list and description of altiris reports -...

64
Altiris Web Reports 6.0 Prepared by [email protected] April 16, 2004 Page 1 of 64 Assets and Inventory Asset Management All Assets Detail of all assets. All Resources Detail of all resources in the database. Accounting Capital cost by Cost Center Cash Flow by Cost Center Show cash flow for a given period for the given cost center. Filter by Cost Center and Asset Type. Depreciation by Cost Center Loss On Disposal by Cost Center Summed Cost Items by Asset Type Summed Cost Items by Asset Type. Asset Control and Ownership Show assets where the owner of the asset and the owner of the attached device differ. Assets that Primary User differs from Asset Owner Show assets where the owner and the primary user differ. Assets with no Cost Center Show assets where no cost center is indicated. Assets with no Location Show assets without a location. Assets with no Owner Show assets without an owner. Owned Assets Summary of owned assets. Asset Type Assets by Type, Status, Location and Cost Center Assets by Type, Status, Location, and Cost Center. Assets Created in Last N Days Assets Missing Asset Tag Show all assets missing asset tag entry. Assets Missing Bar Code Show all assets missing bar code entry. Assets Missing Serial Number Show all assets missing a serial number. Assets Modified in Last N Days Assets with Multiple Owners Show all assets with more than one owner. Count of Assets by Cost Center Display a count of all assets by cost center. Count of Assets by Location Display a count of all assets by location. Count of Assets by Manufacturer Display a count of all assets by manufacturer name. Count of Assets by Status Display a count of assets by status: RMA, In Stock, Active, Retired, Disposed, On Order, Missing. Count of Assets By Type Computer All Computers All Computers (filters for OS Type, Status, Location, Cost Center). All Unmanaged Computers Lists all computers stored in the system that do not have the Altiris Agent installed on them. Count of Computers by OS Type Count of computers by OS Type. Cost Center List of Cost Centers By Location List of cost centers by location. Department Departments by Location and Cost Center List of departments by location and cost centers. Disposal Assets Disposed from 'N' to 'N' List of assets disposed between two specified dates. Assets Disposed in the last N Days List of assets disposed in the last n days. Location List of Locations by Cost Center List of Locations by Cost Center. Search Asset Search Resource Search Stock 'In Stock' Assets by Cost Center Details of "In Stock" assets by cost center. 'In Stock' Assets by Location Details of "In Stock" assets by location. 'In Stock' Assets older than 'N' days User Total Cost by User Total cost associated to a user. Users By Department and Company List of users by department and company. Users by Office Location Users by office location. Contract Management All Contracts All Lease Schedules All Master Leases All Master License Agreements All Software Licenses All Software Purchases All Unassigned Contracts All Virtual License Agreements All Warranties Contracts Active Contracts Details of all active contracts. Contracts Expiring in N Days Details of expiring contracts. Count of Contracts By Type Count of Contracts by contract type. Expired Contracts List of contracts that have expired. Lease Schedule Lease Schedule Covered Asset by Asset Type List of assets covered by a lease schedule by asset type. Serial Numbers not Appearing as Assets Serial numbers not appearing as assets. Master Lease List of Lease Schedules List of lease schedules. Master Lease Covered Asset by Asset Type List of assets covered by a master lease by asset type. Master License Agreement Authorized Usage (Primary User) - Previous Month Details of prior month's authorized usage for a particular software license agreement. List of Software Licenses List of software license agreements. Search Contract Search Software License Authorized Installations Details of authorized software installations. Authorized Usage (Owner) Details of authorized software usage by owner for given software license. Details of authorized software usage by primary user for given software license for current month. Product Installed And Used Details of software products installed versus used. Software Purchases Details of purchased software licenses. Software Upgrades Details of software upgrade licenses. Unique Installs Details of unique software installation by software license agreement. Virtual License Agreement List of Software Licenses Detail list of all software license agreements. Inventory Macintosh Computer Summary Count of Computers by Computer Model Count of computers by computer model. List Computer Summary List Computer Summary With Count of Applications Deployment Count Audit Software Agent by Version Count Computers Running Audit Software Agent Distinct List of Files With Missing File Information Inventory Scan Summary List Inventory Agents Status and Version This report displays the inventory agents status and version. Show capital cost for a given period for the given cost center. Filter by Cost Center and Asset Type Show depreciation for a given period for the given cost center. Filter by Cost Center and Asset Type. Show loss on disposal for a given period for the given location or cost center. Filter by Cost Center and Asset Type. Assets that have attached devices with different owners Specify the parameter, n, number of days and view all assets created in that range. Show all assets with records modified in the last n days. This report lists distinct assets types and the number of them contained in the Notification Server database. Searches through assets for text data. Filterable by asset type, asset status and data class. The number of results returned and the maximum length of time for which the search will be carried out can be configured. Searches through resources for text data. Filterable by resource type and data class. The number of results returned and the maximum length of time for which the search will be carried out can be configured. Details of "In Stock" assets older than n days. Searches through contract resources for text data. Filterable by resource type and data class. The number of results returned and the maximum length of time for which the search will be carried out can be configured. Authorized Usage (Primary User)—Month to Date Authorized Usage (Primary User)—Previous Month Details of authorized software usage by primary user for given software license for previous month. This report lists the identifying attributes of a computer including model, CPU, memory, disk, and network information. All computers are listed. You can drill down into the computer to view other details or take remote control. This report lists the identifying attributes of a Macintosh computer including manufacturer, model, cpu, memory, disk, and network information, and a count of applications running in package mode. All computers are listed. You can drill across to the Audit Summary reports and look at more detailed application information. This report lets you to determine what versions of the agent are deployed throughout your enterprise. The version also indicates whether the software is "evaluation" or "registered." Drill down into the graph to view the list of computers. This report counts the number of computers that are running audit (that is, those that have reported at least one result) and the number of computers that are not running audit. Drill down into the graph to view the list of computers. This report displays a distinct list of applications with missing resource data. Drill down into a particular file to view a summary of the resource information. Drill down again to view the list of all computers. You can use the data from this report to determine which directories and files to exclude, and which files you want audit to cleanup by overriding the resource information. This report displays the total inventory size of all computers and the average size and audit scan time. This information should be used for capacity planning. Total size represents network and database usage. List Computers Not Reporting Audit Software Data in Last 'N' Days This report lets you determine which computers are not reporting regularly. Typically you will schedule the running of the agent using SMS advertisements. The report will indicate the number of days since the last report of any data. List Computers Not Reporting Inventory in Last 'N' days This report lists computers that have reported no inventory in the last n days.

Upload: trinhdat

Post on 07-Aug-2018

227 views

Category:

Documents


0 download

TRANSCRIPT

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 1 of 76

Assets and InventoryAsset ManagementAll Assets Detail of all assets.All Resources Detail of all resources in the database.AccountingCapital cost by Cost Center Show capital cost for a given period for the given cost center. Filter by Cost Center and Asset Type

Cash Flow by Cost Center Show cash flow for a given period for the given cost center. Filter by Cost Center and Asset Type.

Depreciation by Cost Center Show depreciation for a given period for the given cost center. Filter by Cost Center and Asset Type.

Loss On Disposal by Cost CenterSummed Cost Items by Asset Type Summed Cost Items by Asset Type.Asset Control and OwnershipAssets that have attached devices with different owners Show assets where the owner of the asset and the owner of the attached device differ.

Assets that Primary User differs from Asset Owner Show assets where the owner and the primary user differ.Assets with no Cost Center Show assets where no cost center is indicated.Assets with no Location Show assets without a location.Assets with no Owner Show assets without an owner.Owned Assets Summary of owned assets.Asset TypeAssets by Type, Status, Location and Cost Center Assets by Type, Status, Location, and Cost Center.Assets Created in Last N Days Assets Missing Asset Tag Show all assets missing asset tag entry.Assets Missing Bar Code Show all assets missing bar code entry.Assets Missing Serial Number Show all assets missing a serial number.Assets Modified in Last N DaysAssets with Multiple Owners Show all assets with more than one owner.Count of Assets by Cost Center Display a count of all assets by cost center.Count of Assets by Location Display a count of all assets by location.Count of Assets by Manufacturer Display a count of all assets by manufacturer name.Count of Assets by Status Display a count of assets by status: RMA, In Stock, Active, Retired, Disposed, On Order, Missing.

Count of Assets By Type This report lists distinct assets types and the number of them contained in the Notification Server database.

ComputerAll Computers All Computers (filters for OS Type, Status, Location, Cost Center).All Unmanaged Computers Lists all computers stored in the system that do not have the Altiris Agent installed on them.Count of Computers by OS Type Count of computers by OS Type.Cost CenterList of Cost Centers By Location List of cost centers by location.

DepartmentDepartments by Location and Cost Center List of departments by location and cost centers.

DisposalAssets Disposed from 'N' to 'N' List of assets disposed between two specified dates.Assets Disposed in the last N Days List of assets disposed in the last n days.

LocationList of Locations by Cost Center List of Locations by Cost Center.

SearchAsset Search

Resource Search

Stock'In Stock' Assets by Cost Center Details of "In Stock" assets by cost center.'In Stock' Assets by Location Details of "In Stock" assets by location.'In Stock' Assets older than 'N' days UserTotal Cost by User Total cost associated to a user.Users By Department and Company List of users by department and company.Users by Office Location Users by office location.Contract ManagementAll ContractsAll Lease SchedulesAll Master LeasesAll Master License AgreementsAll Software LicensesAll Software PurchasesAll Unassigned ContractsAll Virtual License AgreementsAll WarrantiesContractsActive Contracts Details of all active contracts.

Show loss on disposal for a given period for the given location or cost center. Filter by Cost Center and Asset Type.

Specify the parameter, n, number of days and view all assets created in that range.

Show all assets with records modified in the last n days.

Searches through assets for text data. Filterable by asset type, asset status and data class. The number of results returned and the maximum length of time for which the search will be carried out can be configured.

Searches through resources for text data. Filterable by resource type and data class. The number of results returned and the maximum length of time for which the search will be carried out can be configured.

Details of "In Stock" assets older than n days.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 2 of 76

Contracts Expiring in N Days Details of expiring contracts.Count of Contracts By Type Count of Contracts by contract type.Expired Contracts List of contracts that have expired.Lease ScheduleLease Schedule Covered Asset by Asset Type List of assets covered by a lease schedule by asset type.Serial Numbers not Appearing as Assets Serial numbers not appearing as assets. Master LeaseList of Lease Schedules List of lease schedules. Master Lease Covered Asset by Asset Type List of assets covered by a master lease by asset type.Master License AgreementAuthorized Usage (Primary User) - Previous Month Details of prior month's authorized usage for a particular software license agreement.List of Software Licenses List of software license agreements.SearchContract Search

Software License Authorized Installations Details of authorized software installations.Authorized Usage (Owner) Details of authorized software usage by owner for given software license.

Details of authorized software usage by primary user for given software license for current month.

Details of authorized software usage by primary user for given software license for previous month.

Product Installed And Used Details of software products installed versus used.Software Purchases Details of purchased software licenses.Software Upgrades Details of software upgrade licenses.Unique Installs Details of unique software installation by software license agreement.Virtual License AgreementList of Software Licenses Detail list of all software license agreements.Inventory MacintoshComputer SummaryCount of Computers by Computer Model Count of computers by computer model.List Computer Summary

List Computer Summary With Count of Applications

DeploymentCount Audit Software Agent by Version

Count Computers Running Audit Software Agent

Distinct List of Files With Missing File Information

Inventory Scan Summary

List Computers Not Reporting Inventory in Last 'N' days

List Inventory Agents Status and Version This report displays the inventory agents status and version.List New Computers Discovered in Last 'N' Days Hard DisksCount by Disk Volumes by Level The report groups volumes by size. Drill down to see the computers and the volumes.Count of Volumes by File System Type View count of disk volumes grouped by file system type.List Computers With no CDROM Drive List computers with no CD-ROM drive.

List of Disk Volumes Lists computers with one or more volume with less than n megabytes free disk space.

MemoryCount of Computers by OS and Physical Memory Size List Computers With Free Memory Slot Top 'N' Computers With Largest Physical Memory Size

Operating System

Searches through contract resources for text data. Filterable by resource type and data class. The number of results returned and the maximum length of time for which the search will be carried out can be configured.

Authorized Usage (Primary User)—Month to Date Authorized Usage (Primary User)—Previous Month

This report lists the identifying attributes of a computer including model, CPU, memory, disk, and network information. All computers are listed. You can drill down into the computer to view other details or take remote control.This report lists the identifying attributes of a Macintosh computer including manufacturer, model, cpu, memory, disk, and network information, and a count of applications running in package mode. All computers are listed. You can drill across to the Audit Summary reports and look at more detailed application information.

This report lets you to determine what versions of the agent are deployed throughout your enterprise. The version also indicates whether the software is "evaluation" or "registered." Drill down into the graph to view the list of computers.This report counts the number of computers that are running audit (that is, those that have reported at least one result) and the number of computers that are not running audit. Drill down into the graph to view the list of computers.This report displays a distinct list of applications with missing resource data. Drill down into a particular file to view a summary of the resource information. Drill down again to view the list of all computers. You can use the data from this report to determine which directories and files to exclude, and which files you want audit to cleanup by overriding the resource information.

This report displays the total inventory size of all computers and the average size and audit scan time. This information should be used for capacity planning. Total size represents network and database usage.

List Computers Not Reporting Audit Software Data in Last 'N' Days

This report lets you determine which computers are not reporting regularly. Typically you will schedule the running of the agent using SMS advertisements. The report will indicate the number of days since the last report of any data.This report lists computers that have reported no inventory in the last n days.

This report lists new computers discovered in the last n days.

List Computers With Total Free Space Less Than 'N' Megabytes

List computers with total free space on all volumes combined less than n megabytes.

List Computers With Total Free Space Less Than 'N' percent

List computers with total free space on all volumes combined less than n percent of total disk size.

Lists all volumes found on the specified computer. Displays the file system and total and free space for each volume.

List of Disk Volumes With Free Space Less Than 'N' Megabytes

The report displays a count of computers by operating system and physical memory. Drill down into the table to view the list of computers.The report lists computers with a free memory slot and less than n amount of physical memory. Drill down into the table to view the details of a computer.The report lists the top n computers by memory size (MB). Drill down into the table to view the details of a computer.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 3 of 76

Count by operating system (all computer types) This report displays a count of computers by operating system.This report displays a count of computers by operating system and version.

Count by Operating System and Version (Macintosh Only) This report displays a count of computers by operating system and version.

List of Macintosh OS Versions Lists the operating system version and installed volume for the specified computers.Operating System UpgradeComputers with Free Memory Slot

Computers With Too Little Disk Size or Free Space List of Computers Meeting Upgrade Requirements List of Computers Not Meeting Upgrade Requirements

Peripheral DevicesFireWire Devices USB Devices

PrintersCount Printers by Manufacturer

List Computers With Local Printers The report lists computers with local printers. Drilldown into the table to view the computer inventory.

ProcessorCount by OS, Processor Name, and Speed The report groups computers by processor speed. Drill down to see the list of computers.Count by Processor Name and Speed This report groups computers by processor type and speed.Count by Processor Speed by Level The report groups computers by processor speed. Drill down to see the list of computers.List of Computers With Multiple Processors This reports groups computers with multiple processors, Drill down to see the list of computers.

List Computer Model and Serial Number Information

List of Computers Reporting Duplicate Serial Numbers This report list all computers with duplicate serial numbers.

Software DetailsList Applications and Versions

List Applications by Computer

Software SummaryCount of Applications

Count of Applications and Versions

Count of Applications by Manufacturer

Disk Usage by File Type This report lists the number of computers that have files with a given file extension.List Applications on Computers

Top n Computers by Application Count

Inventory WindowsAdd or Remove Programs

Count by Operating System and Version (All Computer Types)

This report checks for computers that do not match the Macintosh operating system memory upgrade requirements but have free slots. You can drill down into the individual computers to view a list of all memory slots.This report checks the operating system requirements and reports computers with insufficient disk size and or free space. You can drill down into the Resource Explorer.This report lists all computers that do not yet have the desired operating system but meet the minimum hardware requirements for an upgrade.This report lists all computers that do not meet the minimum hardware requirements for an operating system upgrade.

This report lists a count of FireWire devices per computer. From here, you can drill down to a list of the devices for each computer.This report lists a count of USB devices per computer. From here, you can drill down to a list of the devices for each computer.

The report displays the count of printers by vendor in a graph. Drilldown into the graph to view the count of printers by model. Drilldown into the table to view the list of computers for a specific model, and whether it is local or network connection.

This report lists the serial number and model of all computers. Click on an item in the list to view the details of a computer.

This report lists all of the applications and the versions.

Note: This report does not include software from special groups. There is no drilldown for this report. Use the Audit Summary reports to navigate the audit software. Use the Deployment reports to identify applications with missing manufacturer data.This report lists all of the applications by computer.

Note: This report does not include software from special groups. There is no drilldown for this report. Use the Audit Summary reports to navigate the audit software. Use the Deployment reports to identify applications with missing manufacturer data.

This report lists the number of distinct applications reported by audit. The report is designed to help you understand what software applications are deployed in your network.

Note: This report does not include software from special groups. You can drill down into the application to view the list of computers, and then drill down into the computer. Applications with missing manufacturer data are filtered out.This report lists the number of distinct applications and versions reported by audit. The report is designed to help you understand what versions of the software are deployed in your network.

Note: This report does not include software from special groups. You can drill down into the version to view the list of computers, and then drill down into the computer. Applications with missing manufacturer data are filtered out.

This report lists the number of applications by manufacturer found by audit. The report is designed to help you understand what manufacturer software is on your network.

Note: This report does not include software from special groups. You can drill down into the manufacturer to view the list of application names and number of computers the application is installed on. Applications with missing manufacturer data are filtered out. You should use the "Deployment" reports to help identify applications with missing manufacturer information.

This report lists applications that are on n% of all the computers in your network. Specify the operator and the percentage to help you find sparse or widely deployed applications in your network.

Note: This report does not include software from special groups. You can drill down into the application to view the list of computers, and then drill down into the computer. Applications with missing manufacturer data are filtered out.

This report lists the computers with the most number of applications found by audit. The report is designed to help you understand which computers have a large number of applications.

Note: This report does not include software from special groups. You can drill down into the computer to view the list of applications and the directory it is installed in. Applications with missing manufacturer data are filtered out. You should use the "Deployment" reports to help identify applications with missing manufacturer information.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 4 of 76

Name of Microsoft application, count of product IDs, and count of computers.

Distinct Add/Remove Program Applications Detail listing of all distinct Add or Remove Program applications.Hidden Programs Windows installed applications that were installed hidden, gives uninstall path.

Antivirus and GamesAnti-virus Installation Directories List of directories, where antivirus applications are installed, and count of computers.Computers with No Auditing Computers with no auditing. Count of Computers with Anti-virus Software Count of computers and installed antivirus software application and version.Count of Computers with Audit Policy Settings Count of Users with Admin Rights Games by Domain (Pivot) Detail report of game applications installed by domain.Unprotected Computers Computers without antivirus software installed.Virus Signature File(s) by Date Computers and their virus data file dates. Drill down to a computer for more details.Audit DetailProducts and Versions View all products and versions. Filter by domain, OS, Product Name and Manufacturer.Products by Computer View all products and versions. Filter by domain, OS, Product Name, Manufacturer, and Computer name.

Audit SummaryAudit Software by Domain (Pivot) Details of software application audit by domain.Count of Products List of each application and count of installed computers.Count of Products and Versions List of each application and version and count of installed computers.Count of Products by Manufacturer List of manufacturers and count of products associated with each.Disk Usage by File Extension File extension and enterprise-wide disk usage associated with each.Products on 'N'% of Computers List of products on at least N% of computers. Drill down to associated computers.Top 'N' Computers by Product Count List of top n computers with most installed applications, product ID, number of products.DeploymentApplication Upgrade Cost Analysis

View data about size of inventory and time of audit execution.

List computers that have not reported audit information in specified number of days.

Computers Not Reporting Inventory in Last 'N' Days List computers that have not reported an inventory in the specified number of days.Count of Audit Software Agent by Version View count of software audit agent version by computer.Count of Computers Running Audit Software Agent View a count of computers running the software audit agent.Distinct Directories with Missing Manufacturer Data Distinct application installation directories with missing manufacture data.Distinct Files with Missing Manufacturer Data Distinct files missing manufacture data in the file header.

Generate audit config for software with missing manufacturer data.

Inventory Agents Status and Version List of computers, inventory agent status and version.New Computers Discovered in Last 'N' Days DiagnosticsAeXSNPlus - All Fields (Except Memory Modules) View computers and results of AexSNPlus agent.

Disk, CD, and TapeAggregate Disk Size and Free Space by Computer List computers and aggregate disk size and free space in megabytes.Computers with Disk Drive Changes in Last 'N' Days Computers with Free Space Less Than 'N' Megabytes Computers with Free Space Less Than 'N' Percent Computers with No CDROM/Floppy Drive Computers with no CD-ROM or floppy drive. Computers with Tape Drive Computers with tape drive. Computers with Writeable CD Drive Computers with writeable CD drive. Computers with ZIP Drive Computers with ZIP drive. Count of Disks by Size Level Specify ranges, for example, 10 GB, 20 GB, and 30 GB, and view all computers in each drive range.

Distinct Manufacturers and Models List of distinct drive manufacturers and models. ExchangeComputer Operating System, Disk and Contact Information List of computer, operating system, and Exchange user profile contact information.

Computers with Multiple Exchange Users Computers with multiple exchange users.Computers with Multiple Logon Users List of computers with multiple logon users and count of logons.Computers with Personal Folders List of computers with PST personal folders.Count of Exchange Users by Job Description Count of exchange users by job description. Count of Exchange Users by Location Count of Exchange Users by Location. Count of Exchange Users by Organization Count of Exchange Users by Organization.Exchange Users List of exchange users and contact information.Exchange Users with No Contact Detail Exchange Users with No Contact Detail. Local User Profiles computers with local user profiles.Primary User(s) Local user by computer.Primary User(s) with Contact Information Primary Users with Contact Information. Top 'N' Computers by User Profiles List of Top n computers with most user profiles.User Profiles Across Multiple Machines List of top user profiles across multiple computers.User Profiles with No Activity User Profiles with No Activity.

Count of Computers with Distinct Add/Remove Program Applications

Number of occurrences of each distinct Add or Remove Programs application with count of computers, version, and name.

Count of Distinct Microsoft Product Id's by Count of Installed Products

Count of computers with associated auditing enabled, logon events, account logon events, account management.List domain, users, computers, and input parameter of minimum number of computers where users have admin rights.

Calculate computers that need resources for an application upgrade. Input operating system name, service pack, operating system type (server, workstation, and so on), CPU minimum, disk size minimum, free disk space minimum, and memory minimum.

Calculate Total Inventory Size, Average Size and Software Audit Scan Time Computers Not Reporting Audit Software Data in Last 'N' Days

Generate Audit Config for Software with Missing Manufacturer Data

List of computers discovered in the prior n days.

List computers with disks added, changed, or removed in the prior n days.List computers with less than n megabytes of free disk space.Computers with free space less than n percent.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 5 of 76

Inventory Capture'N' Most Recent Inventory Captures MemoryComputers with Free Memory Slot(s) Computers with free memory slots.Computers with Memory Change in Last 'N' Days

Computers with Memory Decrease in Last 'N' Days Computers with Memory Increase in Last 'N' Days Memory Configuration by Computer Top 'N' Computers with Largest Page File Size Top 'N' Computers with Largest Physical Memory Size Microsoft BackOfficeMicrosoft Exchange Servers List of Microsoft Exchange Servers and version.Microsoft IIS ServersMicrosoft SMS Servers List of computers with Microsoft SMS installed.

List of computers with SQL components and versions.

MS BackOffice Components List of computers with all back office products (Exchange, IIS, SQL).MS BackOffice Server Configuration Configuration details (Memory, CPU Speed, Free Space, Installation directory) for MS Back Office servers.

MS DNS Servers List of DNS servers with DNS version.Microsoft OfficeComputers with MS Office XP/2000/97 by Domain List of computers with MS Office 2000/XP/97 by domain. Drill down computer level for more detail.

Count of Computers with MS Office by Domain Count of all computers with MS Office by domain name.Count of Core MS Office Components Installed Count of MS Office XP/2000/97 Components Count of core MS Office products (2000/XP/97). Drill down for computer details.Distinct Components and Versions Listing of all MS Office components broken down by distinct product version.MS Office by Domain (Pivot) Pivot table report of all MS Office components by domain.MS Office Installation Directories Listing of distinct MS Office installation directories and number of computers for each.Multiple Copies of MS Office Installed computers with multiple copies of MS Office installed.Percentage of Computers with MS Office by Domain Table with total number of computers, computers with Office and percentage.Operating System

Computer Summary (Pivot) Pivot table summary of all computers.Computer summary with number of products installed by computer.

Count of Computers and OS Products Report of # of computers versus # of OS Product IDs.Count of computers, grouped by distinct OS installation directory.

Count of Operating System Count of computers by OS name. Drill down for more details about each OS.Count of Operating System and Version Count of computers by OS and version. Drill down for more details about the computers for each OS version.

Count of Operating System, Version and Service Pack Count of computers by OS Version with Service pack level.Count of System Type Count of computers by OS system type (Advanced Server, Professional, Enterprise Server, Server, etc).

Count of Systems with OEM Licenses Count of systems with OEM-licensed OS and non-OEM-licensed OS.Dual Boot Windows/UNIX or Duplicate Computers List of dual boot Windows/UNIX computers, or list of duplicate computers.Operating System UpdatesCount of Windows 9X Computers without Update 'X' Count of all Windows 9x computers without specified Hotfix.Count of WinNT/2000/XP Computers without Update 'X' Count of all NT/2000/XP computers without specified Hotfix.

Distinct Windows 9X Updates by Computer Query by computer and view all installed Windows 9x updates.Distinct WinNT/2000/XP Updates by Computer Query by computer and view all NT/2000/XP updates.Physical DriveComputers with a Un-partitioned Disk Space

List of computers with input parameters <= or >= specified size in Gigabytes.

Computers with 'N' Hard Drives

Primary UserPrimary User by Domain List of computers and primary users. Filter by computer name and domain.Primary User on Multiple Computers List of primary users on multiple computers by number of computers.Primary User with Contact Details List of primary users with Exchange contact information. Filter by computer name and domain.

PrintersComputers with Fax Driver List of computers with installed fax drivers.Computers with Local Printers List of computer with local printers and printer port used.Count of Printers by Manufacturer Count of Printers by Manufacturer.

List of the last n chronological inventories posted to the Notification Server.

Computers with memory change in last n days. Computers with Memory Change within 'N' Days of One Another

Computers with memory change: input the number of days between changes, and number of days since the change occurred.Computers with Memory Decrease in Last n Days. Computers with Memory Increase in Last n Days. List of computer and memory configuration: physical memory, page file size, page file to physical ratio, and computer type.Top n Computers with Largest Page File Size. Top n Computers with Largest Physical Memory Size.

List of computers with Microsoft IIS installed, with IIS version. Drill down to a particular computer for more details.

Microsoft SQL Servers, Transaction Servers and Distributed Transaction Coordinators

Count of core components (Access, Excel, Frontpage, Outlook, PowerPoint, Word) showing number of installations and number of computers. Drill down for more details.

Computer Summary (Model, CPU, Memory, Disk and Network)

This report shows a computer summary (Domain, Logon ID, IP Address, Gateway, Subnet, OS type, Computer Manufacturer, Computer Model,Serial, CPU, Memory, OS and version, Service Pack, Installation Directory, Disk format, size and free space). Drill down for details about each computer.

Computer Summary with Count of Products (Model, CPU, Memory, Disk, Network and Applications)

Count of Computers by Operating System and Installation Directory

Specify the threshold difference between physical and partition size to find computers with un-partitioned space.

Computers with Greater Than or Less Than 'N' Gigabyte Hard Drive

Input operator (<, <=, >, >=) and number of hard disks to view computers with specified number of hard disks.

Network Shares by Computer, User, Access Rights, and Path

List of network shares by computer, share name, access group, access granted and path. Filter the report with input parameters type of share, share name, group or user granted access, or type of access.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 6 of 76

TCP/IP Network Printers List all network TCP/IP Printers.ProcessorCount of Computers by OS, Processor Name, and Speed Count of computers by processor name and speed. Drill down for details about each computer.

Count of Computers by Processor Name and Speed Count of Computers by Processor Speed by Level Input 5 values of processor speeds and view a count of computers that fall within those specified ranges.

Count of Computers with Multiple Processors List of computers with more than one processor.Scheduled TasksAT Commands Specify a computer name and view all scheduled AT commands that are queued.Scheduled Tasks Specify a computer name and view all Windows scheduler tasks that are queued.Serial Number Computer Model and Serial Number Information List of computer names, computer manufacturer, model and serial number.

Computers by BIOS Date List a specified number of computers by BIOS release date.Computers where Serial Number was Not Found List of computers where no serial number has been reported.

List of computers where no serial number has been reported, with Exchanger user profile contact information.

Computers with Changed Identity List of computers by serial number with changed computer identity information.Computers with Incomplete Computer Model Information Computers with Incomplete Computer Model Information.

Computers with Incomplete Computer Model Information with Contact Information.

Computers with Incomplete Manufacturer BIOS Information.

Computers with Incomplete Manufacturer BIOS Information with Contact Information.

Count of Computers by BIOS Manufacturer Count of Computers by BIOS Manufacturer. Count of Computers by Computer Model Count of computers by manufacture and model.Count of Computers Running Serial Number Agent Count of computers running the AeXSNPlus serial number agent.

Count of with no serial number, listed by OS.

Count of with no serial number, listed by OS with Exchange User profile information.

Count of Laptop and Desktop Computers Count of computer by type, e.g. desktop, laptop, mini tower, notebook, portable, server chassis, etc.).

Count of Serial Number Agent by Version Count of computers by Altiris AeXSNPlus serial number agent version.Percent of Computers Reporting Serial Number Percent of computer with serial number reported.TCP/IP Count of Computers by Default Gateway Count of computers listed by the default gateway address.Count of Computers by DHCP Server Count of computers by DHCP Server. Count of Computers by IP Routing Enabled Count of computers that have IP routing enabled.Count of Computers by Primary DNS Count of computers by name of primary DNS server.Count of Computers by Primary WINS Server Count of computers by Primary WINS Server. Count of Computers by Secondary DNS Count of computers by Secondary DNS.Count of Computers by Secondary WINS Server Count of computers by Secondary WINS Server.Count of DCHP Status by Default Gateway Count of computers by DHCP status (enabled/disabled) by default gateway.Count of PCs by DHCP Server Count of PCs by DHCP Server. Count of Systems by Address Type Count of computers by address type, e.g. 255.255.0.0, 255.255.192.0, etc.Web BrowsersComputers with Internet Explorer and Netscape List of computers with both IE and Netscape Navigator installed, includes IE/Netscape version numbers.

Distinct Count of Internet Explorer and Netscape Count of computers with distinct versions of IE and Netscape, grouped by browser name and version.

