home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Gold Medal Software 4
/
Gold Medal Software - Volume 4 (Gold Medal) (1994).iso
/
netutils
/
brir110e.arj
/
DOC.ZIP
/
METERING.TXT
< prev
next >
Wrap
Text File
|
1994-06-29
|
154KB
|
3,834 lines
Part Two: Metering
List of Topics
5.0 BrightWorks Metering
5.1 About BrightWorks' Metering Capability
5.1.1 The Purpose of Software Metering
5.1.2 Evolution of Software Metering
5.1.3 BrightWorks Metering Methods
5.2 BrightWorks' Metering Features
5.3 BrightWorks' Metering Components
5.3.1 The License Server NLM/VAP
5.3.2 The File Server Agent NLM for DOS
5.3.3 The Workstation Software Metering Agent for Windows
5.3.4 The Workstation Security Agent
5.3.5 The Usage Monitor
5.3.6 The View Users Utility
5.3.7 The Report Utility
5.4 How This Part Is Organized
5.5 Quick Start Guide
5.5.1 Load the NLMs.
5.5.2 Set up a Windows PC for Metering
5.5.3 NON-TSR METHOD
5.5.4 TSR METHOD
5.5.5 Automatic File Updating
5.5.6 Setting Up A Straight DOS PC For Metering
5.5.7 Locking Out Local Drives
5.5.8 SWATCHER & SMRAGENT
5.5.9 Activating Directory Trustee Rights
5.5.10 Software Updates
5.5.11 Virus Protection
5.5.12 Tutorial
6.0 Setting Up Metered Applications
6.1 Introduction
6.1.1 How BrightWorks' Metering Works
6.1.2 Access to Metering Setup Functions
6.1.3 What's in this Chapter
6.2 Metered Applications
6.3 Registering Applications for Software Metering
6.3.1 Trustee Rights
6.3.2 Modifying an Application's Metering Configuration
6.3.3 Modifying Trustee Rights
6.3.4 Deleting Rights
6.3.5 Deleting Metered Applications
6.4 Attaching to and Detaching from File Servers
6.4.1 Attaching to a File Server
6.4.2 Detaching from a File Server
7.0 Using the Security Features
7.1 Introduction
7.1.1 Access to Security Functions
7.1.2 What's in this Chapter
7.2 File Integrity Scanning
7.2.1 What Are Authorized Files?
7.2.2 Adding Authorized Files
7.2.3 Reprotecting Authorized Files
7.2.4 Deleting Authorized Files
7.3 Running Unauthorized Files
7.3.1 Using Run Unauthorized Files
7.4 Specifying the File Scan Interval
7.5 Specifying the Security Scan Interval
7.5.1 Specifying the Security Scan Interval
7.6 Disabling Local Drives
7.7 Restricting Local Execution
7.8 Specifying Security Exceptions
7.8.1 How Security Exceptions Work
7.8.2 Using Security Exceptions
8.0 Using the Administration Features
8.1 Introduction
8.1.1 Access to Metering's Administration Functions
8.1.2 What's in this Chapter
8.2 Viewing Metering Settings
8.3 Viewing Application Usage
8.4 Monitoring and Controlling Application Usage
8.4.1 Administering Current Users
8.4.2 Sending a Message to a Current User
8.4.3 Viewing Current Users' Information
8.4.4 Releasing a Current User from a Metered Application
8.4.5 Launching another BrightWorks Capability
8.4.6 Administering Queued Users
8.4.7 Sending a Message to a Queued User
8.4.8 Editing the Queued User List
8.4.9 Viewing Queued Users' Information
8.4.10 Launching another BrightWorks Capability
8.5 Modifying and Updating the Application Usage Graph
8.5.1 Modifying Application Information
8.5.2 Changing the Number of Maximum Concurrent Users
8.5.3 Changing Metered Application Information
8.5.4 Changing the Usage Scale
8.5.5 Changing the Colors Used in the Status Bar
8.5.6 Hiding or Showing the Status Bar
8.5.7 Performing Queries
8.6 Controlling Data Files
8.6.1 Configuration Options
8.6.2 Home Directory
8.6.3 Purging Stored Data
8.6.4 Purge Usage Information
8.6.5 Purge Security Information
9.0 Generating Reports
9.1 Introduction
9.1.1 Access to Report Functions
9.1.2 What's in this Chapter
9.2 Exporting Files
9.3 Generating Reports
9.4 The Report Window
9.5 Report Types
9.5.1 Metering Definitions
9.5.2 Application Summary
9.5.3 Application with User Detail
9.5.4 Application with User Summary
9.5.5 User Summary
9.5.6 User with Application Detail
9.5.7 User with Application Summary
9.5.8 File Integrity Activity Report
9.5.9 SPA Compliance
9.5.10 Software Purchase Forecast
9.5.11 Upgrade Purchase Forecast
10.0 Monitoring Tools for Network Users
10.1 Introduction
10.1.1 Access to the Monitoring Functions
10.1.2 What's in this Chapter
10.2 Viewing Application Usage
10.2.1 Monitoring Application Usage
10.2.3 Viewing Application Information
10.2.4 Viewing Current Users
10.2.5 Sending a Message to a Current User
10.2.6 Viewing Current Users' Information
10.2.7 Viewing Queued Users
10.2.8 Sending a Message to a Queued User
10.2.9 Viewing Queued Users' Information
10.3 Modifying and Updating the Usage Graph
10.3.1 Changing the Usage Scale
10.3.2 Changing the Colors Used in the Status Bar
10.3.3 Hiding or Showing the Status Bar
10.3.4 Performing Queries
10.4 Using DOS Slook
10.4.1 Using Slook
10.4.2 Viewing Current Users
10.4.3 Viewing Queued Users
11.0 Advanced Utilities
11.1 About the Metering Utilities
11.1.1 Utilities List
11.2 Swatcher TSR Method
11.2.1 Swatcher
11.2.2 Note About Swatcher
11.2.3 DSW
11.2.4 Potential DSW Problems
11.3 SYSMOD
5.0 BrightWorks Metering
Welcome to BrightWorks' metering capability, the comprehensive software
control solution for your local area network!
NOTE: This chapter pertains to BrightWorks and SiteMeter.
5.1 About BrightWorks' Metering Capability
BrightWorks' metering features controls your LAN software-so you stay
legal. And it helps you reduce your software expenditures.
In addition to offering industry-standard metering methods, BrightWorks'
metering also includes an NLM-based process that both eliminates
workstation administration and improves security.
Plus BrightWorks provides comprehensive reports with all the management
information you need to make informed decisions about your network.
Because McAfee has been perfecting software metering since 1988,
you are getting the most comprehensive package available.
Take, for example, the ability to meter suites of applications
(e.g., Microsoft Office). With BrightWorks, you can ensure accurate
license compliance with groups of files which are governed by a single
license agreement.
5.1.1 The Purpose of Software Metering
Software metering puts control of all your network applications at
your fingertips. With software metering you can:
o Reduce software expenditures
o Reduce training and administrative expenses
o Enforce software license compliance
o Track software usage
5.1.2 Evolution of Software Metering
To provide network administrators with these benefits, an array of
network metering utilities have been developed. The technology driving
these application metering programs has evolved significantly. Today,
License Server Application Programs Interface (LSAPI) is the proposed
standard for software metering tools.
Proposed Standard: LSAPI
LSAPI works in conjunction with the license server to broaden the
application of metering.
Advantages:
o Software metering benefits
o Supports standard applications off the shelf
o Selects license systems based on management requirements
Microsoft, Novell, Lotus, IBM, Hewlett Packard and McAfee worked
together to draft LSAPI. Expect this standard to become available
during 1994.
Generation 1: Menu-Based Metering
With menu-based metering, users accessed applications via a menu system
which tracked usage.
Advantages:
o Software metering benefits
Disadvantages:
o Easily circumvented
o Not transparent to users
o Time-consuming to set up
o Required the use of menus
Generation 2: Stub Application Metering
The next generation introduced stub application metering. Impostor
applications (which looked like the originals) tracked usage and then
passed control to the actual applications.
Advantages:
o Software metering benefits
o Transparent to users
Disadvantages:
o Easily circumvented
o Required two files for each application
o Intensive administration
Generation 3: Workstation TSR Metering
With this third generation of metering, a TSR (Terminate and Stay Resident)
program interacts with the VAP/NLM to meter network software. It
intercepts the user's request to run an application and asks the VAP/NLM
for permission to execute the software.
Advantages:
o Software metering benefits
o Option to disable local drives
o Transparent to users
o Cannot be circumvented
Disadvantages:
o Consumes memory at each workstation
o Intensive administration
Generation 4: The BrightWorks Metering Capability
BrightWorks' metering capability is the first software metering package
which offers file server and workstation agent metering to give you
these advantages:
o Software metering benefits
o No workstation TSR required for metering
o Architecture for multiple workstation platform support
(DOS, Windows, Unix)
o Minimal administration with native Windows interface
o NLM implementation centralizes control and prevents circumvention
o Transparent to users
o Framework for LSAPI support
BrightWorks offers all of the advantages of using workstation and file
server agents to meter network software. It also has the architecture
in place for future developments in software metering technology.
5.1.3 BrightWorks Metering Methods
By providing these options, you can choose the method best suited to
your network needs. Multiple methods can be loaded on the same
network simultaneously.
File Server Agent Method for DOS
By using a file server agent to meter your DOS based network software,
no workstation software is required. Because software usage is tracked
at the system level, you gain:
o Compatibility with NetWare 3.x
o Tracking of all DOS software at the file server via the NLM
o Metering without workstation software
This method involves the Proxy NLM directly. To use this option you must
be running NetWare 3.x. Before a user fully loads an application, the
Proxy NLM intercepts the request and checks to verify that the application
is available. If the NLM grants permission, the user is permitted to use
the application.
Using the Proxy NLM does not consume any additional memory on the
workstation and is the least intrusive method of providing software
metering.
Workstation Agent Method for Windows
Similar to the File Server Agent Method for DOS, the Workstation Agent
Method for Windows intercepts software usage requests at the system level.
Plus the Workstation Agent Method for Windows provides a framework for
future LSAPI support. This method provides:
o Compatibility with NetWare 3.x
o Tracking for all Windows software usage via the workstation agent
and the NLM
o Metering without workstation TSRs
This workstation agent interacts with the File Server License NLM to meter
network software. It is loaded onto workstations in a batch file
called SMRUSER.BAT.
Workstation Security Agent
In addition to multiple methods of metering, the metering capability
also provides an optional workstation security agent. This method:
o Is compatible with NetWare 2.x and 3.x
o Tracks all DOS and Windows software usage via the workstation TSR
and file server NLM or VAP
o Can disable local drives
o Can prevent execution of local files
The metering's workstation security agent is Swatcher and is a DOS TSR
which requires 5K. Swatcher is included in the package but should be
loaded only if the above capabilities are required. You can also load
Swatcher for metering purposes if you choose not to use the file server
agent method for metering DOS applications.
5.2 BrightWorks' Metering Features
BrightWorks offers a comprehensive set of features and a wide range of
capabilities:
o Metering for individual DOS and Windows programs (or suites of programs)
via fourth generation agent based metering
o Optional workstation security agent
o Real time trustee rights tied to applications to protect sensitive files
o Real time graphical display of application usage
o Valuable application usage summaries and reports
o File protection against possible virus infection
o Automatic notification for users when applications become available
o Windows compatibility and native Windows console
o Security for your network with optional password protection and
VAP/NLM technology
These features allow you to:
o Assure compliance with software license agreements
o Prevent users from using local drives (with optional security agent)
o Determine software license requirements based on actual usage
o Prevent costly downtime caused by virus infection
o Increase productivity by keeping your users informed about
application availability
o Monitor software usage on several servers simultaneously
o Control your network by keeping it secure
5.3 BrightWorks' Metering Components
The following sections list all the components of the metering capability.
5.3.1 The License Server NLM/VAP
SITEMETR.NLM/SITEMETR.VAP is the module responsible for granting or
denying permission to execute applications. It resides on the file server.
Using this module with one of the metering methods, you can:
o Control all access to metered applications
o Track software usage on your network
5.3.2 The File Server Agent NLM for DOS
SMRPROXY.NLM is the file server agent method of software metering and
file protection. As users request permission to use applications, the
File Server Agent NLM communicates with the License Server NLM/VAP.
Using SMRPROXY.NLM, you can:
o Determine if the applications are available to run
o Meter software without any workstation software on DOS workstations
for NetWare 3.x file servers
5.3.3 The Workstation Software Metering Agent for Windows
SMRAGENT.EXE is a workstation agent that interacts with the File Server
License NLM/VAP to meter network software.
Using SMRAGENT.EXE, you can:
o Track Windows application usage
o Meter software without a workstation TSR
5.3.4 The Workstation Security Agent
SWATCHER.COM is the workstation security agent method for software
metering and file protection. It acts as a messenger between the
application and the file server.
