure with software inventory and usagescans to determine what software is installed on the monitored computers.Software Use Analysis uses the software catalog to match signatures that arediscovered by the scans with software products that are installed in yourinfrastructure.

Software catalog and signatures

The software catalog contains information about software products, and signaturedefinitions that allow products to be detected by inventory and usage scans. Newsoftware signatures can be defined for software items that are present on acomputer, but are not present in the catalog.

Reports and contracts

Reports contain detailed information about the computers in your infrastructureand the software items that are installed on these computers. Contracts are used tomanage information about licenses for the software products that are installed inyour infrastructure and to track spending that is associated with those licenses. Acontract contains information about the cost of acquiring and maintaining a license,as well as its entitlement start and end dates.

Business benefitsBy continuously monitoring installed software, its location, and its use, EndpointManager for Software Use Analysis offers valuable benefits to your enterprise.

Costs reductionYou can reduce software total cost of ownership (TCO) by identifyingwhich software products are used the least and removing them from yourinfrastructure. You can also improve budgeting and planning processes,reduce system support costs, and minimize internal IT audit expenses.Taken together, these improvements, reduce the overall cost of softwareasset management maintenance.

Lower liability risksYou can reduce the risk of not meeting your contractual licensingconditions. You can also avoid making license compliance payments byaligning software assets with legal licenses and ensuring that no unlicensedsoftware is used.

Accurate information about your software inventoryYou can stay up-to-date with information about your software inventory,its location, and use by producing customized reports based on accurateinformation from the endpoints.

Audit readinessYou can conduct an in-depth internal audit of your resources to anticipateand prevent possible compliance issues before they arise.

Overview 3

Page 10: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

SecurityYou can improve desktop and network security. You can reduce thechances of viruses and defective programs by running authorized softwareonly.

Software Use Analysis infrastructureThe typical deployment of IBM Endpoint Manager for Software Use Analysisreuses the Endpoint Manager infrastructure: the server, its clients, which are alsocalled agents, the database, and the console. The Software Knowledge Base Toolkitapplication is used to manage the software catalog and process the raw data that isimported from Software Use Analysis.

The following diagram shows how the Software Use Analysis application interfaceswith Endpoint Manager server installation.

IBM EndpointManager client

Software Use Analysisserver Database

IBM EndpointManager client

IBM EndpointManager client

IBM Endpoint Manager server Database

Software Knowledge BaseToolkit server Database

Web userinterface

Web userinterface

Console

IBM Endpoint Manager infrastructure

Software Use Analysis server

The Software Use Analysis server provides a reporting interface for theinventory and limited application usage data that is collected on theendpoints that are managed by Endpoint Manager. Inventory data isextracted from the Endpoint Manager server database and imported intothe Software Use Analysis database by using the Extract, Transform, andLoad (ETL) import process. Software Use Analysis users access theapplication server from their computers by using a web browser.

You can use the built-in catalog management functionality to create simplesignatures that are based on scan data or registry data. They will be used

Figure 1. Software Use Analysis infrastructure

4

Page 11: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

to detect software products that are installed in your infrastructure but arenot present in the IBM catalog. You can add new entries as well as editand delete software publishers, products, versions, releases, components,and signatures that exist in your custom catalog. If you want to createcomplex signatures, you must use Software Knowledge Base Toolkit.

The server can only be installed on the Windows platform.

Software Knowledge Base ToolkitThe Software Knowledge Base Toolkit server manages the content of thesoftware catalog. The Software Knowledge Base Toolkit database containsinformation about the current knowledge base content such asmanufacturers, software products, and signatures. It also contains licenserelationships between software products. The application is optional andcan be used for advanced management of the software catalog content. Ifyou do not want to create complex signatures, you can use the simplecatalog management functionality that is available in Software UseAnalysis.

Software Knowledge Base Toolkit that is provided with Software UseAnalysis runs only on Windows operating system.

Endpoint Manager serverThe Endpoint Manager server offers a collection of services, includingapplication services, a web server, and a database server, forming the heartof the Endpoint Manager system. The server coordinates the flow ofinformation to and from individual computers and stores the results in theEndpoint Manager database.

Endpoint Manager consoleThe Endpoint Manager console ties several components together to provideadministrators with a system-wide view of all computers in a network,together with their configurations. An authorized user can quicklydistribute fixlets to each computer and a task to be executed, such asscheduling or starting a software scan.