Internet Explorer by Version Count of computers by distinct IE versions.Internet Explorer Components by Version Internet Explorer Components (e.g. NetMeeting) by Version. Internet Explorer Multiple Copies Installed Internet Explorer Multiple Copies Installed.Internet Explorer Version by Operating System Count of computers for each OS by distinct IE version number.Netscape by Version Count of computers by Netscape Navigator version.Web Browsers by Computer List of web browsers by computer, with version number and install directory.Web browsers by Domain (Pivot) Pivot table report of all web browsers by domain.Windows 2000/XP UpgradeComputers Requiring Resources

Computers Requiring Resources with Contact Information

Computers with Free Memory Slot Computers with Free Memory Slot. Computers with Too Little Disk Count of Computers Requiring Resources

Count of processors by name (e.g. Intel Pentium 4 processor, Intel Pentium III Xeon processor), speed and number of computers.

Computer Model and Serial Number with Contact Information

List of computer names, computer manufacturer, model and serial number with Exchange user profile contact information.

Computers where Serial Number was Not Found with Contact Information

Computers with Incomplete Computer Model Information with Contact Information Computers with Incomplete Manufacturer BIOS Information

Computers with Incomplete Manufacturer BIOS Information with Contact Information

Count of Computers with No Serial Number by Operating System Count of Computers with No Serial Number by Operating System with Contact Information Count of Computers with Serial Number Detection Method Used

Count of computers with method of serial number detection (baseboard, enclosure, not found, system, WMI, etc).

Input minimum CPU speed, minimum disk size, minimum disk free space, minimum memory for servers, minimum memory for workstations and view all computers that do not meet the stated upgrade resource requirements.Input minimum CPU speed, minimum disk size, minimum disk free space, minimum memory for servers, minimum memory for workstations and view all computers that do not meet the stated upgrade resource requirements. Computers listed with associated Exchange User profile information.

Input minimum disk size required and minimum free space required for OS upgrade. Displays computers that do not meet the disk space requirements.Count of computers not meeting OS Upgrade requirements for CPU speed, disk size, free disk space, and amount of RAM.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 7 of 76

Windows 2000 Upgrade Cost Analysis

Windows XP Upgrade Cost Analysis

Total Cost of Ownership (TCO)Hardware AnalysisCount of Computers by Type Count of Servers by Type

Microsoft Audit ReportsApplications Returns a list of Microsoft applications and total number of installs.Developer Tools Returns a list of Microsoft developer tools and total number of installs.Office Suites Returns a list of Microsoft office suites and total number of installs.Operating Systems Returns a list of Microsoft operating systems.Server ProductsVisio Returns a list of Microsoft Visio products (Enterprise, Professional, Standard, Technical).Support AnalysisCount of Incidents by Manufacturer Counts incidents by manufacturer. Drilldowns allow more detailed views of the data.Count of Incidents by OS Counts incidents by operation system. Drilldowns allow more detailed views of the data.ConnectorImport/Export ResultsResource Export Results Results of Altiris connector exports.Resource Import Results Results of Altiris connector imports.Deploy and MigrateDeploymentClient InformationClient count by OS

Client summary by OS

Managed computers by Deployment Server group

Managed computers in the New Computers group

Total Deployment Servers and total managed computers Job Information

Assigned jobs by Deployment Server

Assigned jobs by managed computer

Assigned jobs not on a recurring schedule

Assigned jobs with list of targeted computers

Assigned recurring jobs

Job availability by Deployment Server and task type This report displays a list of available jobs grouped by the Deployment Server they are available on.

Job Status

Job status by Deployment Server

Job status by job ID

Job status by job name Job status history detail (by managed computer) This report displays a history of jobs run on a specified managed computer.

Count of Computers Requiring Resources with Contact Information

Count of computers not meeting OS Upgrade requirements for CPU speed, disk size, free disk space, and amount of RAM, with Exchange user profile information.Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades.

Windows 2000 Upgrade Cost Analysis with Contact Information

Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades. Computers and contact information listed.

Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades.

Windows XP Upgrade Cost Analysis with Contact Information

Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades. Computers and contact information listed.

This report is designed to help you answer the Gartner TCO Manager interview screens. This report will show you a count of computers, by OS, Type, and Networking client.This report is designed to help you answer the Gartner TCO Manager interview screens. This report will show you a count of Servers, based on type of server.

Returns a list of Microsoft server products. (BackOffice, Exchange, Host Integration Server, Proxy Server, Site Server, SQL Server).

This report displays a count of managed systems by Deployment Server, OS (Windows NT,Windows XP, etc), OS version (5.0, 4.x, etc) and OS type (Professional, Server, etc). The drill down displays the list of computers that comprise the count, filtered on Deployment Server, OS, type, and version.

This report displays basic client computer information such as OS and version, and groups the managed computers together by managing Deployment Server. This list will include any clients imported as part of the synchronization process, including virtual clients.

This report displays a list of managed Deployment Servers and a count of their client systems. The drilldown displays the list of computers counted in the first level query, filtered by selected Deployment Server.This report displays a list of computers in the New computers group. This helps identify computers that should be reassigned into your distinct management groups.

This report displays the total number of Deployment Servers that are being managed by this server, as well as the total number of client computers. The drill down displays the actual servers and the number of clients managed by each server. The second drill down displays domain and computer name for each managed computer, filtered by the managing Deployment Server.

This report displays any assigned jobs, by Deployment Server, along with the total number of clients the job has been assigned to. Drill down displays the job and the list of computers that comprise the count.This report displays a count of jobs and their types currently assigned to a managed computer. The drill down report displays more detail about the jobs comprising the counts.This report displays a list of jobs that were assigned to run without a recurring schedule, and a count of managed computers that the job is scheduled on. This report may take several minutes to run successfully if you have a large database (over 2000 managed computers with multiple assigned jobs). The drill down displays the list of computers that comprise the count. This report displays a specific job designated by the end user along with a list of all computers that have been assigned the job.This report displays information for jobs that are scheduled to run on a reoccurring basis on your managed computers. The drill down report displays more detail about a specific job.

This report displays job status by managing Deployment Server, unique job ID and status (successful, failed, assigned). The drill down focuses on one particular job on the specified Deployment Server. The second drill down provides more detailed status information on the selected job.This report displays status information for a specified job, filtered and grouped by the selected job Id. The drill downs display detailed status information for a selected job.This report displays status information for a specified job, filtered and grouped by the selected job name. The drill downs display detailed status information for a selected job.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 8 of 76

Jobs assigned in last N days

Jobs completed in last N days

Jobs failed in last N days

Overall event status by Deployment Server

Problematic managed computers Server Information

Count of managed computers by Deployment Server

List of managed computers by Deployment Server This report displays a list of computers, grouped and filtered by the selected managing deployment server.Managed Deployment Servers by domain This report displays a list of managed Deployment Servers grouped by Domain.Server summary by OS This report displays a list of managed Deployment Servers grouped by OS and Domain.

Software Delivery Execution Status Deployment Server Agent Install/Upgrade Status This report displays the status of the Deployment Server Agent Install/Upgrade task.Full Installation/Upgrade of Deployment Server Status This report displays the status of the Full Installation/Upgrade of Deployment Server task.Incident ManagementCarbon CopyCarbon Copy Agent Active Login Accounts - Summary This report displays a list of agents that require login security and what accounts are granted access rights.

Carbon Copy Agents by Operating System This report displays a graph of computers with the Carbon Copy agent installed by operating system.

Carbon Copy Agents by Version

Carbon Copy Agents Not Waiting for Call

Carbon Copy Agents with Inadequate Security

Carbon Copy Agents with Security Configuration Changes This report displays a list of agents whose security configurations state has changed in the last n days.

This report displays a list of agents whose accessibility state has changed in the last n days.Carbon Copy Events by Computer This report displays a list of events reported by the Carbon Copy agent over the last n days.

Carbon Copy Remote Control Activity in the Last 'N' Days Carbon Copy Session Activity in the Last 'N' Days This report displays a list of connection and remote tool activity over the last n days.

Carbon Copy Warning and Error Events by Computer IncidentsAlert Manager

Incident ActivityHigh Priority Incidents Not Assigned After 'N' Minutes This report lists high priority incidents that have not been assigned after n minutes.High Priority Incidents with No Activity in Last 'N' Hours This report lists high priority incidents that have not been assigned after n hours.

Incident HistoryIncident History by Computer This report lists Incident history by computer.Incident History by End User This report lists Incident history by end user.Incident History by Worker This report lists Incident history by worker.

Problem Assets

Computers with Most Incidents

Count of Incidents by Operating System and Service Pack Help Desk

Cost Analysis

Average Cost of Incidents by Platform

Cost of Incidents by Organization

Time and Cost per Incident

This report displays a list of jobs that have been assigned to managed clients in the last n days. n represents a user replaceable parameter which specifies the length of time by which to filter the report.

This report displays a list of jobs which have completed in the last n days. n is a user definable parameter which enables users to specify the appropriate timeframe for which to filter the report.This report displays a list of jobs that have failed on targeted managed computers in the last n days. n represents a user definable parameter specifying the number of days to filter the data on. The drilldown displays a list of computers the job failed on.

This report displays overall job status by server. Displays the server, count of unique jobs reporting status, the number of scheduled clients, count of successful executions, and count of failed executions.This reports displays a list of computers with multiple job failures in a specified timeframe. This helps identify problematic systems in your environment.

This report displays a count of managed computers, grouped by managing Deployment Server. The drill down report displays a list of the managed computers that compromise the count for the selected Deployment Server.

Carbon Copy Agent Global Security Configuration - Summary

This report displays a list of security settings that specify whether certain areas of the agent interface require an access password.

Carbon Copy Agent Login and Encryption Configuration - Summary

This report displays a list of security settings that specify who can connect to a particular agent, how the user is authenticated and what options are used to safeguard the connection process.

Carbon Copy Agent Session and Connection Configuration - Summary

This report displays a list of security settings that specify whether the agent user must approve or acknowledge a connection attempt.

This report displays a list of computers with the Carbon Copy agent installed and the operating system information and agent version.

This report displays the list of agents that cannot be accessed for immediate problem resolution because wait for call is disabled or the agent is not configured to automatically wait for call.

This report displays a list of Carbon Copy agents waiting for a call that do not have security options enabled to prevent unauthorized connections and/or protect agent configuration settings.

Carbon Copy Agents with Wait for Call Configuration Changes

This report displays remote control activity over the last (1) days. Saved report runs are emailed (daily) automatically if there is activity.

This report displays a list of warning and error events reported by the Carbon Copy agent over the last n days.

This report lists the computers with most incidents in descending order. Drill down into the graph to view the list of incidents for the computer, then drill down into the Alert Manager Console to see the details for each incident.This report shows a chart of incidents associated with computers grouped by operating system and service pack. Drill down to see the individual incidents.

This report computes the average cost of incidents associated with a platform. The average is calculated using the last worker to modify the work item. Note: This report requires an install of Inventory solution to run.

This report computes the cost (average and total) of incidents for an organization. The cost is calculated based on the following order of available figures: worker cost, queue cost, default as supplied at runtime.This report computes the total time and cost associated with an incident. The cost is calculated based on the following order of available figures: worker cost, queue cost, default as supplied at runtime. From the report you can drill down into the Helpdesk console.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 9 of 76

Top 'N' Most Expensive Incidents Helpdesk Activity

Count Incidents by Category and Priority

Count Incidents by Status, Priority or Category

Count New Incidents by Time

Incident Current Status

Incidents by Category (Pivot) Incidents on Hold More Than 'N' Days This report displays incidents that have been on hold more than n days. Incidents Open More Than 'N' Days This report displays incidents open longer than n days. This report is used for notification policy.

Incidents Resolved/Closed More Than Once

Incidents With 'N' or More Workers New Incidents in Last 'N' Days This report lists the status of today's incident including the last activity.

Top 'N' Open Incidents This report lists the top n open incidents. From this report you can drill down into the Helpdesk Console.Top 'N' Tickets with Most Reassigns This report will return the top n most reassigned tickets.

High PriorityHigh Priority Incidents Not Assigned After 30 Minutes

High Priority Incidents Not Closed

High Priority Incidents Not Resolved/Closed After 8 Hours

High Priority Incidents With No Activity in Last Hour Incident Activity Trend

Incidents by Day of Month Incidents cumulated by the day of the month.

Incidents by Day of Week Incidents by Hour Incidents by hour of the day specified (24 hour format).

New Incident Rate List Incidents

List Incidents by Computer

List Incidents by End User

List Incidents by Worker Planned Work

Computers Scheduled for This Week This report lists computers with incidents that are scheduled for completion during the next seven days.

Planned Incidents - Overdue

Planned Incidents - Start Date

Workers Scheduled for This Week Problem Computers/Platforms/Users

Computers with Incidents in Last 'N' Days

Computers with Most Incidents Computers without Incidents This report lists computers that have never had any incidents.

Computers without Incidents in Last 'N' Days

Count Incidents by Operating System and Service Pack

Count of Incidents by Category

End Users with Most Incidents

Last Incident for a Computer

Last Recorded Status of Incidents(Pivot) Service Level

This report lists the most expensive incidents. The cost is calculated based on the following order of available figures: worker cost, queue cost, default as supplied at runtime.

This report counts the incident priority by category. Drill down into the table to view the list of incidents. From this report you can drill down into the Helpdesk console.This report counts incidents by status, priority or category. Drill down into the graph to view the list of incidents. From this report you can drill down into the Helpdesk console.This report counts incidents by hour of day, day of week, day of year, week, month and quarter. You can drill down into the graph to view the list of incidents. From the report you can drill down into the Helpdesk console.

This report lists the last recorded status of an incident. The report lists the age of the incident and how long since it was last modified. From this report you can drill down into the Helpdesk console.This report displays the last recorded status of a incidents in a pivot table. From the report you can drill down into the Helpdesk console.

This report lists incidents that have been resolved or closed more than once. The history of the incident is included in the report. From the report you can drill down into the Helpdesk console.This report displays incidents that have n or more workers assigned. From this report you can drill down into the Helpdesk console.

This report lists high and ASAP priority incidents that are still in level 1 waiting to be closed or to be assigned. From this report you can drill down into the Helpdesk console.

This report lists the last recorded status of an incident. It includes the age of the incident and how long since it was last modified. From this report you can drill down into the Helpdesk console.This report lists high priority items that have not been resolved or closed after 8 hours. From this report you can drill down into the Helpdesk console.This report lists high priority incidents that are sitting idle. From this report you can drill down into the Helpdesk console.

Incidents cumulated by the day of the week. Column numbers represent the days of the week(2=Monday, 6=Friday).

This report calculates the rate at which new incidents are being logged by users. Calculations do not consider time units smaller than a day accurately. For example, if hours are used then every hour from the date of creation is used to calculate the rate (no adjustment for an eight-hour work day.) Drill down to a list of the incidents used to calculate the rate.

This report lists incidents for computers to display the history of activity performed on the computer. From this report you can drill down into the Helpdesk console.This report lists incidents to display the history of incidents reported by end users. From this report you can drill down into the Helpdesk console to see incident history details.This report lists the history of incidents assigned to workers. From this report you can drill down into the Helpdesk console to see incident history details.

This report lists planned incidents that did not start on time. From the report you can drill down into the Helpdesk console.This report lists planned incidents that did not start on time. From this report you can drill down into the Helpdesk console.This report lists incidents that are scheduled for completion during the next seven days and the worker to which the incident is assigned.

This report lists computers that have had incidents in the most recent n (specified number) of days. Selecting a computer will drill down into a list of incidents that exist for the computer. Choose an incident to see the incident details in the Helpdesk Console.

This report lists the computers with most incidents in descending order. Drill down into the graph to view the list of incidents for the computer. Drill down into the Helpdesk Console to see the details for each incident.

This report lists computers that have had incidents but not in the most recent n (specified number) of days. Selecting a computer will drill down into a list of incidents that did exist for the computer. Choose an incident to see the incident details in the Helpdesk Console.This report lists the computers with most incidents in descending order. Drill down into the graph to view the list of incidents for the computer, then drill down into the Helpdesk console to see the details for each incident.

This report displays the number of incidents in each category. Drill down in to the category to see the count of incidents by computer within the category. Continue to drill down to see a list of incidents for the computer selected. Select a incident to see the details in the Helpdesk Console.This report lists the end users with most incidents in descending order. Drill down into the graph to view the list of incidents for the end user.This report lists the date and time the last incident was requested for a particular computer. Click the latest request to drill down and see all the incidents for that computer. Select an item from the list to see the individual incident history.This report display the last recorded status of a incidents in a pivot table. From the report you can drill down into the Helpdesk console.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 10 of 76

Average Time to Close Incidents

First Contact Resolution

Incidents Not Completed Within the SLA

Incidents Past Due Track Changes, Moves, Adds

Count of Install, Move and Remove

Top 'N' Computers with Most Changes Worker Performance

Average Time Spent per Day on Incidents

Average Time Spent per Incident

Count Incidents by Worker

Count Incidents by Worker(Pivot)

Incidents Closed by 'level 1'

Incidents Closed by 'level 2'

Open Incidents without Activity in Last 'N' Minutes Time Spent by Incident This report displays incidents and how much time (per worker) has been spent on them.

Time Spent by Worker This report displays workers and how much time they have spent by incident during a date range.

Workers with Least Closed Incidents

Workers with More Than 'N' Open Incidents

Workers with Most Closed Incidents Recovery SolutionClient Reports

Client Event History (Date Range)

Clients with No Full Snapshot in Last 'N' Days

File Extensions Backed Up by Client

File Recovery History (Date Range)

Full System Recovery (FSR) History (Date Range)

Most Recent Recovery Solution Events Recovery Solution Clients by Version This report shows Recovery Solution clients by the version they have installed.

Recovery Solution Jobs in Last 'N' Days

Snapshot History (Date Range)

Snapshot Status (Date Range)

System Rollback History (Date Range) Local ReportsComputers by Agent Version This report will show how many computers have the local agent installed by version.Computers with Local Agent This report will list the computers which have the local agent installed.Computers with Potential Space Issues This report will list computers with the local agent installed and less than N% drive available.

This report computes the average time to close incidents. Drill down into the table to view the list of incidents. From the report you can drill down into the Helpdesk console.This report lists percentages or incidents by company and department that have been closed on the first contact. You can drill down to see a list of items for that company/department. You can then drill down to Helpdesk to view details of a incident.This report lists incidents that have exceeded the service level agreement, i.e., have not been closed within the specified time. From this report you can drill down into the Helpdesk console.This report lists incidents that have not been completed on time. From this report you can drill down into the Helpdesk console.

This report will calculate the number of installations, moves, or removals. Drill down to see the list of computers that constitute the counts for each action.This report lists the number of specified computers with the most changes in descending order. From this report selecting a computer and clicking the drill down arrow will bring up the Incident History Report for that computer.

This report calculates how much time during the day is spent on incidents over the number of days specified. Drill down to see a list of the incidents used with the time spent to calculate the average time spent per incident.This report displays the time spent to complete an incident. Drill down to see a list of the incidents used with the time spent to calculate the average time spent per incident.

This report counts incidents by worker. You can choose to group the report by the worker that created the incident, is assigned to the incident, or last modified the incident. Drill down into the graph to view the list of incidents. From this report you can drill down into the Helpdesk console.This report display the last recorded status of an incidents in a pivot table. From the report you can drill down into the Helpdesk console.This report displays the work items that Level 1 workers closed. Drill down to see the individual items in the Helpdesk Console.This report displays the work items that Level 2 workers closed. Drill down to see the individual items in the Helpdesk Console.

This report lists the incidents that are open but have not had activity in the last n minutes. This report is used by the Notification Policy 'Open work items with no activity in over n minutes.'

This report displays the bottom n workers that close the least incidents. Drill in to the incidents that the worker closed by selecting the worker. View the details of the incident in the Helpdesk Console by selecting an incident.

This report displays workers with more than n open incidents. Drill down on the worker to see the incidents for the Worker. The notification policy 'Workers with more than n open incidents' sends this report.This report displays the top n workers that close the most incidents. Drill in to the incidents that the worker closed by selecting the worker. View the details of the incident in the Helpdesk Console by selecting an incident.

This report shows key client events and the number of times each event has occurred on each PC or server. The report will provide the PC or server name, the Recovery Solution group name, total number of; successful, cancelled, and failed snapshots, total number of; successful, cancelled, and failed FSR's, total number of; successful, cancelled, and failed File Restores, and total number of; successful, cancelled, and failed System Rollbacks.This report lists clients that have not had a full snapshot taken in the last n days (showing name, login name, last snapshot date/time, days from today).This report lists file extensions currently backed up, by client, group, and server (showing resource name, login name, group name, file extension, number of files with that extension, number of bytes with that extension).This report will show all PCs and servers that have performed a File Recovery during the specified date range. The report will provide PC or server name, name of the logged in user initiating the file recovery, Recovery Solution group name, start and end time, recovery result, number of files restored, and non-compressed size of the data restored.This report will show all PC's and Server's that have performed a Full System Recovery during the specified date range. The report will provide PC or server name, name of the logged in user initiating the FSR, Recovery Solution group name, start and end time, recovery result, number of files restored, and non-compressed size of the data restored.

This report will list the top n number of recent Recovery Solution events. You can filter on a resource name or view recent events for all resources. You can then drill down to the Resource Explorer.

This report counts all client jobs by job type in the last n days. The user can drill-down to see a list of all job types and see the status of each job.This report is a snapshot history from date x to date y, by client, group, and server (showing resource name, login name, group name, volume, date/time (in Greenwich Mean Time/GMT), number of total files, number of identical files, number of new files, number of failed files, number of open files, compressed bytes sent, throughput rate.)This report will show all PC's and Server's that have performed a Snapshot during the specified date range. The report will provide PC or server name, name of the logged in user initiating the snapshot, Recovery Solution group name, start and end time, snapshot result, number of files in snapshot, and non-compressed size of the data in snapshot.This report will show all PC's and Server's that have performed a System Rollback during the specified date range. The report will provide PC or server name, name of the logged in user initiating the system rollback, Recovery Solution group name, start and end time, recovery result, number of files restored, and non-compressed size of the data restored.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 11 of 76

Computers without Local Agent This report will list the computers which do not have the local agent installed.

Most Recent Recovery Solution Events Server ReportsFile Extensions Backed Up by Server Largest Files This report lists the largest files that are backed up on the server.

Potential Space Saved

Server Disk Space Currently Used

Server Space Usage Trend (Date Range)

Server Usage History (Date Range) Unsuccessful Jobs in Last 'N' Days This report lists all jobs that have not completed successfully in the last n days.

Users with Web Based File Recovery Access Web Administrator for Windows Connected Computers by Operating System Displays Computers by Operating System.Connection - Log Displays the Web Administrator for Windows Connection Log.Connection - Summary Displays the Web Administrator for Windows Connection Summary.Connections by Hour of Day Displays the Web Administrator for Windows Connections by Hour of Day.Connections by Week Number Displays the Web Administrator for Windows Connections by Week Number.Function Usage Breakdown Displays the Web Administrator for Windows Function Usage Breakdown.Notification Server InfrastructureActive Directory

Computers with Directory User Profiles Container Members by Operating System This report will list Directory containers members by Operating System.

Directory Computers Without the Altiris Agent Directory Import in the Last 'N Days This report lists (in seconds) how long each Directory import took over the last n days.

Directory Import Rule Task Runs This report will list all the resources that were created and updated during each import rule run.Directory Resources by Container This report will list Directory containers by category (user, computer, etc.).

Directory Users with Contact Detail Resources Imported per Import Rule This report will list the resources that were imported for each import rule.Windows Computers Not Found in Directory This report lists Windows computers that are NS clients but are not found in Active Directory.

Agent Altiris Agent Deployment

List all Windows NT/2000/XP/2003 Computers with no Altiris Agent installed.

Altiris Agent version

Altiris Solution Agent version vs. collection

Computers with Aclient but not Altiris Agent

Computers with Altiris Agent but not Aclient

Computers with Altiris Agent installed This report contains all computers known to Altiris Notification Server with the Altiris Agent installed.

Computers with Deployment Server agents (Aclient) This report contains all computers known to Altiris Notification Server with the Altiris Aclient installed.

Computers With No Additional Agents

Duplicate computer name Altiris Agent Discovery

Count of discovered/Altiris Agents by domain

Count of discovered/Altiris Agents by OS

Discovered computers history

This report will list the top n number of recent Recovery Solution events. You can filter on a resource name or view recent events for all resources. You can then drill down to the Resource Explorer.

This report lists file extensions currently backed up on this server (showing file extension, number of files with that extension, number of bytes with that extension).

This report shows disk space used by either a group or a client. The report shows how much server disk space could be saved by deleting a group or client from Server.This report lists server disk space currently used, by client and group (showing resource name, login name, group name, real space used, compressed space used, common space used, unique space used, compression ratio). All sizes are in MB.This report shows server space used by a date range. You can select how to group the data: dd=day, ww=week, mm=month.This report shows resource name, login name, group name, total number of successful and canceled snapshots, number of successful rollbacks, number of successful FSRs, and compressed server disk space used.

This report lists users and counts computers where the users have access to the WBFR console. You can drill down to see a list of computers for a given user. From there you can drill down to the Resource Explorer.

This report will list computers, Directory containers, and users associated with them. You can enter a container and a user name to filter the report. Inventory solution needs to be installed in order to view this report. The report then drills down to the resource manager.

This report will count computers by container that have been found that do not have the Altiris Agent installed. The report can be run for a specific container or for all containers. You can then drill down to view a list of computers, and from there to the resource manager for a given computer.

This report will list Directory users with contact detail. You can enter a container and a user name to filter the report. The report then drills down to the resource manager.

All Windows NT/2000/XP/2003 Computers with no Altiris Agent installed

This report counts distinct Altiris Agent versions, and displays the version number of the Altiris Agent package that is staged on the server. This report will allow you to determine which computers do not have the latest Altiris Agent version.This report counts distinct Agent versions. You can select the Agent name (by default all agents) and the collection (by default All Computers) to compare with. For example, 'Carbon Copy' and 'All Windows computers', respectively.This report contains all computers known to Altiris Notification Server with the Altiris Aclient installed that do not have the Altiris Agent installed.This report contains all computers known to Altiris Notification Server with the Altiris Agent installed that do not have the Altiris Aclient installed.

This report contains Altiris Agent computers with either the Altiris Agent or Inventory Agent installed, but no additional agents installed.

This report displays any two or more computers with the same name. This can happen if a computer is cloned and the original computer and the cloned computer both reside on the domain.

Count discovered computers and Altiris Agent computers. Use this report to determine the percent of discovered computers with the Altiris Agent installed. By default this data is displayed for the last 7 days however parameters are available to both change this date range as well as filtering the domain.

Count discovered computers and Altiris Agent computers. Use this report to determine the percent of discovered computers with the Altiris Agent installed. By default this data is displayed for the last 7 days however parameters are available to both change this date range as well as filtering the operating system.

List computer resource discovery summary information. Use this report to view a chronological list of the number of new resources discovered, existing resource rediscovered (both changed and unchanged) and the time taken for each resource discovery over the specified time range (by default the last 7 days). This report can be filtered by specifying the date range that the discoveries took place. Each discovery run can then be drilled into to view the new resources that were discovered during that run.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 12 of 76

Discovered computers not reporting inventory

Discovered computers sorted by date

Discovered computers summary

Discovered computers with Altiris Agent

Discovered computers with no registered Altiris Agent Altiris Agent Installation Status Reports Altiris Agent installation status

Altiris Agent installed other than push method

Computers where the Altiris Agent installation failed

Push (Altiris Agent) install failed Altiris Agent Inventory Altiris Agent basic inventory (no update 7 days)

Altiris Agent basic inventory (sorted by last update)

Altiris Agent forward to SMS

Altiris Agent forward to SMS (no update 7 days)

Altiris Agent registration (newest)

Altiris Agent registration (oldest) Computers with changed ownership Reports likely changes in computer ownership based on a change in the primary user.

Altiris Agent Package Info Request Clients requesting package info requests in last 7 hours The clients that have requested package server information in the last seven hours.Last 200 Package info requests Lists the last two hundred client package server info requests.Package info request statistics by time Processing time statistics for clients requesting package server information.Package info request summary statistics Summary of clients requesting package server information.Package info requests producing warnings Client package server info requests that have produced warnings in the last three hours.

Package info requests requiring > 5 seconds to process Client requests for package server information that have taken longer than five seconds to process.Package info requests that result in error Requests from clients for package server information that have caused errors.Package info requests that result in success Requests from clients for package server information that have been successful.

Altiris Agent Tasks Status Altiris Agent package download Altiris Agent program execution (all) List all program execution of internal software delivery tasks regardless of status.Altiris Agent program execution (failure) List program execution of internal software delivery tasks that resulted in a failure code.Altiris Agent program execution (last run) List the last program execution of internal software delivery tasks regardless of status.

Top N Altiris Agent queue status events Configuration Request

Clients with no configuration in last N days

Configuration request policy generation events

Configuration request statistics by time

Configuration request summary statistics Configuration requests requiring > 5 seconds to process List Altiris Agent configuration requests that took more than 5 seconds to process.

List discovered computers not reporting inventory. This report can be filtered by limiting the number of computers to return, the date range that they were discovered, their domain and operating system.

This report lists discovered computers sorted by Discovery Date (by default). Use this report to identify the most recently discovered computers and computer with the [Altiris Agent] recently installed (PushDate). You can specify the number of computers to report and the date range that they were discovered (by default the last 7 days). You can also filter the report using the computers domain or its operating system name.

This report displays the number of discovered computers, the percentage that have Altiris Agent installed, the number of Altiris Agents installed, the number of Altiris Agents that were installed via push install and the number of Altiris Agents that were installed by other means. By default this data is displayed for the last 7 days however parameters are available to change this as appropriate.

List discovered computers with Altiris Agent installed/registered. Use this report to verify how the Altiris Agent was installed. If the Altiris Agent was not push installed then the Push Date will be blank. The report can be filtered by specifying the number of computers to report, the discovery date range to report over (by default the last 7 days are reported), the specific domain in which the computers reside or the name of the operating system that the discovered computers are running.

List discovered computers with no registered Altiris Agent. This report can be filtered by limiting the number of computers to return, the date range that they were discovered, their domain and operating system.

List the Altiris Agent installation status for the last week (by default). This list does not include agent pull install information.

List discovered computers where the Altiris Agent was installed using a method other than push (e.g., pull, e-mail, login script, floppy). Use this report to track installation of the Altiris Agent. This report can be filtered by setting the date range that they were discovered, their domain and operating system.List the computers where the Altiris Agent installation failed. This list does not include agent pull install information.

List discovered computers where the Altiris Agent installation (push) has failed. Use this report to find installation problems. The report can be filtered by specifying the number of computers to report, the discovery date range to report over (by default the last 7 days are reported), the specific domain in which the computers reside or the name of the operating system that the discovered computers are running.

List inactive Altiris Agents. NOTE: The 'Forward to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.

List Altiris Agents sorted by last update (ModifiedDate) date. You can specify the date {CreatedDate, ModifiedDate, SMSForwardDate}, the number of clients to report, and the sort order. The combination allows you to determine active/inactive Altiris Agents. NOTE: The 'Forwarded to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.

List Altiris Agents forwarded to SMS in last n days. NOTE: The 'Forwarded to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.

List Altiris Agents not forwarded to SMS in last n days. NOTE: The 'Forwarded to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.List newest installed/registered Altiris Agents. NOTE: The 'Forward to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.List oldest Altiris Agents. NOTE: The 'Forwarded to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.

List package downloads that occurred for internal Notification Server tasks. Calculates the duration and the transfer rate.

Lists the most recent Altiris Agent Queue status events. You can specify the number n of events to report (10 by default).

