home *** CD-ROM | disk | FTP | other *** search
Text File | 1994-07-31 | 115.0 KB | 2,967 lines |
- SMUSAGE.TXT Headings:
- 4.0 Setting Up Metered Applications
- 4.1 Introduction
- 4.1.1 How SiteMeter Works
- 4.1.2 Access to Metering Setup Functions
- 4.1.3 What's in this Chapter
- 4.2 Metered Applications
- 4.3 Registering Applications for Software Metering
- 4.3.1 Trustee Rights
- 4.3.2 Modifying an Application's Metering Configuration
- 4.3.3 Modifying Trustee Rights
- 4.3.4 Deleting Rights
- 4.3.5 Deleting Metered Applications
- 4.4 Attaching to and Detaching from File Servers
- 4.4.1 Attaching to a File Server
- 4.4.2 Detaching from a File Server
- 5.0 Using the Security Features
- 5.1 Introduction
- 5.1.1 Access to Security Functions
- 5.1.2 What's in this Chapter
- 5.2 File Integrity Scanning
- 5.2.1 What Are Authorized Files?
- 5.2.2 Adding Authorized Files
- 5.2.3 Reprotecting Authorized Files
- 5.2.4 Deleting Authorized Files
- 5.3 Running Unauthorized Files
- 5.3.1 What is "Run Unauthorized Files"?
- 5.3.2 Using Run Unauthorized Files
- 5.4 Specifying the File Scan Interval
- 5.4.1 What is "Specify File Scan Interval"?
- 5.4.2 Specifying the File Scan Interval
- 5.5 Specifying the Security Scan Interval
- 5.5.1 What is "Specify Security Scan Interval"?
- 5.5.2 Specifying the Security Scan Interval
- 5.6 Disabling Local Drives
- 5.6.1 What is "Disable Local Drives"?
- 5.6.2 Using Disable Local Drives
- 5.7 Restricting Local Execution
- 5.7.1 What is "Restrict Local Execution"?
- 5.7.2 Using Restrict Local Execution
- 5.8 Specifying Security Exceptions
- 5.8.1 What is Specifying Security Exceptions?
- 5.8.2 How Security Exceptions Work
- 5.8.3 Using Security Exceptions
- 6.0 Using the Administration Features
- 6.1 Introduction
- 6.1.1 Access to Metering's Administration Functions
- 6.1.2 What's in this Chapter
- 6.2 Viewing Metering Settings
- 6.3 Viewing Application Usage
- 6.3.1 Viewing Application Information
- 6.4 Monitoring and Controlling Application Usage
- 6.4.1 Administering Current Users
- 6.4.2 Sending a Message to a Current User
- 6.4.3 Viewing Current Users' Information
- 6.4.4 Releasing a Current User from a Metered Application
- 6.4.5 Launching another McAfee Capability
- 6.4.6 Administering Queued Users
- 6.4.7 Sending a Message to a Queued User
- 6.4.8 Editing the Queued User List
- 6.4.9 Viewing Queued Users' Information
- 6.4.10 Launching another McAfee Capability
- 6.5 Modifying and Updating the Application Usage Graph
- 6.5.1 Modifying Application Information
- 6.5.2 Changing the Number of Maximum Concurrent Users
- 6.5.3 Changing Metered Application Information
- 6.5.4 Modifying the Usage Graph
- 6.5.5 Changing the Usage Scale
- 6.5.6 Changing the Colors Used in the Status Bar
- 6.5.7 Hiding or Showing the Status Bar
- 6.5.8 Updating the Usage Graph
- 6.6 Controlling Data Files
- 6.6.1 Configuration Options
- 6.6.2 Home Directory
- 6.6.3 Purging Stored Data
- 6.6.4 Purge Usage Information
- 6.6.5 Purge Security Information
- 7.0 Generating Reports
- 7.1 Introduction
- 7.1.1 Access to Report Functions
- 7.1.2 What's in this Chapter
- 7.2 Exporting Files
- 7.3 Generating Reports
- 7.4 The Report Window
- 7.5 Report Types
- 7.5.1 Metering Definitions
- 7.5.2 Application Summary
- 7.5.3 Application with User Detail
- 7.5.4 Application with User Summary
- 7.5.5 User Summary
- 7.5.6 User with Application Detail
- 7.5.7 User with Application Summary
- 7.5.8 File Integrity Activity Report
- 7.5.9 SPA Compliance
- 7.5.10 Software Purchase Forecast
- 7.5.11 Upgrade Purchase Forecast
- 8.0 Monitoring Tools for Network Users
- 8.1 Introduction
- 8.1.1 Access to the Monitoring Functions
- 8.1.2 What's in this Chapter
- 8.2 Viewing Application Usage
- 8.2.1 Monitoring Application Usage
- 8.2.2 Viewing Application Information
- 8.2.3 Viewing Current Users
- 8.2.4 Sending a Message to a Current User
- 8.2.5 Viewing Current Users' Information
- 8.2.6 Viewing Queued Users
- 8.2.7 Sending a Message to a Queued User
- 8.2.8 Viewing Queued Users' Information
- 8.3 Modifying and Updating the Usage Graph
- 8.3.1 Changing the Usage Scale
- 8.3.2 Changing the Colors Used in the Status Bar
- 8.3.3 Hiding or Showing the Status Bar
- 8.3.4 Updating the Usage Graph
-
-
- 4.0 Setting Up Metered Applications
-
- Chapter 3 described the SiteMeter console and provided a quick start
- guide and a tutorial. This chapter explains in detail how to set up
- your software applications for software metering.
-
-
- 4.1 Introduction
-
- Managing network software is a crucial task in maximizing LAN
- productivity. By maintaining control over your network applications,
- you can stay legal and ensure the most efficient use of LAN
- software. SiteMeter offers you this software control for your DOS,
- Windows and OS/2 applications without requiring a workstation agent.
-
- Effective management of network software requires controlling the
- number of simultaneous users of each software application. The
- maximum number of users differs with each software package and the
- number of licenses your company has purchased.
-
- SiteMeter helps you keep track of this information, which is useful
- in determining the need for additional licenses of a particular
- software application.
-
- For example, suppose that you purchase 5 licenses of a word
- processing package.The metering reports indicate that all 5 copies are
- consistently in use with 3 users waiting in the queue for this application.
- This demonstrates the need to purchase additional licenses for this
- application.
-
- With software metering you only purchase the number of applications you need,
- reducing unnecessary software expenditures. SiteMeter allows you to meter up
- to 200 files on a 286 file server and 500 files on a 386 file server.
-
- 4.1.1 How SiteMeter Works
-
- Think of SiteMeter as a public library. You go to the library to check out a
- copy of a book (i.e., software). The library only has two copies of this
- book, and they are both checked out. The library places your name on a
- waiting list (i.e., queue); you then have the option to check out the book
- once it becomes available.
-
- Once the copy is available, the first person on the waiting list is notified.
- The library holds this book exclusively for this person for a predetermined
- amount of time (i.e., queue-back time).
-
- If after that time the person has not checked out the book, the next person
- on the list is notified of the book's availability. If no one else is
- waiting for the book, it is returned to the shelf for anyone's use.
-
- SiteMeter works in much the same way. User requests to run applications go
- through the license server. This program checks for the application's
- availability; if it is available, the user is allowed to run the program.
-
- Once the maximum number of users is reached (as set by the network
- administrator), any further attempts to access the software are prevented.
- SiteMeter then places all other potential users on a waiting list (queue),
- unless otherwise specified by the network administrator.
-
- Users that are placed in the queue are notified when a free copy of the
- application is available. The application is held for the exclusive use of
- the notified user for a specified number of minutes. If the user does not
- access the application within this time period, it is offered to the next
- user in the queue.
-
- 4.1.2 Access to Metering Setup Functions
-
- The functions needed to setup applications for metering are accessed in two
- ways:
- o by choosing the Metering button from the tool bar, or
- o by choosing Metering from the Administration menu.
-
- 4.1.3 What's in this Chapter
-
- The following chart describes the sections in this chapter:
-
- SECTION DESCRIPTION
- Metered Applications Describes the parts of a metered application.
-
- Registering Applications for Describes procedures for adding, modifying
- Software Metering and deleting metered applications in
- SiteMeter.
-
- Attaching to and Detaching from Describes procedures for attaching to and
- File Servers detaching from file servers while using
- SiteMeter.
-
-
-
- 4.2 Metered Applications
-
- A metered application is a software application(s) that has been registered
- with SiteMeter for software metering. When registering a file(s), you need
- to gather the following information for each application:
- o File(s) to Meter - the list of files to be registered. For example,
- wp.exe. You can also meter suites of applications, such as Microsoft Office,
- to ensure accurate license compliance. The executables for the applications
- in a suite would appear in this section.
-
- o Metered Application Name - the name of the application(s) to be
- registered. For example, WordPerfect.
-
- o Full Name - the entire name of the product or application. This field is
- ideal for entering descriptive information. For example, WordPerfect
- Version 5.1 for DOS.
-
- o Maximum Number of Concurrent Users - the total number of licenses
- purchased for this application.
-
- o Password - an optional password that restricts access to the metering
- configuration for this metered application. If you decide to assign a
- password to an application or to a suite of applications, you must supply
- this password before configuring this metered application (or suite) again.
-
- o Queue Back Time - the amount of time that the application (or suite) is
- held exclusively for a user waiting in the queue.
-
- o Directories in which Trustee Rights are Granted During Execution - an
- option that lets you grant temporary rights (trustee assignments) while an
- application (or suite) is running. See section 4.3.1 for more information
- about trustee rights.
-
-
- 4.3 Registering Applications for Software Metering
-
- To control the number of simultaneous users of an application, you must
- register the application with SiteMeter. When registering a product, you
- need the information described in the previous section.