Endpoint Manager clientsEndpoint Manager clients, also called agents, are installed on everycomputer that is to be managed under Endpoint Manager. They collectinformation about the software that is installed on the computers in yourinfrastructure and send this data to the Endpoint Manager server. You canthen import the data to the Software Use Analysis server by using afunction on the Software Use Analysis web user interface.

The client software runs on Windows, Linux, Solaris, HP-UX, and AIXoperating systems.

For information about network traffic within the IBM Endpoint Manager network,see: Network Traffic Guide.

Company rolesA number of roles can be distributed among the company employees to ensurethat Software Use Analysis functions appropriately. The roles include softwareasset management director, corporate procurement, IT asset manager, financemanager, and business unit asset manager.

To make sure that the software asset management applications functions efficiently,you can assign the following roles:

Overview 5

Page 12: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

Software Asset Management DirectorsOwn the overall implementation process and ensure that the primarycomponents of the application are current, accurate, and primed for easymaintenance. They get stakeholders involved to ensure a smooth transitionto the new Software Use Analysis system. They also keep seniormanagement apprised of the progress and the status of the implementationplan.

Corporate Procurement DepartmentPurchases new software products or upgrades and tracks the associatedsoftware licenses and contracts. The department is also responsible forupdating and maintaining the Software Use Analysis contract database toensure that the asset reports are accurate and up-to-date.

IT Asset ManagersInstall and track new or upgraded software products and maintain thecontracts database of software asset management. They also understandhow the Software Use Analysis application is deployed across thetechnology resources of the company. IT Asset Managers typically workclosely with the director to ensure that the flow of information to and fromSoftware Use Analysis is efficient and reliable.

Finance ManagersUse Software Use Analysis to fulfil compliance obligations and manage thecosts of software installed in your infrastructure. Finance Managers are theprimary customer of the Software Use Analysis reports and use thisinformation to document compliance for both internal and externalauditors. They use the reports to give management accurate data about theuse of software and to suggest cost savings.

Business Unit Asset ManagersOversee the software asset tracking for their own business units. They areresponsible for the day-to-day software asset management within theirorganization. They work closely with the director to ensure that the needsof their business unit do not conflict with the Software Use Analysisrequirements. They also cooperate with the director to facilitate smoothimplementation that ensures the fulfillment of compliance obligations andcost savings.

The figure shows how a typical plan of implementing the software assetmanagement program might be structured with the use of resources available inthe company.

6

Page 13: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

Technical components

IT Asset & FinanceManagers

CorporateProcurement

BusinessUnitAssetmanagers

SoftwareAssetManagementDirector

ContractsUsersSoftware catalog

Input to software asset management technical components

Process flow & software asset management reports

Key conceptsUnderstanding important concepts facilitates the use of the application functions ina way that best fits your business processes and needs.

Software catalogThe software catalog is published by IBM. It can be maintained either by using thebuilt-in functionality in Software Use Analysis, or by using Tivoli® SoftwareKnowledge Base Toolkit.

The IBM software catalog is published on a monthly basis and can be downloadedfrom the IBM website. It contains signatures, which can be files, registry entries, orother identifiers that act as fingerprints for identifying software products. Whenone of these signatures is matched with raw data that is collected from theendpoints in your infrastructure, information from the catalog, such as the vendor,software product, and version that correspond to that signature is displayed in theExplore Inventory report in Software Use Analysis.

The custom catalog can be created and maintained by using the built-in catalogmanagement functionality that is available in Software Use Analysis. You cancreate and edit custom publishers, products, and simple software signatures thatare used to detect that software. However, the built-in functionality cannot be usedto create complex signatures. Such signatures can be created by using TivoliSoftware Knowledge Base Toolkit.

Signatures can be edited only in the application in which they were created. If youuse both simple catalog management functionality and Tivoli Software KnowledgeBase Toolkit for catalog customization, entries from both sources are notoverwritten. However, they might be duplicated. In such a situation, you candecide in which application you want to continue maintaining such entries.

Overview 7

Page 14: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

The diagram represents the catalog definition for the product Draw Pro. It showshow the various catalog definitions are related and how they provide a structurethat supports software identification.