This report lists computers that have not sent Altiris Agent configuration requests for the last n days - 7 days by default. This report can be filtered by specifying a particular client computer, domain or operating system. By default all client computers, all domains and all operating systems are reported.

Computes the time taken to generate the Altiris Agent configuration policies. The first level report displays the total time taken to generate the policies. Drilling down will show the time taken by each policy.Computes the amount of network traffic and the time to process Altiris Agent configuration requests by time {hh - hour, dd - day of month, dy - day of year, ww - week, mm - month}. The default is daily statistics for the last week.Computes the amount of network traffic and the time to process Altiris Agent configuration requests for the last week (by default).

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 13 of 76

Configuration requests that result in error List Altiris Agent configuration requests that result in error.Configuration requests that result in success List successful Altiris Agent configuration requests for the last 7 days.

Last N Configuration requests List Altiris Agent configuration requests. You can specify the number of items to report (200 by default).

ServerDatabaseItem Report This report lists all items contained in the Notification Server database.Items installed by Solution This report displays all Items that are installed by Solutions.

Event - Queue Status

Bad Queue statistics

Event Queue statistics Events - Scheduled Count scheduled events Groups scheduled events.

Last N scheduled events Scheduled events requiring > 5 seconds to process List Notification Server scheduled events that took more than 5 seconds to process.

Scheduled events statistics by time Computes the amount of network traffic and the time to process NS schedule event for the last week.

Scheduled events summary statistics Inventory Analysis Reports Computer Usage (month to date) Reports the month-to-date computer usage figures (number of users, hours of usage).Computers Found in Resource vs. Identity table This report lists any computers found in the Resource table but not in the Identity table.Computers Never Reporting Events This report lists the computers that have never reported an event.Computers Never Reporting Inventory This report lists the computers that have never reported inventory.

Count of computers by server

Count of Computers Reporting Events

Count of Computers Reporting Inventory

Inventory Forwarding Analysis Inventory Forwarding Computers never forwarded This report lists the computers that have never forwarded inventory.

Inventory forwarding status License Reports

Licenses per Solution Package Server Status Package Distribution Event This report lists the status, transfer rate, and event time for each package and server.Package summary Reports on packages - size, version and the number of servers they reside on.Recovered Packages Lists recovered packages that failed to download and are being retried.

Server load summary

Server summary This report gives a summary of each package server, the packages hosted, the status and disk space used.Servers With Recovered Events Reports on servers who had previous package downloads fail and are being retried.

Policy Reports Disabled Policies Lists disabled policies.Enabled Policies List Enabled Policies.Last N Logins Last n login for a given user on a given computer.Last N policies processed This report lists the last n policies processed.Policies processed between time interval This reports lists the polices that processed successfully between time A and B.Policies processed successfully List policies that have finished processing successfully.Policies requiring > N milliseconds to process List policy requests that took more than n milliseconds to process.

Policy Event History List event history for a policy.Report History Report execution Resource Reports All Assets This report lists all assets contained in the Notification Server database.All Companies This report lists all company resources contained in the Notification Server database.

All Cultures This report lists all cultures (language resources) contained in the Notification Server database.All Departments This report lists all department resources contained in the Notification Server database.All Helpdesk Incidents This report lists all help desk incidents contained in the Notification Server database.All Incidents All Incidents.

This report displays Event Queue and the Fast Event Queue invalid event count and invalid file size data over the specified from-to day range (last 7 days by default) for the specified computer (by default all computers invalid events are shown).This report displays Event Queue and Fast Event Queue event count and queue full data over the specified from-to day range (last 7 days by default) for the specified computer (by default all computers invalid events are shown). It also displays the event file size for these queues.

List n Altiris Agent scheduled events. You can specify the number of items to report (1000 by default) and a from-to time range (last 7 days by default).

Computes the amount of network traffic and the time to process NS schedule event for the last week (by default).

This report lists a count of all client computers, both managed and unmanaged, known to Altiris Notification Server and is grouped by Server. Drill down on a group to get a list of computers in that group. Drill down on a computer for more details in the Resource Manager.This report displays a count of computers per collection (by default "All Computers" collection) that have reported events in the specified time frame (default is 7 days).This report displays a count of computers per collection (by default "All Computers" collection) that have reported inventory in the specified time frame (default is 7 days).Compares the resource counts for various source Notification Servers that have forwarded inventory to this Notification Server.

This reports lists the destination server which is receiving forwarded inventory and the last time inventory was sent. You can then drill down and login to access the destination servers Admin console.

This report displays license information for Notification Server and Solutions over the specified date range. The information is displayed per solution by date and indicates if it is a trial, its total number of licenses, its number of licenses in use, their expiry date and the number of solutions in use. Results can be filtered by solution as well as by date range.

This report lists servers that have reported events in the last n days, their total event transfer rate and the number of packages they have download. Drill downs allow you to then view package details for individual server and from there you can then drill down to the Resource Manager.

List policy requests that took more than N milliseconds to process.

This reports will list the policies that have failed in the last n minutes. The report will list the solution and collection that the policy is applied to.

Lists a count of the reports that have been executed. Note: Since the report tracking is real time, this report is not included in the count.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 14 of 76

All MSI Products All MSI Products. All Network Printers This report lists all network printers contained in the Notification Server database.All Network Resources This report lists all network resources contained in the Notification Server database.All Packages This report lists all packages contained in the Notification Server database.All Resources This report lists all resources contained in the Notification Server database.All Service Packs All Service Packs.All Severity Ratings All Severity Ratings. All Sites This report lists all sites contained in the Notification Server database.All Software All Software. All Software Bulletins All Software Bulletins. All Software Installation Options All Software Installation Options. All Software Installation Types All Software Installation Types. All Software Releases All Software Releases.All Software Types All Software Types (e.g. desktop application, operating system, etc.).All Software Update Packages All Software Update Packages. All Software Updates All Software Updates. All Subnets This report lists all subnets contained in the Notification Server database.Computers This report lists all computers in the Notification Server database.MBSA Security Bulletin All MBSA bulletins in the Notification Server Database.MBSA Security Bulletin HfNetChk Mode MBSA Security Bulletin HfNetChk Mode. MSI Products MSI Products.Software Delivery Packages This report lists all software delivery packages.Software Release Inventory Software Release Inventory Software Update Inventory Software Update Inventory Users This report list all user resources.

Saved Report Runs Report runs by date Security ReportsPrivileges granted to roles Show the privileges that have been granted to a role.Security permissions granted in the last N days List all security permissions granted in the last n days.Security privilege access violations by user in the last N daysList security privilege violations caused by user in the last n days.Security privileges granted in the last N days List security privileges granted to roles in the last n days.User permission assignments on management items The permissions assigned to a user or group, on items.User permission assignments on resources The permissions assigned to a user or group, on resources.

Server Performance Reports

Server Load by Last 'N' Days

Server Load by Start and End Date Site ReportsPackage servers contained in site

Package servers contained in subnet

Sites that contain package server

Subnets contained in site Software ManagementApplication ManagementBaseline Added - FilesAdded Files - Pivot

Added Products by Computer

Count of Added Products

Size of Added Products

Top 'N' Computers with Most Added Files Baseline Added - Registry Added Keys by Computer Top 'N' Computers with most Added Keys This report lists the top n computers that have the most added registry keys.

Baseline Deployment - Files

Baseline by Domain - Pivot

List Report Runs sorted by creation date. You can specify the number of items to report, and the sort order. Use this report to determine what reports can/will be purged.

This report shows the load on the Notification Server and displays total times taken to process scheduled events, events and configuration requests for the last n days. You can then drill down to see all scheduled events, events or configuration requests for a chosen day and then into the Resource Manager.

This report shows the load on the Notification Server and displays total times taken to process scheduled events, events and configuration requests between the specified start and end dates. You can then drill down to see all scheduled events, events or configuration requests for a chosen date and then down into the Resource Manager for more detailed resource information.

This report lists the package servers contained in a site. The initial report lists known sites from which you can then drill down to see the package servers contained in the chosen site.

This report lists the package servers contained in a subnet. The initial report lists known subnets from which you can then drill down to see the package servers contained in the chosen subnet.

This report lists sites that contain a package server. The initial report lists known packager servers from which you can then drill down to see the sites that contain the chosen packager server.This report lists subnets contained in a site. The initial report lists known sites from which you can then drill down to see the subnets contained in the chosen site.

Easily and quickly find unauthorized added files. Start with the manufacturer, explore the products, then the file names and ultimately drill down into the details for a specific computer.A summary list of all of the products added to the computers on your network. The list is sorted by computer name and includes the number of files reported by baseline.This report records the number of product instances that have been installed in your network. You drill down to the computer by following the product.This report computes the aggregate size of each product across all of the computers in your network that have a specified minimal aggregate size, so you can determine the impact. Drill down to see the list of computers and individual size of each file.This report lists the top n computers with the most added files. If you don't want to be bothered by computers with added files fewer that 100 then accept the default computer filter. NOTE: The baseline agent can limit the number of added files reported in the added table, therefore the number of rows in the database may be lower than the number of added files.

This report lists the registry keys that have been added and orders them by computer. It drills down to a list of added keys and values.

Use this report to determine what baselines are deployed in which domains. Expand the domains in the display and double-click on the computer name to drill down into the details for the computer.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 15 of 76

Baselines

Computers Not Reporting in Last 7 Days

Computers Running Baseline Agent

Count of Computers by Baseline

Verify Baseline Agent Version Baseline Deployment - RegistryBaselines This report lists the baselines that exist.Computers Not Reporting in Last 'N' Days This report lists the computers that have not reported a baseline in the time specified.

Count of Computers by Baseline This report lists the computers according to the baseline by which the computer is categorized.

Baseline Missing, Different - Files Different Version Files - Pivot

Different Version Files by Product

Missing Files - Pivot

Missing Files by Product

Top 'N' Computers with Different Version Files

Top 'N' Computers with Missing Files Baseline Missing, Different - Registry Missing or Different Keys and Values by Baseline

Missing or Different Keys and Values by Computers This report lists the registry keys that are missing from the baseline and categorizes them by computer.

Top 'N' Computers with Missing or Different Keys Baseline Summary

Aggregate Compliance % by Computer

Average Baseline Compliance %

Average Number Missing, Different by Baseline

Compliance Level by File Baseline

Compliance Level by Registry Baseline

Count of 100% Compliant Baselines

Summary of all File Baselines

Top 'N' Lowest Aggregate Compliance % Windows Installer Agent All Repair Attempts in Last 'N' Days

This reports helps you keep track of all the baselines you have deployed. It reports the name and version, the reference system (from which the snapshot was taken), the date and the number of files in the snapshot. Note: You can use multiple versions of a baseline to track software roll-outs. Use this report to verify that you have the right baseline deployed. Drill down into the table to view the list of computers.

This report lets you determine which computers are not reporting (baseline data) regularly. Each individual baseline is reported. Typically you will schedule the running of the baseline agent using SMS advertisements. The report will indicate the number of days since the last report (of any baseline). You can create a custom report to focus on specific baselines if you are running multiple.This report counts the number of computers that are running baseline (i.e., have reported at least one baseline result) and the number of computers that are not running baseline. Drill down into the graph to view the list of computers.This report displays the number of computers that are running a baseline in a graph. Drill down into the graph to view the list of computers for that baseline name and version.This report allows you to determine what versions of the baseline agent are deployed throughout your enterprise. Drill down into the graph to view the list of computers.

Find back-leveled DLLs, EXEs and OCXs easily using the pivot report. Double-click on the name to drill down into a computer.This report finds products with different version files. Drill down into the product for the list of files that have a different version and from there drill down to view the list of computers with the different version file, including the expected version number and expected file size.Find missing files quickly and easily. Start with the manufacturer, explore the products, then the file name and ultimately drill down into the details for a specific computer.This report finds products with missing files. Drill down into the product to find the list of missing files and then drill down to view the list of computers with the missing file.

This report lists the top n computers with the most different version files. You can filter the list of computers by changing the different version files computer filter. NOTE: To save resources, the baseline agent can limit the maximum number of different version files that are reported to SMS. Hence the number of different version files and the number of reported different version files may be different.This report lists the top n computers with the most missing files. You can filter the list of computers by changing the missing files computer filter. NOTE: To save resources, the baseline agent can limit the maximum number of missing files that are reported to SMS. Hence the number of missing files and the number of reported missing files may be different. (Note that not all data fields will be populated, depending on the baseline configuration.)

This report lists the registry keys and values that are missing from the baseline and categorizes them by baseline.

This report lists the computers that have registry keys that are missing or different from the baseline for that computer. It drills down to a list of the keys and values.

This report aggregates the individual baseline compliance % for each computer, reporting one overall compliance % for the computer. For example, you may have three baselines (OS, Office, IE). This report will group the computer into levels using the aggregate compliance %. Drill down into the chart to view the compliance % for each individual baseline sorted by computer.

This report displays the average compliance level for each baseline (i.e., the average compliance % across all the computers). You can drill down into each baseline to view the specific computer details. Sort the 'Compliance %' column to find the computers that need the most attention. You can filter the report by specifying a domain name, or simply use '%' to view all of the computers in your database.Use this report to determine the average number of missing files and different version files by baseline. This report can help you identify the summary compliance level across all of your computers. Drill down into the table to view the list of computers and the actual number of missing files and different version files reported by baseline.

This report displays the number of computers by compliance level (% range) for each baseline in a bar graph. Note: A single computer can have multiple baselines. When you drill down into the graph the compliance % for each baseline is displayed sorted by computer name. This report lets you quickly identify which particular baselines (software components and applications) are not compliant.

This report displays the number of computers by compliance level (% range) for each baseline in a bar graph. Note: A single computer can have multiple baselines. When you drill down into the graph the compliance % for each baseline is displayed sorted by computer name. This report lets you quickly identify which particular baselines (registry keys) are not compliant.The report displays the number of 100% compliant baselines. Note: A computer can have more than one baseline (e.g., OS, Office, IE). This report shows the number of baselines that are 100% compliant and the number of baselines that are not. Drill down into the graph to view the list of computers (and baselines) sorted by compliance %.Reports summary of each file baseline run. From the summary, you can drill down to a list of all added, missing and different files reported on a computer from a specific compliance scan.

Reports the top n computers that need the most attention, which makes performing triage a snap. If you don't want to view computers that have a compliance % greater than 80, you can restrict the list of computers by adding a query filter that requires the compliance % be less than or equal to 80. In any case, this report will find the computers that need your attention. Simply drill down into the table to view the compliance % and the number of files missing, with different version and added.

This report lists summary information of all repair attempts within a variable number of days. From this summary information, you can drill down to the Resource Explorer.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 16 of 76

Computers not Reporting in Last 'N' Days

Computers Reporting Broken Components

Computers Reporting Inaccessible Source Paths

Computers with most Broken Products Computers with No Windows Installer Agent Installed Reports Windows computers that have never reported Windows Installer data.

Failed Repair Attempts in Last 'N' Days

Feature Install State by Computer

Installed Products - Summary

Most Frequently Broken Products

Product Summary by Computer

Successful Repair Attempts in Last 'N' Days

Windows Installer Agent - Summary Application MeteringAgent StatusApplication Metering Agent Not Reporting Data This report shows all computers with an application metering agent not reporting data in the last n days.Application Metering Agent Rollout Status This report shows a count of all computers having or needing the application metering agent.Applications by Monitor Policy View all application monitoring policies.Computers with Application Metering Agent View a count of all computers with the application metering agent by version.Computers with Monitor Policy Enabled This report shows a count of computers and the number of policies enabled.

Application Performance Application Exceeding 'N%' CPU Usage

Application Run More Than 'N' Times Use this report to view applications which have exceeded a specified number of threshold executions.Application Total Run Time Specify an application and date range to view total run time of the given application.Average CPU Usage by Application Input application, domain, percent and date range to view CPU utilization.Average Run Time by Computer Input application and date range to view the application average run time by computer.

Computers with Applications Exceeding 'N%' CPU Usage Computers with Applications Exceeding 'N%' CPU Usage.

Application UsageAmount of Time Logged In Input domain and date range to view the amount of time Logged In.Amount of Time Running Applications Input application, domain, user and date range to view application run time.

Application Usage - Average Input number of days, minimum number of runs, domain and application to view average application usage.Applications Least Used Input application, domain and number of days to view least-used applications.Applications Usage - Max or Min Daily Count Applications Usage - Max or Min Daily Count.Applications Used by Largest Number of Computers Applications Used by Largest Number of Computers. Applications Used by Smallest Number of Computers Applications Used by Smallest Number of Computers. Count of Application Usage Input application, domain and number of days to view a count of application usage.

Count of Application Usage - User Input application, domain, number of days, and user name to view a count of application usage.

Count of Computers by Application Input application name, domain and number of days to view a count of computer by application name.

Concurrent Usage Concurrent Usage Input the domain, date range and application to view occurrences of concurrent usage.Concurrent Usage by Policy Input the domain, date range, and policy name to view occurrences of concurrent usage.

Cost Analysis

Cost by Location

License Comparison (Used vs. Installed vs. # Licenses)

License Cost Analysis

SW Installation and License Summary Discovered Applications Application First Discovered Date and Computer List of applications discovered by date and computer name.Count of Computers by Discovered Applications Count of computers with each discovered application.

Count of Computers by Discovered Applications and Versions.

Count of Computers with Newly Discovered Applications Count of Computers with Newly Discovered Applications. Count of Discovered Applications by Computer Count of Discovered Applications by Computer.

History and TrendApplication Usage Input application, application manufacturer, and date range to view summary application usage.

This report lists computers that have not reported in the last n days. It then drills down to the Resource Explorer.This report will list computers that are reporting broken Windows Installer components. You can then drill down to the Resource Explorer.This report counts how many inaccessible source paths each computer has. You can drill down to see which components of a selected computer are broken. You can then drill down to list inaccessible source paths. You can then drill down to the Resource Explorer.Lists computers with the most broken products. Drills down into all broken products of selected computer, then drills down to the Resource Explorer.

This report lists summary information of failed repair attempts within a variable number of days. From this summary information, you can drill down to the Resource Explorer.Displays product feature install states for computer Y. From this report you can drill down to the Resource Explorer.This report lists products and how many times they have been installed. It drills down to all computers with the installed product.List most frequently broken products. Drills down into all broken components of selected product, then drills down to the Resource Explorer.This report displays a summary of installed products on one or more computers. You can drill down to a list of broken components for each product.This report lists summary information of successful repair attempts within a variable number of days. From this summary information, you can drill down to the Resource Explorer.This report shows summary information for all Windows Installer Agent scans in the last n days, then drills down to the Resource Explorer.

Enter the application, domain, percentage threshold and date range to view applications that exceed the specified CPU usage limit.

This report combines the licensing cost with the installations at the location to calculate the cost of applications at each location. Inventory Solution needs to be installed and the user data must be collected in order to view this report.

This report displays a count of computers with installed product licenses compared to a count of computers that use the products. Inventory Solution needs to be installed in order to view this report.

Track the count of distinct product. Calculate the total cost from this count by entering the number of licenses purchased and the cost. Inventory Solution needs to be installed in order to view this report.This report corresponds with Microsoft's licensing design. Use this report to calculate the licensing excess or deficiency based on your current installations and the types of Microsoft licenses purchased. Inventory Solution needs to be installed in order to view this report.

Count of Computers by Discovered Applications and Versions

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 17 of 76

Application Usage by Computer Input computer name, domain, and date range to view application usage data.

Installed vs. Used

Installed vs. Used Start-Stop-Denial Events Applications by First and Last Start List applications by time of first and last execution.Applications by Last Stop List application by last stop time.Denial Events by Application List denial events by application.Event Types View count of all denials, starts and stops by date range.

Patch ManagementAgent InformationAgent Installation Status Lists the status of all Software Update agent installations during the past week (by default).

Agent Summary Agent Software Update Packages Software Update Packages - Checkpoint Recovery

Software Update Packages - Download Summary

Software Update Packages - Errors

Software Update Packages - In Progress

Software Update Packages - Last 'N' Completed Software Update Packages - Last 'N' Events Lists the last n software update package download events.

Agent Software Update Task Execution Software Bulletin Task Execution Summary Software Bulletin Task Execution Summary. Software Update Task Execution Summarizes the execution results for all scheduled software update tasks.Software Update Task Reboot Status - Summary Software Update Task Reboot Status - Summary.

ComplianceCompliance Level by Computer - Summary Software Bulletins

Software Bulletin Status - Summary

Software Bulletins by Software Release

Superseded Bulletin Summary Software Update Summary Count of Software Updates by Service Pack Count of Software Updates by Service Pack.

Count of Software Updates by Severity

Count of Software Updates by Software Release Displays a count of software updates applicable to a particular operating system or application version.

Downloaded Software Updates by Bulletin Software Update Download Status Lists the status of all software updates downloaded to the configured Altiris server.

Software Updates by Software Release Vulnerability Analysis Detected Vulnerabilities by Computer - Summary

Detected Vulnerabilities by Severity Rating PC TransplantCapture Personality ReportsComputers Where Package Build has Failed

Computers Where Package Build has not been Scheduled This report shows the computers which have not been scheduled for a personality package build.

Computers Where Package Build has Succeeded

Computers Where Package Build is in Progress This report shows the computers which are building personality packages within a specified period of time.

Package Contents Package Group Status This report shows the status of personality packages in all or a specific package group.

Package Groups Created

Packages Built by PC Transplant Standalone This report shows all the packages that have been built by PC Transplant standalone on a specific computer.

Deploy Personality Reports Computers Where Package Deploy has Failed

Inventory Solution complements this report - although it is not required. ALL discovered software installed in your environment will be listed. You can filter by domain, application, version, manufacturer, and date to see how many of those applications have been used.

Lists computers with the Software Update Agent installed, the Agent version and the operating system information.

Lists any software update packages that required checkpoint recovery during the download. The report also displays at what point (byte offset) the recovery started.Summarizes all agent software update package downloads. The report also calculates the download session duration and the transfer rate.Lists any software update package that reported errors during download. The report can be used to identify computers with communication errors.Lists any software update packages that are currently being downloaded or have been abandoned. The delta time represents the time since the download session was started. To find abandoned sessions, specify a large delta time threshold.Lists the last n software update package download sessions that have completed. The report can be used to track recent activity.

Lists the overall compliance percentage based on the number of software update tasks and the number of installed software updates.

Displays summary information on software bulletins and the number of software updates for each bulletin. The results can be filtered to display only enabled bulletins, bulletins of a particular severity or bulletins with full/partial software update downloads.

Displays summary information on all software bulletins. The results can be filtered to display only enabled bulletins, bulletins of a particular severity or bulletins for a particular software product.Displays all software bulletins that have been superseded by a subsequent software bulletin or all software bulletins that have not been superseded.

Displays a count of software updates by severity and software release. The results can be filtered by severity and release date.

Displays a count of available software updates by software bulletin and the number of software updates actually downloaded to the configured Altiris server.

Displays summary information on all software updates. The results can be filtered to display software updates by severity, software release, software bulletin and release date.

Summarizes the MBSA security update scan results by computer. The results can be filtered to display a list of software bulletins required for a computer.

Displays a count of computers requiring a specific software update based on the MBSA vulnerability scan. The results can be filtered to display only bulletins of a particular severity rating.

This report shows the computers in all or specific package groups which have experienced a failure building a personality package within a specified period of time.

This report shows the computers in all or specific package groups which have successfully built a personality package within a specified period of time.

This report shows the contents of personality packages built on a specific computer within a specified period of time. Specifically, the report details which applications and users the package has settings for.

This report shows all the package groups that have been created along with number of packages in each group.

This report shows the computers in all or specific package groups which have experienced a failure in deploying a personality package within a specified period of time.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 18 of 76

Computers Where Package Deploy has Succeeded Computers Where Package Deployment is in Progress This report shows the computers on which deployment of personality packages is in progress.

Package Contents Package Group Status This report shows the status of personality packages in all or a specific package group.

Package Groups Deployed

Packages Deployed by PC Transplant Standalone Migrate Personality Reports Computers Where Migration has Failed

Computers Where Migration has Succeeded

Computers Where Migration is in Progress This report shows the computers which are performing migration within a specified period of time.

Migration Contents

Real-time Migration by PC Transplant Standalone This report shows all the real time migrations on specific computers by PC Transplant standalone.

Software Delivery (Windows)Application InventoryComputers With Selected Application Installed Displays all the Computers on which the selected Application is installed.Computers With Selected Application Uninstalled Displays all the Computers on which the selected Application was uninstalled.Installed Applications Status by Computer Displays the Applications installed on selected Computer.Uninstalled Applications Status by Computer Displays the Applications uninstalled from selected Computer.

Audit InformationDeleted Packages by User Displays the deleted packages by username.Deleted Programs by User Displays the deleted programs by username.Deleted Tasks by User Displays the deleted tasks by username.Modified Packages by User Displays the modified packages by username.Modified Programs by User Displays the modified programs by username.Modified Tasks by User Displays the modified tasks by username.New Packages by User Displays the new packages by username.New Programs by User Displays the new programs by username.New Tasks by User Displays the new tasks by username.Client Package Download Package Download - Checkpoint Recovery

Package Download - Errors

Package Download - In Progress

Package Download - Last 'N' Completed Lists the last n package download sessions that have completed. Use this report to track recent activity.Package Download - Last 'N' Events Lists the last n package download events. This report can be help debugging.

Package Download - Last 'N' Started Package download - Summary Lists package downloads that occurred. Calculates the duration and the transfer rate. Package Download due to Source Update Lists packages that had to be downloaded again because the package source was updated.

Client Program Execution Execution - All Lists all program execution regardless of status.Execution - Failed Lists program execution that resulted in failure code, i.e., not 0.

Execution - Nothing Reported Execution - Success Lists all successful program execution.First Execution Lists the first program execution regardless of status.Last Execution Lists the last program execution regardless of status.Next Execution - Late Lists the next program execution if it overdue by more than n minutes.

Client Software Delivery Task Status Software Delivery - Summary

Software Delivery Task - Summary

Software Delivery Task Download - Summary

Software Delivery Task Execution - Summary

Software Delivery Task Status - History

Software Delivery Task Status - List

Software Delivery Task Status - Summary

This report shows the computers in all or specific package groups on which a personality package has been deployed successfully within a specified period of time.

This report shows the contents of personality packages deployed on a specific computer within the specific period of time. Specifically, the report details which users were migrated.

This report shows all the package groups that have been deployed along with number of packages in each group.This report shows all the packages that have been deployed on specific a computer by PC Transplant standalone.

This report shows the computers which have experienced a failure during migration within a specified period of time.This report shows the computers which have completed migration successfully within a specified period of time.

This report shows the contents of migration done within a specified period of time on a specific computer. Specifically, the report details which applications and users were migrated.

Reports package download that required checkpoint recovery. Reports at what point (byte offset) the recovery starts.Lists package download errors (wrong platform, insufficient space, and so forth). Use this report to identify Computers with communication errors.

Lists package download sessions that are still in progress or have been abandoned. Calculates the delta time since the download session was started. Specify a large 'Delta Time' threshold to find abandoned sessions.

Lists the last n package download sessions started (regardless of whether the download has completed). Use this report to track recent activity.

Lists the software delivery task that were never executed. NOTE: This report does not check whether the package was downloaded.

Counts Software Delivery Tasks, packages, programs, collections (participating in software delivery task). Use this report to get an overview of all of the definitions.Lists software delivery task summary including status of the software delivery task, package download and program execution (success and failed). Use this report to review progress of the software delivery task. NOTE: The # Download will be zero if the package has no files. The # Success and #Failed is an aggregate count. For example, if the program execution failed and then succeeded during a second attempt both counts will be reflected.Lists Software Delivery Task summary status. Use this report to review the state transitions for a software delivery task.Lists software delivery task execution summary including status of the program execution (success and failed and last execution success). Use this report to review progress of the software delivery task. NOTE: The # Download will be zero if the package has no files. The # Success and # Failed is an aggregate count. For example, if the program execution failed and then succeeded during a second attempt, both counts will be reflected.Lists Software Delivery Task status (Active, Inactive, Expired) history in chronological order. Use this report to understand the software delivery task status transitions for the clients.Lists Software Delivery Task status (Active, Inactive, Expired). Use this report to understand the current software delivery task status for the clients.Lists Software Delivery Task summary status (Active, Inactive, Expired) count. Use this report to get count of the software delivery task status.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 19 of 76

Software Delivery Task Summary - All Activity Packages/Programs Packages - All Packages - Deleted This report lists packages that have been deleted.

Packages with no Software Delivery Task associated Programs - All Displays all programs. There is no drill-down for this report.

Software Delivery Task Definitions Software Delivery Task - Active

Software Delivery Task - Deleted

Software Delivery Task - Expired

Software Delivery Task - Mandatory

Software Delivery Task - No Expiration Date

Software Delivery Task - Optional Software Portal Request Activity Summary Displays the summary of the requests activity.Software Requests by Machine Displays software requests by computer.Software Requests by User Displays software requests by username.

Lists Software Delivery Task summary including all activity. In this case the counts are cumulative over time. Use this report to review all of the activities associated with the software delivery task.

This report displays all of the packages. You can drill-down to view the list of advertised programs that depend on a package.

This report lists packages with no [active] Software Delivery Task. NOTE: The package will be included in the list if the Software Delivery Task has expired. This report helps you find unused (dead) packages.

This report lists Software Delivery Tasks that are active, i.e., visible to end-users. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists Software Delivery Task that have been deleted. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists Software Delivery Tasks that have been expired, i.e., no longer visible to end-users. After some days the associated package files will be deleted. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists mandatory Software Delivery Tasks that have a start date. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists Software Delivery Tasks that have no expiration date. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists optional Software Delivery Tasks that have no start date. You can drill-down to view the list of advertised programs for a Software Delivery Task.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 20 of 76

Inventory WindowsAdd or Remove ProgramsCount of Computers with Distinct Add/Remove Program Applications

Count of Distinct Microsoft Product Id's by Count of Installed Products Name of Microsoft application, count of product IDs, and count of computers.

Distinct Add/Remove Program Applications Detail listing of all distinct Add or Remove Program applications.Hidden Programs Windows installed applications that were installed hidden, gives uninstall path.

Antivirus and GamesAnti-virus Installation Directories List of directories, where antivirus applications are installed, and count of computers.

Computers with No Auditing Computers with no auditing. Count of Computers with Anti-virus Software Count of computers and installed antivirus software application and version.Count of Computers with Audit Policy Settings Count of Users with Admin Rights Games by Domain (Pivot) Detail report of game applications installed by domain.Unprotected Computers Computers without antivirus software installed.Virus Signature File(s) by Date Computers and their virus data file dates. Drill down to a computer for more details.

Audit DetailProducts and Versions View all products and versions. Filter by domain, OS, Product Name and Manufacturer.

Products by Computer

Audit SummaryAudit Software by Domain (Pivot) Details of software application audit by domain.Count of Products List of each application and count of installed computers.Count of Products and Versions List of each application and version and count of installed computers.Count of Products by Manufacturer List of manufacturers and count of products associated with each.Disk Usage by File Extension File extension and enterprise-wide disk usage associated with each.Products on 'N'% of Computers List of products on at least N% of computers. Drill down to associated computers.Top 'N' Computers by Product Count List of top n computers with most installed applications, product ID, number of products.

DeploymentApplication Upgrade Cost Analysis

View data about size of inventory and time of audit execution.