-
- Once a file is registered, SiteMeter ensures that only the specified
- number of concurrent users are using that application simultaneously.
- Use the following procedure to register an application for metering.
-
- 1. Choose Metering from the Administration menu. From the sub-menu that is
- displayed, choose the Define Metered Applications command.
-
- The Define Metered Application dialog box is displayed. This dialog box
- displays all files currently registered to be metered. (If you have not
- registered any files for metering, the list will be blank.) This dialog
- box offers the following options:
- o Add - allows you to register an application for metering.
- o Modify - allows you to change the information already entered for
- a metered application.
- o Delete - allows you to remove an application from metering.
- o Attach to/Detach from File Servers - allows you to attach to or
- detach from different file servers while in SiteMeter. Refer to
- section 4.4 for instructions.
-
- 2. Choose the Add button to register a metered application.
-
- The Add Metered Application dialog box is displayed.
-
- 3. Choose the Add button.
-
- The Browse for Files to Meter dialog box is displayed.
-
- 4. Select the appropriate filename (and directory, which is optional) from
- the list and choose the OK button to insert that filename in the File(s)
- to Meter text box. You can select multiple files for suite metering.
-
- NOTE: To include the file's entire path, select the Include Path option. The
- entire path and file name will be inserted in the File(s) to Meter text box.
-
- You are returned to the Add Metered Application dialog box.
-
- 5. Select the Metered Application Name text box and enter the metered
- application name.
-
- For example: WordPerfect. You cannot enter spaces in the metered
- application name.
-
- 6. Select the Full Name text box and type the full name of the application.
-
- You can also enter descriptive information about the application you are
- metering. For example:
- WordPerfect Version 5.1 for DOS.
-
- 7. Select the password text box and enter a password for this Metered
- Application (optional).
-
- Entering a password is optional. If you assign a password to this
- application or suite, you must provide this password before reconfiguring
- this metered application (or suite of applications).The password does not
- appear in the Password text box.
-
- NOTE: Assigning a password does not require users to enter that password
- before running the application. Instead it protects the metered application
- information you entered from any unauthorized changes.
-
- 8. Select the Maximum Number of Concurrent Users text box and enter the
- number of licenses you have purchased for this application.
-
- One is the default.
-
- 9. Select the Queue Back Time text box and enter an appropriate length of
- time.
-
- Entering a Queue Back Time is also optional. Queue Back Time is the
- length of time in minutes that an application is held exclusively for a
- queued user after he or she has been notified of its availability.
-
- If no time is specified, the queue-back feature is disabled.
-
- The default time is five minutes.
-
- 10. If you want to grant trustee rights continue with the next section.
- Otherwise, choose the OK button to exit this dialog box.
-
- If you choose the OK button, you have finished registering this
- application for software metering.
-
- NOTE: The information that you entered for the metered application can be
- changed if necessary. Refer to section 4.3.2 for instructions on modifying
- applications.
-
- 4.3.1 Trustee Rights
-
- This option allows you to grant temporary rights (trustee assignments) to
- users while an application is running. This option is only in effect for
- users running NetWare 3.x. As the network administrator, you always have
- access to this feature, but only users running NetWare 3.x can be granted
- trustee assignments.
-
- For example, you can configure the metering of an application so that a user
- has rights to the ACCOUNTS directory only while he or she is running the
- Accounts Receivable package. This prevents users from copying/viewing/
- deleting financial data files from outside the application.
-
- Please note the following when using this option:
- o Rights for Named File Only - Secured Directory rights are available only
- for the file whose execution is being tracked. For example, if the
- application is WordPerfect (WP.EXE), you have Secured Directory rights while
- running this application. However, if you issue the DOS Shell command and
- exit into DOS, all rights are revoked until you EXIT back to WordPerfect.
-
-
- o Use Group Inheritance for Continuous Rights Inheritance - if you need a
- continuous "base" of rights in a directory affected by a Secured Directory
- definition, you MUST define those rights via SYSCON's Group Inheritance.
-
- o Supervisor Equivalent - if a user is a Supervisor or has Supervisor
- Equivalence, the Directory Security Mask feature does not affect that user.
-
- o Spawned Applications - if you define Directory Security for an application
- and that application calls another application (e.g., a menu system),
- the called application will not automatically receive Directory Security
- rights. If you wish the called application to have Directory Security
- rights, you must meter and grant rights to each called application.
-
- NOTE: You must have either SWATCHER.TSR loaded to activate the trustee
- windows necessary to assign rights to your network users.
-
- Use the following procedure to grant trustee rights.
-
- 1. From the Add Metered Applications dialog box, choose the Directories
- button.
-
- The Select a Drive/Directory dialog box is displayed. This dialog box
- allows you to traverse all directories.
-
- 2. Double click on the desired drive.
-
- A list of directories on that drive is displayed.
-
- 3. From the list, double click on the desired directory.
-
- The new drive/directory is displayed as your Current Directory. This is
- where you will grant trustee rights.
-
- 4. Choose the OK button to grant rights.
-
- The Select Rights Mask dialog box is displayed.
-
- 5. To assign rights, select the desired right from the Rights Available to
- Grant list and then choose the Include button.
-
- The right is displayed in the Rights Granted list. To include all rights,
- choose the Include All button.
-
- If you wish to remove a right you have already assigned, select the right
- from the Rights Granted list and then choose the Remove button. To remove
- all rights, choose the Remove All button.
-
- 6. Choose the OK button to exit the Select Rights Mask dialog box.
-
- In the Add Metered Applications dialog box, the rights you assigned and
- the directory in which they were assigned are shown in the text box.
-
- 7. Repeat steps 1 through 6 for all directories where you wish to grant
- rights.
-
- 8. Choose the OK button to exit the Add Metered Applications dialog box.
-
- Notice that the directories in which you granted rights are shown in the
- Directories in Which Trustee Rights are Granted list.
-
- This completes registering this metered application.
-
- NOTE: To modify or delete these rights once they have been assigned and
- appear in the text box, refer to section 4.3.3.
-
- 4.3.2 Modifying an Application's Metering Configuration
-
- You can modify any of the metered application information you provided when
- registering the software for metering.
-
- Use the following procedure to change metered application information.
-
- 1. Choose Metering from the Administration menu. From the sub-menu that is
- displayed, choose the Define Metered Application command.
-
- The Define Metered Application dialog box is displayed.
-
- 2. Select the application you wish to modify.
-
- 3. Choose the Modify button.
-
- If the application does not have a password associated with it, the
- Modify Metered Application dialog box is displayed with all the
- information you provided when registering this application for metering.
-
- If the application (or suite) does have a password assigned to it, a
- dialog box is displayed prompting you to enter that password. Enter
- either the Metered Application or the Supervisor Password and then
- choose the OK button.
-
- 4. Select the file(s) you wish to modify from the File(s) to meter list box.
-
- This list box allows you to meter a suite of applications that share a
- license agreement. For example, if you have one license agreement which
- covers three applications, only one person should be able to access any
- of these three applications at one time (as opposed to three different
- users using the three different applications at one time). By selecting
- all the files belonging to a suite of applications, you can modify the
- name, password, maximum number of concurrent users, queue back time and
- trustee rights for all files under a single license.
-
- 5. Make all necessary changes to the information shown in the window by
- selecting the text box and typing the new data.
-
- NOTE: The changes you make do not take effect until you choose the OK
- button. The file server console reflects the changes made by displaying
- "Refreshing Filename Table for Metered Applications."
-
- 6. Choose the OK button to exit the Modify Metered Application dialog box
- and save your changes.
-
- You are returned to the Define Metered Application dialog box where you
- can either modify other applications or exit this dialog box by choosing
- the Close button.
-
-
- 4.3.3 Modifying Trustee Rights
-
- In addition to changing the metered application information described in the
- previous section, you can also reassign or delete the trustee rights you had
- previously granted.
- Use the following procedure to modify trustee rights.
-
- 1. From the Modify Metered Application dialog box, select the directory
- whose rights you wish to modify.
-
- 2. Choose the Modify Mask button.
-
- The Select Rights Mask dialog box is displayed.
-
- 3. Include additional rights by selecting the desired right from the Rights
- Available to Grant list and choosing the Include button.
-
- You can also include all available rights by choosing the Include All
- button.
-
- 4. Remove existing rights by selecting the desired right from the Rights
- Granted list and choosing the Remove button.
-
- You can remove all the granted rights by choosing the Remove All button.
-
- 5. Choose the OK button to exit the Select Rights Mask dialog box.
-
- The Modify Metered Application dialog box is displayed with the changes
- you made to the granted rights.
-
- 4.3.4 Deleting Rights
-
- You can also delete all the rights you assigned from the Modify Metered
- Application dialog box.
-
- NOTE: Deleting rights does not delete any of those rights which users may
- have permanently assigned to them through Novell's system.
-
- Use the following procedure to delete trustee rights.
-
- 1. Select the desired directory from the Directory In Which Trustee Rights
- Are Granted list.
-
- 2. Choose the Delete button.
-
- The rights are removed from this directory.
-
- 4.3.5 Deleting Metered Applications
-
- You can remove an application from SiteMeter. This procedure does not remove
- the application from your network; it merely releases it from being metered
- by SiteMeter.
-
- Use the following procedure to delete applications from SiteMeter.
-
- 1. Choose Metering from the Administration menu. From the sub-menu that is
- displayed, choose the Define Metered Applications command.
-
- The Define Metered Application dialog box is displayed.
-
- 2. Select the application to delete.
-
- 3. Choose the Delete button.
-
- If the application has a password associated with it, you are prompted
- to enter that password.
-
- 4. From the prompt that is displayed, choose the Yes button to delete the
- metered application.