1.2 for

Windows

2.1 for

Windows

2.21.1 for

UNIX

1.2 for

UNIX

2.1 for

UNIX

1.1 for

Windows

1.1 for

Windows

1.2 for

Windows

2.1 for

Windows

1.1 for

UNIX

1.2 for

UNIX

2.1 for

UNIX

Signature

Component

Draw Pro 2Draw Pro 1

Release

Draw Pro 1.2Draw Pro 1.1

Version

Product

Draw Pro 2.2Draw Pro 2.1

Draw Pro

Scenarios supported only in Software Knowledge Base Toolkit

Draw Pro is available as a native program on Windows and UNIX systems. Thecomponent definitions represent physical programs and are linked to the productstructure at release level. The signature definitions are used to identify theprograms. The software catalog uses different types of signatures. The mostcommon types are file and registry signatures. File signatures that are gathered bythe software inventory tool scanner and registry signatures are represented bypackage strings, which come from the Uninstall keys in Windows registry or fromvarious packaging systems on UNIX endpoints. When particular software isinstalled on a computer, it leaves a specific artifact in a file system or registry thatidentifies that product. In this case, the signature for Draw Pro 1.1 on Windows isdraw11.exe and on UNIX is draw11.bin. If either of these files is discovered on anendpoint, Software Use Analysis tries to match it against software catalog entriesduring the import process. When it finds a match, it can identify the product asDraw Pro 1.1.

Raw data discovery and matched signaturesRaw data is the unprocessed data that can be used to create new signatures in thesoftware catalog for unmatched software items.

Raw data includes a list of files that were found on the system and nativeinstallation registry entries. The data is obtained by monitoring process tables of

8

Page 15: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

the endpoints in your infrastructure. It can be used to create and diagnosesignatures. Signatures are file names, registry entries, and other types ofinformation which is unique to a particular software item and can be used toidentify it.

Endpoint Manager clients, also called agents, are installed on every computer thatis managed under Endpoint Manager. The clients collect information about thesoftware that is installed on the endpoints in your infrastructure and send the rawdata to the Endpoint Manager server. You import this data into the Software UseAnalysis server by using the Extract, Transform, and Load (ETL) import process.The Software Use Analysis server matches discovery data with the software catalogand generates the inventory and usage reports. If you view the raw usage datareport and find a software item that is not matched by any signature from yourcurrent software catalog, you can create a signature for that item based on the rawdata.

ContractsA contract contains information about the cost of acquiring and maintaining alicense as well as its entitlement start and end dates. You use contracts to manageinformation about licenses for the software products that are installed in yourinfrastructure.

You can assign contracts to specific computer groups to indicate which computersare entitled to use particular software.

Contract usage reports show the relation between the number of software instancesthat you are entitled to, and the actual number of software instances that are used.You can reduce spending on unused licenses, and track computers that useunlicensed instances of a particular software product. You can also track thespending associated with software licenses and manage the costs of extending ordownsizing licenses.

Getting up and runningYou must perform a number of tasks before you can view reports and createcontracts.

Procedure1. Subscribe to the IBM Software Inventory site. To ensure that the scans of

your infrastructure are complete, you must deploy the scanner on the targetendpoints. Additionally, you must create policy actions to regularly run scansand upload scan results. You must also activate analyses to view andsummarize various properties of client computers across your infrastructure.

2. Optional: Install Software Knowledge Base Toolkit. You can use SoftwareKnowledge Base Toolkit to store information about the software products thatare installed in your infrastructure and the means to discover those products.Installation of Software Knowledge Base Toolkit is not mandatory to get up andrunning. Software Use Analysis has an embedded software catalog and simplecatalog management functionality that you can use to create and manage yourcustom catalog content. However, Software Knowledge Base Toolkit isnecessary if you want to perform advanced catalog management.

3. Install Endpoint Manager for Software Use Analysis. The Software UseAnalysis server provides a reporting interface for the inventory, and limitedapplication usage data that is collected and managed by Endpoint Manager.

Overview 9

Page 16: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

4. Configure the Software Use Analysis server. To take full advantage of thefunctions that are provided by Software Use Analysis, perform a set ofpostinstallation tasks. The tasks include setting up users, computers, andcomputer groups, as well as importing the software scan data into SoftwareUse Analysis.

5. View and customize reports. You use reports as a source of detailedinformation about the computers in your infrastructure and the software itemsthat are installed on these computers.

6. Create contracts. You use contracts to manage information about licenses forthe software products that are installed in your infrastructure.