Computers Not Reporting Audit Software Data in Last 'N' Days List computers that have not reported audit information in specified number of days.

Computers Not Reporting Inventory in Last 'N' Days List computers that have not reported an inventory in the specified number of days.

Count of Audit Software Agent by Version View count of software audit agent version by computer.Count of Computers Running Audit Software Agent View a count of computers running the software audit agent.Distinct Directories with Missing Manufacturer Data Distinct application installation directories with missing manufacture data.Distinct Files with Missing Manufacturer Data Distinct files missing manufacture data in the file header.Generate Audit Config for Software with Missing Manufacturer Data Generate audit config for software with missing manufacturer data.

Inventory Agents Status and Version List of computers, inventory agent status and version.New Computers Discovered in Last 'N' Days DiagnosticsAeXSNPlus - All Fields (Except Memory Modules) View computers and results of AexSNPlus agent.

Disk, CD, and TapeAggregate Disk Size and Free Space by Computer List computers and aggregate disk size and free space in megabytes.Computers with Disk Drive Changes in Last 'N' Days Computers with Free Space Less Than 'N' Megabytes Computers with Free Space Less Than 'N' Percent Computers with No CDROM/Floppy Drive Computers with no CD-ROM or floppy drive. Computers with Tape Drive Computers with tape drive. Computers with Writeable CD Drive Computers with writeable CD drive. Computers with ZIP Drive Computers with ZIP drive. Count of Disks by Size Level Distinct Manufacturers and Models List of distinct drive manufacturers and models. ExchangeComputer Operating System, Disk and Contact Information List of computer, operating system, and Exchange user profile contact information.Computers with Multiple Exchange Users Computers with multiple exchange users.Computers with Multiple Logon Users List of computers with multiple logon users and count of logons.Computers with Personal Folders List of computers with PST personal folders.Count of Exchange Users by Job Description Count of exchange users by job description. Count of Exchange Users by Location Count of Exchange Users by Location. Count of Exchange Users by Organization Count of Exchange Users by Organization.Exchange Users List of exchange users and contact information.Exchange Users with No Contact Detail Exchange Users with No Contact Detail.

Number of occurrences of each distinct Add or Remove Programs application with count of computers, version, and name.

Count of computers with associated auditing enabled, logon events, account logon events, account management.List domain, users, computers, and input parameter of minimum number of computers where users have admin rights.

View all products and versions. Filter by domain, OS, Product Name, Manufacturer, and Computer name.

Calculate computers that need resources for an application upgrade. Input operating system name, service pack, operating system type (server, workstation, and so on), CPU minimum, disk size minimum, free disk space minimum, and memory minimum.

Calculate Total Inventory Size, Average Size and Software Audit Scan Time

List of computers discovered in the prior n days.

List computers with disks added, changed, or removed in the prior n days.List computers with less than n megabytes of free disk space.Computers with free space less than n percent.

Specify ranges, for example, 10 GB, 20 GB, and 30 GB, and view all computers in each drive range.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 21 of 76

Local User Profiles computers with local user profiles.Primary User(s) Local user by computer.Primary User(s) with Contact Information Primary Users with Contact Information. Top 'N' Computers by User Profiles List of Top n computers with most user profiles.User Profiles Across Multiple Machines List of top user profiles across multiple computers.User Profiles with No Activity User Profiles with No Activity. Inventory Capture'N' Most Recent Inventory Captures MemoryComputers with Free Memory Slot(s) Computers with free memory slots.Computers with Memory Change in Last 'N' Days Computers with Memory Change within 'N' Days of One Another Computers with Memory Decrease in Last 'N' Days Computers with Memory Increase in Last 'N' Days Memory Configuration by Computer Top 'N' Computers with Largest Page File Size Top 'N' Computers with Largest Physical Memory Size Microsoft BackOfficeMicrosoft Exchange Servers List of Microsoft Exchange Servers and version.Microsoft IIS ServersMicrosoft SMS Servers List of computers with Microsoft SMS installed.

List of computers with SQL components and versions.

MS BackOffice Components List of computers with all back office products (Exchange, IIS, SQL).MS BackOffice Server Configuration MS DNS Servers List of DNS servers with DNS version.Microsoft OfficeComputers with MS Office XP/2000/97 by Domain Count of Computers with MS Office by Domain Count of all computers with MS Office by domain name.Count of Core MS Office Components Installed

Count of MS Office XP/2000/97 Components Count of core MS Office products (2000/XP/97). Drill down for computer details.Distinct Components and Versions Listing of all MS Office components broken down by distinct product version.MS Office by Domain (Pivot) Pivot table report of all MS Office components by domain.MS Office Installation Directories Listing of distinct MS Office installation directories and number of computers for each.

Multiple Copies of MS Office Installed computers with multiple copies of MS Office installed.Percentage of Computers with MS Office by Domain Table with total number of computers, computers with Office and percentage.Operating SystemComputer Summary (Model, CPU, Memory, Disk and Network)

Computer Summary (Pivot) Pivot table summary of all computers.Computer summary with number of products installed by computer.

Count of Computers and OS Products Report of # of computers versus # of OS Product IDs.Count of Computers by Operating System and Installation Directory Count of computers, grouped by distinct OS installation directory.

Count of Operating System Count of computers by OS name. Drill down for more details about each OS.Count of Operating System and Version Count of Operating System, Version and Service Pack Count of computers by OS Version with Service pack level.Count of System Type Count of Systems with OEM Licenses Count of systems with OEM-licensed OS and non-OEM-licensed OS.Dual Boot Windows/UNIX or Duplicate Computers List of dual boot Windows/UNIX computers, or list of duplicate computers.Operating System UpdatesCount of Windows 9X Computers without Update 'X' Count of all Windows 9x computers without specified Hotfix.Count of WinNT/2000/XP Computers without Update 'X' Count of all NT/2000/XP computers without specified Hotfix.Distinct Windows 9X Updates by Computer Query by computer and view all installed Windows 9x updates.Distinct WinNT/2000/XP Updates by Computer Query by computer and view all NT/2000/XP updates.Physical DriveComputers with a Un-partitioned Disk Space Computers with Greater Than or Less Than 'N' Gigabyte Hard Drive List of computers with input parameters <= or >= specified size in Gigabytes.

Computers with 'N' Hard Drives

Primary UserPrimary User by Domain List of computers and primary users. Filter by computer name and domain.Primary User on Multiple Computers List of primary users on multiple computers by number of computers.

List of the last n chronological inventories posted to the Notification Server.

Computers with memory change in last n days. Computers with memory change: input the number of days between changes, and number of days since the change occurred.Computers with Memory Decrease in Last n Days. Computers with Memory Increase in Last n Days. List of computer and memory configuration: physical memory, page file size, page file to physical ratio, and computer type.Top n Computers with Largest Page File Size. Top n Computers with Largest Physical Memory Size.

List of computers with Microsoft IIS installed, with IIS version. Drill down to a particular computer for more details.

Microsoft SQL Servers, Transaction Servers and Distributed Transaction Coordinators

Configuration details (Memory, CPU Speed, Free Space, Installation directory) for MS Back Office servers.

List of computers with MS Office 2000/XP/97 by domain. Drill down computer level for more detail.

Count of core components (Access, Excel, Frontpage, Outlook, PowerPoint, Word) showing number of installations and number of computers. Drill down for more details.

This report shows a computer summary (Domain, Logon ID, IP Address, Gateway, Subnet, OS type, Computer Manufacturer, Computer Model,Serial, CPU, Memory, OS and version, Service Pack, Installation Directory, Disk format, size and free space). Drill down for details about each computer.

Computer Summary with Count of Products (Model, CPU, Memory, Disk, Network and Applications)

Count of computers by OS and version. Drill down for more details about the computers for each OS version.

Count of computers by OS system type (Advanced Server, Professional, Enterprise Server, Server, etc).

Specify the threshold difference between physical and partition size to find computers with un-partitioned space.

Input operator (<, <=, >, >=) and number of hard disks to view computers with specified number of hard disks.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 22 of 76

Primary User with Contact Details List of primary users with Exchange contact information. Filter by computer name and domain.

PrintersComputers with Fax Driver List of computers with installed fax drivers.Computers with Local Printers List of computer with local printers and printer port used.Count of Printers by Manufacturer Count of Printers by Manufacturer. Network Shares by Computer, User, Access Rights, and Path

TCP/IP Network Printers List all network TCP/IP Printers.ProcessorCount of Computers by OS, Processor Name, and Speed Count of computers by processor name and speed. Drill down for details about each computer.

Count of Computers by Processor Name and Speed Count of Computers by Processor Speed by Level Count of Computers with Multiple Processors List of computers with more than one processor.Scheduled TasksAT Commands Specify a computer name and view all scheduled AT commands that are queued.Scheduled Tasks Specify a computer name and view all Windows scheduler tasks that are queued.Serial Number Computer Model and Serial Number Information List of computer names, computer manufacturer, model and serial number.Computer Model and Serial Number with Contact Information Computers by BIOS Date List a specified number of computers by BIOS release date.Computers where Serial Number was Not Found List of computers where no serial number has been reported.

Computers with Changed Identity List of computers by serial number with changed computer identity information.Computers with Incomplete Computer Model Information Computers with Incomplete Computer Model Information.

Computers with Incomplete Computer Model Information with Contact Information.

Computers with Incomplete Manufacturer BIOS Information Computers with Incomplete Manufacturer BIOS Information.Computers with Incomplete Manufacturer BIOS Information with Contact Information.

Count of Computers by BIOS Manufacturer Count of Computers by BIOS Manufacturer. Count of Computers by Computer Model Count of computers by manufacture and model.Count of Computers Running Serial Number Agent Count of computers running the AeXSNPlus serial number agent.Count of Computers with No Serial Number by Operating System Count of with no serial number, listed by OS.

Count of with no serial number, listed by OS with Exchange User profile information.

Count of Computers with Serial Number Detection Method Used Count of Laptop and Desktop Computers Count of Serial Number Agent by Version Count of computers by Altiris AeXSNPlus serial number agent version.Percent of Computers Reporting Serial Number Percent of computer with serial number reported.TCP/IP Count of Computers by Default Gateway Count of computers listed by the default gateway address.Count of Computers by DHCP Server Count of computers by DHCP Server. Count of Computers by IP Routing Enabled Count of computers that have IP routing enabled.Count of Computers by Primary DNS Count of computers by name of primary DNS server.Count of Computers by Primary WINS Server Count of computers by Primary WINS Server. Count of Computers by Secondary DNS Count of computers by Secondary DNS.Count of Computers by Secondary WINS Server Count of computers by Secondary WINS Server.Count of DCHP Status by Default Gateway Count of computers by DHCP status (enabled/disabled) by default gateway.Count of PCs by DHCP Server Count of PCs by DHCP Server. Count of Systems by Address Type Count of computers by address type, e.g. 255.255.0.0, 255.255.192.0, etc.Web BrowsersComputers with Internet Explorer and Netscape Distinct Count of Internet Explorer and Netscape Internet Explorer by Version Count of computers by distinct IE versions.Internet Explorer Components by Version Internet Explorer Components (e.g. NetMeeting) by Version. Internet Explorer Multiple Copies Installed Internet Explorer Multiple Copies Installed.Internet Explorer Version by Operating System Count of computers for each OS by distinct IE version number.Netscape by Version Count of computers by Netscape Navigator version.Web Browsers by Computer List of web browsers by computer, with version number and install directory.Web browsers by Domain (Pivot) Pivot table report of all web browsers by domain.Windows 2000/XP UpgradeComputers Requiring Resources

Computers Requiring Resources with Contact Information

List of network shares by computer, share name, access group, access granted and path. Filter the report with input parameters type of share, share name, group or user granted access, or type of access.

Count of processors by name (e.g. Intel Pentium 4 processor, Intel Pentium III Xeon processor), speed and number of computers.Input 5 values of processor speeds and view a count of computers that fall within those specified ranges.

List of computer names, computer manufacturer, model and serial number with Exchange user profile contact information.

Computers where Serial Number was Not Found with Contact Information

List of computers where no serial number has been reported, with Exchanger user profile contact information.

Computers with Incomplete Computer Model Information with Contact Information

Computers with Incomplete Manufacturer BIOS Information with Contact Information

Count of Computers with No Serial Number by Operating System with Contact Information

Count of computers with method of serial number detection (baseboard, enclosure, not found, system, WMI, etc).Count of computer by type, e.g. desktop, laptop, mini tower, notebook, portable, server chassis, etc.).

List of computers with both IE and Netscape Navigator installed, includes IE/Netscape version numbers.Count of computers with distinct versions of IE and Netscape, grouped by browser name and version.

Input minimum CPU speed, minimum disk size, minimum disk free space, minimum memory for servers, minimum memory for workstations and view all computers that do not meet the stated upgrade resource requirements.Input minimum CPU speed, minimum disk size, minimum disk free space, minimum memory for servers, minimum memory for workstations and view all computers that do not meet the stated upgrade resource requirements. Computers listed with associated Exchange User profile information.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 23 of 76

Computers with Free Memory Slot Computers with Free Memory Slot. Computers with Too Little Disk Count of Computers Requiring Resources Count of Computers Requiring Resources with Contact Information Windows 2000 Upgrade Cost Analysis

Windows 2000 Upgrade Cost Analysis with Contact Information

Windows XP Upgrade Cost Analysis

Windows XP Upgrade Cost Analysis with Contact Information

Inventory MacintoshComputer SummaryCount of Computers by Computer Model Count of computers by computer model.List Computer Summary

List Computer Summary With Count of Applications

DeploymentCount Audit Software Agent by Version

Count Computers Running Audit Software Agent

Distinct List of Files With Missing File Information

Inventory Scan Summary

List Computers Not Reporting Audit Software Data in Last 'N' Days

List Computers Not Reporting Inventory in Last 'N' days List Inventory Agents Status and Version This report displays the inventory agents status and version.List New Computers Discovered in Last 'N' Days Hard DisksCount by Disk Volumes by Level The report groups volumes by size. Drill down to see the computers and the volumes.

Count of Volumes by File System Type View count of disk volumes grouped by file system type.List Computers With no CDROM Drive List computers with no CD-ROM drive.List Computers With Total Free Space Less Than 'N' Megabytes List Computers With Total Free Space Less Than 'N' percent List of Disk Volumes List of Disk Volumes With Free Space Less Than 'N' Megabytes Lists computers with one or more volume with less than n megabytes free disk space.

MemoryCount of Computers by OS and Physical Memory Size List Computers With Free Memory Slot Top 'N' Computers With Largest Physical Memory Size

Operating SystemCount by operating system (all computer types) This report displays a count of computers by operating system.Count by Operating System and Version (All Computer Types) This report displays a count of computers by operating system and version.Count by Operating System and Version (Macintosh Only) This report displays a count of computers by operating system and version.List of Macintosh OS Versions Lists the operating system version and installed volume for the specified computers.

Operating System UpgradeComputers with Free Memory Slot

Computers With Too Little Disk Size or Free Space

Input minimum disk size required and minimum free space required for OS upgrade. Displays computers that do not meet the disk space requirements.Count of computers not meeting OS Upgrade requirements for CPU speed, disk size, free disk space, and amount of RAM.Count of computers not meeting OS Upgrade requirements for CPU speed, disk size, free disk space, and amount of RAM, with Exchange user profile information.Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades.Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades. Computers and contact information listed.Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades.Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades. Computers and contact information listed.

This report lists the identifying attributes of a computer including model, CPU, memory, disk, and network information. All computers are listed. You can drill down into the computer to view other details or take remote control.This report lists the identifying attributes of a Macintosh computer including manufacturer, model, cpu, memory, disk, and network information, and a count of applications running in package mode. All computers are listed. You can drill across to the Audit Summary reports and look at more detailed application information.

This report lets you to determine what versions of the agent are deployed throughout your enterprise. The version also indicates whether the software is "evaluation" or "registered." Drill down into the graph to view the list of computers.This report counts the number of computers that are running audit (that is, those that have reported at least one result) and the number of computers that are not running audit. Drill down into the graph to view the list of computers.This report displays a distinct list of applications with missing resource data. Drill down into a particular file to view a summary of the resource information. Drill down again to view the list of all computers. You can use the data from this report to determine which directories and files to exclude, and which files you want audit to cleanup by overriding the resource information.

This report displays the total inventory size of all computers and the average size and audit scan time. This information should be used for capacity planning. Total size represents network and database usage.This report lets you determine which computers are not reporting regularly. Typically you will schedule the running of the agent using SMS advertisements. The report will indicate the number of days since the last report of any data.This report lists computers that have reported no inventory in the last n days.

This report lists new computers discovered in the last n days.

List computers with total free space on all volumes combined less than n megabytes.

List computers with total free space on all volumes combined less than n percent of total disk size.Lists all volumes found on the specified computer. Displays the file system and total and free space for each volume.

The report displays a count of computers by operating system and physical memory. Drill down into the table to view the list of computers.The report lists computers with a free memory slot and less than n amount of physical memory. Drill down into the table to view the details of a computer.The report lists the top n computers by memory size (MB). Drill down into the table to view the details of a computer.

This report checks for computers that do not match the Macintosh operating system memory upgrade requirements but have free slots. You can drill down into the individual computers to view a list of all memory slots.This report checks the operating system requirements and reports computers with insufficient disk size and or free space. You can drill down into the Resource Explorer.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 24 of 76

List of Computers Meeting Upgrade Requirements List of Computers Not Meeting Upgrade Requirements

Peripheral DevicesFireWire Devices USB Devices

PrintersCount Printers by Manufacturer

List Computers With Local Printers

ProcessorCount by OS, Processor Name, and Speed The report groups computers by processor speed. Drill down to see the list of computers.

Count by Processor Name and Speed This report groups computers by processor type and speed.Count by Processor Speed by Level The report groups computers by processor speed. Drill down to see the list of computers.

List of Computers With Multiple Processors This reports groups computers with multiple processors, Drill down to see the list of computers.

List Computer Model and Serial Number Information List of Computers Reporting Duplicate Serial Numbers This report list all computers with duplicate serial numbers.Software DetailsList Applications and Versions

List Applications by Computer

Software SummaryCount of Applications

Count of Applications and Versions

Count of Applications by Manufacturer

Disk Usage by File Type This report lists the number of computers that have files with a given file extension.

List Applications on Computers

Top n Computers by Application Count

This report lists all computers that do not yet have the desired operating system but meet the minimum hardware requirements for an upgrade.This report lists all computers that do not meet the minimum hardware requirements for an operating system upgrade.

This report lists a count of FireWire devices per computer. From here, you can drill down to a list of the devices for each computer.This report lists a count of USB devices per computer. From here, you can drill down to a list of the devices for each computer.

The report displays the count of printers by vendor in a graph. Drilldown into the graph to view the count of printers by model. Drilldown into the table to view the list of computers for a specific model, and whether it is local or network connection.

The report lists computers with local printers. Drilldown into the table to view the computer inventory.

This report lists the serial number and model of all computers. Click on an item in the list to view the details of a computer.

This report lists all of the applications and the versions.

Note: This report does not include software from special groups. There is no drilldown for this report. Use the Audit Summary reports to navigate the audit software. Use the Deployment reports to identify applications with missing manufacturer data.

This report lists all of the applications by computer.

Note: This report does not include software from special groups. There is no drilldown for this report. Use the Audit Summary reports to navigate the audit software. Use the Deployment reports to identify applications with missing manufacturer data.

This report lists the number of distinct applications reported by audit. The report is designed to help you understand what software applications are deployed in your network.

Note: This report does not include software from special groups. You can drill down into the application to view the list of computers, and then drill down into the computer. Applications with missing manufacturer data are filtered out.

This report lists the number of distinct applications and versions reported by audit. The report is designed to help you understand what versions of the software are deployed in your network.

Note: This report does not include software from special groups. You can drill down into the version to view the list of computers, and then drill down into the computer. Applications with missing manufacturer data are filtered out.

This report lists the number of applications by manufacturer found by audit. The report is designed to help you understand what manufacturer software is on your network.

Note: This report does not include software from special groups. You can drill down into the manufacturer to view the list of application names and number of computers the application is installed on. Applications with missing manufacturer data are filtered out. You should use the "Deployment" reports to help identify applications with missing manufacturer information.

This report lists applications that are on n% of all the computers in your network. Specify the operator and the percentage to help you find sparse or widely deployed applications in your network.

Note: This report does not include software from special groups. You can drill down into the application to view the list of computers, and then drill down into the computer. Applications with missing manufacturer data are filtered out.

This report lists the computers with the most number of applications found by audit. The report is designed to help you understand which computers have a large number of applications.

Note: This report does not include software from special groups. You can drill down into the computer to view the list of applications and the directory it is installed in. Applications with missing manufacturer data are filtered out. You should use the "Deployment" reports to help identify applications with missing manufacturer information.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 25 of 76

Asset ManagementAll Assets Detail of all assets.All Resources Detail of all resources in the database.AccountingCapital cost by Cost CenterCash Flow by Cost Center Show cash flow for a given period for the given cost center. Filter by Cost Center and Asset Type.

Depreciation by Cost CenterLoss On Disposal by Cost CenterSummed Cost Items by Asset Type Summed Cost Items by Asset Type.Asset Control and OwnershipAssets that have attached devices with different owners Show assets where the owner of the asset and the owner of the attached device differ.

Assets that Primary User differs from Asset Owner Show assets where the owner and the primary user differ.Assets with no Cost Center Show assets where no cost center is indicated.Assets with no Location Show assets without a location.Assets with no Owner Show assets without an owner.Owned Assets Summary of owned assets.Asset TypeAssets by Type, Status, Location and Cost Center Assets by Type, Status, Location, and Cost Center.Assets Created in Last N Days Assets Missing Asset Tag Show all assets missing asset tag entry.Assets Missing Bar Code Show all assets missing bar code entry.Assets Missing Serial Number Show all assets missing a serial number.Assets Modified in Last N DaysAssets with Multiple Owners Show all assets with more than one owner.Count of Assets by Cost Center Display a count of all assets by cost center.Count of Assets by Location Display a count of all assets by location.Count of Assets by Manufacturer Display a count of all assets by manufacturer name.Count of Assets by Status Display a count of assets by status: RMA, In Stock, Active, Retired, Disposed, On Order, Missing.

Count of Assets By Type

ComputerAll Computers All Computers (filters for OS Type, Status, Location, Cost Center).All Unmanaged Computers Lists all computers stored in the system that do not have the Altiris Agent installed on them.

Count of Computers by OS Type Count of computers by OS Type.Cost CenterList of Cost Centers By Location List of cost centers by location.

DepartmentDepartments by Location and Cost Center List of departments by location and cost centers.

DisposalAssets Disposed from 'N' to 'N' List of assets disposed between two specified dates.Assets Disposed in the last N Days List of assets disposed in the last n days.

LocationList of Locations by Cost Center List of Locations by Cost Center.

SearchAsset Search

Resource Search

Stock'In Stock' Assets by Cost Center Details of "In Stock" assets by cost center.'In Stock' Assets by Location Details of "In Stock" assets by location.'In Stock' Assets older than 'N' days UserTotal Cost by User Total cost associated to a user.Users By Department and Company List of users by department and company.Users by Office Location Users by office location.Contract ManagementAll ContractsAll Lease SchedulesAll Master LeasesAll Master License AgreementsAll Software LicensesAll Software PurchasesAll Unassigned ContractsAll Virtual License AgreementsAll WarrantiesContractsActive Contracts Details of all active contracts.

Show capital cost for a given period for the given cost center. Filter by Cost Center and Asset Type

Show depreciation for a given period for the given cost center. Filter by Cost Center and Asset Type.Show loss on disposal for a given period for the given location or cost center. Filter by Cost Center and Asset Type.

Specify the parameter, n, number of days and view all assets created in that range.

Show all assets with records modified in the last n days.

This report lists distinct assets types and the number of them contained in the Notification Server database.

Searches through assets for text data. Filterable by asset type, asset status and data class. The number of results returned and the maximum length of time for which the search will be carried out can be configured.Searches through resources for text data. Filterable by resource type and data class. The number of results returned and the maximum length of time for which the search will be carried out can be configured.

Details of "In Stock" assets older than n days.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 26 of 76

Contracts Expiring in N Days Details of expiring contracts.Count of Contracts By Type Count of Contracts by contract type.Expired Contracts List of contracts that have expired.Lease ScheduleLease Schedule Covered Asset by Asset Type List of assets covered by a lease schedule by asset type.Serial Numbers not Appearing as Assets Serial numbers not appearing as assets. Master LeaseList of Lease Schedules List of lease schedules. Master Lease Covered Asset by Asset Type List of assets covered by a master lease by asset type.Master License AgreementAuthorized Usage (Primary User) - Previous Month Details of prior month's authorized usage for a particular software license agreement.

List of Software Licenses List of software license agreements.SearchContract Search

Software License Authorized Installations Details of authorized software installations.Authorized Usage (Owner) Details of authorized software usage by owner for given software license.

Product Installed And Used Details of software products installed versus used.Software Purchases Details of purchased software licenses.Software Upgrades Details of software upgrade licenses.Unique Installs Details of unique software installation by software license agreement.Virtual License AgreementList of Software Licenses Detail list of all software license agreements.Inventory MacintoshComputer SummaryCount of Computers by Computer Model Count of computers by computer model.List Computer Summary

List Computer Summary With Count of Applications

DeploymentCount Audit Software Agent by Version

Count Computers Running Audit Software Agent

Distinct List of Files With Missing File Information

Inventory Scan Summary

List Computers Not Reporting Audit Software Data in Last 'N' Days

List Computers Not Reporting Inventory in Last 'N' days List Inventory Agents Status and Version This report displays the inventory agents status and version.List New Computers Discovered in Last 'N' Days Hard DisksCount by Disk Volumes by Level The report groups volumes by size. Drill down to see the computers and the volumes.

Count of Volumes by File System Type View count of disk volumes grouped by file system type.List Computers With no CDROM Drive List computers with no CD-ROM drive.List Computers With Total Free Space Less Than 'N' Megabytes List Computers With Total Free Space Less Than 'N' percent List of Disk Volumes List of Disk Volumes With Free Space Less Than 'N' Megabytes Lists computers with one or more volume with less than n megabytes free disk space.

MemoryCount of Computers by OS and Physical Memory Size List Computers With Free Memory Slot Top 'N' Computers With Largest Physical Memory Size

Operating SystemCount by operating system (all computer types) This report displays a count of computers by operating system.

Searches through contract resources for text data. Filterable by resource type and data class. The number of results returned and the maximum length of time for which the search will be carried out can be configured.

Authorized Usage (Primary User)—Month to Date Details of authorized software usage by primary user for given software license for current month.

Authorized Usage (Primary User)—Previous Month Details of authorized software usage by primary user for given software license for previous month.

This report lists the identifying attributes of a computer including model, CPU, memory, disk, and network information. All computers are listed. You can drill down into the computer to view other details or take remote control.This report lists the identifying attributes of a Macintosh computer including manufacturer, model, cpu, memory, disk, and network information, and a count of applications running in package mode. All computers are listed. You can drill across to the Audit Summary reports and look at more detailed application information.

This report lets you to determine what versions of the agent are deployed throughout your enterprise. The version also indicates whether the software is "evaluation" or "registered." Drill down into the graph to view the list of computers.This report counts the number of computers that are running audit (that is, those that have reported at least one result) and the number of computers that are not running audit. Drill down into the graph to view the list of computers.This report displays a distinct list of applications with missing resource data. Drill down into a particular file to view a summary of the resource information. Drill down again to view the list of all computers. You can use the data from this report to determine which directories and files to exclude, and which files you want audit to cleanup by overriding the resource information.

This report displays the total inventory size of all computers and the average size and audit scan time. This information should be used for capacity planning. Total size represents network and database usage.This report lets you determine which computers are not reporting regularly. Typically you will schedule the running of the agent using SMS advertisements. The report will indicate the number of days since the last report of any data.This report lists computers that have reported no inventory in the last n days.

This report lists new computers discovered in the last n days.

List computers with total free space on all volumes combined less than n megabytes.

List computers with total free space on all volumes combined less than n percent of total disk size.Lists all volumes found on the specified computer. Displays the file system and total and free space for each volume.

The report displays a count of computers by operating system and physical memory. Drill down into the table to view the list of computers.The report lists computers with a free memory slot and less than n amount of physical memory. Drill down into the table to view the details of a computer.The report lists the top n computers by memory size (MB). Drill down into the table to view the details of a computer.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 27 of 76

Count by Operating System and Version (All Computer Types) This report displays a count of computers by operating system and version.Count by Operating System and Version (Macintosh Only) This report displays a count of computers by operating system and version.List of Macintosh OS Versions Lists the operating system version and installed volume for the specified computers.

Operating System UpgradeComputers with Free Memory Slot

Computers With Too Little Disk Size or Free Space

List of Computers Meeting Upgrade Requirements List of Computers Not Meeting Upgrade Requirements

Peripheral DevicesFireWire Devices USB Devices

PrintersCount Printers by Manufacturer

List Computers With Local Printers

ProcessorCount by OS, Processor Name, and Speed The report groups computers by processor speed. Drill down to see the list of computers.

Count by Processor Name and Speed This report groups computers by processor type and speed.Count by Processor Speed by Level The report groups computers by processor speed. Drill down to see the list of computers.

List of Computers With Multiple Processors This reports groups computers with multiple processors, Drill down to see the list of computers.

List Computer Model and Serial Number Information List of Computers Reporting Duplicate Serial Numbers This report list all computers with duplicate serial numbers.Software DetailsList Applications and Versions

List Applications by Computer

Software SummaryCount of Applications

Count of Applications and Versions

Count of Applications by Manufacturer

Disk Usage by File Type This report lists the number of computers that have files with a given file extension.List Applications on Computers

This report checks for computers that do not match the Macintosh operating system memory upgrade requirements but have free slots. You can drill down into the individual computers to view a list of all memory slots.This report checks the operating system requirements and reports computers with insufficient disk size and or free space. You can drill down into the Resource Explorer.

This report lists all computers that do not yet have the desired operating system but meet the minimum hardware requirements for an upgrade.This report lists all computers that do not meet the minimum hardware requirements for an operating system upgrade.

This report lists a count of FireWire devices per computer. From here, you can drill down to a list of the devices for each computer.This report lists a count of USB devices per computer. From here, you can drill down to a list of the devices for each computer.

The report displays the count of printers by vendor in a graph. Drilldown into the graph to view the count of printers by model. Drilldown into the table to view the list of computers for a specific model, and whether it is local or network connection.The report lists computers with local printers. Drilldown into the table to view the computer inventory.

This report lists the serial number and model of all computers. Click on an item in the list to view the details of a computer.

This report lists all of the applications and the versions.

Note: This report does not include software from special groups. There is no drilldown for this report. Use the Audit Summary reports to navigate the audit software. Use the Deployment reports to identify applications with missing manufacturer data.

This report lists all of the applications by computer.

Note: This report does not include software from special groups. There is no drilldown for this report. Use the Audit Summary reports to navigate the audit software. Use the Deployment reports to identify applications with missing manufacturer data.

This report lists the number of distinct applications reported by audit. The report is designed to help you understand what software applications are deployed in your network.

Note: This report does not include software from special groups. You can drill down into the application to view the list of computers, and then drill down into the computer. Applications with missing manufacturer data are filtered out.

This report lists the number of distinct applications and versions reported by audit. The report is designed to help you understand what versions of the software are deployed in your network.