Using SWATCHER.COM, you can:
o Automatically log out users who have tried to circumvent BrightWorks'
metering capability
o Restrict local execution
o Disable local drives
5.3.5 The Usage Monitor
USAGE.EXE is a BrightWorks metering utility that you can make available
to your network users. Using this Windows utility, the users can
determine who is using a metered application in real time.
With USAGE.EXE, the users can:
o View a list of both current and queued users of an application
o Send current or queued users a NetWare Send Message
5.3.6 The View Users Utility
SLOOK.EXE is a DOS program that you can make available to your users
to enable them to determine who is using a metered application in real time.
Using SLOOK.EXE the users can:
o View a list of current users of an application
o Send current users a NetWare Send Message
Using DOS Slook, a user with SUPERVISOR rights can:
o View a list of queued users for an application
o View a list of current users of an application
5.3.7 The Report Utility
SREPORT.EXE generates a variety of reports with useful information
about software usage on your network.
Using this Windows application, you can:
o Determine the number of concurrent, queued and peak users for
an application
o Identify the number of licenses needed to accommodate current need,
as well as a 10% increase and a 20% increase
o Access information about the activity on virus secured files
and applications
5.4 How This Part Is Organized
CHAPTER TOPICS
5.0 BrightWorks' Metering Background information about the
metering capability, metering methods,
and components.
6.0 Setting Up Metered Applications Complete reference on software
metering.
7.0 Using the Security Features Complete reference on file protection
and the security features.
8.0 Using the Administration Features Instructions on using the console and
administration menus.
9.0 Generating Reports Detailed information on how to
generate reports.
10.0 Monitoring Tools for Network Users Information on how to monitor usage
for each application.
11.0 Advanced Utilities Complete descriptions of using
Swatcher and SYSMOD.
5.5 Quick Start Guide
This section provides instructions for configuring your network for metering.
All the information provided in this section is described in detail
throughout thispart of the BrightWorks manual.
Use the following procedure to set up metering on your network.
5.5.1 Load the NLMs.
1. At the fileserver console prompt type,
:Load SMRPROXY
2. Hit return.
This will load both SITMETR.NLM and SMRPROXY.NLM on the fileserver. Both
of these NLMs are required for metering to take place.
5.5.2 Set up a Windows PC for Metering
There are several methods for setting up a Windows PC for metering. Choose
from the following three methods described below.
5.5.3 NON-TSR METHOD
This is also called the Workstation Agent Method. For the non-TSR method, the
SMRAGENT Windows based driver must be loaded to meter both Windows and DOS
programs run from Windows. SMRAGENT is copied into the \PUBLIC directory
during the BrightWorks/SiteMeter installation. SWATCHER and SWINAPP are NOT
required to be loaded on the PC for this method.
1. Place SMRAGENT on the load= line in the PC's WIN.INI file.
It will then be loaded automatically when Windows is started. For example,
LOAD=NWPOPUP.EXE F:\PUBLIC\SMRAGENT.EXE
5.5.4 TSR METHOD
The TSR method is optional it is described here for those users who want to
use it.
1. Load SWATCHER.COM before running Windows.
You can do this in the AUTOEXEC.BAT file. A sample AUTOEXEC.BAT is as
follows:
IPX
NETX
F:
SWATCHER
You can also accomplish this in the SYSTEM LOGIN SCRIPT. An example
Login Script would be:
MAP S1: ...
...
EXIT "LOADTSR.BAT"
The batch file LOADTSR.BAT would be:
SWATCHER
NOTE: If the SWATCHER TSR method is used and the Security Scan Interval has
been activated, the interval should be set to at least 2 minutes or greater
to ensure that the users have enough time to log into the network and load
SWATCHER before the SiteMeter NLM checks him or her for loading SWATCHER.
Otherwise the user may be kicked off the network because they had too little
time to login and load SWATCHER. Please see section 7.5 for more information
on the Security Scan Interval.
2. Load SWINAPP.EXE on the load= line in the PC's WIN.INI file.
For example,
LOAD=NWPOPUP.EXE SWINAPP.EXE
SWINAPP aids SWATCHER TSR in releasing locks on applications run from
Windows.
NOTE: Copy SWATCHER.COM and SWINAPP.EXE from the \BWORKS directory to the
\LOGIN and \PUBLIC directories. SWATCHER.COM and SWINAPP.EXE are placed in
the \BWORKS directory if you answered YES to install SWATCHER TSR during the
BrightWorks\SiteMeter installation process.
5.5.5 Automatic File Updating
If you have many PCs to update for SMRAGENT or SWATCHER, then you probably
do not want to go to every single PC to update the WIN.INI or AUTOEXEC.BAT
files. Fortunately, BrightWorks includes a file called SMRUSER.BAT in the
\Public directory which will automatically make the SMRAGENT update or the
SWATCHER/SWINAPP updates to the WIN.INI file. If you chose YES to install
SWATCHER TSR during the installation, the SMRUSER.BAT file will add SWATCHER
to the AUTOEXEC.BAT file and add SWINAPP to the WIN.INI file. If you chose
NO to install SWATCHER TSR during the installation, the SMRUSER.BAT file will
add SMRAGENT.EXE to the WIN.INI file. If you need to change the SMRUSER.BAT
file, simply run the CUSTOM install and when prompted to install SWATCHER TSR,
answer YES or NO for the appropriate SMRUSER.BAT file to be created.
1. Place the SMRUSER.BAT file in the SYSTEM LOGIN SCRIPT as follows:
MAP INS S1:=C:\WINDOWS
MAP INS S1:=C:\WIN31
INCLUDE SMRUSER.BAT
MAP DEL S1:
MAP DEL S1:
NOTE: If the SMRUSER.BAT file is included in the system login script, a #
sign must be placed in front of all of the SYSMOD statements in the
SMRUSER.BAT file. For example,
#SYSMOD WIN.INI REPLACEKEY LOAD SMRAGENT.EXE SMRAGENT.EXE
5.5.6 Setting Up A Straight DOS PC For Metering
NOTHING must be loaded on a STRAIGHT DOS PC (without Windows) to meter DOS
based programs. The only requirement is loading the SITEMETR NLM and the
SMRPROXY NLM at the fileserver, which was done in the first section "Load
the NLMS." The NLMs fully take care of metering DOS based programs on a
straight DOS PC.
5.5.7 Locking Out Local Drives
You can lock out local drives essentially making the PC diskless and
preventing users from running Local .EXE or .COM programs.
SWATCHER can be loaded on a DOS PC to enable the local drive lock out
function to make a PC diskless or to disable local .exe or .com program
execution (see Chapter 11 for more information on SWATCHER and DSW).
5.5.8 SWATCHER & SMRAGENT
Please note that you cannot mix SWATCHER and SMRAGENT on the same PC.
SWATCHER and SMRAGENT CANNOT be loaded on the same PC. Do NOT load SWATCHER
and SWINAPP and SMRAGENT or SWATCHER and SMRAGENT on the same PC. Load
SWATCHER and SMRAGENT on SEPARATE PCs. Either SMRAGENT will not load because
SWATCHER is already loaded or metering problems may result.
SWATCHER TSR and SWINAPP may be loaded on different PCs than SMRAGENT on the
same network. For instance, PC 1 and PC 2 are on the same fileserver. PC 1
may load SWATCHER (or SWATCHER and SWINAPP for Windows) and PC 2 may load
SMRAGENT for Windows.
5.5.9 Activating Directory Trustee Rights
Directory Trustee Rights grant a user additional rights in specified
directories when he or she runs a metered application. This is an OPTIONAL
feature. See section 6.3.1 entitled "Trustee Rights" for further description.
To assign trustee rights on a Windows Based PC, SMRAGENT must be loaded on
the win.ini load= line for the Directory Trustee Rights to take effect.
To assign trustee rights on a straight DOS based PC, nothing must be loaded
on the PC. The NLMs do all the work. SWATCHER TSR may be optionally loaded.
5.5.10 Software Updates
Please check Compuserve, GO BRIGHT, LIB 3 for any software updates to
BrightWorks/SiteMeter.
5.5.11 Virus Protection
SMRAGENT or SWATCHER is required for Windows based virus protection to be
activated. See Chapter 7 for more information about virus protection.
5.5.12 Tutorial
After reading the steps in the above sections, refer to the metering tutorial
for a walk-through of the major metering features.
6.0 Setting Up Metered Applications
Chapter 5 introduced BrightWorks' metering capability. This chapter
explains in detail how to set up your software applications for
software metering.
NOTE: This chapter pertains to BrightWorks and SiteMeter.
6.1 Introduction
Managing network software is a crucial task in maximizing LAN productivity.
By maintaining control over your network applications, you can stay legal
and ensure the most efficient use of LAN software.
Effective management of network software requires controlling the number
of simultaneous users of each software application. The maximum number
of users differs with each software package and the number of licenses
your company has purchased.
BrightWorks' metering helps you keep track of this information, which is
useful in determining the need for additional licenses of a particular
software application.
For example, suppose that you purchase 5 licenses of a word processing
package. The metering reports indicate that all 5 copies are consistently
in use with 3 users waiting in the queue for this application.
This demonstrates the need to purchase additional licenses for
this application. With software metering you only purchase the
number of applications you need, reducing unnecessary software
expenditures. BrightWorks' metering allows you to meter up to 200 files
on a 286 file server and 500 files on a 386 file server.
6.1.1 How BrightWorks' Metering Works
Think of the metering capability as a public library. You go to the
library to check out a copy of a book (i.e., software). The library
only has two copies of this book, and they are both checked out.
The library places your name on a waiting list (i.e., queue); you then
have the option to check out the book once it becomes available.
Once the copy is available, the first person on the waiting list is notified.
The library holds this book exclusively for this person for a predetermined
amount of time (i.e., queue-back time).
If after that time the person has not checked out the book, the next
person on the list is notified of the book's availability. If no one
else is waiting for the book, it is returned to the shelf for anyone's use.
BrightWorks' metering works in much the same way. User requests to
run applications go through the license server. This program checks
for the application's availability; if it is available, the user is allowed
to run the program.
Once the maximum number of users is reached (as set by the network
administrator), any further attempts to access the software are prevented.
The metering capability then places all other potential users on a
waiting list (queue), unless otherwise specified by the network administrator.
Users that are placed in the queue are notified when a free copy
of the application is available. The application is held for the
exclusive use of the notified user for a specified number of minutes.
If the user does not access the application within this time period, it
is offered to the next user in the queue.
6.1.2 Access to Metering Setup Functions
The functions needed to setup applications for metering are accessed
in two ways:
o by choosing the Metering button from the tool bar, or
o by choosing the Metering command from the Administration menu.
6.1.3 What's in this Chapter
The following chart describes the sections in this chapter:
SECTION DESCRIPTION
Metered Applications Describes the parts of a metered
application.
Registering Applications for Describes procedures for adding,
Software Metering modifying and deleting metered
applications in the metering
capability.
Attaching to and Detaching from Describes procedures for attaching
File Servers to and detaching from file servers
while using the metering capability.
6.2 Metered Applications
A metered application is a software application(s) that has been
registered with BrightWorks for software metering. When registering
a file(s), you need to gather the following information for each application:
o File(s) to Meter - the list of files to be registered. For example, wp.exe.
You can also meter suites of applications, such as Microsoft Office, to
ensure accurate license compliance. The executables for the applications in a
suite would appear in this section.
o Metered Application Name - the name of the application(s) to be
registered. For example, WordPerfect.
o Full Name - the entire name of the product or application. This
field is ideal for entering descriptive information. For example,
WordPerfect Version 5.1 for DOS.
o Maximum Number of Concurrent Users - the total number of licenses
purchased for this application.
o Password - an optional password that restricts access to the
metering configuration for this metered application. If you decide
to assign a password to an application or to a suite of applications,
you must supply this password before configuring this metered application
(or suite) again.
o Queue Back Time - the amount of time that the application (or suite)
is held exclusively for a user waiting in the queue.
o Directories in which Trustee Rights are Granted During Execution - an
option that lets you grant temporary rights (trustee assignments) while
an application (or suite) is running.
6.3 Registering Applications for Software Metering
To control the number of simultaneous users of an application, you must
register the application with BrightWorks. When registering a product,
you need the information described in the previous section. Once a file
is registered, BrightWorks ensures that only the specified number of
concurrent users are using that application simultaneously.
Use the following procedure to register an application for metering.
1. Choose the Metering command from the Administration menu. From the
sub-menu that displays, choose the Define Metered Applications command.
The Define Metered Application dialog box displays. This dialog box
displays all files currently registered to be metered. (If you have not
registered any files for metering, the list will be blank.)
This dialog box offers the following options:
o Add - allows you to register an application for metering.
o Modify - allows you to change the information already
entered for a metered application.
o Delete - allows you to remove an application from metering.
o Attach to/Detach from File Servers - allows you to attach
to or detach from different file servers while in BrightWorks.
2. Choose the Add button to register a metered application.
The Add Metered Application dialog box displays.
3. Choose the Add button.
The Browse for Files to Meter dialog box displays.
4. Select the appropriate filename (and directory, which is optional)
from the list and choose the OK button to insert that filename in the
File(s) to Meter text box. You can select multiple files for suite
metering.
NOTE: To include the file's entire path, select the Include Path option.