7. Maintain software catalog.

a. Download and update a software catalog by using the built-infunctionality. If you use the built-in catalog management functionality tocreate your customized catalog content, you must download the latestsoftware catalog from the IBM Endpoint Manager server and update thecatalog directly in Software Use Analysis.

b. Import and publish the software catalog by using Software KnowledgeBase Toolkit. If you decide to install Software Knowledge Base Toolkit, youmust import the content of a software catalog in the form of a canonical 2.0XML file into Software Knowledge Base Toolkit. The import ensures that thedata that you use for discovering software is up-to-date. Then, you mustpublish the catalog so that it can be used for software discovery bySoftware Use Analysis.

ScenariosTo understand the business goals that you can achieve with Endpoint Manager forSoftware Use Analysis, familiarize yourself with the main user scenarios. Thescenarios present tasks that can be performed by the users of the application tofacilitate and automate their work.

Discovering software within an IT infrastructureYou can use Software Use Analysis to automate the process of discovering softwarethat is installed within the IT infrastructure of your enterprise.1. You want to create an inventory of all software items that are installed on the

computers in your entire IT infrastructure. To gather that data, the EndpointManager clients scan the computers and generate information about thesoftware that is installed on these computers. The scans must be run on aregular basis to provide information that is accurate and up-to-date. As adefault, the scans are carried out on a weekly basis.

2. Upload the data collected during the scan to the Endpoint Manager server.3. Next, import the data about the software items to Software Use Analysis.4. After the import, you can view the raw usage data that regards all applications

installed in your infrastructure. You can also view information about softwareusage, licenses, and other.

Maintaining catalog to improve software scansWhen you deploy a new software item in your infrastructure, you can create asignature and update the software catalog to ensure that the software is properlydetected. Keeping your software catalog up-to-date ensures that it is consistentwith the current state of your IT infrastructure.

10

Page 17: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

1. You installed IBM Lotus Notes on 50 computers in your infrastructure.However, the application was not detected and is not displayed in any report.

2. You want to create a signature that will be used to detect the application. Youopen the Unrecognized Files report, and look for a file that was found on 50computers. You can also check whether the file paths of the unmatched file arethe same as the application installation paths.

3. You use the file to create a signature.4. You import the latest software scan data and verify whether the application

was properly detected. If all instances of IBM Louts Notes were found, youhave an accurate software inventory. If the application is still not detected, trycreating a different signature.

Discovering unused licensed copies of softwareYou can plan future spending on software licenses by obtaining and analyzinginformation about unused copies of licensed software. You can also check whetherthere are any spare licenses for a software product that can be distributed in yourcompany.1. You obtained 100 two-year licenses for IBM Lotus Notes®. To track the

maintenance cost of the licenses, their usage, and their expiry dates, you createa contract for that product.

2. When the expiry date for the licenses approaches, you want to verify whetherthe number of licensed copies of IBM Lotus Notes matches the actual needs ofyour company. You also want to reduce the license-related spending byeliminating or redistributing the instances of IBM Lotus Notes that arecurrently unused.

3. To find out how many licenses for the product are used, you go to the ContractUsage report. You analyze the report and find out that 20 of the 100 licensedcopies of IBM Lotus Notes are not used.

4. You can either extend the licenses for only the 80 copies of the product that arecurrently used or distribute the 20 outstanding copies among users who didnot have the product before. In this way, you can reduce the spending andmanage your license resources in a more efficient way.

Documentation noticesThis information was developed for products and services offered in the U.S.A.

IBM may not offer the products, services, or features discussed in this document inother countries. Consult your local IBM representative for information about theproducts and services currently available in your area. Any reference to an IBMproduct, program, or service is not intended to state or imply that only that IBMproduct, program, or service may be used. Any functionally equivalent product,program, or service that does not infringe any IBM intellectual property right maybe used instead. However, it is the user's responsibility to evaluate and verify theoperation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matterdescribed in this document. The furnishing of this document does not grant youany license to these patents. You can send license inquiries, in writing, to:

IBM Director of LicensingIBM CorporationNorth Castle DriveArmonk, NY 10504-1785 U.S.A.

Overview 11

Page 18: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

For license inquiries regarding double-byte character set (DBCS) information,contact the IBM Intellectual Property Department in your country or sendinquiries, in writing, to:

Intellectual Property LicensingLegal and Intellectual Property LawIBM Japan, Ltd.1623-14, Shimotsuruma, Yamato-shiKanagawa 242-8502 Japan

The following paragraph does not apply to the United Kingdom or any othercountry where such provisions are inconsistent with local law:INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THISPUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHEREXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESSFOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express orimplied warranties in certain transactions, therefore, this statement may not applyto you.