Note: This report does not include software from special groups. You can drill down into the version to view the list of computers, and then drill down into the computer. Applications with missing manufacturer data are filtered out.

This report lists the number of applications by manufacturer found by audit. The report is designed to help you understand what manufacturer software is on your network.

Note: This report does not include software from special groups. You can drill down into the manufacturer to view the list of application names and number of computers the application is installed on. Applications with missing manufacturer data are filtered out. You should use the "Deployment" reports to help identify applications with missing manufacturer information.

This report lists applications that are on n% of all the computers in your network. Specify the operator and the percentage to help you find sparse or widely deployed applications in your network.

Note: This report does not include software from special groups. You can drill down into the application to view the list of computers, and then drill down into the computer. Applications with missing manufacturer data are filtered out.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 28 of 76

Top n Computers by Application Count

Inventory WindowsAdd or Remove ProgramsCount of Computers with Distinct Add/Remove Program Applications

Count of Distinct Microsoft Product Id's by Count of Installed Products Name of Microsoft application, count of product IDs, and count of computers.

Distinct Add/Remove Program Applications Detail listing of all distinct Add or Remove Program applications.Hidden Programs Windows installed applications that were installed hidden, gives uninstall path.

Antivirus and GamesAnti-virus Installation Directories List of directories, where antivirus applications are installed, and count of computers.

Computers with No Auditing Computers with no auditing. Count of Computers with Anti-virus Software Count of computers and installed antivirus software application and version.Count of Computers with Audit Policy Settings Count of Users with Admin Rights Games by Domain (Pivot) Detail report of game applications installed by domain.Unprotected Computers Computers without antivirus software installed.Virus Signature File(s) by Date Computers and their virus data file dates. Drill down to a computer for more details.

Audit DetailProducts and Versions View all products and versions. Filter by domain, OS, Product Name and Manufacturer.

Products by Computer

Audit SummaryAudit Software by Domain (Pivot) Details of software application audit by domain.Count of Products List of each application and count of installed computers.Count of Products and Versions List of each application and version and count of installed computers.Count of Products by Manufacturer List of manufacturers and count of products associated with each.Disk Usage by File Extension File extension and enterprise-wide disk usage associated with each.Products on 'N'% of Computers List of products on at least N% of computers. Drill down to associated computers.Top 'N' Computers by Product Count List of top n computers with most installed applications, product ID, number of products.

DeploymentApplication Upgrade Cost Analysis

View data about size of inventory and time of audit execution.

Computers Not Reporting Audit Software Data in Last 'N' Days List computers that have not reported audit information in specified number of days.

Computers Not Reporting Inventory in Last 'N' Days List computers that have not reported an inventory in the specified number of days.Count of Audit Software Agent by Version View count of software audit agent version by computer.Count of Computers Running Audit Software Agent View a count of computers running the software audit agent.Distinct Directories with Missing Manufacturer Data Distinct application installation directories with missing manufacture data.Distinct Files with Missing Manufacturer Data Distinct files missing manufacture data in the file header.Generate Audit Config for Software with Missing Manufacturer Data Generate audit config for software with missing manufacturer data.

Inventory Agents Status and Version List of computers, inventory agent status and version.New Computers Discovered in Last 'N' Days DiagnosticsAeXSNPlus - All Fields (Except Memory Modules) View computers and results of AexSNPlus agent.

Disk, CD, and TapeAggregate Disk Size and Free Space by Computer List computers and aggregate disk size and free space in megabytes.Computers with Disk Drive Changes in Last 'N' Days Computers with Free Space Less Than 'N' Megabytes Computers with Free Space Less Than 'N' Percent Computers with No CDROM/Floppy Drive Computers with no CD-ROM or floppy drive. Computers with Tape Drive Computers with tape drive. Computers with Writeable CD Drive Computers with writeable CD drive. Computers with ZIP Drive Computers with ZIP drive. Count of Disks by Size Level Distinct Manufacturers and Models List of distinct drive manufacturers and models. ExchangeComputer Operating System, Disk and Contact Information List of computer, operating system, and Exchange user profile contact information.Computers with Multiple Exchange Users Computers with multiple exchange users.Computers with Multiple Logon Users List of computers with multiple logon users and count of logons.

This report lists the computers with the most number of applications found by audit. The report is designed to help you understand which computers have a large number of applications.

Note: This report does not include software from special groups. You can drill down into the computer to view the list of applications and the directory it is installed in. Applications with missing manufacturer data are filtered out. You should use the "Deployment" reports to help identify applications with missing manufacturer information.

Number of occurrences of each distinct Add or Remove Programs application with count of computers, version, and name.

Count of computers with associated auditing enabled, logon events, account logon events, account management.List domain, users, computers, and input parameter of minimum number of computers where users have admin rights.

View all products and versions. Filter by domain, OS, Product Name, Manufacturer, and Computer name.

Calculate computers that need resources for an application upgrade. Input operating system name, service pack, operating system type (server, workstation, and so on), CPU minimum, disk size minimum, free disk space minimum, and memory minimum.

Calculate Total Inventory Size, Average Size and Software Audit Scan Time

List of computers discovered in the prior n days.

List computers with disks added, changed, or removed in the prior n days.List computers with less than n megabytes of free disk space.Computers with free space less than n percent.

Specify ranges, for example, 10 GB, 20 GB, and 30 GB, and view all computers in each drive range.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 29 of 76

Computers with Personal Folders List of computers with PST personal folders.Count of Exchange Users by Job Description Count of exchange users by job description. Count of Exchange Users by Location Count of Exchange Users by Location. Count of Exchange Users by Organization Count of Exchange Users by Organization.Exchange Users List of exchange users and contact information.Exchange Users with No Contact Detail Exchange Users with No Contact Detail. Local User Profiles computers with local user profiles.Primary User(s) Local user by computer.Primary User(s) with Contact Information Primary Users with Contact Information. Top 'N' Computers by User Profiles List of Top n computers with most user profiles.User Profiles Across Multiple Machines List of top user profiles across multiple computers.User Profiles with No Activity User Profiles with No Activity. Inventory Capture'N' Most Recent Inventory Captures MemoryComputers with Free Memory Slot(s) Computers with free memory slots.Computers with Memory Change in Last 'N' Days Computers with Memory Change within 'N' Days of One Another Computers with Memory Decrease in Last 'N' Days Computers with Memory Increase in Last 'N' Days Memory Configuration by Computer Top 'N' Computers with Largest Page File Size Top 'N' Computers with Largest Physical Memory Size Microsoft BackOfficeMicrosoft Exchange Servers List of Microsoft Exchange Servers and version.Microsoft IIS ServersMicrosoft SMS Servers List of computers with Microsoft SMS installed.

List of computers with SQL components and versions.

MS BackOffice Components List of computers with all back office products (Exchange, IIS, SQL).MS BackOffice Server Configuration MS DNS Servers List of DNS servers with DNS version.Microsoft OfficeComputers with MS Office XP/2000/97 by Domain Count of Computers with MS Office by Domain Count of all computers with MS Office by domain name.Count of Core MS Office Components Installed

Count of MS Office XP/2000/97 Components Count of core MS Office products (2000/XP/97). Drill down for computer details.Distinct Components and Versions Listing of all MS Office components broken down by distinct product version.MS Office by Domain (Pivot) Pivot table report of all MS Office components by domain.MS Office Installation Directories Listing of distinct MS Office installation directories and number of computers for each.

Multiple Copies of MS Office Installed computers with multiple copies of MS Office installed.Percentage of Computers with MS Office by Domain Table with total number of computers, computers with Office and percentage.Operating SystemComputer Summary (Model, CPU, Memory, Disk and Network)

Computer Summary (Pivot) Pivot table summary of all computers.Computer summary with number of products installed by computer.

Count of Computers and OS Products Report of # of computers versus # of OS Product IDs.Count of Computers by Operating System and Installation Directory Count of computers, grouped by distinct OS installation directory.

Count of Operating System Count of computers by OS name. Drill down for more details about each OS.Count of Operating System and Version Count of Operating System, Version and Service Pack Count of computers by OS Version with Service pack level.Count of System Type Count of Systems with OEM Licenses Count of systems with OEM-licensed OS and non-OEM-licensed OS.Dual Boot Windows/UNIX or Duplicate Computers List of dual boot Windows/UNIX computers, or list of duplicate computers.Operating System UpdatesCount of Windows 9X Computers without Update 'X' Count of all Windows 9x computers without specified Hotfix.Count of WinNT/2000/XP Computers without Update 'X' Count of all NT/2000/XP computers without specified Hotfix.Distinct Windows 9X Updates by Computer Query by computer and view all installed Windows 9x updates.Distinct WinNT/2000/XP Updates by Computer Query by computer and view all NT/2000/XP updates.Physical DriveComputers with a Un-partitioned Disk Space Computers with Greater Than or Less Than 'N' Gigabyte Hard Drive List of computers with input parameters <= or >= specified size in Gigabytes.Computers with 'N' Hard Drives

List of the last n chronological inventories posted to the Notification Server.

Computers with memory change in last n days. Computers with memory change: input the number of days between changes, and number of days since the change occurred.Computers with Memory Decrease in Last n Days. Computers with Memory Increase in Last n Days. List of computer and memory configuration: physical memory, page file size, page file to physical ratio, and computer type.Top n Computers with Largest Page File Size. Top n Computers with Largest Physical Memory Size.

List of computers with Microsoft IIS installed, with IIS version. Drill down to a particular computer for more details.

Microsoft SQL Servers, Transaction Servers and Distributed Transaction Coordinators

Configuration details (Memory, CPU Speed, Free Space, Installation directory) for MS Back Office servers.

List of computers with MS Office 2000/XP/97 by domain. Drill down computer level for more detail.

Count of core components (Access, Excel, Frontpage, Outlook, PowerPoint, Word) showing number of installations and number of computers. Drill down for more details.

This report shows a computer summary (Domain, Logon ID, IP Address, Gateway, Subnet, OS type, Computer Manufacturer, Computer Model,Serial, CPU, Memory, OS and version, Service Pack, Installation Directory, Disk format, size and free space). Drill down for details about each computer.

Computer Summary with Count of Products (Model, CPU, Memory, Disk, Network and Applications)

Count of computers by OS and version. Drill down for more details about the computers for each OS version.

Count of computers by OS system type (Advanced Server, Professional, Enterprise Server, Server, etc).

Specify the threshold difference between physical and partition size to find computers with un-partitioned space.

Input operator (<, <=, >, >=) and number of hard disks to view computers with specified number of hard disks.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 30 of 76

Primary UserPrimary User by Domain List of computers and primary users. Filter by computer name and domain.Primary User on Multiple Computers List of primary users on multiple computers by number of computers.Primary User with Contact Details List of primary users with Exchange contact information. Filter by computer name and domain.

PrintersComputers with Fax Driver List of computers with installed fax drivers.Computers with Local Printers List of computer with local printers and printer port used.Count of Printers by Manufacturer Count of Printers by Manufacturer. Network Shares by Computer, User, Access Rights, and Path

TCP/IP Network Printers List all network TCP/IP Printers.ProcessorCount of Computers by OS, Processor Name, and Speed Count of computers by processor name and speed. Drill down for details about each computer.

Count of Computers by Processor Name and Speed Count of Computers by Processor Speed by Level Count of Computers with Multiple Processors List of computers with more than one processor.Scheduled TasksAT Commands Specify a computer name and view all scheduled AT commands that are queued.Scheduled Tasks Specify a computer name and view all Windows scheduler tasks that are queued.Serial Number Computer Model and Serial Number Information List of computer names, computer manufacturer, model and serial number.Computer Model and Serial Number with Contact Information Computers by BIOS Date List a specified number of computers by BIOS release date.Computers where Serial Number was Not Found List of computers where no serial number has been reported.

Computers with Changed Identity List of computers by serial number with changed computer identity information.Computers with Incomplete Computer Model Information Computers with Incomplete Computer Model Information.

Computers with Incomplete Computer Model Information with Contact Information.

Computers with Incomplete Manufacturer BIOS Information Computers with Incomplete Manufacturer BIOS Information.Computers with Incomplete Manufacturer BIOS Information with Contact Information.

Count of Computers by BIOS Manufacturer Count of Computers by BIOS Manufacturer. Count of Computers by Computer Model Count of computers by manufacture and model.Count of Computers Running Serial Number Agent Count of computers running the AeXSNPlus serial number agent.Count of Computers with No Serial Number by Operating System Count of with no serial number, listed by OS.

Count of with no serial number, listed by OS with Exchange User profile information.

Count of Computers with Serial Number Detection Method Used Count of Laptop and Desktop Computers Count of Serial Number Agent by Version Count of computers by Altiris AeXSNPlus serial number agent version.Percent of Computers Reporting Serial Number Percent of computer with serial number reported.TCP/IP Count of Computers by Default Gateway Count of computers listed by the default gateway address.Count of Computers by DHCP Server Count of computers by DHCP Server. Count of Computers by IP Routing Enabled Count of computers that have IP routing enabled.Count of Computers by Primary DNS Count of computers by name of primary DNS server.Count of Computers by Primary WINS Server Count of computers by Primary WINS Server. Count of Computers by Secondary DNS Count of computers by Secondary DNS.Count of Computers by Secondary WINS Server Count of computers by Secondary WINS Server.Count of DCHP Status by Default Gateway Count of computers by DHCP status (enabled/disabled) by default gateway.Count of PCs by DHCP Server Count of PCs by DHCP Server. Count of Systems by Address Type Count of computers by address type, e.g. 255.255.0.0, 255.255.192.0, etc.Web BrowsersComputers with Internet Explorer and Netscape Distinct Count of Internet Explorer and Netscape Internet Explorer by Version Count of computers by distinct IE versions.Internet Explorer Components by Version Internet Explorer Components (e.g. NetMeeting) by Version. Internet Explorer Multiple Copies Installed Internet Explorer Multiple Copies Installed.Internet Explorer Version by Operating System Count of computers for each OS by distinct IE version number.Netscape by Version Count of computers by Netscape Navigator version.Web Browsers by Computer List of web browsers by computer, with version number and install directory.Web browsers by Domain (Pivot) Pivot table report of all web browsers by domain.Windows 2000/XP UpgradeComputers Requiring Resources

List of network shares by computer, share name, access group, access granted and path. Filter the report with input parameters type of share, share name, group or user granted access, or type of access.

Count of processors by name (e.g. Intel Pentium 4 processor, Intel Pentium III Xeon processor), speed and number of computers.Input 5 values of processor speeds and view a count of computers that fall within those specified ranges.

List of computer names, computer manufacturer, model and serial number with Exchange user profile contact information.

Computers where Serial Number was Not Found with Contact Information

List of computers where no serial number has been reported, with Exchanger user profile contact information.

Computers with Incomplete Computer Model Information with Contact Information

Computers with Incomplete Manufacturer BIOS Information with Contact Information

Count of Computers with No Serial Number by Operating System with Contact Information

Count of computers with method of serial number detection (baseboard, enclosure, not found, system, WMI, etc).Count of computer by type, e.g. desktop, laptop, mini tower, notebook, portable, server chassis, etc.).

List of computers with both IE and Netscape Navigator installed, includes IE/Netscape version numbers.Count of computers with distinct versions of IE and Netscape, grouped by browser name and version.

Input minimum CPU speed, minimum disk size, minimum disk free space, minimum memory for servers, minimum memory for workstations and view all computers that do not meet the stated upgrade resource requirements.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 31 of 76

Computers Requiring Resources with Contact Information

Computers with Free Memory Slot Computers with Free Memory Slot. Computers with Too Little Disk Count of Computers Requiring Resources Count of Computers Requiring Resources with Contact Information Windows 2000 Upgrade Cost Analysis

Windows 2000 Upgrade Cost Analysis with Contact Information

Windows XP Upgrade Cost Analysis

Windows XP Upgrade Cost Analysis with Contact Information

Total Cost of Ownership (TCO)Hardware AnalysisCount of Computers by Type

Count of Servers by Type

Microsoft Audit ReportsApplications Returns a list of Microsoft applications and total number of installs.Developer Tools Returns a list of Microsoft developer tools and total number of installs.Office Suites Returns a list of Microsoft office suites and total number of installs.Operating Systems Returns a list of Microsoft operating systems.Server ProductsVisio Returns a list of Microsoft Visio products (Enterprise, Professional, Standard, Technical).

Support AnalysisCount of Incidents by Manufacturer Counts incidents by manufacturer. Drilldowns allow more detailed views of the data.

Count of Incidents by OS Counts incidents by operation system. Drilldowns allow more detailed views of the data.

Input minimum CPU speed, minimum disk size, minimum disk free space, minimum memory for servers, minimum memory for workstations and view all computers that do not meet the stated upgrade resource requirements. Computers listed with associated Exchange User profile information.

Input minimum disk size required and minimum free space required for OS upgrade. Displays computers that do not meet the disk space requirements.Count of computers not meeting OS Upgrade requirements for CPU speed, disk size, free disk space, and amount of RAM.Count of computers not meeting OS Upgrade requirements for CPU speed, disk size, free disk space, and amount of RAM, with Exchange user profile information.Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades.Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades. Computers and contact information listed.Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades.Cost analysis for Windows 2000 upgrade based on resources (CPU, Disk, Memory) and costs (support staff rate, OS license cost, upgrade license cost, time for new OS install, time for upgrade, time for resource (e.g. add memory) upgrades. Computers and contact information listed.

This report is designed to help you answer the Gartner TCO Manager interview screens. This report will show you a count of computers, by OS, Type, and Networking client.

This report is designed to help you answer the Gartner TCO Manager interview screens. This report will show you a count of Servers, based on type of server.

Returns a list of Microsoft server products. (BackOffice, Exchange, Host Integration Server, Proxy Server, Site Server, SQL Server).

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 32 of 76

Import/Export ResultsResource Export Results Results of Altiris connector exports.Resource Import Results Results of Altiris connector imports.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 33 of 76

DeploymentClient InformationClient count by OS

Client summary by OS

Managed computers by Deployment Server group

Managed computers in the New Computers group

Total Deployment Servers and total managed computers Job Information

Assigned jobs by Deployment Server

Assigned jobs by managed computer

Assigned jobs not on a recurring schedule

Assigned jobs with list of targeted computers

Assigned recurring jobs

Job availability by Deployment Server and task type This report displays a list of available jobs grouped by the Deployment Server they are available on.

Job Status

Job status by Deployment Server

Job status by job ID

Job status by job name Job status history detail (by managed computer) This report displays a history of jobs run on a specified managed computer.

Jobs assigned in last N days

Jobs completed in last N days

Jobs failed in last N days

Overall event status by Deployment Server

Problematic managed computers Server Information

Count of managed computers by Deployment Server

List of managed computers by Deployment Server Managed Deployment Servers by domain This report displays a list of managed Deployment Servers grouped by Domain.Server summary by OS This report displays a list of managed Deployment Servers grouped by OS and Domain.

Software Delivery Execution Status Deployment Server Agent Install/Upgrade Status This report displays the status of the Deployment Server Agent Install/Upgrade task.Full Installation/Upgrade of Deployment Server Status This report displays the status of the Full Installation/Upgrade of Deployment Server task.

This report displays a count of managed systems by Deployment Server, OS (Windows NT,Windows XP, etc), OS version (5.0, 4.x, etc) and OS type (Professional, Server, etc). The drill down displays the list of computers that comprise the count, filtered on Deployment Server, OS, type, and version.

This report displays basic client computer information such as OS and version, and groups the managed computers together by managing Deployment Server. This list will include any clients imported as part of the synchronization process, including virtual clients. This report displays a list of managed Deployment Servers and a count of their client systems. The drilldown displays the list of computers counted in the first level query, filtered by selected Deployment Server.This report displays a list of computers in the New computers group. This helps identify computers that should be reassigned into your distinct management groups.

This report displays the total number of Deployment Servers that are being managed by this server, as well as the total number of client computers. The drill down displays the actual servers and the number of clients managed by each server. The second drill down displays domain and computer name for each managed computer, filtered by the managing Deployment Server.

This report displays any assigned jobs, by Deployment Server, along with the total number of clients the job has been assigned to. Drill down displays the job and the list of computers that comprise the count.

This report displays a count of jobs and their types currently assigned to a managed computer. The drill down report displays more detail about the jobs comprising the counts.

This report displays a list of jobs that were assigned to run without a recurring schedule, and a count of managed computers that the job is scheduled on. This report may take several minutes to run successfully if you have a large database (over 2000 managed computers with multiple assigned jobs). The drill down displays the list of computers that comprise the count. This report displays a specific job designated by the end user along with a list of all computers that have been assigned the job.

This report displays information for jobs that are scheduled to run on a reoccurring basis on your managed computers. The drill down report displays more detail about a specific job.

This report displays job status by managing Deployment Server, unique job ID and status (successful, failed, assigned). The drill down focuses on one particular job on the specified Deployment Server. The second drill down provides more detailed status information on the selected job.This report displays status information for a specified job, filtered and grouped by the selected job Id. The drill downs display detailed status information for a selected job.

This report displays status information for a specified job, filtered and grouped by the selected job name. The drill downs display detailed status information for a selected job.

This report displays a list of jobs that have been assigned to managed clients in the last n days. n represents a user replaceable parameter which specifies the length of time by which to filter the report.

This report displays a list of jobs which have completed in the last n days. n is a user definable parameter which enables users to specify the appropriate timeframe for which to filter the report.This report displays a list of jobs that have failed on targeted managed computers in the last n days. n represents a user definable parameter specifying the number of days to filter the data on. The drilldown displays a list of computers the job failed on.This report displays overall job status by server. Displays the server, count of unique jobs reporting status, the number of scheduled clients, count of successful executions, and count of failed executions.This reports displays a list of computers with multiple job failures in a specified timeframe. This helps identify problematic systems in your environment.

This report displays a count of managed computers, grouped by managing Deployment Server. The drill down report displays a list of the managed computers that compromise the count for the selected Deployment Server.This report displays a list of computers, grouped and filtered by the selected managing deployment server.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 34 of 76

Carbon CopyCarbon Copy Agent Active Login Accounts - Summary

Carbon Copy Agent Global Security Configuration - Summary

Carbon Copy Agents by Operating System This report displays a graph of computers with the Carbon Copy agent installed by operating system.

Carbon Copy Agents by Version

Carbon Copy Agents Not Waiting for Call

Carbon Copy Agents with Inadequate Security

Carbon Copy Agents with Security Configuration Changes This report displays a list of agents whose security configurations state has changed in the last n days.

Carbon Copy Agents with Wait for Call Configuration Changes This report displays a list of agents whose accessibility state has changed in the last n days.Carbon Copy Events by Computer This report displays a list of events reported by the Carbon Copy agent over the last n days.

Carbon Copy Remote Control Activity in the Last 'N' Days Carbon Copy Session Activity in the Last 'N' Days This report displays a list of connection and remote tool activity over the last n days.

Carbon Copy Warning and Error Events by Computer IncidentsAlert Manager

Incident ActivityHigh Priority Incidents Not Assigned After 'N' Minutes This report lists high priority incidents that have not been assigned after n minutes.High Priority Incidents with No Activity in Last 'N' Hours This report lists high priority incidents that have not been assigned after n hours.

Incident HistoryIncident History by Computer This report lists Incident history by computer.Incident History by End User This report lists Incident history by end user.Incident History by Worker This report lists Incident history by worker.

Problem Assets

Computers with Most Incidents

Count of Incidents by Operating System and Service Pack Help Desk

Cost Analysis

Average Cost of Incidents by Platform

Cost of Incidents by Organization

Time and Cost per Incident

Top 'N' Most Expensive Incidents Helpdesk Activity

Count Incidents by Category and Priority

Count Incidents by Status, Priority or Category

Count New Incidents by Time

Incident Current Status

Incidents by Category (Pivot) Incidents on Hold More Than 'N' Days This report displays incidents that have been on hold more than n days. Incidents Open More Than 'N' Days This report displays incidents open longer than n days. This report is used for notification policy.

Incidents Resolved/Closed More Than Once

Incidents With 'N' or More Workers New Incidents in Last 'N' Days This report lists the status of today's incident including the last activity.

Top 'N' Open Incidents

This report displays a list of agents that require login security and what accounts are granted access rights.This report displays a list of security settings that specify whether certain areas of the agent interface require an access password.

Carbon Copy Agent Login and Encryption Configuration - Summary

This report displays a list of security settings that specify who can connect to a particular agent, how the user is authenticated and what options are used to safeguard the connection process.

Carbon Copy Agent Session and Connection Configuration - Summary

This report displays a list of security settings that specify whether the agent user must approve or acknowledge a connection attempt.

This report displays a list of computers with the Carbon Copy agent installed and the operating system information and agent version.

This report displays the list of agents that cannot be accessed for immediate problem resolution because wait for call is disabled or the agent is not configured to automatically wait for call.

This report displays a list of Carbon Copy agents waiting for a call that do not have security options enabled to prevent unauthorized connections and/or protect agent configuration settings.

This report displays remote control activity over the last (1) days. Saved report runs are emailed (daily) automatically if there is activity.

This report displays a list of warning and error events reported by the Carbon Copy agent over the last n days.

This report lists the computers with most incidents in descending order. Drill down into the graph to view the list of incidents for the computer, then drill down into the Alert Manager Console to see the details for each incident.This report shows a chart of incidents associated with computers grouped by operating system and service pack. Drill down to see the individual incidents.

This report computes the average cost of incidents associated with a platform. The average is calculated using the last worker to modify the work item. Note: This report requires an install of Inventory solution to run.This report computes the cost (average and total) of incidents for an organization. The cost is calculated based on the following order of available figures: worker cost, queue cost, default as supplied at runtime.

This report computes the total time and cost associated with an incident. The cost is calculated based on the following order of available figures: worker cost, queue cost, default as supplied at runtime. From the report you can drill down into the Helpdesk console.

This report lists the most expensive incidents. The cost is calculated based on the following order of available figures: worker cost, queue cost, default as supplied at runtime.

This report counts the incident priority by category. Drill down into the table to view the list of incidents. From this report you can drill down into the Helpdesk console.This report counts incidents by status, priority or category. Drill down into the graph to view the list of incidents. From this report you can drill down into the Helpdesk console.This report counts incidents by hour of day, day of week, day of year, week, month and quarter. You can drill down into the graph to view the list of incidents. From the report you can drill down into the Helpdesk console.

This report lists the last recorded status of an incident. The report lists the age of the incident and how long since it was last modified. From this report you can drill down into the Helpdesk console.This report displays the last recorded status of a incidents in a pivot table. From the report you can drill down into the Helpdesk console.

This report lists incidents that have been resolved or closed more than once. The history of the incident is included in the report. From the report you can drill down into the Helpdesk console.This report displays incidents that have n or more workers assigned. From this report you can drill down into the Helpdesk console.

This report lists the top n open incidents. From this report you can drill down into the Helpdesk Console.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 35 of 76

Top 'N' Tickets with Most Reassigns This report will return the top n most reassigned tickets.High Priority

High Priority Incidents Not Assigned After 30 Minutes

High Priority Incidents Not Closed

High Priority Incidents Not Resolved/Closed After 8 Hours

High Priority Incidents With No Activity in Last Hour Incident Activity Trend

Incidents by Day of Month Incidents cumulated by the day of the month.

Incidents by Day of Week Incidents by Hour Incidents by hour of the day specified (24 hour format).

New Incident Rate List Incidents

List Incidents by Computer

List Incidents by End User

List Incidents by Worker Planned Work

Computers Scheduled for This Week

Planned Incidents - Overdue

Planned Incidents - Start Date

Workers Scheduled for This Week Problem Computers/Platforms/Users

Computers with Incidents in Last 'N' Days

Computers with Most Incidents Computers without Incidents This report lists computers that have never had any incidents.

Computers without Incidents in Last 'N' Days

Count Incidents by Operating System and Service Pack

Count of Incidents by Category

End Users with Most Incidents

Last Incident for a Computer

Last Recorded Status of Incidents(Pivot) Service Level

Average Time to Close Incidents

First Contact Resolution

Incidents Not Completed Within the SLA

Incidents Past Due Track Changes, Moves, Adds

Count of Install, Move and Remove

Top 'N' Computers with Most Changes Worker Performance

Average Time Spent per Day on Incidents

This report lists high and ASAP priority incidents that are still in level 1 waiting to be closed or to be assigned. From this report you can drill down into the Helpdesk console.

This report lists the last recorded status of an incident. It includes the age of the incident and how long since it was last modified. From this report you can drill down into the Helpdesk console.This report lists high priority items that have not been resolved or closed after 8 hours. From this report you can drill down into the Helpdesk console.This report lists high priority incidents that are sitting idle. From this report you can drill down into the Helpdesk console.

Incidents cumulated by the day of the week. Column numbers represent the days of the week(2=Monday, 6=Friday).

This report calculates the rate at which new incidents are being logged by users. Calculations do not consider time units smaller than a day accurately. For example, if hours are used then every hour from the date of creation is used to calculate the rate (no adjustment for an eight-hour work day.) Drill down to a list of the incidents used to calculate the rate.

This report lists incidents for computers to display the history of activity performed on the computer. From this report you can drill down into the Helpdesk console.This report lists incidents to display the history of incidents reported by end users. From this report you can drill down into the Helpdesk console to see incident history details.This report lists the history of incidents assigned to workers. From this report you can drill down into the Helpdesk console to see incident history details.

This report lists computers with incidents that are scheduled for completion during the next seven days.This report lists planned incidents that did not start on time. From the report you can drill down into the Helpdesk console.This report lists planned incidents that did not start on time. From this report you can drill down into the Helpdesk console.This report lists incidents that are scheduled for completion during the next seven days and the worker to which the incident is assigned.

This report lists computers that have had incidents in the most recent n (specified number) of days. Selecting a computer will drill down into a list of incidents that exist for the computer. Choose an incident to see the incident details in the Helpdesk Console.This report lists the computers with most incidents in descending order. Drill down into the graph to view the list of incidents for the computer. Drill down into the Helpdesk Console to see the details for each incident.

This report lists computers that have had incidents but not in the most recent n (specified number) of days. Selecting a computer will drill down into a list of incidents that did exist for the computer. Choose an incident to see the incident details in the Helpdesk Console.This report lists the computers with most incidents in descending order. Drill down into the graph to view the list of incidents for the computer, then drill down into the Helpdesk console to see the details for each incident.

This report displays the number of incidents in each category. Drill down in to the category to see the count of incidents by computer within the category. Continue to drill down to see a list of incidents for the computer selected. Select a incident to see the details in the Helpdesk Console.This report lists the end users with most incidents in descending order. Drill down into the graph to view the list of incidents for the end user.This report lists the date and time the last incident was requested for a particular computer. Click the latest request to drill down and see all the incidents for that computer. Select an item from the list to see the individual incident history.This report display the last recorded status of a incidents in a pivot table. From the report you can drill down into the Helpdesk console.

This report computes the average time to close incidents. Drill down into the table to view the list of incidents. From the report you can drill down into the Helpdesk console.This report lists percentages or incidents by company and department that have been closed on the first contact. You can drill down to see a list of items for that company/department. You can then drill down to Helpdesk to view details of a incident.

This report lists incidents that have exceeded the service level agreement, i.e., have not been closed within the specified time. From this report you can drill down into the Helpdesk console.This report lists incidents that have not been completed on time. From this report you can drill down into the Helpdesk console.