The entire path and file name will be inserted in the File(s) to Meter
text box.
You are returned to the Add Metered Application dialog box.
5. Select the Metered Application Name text box and enter the metered
application name.
For example: WordPerfect. You cannot enter spaces in the metered
application name.
6. Select the Full Name text box and type the full name of the application.
You can also enter descriptive information about the application
you are metering. For example: WordPerfect Version 5.1 for DOS.
7. Select the password text box and enter a password for this
Metered Application (optional).
Entering a password is optional. If you assign a password to this
application or suite, you must provide this password before
reconfiguring this metered application (or suite of applications).
The password does not appear in the Password text box.
NOTE: Assigning a password does not require users to enter that password
before running the application. Instead it protects the metered application
information you entered from any unauthorized changes.
8. Select the Maximum Number of Concurrent Users text box and enter
the number of licenses you have purchased for this application.
One is the default.
9. Select the Queue Back Time text box and enter an appropriate length
of time.
Entering a Queue Back Time is also optional. Queue Back Time is the
length of time in minutes that an application is held exclusively for a
queued user after he or she has been notified of its availability.
If no time is specified, the queue-back feature is disabled.
The default time is five minutes.
10. If you want to grant trustee rights continue with the next section.
Otherwise, choose the OK button to exit this dialog box.
If you choose the OK button, you have finished registering this
application for software metering.
NOTE: The information that you entered for the metered application
can be changed if necessary.
6.3.1 Trustee Rights
This option allows you to grant temporary rights (trustee assignments)
to users while an application is running.
This option is only in effect for users running NetWare 3.x. As the
network administrator, you always have access to this feature, but only
users running NetWare 3.x can be granted trustee assignments.
For example, you can configure the metering of an application so that a user
has rights to the ACCOUNTS directory only while he or she is running the
Accounts Receivable package. This prevents users from
copying/viewing/deleting financial data files from outside the application.
Please note the following when using this option:
o Rights for Named File Only - Secured Directory rights are available
only for the file whose execution is being tracked. For example,
if the application is WordPerfect (WP.EXE), you have Secured Directory
rights while running this application. However, if you issue the DOS Shell
command and exit into DOS, all rights are revoked until you EXIT back
to WordPerfect.
o Use Group Inheritance for Continuous Rights Inheritance - if you need
a continuous "base" of rights in a directory affected by a Secured
Directory definition, you MUST define those rights via SYSCON's Group
Inheritance.
o Supervisor Equivalent - if a user is a Supervisor or has Supervisor
Equivalence, the Directory Security Mask feature does not affect that user.
o Spawned Applications - if you define Directory Security for an application
and that application calls another application (e.g., a menu system), the
called application will not automatically receive Directory Security rights.
If you wish the called application to have Directory Security rights, you
must meter and grant rights to each called application.
NOTE: You must have either SWATCHER.TSR or SMRAGENT loaded to
activate the trustee windows necessary to assign rights to your network users.
Use the following procedure to grant trustee rights.
1. From the Add Metered Applications dialog box, choose the Directories
button.
The Select a Drive/Directory dialog box displays. This dialog box
allows you to traverse all directories.
2. Double click on the desired drive.
A list of directories on that drive displays.
3. From the list, double click on the desired directory.
The new drive/directory displays as your Current Directory. This
is where you will grant trustee rights.
4. Choose the OK button to grant rights.
The Select Rights Mask dialog box displays.
5. To assign rights, select the desired right from the Rights Available
to Grant list and then choose the Include button.
The right displays in the Rights Granted list.
To include all rights, choose the Include All button.
If you wish to remove a right you have already assigned, select the
right from the Rights Granted list and then choose the Remove button.
To remove all rights, choose the Remove All button.
6. Choose the OK button to exit the Select Rights Mask dialog box.
In the Add Metered Applications dialog box, the rights you assigned
and the directory in which they were assigned are shown in the text box.
7. Repeat steps 1 through 6 for all directories where you wish to grant
rights.
8. Choose the OK button to exit the Add Metered Applications dialog box.
Notice that the directories in which you granted rights are shown in
the Directories in Which Trustee Rights are Granted list.
This completes registering this metered application.
6.3.2 Modifying an Application's Metering Configuration
You can modify any of the metered application information you provided
when registering the software for metering.
Use the following procedure to change metered application information.
1. Choose the Metering command from the Administration menu. From the
sub-menu that displays, choose the Define Metered Application command.
The Define Metered Application dialog box displays.
2. Select the application you wish to modify.
3. Choose the Modify button.
If the application does not have a password associated with it,
the Modify Metered Application dialog box displays with all the
information you provided when registering this application for
metering.
If the application (or suite) does have a password assigned to it, a
dialog box displays prompting you to enter that password. Enter either
the Metered Application or the Supervisor Password and then choose
the OK button.
4. Select the file(s) you wish to modify from the File(s) to meter list box.
This list box allows you to meter a suite of applications that share a
license agreement. For example, if you have one license agreement which
covers three applications, only one person should be able to access any
of these three applications at one time (as opposed to three different
users using the three different applications at one time). By selecting
all the files belonging to a suite of applications, you can modify the
name, password, maximum number of concurrent users, queue back time and
trustee rights for all files under a single license.
5. Make all necessary changes to the information shown in the window
by selecting the text box and typing the new data.
NOTE: The changes you make do not take effect until you choose the OK button.
The file server console reflects the changes made by displaying
"Refreshing Filename Table for Metered Applications."
6. Choose the OK button to exit the Modify Metered Application dialog
box and save your changes.
You are returned to the Define Metered Application dialog box where
you can either modify other applications or exit this dialog box by
choosing the Close button.
6.3.3 Modifying Trustee Rights
In addition to changing the metered application information described
in the previous section, you can also reassign or delete the trustee
rights you had previously granted.
Use the following procedure to modify trustee rights.
1. From the Modify Metered Application dialog box, select the directory
whose rights you wish to modify.
2. Choose the Modify Mask button.
The Select Rights Mask dialog box displays.
3. Include additional rights by selecting the desired right from the
Rights Available to Grant list and choosing the Include button.
You can also include all available rights by choosing the Include All
button.
4. Remove existing rights by selecting the desired right from the Rights
Granted list and choosing the Remove button.
You can remove all the granted rights by choosing the Remove All button.
5. Choose the OK button to exit the Select Rights Mask dialog box.
The Modify Metered Application dialog box displays with the changes
you made to the granted rights.
6.3.4 Deleting Rights
You can also delete all the rights you assigned from the Modify Metered
Application dialog box.
NOTE: Deleting rights does not delete any of those rights which users
may have permanently assigned to them through Novell's system.
Use the following procedure to delete trustee rights.
1. Select the desired directory from the Directory In Which Trustee
Rights Are Granted list.
2. Choose the Delete button.
The rights are removed from this directory.
6.3.5 Deleting Metered Applications
You can remove an application from the metering capability. This procedure
does not remove the application from your network; it merely releases it from
being metered by BrightWorks.
Use the following procedure to delete applications from BrightWorks'
metering capability.
1. Choose the Metering command from the Administration menu. From the
sub-menu that displays, choose the Define Metered Applications command.
The Define Metered Application dialog box displays.
2. Select the application to delete.
3. Choose the Delete button.
If the application has a password associated with it, you are
prompted to enter that password.
4. From the prompt that displays, choose the Yes button to delete the
metered application.
5. Choose the Close button to exit this window.
6.4 Attaching to and Detaching from File Servers
BrightWorks' metering offers you flexibility in managing your network
applications. Many of the Metering dialog boxes allow you to attach to
and detach from file servers in a multi-server environment on your LAN.
Using the Attach and Detach buttons, you can change file servers quickly
and easily. In doing so, you can control metering on any file server you
wish. This feature allows you to log in and out of file servers
while using BrightWorks.
This tool will be particularly useful when you register applications
for software metering.
The following section describes the attaching and detaching procedures.
6.4.1 Attaching to a File Server
The steps outlined in these two sections describe attaching to and
detaching from file servers from the Configuration Options dialog box.
Many of BrightWorks' metering dialog boxes have Attach and Detach buttons.
NOTE: If you choose these buttons from a dialog box, you can skip
step 1 of these two procedures.
Use the following procedure to attach to a file server.
1. Choose the Metering command from the Administration menu. From the
sub-menu that displays, choose the Configuration Options command.
The Configuration Options dialog box displays. Your current server
automatically displays; you can choose another server from this list box.
2. Choose the Attach button.
The Attach to Server dialog box displays.
3. From the list box, select the file server to which you wish to attach.
4. Enter your user name and password to attach to that file server.
5. Choose the OK button to exit this dialog box.
6. Choose the OK button to exit the Configuration Options dialog box.
6.4.2 Detaching from a File Server
Use the following procedure to detach from the current file server.
1. Choose the Metering command from the Administration menu. From the
sub-menu that displays, choose the Configuration Options command.
The Configuration dialog box displays. Your current server
automatically displays; you can select a different file server from
this list box.
2. Choose the Detach button.
The Detach from Server dialog box displays.
3. Select the desired file server from the drop-down list box.
4. Choose the OK button to detach from this file server.
NOTES: a - You cannot detach from the file server from which BrightWorks was
launched.
b - You cannot detach from a file server if it is the only file server to
which you are attached or if it is your current file server.
5. Choose the OK button to exit the Configuration Options dialog box.
That concludes this chapter. The following chapter explains how to use
the security features available with BrightWorks.
7.0 Using the Security Features
Chapter 6 explained how to set up applications for software metering.
This chapter explains how to use the security features available with
BrightWorks.
NOTE: This chapter pertains to BrightWorks and SiteMeter.
7.1 Introduction
BrightWorks' metering offers a number of features that secure and
protect your network software by preventing viruses and unauthorized
access to local drives.
The file integrity scanning feature guards your LAN against potential
infection from viruses. A virus is an additional process that attaches
itself to or maliciously alters an executable file. A virus can cause
many problems on your network, such as:
o Rename or destroy data
o Create a program that can cause the workstation to hang or possibly crash
o Cause a program to run in a continuous loop
o Make a program consume more memory than is necessary
With file integrity scanning you reduce the risk of virus infection.
BrightWorks provides other security features related to local drive use.
You can control which users have access to their local drives to prevent
unauthorized software and program installation. With BrightWorks' metering,
you can define rights to local execution for all users or for specific users.
7.1.1 Access to Security Functions
The security functions are accessed in two ways:
o by choosing the Security button from the tool bar, or
o by choosing the Security command from the Administration menu.
7.1.2 What's in this Chapter
The following chart describes the sections in this chapter:
SECTION DESCRIPTION
File Integrity Scanning Describes procedures for defining
authorized files on your network.
Running Unauthorized Files Describes procedures for allowing
unauthorized files to run on your
network.
Specifying the File Scan Describes procedures for instructing
Interval the metering capability how often it
should check for unauthorized files on
the network.
Specifying the Security Scan Describes procedures for instructing the
Interval metering capability how often it should
check for network users who have not loaded
Swatcher.
Disabling Local Drives Describes procedures for denying users
any access to their local drives.
Restricting Local Execution Describes procedures for disallowing users
to execute applications from their local
drives.
Specifying Security Exceptions Describes procedures for determining which
users are allowed to use the network without
loading Swatcher.
7.2 File Integrity Scanning
To prevent virus infection, BrightWorks checks files for changes before
allowing them to execute.
The first step is registering (or authorizing) your files for scanning.
Once you register your software, only files that have a fingerprint matching
the fingerprint registered are allowed to run.
Every time the file is run (or at specified intervals), the fingerprint
value is recalculated and compared to the value that had been originally
registered. If the two do NOT match, the file is not allowed to run.
With this method of file protection it is not necessary to recognize a
particular virus strain. Any byte change is detected and treated as a
potential virus.
This section describes the two steps to file integrity scanning:
o Register (or Authorize) the files
o Set the File Integrity Scan Interval
7.2.1 What Are Authorized Files?
An authorized file is a file that has been registered for file integrity
scanning. If a file is not an authorized file and you do NOT allow
unauthorized files to be run, it will not be allowed to execute.
Metering records the characteristics of each authorized file and
stores this value in the NetWare bindery.
With the security features included in BrightWorks' metering, you can:
o Add - new files to the list of authorized files.
o Reprotect - files that have been changed, as in the case of an upgrade.
o Delete - files from the authorized files list.
7.2.2 Adding Authorized Files
To register a file for virus protection, you need to add it to the list
of authorized files.
Use the following procedure to add a file to the authorized files list.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Define Authorized Files command.
The Define Authorized Files dialog box. From this dialog box you can:
o Add files to the Currently Authorized Files list.
o Reprotect files that are already authorized.
o Delete files that have been authorized.
2. Choose the Add button.
The Browse for Files to Authorize dialog box displays.
3. Select the desired drive and directory.
4. Select a file from the File Name list.
You can select all the files in this directory by pointing to the
first file in the File Name list, holding down the left mouse button
and dragging the cursor down. This highlights all the files that
will be authorized.
5. Choose the OK button.
Any files you just chose now appear in the Currently Authorized Files
list.
