Users Guide

6 Contents
5 Reporting and Task Management . . . . . . . . . . . . . . . . . . 59
Custom Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Creating a New Report
. . . . . . . . . . . . . . . . . . . . . . . . . . . 61
Editing, Deleting, or Running Reports
. . . . . . . . . . . . . . . . . . . . 62
Pre-defined Reports
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
IT Assistant Database Schema Information
. . . . . . . . . . . . . . . . . . . 63
Software Updates
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Using Software Updates in IT Assistant
. . . . . . . . . . . . . . . . . . 79
Managing Tasks
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Creating a Device Control Task
. . . . . . . . . . . . . . . . . . . . . . . 80
Other Tasks Available in IT Assistant
. . . . . . . . . . . . . . . . . . . . 81
6 Ensuring a Secure Dell OpenManage
IT Assistant Installation
. . . . . . . . . . . . . . . . . . . . . . . . . 83
TCP/IP Packet Port Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Securing Managed Desktops, Laptops, and Workstations
. . . . . . . . . . . 83
Securing the Managed System’s Operating System
. . . . . . . . . . . . 83
Session Time-out
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
ASF and the SNMP Protocol
. . . . . . . . . . . . . . . . . . . . . . . . 84
Securing Managed Server Systems
. . . . . . . . . . . . . . . . . . . . . . . 84
Securing the Managed System’s Operating System
. . . . . . . . . . . . 84
Choosing the Most Secure Managed System Server Protocol
. . . . . . 84
CIM Monitoring, DCOM, and Windows Authentication
. . . . . . . . . . 84
Security and the SNMP Protocol
. . . . . . . . . . . . . . . . . . . . . . 85
Ensuring Database Security When Using IT Assistant
. . . . . . . . . . . 86
Running IT Assistant Behind a Firewall
. . . . . . . . . . . . . . . . . . . . . 86
Setting Up Additional Security for IT Assistant Access
. . . . . . . . . . . . 87
Securing Ports for IT Assistant and Other Supported
Dell OpenManage Applications
. . . . . . . . . . . . . . . . . . . . . . . . . 89
Single Sign-On
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Role-Based Access Security Management
. . . . . . . . . . . . . . . . . . . 90
Role-Based Access Control
. . . . . . . . . . . . . . . . . . . . . . . . 90