This report will calculate the number of installations, moves, or removals. Drill down to see the list of computers that constitute the counts for each action.This report lists the number of specified computers with the most changes in descending order. From this report selecting a computer and clicking the drill down arrow will bring up the Incident History Report for that computer.

This report calculates how much time during the day is spent on incidents over the number of days specified. Drill down to see a list of the incidents used with the time spent to calculate the average time spent per incident.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 36 of 76

Average Time Spent per Incident

Count Incidents by Worker

Count Incidents by Worker(Pivot)

Incidents Closed by 'level 1'

Incidents Closed by 'level 2'

Open Incidents without Activity in Last 'N' Minutes Time Spent by Incident This report displays incidents and how much time (per worker) has been spent on them.

Time Spent by Worker This report displays workers and how much time they have spent by incident during a date range.

Workers with Least Closed Incidents

Workers with More Than 'N' Open Incidents

Workers with Most Closed Incidents Recovery SolutionClient Reports

Client Event History (Date Range)

Clients with No Full Snapshot in Last 'N' Days

File Extensions Backed Up by Client

File Recovery History (Date Range)

Full System Recovery (FSR) History (Date Range)

Most Recent Recovery Solution Events Recovery Solution Clients by Version This report shows Recovery Solution clients by the version they have installed.

Recovery Solution Jobs in Last 'N' Days

Snapshot History (Date Range)

Snapshot Status (Date Range)

System Rollback History (Date Range) Local ReportsComputers by Agent Version This report will show how many computers have the local agent installed by version.Computers with Local Agent This report will list the computers which have the local agent installed.Computers with Potential Space Issues This report will list computers with the local agent installed and less than N% drive available.Computers without Local Agent This report will list the computers which do not have the local agent installed.

Most Recent Recovery Solution Events Server ReportsFile Extensions Backed Up by Server Largest Files This report lists the largest files that are backed up on the server.

Potential Space Saved

Server Disk Space Currently Used

This report displays the time spent to complete an incident. Drill down to see a list of the incidents used with the time spent to calculate the average time spent per incident.

This report counts incidents by worker. You can choose to group the report by the worker that created the incident, is assigned to the incident, or last modified the incident. Drill down into the graph to view the list of incidents. From this report you can drill down into the Helpdesk console.This report display the last recorded status of an incidents in a pivot table. From the report you can drill down into the Helpdesk console.This report displays the work items that Level 1 workers closed. Drill down to see the individual items in the Helpdesk Console.This report displays the work items that Level 2 workers closed. Drill down to see the individual items in the Helpdesk Console.

This report lists the incidents that are open but have not had activity in the last n minutes. This report is used by the Notification Policy 'Open work items with no activity in over n minutes.'

This report displays the bottom n workers that close the least incidents. Drill in to the incidents that the worker closed by selecting the worker. View the details of the incident in the Helpdesk Console by selecting an incident.This report displays workers with more than n open incidents. Drill down on the worker to see the incidents for the Worker. The notification policy 'Workers with more than n open incidents' sends this report.This report displays the top n workers that close the most incidents. Drill in to the incidents that the worker closed by selecting the worker. View the details of the incident in the Helpdesk Console by selecting an incident.

This report shows key client events and the number of times each event has occurred on each PC or server. The report will provide the PC or server name, the Recovery Solution group name, total number of; successful, cancelled, and failed snapshots, total number of; successful, cancelled, and failed FSR's, total number of; successful, cancelled, and failed File Restores, and total number of; successful, cancelled, and failed System Rollbacks.This report lists clients that have not had a full snapshot taken in the last n days (showing name, login name, last snapshot date/time, days from today).This report lists file extensions currently backed up, by client, group, and server (showing resource name, login name, group name, file extension, number of files with that extension, number of bytes with that extension).

This report will show all PCs and servers that have performed a File Recovery during the specified date range. The report will provide PC or server name, name of the logged in user initiating the file recovery, Recovery Solution group name, start and end time, recovery result, number of files restored, and non-compressed size of the data restored.

This report will show all PC's and Server's that have performed a Full System Recovery during the specified date range. The report will provide PC or server name, name of the logged in user initiating the FSR, Recovery Solution group name, start and end time, recovery result, number of files restored, and non-compressed size of the data restored.

This report will list the top n number of recent Recovery Solution events. You can filter on a resource name or view recent events for all resources. You can then drill down to the Resource Explorer.

This report counts all client jobs by job type in the last n days. The user can drill-down to see a list of all job types and see the status of each job.This report is a snapshot history from date x to date y, by client, group, and server (showing resource name, login name, group name, volume, date/time (in Greenwich Mean Time/GMT), number of total files, number of identical files, number of new files, number of failed files, number of open files, compressed bytes sent, throughput rate.)

This report will show all PC's and Server's that have performed a Snapshot during the specified date range. The report will provide PC or server name, name of the logged in user initiating the snapshot, Recovery Solution group name, start and end time, snapshot result, number of files in snapshot, and non-compressed size of the data in snapshot.

This report will show all PC's and Server's that have performed a System Rollback during the specified date range. The report will provide PC or server name, name of the logged in user initiating the system rollback, Recovery Solution group name, start and end time, recovery result, number of files restored, and non-compressed size of the data restored.

This report will list the top n number of recent Recovery Solution events. You can filter on a resource name or view recent events for all resources. You can then drill down to the Resource Explorer.

This report lists file extensions currently backed up on this server (showing file extension, number of files with that extension, number of bytes with that extension).

This report shows disk space used by either a group or a client. The report shows how much server disk space could be saved by deleting a group or client from Server.This report lists server disk space currently used, by client and group (showing resource name, login name, group name, real space used, compressed space used, common space used, unique space used, compression ratio). All sizes are in MB.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 37 of 76

Server Space Usage Trend (Date Range)

Server Usage History (Date Range) Unsuccessful Jobs in Last 'N' Days This report lists all jobs that have not completed successfully in the last n days.

Users with Web Based File Recovery Access Web Administrator for Windows Connected Computers by Operating System Displays Computers by Operating System.Connection - Log Displays the Web Administrator for Windows Connection Log.Connection - Summary Displays the Web Administrator for Windows Connection Summary.Connections by Hour of Day Displays the Web Administrator for Windows Connections by Hour of Day.Connections by Week Number Displays the Web Administrator for Windows Connections by Week Number.Function Usage Breakdown Displays the Web Administrator for Windows Function Usage Breakdown.

This report shows server space used by a date range. You can select how to group the data: dd=day, ww=week, mm=month.This report shows resource name, login name, group name, total number of successful and canceled snapshots, number of successful rollbacks, number of successful FSRs, and compressed server disk space used.

This report lists users and counts computers where the users have access to the WBFR console. You can drill down to see a list of computers for a given user. From there you can drill down to the Resource Explorer.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 38 of 76

Active Directory

Computers with Directory User Profiles Container Members by Operating System This report will list Directory containers members by Operating System.

Directory Computers Without the Altiris Agent

Directory Import in the Last 'N Days This report lists (in seconds) how long each Directory import took over the last n days.

Directory Import Rule Task Runs This report will list all the resources that were created and updated during each import rule run.Directory Resources by Container This report will list Directory containers by category (user, computer, etc.).

Directory Users with Contact Detail Resources Imported per Import Rule This report will list the resources that were imported for each import rule.

Windows Computers Not Found in Directory This report lists Windows computers that are NS clients but are not found in Active Directory.

Agent Altiris Agent DeploymentAll Windows NT/2000/XP/2003 Computers with no Altiris Agent installed List all Windows NT/2000/XP/2003 Computers with no Altiris Agent installed.

Altiris Agent version

Altiris Solution Agent version vs. collection

Computers with Aclient but not Altiris Agent

Computers with Altiris Agent but not Aclient

Computers with Altiris Agent installed

Computers with Deployment Server agents (Aclient)

Computers With No Additional Agents

Duplicate computer name Altiris Agent Discovery

Count of discovered/Altiris Agents by domain

Count of discovered/Altiris Agents by OS

Discovered computers history

Discovered computers not reporting inventory

Discovered computers sorted by date

Discovered computers summary

Discovered computers with Altiris Agent

Discovered computers with no registered Altiris Agent Altiris Agent Installation Status Reports Altiris Agent installation status

Altiris Agent installed other than push method

This report will list computers, Directory containers, and users associated with them. You can enter a container and a user name to filter the report. Inventory solution needs to be installed in order to view this report. The report then drills down to the resource manager.

This report will count computers by container that have been found that do not have the Altiris Agent installed. The report can be run for a specific container or for all containers. You can then drill down to view a list of computers, and from there to the resource manager for a given computer.

This report will list Directory users with contact detail. You can enter a container and a user name to filter the report. The report then drills down to the resource manager.

This report counts distinct Altiris Agent versions, and displays the version number of the Altiris Agent package that is staged on the server. This report will allow you to determine which computers do not have the latest Altiris Agent version.This report counts distinct Agent versions. You can select the Agent name (by default all agents) and the collection (by default All Computers) to compare with. For example, 'Carbon Copy' and 'All Windows computers', respectively.This report contains all computers known to Altiris Notification Server with the Altiris Aclient installed that do not have the Altiris Agent installed.This report contains all computers known to Altiris Notification Server with the Altiris Agent installed that do not have the Altiris Aclient installed.This report contains all computers known to Altiris Notification Server with the Altiris Agent installed.This report contains all computers known to Altiris Notification Server with the Altiris Aclient installed.This report contains Altiris Agent computers with either the Altiris Agent or Inventory Agent installed, but no additional agents installed.

This report displays any two or more computers with the same name. This can happen if a computer is cloned and the original computer and the cloned computer both reside on the domain.

Count discovered computers and Altiris Agent computers. Use this report to determine the percent of discovered computers with the Altiris Agent installed. By default this data is displayed for the last 7 days however parameters are available to both change this date range as well as filtering the domain.Count discovered computers and Altiris Agent computers. Use this report to determine the percent of discovered computers with the Altiris Agent installed. By default this data is displayed for the last 7 days however parameters are available to both change this date range as well as filtering the operating system.

List computer resource discovery summary information. Use this report to view a chronological list of the number of new resources discovered, existing resource rediscovered (both changed and unchanged) and the time taken for each resource discovery over the specified time range (by default the last 7 days). This report can be filtered by specifying the date range that the discoveries took place. Each discovery run can then be drilled into to view the new resources that were discovered during that run.List discovered computers not reporting inventory. This report can be filtered by limiting the number of computers to return, the date range that they were discovered, their domain and operating system.

This report lists discovered computers sorted by Discovery Date (by default). Use this report to identify the most recently discovered computers and computer with the [Altiris Agent] recently installed (PushDate). You can specify the number of computers to report and the date range that they were discovered (by default the last 7 days). You can also filter the report using the computers domain or its operating system name.This report displays the number of discovered computers, the percentage that have Altiris Agent installed, the number of Altiris Agents installed, the number of Altiris Agents that were installed via push install and the number of Altiris Agents that were installed by other means. By default this data is displayed for the last 7 days however parameters are available to change this as appropriate.

List discovered computers with Altiris Agent installed/registered. Use this report to verify how the Altiris Agent was installed. If the Altiris Agent was not push installed then the Push Date will be blank. The report can be filtered by specifying the number of computers to report, the discovery date range to report over (by default the last 7 days are reported), the specific domain in which the computers reside or the name of the operating system that the discovered computers are running.List discovered computers with no registered Altiris Agent. This report can be filtered by limiting the number of computers to return, the date range that they were discovered, their domain and operating system.

List the Altiris Agent installation status for the last week (by default). This list does not include agent pull install information.List discovered computers where the Altiris Agent was installed using a method other than push (e.g., pull, e-mail, login script, floppy). Use this report to track installation of the Altiris Agent. This report can be filtered by setting the date range that they were discovered, their domain and operating system.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 39 of 76

Computers where the Altiris Agent installation failed

Push (Altiris Agent) install failed Altiris Agent Inventory Altiris Agent basic inventory (no update 7 days)

Altiris Agent basic inventory (sorted by last update)

Altiris Agent forward to SMS

Altiris Agent forward to SMS (no update 7 days)

Altiris Agent registration (newest)

Altiris Agent registration (oldest)

Computers with changed ownership Reports likely changes in computer ownership based on a change in the primary user.

Altiris Agent Package Info Request Clients requesting package info requests in last 7 hours The clients that have requested package server information in the last seven hours.Last 200 Package info requests Lists the last two hundred client package server info requests.Package info request statistics by time Processing time statistics for clients requesting package server information.Package info request summary statistics Summary of clients requesting package server information.

Package info requests producing warnings Client package server info requests that have produced warnings in the last three hours.

Package info requests requiring > 5 seconds to process Client requests for package server information that have taken longer than five seconds to process.Package info requests that result in error Requests from clients for package server information that have caused errors.Package info requests that result in success Requests from clients for package server information that have been successful.

Altiris Agent Tasks Status Altiris Agent package download Altiris Agent program execution (all) List all program execution of internal software delivery tasks regardless of status.

Altiris Agent program execution (failure) List program execution of internal software delivery tasks that resulted in a failure code.

Altiris Agent program execution (last run) List the last program execution of internal software delivery tasks regardless of status.

Top N Altiris Agent queue status events Configuration Request

Clients with no configuration in last N days

Configuration request policy generation events

Configuration request statistics by time

Configuration request summary statistics Configuration requests requiring > 5 seconds to process List Altiris Agent configuration requests that took more than 5 seconds to process.Configuration requests that result in error List Altiris Agent configuration requests that result in error.Configuration requests that result in success List successful Altiris Agent configuration requests for the last 7 days.

Last N Configuration requests ServerDatabaseItem Report This report lists all items contained in the Notification Server database.Items installed by Solution This report displays all Items that are installed by Solutions.

Event - Queue Status

Bad Queue statistics

Event Queue statistics Events - Scheduled Count scheduled events Groups scheduled events.

Last N scheduled events Scheduled events requiring > 5 seconds to process List Notification Server scheduled events that took more than 5 seconds to process.

Scheduled events statistics by time

List the computers where the Altiris Agent installation failed. This list does not include agent pull install information.List discovered computers where the Altiris Agent installation (push) has failed. Use this report to find installation problems. The report can be filtered by specifying the number of computers to report, the discovery date range to report over (by default the last 7 days are reported), the specific domain in which the computers reside or the name of the operating system that the discovered computers are running.

List inactive Altiris Agents. NOTE: The 'Forward to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.List Altiris Agents sorted by last update (ModifiedDate) date. You can specify the date {CreatedDate, ModifiedDate, SMSForwardDate}, the number of clients to report, and the sort order. The combination allows you to determine active/inactive Altiris Agents. NOTE: The 'Forwarded to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.

List Altiris Agents forwarded to SMS in last n days. NOTE: The 'Forwarded to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.

List Altiris Agents not forwarded to SMS in last n days. NOTE: The 'Forwarded to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.

List newest installed/registered Altiris Agents. NOTE: The 'Forward to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.List oldest Altiris Agents. NOTE: The 'Forwarded to SMS' date indicates the last time inventory was forwarded to SMS. DDR forwarding to SMS is independent.

List package downloads that occurred for internal Notification Server tasks. Calculates the duration and the transfer rate.

Lists the most recent Altiris Agent Queue status events. You can specify the number n of events to report (10 by default).

This report lists computers that have not sent Altiris Agent configuration requests for the last n days - 7 days by default. This report can be filtered by specifying a particular client computer, domain or operating system. By default all client computers, all domains and all operating systems are reported.Computes the time taken to generate the Altiris Agent configuration policies. The first level report displays the total time taken to generate the policies. Drilling down will show the time taken by each policy.Computes the amount of network traffic and the time to process Altiris Agent configuration requests by time {hh - hour, dd - day of month, dy - day of year, ww - week, mm - month}. The default is daily statistics for the last week.Computes the amount of network traffic and the time to process Altiris Agent configuration requests for the last week (by default).

List Altiris Agent configuration requests. You can specify the number of items to report (200 by default).

This report displays Event Queue and the Fast Event Queue invalid event count and invalid file size data over the specified from-to day range (last 7 days by default) for the specified computer (by default all computers invalid events are shown).

This report displays Event Queue and Fast Event Queue event count and queue full data over the specified from-to day range (last 7 days by default) for the specified computer (by default all computers invalid events are shown). It also displays the event file size for these queues.

List n Altiris Agent scheduled events. You can specify the number of items to report (1000 by default) and a from-to time range (last 7 days by default).

Computes the amount of network traffic and the time to process NS schedule event for the last week.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 40 of 76

Scheduled events summary statistics Inventory Analysis Reports Computer Usage (month to date) Reports the month-to-date computer usage figures (number of users, hours of usage).

Computers Found in Resource vs. Identity table This report lists any computers found in the Resource table but not in the Identity table.Computers Never Reporting Events This report lists the computers that have never reported an event.Computers Never Reporting Inventory This report lists the computers that have never reported inventory.

Count of computers by server

Count of Computers Reporting Events

Count of Computers Reporting Inventory

Inventory Forwarding Analysis Inventory Forwarding Computers never forwarded This report lists the computers that have never forwarded inventory.

Inventory forwarding status License Reports

Licenses per Solution Package Server Status Package Distribution Event This report lists the status, transfer rate, and event time for each package and server.Package summary Reports on packages - size, version and the number of servers they reside on.Recovered Packages Lists recovered packages that failed to download and are being retried.

Server load summary

Server summary Servers With Recovered Events Reports on servers who had previous package downloads fail and are being retried.

Policy Reports Disabled Policies Lists disabled policies.Enabled Policies List Enabled Policies.Last N Logins Last n login for a given user on a given computer.Last N policies processed This report lists the last n policies processed.Policies processed between time interval This reports lists the polices that processed successfully between time A and B.Policies processed successfully List policies that have finished processing successfully.Policies requiring > N milliseconds to process List policy requests that took more than n milliseconds to process.

List policy requests that took more than N milliseconds to process.Policy Event History List event history for a policy.

Report History Report execution Resource Reports All Assets This report lists all assets contained in the Notification Server database.All Companies This report lists all company resources contained in the Notification Server database.

All Cultures This report lists all cultures (language resources) contained in the Notification Server database.

All Departments This report lists all department resources contained in the Notification Server database.All Helpdesk Incidents This report lists all help desk incidents contained in the Notification Server database.All Incidents All Incidents. All MSI Products All MSI Products. All Network Printers This report lists all network printers contained in the Notification Server database.All Network Resources This report lists all network resources contained in the Notification Server database.All Packages This report lists all packages contained in the Notification Server database.All Resources This report lists all resources contained in the Notification Server database.All Service Packs All Service Packs.All Severity Ratings All Severity Ratings. All Sites This report lists all sites contained in the Notification Server database.All Software All Software. All Software Bulletins All Software Bulletins. All Software Installation Options All Software Installation Options. All Software Installation Types All Software Installation Types. All Software Releases All Software Releases.All Software Types All Software Types (e.g. desktop application, operating system, etc.).All Software Update Packages All Software Update Packages. All Software Updates All Software Updates. All Subnets This report lists all subnets contained in the Notification Server database.

Computes the amount of network traffic and the time to process NS schedule event for the last week (by default).

This report lists a count of all client computers, both managed and unmanaged, known to Altiris Notification Server and is grouped by Server. Drill down on a group to get a list of computers in that group. Drill down on a computer for more details in the Resource Manager.This report displays a count of computers per collection (by default "All Computers" collection) that have reported events in the specified time frame (default is 7 days).

This report displays a count of computers per collection (by default "All Computers" collection) that have reported inventory in the specified time frame (default is 7 days).Compares the resource counts for various source Notification Servers that have forwarded inventory to this Notification Server.

This reports lists the destination server which is receiving forwarded inventory and the last time inventory was sent. You can then drill down and login to access the destination servers Admin console.

This report displays license information for Notification Server and Solutions over the specified date range. The information is displayed per solution by date and indicates if it is a trial, its total number of licenses, its number of licenses in use, their expiry date and the number of solutions in use. Results can be filtered by solution as well as by date range.

This report lists servers that have reported events in the last n days, their total event transfer rate and the number of packages they have download. Drill downs allow you to then view package details for individual server and from there you can then drill down to the Resource Manager.This report gives a summary of each package server, the packages hosted, the status and disk space used.

This reports will list the policies that have failed in the last n minutes. The report will list the solution and collection that the policy is applied to.

Lists a count of the reports that have been executed. Note: Since the report tracking is real time, this report is not included in the count.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 41 of 76

Computers This report lists all computers in the Notification Server database.MBSA Security Bulletin All MBSA bulletins in the Notification Server Database.MBSA Security Bulletin HfNetChk Mode MBSA Security Bulletin HfNetChk Mode. MSI Products MSI Products.Software Delivery Packages This report lists all software delivery packages.Software Release Inventory Software Release Inventory Software Update Inventory Software Update Inventory Users This report list all user resources.

Saved Report Runs

Report runs by date Security ReportsPrivileges granted to roles Show the privileges that have been granted to a role.Security permissions granted in the last N days List all security permissions granted in the last n days.Security privilege access violations by user in the last N days List security privilege violations caused by user in the last n days.Security privileges granted in the last N days List security privileges granted to roles in the last n days.User permission assignments on management items The permissions assigned to a user or group, on items.User permission assignments on resources The permissions assigned to a user or group, on resources.

Server Performance Reports

Server Load by Last 'N' Days

Server Load by Start and End Date Site Reports

Package servers contained in site

Package servers contained in subnet

Sites that contain package server

Subnets contained in site

List Report Runs sorted by creation date. You can specify the number of items to report, and the sort order. Use this report to determine what reports can/will be purged.

This report shows the load on the Notification Server and displays total times taken to process scheduled events, events and configuration requests for the last n days. You can then drill down to see all scheduled events, events or configuration requests for a chosen day and then into the Resource Manager.

This report shows the load on the Notification Server and displays total times taken to process scheduled events, events and configuration requests between the specified start and end dates. You can then drill down to see all scheduled events, events or configuration requests for a chosen date and then down into the Resource Manager for more detailed resource information.

This report lists the package servers contained in a site. The initial report lists known sites from which you can then drill down to see the package servers contained in the chosen site.

This report lists the package servers contained in a subnet. The initial report lists known subnets from which you can then drill down to see the package servers contained in the chosen subnet.

This report lists sites that contain a package server. The initial report lists known packager servers from which you can then drill down to see the sites that contain the chosen packager server.This report lists subnets contained in a site. The initial report lists known sites from which you can then drill down to see the subnets contained in the chosen site.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 42 of 76

Application ManagementBaseline Added - FilesAdded Files - Pivot

Added Products by Computer

Count of Added Products

Size of Added Products

Top 'N' Computers with Most Added Files Baseline Added - Registry Added Keys by Computer Top 'N' Computers with most Added Keys This report lists the top n computers that have the most added registry keys.

Baseline Deployment - Files Baseline by Domain - Pivot

Baselines

Computers Not Reporting in Last 7 Days

Computers Running Baseline Agent

Count of Computers by Baseline

Verify Baseline Agent Version Baseline Deployment - RegistryBaselines This report lists the baselines that exist.Computers Not Reporting in Last 'N' Days This report lists the computers that have not reported a baseline in the time specified.Count of Computers by Baseline This report lists the computers according to the baseline by which the computer is categorized.

Baseline Missing, Different - Files Different Version Files - Pivot

Different Version Files by Product

Missing Files - Pivot

Missing Files by Product

Top 'N' Computers with Different Version Files

Top 'N' Computers with Missing Files Baseline Missing, Different - Registry Missing or Different Keys and Values by Baseline This report lists the registry keys and values that are missing from the baseline and categorizes them by baseline.

Missing or Different Keys and Values by Computers This report lists the registry keys that are missing from the baseline and categorizes them by computer.

Top 'N' Computers with Missing or Different Keys Baseline Summary

Aggregate Compliance % by Computer

Average Baseline Compliance %

Average Number Missing, Different by Baseline

Compliance Level by File Baseline

Easily and quickly find unauthorized added files. Start with the manufacturer, explore the products, then the file names and ultimately drill down into the details for a specific computer.A summary list of all of the products added to the computers on your network. The list is sorted by computer name and includes the number of files reported by baseline.This report records the number of product instances that have been installed in your network. You drill down to the computer by following the product.This report computes the aggregate size of each product across all of the computers in your network that have a specified minimal aggregate size, so you can determine the impact. Drill down to see the list of computers and individual size of each file.This report lists the top n computers with the most added files. If you don't want to be bothered by computers with added files fewer that 100 then accept the default computer filter. NOTE: The baseline agent can limit the number of added files reported in the added table, therefore the number of rows in the database may be lower than the number of added files.

This report lists the registry keys that have been added and orders them by computer. It drills down to a list of added keys and values.

Use this report to determine what baselines are deployed in which domains. Expand the domains in the display and double-click on the computer name to drill down into the details for the computer.

This reports helps you keep track of all the baselines you have deployed. It reports the name and version, the reference system (from which the snapshot was taken), the date and the number of files in the snapshot. Note: You can use multiple versions of a baseline to track software roll-outs. Use this report to verify that you have the right baseline deployed. Drill down into the table to view the list of computers.This report lets you determine which computers are not reporting (baseline data) regularly. Each individual baseline is reported. Typically you will schedule the running of the baseline agent using SMS advertisements. The report will indicate the number of days since the last report (of any baseline). You can create a custom report to focus on specific baselines if you are running multiple.

This report counts the number of computers that are running baseline (i.e., have reported at least one baseline result) and the number of computers that are not running baseline. Drill down into the graph to view the list of computers.This report displays the number of computers that are running a baseline in a graph. Drill down into the graph to view the list of computers for that baseline name and version.This report allows you to determine what versions of the baseline agent are deployed throughout your enterprise. Drill down into the graph to view the list of computers.

Find back-leveled DLLs, EXEs and OCXs easily using the pivot report. Double-click on the name to drill down into a computer.This report finds products with different version files. Drill down into the product for the list of files that have a different version and from there drill down to view the list of computers with the different version file, including the expected version number and expected file size.Find missing files quickly and easily. Start with the manufacturer, explore the products, then the file name and ultimately drill down into the details for a specific computer.This report finds products with missing files. Drill down into the product to find the list of missing files and then drill down to view the list of computers with the missing file.

This report lists the top n computers with the most different version files. You can filter the list of computers by changing the different version files computer filter. NOTE: To save resources, the baseline agent can limit the maximum number of different version files that are reported to SMS. Hence the number of different version files and the number of reported different version files may be different.

This report lists the top n computers with the most missing files. You can filter the list of computers by changing the missing files computer filter. NOTE: To save resources, the baseline agent can limit the maximum number of missing files that are reported to SMS. Hence the number of missing files and the number of reported missing files may be different. (Note that not all data fields will be populated, depending on the baseline configuration.)

This report lists the computers that have registry keys that are missing or different from the baseline for that computer. It drills down to a list of the keys and values.

This report aggregates the individual baseline compliance % for each computer, reporting one overall compliance % for the computer. For example, you may have three baselines (OS, Office, IE). This report will group the computer into levels using the aggregate compliance %. Drill down into the chart to view the compliance % for each individual baseline sorted by computer.This report displays the average compliance level for each baseline (i.e., the average compliance % across all the computers). You can drill down into each baseline to view the specific computer details. Sort the 'Compliance %' column to find the computers that need the most attention. You can filter the report by specifying a domain name, or simply use '%' to view all of the computers in your database.

Use this report to determine the average number of missing files and different version files by baseline. This report can help you identify the summary compliance level across all of your computers. Drill down into the table to view the list of computers and the actual number of missing files and different version files reported by baseline.This report displays the number of computers by compliance level (% range) for each baseline in a bar graph. Note: A single computer can have multiple baselines. When you drill down into the graph the compliance % for each baseline is displayed sorted by computer name. This report lets you quickly identify which particular baselines (software components and applications) are not compliant.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 43 of 76

Compliance Level by Registry Baseline

Count of 100% Compliant Baselines

Summary of all File Baselines

Top 'N' Lowest Aggregate Compliance % Windows Installer Agent All Repair Attempts in Last 'N' Days

Computers not Reporting in Last 'N' Days This report lists computers that have not reported in the last n days. It then drills down to the Resource Explorer.

Computers Reporting Broken Components

Computers Reporting Inaccessible Source Paths

Computers with most Broken Products

Computers with No Windows Installer Agent Installed Reports Windows computers that have never reported Windows Installer data.

Failed Repair Attempts in Last 'N' Days

Feature Install State by Computer Displays product feature install states for computer Y. From this report you can drill down to the Resource Explorer.

Installed Products - Summary

Most Frequently Broken Products

Product Summary by Computer

Successful Repair Attempts in Last 'N' Days

Windows Installer Agent - Summary Application MeteringAgent StatusApplication Metering Agent Not Reporting Data This report shows all computers with an application metering agent not reporting data in the last n days.Application Metering Agent Rollout Status This report shows a count of all computers having or needing the application metering agent.Applications by Monitor Policy View all application monitoring policies.Computers with Application Metering Agent View a count of all computers with the application metering agent by version.Computers with Monitor Policy Enabled This report shows a count of computers and the number of policies enabled.

Application Performance Application Exceeding 'N%' CPU Usage Application Run More Than 'N' Times Use this report to view applications which have exceeded a specified number of threshold executions.Application Total Run Time Specify an application and date range to view total run time of the given application.Average CPU Usage by Application Input application, domain, percent and date range to view CPU utilization.Average Run Time by Computer Input application and date range to view the application average run time by computer.

Computers with Applications Exceeding 'N%' CPU Usage.

Application UsageAmount of Time Logged In Input domain and date range to view the amount of time Logged In.Amount of Time Running Applications Input application, domain, user and date range to view application run time.

Application Usage - Average Input number of days, minimum number of runs, domain and application to view average application usage.Applications Least Used Input application, domain and number of days to view least-used applications.Applications Usage - Max or Min Daily Count Applications Usage - Max or Min Daily Count.Applications Used by Largest Number of Computers Applications Used by Largest Number of Computers.

Applications Used by Smallest Number of Computers Applications Used by Smallest Number of Computers. Count of Application Usage Input application, domain and number of days to view a count of application usage.Count of Application Usage - User Input application, domain, number of days, and user name to view a count of application usage.Count of Computers by Application Input application name, domain and number of days to view a count of computer by application name.

Concurrent Usage Concurrent Usage Input the domain, date range and application to view occurrences of concurrent usage.Concurrent Usage by Policy Input the domain, date range, and policy name to view occurrences of concurrent usage.

Cost Analysis

Cost by Location

License Comparison (Used vs. Installed vs. # Licenses)

License Cost Analysis

This report displays the number of computers by compliance level (% range) for each baseline in a bar graph. Note: A single computer can have multiple baselines. When you drill down into the graph the compliance % for each baseline is displayed sorted by computer name. This report lets you quickly identify which particular baselines (registry keys) are not compliant.

The report displays the number of 100% compliant baselines. Note: A computer can have more than one baseline (e.g., OS, Office, IE). This report shows the number of baselines that are 100% compliant and the number of baselines that are not. Drill down into the graph to view the list of computers (and baselines) sorted by compliance %.Reports summary of each file baseline run. From the summary, you can drill down to a list of all added, missing and different files reported on a computer from a specific compliance scan.Reports the top n computers that need the most attention, which makes performing triage a snap. If you don't want to view computers that have a compliance % greater than 80, you can restrict the list of computers by adding a query filter that requires the compliance % be less than or equal to 80. In any case, this report will find the computers that need your attention. Simply drill down into the table to view the compliance % and the number of files missing, with different version and added.