7.2.3 Reprotecting Authorized Files
You can reprotect a previously authorized file, which should be done
for applications that have been upgraded. Reprotecting a file recalculates
the file's checksum value.
NOTE: If you are using Swatcher to meter and file protect your network,
make sure Swatcher is not loaded when reprotecting a file.
Use the following procedure to reprotect a file.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Define Authorized Files command.
The Define Authorized Files dialog box displays.
2. Choose the file you wish to reprotect.
3. Choose the Reprotect button.
A message displays at the bottom of the window indicating that the
file is being updated for protection.
NOTE: You can also reprotect a file by double clicking on the appropriate
filename in the Currently Authorized Files list.
7.2.4 Deleting Authorized Files
You can remove authorization from a file. This does not remove the file
from the network; it merely removes the BrightWorks security protection
features for the file. When you do this, the file will be allowed to
execute regardless of any changes made to the file. (It will not, however,
be allowed to run at all when unauthorized files cannot be run.)
Use the following procedure to remove an authorized file from registration
for file integrity scanning.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Define Authorized Files command.
The Define Authorized Files dialog box displays.
2. Select the file to be deleted.
3. Choose the Delete button.
A prompt displays asking you to verify your choice to delete the
file protection from this file.
4. Choose the Yes button if you wish to remove the file protection.
7.3 Running Unauthorized Files
This option instructs BrightWorks whether or not to permit execution
of currently unauthorized files on the network. Using this option
prevents unauthorized software from being run on the network. When this
option is enabled, only the listed application files are allowed to run.
The Specify Policy dialog box lets you specify on which file server(s)
you wish to allow or disallow unauthorized files to run.
NOTE: Make sure BWORKS.EXE is always an authorized file. If BWORKS.EXE
is not an authorized file and you choose to use the unauthorized files
option, you will NOT be able to run BrightWorks. Also make sure LOGIN.EXE
is always an authorized file. If LOGIN.EXE is not an authorized file and
you choose to use the unauthorized files option, users will be unable to
log in to the network.
7.3.1 Using Run Unauthorized Files
Use the following procedure to specify whether or not unauthorized files
should be run.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Specify Policy command.
The Specify Policy dialog box displays. This dialog box allows you to
specify on which file servers you allow unauthorized files to run.
The Current Server list box automatically displays your current server.
You can attach to or detach from other file servers using the Attach and
Detach buttons.
NOTE: The default is to have the option enabled. Step 2 disables this option.
2. If you do not wish to allow unauthorized files to be executed, select
the "Allow unauthorized files to be executed" option.
The "x" disappears from the box, indicating that you do not allow files
that are not authorized to run on the network.
3. Choose the OK button to save your change and exit the dialog box.
7.4 Specifying the File Scan Interval
File Scan Interval tells BrightWorks how often to check the executable
program against the registered copy of that file.
To check a file every time it is requested, set the File Scan Interval
to zero (0). If your file server has heavy network traffic, however, you
may want to adjust this value to a figure more appropriate for your needs.
The value can range from 0 to 1440 minutes (once every 24 hours). The value
you set applies to ALL authorized files.
Regardless of the value, the file is always checked against the registered
copy the first time it is requested. If the field is set to 15 minutes,
however, no matter how many times the file is executed it will not be checked
again for 15 minutes after the first check. The first attempt to run
the software after the 15 minute interval will reset the time interval.
For example, you run LOTUS for the first time at 11:00 a.m. at which time
BrightWorks' metering checks the file. The next time the file will be
checked will be the first time it is requested after 11:15 a.m. (if the
File Scan Interval has been set to 15).
Use the following procedure to specify the file scan interval.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Specify File Scan Interval command.
The Specify File Scan Interval dialog box displays. From this
dialog box you can:
o Set the scan interval
o Attach to/Detach from a file
2. Use one of the following methods to set the interval and specify
how frequently the metering capability checks the executable:
o Click on the slide bar arrows to increment/decrement the value
in one minute intervals,
o Slide the slide bar to the appropriate value, or
o Click on either side of the slide bar to increment/decrement
the value by 10 minute intervals.
3. Once you have selected the appropriate time, choose the OK button.
7.5 Specifying the Security Scan Interval
The Security Scan Interval is the length of time between Security Scan
checks. This value indicates how frequently the metering capability scans
the network to be sure users on the network either have loaded the Swatcher
TSR or are listed as Security Exceptions.
If a user is not a Security Exception and has not loaded Swatcher, the
metering capability sends a NetWare Send message to the user indicating
that he or she will be logged off the file server in 30 seconds. This allows
the user enough time to save his or her work before being disconnected
automatically from the network. The user must load Swatcher before logging
in to the network again.
NOTE: Trying to load Swatcher after receiving the 30 second warning
will not prevent the user from being logged out.
Setting the value to 0 minutes informs metering not to check if Swatcher
is loaded. This is mandatory if you are NOT using the Swatcher TSR as
your choice to meter and file protect your network.
7.5.1 Specifying the Security Scan Interval
Use the following procedure to specify the security scan interval.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Specify Security Scan Interval command.
The Specify Security Scan Interval dialog box displays. From this
dialog box you can:
o Set the scan interval
o Attach to/Detach from file servers
2. Use one of the following methods to set the interval and specify
how often BrightWorks' metering capability checks users for the
Swatcher TSR:
o Click the slide bar arrows to increment/decrement the value
in one minute intervals,
o Slide the slide bar to the appropriate value, or
o Click on either side of the slide bar to increment/decrement
the value in 10 minute intervals.
NOTE: Setting the value to 0 minutes informs metering not to check if
Swatcher is loaded. This is mandatory if you are NOT using the Swatcher
TSR as your choice to meter and file protect your network.
3. Once you have selected the appropriate time, choose the OK button.
7.6 Disabling Local Drives
This option allows you to specify whether or not to disable local
drives entirely, essentially rendering the PC diskless. Disable Local
Drives is only available if you use Swatcher, the workstation security
agent method for metering and file protecting your LAN.
To use this option you must specify a Novell Group in which users will
not have access to their local disk drives. For example, you may want
to create a group named NODRIVE.
This NODRIVE group must be unique; the group you select for Disable Local
Drives cannot also be used for Restrict Local Execution.
NOTE: For information on creating these groups, refer to your Novell
User Manuals.
Use the following procedure to disable local drives.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Disable Local Drives command.
The Disable Local Drives dialog box displays. From this dialog box you
can:
o Include groups
o Remove groups
o Attach to/Detach from file servers
2. If you wish to add a group to the Groups With Disabled Local Drives list,
select the desired group from the Available Groups list and choose the
Include button.
The group is then moved from the Available Groups list to the Groups
With Disabled Local Drives list.
You can include all the available groups by choosing the Include All
button.
The groups you included now do not have access to their local drives.
3. If you wish to remove a group from the Groups With Disabled Local Drives
list, select the desired group from this list and choose the Remove
button.
The group is then moved from the Groups With Disabled Local Drives
list to the Available Groups list.
You can remove all groups from the disabled drives list by choosing
the Remove All button.
The groups you removed now have access to their local drives.
4. When you have completed moving groups, choose the OK button to save
your changes and exit.
7.7 Restricting Local Execution
BrightWorks' metering provides an option that restricts execution of
applications from local drives. By using this option, you can disallow
network users from running applications or other programs from the
hard drive. Users will still be able to access their local drives, but
will not be able to run any applications locally. This feature provides
an added layer of control over software usage on your network.
NOTE: If you decide to use this option please refer to the section
entitled DSW in Chapter 11.
This option is only available if you are using Swatcher, the workstation
security agent method of metering and file protecting your LAN.
To use this option you must specify a Novell Group in which users will
not be able to execute files from their local drives. For example, you
may want to name this group NOEXEC.
NOTE: For information on creating these groups, refer to your Novell User
Manuals.
Use the following procedure to restrict local execution.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Restrict Local Execution command.
The Restrict Local Execution dialog box displays. From this dialog
box you can:
o Include groups
o Remove groups
o Attach to/Detach from file servers
2. To add a group to the Groups With Restricted Execution list, select the
desired group from the Available Groups list and choose the Include
button.
The group is then moved from the Available Groups list to the Groups
With Restricted Execution list.
You can include all the available groups by choosing the Include All
button.
The groups you included now cannot execute applications from their
local drives.
3. To remove a group from the Groups With Restricted Execution list,
select the desired group from this list and choose the Remove button.
The group is then moved from the Groups With Restricted Execution list
to the Available Groups list.
You can remove all groups from the restricted list by choosing the
Remove All button.
The groups you removed now can execute all applications from their
local drives.
4. When you have completed moving groups, choose the OK button to
save your changes and exit.
7.8 Specifying Security Exceptions
If you are using Swatcher to meter and file protect your LAN, this option
allows you to specify those users who are not required to load Swatcher.
NOTE: If you decide to use this option please refer to the section
entitled DSW in Chapter 11.
The Security Exceptions is a list of users who are not required to load
the Swatcher TSR when logging in to the network.
7.8.1 How Security Exceptions Work
When using the Swatcher TSR method of metering and file protecting, you
can set a Security Scan Interval. (Refer to the section Specify Security
Scan Interval in this chapter.) This interval instructs the metering
capability how often it should check to verify that all users have loaded
the Swatcher TSR, except those specified in the Security Exceptions list.
If a user is a member of this list, he or she will not be disconnected from
the network if the metering capability finds that he or she does not have
the Swatcher TSR loaded.
7.8.2 Using Security Exceptions
Use the following procedure to define security exceptions.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Specify Security Exceptions command.
The Specify Security Exceptions dialog box displays. From this
dialog box you can:
o Include users
o Remove users
o Attach to/Detach from file servers
2. To add a user to the Security Exceptions list, select the desired user
from the Secure Users list and choose the Include button.
The user is then moved from the Secure Users list to the Security
Exceptions list.
You can include all the Secure Users by choosing the Include All button.
The users you included now are not required to load Swatcher when using
the network.
3. To remove a user from the Security Exceptions list, select the desired
user from this list and choose the Remove button.
The user is then moved from the Security Exceptions list to the Secure
Users list.
You can remove all users from the security exceptions list by choosing
the Remove All button.
The users you removed now are required to load Swatcher.
4. When you have completed moving users, choose the OK button to save your
changes and exit.
That concludes this chapter. The following chapter explains how to use the
metering's administration functions.
8.0 Using the Administration Features
Chapter 7 explained the metering capability's file integrity scanning and
security features. This chapter explains how to use metering's
administration functions to monitor application usage on your network.
NOTE: This chapter pertains to BrightWorks and SiteMeter.
8.1 Introduction
BrightWorks' metering gives you the tools you need to administer your
metered applications and monitor your network software usage. The metering
capability is extremely flexible, giving you maximum control in administering
your network. You can administer metering on different file servers and even
launch another BrightWorks capability.
Most of the administration functions described in this chapter can be
accessed from the application usage graph, giving you maximum flexibility
and control over your network applications. You can do all of the
following to monitor your metered applications:
o View the current metering settings
o View a list of all the metered applications for a specified file server
in addition to the number of current, peak and queued users and the number
of licenses
o View information about and send messages to both current and queued users,
as well as release them from metering
o Perform a query to update the application usage information throughout
the network
o Set the interval in which the application usage is updated
o Set the high value for the usage scale
o Conceal the status bar located at the bottom of the Application Usage
dialog box
o Purge stored data
8.1.1 Access to Metering's Administration Functions
The metering administration functions are accessed in several ways:
o by choosing the Monitor button from the tool bar,
o by choosing the Monitoring command from the Administration menu,
o by choosing the Security command from the Administration menu, or
o by choosing the Hide/Show command from the File menu.
8.1.2 What's in this Chapter
The following chart describes the sections in this chapter:
SECTION DESCRIPTION
Viewing Metering Settings Describes procedures for displaying
a comprehensive list of settings
about metering on your network file
servers.
Viewing Application Usage Describes procedures for accessing
the Application Usage Graph.
Monitoring and Controlling Describes procedures for viewing user
information, sending Application
Usage messages, releasing current
users from metering, and launching
another McAfee capability in a
context-sensitive manner.
Modifying and Updating the Application Describes procedures for changing the
Usage Graph maximum number of concurrent users,
changing the usage scale, changing
the colors on the graph, performing a
query, setting the query timer, and
concealing the status bar.
Controlling Data Files Describes procedures for specifying
if historical data should be stored
on a file server, purging usage data,
and purging security data.
8.2 Viewing Metering Settings
BrightWorks' metering lets you view all the metering settings for a file
server.
With this feature, you can access the following important information:
o Current Server - indicates the file server to which you are presently
attached.
o SiteMeter NLM - indicates whether the SiteMeter NLM is active (loaded)
or inactive.
o SiteMeter Proxy NLM - indicates whether the SiteMeter Proxy NLM is
active (loaded) or inactive.
o Unauthorized Files - indicates whether unauthorized files are allowed
to run.
o File Integrity Status - indicates how often authorized files are
checked for any changes.
o Current Home Directory - indicates the directory where the SITEDATA,
VIRUSDTA, and SMRPROXY files are located.
o Swatcher Users - indicates whether users are checked to verify that
the Swatcher TSR is loaded and also indicates the time interval in which
they are checked.
o Status of Swatcher - indicates whether or not Swatcher is loaded on the
workstation.
o Status of Windows Metering Agent - indicates whether or not SMRAgent
is loaded on the workstation.