-
- 5. Choose the Close button to exit this window.
-
-
- 4.4 Attaching to and Detaching from File Servers
-
- SiteMeter offers you flexibility in managing your network applications.
- Many of the metering dialog boxes allow you to attach to and detach from
- file servers in a multi-server environment on your LAN.
-
- Using the Attach and Detach buttons, you can change file servers quickly and
- easily. In doing so, you can control metering on any file server you wish.
- This feature allows you to log in and out of file servers while using
- SiteMeter.
-
- This tool will be particularly useful when you register applications
- for software metering.
-
- The following section describes the attaching and detaching procedures.
- Refer to the section entitled "Modifying Application Information" in
- Chapter 6 for instructions about both the home directory and logging
- historical data.
-
- The steps outlined in these two sections describe attaching to and detaching
- from file servers from the Configuration Options dialog box. Many of
- SiteMeter's dialog boxes have Attach and Detach buttons.
-
- NOTE: If you choose these buttons from a dialog box, you can skip step 1 of
- these two procedures.
-
- 4.4.1 Attaching to a File Server
-
- Use the following procedure to attach to a file server.
-
- 1. Choose Metering from the Administration menu. From the sub-menu that is
- displayed, choose the Configuration Options command.
-
- The Configuration Options dialog box is displayed. Your current server
- automatically is displayed; you can choose another server from this list
- box.
-
- 2. Choose the Attach button.
-
- The Attach to Server dialog box is displayed.
-
- 3. From the list box, select the file server to which you wish to attach.
-
- 4. Enter your user name and password to attach to that file server.
-
- 5. Choose the OK button to exit this dialog box.
-
- 6. Choose the OK button to exit the Configuration Options dialog box.
-
- 4.4.2 Detaching from a File Server
-
- Use the following procedure to detach from the current file server.
-
- 1. Choose Metering from the Administration menu. From the sub-menu that is
- displayed, choose the Configuration Options command.
-
- The Configuration dialog box is displayed. Your current server
- automatically displays; you can select a different file server from this
- list box.
-
- 2. Choose the Detach button.
-
- The Detach from Server dialog box is displayed.
-
- 3. Select the desired file server from the drop-down list box.
-
- 4. Choose the OK button to detach from this file server.
-
- NOTES: a - You cannot detach from the file server from which SiteMeter was
- launched.
- b - You cannot detach from a file server if it is the only file server to
- which you are attached or if it is your current file server.
-
- 5. Choose the OK button to exit the Configuration Options dialog box.
-
-
-
- 5.0 Using the Security Features
-
- Chapter 4 explained how to set up applications for software metering. This
- chapter explains how to use the security features available with SiteMeter.
-
-
- 5.1 Introduction
-
- SiteMeter offers a number of features that secure and protect your network
- software by preventing viruses and unauthorized access to local drives.
-
- The file integrity scanning feature guards your LAN against potential
- infection from viruses. A virus is an additional process that attaches itself
- to or maliciously alters an executable file. A virus can cause many problems
- on your network, such as:
- o Renaming or destroying data
- o Creating a program that can cause the workstation to hang or possibly
- crash
- o Causing a program to run in a continuous loop
- o Making a program consume more memory than is necessary
-
- With file integrity scanning you reduce the risk of virus infection.
- SiteMeter provides other security features related to local drive use. You
- can control which users have access to their local drives to prevent
- unauthorized software and program installation. With SiteMeter, you can
- define rights to local execution for all users or for specific users.
-
- 5.1.1 Access to Security Functions
-
- The security functions are accessed in two ways:
- o by choosing the Security button from the tool bar, or
- o by choosing Security from the Administration menu.
-
- 5.1.2 What's in this Chapter
-
- The following chart describes the sections in this chapter:
-
- SECTION DESCRIPTION
- File Integrity Scanning Describes procedures for defining authorized
- files on your network.
-
- Running Unauthorized Files Describes procedures for allowing
- unauthorized files to run on your network.
-
- Specifying the File Scan Describes procedures for instructing
- Interval SiteMeter how often it should check for
- unauthorized files on the network.
-
- Specifying the Security Scan Describes procedures for instructing
- Interval SiteMeter how often it should check for
- network users who have not loaded Swatcher.
-
- Disabling Local Drives Describes procedures for denying users any
- access to their local drives.
-
- Restricting Local Execution Describes procedures for disallowing users to
- execute applications from their local drives.
-
- Specifying Security Exceptions Describes procedures for determining which
- users are allowed to use the network without
- loading Swatcher.
-
-
- 5.2 File Integrity Scanning
-
- To prevent virus infection, SiteMeter checks files for changes before
- allowing them to execute. The first step is registering (or authorizing)
- your files for scanning. Once you register your software, only files that
- have a fingerprint matching the fingerprint registered are allowed to run.
-
- Every time the file is run (or at specified intervals), the fingerprint
- value is recalculated and compared to the value that had been originally
- registered. If the two do NOT match, the file is not allowed to run.
-
- With this method of file protection it is not necessary to recognize a
- particular virus strain. Any byte change is detected and treated as a
- potential virus.
-
- This section describes the two steps to file integrity scanning:
- o Register (or Authorize) the files
- o Set the File Integrity Scan Interval
-
- 5.2.1 What Are Authorized Files?
-
- An authorized file is a file that has been registered for file integrity
- scanning. If a file is not an authorized file and you do NOT allow
- unauthorized files to be run, it will not be allowed to execute.
-
- Metering records the characteristics of each authorized file and stores this
- value in the NetWare bindery.
-
- With the security features included in SiteMeter, you can:
- o Add - new files to the list of authorized files.
- o Reprotect - files that have been changed, as in the case of an upgrade.
- o Delete - files from the authorized files list.
-
- 5.2.2 Adding Authorized Files
-
- To register a file for virus protection, you need to add it to the list of
- authorized files.
-
- Use the following procedure to add a file to the authorized files list.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Define Authorized Files command.
-
- The Define Authorized Files dialog box is displayed. From this dialog box
- you can:
- o Add files to the Currently Authorized Files list.
- o Reprotect files that are already authorized.
- o Delete files that have been authorized.
-
- 2. Choose the Add button.
-
- The Browse for Files to Authorize dialog box is displayed.
-
- 3. Select the desired drive and directory.
-
- 4. Select a file from the File Name list.
-
- You can select all the files in this directory by pointing to the first
- file in the File Name list, holding down the left mouse button and
- dragging the cursor down. This highlights all the files that will be
- authorized.
-
- 5. Choose the OK button.
-
- Any files you just chose now appear in the Currently Authorized Files
- list.
-
- 5.2.3 Reprotecting Authorized Files
-
- You can reprotect a previously authorized file, which should be done for
- applications that have been upgraded. Reprotecting a file recalculates the
- file's checksum value.
-
- NOTE: If you are using Swatcher to meter and file protect your network, make
- sure Swatcher is not loaded when reprotecting a file.
-
- Use the following procedure to reprotect a file.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Define Authorized Files command.
-
- The Define Authorized Files dialog box is displayed.
-
- 2. Choose the file you wish to reprotect.
-
- 3. Choose the Reprotect button.
-
- A message is displayed at the bottom of the window indicating that the
- file is being updated for protection.
-
- NOTE: You can also reprotect a file by double clicking on the appropriate
- filename in the Currently Authorized Files list.
-
- 5.2.4 Deleting Authorized Files
-
- You can remove authorization from a file. This does not remove the file from
- the network; it merely removes the SiteMeter security protection features
- from the file. When you do this, the file will be permitted to execute
- regardless of any changes made to the file. (It will not, however, be
- allowed to run at all when unauthorized files cannot be run.)
-
- Use the following procedure to remove an authorized file from registration
- for file integrity scanning.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Define Authorized Files command.
-
- The Define Authorized Files dialog box is displayed.
-
- 2. Select the file to be deleted.
-
- 3. Choose the Delete button.
-
- A prompt is displayed asking you to verify your choice to delete the
- file protection from this file.
-
- 4. Choose the Yes button if you wish to remove the file protection.
-
-
- 5.3 Running Unauthorized Files
-
- 5.3.1 What is "Run Unauthorized Files"?
-
- This option instructs SiteMeter whether or not to permit execution of
- currently unauthorized files on the network. Using this option prevents
- unauthorized software from being run on the network. When this option is
- enabled, only the listed application files are allowed to run. The Specify
- Policy dialog box lets you specify on which file server(s) you wish to allow
- or disallow unauthorized files to run.
-
- NOTE: Make sure SITEMETR.EXE is always an authorized file. If SITEMETR.EXE is
- not an authorized file and you choose to use the unauthorized files option,
- you will NOT be able to run SiteMeter. Also make sure LOGIN.EXE is always an
- authorized file. If LOGIN.EXE is not an authorized file and you choose to use the
- unauthorized files option, users will be unable to log in to the network.
-
- 5.3.2 Using Run Unauthorized Files
-
- Use the following procedure to specify whether or not unauthorized files
- should be run.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Specify Policy command.
-
- The Specify Policy dialog box is displayed. This dialog box allows you
- to specify on which file servers you allow unauthorized files to run.
- The Current Server list box automatically displays your current server.
- You can attach to or detach from other file servers using the Attach and
- Detach buttons. (Refer to "Attaching to and Detaching from File Servers"
- in Chapter 4.)
-
- NOTE: The default is to have the option enabled. Step 2 disables this option.
-
- 2. If you do not wish to allow unauthorized files to be executed, select
- the "Allow unauthorized files to be executed" option.
-
- The "x" disappears from the box, indicating that you do not allow files
- that are not authorized to run on the network.
-
- 3. Choose the OK button to save your change and exit the dialog box.