This report lists summary information of all repair attempts within a variable number of days. From this summary information, you can drill down to the Resource Explorer.

This report will list computers that are reporting broken Windows Installer components. You can then drill down to the Resource Explorer.This report counts how many inaccessible source paths each computer has. You can drill down to see which components of a selected computer are broken. You can then drill down to list inaccessible source paths. You can then drill down to the Resource Explorer.Lists computers with the most broken products. Drills down into all broken products of selected computer, then drills down to the Resource Explorer.

This report lists summary information of failed repair attempts within a variable number of days. From this summary information, you can drill down to the Resource Explorer.

This report lists products and how many times they have been installed. It drills down to all computers with the installed product.List most frequently broken products. Drills down into all broken components of selected product, then drills down to the Resource Explorer.This report displays a summary of installed products on one or more computers. You can drill down to a list of broken components for each product.This report lists summary information of successful repair attempts within a variable number of days. From this summary information, you can drill down to the Resource Explorer.This report shows summary information for all Windows Installer Agent scans in the last n days, then drills down to the Resource Explorer.

Enter the application, domain, percentage threshold and date range to view applications that exceed the specified CPU usage limit.

Computers with Applications Exceeding 'N%' CPU Usage

This report combines the licensing cost with the installations at the location to calculate the cost of applications at each location. Inventory Solution needs to be installed and the user data must be collected in order to view this report.This report displays a count of computers with installed product licenses compared to a count of computers that use the products. Inventory Solution needs to be installed in order to view this report.Track the count of distinct product. Calculate the total cost from this count by entering the number of licenses purchased and the cost. Inventory Solution needs to be installed in order to view this report.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 44 of 76

SW Installation and License Summary Discovered Applications Application First Discovered Date and Computer List of applications discovered by date and computer name.Count of Computers by Discovered Applications Count of computers with each discovered application.

Count of Computers by Discovered Applications and Versions.

Count of Computers with Newly Discovered Applications. Count of Discovered Applications by Computer Count of Discovered Applications by Computer.

History and TrendApplication Usage Input application, application manufacturer, and date range to view summary application usage.Application Usage by Computer Input computer name, domain, and date range to view application usage data.

Installed vs. Used

Installed vs. Used Start-Stop-Denial Events Applications by First and Last Start List applications by time of first and last execution.Applications by Last Stop List application by last stop time.Denial Events by Application List denial events by application.Event Types View count of all denials, starts and stops by date range.

Patch ManagementAgent InformationAgent Installation Status Lists the status of all Software Update agent installations during the past week (by default).

Agent Summary Lists computers with the Software Update Agent installed, the Agent version and the operating system information.

Agent Software Update Packages Software Update Packages - Checkpoint Recovery

Software Update Packages - Download Summary

Software Update Packages - Errors

Software Update Packages - In Progress

Software Update Packages - Last 'N' Completed Software Update Packages - Last 'N' Events Lists the last n software update package download events.

Agent Software Update Task Execution

Software Bulletin Task Execution Summary Software Bulletin Task Execution Summary. Software Update Task Execution Summarizes the execution results for all scheduled software update tasks.Software Update Task Reboot Status - Summary Software Update Task Reboot Status - Summary.

ComplianceCompliance Level by Computer - Summary Software Bulletins

Software Bulletin Status - Summary

Software Bulletins by Software Release

Superseded Bulletin Summary Software Update Summary Count of Software Updates by Service Pack Count of Software Updates by Service Pack.

Count of Software Updates by Severity

Count of Software Updates by Software Release Displays a count of software updates applicable to a particular operating system or application version.

Downloaded Software Updates by Bulletin Software Update Download Status Lists the status of all software updates downloaded to the configured Altiris server.

Software Updates by Software Release Vulnerability Analysis Detected Vulnerabilities by Computer - Summary

Detected Vulnerabilities by Severity Rating PC TransplantCapture Personality ReportsComputers Where Package Build has Failed

This report shows the computers which have not been scheduled for a personality package build.

Computers Where Package Build has Succeeded

This report corresponds with Microsoft's licensing design. Use this report to calculate the licensing excess or deficiency based on your current installations and the types of Microsoft licenses purchased. Inventory Solution needs to be installed in order to view this report.

Count of Computers by Discovered Applications and Versions Count of Computers with Newly Discovered Applications

Inventory Solution complements this report - although it is not required. ALL discovered software installed in your environment will be listed. You can filter by domain, application, version, manufacturer, and date to see how many of those applications have been used.

Lists any software update packages that required checkpoint recovery during the download. The report also displays at what point (byte offset) the recovery started.Summarizes all agent software update package downloads. The report also calculates the download session duration and the transfer rate.Lists any software update package that reported errors during download. The report can be used to identify computers with communication errors.Lists any software update packages that are currently being downloaded or have been abandoned. The delta time represents the time since the download session was started. To find abandoned sessions, specify a large delta time threshold.Lists the last n software update package download sessions that have completed. The report can be used to track recent activity.

Lists the overall compliance percentage based on the number of software update tasks and the number of installed software updates.

Displays summary information on software bulletins and the number of software updates for each bulletin. The results can be filtered to display only enabled bulletins, bulletins of a particular severity or bulletins with full/partial software update downloads.Displays summary information on all software bulletins. The results can be filtered to display only enabled bulletins, bulletins of a particular severity or bulletins for a particular software product.Displays all software bulletins that have been superseded by a subsequent software bulletin or all software bulletins that have not been superseded.

Displays a count of software updates by severity and software release. The results can be filtered by severity and release date.

Displays a count of available software updates by software bulletin and the number of software updates actually downloaded to the configured Altiris server.

Displays summary information on all software updates. The results can be filtered to display software updates by severity, software release, software bulletin and release date.

Summarizes the MBSA security update scan results by computer. The results can be filtered to display a list of software bulletins required for a computer.Displays a count of computers requiring a specific software update based on the MBSA vulnerability scan. The results can be filtered to display only bulletins of a particular severity rating.

This report shows the computers in all or specific package groups which have experienced a failure building a personality package within a specified period of time.

Computers Where Package Build has not been Scheduled

This report shows the computers in all or specific package groups which have successfully built a personality package within a specified period of time.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 45 of 76

Computers Where Package Build is in Progress This report shows the computers which are building personality packages within a specified period of time.

Package Contents Package Group Status This report shows the status of personality packages in all or a specific package group.

Package Groups Created This report shows all the package groups that have been created along with number of packages in each group.

Packages Built by PC Transplant Standalone This report shows all the packages that have been built by PC Transplant standalone on a specific computer.

Deploy Personality Reports Computers Where Package Deploy has Failed

Computers Where Package Deploy has Succeeded

Computers Where Package Deployment is in Progress This report shows the computers on which deployment of personality packages is in progress.

Package Contents Package Group Status This report shows the status of personality packages in all or a specific package group.

Package Groups Deployed This report shows all the package groups that have been deployed along with number of packages in each group.

Packages Deployed by PC Transplant Standalone This report shows all the packages that have been deployed on specific a computer by PC Transplant standalone.

Migrate Personality Reports Computers Where Migration has Failed This report shows the computers which have experienced a failure during migration within a specified period of time.

Computers Where Migration has Succeeded This report shows the computers which have completed migration successfully within a specified period of time.Computers Where Migration is in Progress This report shows the computers which are performing migration within a specified period of time.

Migration Contents Real-time Migration by PC Transplant Standalone This report shows all the real time migrations on specific computers by PC Transplant standalone.

Software Delivery (Windows)Application InventoryComputers With Selected Application Installed Displays all the Computers on which the selected Application is installed.Computers With Selected Application Uninstalled Displays all the Computers on which the selected Application was uninstalled.Installed Applications Status by Computer Displays the Applications installed on selected Computer.Uninstalled Applications Status by Computer Displays the Applications uninstalled from selected Computer.

Audit InformationDeleted Packages by User Displays the deleted packages by username.Deleted Programs by User Displays the deleted programs by username.Deleted Tasks by User Displays the deleted tasks by username.Modified Packages by User Displays the modified packages by username.Modified Programs by User Displays the modified programs by username.Modified Tasks by User Displays the modified tasks by username.New Packages by User Displays the new packages by username.New Programs by User Displays the new programs by username.New Tasks by User Displays the new tasks by username.

Client Package Download Package Download - Checkpoint Recovery Reports package download that required checkpoint recovery. Reports at what point (byte offset) the recovery starts.

Package Download - Errors

Package Download - In Progress

Package Download - Last 'N' Completed Lists the last n package download sessions that have completed. Use this report to track recent activity.Package Download - Last 'N' Events Lists the last n package download events. This report can be help debugging.

Package Download - Last 'N' Started Package download - Summary Lists package downloads that occurred. Calculates the duration and the transfer rate. Package Download due to Source Update Lists packages that had to be downloaded again because the package source was updated.

Client Program Execution Execution - All Lists all program execution regardless of status.Execution - Failed Lists program execution that resulted in failure code, i.e., not 0.

Execution - Nothing Reported Execution - Success Lists all successful program execution.First Execution Lists the first program execution regardless of status.Last Execution Lists the last program execution regardless of status.Next Execution - Late Lists the next program execution if it overdue by more than n minutes.

Client Software Delivery Task Status Software Delivery - Summary

Software Delivery Task - Summary

Software Delivery Task Download - Summary Lists Software Delivery Task summary status. Use this report to review the state transitions for a software delivery task.

This report shows the contents of personality packages built on a specific computer within a specified period of time. Specifically, the report details which applications and users the package has settings for.

This report shows the computers in all or specific package groups which have experienced a failure in deploying a personality package within a specified period of time.This report shows the computers in all or specific package groups on which a personality package has been deployed successfully within a specified period of time.

This report shows the contents of personality packages deployed on a specific computer within the specific period of time. Specifically, the report details which users were migrated.

This report shows the contents of migration done within a specified period of time on a specific computer. Specifically, the report details which applications and users were migrated.

Lists package download errors (wrong platform, insufficient space, and so forth). Use this report to identify Computers with communication errors.

Lists package download sessions that are still in progress or have been abandoned. Calculates the delta time since the download session was started. Specify a large 'Delta Time' threshold to find abandoned sessions.

Lists the last n package download sessions started (regardless of whether the download has completed). Use this report to track recent activity.

Lists the software delivery task that were never executed. NOTE: This report does not check whether the package was downloaded.

Counts Software Delivery Tasks, packages, programs, collections (participating in software delivery task). Use this report to get an overview of all of the definitions.

Lists software delivery task summary including status of the software delivery task, package download and program execution (success and failed). Use this report to review progress of the software delivery task. NOTE: The # Download will be zero if the package has no files. The # Success and #Failed is an aggregate count. For example, if the program execution failed and then succeeded during a second attempt both counts will be reflected.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 46 of 76

Software Delivery Task Execution - Summary

Software Delivery Task Status - History

Software Delivery Task Status - List

Software Delivery Task Status - Summary

Software Delivery Task Summary - All Activity Packages/Programs Packages - All Packages - Deleted This report lists packages that have been deleted.

Packages with no Software Delivery Task associated Programs - All Displays all programs. There is no drill-down for this report.

Software Delivery Task Definitions Software Delivery Task - Active

Software Delivery Task - Deleted

Software Delivery Task - Expired

Software Delivery Task - Mandatory

Software Delivery Task - No Expiration Date

Software Delivery Task - Optional Software Portal Request Activity Summary Displays the summary of the requests activity.Software Requests by Machine Displays software requests by computer.Software Requests by User Displays software requests by username.

Lists software delivery task execution summary including status of the program execution (success and failed and last execution success). Use this report to review progress of the software delivery task. NOTE: The # Download will be zero if the package has no files. The # Success and # Failed is an aggregate count. For example, if the program execution failed and then succeeded during a second attempt, both counts will be reflected.Lists Software Delivery Task status (Active, Inactive, Expired) history in chronological order. Use this report to understand the software delivery task status transitions for the clients.Lists Software Delivery Task status (Active, Inactive, Expired). Use this report to understand the current software delivery task status for the clients.Lists Software Delivery Task summary status (Active, Inactive, Expired) count. Use this report to get count of the software delivery task status.Lists Software Delivery Task summary including all activity. In this case the counts are cumulative over time. Use this report to review all of the activities associated with the software delivery task.

This report displays all of the packages. You can drill-down to view the list of advertised programs that depend on a package.

This report lists packages with no [active] Software Delivery Task. NOTE: The package will be included in the list if the Software Delivery Task has expired. This report helps you find unused (dead) packages.

This report lists Software Delivery Tasks that are active, i.e., visible to end-users. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists Software Delivery Task that have been deleted. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists Software Delivery Tasks that have been expired, i.e., no longer visible to end-users. After some days the associated package files will be deleted. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists mandatory Software Delivery Tasks that have a start date. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists Software Delivery Tasks that have no expiration date. You can drill-down to view the list of advertised programs for a Software Delivery Task.This report lists optional Software Delivery Tasks that have no start date. You can drill-down to view the list of advertised programs for a Software Delivery Task.

Altiris Web Reports 6.0

Prepared by [email protected] April 16, 2004 Page 47 of 76

This query lists the products and counts the reports associated with each product

18266252394914

3301458471017

163141

352419

28

106

847

Query information provided by John E

        Select p.[Name],count(r.[Name]) from vReport r, vProduct p where r.[ProductGuid]= p.[Guid] group by p.[Name]

    Alert Manager    Altiris Deployment Solution    Altiris Software Delivery Solution    Application Management Solution    Application Metering Solution Configuration    Asset Control Solution    Carbon Copy    Connector for Wise    Contract Management Solution    Directory Connector    Helpdesk Solution    Inventory Solution for Macintosh    Inventory Solution for Palm    Inventory Solution for Pocket PC    Inventory Solution for Windows    Notification Server                                         Patch Management                                         Recovery Solution 6.0                                    Resource Management                                     SNMP Management                                         Software Management                                     Total Cost of Ownership Solution                     Web Administrator for Windows                    

No. WMI Class Property Example Value Dell_Battery BatteryStatus 3

Dell_Battery Chemistry 6

Dell_Battery DesignCapacity 47730

Dell_Battery DesignVoltage 11100

Dell_Battery EstimatedChargeRemaining

Dell_Battery EstimatedRunTime 117

Dell_Battery FullChargeCapacity 45450

Dell_Battery ManufactureDate

Dell_Battery Manufacturer SonyDell_Battery MaximumError 15

Dell_Battery Name DELL 0000R16

Dell_Battery RemainingCapacity 25840

Dell_Battery SerialNumber 41173Dell_Battery SmartBattery 1

VersionDell_Battery Status OK

1.     

2.     

3.     

4.     

5.      56 (percentage remaining)

6.     

7.     

8.      12/01/2003 6:00:00 P GMT -

06:009.     10.  

11.  

12.  

13.  14.  

15.  

Dell_Battery Status OK

Dell_BIOSElement BuildNumber A13Dell_BIOSElement CurrentLanguage en|US|iso8859-1

Dell_BIOSElement LoadedEnding 1048575Address

Dell_BIOSElement LoadedStarting 983040Address

Dell_BIOSElement PrimaryBIOS 1Dell_BIOSElement ReleaseDate

Dell_BIOSElement ROMSize 512Dell_BIOSElement SoftwareElement 3

State

Dell_BootDevice BootOrder 2Sequence

15.  

16.  17.  

18.  

19.  

20.  21.   7/09/2004

12:00:00 AM GMT -05:00

22.  23.  

24.  

BootOrder 2

Dell_BootDevice BootDeviceName DisketteDriveSequenceDell_CacheMemory Level 4

Dell_CacheMemory MaxCacheSize 1024

Dell_CacheMemory Associativity 1

Dell_Chassis BootupState 3

Dell_Chassis LockPresent 0Dell_Chassis BreachDescription

Dell_Chassis PowerState 3

Dell_Chassis SecurityBreach 3

Dell_Chassis ThermalState 3

Dell_Configuration EnableDisableBIS 4

Dell_Configuration ForcePXEonNext 2Boot

Dell_Configuration GlobalStatus 3

Dell_Configuration HDDMinimum 0Capacity

Dell_Configuration HDDPercentage 10Threshold

Dell_Configuration KeyboardError 2

ReportingDell_Configuration Management 2

ApplicationDell_Configuration 7

24.  

(each instance of this class represents a single boot device and what it’s order is)

25.  

26.  

27.  

28.  

29.  

30.  31.   No security

breach Detected

32.  

33.  

34.  

35.  

36.  

37.  

38.  

39.  

40.  

41.  

42.   MaximumPasswordLength

Dell_Configuration Password <empty>

Dell_Configuration 2

Dell_Configuration Password 4Verification

Dell_Configuration RestartSystem 5

Dell_Configuration SMBIOSSupported 1

Dell_Configuration VGADACSnoop 2

Dell_DeviceBay DeviceBayType 3

Dell_DeviceBay DeviceCurrent CDRW+DVDAttached

Dell_DeviceBay DeviceSupported

Dell_DiskDrive BytesPerSector 512

Dell_DiskDrive Caption Disk DriveDell_DiskDrive DeviceID

Dell_DiskDrive InterfaceDescription IDE

Dell_DiskDrive MediaType

Dell_DiskDrive Model

Dell_DiskDrive Partitions 1Dell_DiskDrive PhysicalCylinders 4864Dell_DiskDrive PhysicalHeads 255Dell_DiskDrive PhysicalSectorsPer 63

TrackDell_DiskDrive Status OK

43.  

44.   PasswordStatusLockUnlock

45.  

46.  

47.  

48.  

49.  

50.  

51.   Floppy, Battery, CD-ROM, CD-RW, Hard Disk, DVD

52.  

53.  54.   \\.\

PHYSICALDRIVE055.  

56.   Fixed hard disk media

57.   HTS548040M9AT00

58.  59.  60.  61.  

62.  

Dell_DiskDrive TotalPhysicalSize 40007761920

Dell_DiskDrive TotalSectors 78140160

Dell_DiskDrive TotalTracks 1240320

Dell_DiskDrive TracksPerCylinder 255

Dell_DMA Availability 4

Dell_DMA ByteMode 2

Dell_DMA ChannelTiming 2

Dell_DMA DMAChannel 4Dell_DMA TypeCTiming 2

Dell_DMA WordMode 2

ACLineStatus 4

DockingStatus 4

Dell_Fan ActiveCooling 1

Dell_Fan CoolingDeviceType 3

Dell_Fan DeviceID 0

Dell_Fan VariableSpeed 1Dell_FlatPanel Brightness 100

Dell_FlatPanel Builtin 3

Dell_FlatPanel DisplayType 3

Dell_FlatPanel Horizontal 1024Resolution

Dell_FlatPanel ScanMode 2

63.  

64.  

65.  

66.  

67.  

68.  

69.  

70.  71.  

72.  

73.   Dell_DynamicStates

74.   Dell_DynamicStates

75.  

76.  

77.  

78.  79.  

80.  

81.  

82.  

83.  

Dell_FlatPanel VerticalResolution 768Dell_HardDiskDrive No Instances AvailableSequence

AlarmResume 2

Settings Brightness 7

SettingsAutoSuspendTime <empty>

Settings OutPowerManagement 5

Settings CapabilitiesPowerManagement 2

Settings EnableReducedCPUClock 2

Settings SpeedRingEventResume 2

SettingsDell_Indication Name Dell.OMCI.Events.

Configuration CurrentProbe

Dell_Indication PollEnabled 1Configuration

84.  85.  

86.   Dell_PowerManagement

87.   Dell_PowerManagement

88.   Dell_PowerManagement

89.   Dell_PowerManagement

90.   Dell_PowerManagement

91.   Dell_PowerManagement

92.   Dell_PowerManagement

93.  

94.  

Dell_Indication PollingInterval 60000ConfigurationDell_Indication StartDelay 183000Configuration

DeviceID 0

EnableState 4

LimitSpeedEnable 2

ProtocolSupported 1

SpeedLimit 1

KeyboardClick 3

Dell_IRQ Description IRQ 9

Dell_IRQ Availability 2

Dell_IRQ TriggerLevel 2

Dell_IRQ TriggerType 2

CodeSet 1252

CountryCode 1

FreePhysical 1703072MemoryFreeSpaceInPaging 3818920FilesFreeVirtualMemory 5521992

95.  

96.  

97.   Dell_InfraredController

98.   Dell_InfraredController

99.   Dell_InfraredController

100.   

Dell_InfraredController

101.   

Dell_InfraredController

102.   

Dell_InternalSpeakerSettings

103.   104.   105.   

106.   

107.   

Dell_OperatingSystem

108.   

Dell_OperatingSystem

109.   

Dell_OperatingSystem

110.   

Dell_OperatingSystem

111.   

Dell_OperatingSystem

Installdate

LastBootUpTime

LocalDateTime

Locale 409

MaxNumberOf 4294967295ProcessesMaxProcessMemorySize 2097024

NumberOfProcesses 41

OSLanguage 1033

Status OK

SerialNumber

TotalVirtualMemorySize 6135320

TotalVisibleMemorySize 2096360

Dell_Options No meaningful

BaseIOAddress 0

DMASupport 1

112.   

Dell_OperatingSystem

7/29/2004 10:52:32 PM GMT

-05:00113.   

Dell_OperatingSystem

8/26/2004 6:10:47 PM GMT -

05:00114.   

Dell_OperatingSystem

8/26/2004 7:08:13 PM GMT -

05:00115.   

Dell_OperatingSystem

116.   

Dell_OperatingSystem

117.   

Dell_OperatingSystem

118.   

Dell_OperatingSystem

119.   

Dell_OperatingSystem

120.   

Dell_OperatingSystem

121.   

Dell_OperatingSystem

55274-640-0854452-23438

122.   

Dell_OperatingSystem

123.   

Dell_OperatingSystem

124.   

How many classes have

meaningful data upon OMCI installation?

125.   

Dell_ParallelController

126.   

Dell_ParallelController

IRQUsed 0

Pinout 4

Security 5

Type 3

Dell_Processor CPUStatus 1

Dell_Processor CurrentClockSpeed 600

Dell_Processor MaxClockSpeed 1700

Dell_Processor Stepping 5

Dell_Processor Version

Capacity 1073741824

DataWidth 64

DeviceLocator DIMM_A

FormFactor 8

PositionInRow 1

Location 3

ArrayMemoryDevice 2

Array SocketsUse 3

ArrayDeviceID

127.   

Dell_ParallelController

128.   

Dell_ParallelController

129.   

Dell_ParallelController

130.   

Dell_ParallelController

131.   132.   133.   134.   135.   

Model 9 Stepping 5

136.   

Dell_PhysicalMemory

137.   

Dell_PhysicalMemory

138.   

Dell_PhysicalMemory

139.   

Dell_PhysicalMemory

140.   

Dell_PhysicalMemory

141.   

Dell_PhysicalMemory

142.   

Dell_PhysicalMemory

143.   

Dell_PhysicalMemory

144.   

Dell_PointingDevice

ACPI\PNP0F13\4&61F3

B4B&0

HardwareType Alps Touch Pad

Manufacturer Alps Electric

Name Alps Touch Pad

NumberOfButtons 2

PointingInterface 1

PointingType 2

Status OK

IRQUsed 4

MaxBaudRate 1152

Security 5

SerialPort 6Capabilities

Dell_SMARTDRIVE FirmwareRevision MG2OA53A

Dell_SMARTDRIVE ModelNumber

Dell_SMARTDRIVE SerialNumber

Dell_SMARTDRIVE Status OK

AudioMode 2

AutoOn 3

AutoOnHour 0

AutoOnMinute 0

145.   

Dell_PointingDevice

146.   

Dell_PointingDevice

147.   

Dell_PointingDevice

148.   

Dell_PointingDevice

149.   

Dell_PointingDevice

150.   

Dell_PointingDevice

151.   

Dell_PointingDevice

152.   

Dell_SerialController

153.   

Dell_SerialController

154.   

Dell_SerialController

155.   

Dell_SerialController

156.   157.   

HTS548040M9AT00

158.   

MRL221L2GMUZ5B

159.   160.   

Dell_SMBIOSSettings

161.   

Dell_SMBIOSSettings

162.   

Dell_SMBIOSSettings

163.   

Dell_SMBIOSSettings

BootSequence 2

BuiltinFloppy 2

BuiltinNIC 3

BuiltinPointing 2DeviceChassisIntrusion 5

ChassisIntrusion 4StatusHyperthreading 2

IDEController 3

IntegratedAudio 2

Onboard1394 2

ParallelPort 4ConfigurationParallelPortMode 5

PCISlots 2

PowerManagement 2SettingsSerialPort1 5ConfigurationSerialPort2 2ConfigurationSpeakerVolume 2

USBEmulation 4

USBPorts 2

164.   

Dell_SMBIOSSettings

165.   

Dell_SMBIOSSettings

166.   

Dell_SMBIOSSettings

167.   

Dell_SMBIOSSettings

168.   

Dell_SMBIOSSettings

169.   

Dell_SMBIOSSettings

170.   

Dell_SMBIOSSettings

171.   

Dell_SMBIOSSettings

172.   

Dell_SMBIOSSettings

173.   

Dell_SMBIOSSettings

174.   

Dell_SMBIOSSettings

175.   

Dell_SMBIOSSettings

176.   

Dell_SMBIOSSettings

177.   

Dell_SMBIOSSettings

178.   

Dell_SMBIOSSettings

179.   

Dell_SMBIOSSettings

180.   

Dell_SMBIOSSettings

181.   

Dell_SMBIOSSettings

182.   

Dell_SMBIOSSettings

WakeupOnLAN 3

WakeupOnLAN 3MethodBIOSDate

BIOSVersion A13

Name ali-se2-02398

OperatingSystem 10

PowerManagement 1SupportedProcessorSpeed 600

ServiceTag 6GKDW31

Status OK

SystemClass 6

SystemDescription Latitude D600

Dell_System Version 7, 1, 382, 0

183.   

Dell_SMBIOSSettings

184.   

Dell_SMBIOSSettings

185.   

Dell_SystemSummary

7/9/2004 12:00:00 AM GMT

-05:00186.   

Dell_SystemSummary

187.   

Dell_SystemSummary

188.   

Dell_SystemSummary

189.   

Dell_SystemSummary

190.   

Dell_SystemSummary

191.   

Dell_SystemSummary

192.   

Dell_SystemSummary

193.   

Dell_SystemSummary

194.   

Dell_SystemSummary

195.    ManagementSoftw

are

Dell_System BuildNumber 382

Accuracy 32768

BaseUnits 2

Caption

CurrentReading 360

Description

Location Processor

LowerThreshold 0CriticalMaxReadable 1270

MinReadable 0

Resolution 1000

SensorType 2

Tolerance 5

196.    ManagementSoftw

are197.   

Dell_TemperatureSensor

198.   

Dell_TemperatureSensor

199.   

Dell_TemperatureSensor

Temperature Probe

200.   

Dell_TemperatureSensor

201.   

Dell_TemperatureSensor

CPU Internal Temperature

202.   

Dell_TemperatureSensor

203.   

Dell_TemperatureSensor

204.   

Dell_TemperatureSensor

205.   

Dell_TemperatureSensor

206.   

Dell_TemperatureSensor

207.   

Dell_TemperatureSensor

208.   

Dell_TemperatureSensor

UpperThreshold 1020Critical

Dell_USBController DeviceID

Dell_USBController Description

Adapter Compatibility

AdapterDACType

AdapterRAM 33554432

Caption

CurrentBitsPerPixel 32

CurrentHorizontal 1024ResolutionCurrentRefreshRate 60

CurrentScanMode 4

CurrentVertical 768ResolutionDescription

DriverDate

DriverVersion 6.14.10.6458

VideoArchitecture 5

VideoMemoryType 2

VideoModeDescription

209.   

Dell_TemperatureSensor

210.   

PCI\VEN_8086&DE_

24C2&SUBSYS_45418086&REV

_01\3&61AAA01&0&E8

211.   

Intel(R) 82801DB/DBM USB Universal

Host Controller - 24C2

212.   

Dell_Video Controller

ATI Technologies Inc.

213.   

Dell_Video Controller

Internal DAC(400MHz)

214.   

Dell_Video Controller

215.   

Dell_Video Controller

MOBILITY RADEON 9000

216.   

Dell_Video Controller

217.   

Dell_Video Controller

218.   

Dell_Video Controller

219.   

Dell_Video Controller

220.   

Dell_Video Controller

221.   

Dell_Video Controller

MOBILITY RADEON 9000

222.   

Dell_Video Controller

6/10/2004 10:57:04 PM GMT

-05:00223.   

Dell_Video Controller

224.   

Dell_Video Controller

225.   

Dell_Video Controller

226.   

Dell_Video Controller

1024 x 768 x 4294967296

colors

An estimate of the percentage of full charge remaining.

The battery manufacture date.

The name of the company that manufactured the battery.

The serial number for this battery.

Description of the Battery's charge status. The value, 10, is not valid in the CIM Schema since in DMI it represents that no battery is installed. In this case, this object should not be instantiated. (1=Other, 2=Unknown, 3=Fully charged, 4=Low, 5=Critical, 6=Charging, 7=Charging and high, 8=Charging and low, 9=Charging and critical, 10=Undefined, 11=Partially charged)

An enumeration that describes the Battery's chemistry. (1=Other, 2=Unknown, 3=Lead Acid, 4=Nickel Cadmium, 5=Nickel Metal Hydride, 6=Lithium ion, 7=Zinc air, 8=Lithium Polymer)The design capacity of the battery in mWatt-hours. If this property is not supported, enter 0.The design voltage of the battery in mVolts. If this attribute is not supported, enter 0.

EstimatedRunTime is an estimate in minutes of the time to battery charge depletion under the present load conditions if the utility power is off, or lost and remains off, or a Laptop is disconnected from a power source.The full charge capacity of the battery in mWatt-hours. Comparison of this value to the Battery DesignCapacity determines when the Battery requires replacement.A Battery's end of life is typically when the FullChargeCapacity falls below 80% of the DesignCapacity. If this property is not supported, enter 0.

The maximum error (as a percentage) in the Watt-hour data reported by the battery. The maximum error indicates the upper bound on how much additional energy the battery may have above the energy it reports having. When this value exceeds some value, for instance, 10%, some action must be taken (for instance, fully discharge then fully charge the battery) within some specified time (for instance, within two recharge cycles of the battery). If the action is not taken within the time frame, the error value will continue to rise. If this property is not supported, value = -1

The Name property defines the label by which the object is known. When subclassed, the Name property can be overridden to be a Key property.The battery's remaining capacity in mWatt-hours. This value is used with Design Capacity or Full Charge Capacity to calculate fuel gauge information.If this property is not supported, value = -1.

The Smart Battery Data Specification version number supported by this Battery. If the Battery does not support this function, the value should be left blank.A string indicating the current status of the object. Various operational and non-operational statuses are defined. Operational statuses are "OK", "Degraded", "Stressed" and "Pred Fail". "Stressed" indicates that the Element is functioning, but needs attention. Examples of "Stressed" states are overload, overheated, etc. The condition "Pred Fail" (failure predicted) indicates that an Element is functioning properly but predicting a failure in the near future. An example is a SMART-enabled hard drive.

The internal identifier for this compilation of this software element.

The ending physical address for the memory which the BIOS occupies.

The starting physical address for the memory which the BIOS occupies.

If true, this is the primary BIOS of the ComputerSystem.Date that this BIOS was released.

The physical size of this BIOS ROM device in kilobytes.