Use the following procedure to view the current metering settings.
1. Choose the Metering command from the Administration menu. From the
sub-menu that displays, choose the View Metering Status command.
The View Metering Status dialog box displays. If you are not attached
to the desired file server, use the Attach button.
The current server displays automatically. You can view the settings
for other file servers by choosing the desired file server from the
list box.
2. Choose the Close button to exit this dialog box.
8.3 Viewing Application Usage
The metering capability gives you the ability to view application usage on
a specified file server. Using this feature, you can determine which
applications are being used on the network, which applications have
queued users, what the peak usage for an application is, and more.
Use the following procedure to access the application usage graph.
1. Choose the Monitor button from the tool bar.
The View Application Usage dialog box displays.
2. Select the desired file server.
If you are not currently attached to the desired file server, choose
the Attach button and then supply your user name and password for that
file server.
3. Choose the OK button.
The Application Usage window for the file server you have selected
displays.
From this window you can view in graph form the number of:
o Current users of all metered applications
o Queued users of all metered applications
o Peak users of all metered applications (the total number of
current users plus the total number of queued users)
o Maximum Number of Concurrent Users of all metered applications
(the total number of licenses purchased for this application)
You can also view the following application information from this window:
o Number of Current Users
o Number of Queued Users
o Number of Peak Users
o Number of Licenses
This information can be viewed either on the graph itself or with
pop-up boxes.
Use the following procedure to view this information with the pop-up boxes.
1. Select the desired application from the list along the left hand side
of the window.
When the cursor is in this area, it changes to a magnifying glass.
2. Hold down the left mouse button to display an information box that
contains the above information.
8.4 Monitoring and Controlling Application Usage
BrightWorks' metering gives you extensive monitoring capabilities over
both current and queued users. You can view and even control a user's
use of metered applications-all from the application usage graph.
This section describes administering both current and queued users using
the following tools:
o View who the current and queued users are for an application
o Send messages to current and queued users
o Release current users from metering
o Edit the queued user list
o Launch another BrightWorks capability in a context-sensitive fashion
NOTE: The steps in the rest of this section assume you have accessed the
application usage graph.
8.4.1 Administering Current Users
From the application usage graph, you can view the names of the individual
users using an application, as reflected by the graph bars. This is
particularly helpful if other users are trying to access an application.
Once you find out which users are using the application currently, you can
determine when a copy will be available by asking those users on the list
how much longer they will be working in the desired application.
Once you access this list, you have additional administrative options.
Use the following procedure to view the names of the users who are currently
using an application.
1. In the application usage graph, position the cursor to the area to the
right of the application name within the graphic display.
A small menu box should be attached to the bottom right of the arrow.
If there is no menu box, the cursor is not pointing to a place where
information is available. Information is available where the number of
users (queued, peak and current) are displayed with graph bars.
2. Click here to display a pop-up menu.
When the pop-up menu displays, the application in question is outlined
in the list along the left hand side of the window.
This menu contains the following items:
o View Current Users - the list of users currently using this
application
o View Queued Users - the list of users who are currently waiting
to use this application
o Edit Queued User List - list of queued users who you can add or
delete with this option
NOTE: If the Queue Back Time is set to zero (0), the View Queued Users and
Edit Queued User List options are disabled.
3. Choose the View Current Users command.
The Current Users window displays listing all the users who are currently
using this application.
From this window you can:
o Send a Message - send a Novell message to a user
o View User Information - view a user's login information
o Release a user - release a user's hold on a metered application
o Launch another application - access another BrightWorks
capability in a context-sensitive manner
The following sections describe each of these features.
8.4.2 Sending a Message to a Current User
You can send messages to current users from the Current Users window.
This is useful if you want to know when a user will be finished using an
application.
Use the following procedure to send a NetWare Send message to a user who
is currently using an application.
1. From the Current Users window, choose the user to whom you wish to
send the message.
A pop-up menu displays.
2. Choose the Send Message command.
The Send Message To User dialog box displays.
3. Enter the message in the text box provided.
4. Choose the OK button to send the message.
8.4.3 Viewing Current Users' Information
From the Current Users window, you can find out important information
about users using applications on your network.
The following information can be displayed about a selected current user:
o Login Name - user's login name
o Full Name - user's full name
o Server - file server to which this user is attached
o Logical Station - the station number that is arbitrarily assigned
to a workstation
o Network - network number of the workstation where this user is located
o Station Address - node address of the workstation where this user is
located
o Time into Network - length of time this user has been logged in to the
network
o Application - application which the user is currently using
o Time into Application - date and time the user launched the application
Use the following procedure to view this information.
1. From the Current Users window, select the desired user.
A pop-up menu displays.
2. Choose the User Information command.
The Current User Information dialog box displays.
3. Choose the Close button to exit this dialog box.
8.4.4 Releasing a Current User from a Metered Application
The Release command lets you release a current user from being metered in
an application. This is helpful in the following scenario:
John is using the last available copy of WordPerfect. He goes into a
meeting with his workstation still running the application. Meanwhile,
Karen needs to use a copy of WordPerfect. The network administrator can
release John's copy of WordPerfect from metering, freeing up a licensed copy
for Karen.
When John returns from his meeting, he can still use the copy of
WordPerfect running on his workstation (using the release feature does
not exit that user from the application). Once he exits WordPerfect,
however, he cannot get back in until another copy of the software frees up
on the network.
NOTE: If you use the Release feature, you may be in violation of your
software vendor's license agreement.
Use the following procedure to release a current user from metering.
1. From the Current Users window, choose the user whom you wish to release.
A pop-up menu displays.
2. Choose the Release command.
3. If the metered application has a password associated with it, you are
prompted to enter the password.
Enter the appropriate password and choose the OK button.
4. At the prompt choose the Yes button to verify your choice to release
this user from metering.
Choose the No button to exit the message box without releasing the user.
If you chose the Yes button, the selected user is released from metering.
The copy of the application he or she is using is released for use by
another user.
8.4.5 Launching another BrightWorks Capability
From the menu, you can also launch another BrightWorks capability
(NETremote+ or LAN Support Center) in a context-sensitive fashion.
When launching the capability, it automatically configures it to the
current user you selected. For example, if you selected Jane and then
launched the remote capability, you would have control of Jane's PC.
NOTE: Users must have the executables for these programs in their search
path.
Use the following procedure to launch another BrightWorks capability.
1. From the Current Users window, select the desired user.
2. Choose the desired capability (either remote or tickets) from the
drop-down menu.
NOTE: If you do not have either of these applications (NETremote+ or
LAN Support Center) loaded, an error box displays notifying you that the
executable could not be found. The executables for these applications
should be placed in a search path mapping.
8.4.6 Administering Queued Users
From the application usage graph, you can view the names of the individual
users waiting to use an application, as reflected by the graph bars.
Once you access this list, you have several administrative options.
Use the following procedure to view who the queued users are.
1. In the application usage graph, position the cursor in the area to
the right of the application name within the graphic display.
A small menu box should be attached to the bottom right of the arrow.
If there is no menu box, the cursor is not pointing to a place where
information is available. Information is available where the number of
users (queued, peak and current) displays with graph bars.
2. Click here to display a pop-up menu.
When the pop-up menu displays, the application in question is outlined
in the list along the left hand side of the window.
3. Choose the View Queued Users command.
The Queued Users window displays listing all the users who are waiting
to use this application.
From this window you can:
o Send Message - send a Novell message to a queued user
o Edit Queued User List - add or delete users in the queue for
a specific application
o View User Information - view a queued user's login information
o Launch another application - access another BrightWorks capability
in a context-sensitive manner.
Each of these options is described in the following sections.
8.4.7 Sending a Message to a Queued User
If there are users waiting for an application you can send them a message.
This is particularly useful if you want to notify them of what number they
are in the list or which user may be finishing with the application soon, etc.
Use the following procedure to send a NetWare Send message.
1. From the Queued Users window, choose the user to whom you wish to send
the message.
A pop-up menu displays.
2. Choose the Send Message command.
The Send Message To User dialog box displays.
3. Enter the message in the text box provided.
4. Choose the OK button to send the message.
8.4.8 Editing the Queued User List
You can add and remove users to and from the queued user list. This is
particularly useful if a user does not want to be queued for an application.
Use the following procedure to edit the queued user list.
1. From the Queued Users window, choose the list of Queued Users.
The Edit Queued Users List dialog box displays listing the following
information:
o List of non-queued and non-current users
o List of queued users
2. If you want to add users to the queue, select the desired users from
the Non-Queued/Non-Current Users list and choose the Include button.
The user is moved to the Queued Users list. Use the Include All button
to include up to eight Non-Queued/Non-Current Users.
3. If you want to remove a user from the queue, select the desired users
from the Queued User list and then choose the Remove button.
The user is moved to the Non-Queued/Non-Current Users list. Use the
Remove All button to remove up to eight non-queued/non-current users at
once.
4. Choose the OK button to save your changes and exit.
8.4.9 Viewing Queued Users' Information
The following information can be displayed about a selected queued user:
o Login Name - user's login name
o Full Name - user's full name
o Server - file server to which this user is attached
o Logical Station - the station number that is arbitrarily assigned
to a workstation
o Network - network number of the workstation where this user is located
o Station Address - node address of the workstation where this user is
located
o Time into Network - length of time this user has been logged in to the
network
o Application - application which the user is currently waiting to use
Use the following procedure to view this information.
1. From the Queued Users window, select the desired user.
A pop-up menu displays.
2. Choose the User Information command.
The Queued User Information dialog box displays.
3. Choose the Close button to exit this dialog box.
8.4.10 Launching another BrightWorks Capability
From the menu, you can also launch another BrightWorks capability
(NETremote+ or LAN Support Center) in a context-sensitive fashion. When
launching the capability, it automatically configures it to the current
user you selected. For example, if you selected Jane and then launched the
remote capability, you would have control of Jane's PC.
NOTE: Users must have the executables for these programs in their search
path.
Use the following procedure to launch another BrightWorks capability.
1. From the Queued Users window, select the desired user.
2. Choose the desired capability (either remote or tickets) from the
drop-down menu.
NOTE: If you do not have either of these applications (NETremote+ or
LAN Support Center) loaded, an error box displays notifying you that the
executable could not be found. The executables for these applications
should be placed in a search path mapping.
8.5 Modifying and Updating the Application Usage Graph
The metering capability offers a number of features that enhance your
usage of the application usage graph. The following sections describe all
of these options.
8.5.1 Modifying Application Information
While viewing the application usage graph, you can make changes to the
number of maximum concurrent users and to other parts of metered applications
(e.g., queue back time, trustee rights, etc.).
8.5.2 Changing the Number of Maximum Concurrent Users
By changing the number of maximum concurrent users, you can increase and
decrease the number of licenses on your network as is necessary.
Use the following procedure to change this value.
1. In the application usage window, position the cursor at the end of the
Number Licensed line (i.e., point to the end of the vertical line).
When you position the cursor on this line, the cursor should change from
an arrow to a horizontal black double-arrow.
2. Click and hold down the left mouse button.
3. Drag the line to the desired value.
The Count box in the status bar at the bottom of the window displays the
number of licenses as you move the cursor to select a new value.
NOTE: You can also modify the Maximum Number of Concurrent Users value by
choosing the Define Metered Application option of the Administration Metering
Menu. Select the metered application you wish to modify and then choose the
Modify button. You can now edit the value.
If you wish to change the value from the Modify Metered Application dialog box,
double click on the application name in the left hand side of the application
usage graph.
4. Once you change the value, the Edit License Maximum dialog box displays
to confirm your change.
This dialog box displays the following information:
o Server - the current file server
o Application - the name of the metered application
o Current Maximum - the current maximum number of licenses for
this application
o New Maximum - the new value you dragged to for this application
5. If you wish to accept the new Maximum Number of Concurrent Users value,
choose the OK button.
If this value is not the desired number of licenses, you can also edit
the value by simply typing over it in the text box.
8.5.3 Changing Metered Application Information
You can alter any of the metered application information you entered when
registering applications for metering.
Use the following procedure to change this information from the application
usage graph.
1. Double click on the desired application in the list in the left hand
side of the window.
The Modify Metered Application dialog box displays.
2. Follow the steps in Chapter 6 to change the metered application
information.
8.5.4 Changing the Usage Scale
The Usage Scale is the scale displayed across the top of the Application
Usage window. By changing the high value for the graph, you can increase
or decrease the number of users shown. For example, if you have 250
workstations on your network, you can set the high value to 250 to allow
the bars to indicate usage by all your network users. If your network is
large, but the number of licenses and concurrent users is small, you can
set the value lower. With this flexibility, you can change the graph to be
best suit your viewing needs.
Use the following procedure to change the usage scale.