-
-
- 5.4 Specifying the File Scan Interval
-
- 5.4.1 What is "Specify File Scan Interval"?
-
- File Scan Interval tells SiteMeter how often to check the executable program
- against the registered copy of that file. To check a file every time it is
- requested, set the File Scan Interval to zero (0). If your file server has
- heavy network traffic, however, you may want to adjust this value to a figure
- more appropriate for your needs.
-
- The value can range from 0 to 1440 minutes (once every 24 hours). The value
- you set applies to ALL authorized files. Regardless of the value, the file is
- always checked against the registered copy the first time it is requested.
- If the field is set to 15 minutes, however, no matter how many times the file
- is executed it will not be checked again for 15 minutes after the first
- check. The first attempt to run the software after the 15 minute interval
- will reset the time interval.
-
- For example, you run LOTUS for the first time at 11:00 a.m. at which time
- SiteMeter checks the file. The next time the file will be checked will be
- the first time it is requested after 11:15 a.m. (if the File Scan Interval
- has been set to 15).
-
- 5.4.2 Specifying the File Scan Interval
-
- Use the following procedure to specify the file scan interval.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Specify File Scan Interval command.
-
- The Specify File Scan Interval dialog box is displayed. From this dialog
- box you can:
- o Set the scan interval
- o Attach to/Detach from a file server (refer to "Attaching to and
- Detaching from File Servers" in Chapter 4 for more instructions)
-
- 2. Use one of the following methods to set the interval and specify how
- frequently SiteMeter checks the executable:
- o Click on the slide bar arrows to increment/decrement the value
- in one minute intervals,
- o Slide the slide bar to the appropriate value, or
- o Click on either side of the slide bar to increment/decrement the
- value by 10 minute intervals.
-
- 3. Once you have selected the appropriate time, choose the OK button.
-
-
- 5.5 Specifying the Security Scan Interval
-
- 5.5.1 What is "Specify Security Scan Interval"?
-
- The Security Scan Interval is the length of time between Security Scan
- checks. This value indicates how frequently SiteMeter scans the network to
- be sure users on the network either have loaded the Swatcher TSR or are
- listed as Security Exceptions.
-
- If a user is not a Security Exception and has not loaded Swatcher, SiteMeter
- sends a NetWare Send message to the user indicating that he or she will be
- logged off the file server in 30 seconds. This allows the user enough time
- to save his or her work before being disconnected automatically from the
- network. The user must load Swatcher before logging in to the network again.
-
- NOTE: Trying to load Swatcher after receiving the 30 second warning will not
- prevent the user from being logged out.
-
- Setting the value to 0 minutes informs metering not to check if Swatcher is
- loaded. This is mandatory if you are NOT using the Swatcher TSR as your
- choice to meter and file protect your network.
-
- 5.5.2 Specifying the Security Scan Interval
-
- Use the following procedure to specify the security scan interval.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Specify Security Scan Interval command.
-
- The Specify Security Scan Interval dialog box is displayed. From this
- dialog box you can:
- o Set the scan interval
- o Attach to/Detach from file servers (refer to "Attaching to and
- Detaching from File Servers" in Chapter 4 for more instructions)
-
- 2. Use one of the following methods to set the interval and specify how
- often SiteMeter capability checks users for the Swatcher TSR:
- o Click the slide bar arrows to increment/decrement the value in
- one minute intervals,
- o Slide the slide bar to the appropriate value, or
- o Click on either side of the slide bar to increment/decrement the
- value in 10 minute intervals.
-
- NOTE: Setting the value to 0 minutes informs metering not to check if
- Swatcher is loaded. This is mandatory if you are NOT using the Swatcher TSR
- as your choice to meter and file protect your network.
-
- 3. Once you have selected the appropriate time, choose the OK button.
-
-
- 5.6 Disabling Local Drives
-
- 5.6.1 What is "Disable Local Drives"?
-
- This option allows you to specify whether or not to disable local drives
- entirely, essentially rendering the PC diskless. Disable Local Drives is
- only available if you use Swatcher, the workstation security agent method
- for metering and file protecting your LAN.
-
- 5.6.2 Using Disable Local Drives
-
- To use this option you must specify a Novell Group in which users will not
- have access to their local disk drives. For example, you may want to create
- a group named NODRIVE. This NODRIVE group must be unique; the group you
- select for Disable Local Drives cannot also be used for Restrict Local
- Execution.
-
- NOTE: For information on creating these groups, refer to your Novell User
- Manuals.
-
- Use the following procedure to disable local drives.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Disable Local Drives command.
-
- The Disable Local Drives dialog box is displayed. From this dialog box
- you can:
- o Include groups
- o Remove groups
- o Attach to/Detach from file servers (refer to "Attaching to and
- Detaching from File Servers" in Chapter 4 for more instructions)
-
- 2. If you wish to add a group to the Groups With Disabled Local Drives
- list, select the desired group from the Available Groups list and
- choose the Include button.
-
- The group is then moved from the Available Groups list to the Groups
- With Disabled Local Drives list.
-
- You can include all the available groups by choosing the Include All
- button.
-
- The groups you included now do not have access to their local drives.
-
- 3. If you wish to remove a group from the Groups With Disabled Local Drives
- list, select the desired group from this list and choose the Remove
- button.
-
- The group is then moved from the Groups With Disabled Local Drives list
- to the Available Groups list.
-
- You can remove all groups from the disabled drives list by choosing the
- Remove All button.
-
- The groups you removed now have access to their local drives.
-
- 4. When you have completed moving groups, choose the OK button to save
- your changes and exit.
-
-
- 5.7 Restricting Local Execution
-
- 5.7.1 What is "Restrict Local Execution"?
-
- SiteMeter provides an option that restricts execution of applications from
- local drives. By using this option, you can disallow network users from
- running applications or other programs from the hard drive. Users will still
- be able to access their local drives, but will not be able to run any
- applications locally. This feature provides an added layer of control over
- software usage on your network.
-
- NOTE: If you decide to use this option please refer to the section entitled
- DSW in Appendix A.
-
- This option is only available if you are using Swatcher, the workstation
- security agent method of metering and file protecting your LAN.
-
- 5.7.2 Using Restrict Local Execution
-
- To use this option you must specify a Novell Group in which users will not
- be able to execute files from their local drives. For example, you may want
- to name this group NOEXEC.
-
- NOTE: For information on creating these groups, refer to your Novell User
- Manuals.
-
- Use the following procedure to restrict local execution.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Restrict Local Execution command.
-
- The Restrict Local Execution dialog box is displayed. From this dialog
- box you can:
- o Include groups
- o Remove groups
- o Attach to/Detach from file servers (refer to "Attaching to and
- Detaching from File Servers" in Chapter 4 for more instructions)
-
- 2. To add a group to the Groups With Restricted Execution list, select the
- desired group from the Available Groups list and choose the Include
- button.
-
- The group is then moved from the Available Groups list to the Groups
- With Restricted Execution list. You can include all the available groups
- by choosing the Include All button. The groups you included now cannot
- execute applications from their local drives.
-
- 3. To remove a group from the Groups With Restricted Execution list, select
- the desired group from this list and choose the Remove button.
-
- The group is then moved from the Groups With Restricted Execution list
- to the Available Groups list. You can remove all groups from the
- restricted list by choosing the Remove All button. The groups you
- removed now can execute all applications from their local drives.
-
- 4. When you have completed moving groups, choose the OK button to save
- your changes and exit.
-
-
- 5.8 Specifying Security Exceptions
-
- If you are using Swatcher to meter and file protect your LAN, this option
- allows you to specify those users who are not required to load Swatcher.
-
- NOTE: If you decide to use this option please refer to the section entitled
- DSW in Appendix A.
-
- 5.8.1 What is Specifying Security Exceptions?
-
- The Security Exceptions is a list of users who are not required to load
- the Swatcher TSR when logging in to the network.
-
- 5.8.2 How Security Exceptions Work
-
- When using the Swatcher TSR method of metering and file protecting, you can
- set a Security Scan Interval. (Refer to the section Specify Security Scan
- Interval in this chapter.) This interval instructs SiteMeter how often it
- should check to verify that all users have loaded the Swatcher TSR, except
- those specified in the Security Exceptions list.
-
- If a user is a member of this list, he or she will not be disconnected from
- the network if SiteMeter finds that he or she does not have the Swatcher TSR
- loaded.
-
- 5.8.3 Using Security Exceptions
-
- Use the following procedure to define security exceptions.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Specify Security Exceptions command.
-
- The Specify Security Exceptions dialog box is displayed. From this dialog
- box you can:
- o Include users
- o Remove users
- o Attach to/Detach from file servers (refer to "Attaching to and
- Detaching from File Servers" in Chapter 4 for more instructions)
-
- 2. To add a user to the Security Exceptions list, select the desired user
- from the Secure Users list and choose the Include button.
-
- The user is then moved from the Secure Users list to the Security
- Exceptions list. You can include all the Secure Users by choosing
- the Include All button. The users you included now are not required to
- load Swatcher when using the network.
-
- 3. To remove a user from the Security Exceptions list, select the desired
- user from this list and choose the Remove button.
-
- The user is then moved from the Security Exceptions list to the Secure
- Users list. You can remove all users from the security exceptions list
- by choosing the Remove All button. The users you removed now are required
- to load Swatcher.
-
- 4. When you have completed moving users, choose the OK button to save your
- changes and exit.
-
-
-
- 6.0 Using the Administration Features
-
- Chapter 5 explained SiteMeter's file integrity scanning and security
- features. This chapter explains how to use metering's administration
- functions to monitor application usage on your network.
-
-
- 6.1 Introduction
-
- SiteMeter gives you the tools you need to administer your metered
- applications and monitor your network software usage. SiteMeter is extremely
- flexible, giving you maximum control in administering your network. You can
- administer metering on different file servers and even launch another McAfee
- capability.