This information could include technical inaccuracies or typographical errors.Changes are periodically made to the information herein; these changes will beincorporated in new editions of the publication. IBM may make improvementsand/or changes in the product(s) and/or the program(s) described in thispublication at any time without notice.

Any references in this information to non-IBM websites are provided forconvenience only and do not in any manner serve as an endorsement of thosewebsites. The materials at those websites are not part of the materials for this IBMproduct and use of those websites is at your own risk.

IBM may use or distribute any of the information you supply in any way itbelieves appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purposeof enabling: (i) the exchange of information between independently createdprograms and other programs (including this one) and (ii) the mutual use of theinformation which has been exchanged, should contact:

IBM Corporation2Z4A/10111400 Burnet RoadAustin, TX 79758 U.S.A

Such information may be available, subject to appropriate terms and conditions,including in some cases, payment of a fee.

The licensed program described in this information and all licensed materialavailable for it are provided by IBM under terms of the IBM Customer Agreement,IBM International Program License Agreement, or any equivalent agreementbetween us.

Information concerning non-IBM products was obtained from the suppliers ofthose products, their published announcements or other publicly available sources.IBM has not tested those products and cannot confirm the accuracy of

12

Page 19: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

performance, compatibility or any other claims related to non-IBM products.Questions on the capabilities of non-IBM products should be addressed to thesuppliers of those products.

This information contains examples of data and reports used in daily businessoperations. To illustrate them as completely as possible, the examples include thenames of individuals, companies, brands, and products. All of these names arefictitious and any similarity to the names and addresses used by an actual businessenterprise is entirely coincidental.

DisclaimerIBM’s statements regarding its plans, directions, and intent are subject to change orwithdrawal without notice at IBM’s sole discretion. Information regarding potentialfuture products is intended to outline our general product direction and it shouldnot be relied on in making a purchasing decision. The information mentionedregarding potential future products is not a commitment, promise, or legalobligation to deliver any material, code or functionality. Information aboutpotential future products may not be incorporated into any contract. Thedevelopment, release, and timing of any future features or functionality describedfor our products remains at our sole discretion.

TrademarksIBM, the IBM logo, and ibm.com are trademarks or registered trademarks ofInternational Business Machines Corp., registered in many jurisdictions worldwide.Other product and service names might be trademarks of IBM or other companies.A current list of IBM trademarks is available on the Web at “Copyright andtrademark information” at www.ibm.com/legal/copytrade.shtml.

Adobe, the Adobe logo, PostScript, and the PostScript logo are either registeredtrademarks or trademarks of Adobe Systems Incorporated in the United States,and/or other countries.

Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks orregistered trademarks of Intel Corporation or its subsidiaries in the United Statesand other countries.

Java and all Java-based trademarks and logos are trademarks or registeredtrademarks of Oracle and/or its affiliates.

Linux is a registered trademark of Linus Torvalds in the United States, othercountries, or both.

Microsoft, Windows, Windows NT, and the Windows logo are trademarks ofMicrosoft Corporation in the United States, other countries, or both.

UNIX is a registered trademark of The Open Group in the United States and othercountries.

Terms and conditionsPermissions for the use of these publications are granted subject to the followingterms and conditions.

Overview 13

Page 20: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

Personal use: You may reproduce these publications for your personal,noncommercial use if all proprietary notices are preserved. You may not distribute,display or make derivative work of these publications, or any portion thereof,without the express consent of IBM.

Commercial use: You may reproduce, distribute, and display these publicationssolely within your enterprise if all proprietary notices are preserved. You may notmake derivative works of these publications, or reproduce, distribute, or displaythese publications or any portion thereof outside your enterprise, without theexpress consent of IBM.

Except as expressly granted in this permission, no other permissions, licenses, orrights are granted, either express or implied, to the Publications or anyinformation, data, software or other intellectual property contained therein.

IBM reserves the right to withdraw the permissions granted herein whenever, in itsdiscretion, the use of the publications is detrimental to its interest or, asdetermined by IBM, the above instructions are not being properly followed.

You may not download, export, or re-export this information except in fullcompliance with all applicable laws and regulations, including all United Statesexport laws and regulations.

IBM MAKES NO GUARANTEE ABOUT THE CONTENT OF THESEPUBLICATIONS. THE PUBLICATIONS ARE PROVIDED "AS-IS" AND WITHOUTWARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDINGBUT NOT LIMITED TO IMPLIED WARRANTIES OF MERCHANTABILITY,NON-INFRINGEMENT, AND FITNESS FOR A PARTICULAR PURPOSE.

IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks ofInternational Business Machines Corp., registered in many jurisdictions worldwide.Other product and service names might be trademarks of IBM or other companies.A current list of IBM trademarks is available on the Web at “Copyright andtrademark information” at www.ibm.com/legal/copytrade.shtml.

14

Page 21: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

Notices

This information was developed for products and services offered in the U.S.A.

IBM may not offer the products, services, or features discussed in this document inother countries. Consult your local IBM representative for information on theproducts and services currently available in your area. Any reference to an IBMproduct, program, or service is not intended to state or imply that only that IBMproduct, program, or service may be used. Any functionally equivalent product,program, or service that does not infringe any IBM intellectual property right maybe used instead. However, it is the user's responsibility to evaluate and verify theoperation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matterdescribed in this document. The furnishing of this document does not grant youany license to these patents. You can send license inquiries, in writing, to:

IBM Director of LicensingIBM CorporationNorth Castle DriveArmonk, NY 10504-1785 U.S.A.

For license inquiries regarding double-byte character set (DBCS) information,contact the IBM Intellectual Property Department in your country or sendinquiries, in writing, to:

Intellectual Property LicensingLegal and Intellectual Property LawIBM Japan, Ltd.1623-14, Shimotsuruma, Yamato-shiKanagawa 242-8502 Japan

The following paragraph does not apply to the United Kingdom or any othercountry where such provisions are inconsistent with local law:INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THISPUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHEREXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESSFOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express orimplied warranties in certain transactions, therefore, this statement may not applyto you.

This information could include technical inaccuracies or typographical errors.Changes are periodically made to the information herein; these changes will beincorporated in new editions of the publication. IBM may make improvementsand/or changes in the product(s) and/or the program(s) described in thispublication at any time without notice.

Any references in this information to non-IBM Web sites are provided forconvenience only and do not in any manner serve as an endorsement of those Websites. The materials at those Web sites are not part of the materials for this IBMproduct and use of those Web sites is at your own risk.

© Copyright IBM Corp. 2002, 2013 15

Page 22: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

IBM may use or distribute any of the information you supply in any way itbelieves appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purposeof enabling: (i) the exchange of information between independently createdprograms and other programs (including this one) and (ii) the mutual use of theinformation which has been exchanged, should contact:

IBM Corporation2Z4A/10111400 Burnet RoadAustin, TX 79758 U.S.A

Such information may be available, subject to appropriate terms and conditions,including in some cases, payment of a fee.

The licensed program described in this information and all licensed materialavailable for it are provided by IBM under terms of the IBM Customer Agreement,IBM International Program License Agreement, or any equivalent agreementbetween us.

Information concerning non-IBM products was obtained from the suppliers ofthose products, their published announcements or other publicly available sources.IBM has not tested those products and cannot confirm the accuracy ofperformance, compatibility or any other claims related to non-IBM products.Questions on the capabilities of non-IBM products should be addressed to thesuppliers of those products.

This information contains examples of data and reports used in daily businessoperations. To illustrate them as completely as possible, the examples include thenames of individuals, companies, brands, and products. All of these names arefictitious and any similarity to the names and addresses used by an actual businessenterprise is entirely coincidental.

TrademarksIBM, the IBM logo, and ibm.com are trademarks or registered trademarks ofInternational Business Machines Corp., registered in many jurisdictions worldwide.Other product and service names might be trademarks of IBM or other companies.A current list of IBM trademarks is available on the Web at “Copyright andtrademark information” at www.ibm.com/legal/copytrade.shtml.

Java™ and all Java-based trademarks and logos are trademarks or registeredtrademarks of Oracle and/or its affiliates.

Linux is a registered trademark of Linus Torvalds in the United States, othercountries, or both.

Microsoft and Windows are trademarks of Microsoft Corporation in the UnitedStates, other countries, or both.

UNIX is a registered trademark of The Open Group in the United States and othercountries.

16

Page 23: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

Index

© Copyright IBM Corp. 2002, 2013 17

Page 24: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

18

Page 25: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and
Page 26: IBM Endpoint Manager for Software UseAnalysis Version 2€¦ · This edition applies to version 2.2 of IBM Endpoint Manager for Software Use Analysis (product number 5725-F57) and

����

Printed in USA