1. While displaying the usage graph, position the cursor in the scale bar
directly beneath the title bar.
The cursor itself should change to a scale.
2. Double click to display the Edit View Usage Scale dialog box.
NOTE: You can also display this dialog box by choosing the Monitoring
command from the Administration menu and then the Edit View Usage Scale
from the sub-menu that displays.
3. Choose either Auto-scaled or User-defined.
o Auto-scaled - allows the metering Administration program
to determine the maximum value of the scale.
o User-defined - allows you to determine the maximum value of
the scale.
4. If you chose User-defined and wish to enter a high value, select the
High text box and type the value you wish to use.
NOTE: This value cannot exceed the maximum number of users for the file
server.
5. Choose the OK button to save your changes and exit this dialog box.
The usage scale beneath the title bar now reflects the new maximum you
specified.
8.5.5 Changing the Colors Used in the Status Bar
You can change the colors used in the status bar of the application usage
window that reflect the number of current, queued, peak and licensed users.
Use the following procedure to change these colors to best suit your viewing
needs.
1. In the application usage graph, position the cursor to one of the colors
in the status bar.
The cursor changes to a transparent arrow.
2. Double click at this point.
The standard Windows color palette for that key displays.
3. Select a new color.
4. Choose the OK button.
The new color is shown on the graph bars as chosen. The colors can be
changed for each item in the status bar.
8.5.6 Hiding or Showing the Status Bar
You can hide or show the status bar on the usage graph. Showing the status
bar lets you know which colors indicate current users, queued users, etc.,
as well as the count when you are changing the number of maximum concurrent
users.
Hiding it gives you more room to display the usage graph.
Use the following procedure to conceal the status bar.
From the File menu, choose the Hide Status Bar command.
This toggles the status bar on and off. When the status bar is hidden, this
command in the File menu changes to Show Status Bar. By choosing the Show
command, you can display the status bar again.
The usage graph reflects the application usage on your network. You can
update the graph to reflect any changes by performing queries.
8.5.7 Performing Queries
Every time a query is issued, either manually or automatically, the
metering capability updates the usage information on the graph. The
Query Indicator is the last item on the status bar. The indicator
displays for either manual or automatic queries.
The Query Now option allows you to update the application usage information.
Use the following procedure to instruct the metering capability to perform
a query at that point.
Select the Monitoring command from the Administration menu.
From the sub-menu that displays, choose the Query Now command.
The Metering function performs a query and updates the Application Usage
graph accordingly. The status bar at the right bottom of the window
reflects the query's progress.
NOTE: You can also access this feature by pressing <CTRL><Q>.
The Set Timer option allows you to determine how often the metering
capability checks with the file server for application usage information.
Use the following procedure to set the timer.
1. Choose the Monitoring command from the Administration menu. From the
sub-menu that displays, choose the Set Monitor Timer command.
The Set Monitor Timer dialog box displays.
2. Enter the desired value.
You can enter a value in seconds from 0 to 9999.
3. Choose the OK button.
NOTE: You can also access this option by pressing <CTRL><T>.
8.6 Controlling Data Files
BrightWorks' metering offers several utilities which enhance your control
over data files.
You can access the following options:
o Configuration Options - attaches to/detaches from file servers and
specifies the directory where the metering files reside.
o Purge Usage Information - removes the SITEDATA file from the home
directory.
o Purge Security Information - removes the VIRUSDTA file from the home
directory.
8.6.1 Configuration Options
Configuration Options let you attach to and detach from file servers,
specify the home directory for data files, and specify whether or not to
log historical usage and security data.
Use the following procedure to access this option.
1. Choose the Metering command from the Administration menu From the
sub-menu that displays, choose the Configuration Options command.
The Configuration Options dialog box displays.
You can attach to and detach from file servers using this option.
The Home Directory is explained in the next section.
8.6.2 Home Directory
This option allows you to define where the SiteMeter files reside.The default
directory determined at installation time is SYS:\SYSTEM\SITEMETR. However,
you can define the directory of your choice using this option.
Users need Read, Open, Search, Write, and Create rights to this directory.
Use the following procedure to use this option.
1. From the Configuration Options dialog box, select the Home Directory
for Data Files text box.
2. Type the appropriate directory (using the full path).
3. If you wish to track software usage and security information, select the
box next to "Log historical usage and security information."
When the box is checked, the metering capability logs the usage and file
protection information used in the reporting function.
The default is to have this box checked.
4. Choose the OK button.
8.6.3 Purging Stored Data
The metering capability gives you added control over your files by allowing
you to purge stored usage and security data. These functions are
particularly helpful should these files become corrupted.
8.6.4 Purge Usage Information
This option removes the SITEDATA file from the home directory.
NOTE: If metering needs to access the file after it is deleted, a new file
is automatically created.
Use the following procedure to purge usage information.
1. Choose the Monitoring command from the Administration menu. From the
sub-menu that displays, choose the Purge Usage Information command.
The Purge Usage Information dialog box displays. The list box displays
your current server.
2. From the Current Server list box, select the file server from which you
wish to purge the usage information.
If you are not attached to the desired file server, you can use the
Attach button.
3. If you are sure you want to purge all usage information on the specified
file server, choose the OK button.
8.6.5 Purge Security Information
This option removes the VIRUSDTA from the home directory.
NOTE: If metering needs to access the file after it is deleted, a new file
is created automatically.
Use the following procedure to purge security information.
1. Choose the Security command from the Administration menu. From the
sub-menu that displays, choose the Purge Security Information command.
The Purge Security Information dialog box displays. The list box
displays your current server.
2. From the Current Server list box, select the file server from which
you wish to purge the security information.
If you are not attached to the desired file server, you can use the
Attach button.
3. If you are sure you want to purge all security information on the
specified file server, choose the OK button.
That concludes this chapter. The next chapter provides information about
report generation.
9.0 Generating Reports
Chapter 8 explained the metering capability's administration features.
This chapter explains how to use the report utility.
NOTE: This chapter pertains to BrightWorks and SiteMeter.
9.1 Introduction
The metering capability's reporting module is a flexible tool designed to
help you manage your network more effectively. It puts important
information about application usage and software security at your
fingertips.
Using its simple Windows interface, you can generate the report you need
quickly and easily. And with a variety of report types and formats, you
can choose the one best-suited to your business needs. For example, run a
report on a single user to see what applications he or she uses. Or run a
report on all network applications that you meter to see which applications
are being used the most to get the information you need to determine
additional software needs. All of this flexibility is at your fingertips
with the reporting module.
BrightWorks also provides the capability to export coded data into
standard database formats. You can choose the database format best-suited
to your needs.
NOTE: The Crystal Reports software is installed using the Fusion install
utility. Refer to the installation instructions in Chapter 2 of this manual.
When installed, a Crystal Reports program icon is added to the MCAFEE
Program Manager group. Procedures for using Crystal Reports are presented
in Crystal.txt of this manual.
9.1.1 Access to Report Functions
The Report function is accessed by choosing the Metering and Security
command from the Reports menu.
9.1.2 What's in this Chapter
The following table describes the sections in this chapter:
SECTION DESCRIPTION
Exporting Files Describes procedures for exporting coded
data into standard database formats.
Generating Reports Describes procedures for running reports
with the metering capability.
The Report Window Describes all the capabilities and
features of the report window.
Report Types Describes the information given by each
of the different types of reports.
9.2 Exporting Files
The metering capability's report feature allows you to export coded data
to a standard database format.
Use the following procedure to export files.
1. Choose the Metering and Security command from the Reports menu.
The Reports window displays.
2. From the File menu, choose the Export command.
The Export dialog box displays.
3. From the Current Server list box, specify the server from which you
wish to export the coded file.
The current server displays automatically in the list box.
You can also attach to and detach from different file servers.
Choose the Attach button to attach to another file server.
4. Select one of the options to specify the source of the data you
are exporting.
The four options are:
o Sitedata
o Virusdta
o Metering Definitions
o Security Definitions
Sitedata and Virusdta are the files where metering stores its information.
The Metering and Security Definitions options retrieve the information
directly from the bindery. To select an option, simply click in the
appropriate radio button.
NOTES: a - Choosing Sitedata or Virusdta enables the Default and Browse
buttons. The filename text box automatically displays the default file
name. For Sitedata the default is SYS:\SYSTEM\SITEMETR\SITEDATA; for
Virusdta, the default is SYS:\SYSTEM\SITEMETR\VIRUSDTA.
b - You can also specify a different file name (if Sitedata or Virusdta
was stored in a different place) by entering the name in the text box
or by choosing the Browse button. Choosing the Browse button produces
the standard Windows Browse dialog box. Once you select the desired file
and choose the OK button, the file name you selected displays in the
Filename text box.
c - Because the Metering and Security Definitions options communicate
directly with the bindery to access the information, these options
are not needed and therefore are not enabled.
5. Choose the format for the exported data from the Format list box.
The available formats include:
o Lotus 123 2.1
o Lotus 123 3.x
o Quattro
o Lotus 123 1.x
o Symphony 1.1-2.2
o Symphony 1.0
o Excel 2.0
o Excel 3.0
o Excel 4.0
o dBase II
o dBase III
o dBase III Plus
o dBase IV
o Data Interchange Format
o ASCII (Tab delimiter)
o ASCII (Tab delimiter-guess numeric values)
o ASCII (comma delimiter-min quoted)
o ASCII (comma delimiter- strings quoted
o ASCII (comma delimiter-guess numeric values)
o Btrieve
6. Specify the file name for the new format.
Enter the desired file name in the Filename text box or choose
the Save As button. Choosing the Save As button produces the
standard Windows Save As dialog box. Once you specify the path and
file name and choose the OK button, you are returned to the Export
dialog box. The name you specified displays in the Filename text box.
7. Once you have specified all the above information, choose the OK button.
8. At the prompt that displays choose the Yes button to export the data.
You can also choose the No button to discontinue the export process.
If you choose the Yes button, the Export Status window displays.
This window contains the following information:
o Server - Indicates the server from which the data is being
exported.
o Input Source - Indicates whether the data being exported came
from Metering Definitions or Security Definitions (Input Source
will be blank if you chose Virusdta or Sitedata).
o Input File - Indicates if the data source was Virusdta or
Sitedata (Input File will be blank if you specified Metering or
Security Definitions).
o Output File - Indicates the name of the file to which the data
is being exported.
o Output Format - Indicates in what format the exported data will
appear.
The percentage complete bar tracks the progress of the exporting.
During the export, you can choose the Abort button to halt the exporting.
This button changes to Close once the export is complete. By choosing
Close, the output file is put into the current directory.
9.3 Generating Reports
Use the following procedure to generate a report.
1. Choose the Metering and Security command from the Reports menu.
The Reports window displays.
2. From the Reports menu, choose the Choose Report command.
The SiteMeter Reports dialog box displays with the following information:
o Current Server
o Report Type
o Source
o Print Destination
o Activity Date Range
o Filter Criteria
The dialog box also has OK, Cancel, Attach, and Detach buttons.
The functionality of all these options is explained in the following
steps.
3. From the Current Server list box, select the desired server.
The Current Server list box automatically displays your current server.
You can select another server by choosing one from the drop-down list
box.
You can also use the Attach and Detach buttons to attach to/detach from
other file servers.
4. From the Report Type list box, select a report type.
The list box provides these options:
o Metering Definitions (based on application usage)
o Application Summary (based on application usage)
o Application with User Detail (based on application usage)
o Application with User Summary (based on application usage)
o User Summary (based on user information)
o User with Application Detail (based on user information)
o User with Application Summary (based on user information)
o File Integrity Activity (based on protected file information)
o SPA Compliance (based on application usage)
o Software Purchase Forecast (based on application usage)
o Upgrade Purchase Forecast (based on application usage)
Your report selection drives the source file name, the activity date
range and the filter criteria. Based on what you choose here,
defaults will appear in these three sections of the dialog box.
5. Specify the source of the report in the Filename text box.
If the report type you selected in Step 4 uses data from a file,
the file automatically displays in this list box. For example, if
the report type uses the Sitedata file, the text box will read:
SYS\SYSTEM\SITEMETR\SITEDATA.
You can choose another file either by entering one directly in the
text box or by using the Browse button. The Browse button produces
the standard Windows Browse dialog box. Once you select the path
and file name and choose the OK button, you are returned to the Reports
dialog box. The selected file name displays in the Filename text box.
Choose the Default button to define the default file as the report source.
6. In the Print Destination section of the dialog box, specify where you
want to send the report.
The three options are Window, Printer, and File.
If you want to send the report to a file, select the appropriate file
from the File list box.
The options are:
o Space Separated - each field in the report is separated by a space
in the output file
o Tab Separated - each field in the report is separated by a tab in
the output file.
7. Set the Activity Date Range.
The From: and To: fields list the default data range (which is the
entire date range of the file that you have specified as the source of
the data). To change either date to view a particular range of
data, double-click in the field. The calendar displays.
The title of this box reflects the date currently set. Underneath this
is a bar listing the year; the arrows at either end of the date bar
allow you to go forward and backward to find a different year.