-
- Most of the administration functions described in this chapter can be
- accessed from the application usage graph, giving you maximum flexibility
- and control over your network applications. You can do all of the following
- to monitor your metered applications:
- o View the current metering settings
- o View a list of all the metered applications for a specified file server
- in addition to the number of current, peak and queued users and the number
- of licenses
- o View information about and send messages to both current and queued users,
- as well as release them from metering
- o Perform a query to update the application usage information throughout the
- network
- o Set the interval in which the application usage is updated
- o Set the high value for the usage scale
- o Conceal the status bar located at the bottom of the Application Usage
- dialog box
- o Purge stored data
-
- 6.1.1 Access to Metering's Administration Functions
-
- The metering administration functions are accessed in several ways:
- o by choosing the Monitor button from the tool bar,
- o by choosing Monitoring from the Administration menu,
- o by choosing Security from the Administration menu, or
- o by choosing the Hide/Show command from the File menu.
-
- 6.1.2 What's in this Chapter
-
- The following chart describes the sections in this chapter:
-
- SECTION DESCRIPTION
- Viewing Metering Settings Describes procedures for displaying a
- comprehensive list of settings about metering
- on your network file servers.
-
- Viewing Application Usage Describes procedures for accessing the
- Application Usage Graph.
-
- Monitoring and Controlling Describes procedures for viewing user
- Application Usage information, sending messages, releasing
- current users from metering, and launching
- another McAfee capability in a context-
- sensitive manner.
-
- Modifying and Updating the Describes procedures for changing the maximum
- Application Usage Graph number of concurrent users, changing the
- usage scale, changing the colors on the
- graph, performing a query, setting the query
- timer, and concealing the status bar.
-
- Controlling Data Files Describes procedures for specifying if
- historical data should be stored on a file
- server, purging usage data, and purging
- security data.
-
-
- 6.2 Viewing Metering Settings
-
- SiteMeter lets you view all the metering settings for a file server.
- With this feature, you can access the following important information:
- o Current Server - indicates the file server to which you are presently
- attached.
- o SiteMeter NLM - indicates whether the SiteMeter NLM is active (loaded)
- or inactive.
- o SiteMeter Proxy NLM - indicates whether the SiteMeter Proxy NLM is
- active (loaded) or inactive.
- o Unauthorized Files - indicates whether unauthorized files are allowed to
- run.
- o File Integrity Status - indicates how often authorized files are checked
- for any changes.
- o Current Home Directory - indicates the directory where the SITEDATA,
- VIRUSDTA, and SMRPROXY files are located.
- o Swatcher Users - indicates whether users are checked to verify that the
- Swatcher TSR is loaded and also indicates the time interval in which they
- are checked.
- o Status of Swatcher - indicates whether or not Swatcher is loaded on the
- workstation.
-
- Use the following procedure to view the current metering settings.
-
- 1. Choose Metering from the Administration menu. From the sub-menu that is
- displayed, choose the View Metering Status command.
-
- The View Metering Status dialog box is displayed. If you are not attached
- to the desired file server, use the Attach button (refer to "Attaching
- to and Detaching from File Servers" in Chapter 4.) The current server
- displays automatically. You can view the settings for other file servers
- by choosing the desired file server from the list box.
-
- 2. Choose the Close button to exit this dialog box.
-
-
- 6.3 Viewing Application Usage
-
- SiteMeter gives you the ability to view application usage on a specified
- file server. Using this feature, you can determine which applications are
- being used on the network, which applications have queued users, what the
- peak usage for an application is, and more.
-
- Use the following procedure to access the application usage graph.
-
- 1. Choose the Monitor button from the tool bar.
-
- The View Application Usage dialog box is displayed.
-
- 2. Select the desired file server.
-
- If you are not currently attached to the desired file server, choose the
- Attach button and then supply your user name and password for that file
- server. Refer to "Attaching to and Detaching from File Servers" in
- Chapter 4 for more detailed instructions.
-
- 3. Choose the OK button.
-
- The Application Usage window for the file server you have selected is
- displayed. From this window you can view in graph form the number of:
- o Current users of all metered applications
- o Queued users of all metered applications
- o Peak users of all metered applications (the total number of
- current users plus the total number of queued users)
- o Maximum Number of Concurrent Users of all metered applications
- (the total number of licenses purchased for this application)
-
- 6.3.1 Viewing Application Information
-
- You can also view the following application information from this window:
- o Number of Current Users
- o Number of Queued Users
- o Number of Peak Users
- o Number of Licenses
-
- This information can be viewed either on the graph itself or with
- pop-up boxes.
-
- Use the following procedure to view this information with the pop-up boxes.
-
- 1. Select the desired application from the list along the left hand side of
- the window.
-
- When the cursor is in this area, it changes to a magnifying glass.
-
- 2. Hold down the left mouse button to display an information box that
- contains the above information.
-
-
- 6.4 Monitoring and Controlling Application Usage
-
- SiteMeter gives you extensive monitoring capabilities over both current and
- queued users. You can view and even control a user's use of metered
- applications--all from the application usage graph.
-
- This section describes administering both current and queued users
- using the following tools:
-
- o View who the current and queued users are for an application
- o Send messages to current and queued users
- o Release current users from metering
- o Edit the queued user list
- o Launch another SiteMeter capability in a context-sensitive fashion
-
- NOTE: The steps in the rest of this section assume you have accessed the
- application usage graph (see section 6.3 entitled "Viewing Application
- Usage").
-
- 6.4.1 Administering Current Users
-
- From the application usage graph, you can view the names of the individual
- users using an application, as reflected by the graph bars. This is
- particularly helpful if other users are trying to access an application.
- Once you find out which users are using the application currently, you can
- determine when a copy will be available by asking those users on the list
- how much longer they will be working in the desired application.
-
- Once you access this list, you have additional administrative options.
-
- Use the following procedure to view the names of the users who are currently
- using an application.
-
- 1. In the application usage graph, position the cursor to the area to the
- right of the application name within the graphic display.
-
- A small menu box should be attached to the bottom right of the arrow. If
- there is no menu box, the cursor is not pointing to a place where
- information is available. Information is available where the number of
- users (queued, peak and current) are displayed with graph bars.
-
- 2. Click here to display a pop-up menu.
-
- When the pop-up menu is displayed, the application in question is
- outlined in the list along the left hand side of the window.
-
- This menu contains the following items:
- o View Current Users - the list of users currently using this
- application
- o View Queued Users - the list of users who are currently waiting
- to use this application
- o Edit Queued User List - list of queued users who you can add or
- delete with this option
-
- NOTE: If the Queue Back Time is set to zero (0), the View Queued Users and
- Edit Queued User List options are disabled.
-
- 3. Choose the View Current Users command.
-
- The Current Users window is displayed. This window lists all the users
- who are currently using this application. From this window you can:
- o Send a Message - send a Novell message to a user
- o View User Information - view a user's login information
- o Release a user - release a user's hold on a metered application
- o Launch another application - access another McAfee capability in
- a context-sensitive manner
-
- The following sections describe each of these features.
-
- 6.4.2 Sending a Message to a Current User
-
- You can send messages to current users from the Current Users window. This
- is useful if you want to know when a user will be finished using an
- application.
-
- Use the following procedure to send a NetWare Send message to a user who is
- currently using an application.
-
- 1. From the Current Users window, choose the user to whom you wish to send
- the message.
-
- A pop-up menu is displayed.
-
- 2. Choose the Send Message command.
-
- The Send Message To User dialog box is displayed.
-
- 3. Enter the message in the text box provided.
-
- 4. Choose the OK button to send the message.
-
- 6.4.3 Viewing Current Users' Information
-
- From the Current Users window, you can find out important information about
- users using applications on your network. The following information can be
- displayed about a selected current user:
- o Login Name - user's login name
- o Full Name - user's full name
- o Server - file server to which this user is attached
- o Logical Station - the station number that is arbitrarily assigned to a
- workstation
- o Network - network number of the workstation where this user is located
- o Station Address - node address of the workstation where this user is
- located
- o Time into Network - length of time this user has been logged in to the
- network
- o Application - application which the user is currently using
- o Time into Application - date and time the user launched the application
-
- Use the following procedure to view this information.
-
- 1. From the Current Users window, select the desired user.
-
- A pop-up menu is displayed.
-
- 2. Choose the User Information command.
-
- The Current User Information dialog box is displayed.
-
- 3. Choose the Close button to exit this dialog box.
-
- 6.4.4 Releasing a Current User from a Metered Application
-
- The Release command lets you release a current user from being metered in an
- application. This is helpful in the following scenario: John is using the
- last available copy of WordPerfect. He goes into a meeting with his
- workstation still running the application. Meanwhile, Karen needs to use a
- copy of WordPerfect. The network administrator can release John's copy of
- WordPerfect from metering, freeing up a licensed copy for Karen. When John
- returns from his meeting, he can still use the copy of WordPerfect running
- on his workstation (using the release feature does not exit that user from
- the application). Once he exits WordPerfect, however, he cannot get back in
- until another copy of the software frees up on the network.
-
- NOTE: If you use the Release feature, you may be in violation of your
- software vendor's license agreement.
-
- Use the following procedure to release a current user from metering.
-
- 1. From the Current Users window, choose the user whom you wish to release.
-
- A pop-up menu is displayed.
-
- 2. Choose the Release command.
-
- 3. If the metered application has a password associated with it, you are
- prompted to enter the password.
-
- Enter the appropriate password and choose the OK button.
-
- 4. At the prompt "Are you sure you want to stop metering for this user's
- current use of this application? Note that the user will continue to
- be allowed to use the application." Choose the Yes button to verify your
- choice to release this user from metering.
