Users Guide

Table Of Contents
Contents
1 About Dell Lifecycle Controller Integration for Microsoft System
Center 2012 Virtual Machine Manager................................................................ 7
What’s new in this release..................................................................................................................... 7
Existing features.....................................................................................................................................8
2 Installing and setting up DLCI Console Add-in ............................................10
Installing DLCI Console Add-in.......................................................................................................... 10
Removing or repairing DLCI Console add-in..................................................................................... 11
Importing DLCI Console Add-in into VMM........................................................................................ 11
Viewing DLCI Console Add-in.............................................................................................................11
Uninstalling DLCI Console Add-in...................................................................................................... 11
3 Getting Started....................................................................................................12
Logging in to the DLCI Admin Portal — SC2012 VMM ..................................................................... 12
DLCI admin portal — SC2012 VMM.................................................................................................... 12
Logging in to DLCI Console Add-in for SC2012 VMM...................................................................... 14
DLCI Console add-in for SC2012 VMM .............................................................................................14
4 Workflows............................................................................................................16
About golden configurations.............................................................................................................. 16
Creating golden configurations..........................................................................................................16
Creating, managing, and deleting credential profiles........................................................................16
Creating, managing, and deleting update sources............................................................................ 17
Creating, managing, and deleting custom update groups................................................................ 17
Applying updates on servers, or server groups.................................................................................. 17
Creating, managing, and deleting protection vaults..........................................................................17
Exporting server profile....................................................................................................................... 18
Importing server profile.......................................................................................................................18
Hypervisor deployment.......................................................................................................................18
Deleting servers................................................................................................................................... 18
5 Setting up the environment for deploying hypervisors.............................. 19
6 Server discovery..................................................................................................20
System requirements for managed systems ..................................................................................... 21
Enabling CSIOR in managed systems.................................................................................................21
Discovering servers using auto discovery.......................................................................................... 21
Discovering servers using manual discovery..................................................................................... 22
3