Underneath that is a similar bar with the month. Underneath that are
buttons-one for each day of the month. Simply choose a button to
select the appropriate date.
As you change the date, the title bar changes to reflect the new date
you are specifying. Choose the OK button to save your change and exit
back to the other dialog box.
The new dates appear in the Reports dialog box.
NOTE: There is no date range for Metering Definitions.
8. In the Filter Criteria list box, specify the filter criteria you wish
to use for your report.
The options include users, applications and protected files. You can
select either one specific user or all users, and you can select either
one specific application or all applications. The default will appear
based on the report type you selected in Step 4. The list in Step 4
specifies if the default will be based on application data, user data or
protected files data.
9. Once you have completed the above steps, choose the OK button.
The Export Status window displays.
This window contains the following information:
o Server - Indicates the server from which the data is being
exported.
o Input Source - Indicates whether the data being exported came
from Metering Definitions or Security Definitions (Input Source
will be blank if you chose Virusdta or Sitedata).
o Input File - Indicates if the data source was Virusdta or
Sitedata (this field will be blank if you specified Metering
Definitions).
o Output File - Indicates the name of the file to which the data
is being exported.
o Output Format - Indicates in what format the exported data will
appear.
The percentage complete bar tracks the progress of the exporting.
NOTE: If the data file you are creating already exists, then a message
box will display asking "Do you wish to update your baseline?" If you
wish to create another data file, choose the Yes button and the Export
window displays. If you do not choose to update your baseline, then the
Export window will not display.
The metering capability exports 3 files for one report. During the export,
you can choose the Abort button to halt the exporting. This button changes
to Close once the export is complete. By choosing Close, the output file is
put into the current directory.
10. When you close this dialog box, a window displays with the report
name in the title bar.
The next section of the manual describes the report window.
9.4 The Report Window
Once the Export dialog box closes, the SiteMeter Reports window displays.
This section describes the parts of the report window.
The title bar displays the report type being generated. While the report
is being generated on this window, a ribbon of buttons displays to the left.
The two left most buttons are arrows pointing to the left. The left-most
sends you to the beginning of the report; the other goes to the previous
page. The next two buttons are arrows pointing right. The first goes to the
next page, and the other to the end of the report. The fourth button is the
stop button. Once the first page of the report is generated, this button
becomes enabled. You can use it to halt the report generation at that point.
After that there are two additional buttons. The first is page view;
the second is a print button which prints the report. Most of these buttons
are grayed during report generation.
The next section is a box displaying the following:
o Read (indicating the records read from the database)
o Selected (indicating those records in the specified date range or
meeting other criteria)
o Total (indicating the total records in the database)
o % (indicating the percentage of the report which is completed)
All of these fields except Total change to reflect the real time report
generation. The Next box tells you which page you are on, for example 1 of 18
or 2 of 18.
Beneath all of this is the actual report.
9.5 Report Types
BrightWorks' reporting module offers a number of different report types for
application usage and software security information. Choose the report type
best suited to your business and decision-making needs.
The following report types are offered:
o Metering Definitions
o Application Summary
o Application with User Detail
o Application with User Summary
o User Summary
o User with Application Detail
o User with Application Summary
o File Integrity Activity
o SPA Compliance
o Software Purchase Forecast
o Upgrade Purchase Forecast
The contents of each report type are described in the following sections.
9.5.1 Metering Definitions
The Metering Definitions report provides the network manager with a listing
of all the applications currently being metered. For each application, it
also provides the number of licenses, whether or not it is password-protected,
and any other definitions specific to this application.
The report heading details:
o Date of report generation
o Report type (i.e., Metering Definitions, etc.)
o Applications on which report was generated
The report provides the following information about each application:
o Path and file name being metered
o Metered application name
o Number of licenses available
o Length of the queue back time
o Whether or not a password is required for this metered application
9.5.2 Application Summary
The Application Summary report provides a summary of all the activity for
each metered application. From this report, a user can get an overview of
activity for each metered application.
The report heading details:
o Date of report generation
o Report type
o Date range for which report was generated
o The server on which the report was generated
o The applications on which the report was generated (will be either
one application name or All)
The report provides the following details about each application:
o Path and file name being metered
o Metered application name
o Number of licenses available
o Peak number of concurrent users
o Peak number of queued users
o Total number of users
o Total usage time
o Total queued users
o Percent utilization
This report also provides a grand summary of each of the above categories
for all the applications included in the report.
9.5.3 Application with User Detail
The Application with User Detail report provides detailed information about a
user's activity for each metered application. For example, this report
details when a user accessed an application and for how long he or she
used it.
The report heading details:
o Date of report generation
o Report type
o Date range for which report was generated
o The server on which the report was generated
o The users on which the report was generated (will be either one user
name or All)
The report provides the following information for each application included
in the report:
o Path and file name being metered
o Metered application name
o Number of licenses available
o Peak number of concurrent users
o Peak number of queued users
o Total number of users
o Total usage time
o Total queued users
o Percent utilization
Beneath all of the above information about each application, the following
detailed information is provided about each user who used the application:
o Date and time of usage
o User name
o Status (whether the user was granted access or queued)
o Total time in minutes of usage
NOTE: The above information is provided each time a user accesses the
application.
9.5.4 Application with User Summary
The Application with User Summary report provides a summary of all the
activity for each metered application, as well as an overview of a network
user's use of each metered application.
The report heading details:
o Date of report generation
o Report type
o Date range for which report was generated
o The server on which the report was generated
o The applications on which the report was generated (will be
either one application name or All)
The report provides the following information for each application
included in the report:
o Path and file name being metered
o Metered application name
o Number of licenses available
o Peak number of concurrent users
o Peak number of queued users
o Total number of users
o Total usage time
o Total queued users
o Percent utilization
Beneath all of the above information about each application, the following
summary information is provided about each user who used the application:
o User name
o Total usage
o Total usage time
o Total number of times queued
o Total average queue time
9.5.5 User Summary
The User Summary report provides the network manager with a listing of all
the users who used metered applications. It offers crucial information,
such as the number of times a user was queued.
The report heading details:
o Date of report generation
o Report type
o Date range for which report was generated
o The server on which the report was generated
o The users on which the report was generated (will be either one
user name or All)
The report provides the following information about each user on which
the report was generated:
o User name
o Total number of times queued
o Total usage
o Total usage time
o Percent utilization
This report also provides a grand summary for each of the above categories
for each user included in the report.
9.5.6 User with Application Detail
The User with Application Detail report provides information about each
time a user accessed a metered application.
The report heading details:
o Date of report generation
o Report type
o Date range for which report was generated
o The server on which the report was generated
o The users on which the report was generated (will be either one user
name or All)
The report provides the following information about each user on which
the report was generated:
o User name
o Total number of times queued
o Total usage time
o Percent utilization
Beneath all of the above information about each user, the following detailed
information is provided about each application this user used:
o Date and time of usage
o Application name
o Status (whether the user was granted access or queued)
o Total time in minutes of usage
NOTE: The above information is provided for each time the user accessed
an application.
9.5.7 User with Application Summary
The User with Application Summary report provides summarized information
for each metered application that a user used.
The report heading details:
o Date of report generation
o Report type
o Date range for which report was generated
o The server on which the report was generated
o The users on which the report was generated (will be either one user
name or All)
The report provides the following information about each user on which
the report was generated:
o User name
o Total number of times queued
o Total usage
o Total usage time
o Percent utilization
Beneath all of the above information about each user, the following summary
information is provided about each application the user used:
o Path and file name being metered
o Metered application name
o Number of licenses available
o Total number of times queued
o Total usage
o Total usage time
o Percent utilization
9.5.8 File Integrity Activity Report
The File Integrity Activity report provides a listing of all the activity
on the virus secured files and applications. It also gives details about
who used the secured files, where these files were used and the actions
taken by the metering capability on these files.
The report heading details:
o Date of report generation
o Report type
o Date range for which report was generated
o The server on which the report was generated
o The users on which the report was generated (will be either one
user name or All)
o The applications on which the report was generated (will be either
one application name or All)
This report provides the following information about the software security
violations:
o Action detected
o User
o File name
o Date and time
o Network name
o Station
9.5.9 SPA Compliance
The SPA Compliance report is accepted by the Software Publisher's Association
in conjunction with software purchase records as proof of software license
compliance in networked environments.
The report heading details:
o Date of report generation
o Report type
o The server on which the report was generated
o The applications on which the report was generated (will be either
one application name or All)
The report provides the following information about metered applications:
o Metered application name
o File name
o Number of licenses available
o Peak queued users
o Peak usage
9.5.10 Software Purchase Forecast
The Software Purchase Forecast report recommends software purchases for
metered applications based on user activity and the perceived user need
as indicated by the number of queued users.
The report heading details:
o Date of report generation
o Report type
o The server on which the report was generated
o The applications on which the report was generated (will be either
one application name or All)
The report provides the following information about each application on
which the report was generated:
o Metered application name
o File name
o Number of licenses installed
o Peak queued users
o Number of surplus licenses (number of purchases to accommodate current
need)
o 10% Surplus Recommendation (purchase required to accommodate the current
need plus a 10% increase)
o 20% Surplus Recommendation (purchase required to accommodate the current
need plus a 20% increase)
9.5.11 Upgrade Purchase Forecast
The Upgrade Purchase Forecast report recommends software upgrades for metered
applications based on user activity and the perceived user need as indicated
by the number of queued users.
The report heading details:
o Date of report generation
o Report type
o The server on which the report was generated
o The applications on which the report was generated (will be either one
application name or All)
The report provides the following information about each application on
which the report was generated:
o Metered application name
o File name
o Number of licenses installed
o Peak usage
o Number of surplus licenses (number of purchases to accommodate current
need)
o 10% Surplus Recommendation (purchase required to accommodate the current
need plus a 10% increase)
o 20% Surplus Recommendation (purchase required to accommodate the current
need plus a 20% increase)
That concludes this chapter. The next chapter describes the monitoring
capabilities available for network users.
10.0 Monitoring Tools for Network Users
Chapter 9 explained how to generate reports detailing application usage.
This chapter explains how network users can monitor the use of the software
applications on the LAN.
NOTE: This chapter pertains to BrightWorks and SiteMeter.
10.1 Introduction
BrightWorks provides utilities that enable your network users to monitor
application usage and view user activity. These features enhance the users'
ability to work effectively with the network's licensed software. Network
users access these utilities through the Usage Monitor, as described in
this chapter.
10.1.1 Access to the Monitoring Functions
The Usage Monitor's functions are accessed in several ways:
o by choosing the Monitoring command from the Tools menu or
o by choosing the Hide/Show command from the Console menu.
10.1.2 What's in this Chapter
The following chart describes the sections in this chapter:
SECTION DESCRIPTION
Viewing Application Usage Describes procedures for accessing the
application usage graph, viewing user
information, and sending messages to both
current and queued users.
Modifying and Updating the Describes procedures for changing the usage
Usage Graph scale, changing the colors on the graph,
concealing the status bar, performing a query
and setting the query timer.
Using DOS Slook Describes procedures for using this monitoring
utility for DOS users.
10.2 Viewing Application Usage
BrightWorks' Usage Monitor allows network users without SUPERVISOR rights
to view the application usage graph. This section explains how network
users can use this function to get valuable information about application
usage by other network users.
The Usage Monitor allows ANY networked user to determine who is using a
particular metered application in real time. This is very useful when locked
out of an application because the Usage Monitor shows you which users are
using an application.
To use the Usage Monitor, you must first access the utility. The network
administrator must put USAGE.EXE (and the associated .DLLs) in a
public place. Users then use the Windows file utility to create a new icon
on their Windows desktops. Finally, the users can choose the Usage icon.
This section is divided into three parts:
o Monitoring Application Usage
o Monitoring Current Users
o Monitoring Queued Users
10.2.1 Monitoring Application Usage
Networked users can use this utility to see what applications are being used,
which ones have queued users, etc.
Use the following procedure to view application usage.
1. Choose the View Application Usage command from the Console menu.
The View Application Usage dialog box displays.
2. Select the desired file server.
If you are not currently attached to the desired file server, choose
the Attach button.
3. Choose the OK button.
The Application Usage window for the file server you have selected
displays.
From this window you can view in graph form the number of:
o Current users of all metered applications
o Queued users of all metered applications
o Peak users of all metered applications (the total number
of current users plus the total number of queued users)
o Maximum Number of Concurrent Users of all metered applications
(the total number of licenses purchased for this application)
10.2.3 Viewing Application Information
You can view the following application information from this window:
o Number of Current Users
o Number of Queued Users
o Number of Peak Users
o Number of Licenses
This information can be viewed either on the graph itself or with
pop-up boxes.
Use the following procedure to view this information with the pop-up boxes.
1. Select the desired application from the list along the left hand side
of the window.
When the cursor is in this area, it changes to a magnifying glass.
2. Hold down the left mouse button to display an information box that
contains the above information.
10.2.4 Viewing Current Users
Use the following procedure to view the names of the users who are
currently using an application.
1. In the application usage graph, position the cursor in the area to
the right of the application name within the graphic display.
A small menu box should be attached to the bottom right of the arrow.