-
- Choose the No button to exit the message box without releasing the user.
- If you chose the Yes button, the selected user is released from metering.
- The copy of the application he or she is using is released for use
- by another user.
-
- 6.4.5 Launching another McAfee Capability
-
- From the menu, you can also launch another McAfee capability (NetRemote,
- NetShield or LAN Support Center) in a context-sensitive fashion. When
- launching the capability, it automatically configures it to the current user
- you selected. For example, if you selected Jane and then launched the remote
- capability, you would have control of Jane's PC.
-
- NOTE: Users must have the executables for these programs in their search
- path.
-
- Use the following procedure to launch another McAfee capability.
-
- 1. From the Current Users window, select the desired user.
-
- 2. Choose the desired capability from the drop-down menu.
-
- NOTE: If you do not have either of these applications (NetRemote, NetShield
- or LAN Support Center) loaded, an error box is displayed notifying you
- that the executable could not be found. The executables for these
- applications should be placed in a search path mapping.
-
- 6.4.6 Administering Queued Users
-
- From the application usage graph, you can view the names of the individual
- users waiting to use an application, as reflected by the graph bars.
- Once you access this list, you have several administrative options.
-
- Use the following procedure to view who the queued users are.
-
- 1. In the application usage graph, position the cursor in the area to the
- right of the application name within the graphic display.
-
- A small menu box should be attached to the bottom right of the arrow. If
- there is no menu box, the cursor is not pointing to a place where
- information is available. Information is available where the number of
- users (queued, peak and current) is displayed with graph bars.
-
- 2. Click here to display a pop-up menu.
-
- When the pop-up menu is displayed, the application in question is
- outlined in the list along the left hand side of the window.
-
- 3. Choose the View Queued Users command.
-
- The Queued Users window is displayed. This window lists all the users
- who are waiting to use this application. From this window you can:
- o Send Message - send a Novell message to a queued user
- o Edit Queued User List - add or delete users in the queue for a
- specific application
- o View User Information - view a queued user's login information
- o Launch another application - access another McAfee capability in
- a context-sensitive manner.
-
- Each of these options is described in the following sections.
-
- 6.4.7 Sending a Message to a Queued User
-
- If there are users waiting for an application you can send them a message.
- This is particularly useful if you want to notify them of what number they
- are in the list or which user may be finishing with the application soon, etc.
-
- Use the following procedure to send a NetWare Send message.
-
- 1. From the Queued Users window, choose the user to whom you wish to send
- the message.
-
- A pop-up menu is displayed.
-
- 2. Choose the Send Message command.
-
- The Send Message To User dialog box is displayed.
-
- 3. Enter the message in the text box provided.
-
- 4. Choose the OK button to send the message.
-
- 6.4.8 Editing the Queued User List
-
- You can add and remove users to and from the queued user list. This is
- particularly useful if a user does not want to be queued for an application.
-
- Use the following procedure to edit the queued user list.
-
- 1. From the Queued Users window, choose the list of Queued Users.
-
- The Edit Queued Users List dialog box is displayed. This dialog box
- displays the following information:
- o List of non-queued and non-current users
- o List of queued users
-
- 2. If you want to add users to the queue, select the desired users from the
- Non-Queued/Non-Current Users list and choose the Include button.
-
- The user is moved to the Queued Users list. Use the Include All button
- to include up to eight Non-Queued/Non-Current Users.
-
- 3. If you want to remove a user from the queue, select the desired users
- from the Queued User list and then choose the Remove button.
-
- The user is moved to the Non-Queued/Non-Current Users list. Use the
- Remove All button to remove up to eight non-queued/non-current users at
- once.
-
- 4. Choose the OK button to save your changes and exit.
-
- 6.4.9 Viewing Queued Users' Information
-
- The following information can be displayed about a selected queued user:
- o Login Name - user's login name
- o Full Name - user's full name
- o Server - file server to which this user is attached
- o Logical Station - the station number that is arbitrarily assigned to
- a workstation
- o Network - network number of the workstation where this user is located
- o Station Address - node address of the workstation where this user is
- located
- o Time into Network - length of time this user has been logged in to the
- network
- o Application - application which the user is currently waiting to use
-
- Use the following procedure to view this information.
-
- 1. From the Queued Users window, select the desired user.
-
- A pop-up menu is displayed.
-
- 2. Choose the User Information command.
-
- The Queued User Information dialog box is displayed.
-
- 3. Choose the Close button to exit this dialog box.
-
- 6.4.10 Launching another McAfee Capability
-
- From the menu, you can also launch another McAfee capability (NetRemote,
- NetShield or LAN Support Center) in a context-sensitive fashion. When
- launching the capability, it automatically configures it to the current user
- you selected. For example, if you selected Jane and then launched the remote
- capability, you would have control of Jane's PC.
-
- NOTE: Users must have the executables for these programs in their search path.
-
- Use the following procedure to launch another McAfee capability.
-
- 1. From the Queued Users window, select the desired user.
-
- 2. Choose the desired capability from the drop-down menu.
-
- NOTE: If you do not have either of these applications (NetRemote, NetShield
- or LAN Support Center) loaded, an error box is displayed notifying
- you that the executable could not be found. The executables for these
- applications should be placed in a search path mapping.
-
-
- 6.5 Modifying and Updating the Application Usage Graph
-
- SiteMeter offers a number of features that enhance your usage of the
- application usage graph (refer to section 6.3). The following sections
- describe all of these options.
-
- 6.5.1 Modifying Application Information
-
- While viewing the application usage graph, you can make changes to the
- number of maximum concurrent users and to other parts of metered
- applications (e.g., queue back time, trustee rights, etc.).
-
- 6.5.2 Changing the Number of Maximum Concurrent Users
-
- By changing the number of maximum concurrent users, you can increase and
- decrease the number of licenses on your network as is necessary.
-
- Use the following procedure to change this value.
-
- 1. In the application usage window, position the cursor at the end of the
- Number Licensed line (i.e., point to the end of the vertical line).
-
- When you position the cursor on this line, the cursor should change from
- an arrow to a horizontal black double-arrow.
-
- 2. Click and hold down the left mouse button.
-
- 3. Drag the line to the desired value.
-
- The Count box in the status bar at the bottom of the window displays
- the number of licenses as you move the cursor to select a new value.
-
- NOTE: You can also modify the Maximum Number of Concurrent Users value by
- choosing the Define Metered Application option of the Administration
- Metering Menu. Select the metered application you wish to modify and then
- choose the Modify button.
-
- You can now edit the value. If you wish to change the value from the
- Modify Metered Application dialog box, double click on the application
- name in the left hand side of the application usage graph. Refer
- to "Attaching to and Detaching from File Servers" in Chapter 4 for more
- information about this dialog box.
-
- 4. Once you change the value, the Edit License Maximum dialog box is
- displayed to confirm your change.
-
- This dialog box displays the following information:
- o Server - the current file server
- o Application - the name of the metered application
- o Current Maximum - the current maximum number of licenses for
- this application
- o New Maximum - the new value you dragged to for this application
-
- 5. If you wish to accept the new Maximum Number of Concurrent Users value,
- choose the OK button.
-
- If this value is not the desired number of licenses, you can also edit
- the value by simply typing over it in the text box.
-
- 6.5.3 Changing Metered Application Information
-
- You can alter any of the metered application information you entered when
- registering applications for metering.
-
- Use the following procedure to change this information from the application
- usage graph.
-
- 1. Double click on the desired application in the list in the left hand
- side of the window.
-
- The Modify Metered Application dialog box is displayed.
-
- 2. Follow the steps in the section entitled "Metered Applications" in
- Chapter 4 to change the metered application information.
-
- 6.5.4 Modifying the Usage Graph
-
- You have great flexibility with the usage graph. You can change the
- appearance of the graph to suit your individual needs. While viewing
- the graph, you can change the usage scale and the colors used in the bars.
-
- 6.5.5 Changing the Usage Scale
-
- The Usage Scale is the scale displayed across the top of the Application
- Usage window. By changing the high value for the graph, you can increase or
- decrease the number of users shown. For example, if you have 250
- workstations on your network, you can set the high value to 250 to allow the
- bars to indicate usage by all your network users. If your network is large,
- but the number of licenses and concurrent users is small, you can set the
- value lower. With this flexibility, you can change the graph to be best suit
- your viewing needs.
-
- Use the following procedure to change the usage scale.
-
- 1. While displaying the usage graph, position the cursor in the scale bar
- directly beneath the title bar.
-
- The cursor itself should change to a scale.
-
- 2. Double click to display the Edit View Usage Scale dialog box.
-
- NOTE: You can also display this dialog box by choosing Monitoring from the
- Administration menu and then the Edit View Usage Scale command from the sub-
- menu that is displayed.
-
- 3. Choose either Auto-scaled or User-defined.
- o Auto-scaled - allows the metering Administration program to
- determine the maximum value of the scale.
- o User-defined - allows you to determine the maximum value of the
- scale.
-
- 4. If you chose User-defined and wish to enter a high value, select the
- High text box and type the value you wish to use.
-
- NOTE: This value cannot exceed the maximum number of users for the file
- server.
-
- 5. Choose the OK button to save your changes and exit this dialog box.
-
- The usage scale beneath the title bar now reflects the new maximum you
- specified.
-
- 6.5.6 Changing the Colors Used in the Status Bar
-
- You can change the colors used in the status bar of the application usage
- window that reflect the number of current, queued, peak and licensed users.
- Change these colors to best suit your viewing needs.
-
- Use the following procedure to change these colors.
-
- 1. In the application usage graph, position the cursor to one of the colors
- in the status bar.
-
- The cursor changes to a transparent arrow.
