Dell Command | Monitor Version 9.
Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Introduction........................................................................................................... 5 Dell Command | Monitor overview...................................................................................................... 5 Command | Monitor architecture.........................................................................................................6 What's new in this release................................................................................
BIOS management profile.............................................................................................................16 Boot control...................................................................................................................................16 Base desktop mobile..................................................................................................................... 16 Log record.................................................................................
Introduction 1 Client Instrumentation refers to software applications that enable remote management of a client system. The Dell Command | Monitor (Command | Monitor) software application enables remote management using application programs to access the enterprise client system information, monitor the status, or change the state of the system such as remotely shutting down the system.
Command | Monitor architecture Command | Monitor data provider collects the system information data and stores the information in the proprietary Extensible Markup Language (XML) format. The data manager is a service that loads these providers based on request. Command | Monitor CIM provider layer abstracts the interface to different CIMOM implementations.
• Support for new SNMP 10909 MIB • Support for the following new tokens: – GPS Radio – Keyboard Backlight with AC – Back Camera – Lock – Lock Mode – Onboard Unmanaged Network Interface Card (NIC) – Unmanaged NIC – Rear USB Ports – Side USB Ports – Trusted Execution • Support for additional values, medium_high and medium_low for fanspeed token. NOTE: Legacy namespaces and SNMP 10892 MIB have been removed. For more information on tokens, see the Dell Command | Monitor Reference Guide at dell.
WMI security WMI provides user authentication before granting access to the CIM data and methods. Access privileges are enforced by Distributed Component Object Model (DCOM) security and CIMOM. Complete or limited access, is granted to users on per-namespace basis. There is no class implementation or property-level security. By default, users who are members of the administrators group have complete local and remote access to WMI.
RAID monitoring and alerting for Intel and LSI Controllers Monitoring and alerting for Intel and LSI RAID controllers for its physical and logical drives. SNMP monitoring and traps Command | Monitor confirms to SNMP v1 and supports monitoring of system attributes and traps.
Standards and protocols 2 Command | Monitor uses Microsoft Windows Management Instrumentation (WMI) and enables Web Services-Management (WSMAN) protocols. Command | Monitor uses Simple Network Management Protocol (SNMP) to describe several variables of the system.
bases (MIBs). MIBs describe the structure of the management data of a device and its subsystems. MIBs use a hierarchical namespace containing object identifiers (OID). Each OID identifies a variable that can be read through SNMP. WMI WMI is the Web-based Enterprise Management (WBEM) effort implementation by Microsoft. It is implemented on the Microsoft Windows platforms. WMI supports CIM and Microsoft-specific CIM extensions.
inventory and to set information or run methods. In in-band systems, the WSMAN layer also abstracts the operating system present underneath. However, Command | Monitor does not require WSMAN and it does not directly enable WSMAN as it is only a protocol. For more information on managing WSMAN from DMTF, see dmtf.org/standards/wsman. For more information on enabling WSMAN based management of WMI on a system running the Windows operating system, see msdn.microsoft.com/en-us/library/aa384426%28v=VS.85%29.aspx.
System requirements 3 This chapter provides information about the hardware and software requirements of Command | Monitor. Hardware requirement Requirement Details System Enterprise client system with SMBIOS 2.3 or later. Software requirements Requirement Details Supported operating system • • • • Microsoft Windows 8.1 Microsoft Windows 8 Microsoft Windows 7 Microsoft Windows Vista Supported framework • Microsoft .NET 4.
User scenarios 4 This chapter describes the various user scenarios of Command | Monitor. You can use Command | Monitor for: • Asset management • Configuration management • Health monitoring • Profiles Scenario 1: Asset management A company that uses many Dell systems was not able to maintain accurate inventory information because of changes in the business and IT staff.
Scenario 2: Configuration management A company plans to standardize the client platform and manage each system through its lifecycle. As part of this effort, the company acquires a suite of tools and plans to automate the deployment of a new client operating system using the Preboot Execution Environment (PXE). The challenge is to modify the boot order setting in the BIOS of each client computer without manually visiting the desktop.
Scenario 4: Profiles IT administrators are required to manage client system in multi-vendor and distributed enterprise environments. They face challenges as they must master diverse set of tools and applications while managing several desktop and mobile client systems in various networks.
