Users Guide
目次
1 はじめに...................................................................................................................5
Dell Command | Monitor の概要.......................................................................................................... 5
Dell Command | Monitor アーキテクチャ............................................................................................6
本リリースの新機能............................................................................................................................... 7
機能.........................................................................................................................................................7
CIM 2.17 スキーマのサポート..........................................................................................................8
BIOS 設定......................................................................................................................................... 8
WMI セキュリティ........................................................................................................................... 8
イベント報告....................................................................................................................................8
リモートシャットダウン..................................................................................................................8
情報アクセス....................................................................................................................................9
詳細な資産情報................................................................................................................................ 9
リモートウェイクアップ設定.......................................................................................................... 9
システム設定のリモート変更.......................................................................................................... 9
システムの正常性とステータス.......................................................................................................9
Intel および LSI コントローラの RAID の監視とアラート発行........................................................9
SNMP の監視とトラップ..................................................................................................................9
2 標準およびプロトコル.........................................................................................10
CIM、SNMP、WMI および WSMAN テクノロジの概要......................................................................10
CIM.................................................................................................................................................10
snmp.............................................................................................................................................. 10
WMI.................................................................................................................................................11
WSMAN...........................................................................................................................................12
PowerShell..................................................................................................................................... 12
3 システム要件.........................................................................................................13
ハードウェア要件.................................................................................................................................13
ソフトウェア要件.................................................................................................................................13
4 ユーザーシナリオ.................................................................................................14
シナリオ 1:資産管理.......................................................................................................................... 14
SCCM 統合..................................................................................................................................... 14
シナリオ 2:設定管理..........................................................................................................................15
シナリオ 3:正常性監視...................................................................................................................... 15
Windows イベントビューアまたは CIM インジケーションによるシステムイベントの監視.......15
シナリオ 4:プロファイル.................................................................................................................. 16
バッテリプロファイル................................................................................................................... 16
3