-
- 2. Double click at this point.
-
- The standard Windows color palette for that key is displayed.
-
- 3. Select a new color.
-
- 4. Choose the OK button.
-
- The new color is shown on the graph bars as chosen.
-
- The colors can be changed for each item in the status bar.
-
- 6.5.7 Hiding or Showing the Status Bar
-
- You can hide or show the status bar on the usage graph. Showing the
- status bar lets you know which colors indicate current users, queued
- users, etc., as well as the count when you are changing the number
- of maximum concurrent users.
-
- Hiding it gives you more room to display the usage graph.
-
- Use the following procedure to conceal the status bar.
-
- From the File menu, choose the Hide Status Bar command.
-
- This toggles the status bar on and off. When the status bar is
- hidden, this command in the File menu changes to Show Status Bar.
- By choosing the Show command, you can display the status bar again.
-
-
- 6.5.8 Updating the Usage Graph
-
- The usage graph reflects the application usage on your network. You can
- update the graph to reflect any changes by performing queries. Every time a
- query is issued, either manually or automatically, SiteMeter updates the
- usage information on the graph. The Query Indicator is the last item on the
- status bar. The indicator is displayed for either manual or automatic queries.
-
- The Query Now option allows you to update the application usage information.
-
- Use the following procedure to instruct SiteMeter to perform a query at
- that point.
-
- Select Monitoring from the Administration menu. From the sub-menu
- that is displayed, choose the Query Now command.
-
- SiteMeter performs a query and updates the Application Usage graph
- accordingly. The status bar at the right bottom of the window
- reflects the query's progress.
-
- NOTE: You can also access this feature by pressing <CTRL><Q>.
-
- The Set Timer option allows you to determine how often SiteMeter checks
- with the file server for application usage information.
-
- Use the following procedure to set the timer.
-
- 1. Choose Monitoring from the Administration menu. From the sub-menu that
- is displayed, choose the Set Monitor Timer command.
-
- The Set Monitor Timer dialog box is displayed.
-
- 2. Enter the desired value.
-
- You can enter a value in seconds from 0 to 9999.
-
- 3. Choose the OK button.
-
- NOTE: You can also access this option by pressing <CTRL><T>.
-
-
- 6.6 Controlling Data Files
-
- SiteMeter offers several utilities which enhance your control over data
- files.
-
- You can access following options:
- o Configuration Options - attaches to/detaches from file servers and
- specifies the directory where the SiteMeter files reside.
- o Purge Usage Information - removes the SITEDATA file from the home
- directory.
- o Purge Security Information - removes the VIRUSDTA file from the home
- directory.
-
- 6.6.1 Configuration Options
-
- Configuration Options let you attach to and detach from file servers,
- specify the home directory for data files, and specify whether or not to
- log historical usage and security data.
-
- Use the following procedure to access this option.
-
- 1. Choose Metering from the Administration menu. From the sub-menu that is
- displayed, choose the Configuration Options command.
-
- The Configuration Options dialog box is displayed. You can attach to
- and detach from file servers using this option.
-
- NOTE: The Attach and Detach buttons in this window are described in
- "Attaching to and Detaching from File Servers" in Chapter 4. The Home
- Directory is explained in the next section.
-
- 6.6.2 Home Directory
-
- This option allows you to define where the SiteMeter files reside.
- The default directory determined at installation time is SYS:\SYSTEM\SITEMETR.
- You can, however, define the directory of your choice using this option.
- Users need Read, Open, Search, Write, and Create rights to this directory.
-
- Use the following procedure to use this option.
-
- 1. From the Configuration Options dialog box, select the Home Directory
- for Data Files text box.
-
- 2. Type the appropriate directory (using the full path).
-
- 3. If you wish to track software usage and security information, select
- the box next to "Log historical usage and security information."
-
- When the box is checked, SiteMeter logs the usage and file protection
- information used in the reporting function.
-
- The default is to have this box checked.
-
- 4. Choose the OK button.
-
- 6.6.3 Purging Stored Data
-
- SiteMeter gives you added control over your files by allowing you to purge
- stored usage and security data. These functions are particularly helpful
- should these files become corrupted.
-
- 6.6.4 Purge Usage Information
-
- This option removes the SITEDATA file from the home directory.
-
- NOTE: If SiteMeter needs to access the file after it is deleted, a new file
- is automatically created.
-
- Use the following procedure to purge usage information.
-
- 1. Choose Monitoring from the Administration menu. From the sub-menu that
- is displayed, choose the Purge Usage Information command.
-
- The Purge Usage Information dialog box is displayed. The list box
- displays your current server.
-
- 2. From the Current Server list box, select the file server from which you
- wish to purge the usage information.
-
- If you are not attached to the desired file server, you can use the
- Attach button. Refer to "Attaching to and Detaching from File Servers"
- in Chapter 4 for more information.
-
- 3. If you are sure you want to purge all usage information on the specified
- file server, choose the OK button.
-
- 6.6.5 Purge Security Information
-
- This option removes the VIRUSDTA from the home directory.
-
- NOTE: If SiteMeter needs to access the file after it is deleted, a new file
- is created automatically.
-
- Use the following procedure to purge security information.
-
- 1. Choose Security from the Administration menu. From the sub-menu that is
- displayed, choose the Purge Security Information command.
-
- The Purge Security Information dialog box is displayed. The list box
- displays your current server.
-
- 2. From the Current Server list box, select the file server from which you
- wish to purge the security information.
-
- If you are not attached to the desired file server, you can use the
- Attach button. Refer to "Attaching to and Detaching from File Servers"
- in Chapter 4 for more information.
-
- 3. If you are sure you want to purge all security information on the
- specified file server, choose the OK button.
-
- That concludes this chapter. The next chapter provides information
- about report generation.
-
-
-
- 7.0 Generating Reports
-
- Chapter 6 explained SiteMeter's administration features. This chapter
- explains how to use the report utility.
-
-
- 7.1 Introduction
-
- SiteMeter's reporting module is a flexible tool designed to help you manage
- your network more effectively. It puts important information about
- application usage and software security at your fingertips. Using its simple
- Windows interface, you can generate the report you need quickly and easily.
- And with a variety of report types and formats, you can choose the one
- best-suited to your business needs. For example, run a report on a single
- user to see what applications he or she uses. Or run a report on all network
- applications that you meter to see which applications are being used the most
- to get the information you need to determine additional software needs. All of
- this flexibility is at your fingertips with the reporting module.
-
- SiteMeter also provides the capability to export coded data into standard
- database formats. You can choose the database format best-suited to your
- needs.
-
- NOTE: The Crystal Reports software is installed using the SiteMeter install
- utility. Refer to the installation instructions in Chapter 2 of this
- manual. When installed, a Crystal Reports program icon is added to the
- MCAFEE Program Manager group. Procedures for using Crystal Reports are
- presented in Appendices F through H.
-
- 7.1.1 Access to Report Functions
-
- The Report function is accessed by choosing the Metering and Security
- command from the Reports menu.
-
- 7.1.2 What's in this Chapter
-
- The following table describes the sections in this chapter:
-
- SECTION DESCRIPTION
- Exporting Files Describes procedures for exporting coded data
- into standard database formats.
-
- Generating Reports Describes procedures for running reports with
- SiteMeter.
-
- The Report Window Describes all the capabilities and features
- of the report window.
-
- Report Types Describes the information given by each of
- the different types of reports.
-
-
- 7.2 Exporting Files
-
- SiteMeter's report feature allows you to export coded data to a standard
- database format.
-
- Use the following procedure to export files.
-
- 1. Choose the Metering and Security command from the Reports menu.
-
- The Reports window is displayed.
-
- 2. From the File menu, choose the Export command.
-
- The Export dialog box is displayed.
-
- 3. From the Current Server list box, specify the server from which you
- wish to export the coded file.
-
- The current server is displayed automatically in the list box. You can
- also attach to and detach from different file servers. Choose the Attach
- button to attach to another file server. Refer to "Attaching to and
- Detaching from File Servers" in Chapter 4 for more information.
-
- 4. Select one of the options to specify the source of the data you are
- exporting.
-
- The four options are:
- o Sitedata
- o Virusdta
- o Metering Definitions
- o Security Definitions
-
- Sitedata and Virusdta are the files where metering stores its
- information. The Metering and Security Definitions options retrieve the
- information directly from the bindery. To select an option, simply click
- in the appropriate radio button.
-
- NOTES: a - Choosing Sitedata or Virusdta enables the Default and Browse
- buttons. The filename text box automatically displays the default file name.
- For Sitedata the default is SYS:\SYSTEM\SITEMETR\SITEDATA; and for
- Virusdta, the default is SYS:\SYSTEM\SITEMETR\VIRUSDTA.
- b - You can also specify a different file name (if Sitedata or Virusdta was
- stored in a different place) by entering the name in the text box or by
- choosing the Browse button. Choosing the Browse button produces the standard
- Windows Browse dialog box. Once you select the desired file and choose the
- OK button, the file name you selected is displayed in the Filename text box.
- c - Because the Metering and Security Definitions options communicate
- directly with the bindery to access the information, these options are not
- needed and therefore are not enabled.
-
- 5. Choose the format for the exported data from the Format list box.
-
- The available formats include:
- o Lotus 123 2.1
- o Lotus 123 3.x
- o Quattro
- o Lotus 123 1.x
- o Symphony 1.1-2.2
- o Symphony 1.0
- o Excel 2.0
- o Excel 3.0
- o Excel 4.0
- o dBase II
- o dBase III
- o dBase III Plus
- o dBase IV
- o Data Interchange Format
- o ASCII (Tab delimiter)
- o ASCII (Tab delimiter-guess numeric values)
- o ASCII (comma delimiter-min quoted)
- o ASCII (comma delimiter- strings quoted
- o ASCII (comma delimiter-guess numeric values)
- o Btrieve
-
- 6. Specify the file name for the new format.Enter the desired file name in
- the Filename text box or choose the Save As button.