• Reboot the system. Run the DCIM_ComputerSystem.RequestStateChange() method and set the RequestedState parameter value to 11. • Determine the power state of the system. • Determine the number of processors in the system by querying DCIM_Processor, instances which are associated with the Central Instance through the DCIM_SystemDevice association. • Get the system time. Run the DCIM_TimeService.ManageTime() method and set the GetRequest parameter to True.
Using Dell Command | Monitor 5 You can view the information provided by Command | Monitor by accessing: • root\dcim\sysman (standard) Command | Monitor provides the information through classes in these namespaces. For more information on the classes, see Dell Command | Monitor Reference Guide at dell.com/ clientsystemsmanagement.
For more information on SNMP, see Dell Command | Monitor SNMP Reference Guide at dell.com/ clientsystemsmanagement. Detecting advance format drives Client systems are transitioning to Advanced Format (AF) drives for larger storage capacity and to address the limitations of 512-byte sector hard drives (HDDs). The hard drives transitioning to 4KB sectors maintain backward compatibility, while the current AF hard drive, known as 512e hard drive, match 512byte SATA and operate at 4KB.
hard disk, CD/DVD, network, Personal Computer Memory Card International Association (PCMCIA), Battery Electric Vehicle (BEV), or USB. Based on the boot list type of the device, an instance of DCIM_BootSourceSetting is associated with one of the instances of DCIM_BootConfigSetting.
You can set BIOS attributes using the SetBIOSAttributes method. The procedure is explained below by enabling the Trusted Platform Module (TPM) as an example. NOTE: Make sure the TPM option is cleared in the BIOS before following the procedure to enable the TPM. To enable TPM: 1. Set the BIOS password on the system if not set already using the following PowerShell command: (gwmi -Class DCIM_BIOSService -Namespace root\dcim \sysman).SetBIOSAttributes($null,$null,"AdminPwd","enter a new password") 2.
Frequently asked questions 6 How to find the boot order (sequence) of the boot configuration using DCIM_OrderedComponent.AssignedSequence property? When a DCIM_BootConfigSetting instance (Legacy or UEFI) has multiple DCIM_BootSourceSetting instances (boot devices) associated with it through instances of the DCIM_OrderedComponent association, the value of the DCIM_OrderedComponent.
How do I run TechCenter scripts without any issues? The following are the prerequisites while executing the VBS scripts provided in Command | Monitor Techcenter link: 1. Please configure winrm on the system using the command winrm quickconfig. 2. Check if the token support exists on the system by referring to: • The F2 Screen in BIOS Setup. • Using tool like wbemtest to check the key value define in the script to be existing on the system. NOTE: Dell recommends using the latest BIOS available at dell.
Troubleshooting 7 Unable to remotely connect to Windows Management Instrumentation If Common Information Model (CIM) information for a remote client computer system is not available to the management application or if a remote BIOS update that uses Distributed Component Object Model (DCOM) fails, the following error messages are displayed: • Access Denied • Win32:RPC server is unavailable 1. Verify that the client system is connected to the network.
a. b. c. d. e. f. 6. Click Start → Run, type compmgmt.msc, and then click OK. Browse to WMI Control under Services and Applications. Right-click WMI Control, and then click Properties. Click the Security tab and select DCIM/SYSMAN under the Root tree. Click Security. Select the specific group or user that you want to control access and use the Allow or Deny check box to configure the permissions. Perform the following steps to connect to a WMI (root\DCIM/SYSMAN) on a system from a remote system using WMI
Contacting Dell 8 NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Dell provides several online and telephone-based support and service options. Availability varies by country and product, and some services may not be available in your area. To contact Dell for sales, technical support, or customer service issues: 1. Go to dell.com/support. 2. Select your support category. 3.
a. Go to dell.com/support/home. b. Under General support section, click Software & Security. c. In the Software & Security group box, click the required link from the following: – Enterprise Systems Management – Remote Enterprise Systems Management – Serviceability Tools – Client Systems Management – Connections Client Systems Management d. • To view a document, click the required product version. Using search engines: – Type the name and version of the document in the search box.