If there is no menu box, the cursor is not pointing to a place where
information is available. Information is available where the number of
users (queued, peak and current) are displayed with graph bars.
2. Click here to display a pop-up menu.
When the pop-up menu displays, the application in question is outlined
in the list along the left hand side of the window.
This menu contains the following items:
o View Current Users - the list of users currently using
this application
o View Queued Users - the list of users who are currently waiting
to use this application
3. Choose the View Current Users command.
The Current Users window displays listing all the users who are currently
using this application.
From this window you can:
o Send a Message - send a Novell message to a user.
o View User Information - view a user's login information.
10.2.5 Sending a Message to a Current User
You can send messages to current users from the Current Users window.
This is useful if you want to know when a user will be finished using an
application that you want to use.
Use the following procedure to send a NetWare Send message to a user who
is currently using an application.
1. From the Current Users window, choose the user to whom you wish to
send the message.
A pop-up menu displays.
2. Choose the Send Message command.
The Send Message To User dialog box displays.
3. Enter the message in the text box provided.
4. Choose the OK button to send the message.
10.2.6 Viewing Current Users' Information
From the Current Users window, you can find out important information
about users using applications on your network.
The following information can be displayed about a selected current user:
o Login Name - user's login name
o Full Name - user's full name
o Server - file server to which this user is attached
o Logical Station - the station number that is arbitrarily
assigned to a workstation
o Network - network number of the workstation where this user
is located
o Station Address - node address of the workstation where this
user is located
o Time into Network - length of time this user has been logged in
to the network
o Application - application which the user is currently using
o Time into Application - date and time that the user launched the
application
Use the following procedure to view this information.
1. From the Current Users window, select the desired user.
A pop-up menu displays.
2. Choose the User Information command.
The Current User Information dialog box displays.
3. Choose the Close button to exit this dialog box.
10.2.7 Viewing Queued Users
Use the following procedure to view the users who are waiting to use
an application.
1. In the application usage graph, position the cursor in the area to
the right of the application name within the graphic display.
A small menu box should be attached to the bottom right of the arrow.
If there is no menu box, the cursor is not pointing to a place where
information is available. Information is available where the number of
users (queued, peak and current) displays with graph bars.
2. Click here to display a pop-up menu.
When the pop-up menu displays, the application in question is outlined
in the list along the left hand side of the window.
3. Choose the View Queued Users command.
The Queued Users window displays listing all the users who are waiting
to use this application.
From this window you can:
o Send Message - send a Novell message to a queued user.
o View User Information - view a queued user's login information.
10.2.8 Sending a Message to a Queued User
If there are users waiting for an application you can send them messages.
Use the following procedure to send a NetWare Send message to a user who is
currently waiting to use the application.
1. From the Queued Users window, choose the user to whom you wish to
send the message.
A pop-up menu displays.
2. Choose the Send Message command.
The Send Message To User dialog box displays.
3. Enter the message in the text box provided.
4. Choose the OK button to send the message.
10.2.9 Viewing Queued Users' Information
The following information can be displayed about a selected queued user:
o Login Name - user's login name
o Full Name - user's full name
o Server - file server to which this user is attached
o Logical Station - the station number that is arbitrarily assigned
to a workstation
o Network - network number of the workstation where this user is located
o Station Address - node address of the workstation where this user is
located
o Time into Network - length of time this user has been logged in to the
network
o Application - application which the user is currently waiting to use
Use the following procedure to view this information.
1. From the Queued Users window, select the desired user.
A pop-up menu displays.
2. Choose the User Information command.
The Queued User Information dialog box displays with all of the above
information.
3. Choose the Close button to exit this dialog box.
10.3 Modifying and Updating the Usage Graph
Networked users can alter the usage graph to best suit their viewing needs.
In addition to changing the usage scale and the colors, they can also
perform queries to keep the graph up-to-date.
10.3.1 Changing the Usage Scale
The Usage Scale is the scale displayed across the top of the Application
Usage window. By changing the high value for the graph, you can increase or
decrease the number of users shown. For example, if you have 250
workstations on your network, you can set the high value to 250 to allow
the bars to indicate usage by all your network users. If your network
is large, but the number of licenses and concurrent users is small, you can
set the value lower. With this flexibility, you can change the graph to
best suit your viewing needs.
Use the following procedure to change the usage scale.
1. While displaying the usage graph, position the cursor in the scale
bar directly beneath the title bar.
The cursor itself should change to a scale.
2. Double click to display the Edit View Usage Scale dialog box.
3. Choose either Auto-scaled or User-defined.
o Auto-scaled - allows the Usage Monitor to determine the
maximum value of the scale.
o User-defined - allows you to determine the maximum value of
the scale.
4. If you chose User-defined and wish to enter a high value, select the
High text box and type the value you wish to use.
NOTE: This value cannot exceed the maximum number of users for the
file server.
5. Choose the OK button to save your changes and exit this dialog box.
The usage scale beneath the title bar now reflects the new maximum
you specified.
10.3.2 Changing the Colors Used in the Status Bar
You can change the colors used in the status bar of the application usage
window that reflect the number of current, queued, peak and licensed users.
Change these colors to best suit your viewing needs.
Use the following procedure to change these colors.
1. In the application usage graph, position the cursor to one of the
colors in the status bar.
The cursor changes to a transparent arrow.
2. Double click at this point.
The standard Windows color palette for that key displays.
3. Select a new color.
4. Choose the OK button.
The new color is shown on the graph bars as chosen.
The colors can be changed for each item in the status bar.
10.3.3 Hiding or Showing the Status Bar
You can hide or show the status bar on the usage graph. Showing the
status bar lets you know which colors indicate current users,
queued users, etc., as well as the count when you are changing the
number of maximum concurrent users.
Hiding it gives you more room to display the usage graph.
Use the following procedure to conceal or reveal the status bar.
From the Console menu, choose the Hide Status Bar command.
This toggles the status bar on and off. When the status bar is hidden,
this command in the File menu changes to Show Status Bar.
By choosing the Show command, you can display the status bar again.
10.3.4 Performing Queries
The usage graph reflects the application usage on your network.
You can update the graph to reflect any changes by performing queries.
Every time a query is issued, either manually or automatically,
the Usage Monitor updates the usage information on the graph.
The Query Indicator is the last item on the status bar. The indicator
displays for either manual or automatic queries.
The Query Now option allows you to update the application usage information.
Use the following procedure to instruct the Usage Monitor to perform a
query at that point.
1. Select the Query Now command from the Console menu.
The Metering function performs a query and updates the Application
Usage graph accordingly. The status bar at the right bottom of the
window reflects the query's progress.
NOTE: You can also access this feature by pressing <CTRL><Q>.
The Set Timer option allows you to determine how often the Usage Monitor
checks with the file server for application usage information.
Use the following procedure to set the timer.
1. Choose the Set Timer command from the Console menu.
The Set Monitor Timer dialog box displays.
2. Enter the desired value.
You can enter a value in seconds from 0 to 9999.
3. Choose the OK button.
NOTE: You can also access this option by pressing <CTRL><T>.
10.4 Using DOS Slook
Slook is a metering utility which allows ANY network user to determine
who is using a particular metered application in real time. This is very
useful when you are locked out of an application. Slook shows you the
users who are using an application. If you are a SUPERVISOR or equivalent,
you can also view the users who are in the queue waiting to use the
application.
This utility should be used by DOS users (the Usage Monitor explained
previously is for users running Windows).
10.4.1 Using Slook
Use the following procedure to use DOS Slook.
1. To run DOS Slook, at the DOS prompt type:
Slook <ENTER>
You are presented with a list of all metered applications.
NOTE: An asterisk at the end of a metered application indicates that
someone is currently using the application.
2. Highlight the metered application you wish to view and then press <ENTER>.
The Select Users to View window displays. This window allows you to
view the current or queued users of a particular metered application.
NOTE: If you do not have SUPERVISOR rights you will ONLY be able to view
the list of Current Users.
10.4.2 Viewing Current Users
The View Current Users option shows all users who are currently using the
application.
When the user exits the application, his or her name disappears from the box.
This window is updated in real time.
If you highlight a user and press <ENTER>, information about the user
displays, including login time and the length of time he or she has been
using the application. You can also send the user a NetWare Send message.
10.4.3 Viewing Queued Users
The View Queued Users option shows all the users who are waiting to use
the application.
Users that are viewing the queued user list and who also have SUPERVISOR
rights can add and delete users from the list.
To add a user to the queue, press <INS>; a list of user names displays.
Highlight the appropriate name and press <ENTER>. The user is added to the
queue. The queue can contain a maximum of 8 users.
To delete a user, highlight the user that you wish to delete and press <DEL>.
You are prompted to confirm the deletion of the user.
To exit, press <ALT><F10>; at the Exit prompt, type Y and press <ENTER>.
You are now returned to DOS.
11.0 Advanced Utilities
Chapter 10 described the monitoring features available for network users.
This chapter explains how to use the metering capability's advanced utilities.
NOTE: This chapter pertains to BrightWorks and SiteMeter.
11.1 About the Metering Utilities
The utilities described in this chapter are provided for you if you have
decided not to use the SiteMeter Proxy NLM as the metering and file
protection method for your LAN.
11.1.1 Utilities List
The following lists the utilities described in this chapter:
o SWATCHER
o DSW
o SYSMOD
Each of these utilities is fully explained in the following sections.
11.2 Swatcher TSR Method
If you have chosen to use the Swatcher TSR method of metering and file
protecting your LAN, you may need to become familiar with the following
metering utilities:
o Swatcher
o DSW
11.2.1 Swatcher
Swatcher is a TSR and must be loaded in order to properly meter and
protect the files on your LAN.
Swatcher must be loaded from the DOS prompt. To load Swatcher type:
Swatcher <ENTER>
Swatcher must be loaded AFTER loading IPX and NETX shells. It should
not be loaded high; it should be in conventional memory.
We recommend loading Swatcher from the AUTOEXEC.BAT before logging in to
the network.
NOTE: DO NOT LOAD Swatcher.com via the NetWare login scripts
(either personal or system), as inconsistent and/or inappropriate
metering behavior may result.
If you try to load Swatcher after login and the Security Scan Interval is
set and you have a lengthy login script, you may be disconnected before
you get a chance to load Swatcher.
11.2.2 Note About Swatcher
Since membership in a group determines local drive access, the metering
capability must know who you are when you load Swatcher. This can only be
accomplished if Swatcher is loaded AFTER you log in. For security reasons,
however, you may prefer that Swatcher is loaded BEFORE login time.
To address this, we have created DSW.COM.
Users can load Swatcher before logging in, but at this time BrightWorks'
metering cannot identify the users and therefore will not restrict access
to local drives.
ONCE a user is logged in, you must run DSW.COM; it reads the CURRENT server's
information about how it should handle the user's local drives and then
changes Swatcher accordingly. DSW is only able to update Swatcher
ONE TIME--the FIRST time it is run.
Further attempts to run DSW do not change Swatcher, although you receive a
message on the screen indicating that it has updated Swatcher.
11.2.3 DSW
DSW is run through the system Login Script. Here is a sample login script:
MAP F:=FS/SYS:LOGIN
DRIVE F:
#DSW
DSW reads the information the server holds about a user, including
whether to disable his or her local drives completely, disable only
his or her local .EXE and .COM files, or give the him or her FULL rights.
This information is sent to Swatcher.
Swatcher receives it and updates its values accordingly.
11.2.4 Potential DSW Problems
If more than one person uses the same PC and these people have different
local drive rights, a problem could arise.
SCENARIO 1: Person A (in local drives disabled group) loads Swatcher,
logs in, and Swatcher is updated.
Person B (who has full rights) logs in to the same PC that Person A
was using.
Because Swatcher is NOT updated again, Person B does not get access to
the drives.
Person B must reboot and reload Swatcher to get the appropriate rights.
SCENARIO 2: Person A (with Full Rights) logs out.
Person B (with no rights) logs into the same PC and now has full rights
to the local drives. To prevent this problem, the PC should be re-booted
between users.
11.3 SYSMOD
SYSMOD is a McAfee utility designed to help network administrators
edit files. With SYSMOD, you can edit users' files without going from
workstation to workstation to do so.
This utility is installed in the directories SITEMETR or FUSION and PUBLIC.
When installing BrightWorks, this utility ensures that all users have
access to SMRAGENT.EXE by editing their win.ini files. This is done
automatically from the SMRUSER.BAT file, but you can also use SYSMOD if
you prefer to edit your users' files manually.
Do the following to use the SYSMOD program:
Make sure that the path to the .INI files is included as either
a search drive in the case of users' Windows residing on the
network or in the users' path statements located in their
AUTOEXEC.BAT files for local Windows on the C: drive.
Example lines for login script:
Map ins s16:=SYS:\USER\%LOGIN_NAME\WINDOWS
INCLUDE SYS:PUBLIC\SMRUSER.BAT
Example line for the SMRUSER.BAT using the INCLUDE command:
SYSMOD WIN.INI REPLACEKEY LOAD SMRAGENT.EXE SMRAGENT.EXE