Non-operational statuses can also be specified. These are "Error", "NonRecover", "Starting", "Stopping","Stopped", "Service", "No Contact" and "Lost Comm". "NonRecover" indicates that a non-recoverable error has occurred. "Service" describes an Element being configured, maintained, cleaned, or otherwise administered. This status could apply during mirror-resilvering of a disk, reload of a user permissions list, or other administrative task. Not all such work is on-line, yet the Element is neither "OK" nor in one of the other states. "No Contact" indicates that the current instance of the monitoring system has knowledge of this Element but has never been able to establish communications with it. "Lost Comm" indicates that the ManagedSystemElement is known to exist and has been contacted successfully in the past, but is currently unreachable."Stopped" indicates that the ManagedSystemElement is known to exist, it is not operational (i.e. it is unable to provide service to users), but it has not failed. It has purposely been made non-operational. The Element may have never been "OK", the Element may have initiated its own stop, or a management system may have initiated the stop.

The currently selected language for the BIOS. This information can be obtained from SMBIOS, using the Current Language attribute of the Type 13 structure, to index into the string list following the structure. The property is formatted using the ISO 639 Language Name, and may be followed by the ISO 3166 Territory Name and the encoding method.

The SoftwareElementState is defined in this model to identify various states of a software elements life cycle. - A software element in the deployable state describes the details necessary to successfully distribute it and the details (conditions and actions) required to create a software element in the installable state (i.e, the next state).

- A software element in the installable state describes the details necessary to successfully install it and the details (conditions and actions) required to create a software element in the executable state (i.e., the next state).

- A software element in the executable state describes the details necessary to successfully start it and the details (conditions and actions) required to create a software element in the running state (i.e., the next state).

- A software element in the running state describes the details necessary to monitor and operate on a started element. (1=Deployable, 2=Installable, 3=Executable, 4=Running)The order of this device in the boot device priority list.A value of 1 means this device is the first in the list,2 means second, and so on.

The name of this boot device as specified by the BIOS.

The maximum cache size installable to this particular cache memory (in kilobytes).

Boolean indicating whether the Frame is protected with a lock.

(1=Other, 2=Unsupport, 3=Accept,4=Deny,5=Reset)

This property defines the global status of the system.(1=Other, 2=Unknown, 3=OK, 4=Non-critical, 5=Critical, 6=Non-recoverable)

(1=Other, 2=Unsupported, 3=Enabled, 4=Disabled)

The order of this device in the boot device priority list.A value of 1 means this device is the first in the list,2 means second, and so on.

Defines whether this is the Primary (value=3), Secondary (value=4) or Tertiary (value=5) Cache. Also, "Other" (1), "Unknown" (2) and "Not Applicable" (6) can be defined.

An integer enumeration defining the system cache associativity. For example, 6 indicates a fully associative cache. (1=Other, 2=Unknown, 3=Direct mapped, 4=2-way Set Associative, 5=4-way Set Associative, 6=Fully Associative)

The current state of this system when it booted. (1=Other, 2=Unknown, 3=OK, 4=Warning, 5=Critical, 6=Non-recoverable)

BreachDescription is a free-form string providing more information if the SecurityBreach property indicates that a breach or some other security-related event occurred.The current state of the power supply or battery(s) for this system. (1=Other, 2=OK, 3=Warning, 4=Critical, 5=Non-recoverable)SecurityBreach is an enumerated, integer-valued property indicating whether a physical breach of the Frame was attempted but unsuccessful (value=4) or attempted and successful (5). Also, the values, 1=Other, 2=Unknown, 3=No Breach

The current thermal state of this Container. (1=Other, 2=Uknown, 3=Warning, 4=Critical, 5=Non-recoverable)This property allows the enabling/disabling of the Boot Integrity Services (BIS) in BIOS.'Unsupported' means that this system BIOS does not support BIS.

This attribute allows the enabling/disabling of Force PXE on next boot in BIOS.'Unsupported' means that this system BIOS does not support Force PXE on next boot. (1=Other, 2=Unsupported, 3=Enabled, 4=Disabled)

This property defines the minimum size a HDD must have to be subject to low freespace alerting.The value is given in MB.This property defines the threshold value for a HDD size below which an alert should be generated.The value is given in MB.This attribute allows the enabling/disabling of Keyboard Error Reporting in BIOS.'Unsupported' means that this system BIOS does not support Keyboard Error Reporting.

This property describes the management applications installed on this system. 1 means OMCA is installed, 5 means OMCA and SMS Client are installed, 2 means OMC is installed and 6 means OMC and SMS Client are installed.This property indicates the maximum length of the Administrator password, which corresponds to the BIOS setup password.

(1=Other, 2=Unsupported, 3=Enabled, 4=Disabled)

Defines the name of the device currently attached to this bay

An address or other identifying information to uniquely name the LogicalDevice.

A longer description of the mass storage interface.For example, SCSI2 fast wide.

The MediaType property is the type of media used or accessed by this device.

The Model property indicates the manufacturer's model number of the disk drive.

The number of partitions on this storage unit.The number of reported physical cylinders on this device.The number of reported physical heads for this device.The number of reported physical sectors per track for this device.

This property allows Open Manage to keep track of the system password for verification purposes.Users need not view or change this property.Only the network administrator should change the system password.

This attribute allows the locking/unlocking of the Password Status in BIOS.'Unsupported' means that this system BIOS does not support locking/unlocking of the Password Status. (1=Other, 2=Unsupported, 3=Locked, 4=Unlocked)

This property indicates the result of the last password verification operation executed by the system.A verification occurs each time Dell OpenManage prompts the user to enter a password. (1=Password not matched, 2=Password matched, This property allows administrators to restart or shutdown the system. (1=Other, 2=Unknown, 3=Restart, 4=Shutdown, 5=Both shutdown and restart are supported, 6=Only restart is supported)This property defines whether this system supports the Dell SMBIOS implementation. (1=False, 2=True, 3=Unknown)This attribute allows the enabling/disabling of VGA DAC Snoop in BIOS.'Unsupported' means that this system BIOS does not support VGA DAC Snoop.

Defines the type of Device Bay. Examples of Proprietary Bay are: Swappable Bay, Multi-Function Bay and Media Bay Types (1=Other, 2=Unknown, 3=Properietary Bay, 4=Standard Desktop Device Bay, 5=Standard Mobile Device Bay, 6=Standard Ultra Mobile Device Bay)

Defines a string containing a list of devices supported in this bay separated by commas.

The BytesPerSector property indicates the number of bytes in each sector for the physical disk drive.

A string indicating the current status of the object. Various operational and non-operational statuses are defined. Operational statuses are "OK", "Degraded", "Stressed" and "Pred Fail". "Stressed" indicates that the Element is functioning, but needs attention. Examples of "Stressed" states are overload, overheated, etc. The condition "Pred Fail" (failure predicted) indicates that an Element is functioning properly but predicting a failure in the near future.

The total size in kilobytes (1024 bytes) of this device that is available to users

A part of the object's key value, the DMA Channel number.

An address or other identifying information to uniquely name the LogicalDevice.

Indication of whether the fan supports variable speeds.

FlatPanel's horizontal resolution in Pixels.

A FlatPanel's scan mode. (1=Unknown, 2=Other, 3=Single, 4=Dual)

The TotalSectors property indicates the total number of sectors on the physical disk drive.Note: the value for this property is obtained through extended functions of BIOS interrupt 13h. The value may be inaccurate if the drive uses a translation scheme to support high capacity disk sizes. Consult the manufacturer for accurate drive specifications.The TotalTracks property indicates the total number of tracks on the physical disk drive. Note: the value for this property is obtained through extended functions of BIOS interrupt 13h. The value may be inaccurate if the drive uses a translation scheme to support high capacity disk sizes. Consult the manufacturer for accurate drive specifications.The TracksPerCylinder property indicates the number of tracks in each cylinder on the physical disk drive. Note: the value for this property is obtained through extended functions of BIOS interrupt 13h. The value may be inaccurate if the drive uses a translation scheme to support high capacity disk sizes. Consult the manufacturer for accurate drive specifications.

Availability of the DMA. (1=Other, 2=Unknown, 3=Available, 4=In Use/Not Available, 5=In Use and Available/ShareableIndicates whether DMA may execute in 'count by byte' mode (value=4) or not (value=3).Also, "Other" (1) and "Unknown" (2) may be defined.DMA channel timing.For example, "Type A" (value =4) or "Type F" (6) could be specified.

Indicates whether C type (burst) timing is supported (value=5) or not (value=4). Also, "Other" (1), "Unknown" (2) and "ISA Compatible" (3) are defined.

Indicates whether DMA may execute in 'count by word' mode (value=4) or not (value=3).Also, "Other" (1) and "Unknown" (2) may be defined.This property defines status information about the AC line in the notebook (1=Other, 2=Unknown, 3=Off-line, 4=On-line, 5=On Backup Power)

Defines whether system is docked or not (1=Other, 2=Unknown, 3=Docked, 4=Not Docked)ActiveCooling is a boolean indicating that the CoolingDevice provides active (as opposed to passive) cooling.The type of Cooling Device that this is e.g. Fan, Heat Pipe, etc. (1=Other, 2=Unknown, 3=Fan, 4= Centrifugal Blower, 5=Chip Fan, 6= Cabinet Fan, 7= Power Supply Fan, 8= Heat Pipe, 9= Integrated Refrigeration, 10=Active Cooling, 11=Passive Cooling

The percentage (0-100) of total brightness of the video output device. If feature not available, value = 0x80000000Defines whether the video output device is built in (1=Other, 2=Unknown, 3=Yes, 4=No)An integer enumeration describing the type of flat panel display. (1=Other, 2=Unknown, 3=Passive Matrix LCD, 4=Active Matrix LCD, 5= Cholesteric LCD, 6= Field Emission Display, 7= Electro Luminescent Display, 8= Gas Plasma, 9=LED)

FlatPanel's vertical resolution in Pixels.

Enables/Disables Power Management.(1=Disabled, 2=Enabled, 3=Unsupported)

Dell.OMCI.Events.CurrentProbeDell.OMCI.Events.DiskCapacityDell.OMCI.Events.ChassisIntrusionDell.OMCI.Events.DiskSizeDecreasedDell.OMCI.Events.DiskSizeIncreasedDell.OMCI.Events.EccMemoryDell.OMCI.Events.NumberOfProcessorsDecreasedDell.OMCI.Events.MemorySizeIncreasedDell.OMCI.Events.MemorySizeDecreasedDell.OMCI.Events.NumberOfProcessorsIncreasedDell.OMCI.Events.NumberOfDisksDecreasedDell.OMCI.Events.NumberOfDisksIncreasedDell.OMCI.Events.FanProbeDell.OMCI.Events.VoltageProbeDell.OMCI.Events.TemperatureProbeTrue or False

Enables system to resume operation from suspend/standby mode at a time determined by an application program. (1=Other, 2=Unknown, 3=Enabled, 4=Disabled)The brightness that will be used for the system power management.There is a setting for Battery and a setting for AC, to allow the user some control over the amount of power being used for display.There are 8 settings from dimmest to brightest.Determines how long the computer is inactive before it enters suspend mode. (1=Disabled, 2=1 minute, 3=2minutes, 4=3 minutes, 5=4 minutes, 6=5 minutes, 7=10 minutes, 8=15 minutes, 9=30 minutes, 10= 1 hour)Defines what type of Power Management this system supports (1=Other, 2=Unkown, 3=APM 1.1, 4=APM 1.2, 5=ACPI 1.0)

Defines whether to enable CPU to slow down when possible (1=Other, 2=Unknown, 3=Enabled, 4=Disabled)

Enables system to resume operation when a modem ring occurs on a serial port or a wakeup occurs on a PC Card (1=Other, 2=Unknown, 3=Enabled, 4=Disabled)

An instance of this class is created for each hardware device to be monitored. These values can be retrieved to report on what metrics are being monitored for a system and their polling configuration. Events include:

The polling interval for event source, in seconds.

The start delay before polling the event source, in seconds.

Consult List

Defines connection speed limit of the IR port, in bits per second.

1=Unsupported, 2=Enabled, 3=Disabled

Number of Kbytes of physical memory currently unused and available.

Defines whether IR is enabled or disabled (1=Other, 2=Unknow, 3=Enabled, 4=Disabled)Defines whether IR speed is limited or not. (1=Other, 2=Unknow, 3=Enabled, 4=Disabled)The protocol used by the Controller to access 'controlled' Devices.(1=Other, 2=Unknown, 3=EISA, 4=ISA, 5=PCI, 6=ATA/ATAPI, 7= Flexible Diskette, 8=1496,

ESDI, 2=IDE, 3=CMD, 4=ST506, 5=DSSI, 6=QIC2, 7=Enhanced ATA/IDE, 8=AGP, 9=TWIRP (two-way infrared), 10=FIR (fast infrared), 11=SIR (serial infrared), 12=IrBus

A instance of this class exists for each interrupt request on the system. Looping through all instances will list all current IRQ settingsAvailability of the IRQ. (1=Other, 2=Unknown, 3=Available, 4=In Use/Not Available, 5=In Use and Available/Shareable)IRQ trigger level indicating whether the interrupt is triggered by the hardware signal going high (1=Other, 2=Unknown, 3=Active Low, 4=Active High)

IRQ trigger type indicating whether edge (value=4) or level triggered (value=3) interrupts occur. Also, "Other" (1) and "Unknown" (2) may be defined. (1=Other, 2=Unknown, 3=Level, 4=Edge)The CodeSet property indicates the code page value used by the operating system. A code page contains a character table used by the operating system to translate strings for different languages. The American National Standards Institute (ANSI) lists values that represent defined code pages. If the operating system does not use an ANSI code page, this member will be set to 0. The CodeSet string can use up to six characters to define the code page value.

The CountryCode property indicates the code for the country/region used by the operating system. Values are based on international phone dialing prefixes (also referred to as IBM country/region codes). The CountryCode string can use up to six characters to define the country/region code value.

The total number of KBytes that can be mapped into the OperatingSystem's paging files without causing any other pages to be swapped out. 0 indicates that there are no paging files.Number of Kbytes of virtual memory currently unused and available. For example, this may be calculated by adding the amount of free RAM to the amount of free paging space (ie, adding the properties, FreePhysicalMemory and FreeSpaceInPagingFiles).

Time when the OperatingSystem was last booted.

OperatingSystem's notion of the local date and time of day.

Number of process contexts currently loaded or running

Base I/O address for this parallel port.

Set to true if the ParallelController supports DMA.

A datetime value indicating when the object was installed. A lack of a value does not indicate that the object is not installed.

The Locale property indicates the language identifier used by the operating system. A language identifier is a standard international numeric abbreviation for a country or region. Each language has a unique language identifier (LANGID), a 16-bit value that consists of a primary language identifier and a secondary language identifier.

Maximum number of process contexts the OperatingSystem can support. If there is no fixed maximum, the value should be 0.On systems that have a fixed maximum, this object can help diagnose failures that occur when the maximum is reached.Maximum number of Kbytes of memory that can be allocated to a Process. For Operating Systems with no virtual memory, this value is typically equal to the total amount of physical Memory minus memory used by the BIOS and OS. For some Operating Systems, this value may be infinity - in which case, 0 should be entered. In other cases, this value could be a constant - for example, 2G or 4G.

The OSLanguage property indicates which language version of the operating system is installed.A string indicating the current status of the object. Various operational and non-operational statuses are defined. Operational statuses are "OK", "Degraded", "Stressed" and "Pred Fail". "Stressed" indicates that the Element is functioning, but needs attention. Examples of "Stressed" states are overload, overheated, etc. The condition "Pred Fail" (failure predicted) indicates that an Element is functioning properly but predicting a failure in the near future.

The SerialNumber property indicatesthe operating system product serial identification number.Number of Kbytes of virtual memory. For example, this may be calculated by adding the amount of total RAM to the amount of paging space (ie, adding the amount of memory in/aggregated by the ComputerSystem to the property, SizeStoredInPagingFiles.The total amount of physical memory (in Kbytes) available to the OperatingSystem. This value does not necessarily indicate the true amount of physical memory, but what is reported to the OperatingSystem as available to it.

IRQ number that is being used by this parallel port.

The current speed (in MHz) of this Processor.

The maximum speed (in MHz) of this Processor.

The version number or string for this processor.

One instance per module. The total capacity of this PhysicalMemory, in bytes.

An address or other identifying information to uniquely name the LogicalDevice.

The pinout used by the I/O device on this parallel port. (1=Other, 2=Unkown, 3=XT/AT, 4=PS/2, 5=IEEE 1284, 6=Proprietary, 7=PC-98, 8= PC-98-Hireso, 9= PC-H98, 10=PC-98Note, 11= PC-98Full)An enumeration indicating the operational security for the Controller. For example, information that the Device's external interface is locked out (value=4) or "Boot Bypass" (value=6) can be described using this property.

(1=Other, 2=Uknown, 3=None, 4= External Interface Locked Out, 5= External Interface Enabled, 6=Boot Bypass)

The connector used to interface with the I/O device on this parallel port. (1=Other, 2=Unknown, 3= DB-25 Female, 4= DB-25 Male, 5= Centronics, 6= Mini-Centronics, 7= Proprietary, 8= Centronics-14, 9= DB-36 Female, 10= Mini-Centronics-20)

1=Unknown, 2=CPU Enabled, 3= CPU Disabled by User via BIOS Setup, 4= CPU Disabled By BIOS (POST Error), 5= CPU Is Idle, 6=Other)

Stepping is a free-form string indicating the revision level of the Processor within the Processor.Family.

Data width of the PhysicalMemory, in bits. A data width of 0 and a TotalWidth of 8 would indicate that the Memory is solely used to provide error correction bits.

A string identifying the physically labeled socket or board position where the memory device is located. E.g. 'SIMM 3' or 'IC12'.The implementation form factor for the Chip (0=Unknown, 1=Other, 2=SIP, 3=DIP, 4=ZIP, 5=SOJ, 6=Proprietary, 7=SIMM, 8=DIMM, 9=TSOP, 10=PGA, etc.)

Specifies the position of the PhysicalMemory in a 'row'. For example, if it takes two 8-bit memory devices to form a 16-bit row, then a value of '2'means that this Memory is the second device. 0 is an invalid value for this property.

The physical location of the Memory Array, whether on the system board or an add-on board. (1=ISA add-on card, 2=EISA add-on card, 3=PCI add-on card, 4=MCA add-on card, 5=PCMCIA add-on card, 6=Proprietary, 7=NuBus, 8= PC-98/C20 add-on card, 9= PC-98/C24 add-on card, 10= PC-98/E add-on card, 11= PC-98/Local bus The MemoryDevices property indicates the number of physical slots or sockets available in this memory array.

What this Memory Array is used for. (1=Reserved, 2=Other, 3=Unknown, 4=System Memory, 5=Video Memory, 6= Flash Memory, 7=Nonvolativel RAM, 8=Cache Memory

IRQ number that is being used by this serial port.

Maximum baud rate in Bits per Second supported by the SerialController.

This defines the hour when to turn on the system (0-23).

This defines the minutes when to turn on the system (0-59).

The HardwareType property indicates the type of hardware type used for the Win32 pointing device. Example: MICROSOFT PS2 MOUSEThe Manufacturer property specifies the name of the manufacturer of this pointing device.

The interface type of this Pointing Device.(1=Other, 2=Unknown, 3=Serial, 4=PS/2, 5=Infrared, 6= HP-HIL, 7= Bus mouse, 8=ADP, 9= Bus mouse DB-9, 10= Bus mouse micro-DIN, 11=USBThe type of the pointing device. 1=Other, 2=Unknown, 3=Mouse, 4=Track ball, 5=Track point, 6=Glide point, 7=Touch pad, 8=Touch Screen, 9=Mouse Optical Sensor)A string indicating the current status of the object. Various operational and non-operational statuses are defined. Operational statuses are "OK", "Degraded", "Stressed" and "Pred Fail". "Stressed" indicates that the Element is functioning, but needs attention. Examples of "Stressed" states are overload, overheated, etc. The condition "Pred Fail" (failure predicted) indicates that an Element is functioning properly but predicting a failure in the near future.

1=Other, 2=Unknown, 3=None, 4= External Interface Locked Out, 5= External Interface Enabled, 6=Boot Bypass1=Other, 2=Unknown, 3=XT/AT compatible, 4=16450 compatible, 5= 16550 compatible, 6=16550A compatible, 7=8251 compatible

Onboard audio mode. Disabled mode completely unassigns the onboard hardware resources. Half duplex mode allows only record or playback. Full duplex mode can record and playback sounds simultaneously 1=Other, 2=Unsupported, 3=Disabled, 4=Half Duplex, 5=Full DuplexThis property defines the auto-on configuration: disabled, every day or weekdays (Monday-Friday). 1=Other, 2=Unsupported, 3=Disabled, 4=Everyday, 5=Weekdays.

1=Other, 2=Unsupported, 3=Off, 4=Low, 5=Medium, 6=High, 7=Enable

This property is now retired. Boot Sequence information can be found underthe class Dell_BootDeviceSequence with OMCI 6.1 This defines the boot sequence for the next system boot. DisketteFirst: diskette, hard drive, IDE CD-ROM, option ROMs (if the devices are available). Hard Disk Only: hard drive then option ROMs (if the devices areavailable). Device List: diskette, IDE CD-ROM, hard drive, option ROMs (if the devices are available), CD-ROM First: IDE CD-ROM, diskette, hard drive,option ROMs (if the devices are available).

This property defines whether the built-in Floppy controller is enabled, auto or read-only. 1=Other, 2=Unsupported, 3=Disabled, 4=Auto, 5=Read Only

This property defines whether the built-in NIC is enabled or disabled. 1=Other, 2=Unsupported, 3=Enabled with Network Boot Agent, 4=Disabled, 5=Enabled

This property defines whether the built-in pointing device(a.k.a. mouse) port is enabled or disabled. 1=Other, 2=Unsupported, 3=Enabled, 4=DisabledEnables the system to detect and report Chassis Intrusion events to the system display on boot-up. 1=Other, 2=Unsupported, 3=Enabled, 4=Disabled, 5=Silent EnabledThis property shows the status of the system with regards to Chassis Intrusion (Detected or Not Detected).A value of Unknown indicates one of two things: either Chassis Intrusion is not supported by this system, or Chassis Intrusion event Enables or Disables hyperthreading on next boot. 1=Other, 2=Unsupported, 3=Disabled, 4=EnabledThis property defines whether the IDE controller is enabled or disabled. 1=Other, 2=Unsupported, 3=Auto, 4=DisabledStatus of the system's built-in sound device. 1=Other, 2=Unsupported, 3=Disabled, 4=EnabledEnables or Disables on-board 1394 controller on next boot. 1=Other, 2=Unsupported, 3=Disabled, 4=EnabledThis property defines the parallel port configuration. 1=Other, 2=Unsupported, 3=Disabled, 4=LPT1, 5=LPT2, 6=LPT3This property defines the parallel port mode. 1=Other, 2=Unsupported, 3=AT, 4=PS/2, 5=ECP, 6=EPPEnables or Disables the system's add-in PCI slots. 1=Other, 2=Unsupported, 3=Disabled, 4=EnabledThis property defines the power management settings. 1=Other, 2=Unsupported, 3=Disabled, 4=Regular, 5=Minimum, 6=MaximumThis property defines the serial port 1 configuration. 1=Other, 2=Unsupported, 3=Disabled, 4=Auto, 5=COM1, 6=COM2, 7=COM3, 8=COM4This property defines the serial port 2 configuration. 1=Other, 2=Unsupported, 3=Disabled, 4=Auto, 5=COM2, 6=COM4

Enables or Disables USB keyboard and mouse support for Operating systems that do not natively support USB keyboards and mice. 1=Other, 2=Unsupported, 3=Disabled, 4=EnabledEnables or Disables the system's USB port. 1=Other, 2=Unsupported, 3=Disabled, 4=Enabled. In some instances a value of “unsupported” may simply mean there is no option to disable USB ports

The BIOS release date.

BIOS Version number of this system.

The current processor speed.

The Service Tag of this system.

Product name for this system.

The version for the Systems Management Software. First digit is major version.

This property defines whether Wakeup On LAN is disabled, enabled for on-board NIC only or enabled for add-in NIC only. If Enabled with boot to NIC option is selected, the system boots from the NIC boot-ROM upon a remote wakeup 1=Other, 2=Unsupported, 3=Disabled, 4=Enabled for add-in NIC, 5=Enabled for on-board NIC, 6=Enabled for all NICs, 7=Enabled with boot to NIC

This property defines the Wakeup On LAN method supported by the system. 1=Other, 2=Unsupported, 3=Magic Packed, 4=Pattern matching

The inherited Name serves as key of a System instance in an enterprise environment.1=Other, 2=Unknown, 3=Windows NT, 4=Windows 95, 5= IBM OS/2, 6=SCO UNIX, 7= NetwareWindows 98, 8=Windows ME, 9=Windows 2000, 10=Windows XP

Boolean indicating that the ComputerSystem, with its running OperatingSystem, supports power management. This boolean does not indicate that power management features are currently enabled, or if enabled, what features are

A string indicating the current status of the object. Various operational and non-operational statuses are defined. Operational statuses are "OK", "Degraded", "Stressed" and "Pred Fail". "Stressed" indicates that the Element is functioning, but needs attention. Examples of "Stressed" states are overload, overheated, etc. The condition "Pred Fail" (failure predicted) indicates that an Element is functioning properly but predicting a failure in the near future. An example is a SMART-enabled hard drive. Non-operational statuses can also be specified. These are "Error", "NonRecover", "Starting", "Stopping","Stopped", "Service", "No Contact" and "Lost Comm". "NonRecover" indicates that a non-recoverable error has occurred. "Service" describes an Element being configured, maintained, cleaned, or otherwise administered. This status could apply during mirror-resilvering of a disk, reload of a user permissions list, or other administrative task. Not all such work is on-line, yet the Element is neither "OK" nor in one of the other states. "No Contact" indicates that the current instance of the monitoring system has knowledge of this Element but has never been able to establish communications with it. "Lost Comm" indicates that the ManagedSystemElement is known to exist and has been contacted successfully in the past, but is currently unreachable."Stopped" indicates that the ManagedSystemElement is known to exist, it is not operational (i.e. it is unable to provide service to users), but it has not failed. It has purposely been made non-operational. The Element may have never been "OK", the Element may have initiated its own stop, or a management system may have initiated the stop.

This is the system type which is installed and running the instrumentation. 1=Other, 2=Unknown, 3=Workstation, 4=Server, 5=Desktop, 6=Portable, 7=Net PC

The build number of this Systems Management Software product.

The current value indicated by the Sensor.

Indicates the accuracy of the Sensor for the measured property. Its value is recorded as plus/minus hundredths of a percent. Accuracy, along with Resolution and Tolerance, is used to calculate the actual value of the measured physical property. Accuracy may vary depending on whether the Device is linear over its dynamic range.The base unit of the values returned by this Sensor. All the values returned by this Sensor are represented in the units obtained by (BaseUnits * 10 raised to the power of the UnitModifier). For example, if BaseUnits is Volts and the UnitModifier is -6, then the units of the values returned are MicroVolts. However, if the RateUnits property is set to a value other than "None", then the units are further qualified as rate units. In the above example, if RateUnits is set to "Per Second", then the values returned by the Sensor are in MicroVolts/Second. The units apply to all numeric properties of the Sensor, unless explicitly overridden by the Units qualifier. 1=Decibels, 2=DbA, 3=DbC

The Sensor's threshold values specify the ranges (min and max values) for determining whether the Sensor is operating under Normal, NonCritical, Critical or Fatal conditions. If the CurrentReading is between LowerThresholdCritical and MaxReadable indicates the largest value of the measured property that can be read by the NumericSensor.MinReadable indicates the smallest value of the measured property that can be read by the NumericSensor.Resolution indicates the ability of the Sensor to resolve differences in the measured property.This value may vary depending on whether the Device is linear over its dynamic range.The Type of the Sensor, e.g. Voltage or Temperature Sensor. If the type is set to "Other", then the OtherSensorTypeDescription can be used to further identify the type, or if the Sensor has numeric readings, then the type of the Sensor can be implicitly determined by the Units. A description of the different Sensor types is as follows: A Temperature Sensor measures the environmental temperature. Voltage and Current Sensors measure electrical voltage and current readings. A Tachometer measures speed/revolutions of a Device. For example, a Fan Device can have an associated Tachometer which measures its speed. A Counter is a general purpose Sensor that measures some numerical property of a Device. A Counter value can be cleared, but it never decreases. A Switch Sensor has states like Open/Close, On/Off, or Up/Down. A Lock has states of Locked/Unlocked. Humidity, Smoke Detection and Air Flow Sensors measure the equivalent environmental characteristics. A Presence Sensor detects the presence of a PhysicalElement. 1=Other, 2=Temperature, 3=Voltage, 4=Current

Indicates the tolerance of the Sensor for the measured property. Tolerance, along with Resolution and Accuracy, is used to calculate the actual value of the measured physical property.Tolerance may vary depending on whether the Device is linear over its dynamic range.

An address or other identifying information to uniquely name the LogicalDevice.

The AdapterRAM property indicates the memory size of the video adapter in bytes.

The number of bits used to display each pixel.

Current number of horizontal pixels.

Current refresh rate in Hertz.

1=Unknown; 2=Unknown; 3=Interlaced; 4=Noninterlaced

Current number of vertical pixels.

The Sensor's threshold values specify the ranges (min and max values) for determining whether the Sensor is operating under Normal, NonCritical, Critical or Fatal conditions. If the CurrentReading is between UpperThresholdCritical and

The AdapterCompatibility properties contains the general chip set used for this controller in order to compare compatibilities with the system

The AdapterDACType property contains a string of the Digital-to-Analog converter (DAC) chip name or ID. Character Set: Alphanumeric

The DriverDate property indicates the last modification date and time of the currently-installed video driver.

1=Unknown, 2=CGA, 3=EGA, 4=VGA, 5=SVGA, 6=MDA, 7=HGC, 8=MCGA, 9=8514A, 10=XGA, 11=Linear Frame Buffer, 12=PC-981=Uknown, 2=VRAM, 3=DRAM, 4=SRAM, 5=WRAM, 6=EDO RAM, 7=Burst Synchronus DRAM, 8=Pipelined Burst SRAM, 9=CDRAM, 10=3DRAM, 11=SDRAM, 12=SGRAMThe VideoModeDescription property indicates the current resolution, color, and scan mode settings of the video controller.

Listing of Dell-Specific Web Reports ProvidedAC Line StatusAlarm ResumeAudio ModeAuto OnBoot OrderBrightnessBuilt-in FloppyBuilt-in NICBuilt-in Pointing DeviceChassis Intrusion EnabledChassis Intrusion StatusDell Hardware Running OMCIDell OMCI VersionGlobal StatusHyperthreading EnabledIDE ControllerLaptop Battery ChemistryLaptop Remaining ChargeLaptop Battery Run TimeLaptop Docking StatusLock PresentOnBoard 1394 EnabledParallel Port ConfigurationParallel Port ModePCI Slot ConfigurationPower Management CapabilitiesPower Management ConfigurationReduced CPU Clockspeed ConfigurationSecurity Breach (Physical Frame)Serial Port 1 ConfigurationSerial Port 2 ConfigurationSpeaker VolumeThermal Status (Chassis/Processor)USB EmulationUSB PortsWakeupOnLAN Enabled