-
- Choosing the Save As button produces the standard Windows Save As dialog
- box. Once you specify the path and file name and choose the OK button,
- you are returned to the Export dialog box. The name you specified is
- displayed in the Filename text box.
-
- 7. Once you have specified all the above information, choose the OK button.
-
- 8. At the prompt that is displayed, choose the Yes button to export the data.
-
- You can also choose the No button to discontinue the export process.
- If you choose the Yes button, the Export Status window is displayed.
- This window contains the following information:
- o Server - indicates the server from which the data is being
- exported.
- o Input Source - indicates whether the data being exported came
- from Metering Definitions or Security Definitions (Input Source
- will be blank if you chose Virusdta or Sitedata).
- o Input File - indicates if the data source was Virusdta or
- Sitedata (Input File will be blank if you specified Metering or
- Security Definitions).
- o Output File - indicates the name of the file to which the data is
- being exported.
- o Output Format - indicates in what format the exported data will
- appear.
-
- The percentage complete bar tracks the progress of the exporting.
- During the export, you can choose the Abort button to halt the exporting.
- This button changes to Close once the export is complete. By choosing
- Close, the output file is put into the current directory.
-
-
- 7.3 Generating Reports
-
- Use the following procedure to generate a report.
-
- 1. Choose the Metering and Security command from the Reports menu.
-
- The Reports window is displayed.
-
- 2. From the Reports menu, choose the Choose Report command.
-
- The SiteMeter Reports dialog box is displayed. This window contains the
- following information:
- o Current Server
- o Report Type
- o Source
- o Print Destination
- o Activity Date Range
- o Filter Criteria
- The dialog box also has OK, Cancel, Attach, and Detach buttons. The
- functionality of all these options is explained in the following steps.
-
- 3. From the Current Server list box, select the desired server.
-
- The Current Server list box automatically displays your current server.
- You can select another server by choosing one from the drop-down list
- box. You can also use the Attach and Detach buttons to attach to/detach
- from other file servers. Refer to "Attaching to and Detaching from File
- Servers" in Chapter 4 for more information.
-
- 4. From the Report Type list box, select a report type.
-
- The list box provides these options:
- o Metering Definitions (based on application usage)
- o Application Summary (based on application usage)
- o Application with User Detail (based on application usage)
- o Application with User Summary (based on application usage)
- o User Summary (based on user information)
- o User with Application Detail (based on user information)
- o User with Application Summary (based on user information)
- o File Integrity Activity (based on protected file information)
- o SPA Compliance (based on application usage)
- o Software Purchase Forecast (based on application usage)
- o Upgrade Purchase Forecast (based on application usage)
-
- Your report selection drives the source file name, the activity date
- range and the filter criteria. Based on what you choose here, defaults
- will appear in these three sections of the dialog box.
-
- 5. Specify the source of the report in the Filename text box.
-
- If the report type you selected in Step 4 uses data from a file, the
- file automatically displays in this list box. For example, if the report
- type uses the Sitedata file, the text box will read:
- SYS\SYSTEM\SITEMETR\SITEDATA.
- You can choose another file either by entering one directly in the text
- box or by using the Browse button. The Browse button produces the
- standard Windows Browse dialog box. Once you select the path and file
- name and choose the OK button, you are returned to the Reports dialog box.
- The selected file name is displayed in the Filename text box.
-
- Choose the Default button to define the default file as the report source.
-
- 6. In the Print Destination section of the dialog box, specify where you
- want to send the report.
-
- The three options are Window, Printer, and File. If you want to send the
- report to a file, select the appropriate file from the File list box.
- The options are:
- o Space Separated - each field in the report is separated by a
- space in the output file
- o Tab Separated - each field in the report is separated by a tab in
- the output file.
-
- 7. Set the Activity Date Range.
-
- The From: and To: fields list the default data range (which is the
- entire date range of the file that you have specified as the source of
- the data). To change either date to view a particular range of data,
- double-click in the field. The calendar is displayed. The title of this
- box reflects the date currently set. Underneath this is a bar listing the year;
- the arrows at either end of the date bar allow you to go forward and
- backward to find a different year. Underneath that is a similar bar with
- the month. Underneath that are buttons--one for each day of the month.
- Simply choose a button to select the appropriate date.
-
- As you change the date, the title bar changes to reflect the new date
- you are specifying. Choose the OK button to save your change and exit
- back to the other dialog box. The new dates appear in the Reports dialog
- box.
-
- NOTE: There is no date range for Metering Definitions.
-
- 8. In the Filter Criteria list box, specify the filter criteria you wish to
- use for your report.
-
- The options include users, applications and protected files. You can
- select either one specific user or all users, and you can select
- either one specific application or all applications. The default will
- appear based on the report type you selected in Step 4. The list in
- Step 4 specifies if the default will be based on application data, user
- data or protected files data.
-
- 9. Once you have completed the above steps, choose the OK button.
-
- The Export Status window is displayed. This window contains the
- following information:
- o Server - indicates the server from which the data is being
- exported.
- o Input Source - indicates whether the data being exported came
- from Metering Definitions or Security Definitions (Input Source
- will be blank if you chose Virusdta or Sitedata).
- o Input File - indicates if the data source was Virusdta or
- Sitedata (this field will be blank if you specified Metering
- Definitions).
- o Output File - indicates the name of the file to which the data is
- being exported.
- o Output Format - indicates in what format the exported data will
- appear.
-
- The percentage complete bar tracks the progress of the exporting.
-
- NOTE: If the data file you are creating already exists, then a message box
- will display asking "Do you wish to update your baseline?" If you wish to
- create another data file, choose the Yes button and the Export window is
- displayed. If you do not choose to update your baseline, then the Export
- window will not display.
-
- SiteMeter exports 3 files for one report. During the export, you can
- choose the Abort button to halt the exporting. This button changes to
- Close once the export is complete. By choosing Close, the output file is
- put into the current directory.
-
- 10. When you close this dialog box, a window is displayed with the report
- name in the title bar.
-
- The next section of the manual describes the report window.
-
-
- 7.4 The Report Window
-
- Once the Export dialog box closes, the SiteMeter Reports window is displayed.
- The title bar displays the report type being. While the report is being
- generated on this window, a ribbon of buttons is displayed to the left. The
- two left most buttons are arrows pointing to the left. The left-most sends
- you to the beginning of the report; the other goes to the previous page. The
- next two buttons are arrows pointing right. The first goes to the next page,
- and the other to the end of the report. The fourth button is the stop button. Once the first
- page of the report is generated, this button becomes enabled. You can use it
- to halt the report generation at that point. After that there are two
- additional buttons. The first is page view; the second is a print button
- which prints the report. Most of these buttons are grayed during report
- generation.
-
- The next section is a box displaying the following:
- o Read (indicating the records read from the database)
- o Selected (indicating those records in the specified date range or
- meeting other criteria)
- o Total (indicating the total records in the database)
- o % (indicating the percentage of the report which is completed)
-
- All of these fields except Total change to reflect the real time report
- generation. The Next box tells you which page you are on, for example 1 of
- 18 or 2 of 18.
-
- Beneath all of this is the actual report.
-
-
- 7.5 Report Types
-
- SiteMeter's reporting module offers a number of different report types for
- application usage and software security information.
-
- Choose the report type best suited to your business and decision-making needs.
-
- The following report types are offered:
- o Metering Definitions
- o Application Summary
- o Application with User Detail
- o Application with User Summary
- o User Summary
- o User with Application Detail
- o User with Application Summary
- o File Integrity Activity
- o SPA Compliance
- o Software Purchase Forecast
- o Upgrade Purchase Forecast
-
- The contents of each report type are described in the following
- sections of the manual.
-
- 7.5.1 Metering Definitions
-
- The Metering Definitions report provides the network manager with a
- listing of all the applications currently being metered. For each
- application, it also provides the number of licenses, whether or not
- it is password-protected, and any other definitions specific to this
- application.
-
- The report heading details:
- o Date of report generation
- o Report type (i.e., Metering Definitions, etc.)
- o Applications on which report was generated
-
- The report provides the following information about each
- application:
- o Path and file name being metered
- o Metered application name
- o Number of licenses available
- o Length of the queue back time
- o Whether or not a password is required for this metered application
-
- 7.5.2 Application Summary
-
- The Application Summary report provides a summary of all the
- activity for each metered application. From this report, a user can
- get an overview of activity for each metered application.
-
- The report heading details:
- o Date of report generation
- o Report type
- o Date range for which report was generated
- o The server on which the report was generated
- o The applications on which the report was generated (will be either
- one application name or All)
-
- The report provides the following details about each application:
- o Path and file name being metered
- o Metered application name
- o Number of licenses available
- o Peak number of concurrent users
- o Peak number of queued users
- o Total number of users
- o Total usage time
- o Total queued users
- o Percent utilization
-
- This report also provides a grand summary of each of the above
- categories for all the applications included in the report.
-
- 7.5.3 Application with User Detail
-
- The Application with User Detail report provides detailed
- information about a user's activity for each metered application.
- For example, this report details when a user accessed an application
- and for how long he or she used it.
-
- The report heading details:
- o Date of report generation
- o Report type
- o Date range for which report was generated
- o The server on which the report was generated
- o The users on which the report was generated
- (will be either one user name or All)
-
- The report provides the following information for each application
- included in the report:
- o Path and file name being metered
- o Metered application name
- o Number of licenses available
- o Peak number of concurrent users
- o Peak number of queued users
- o Total number of users
- o Total usage time
- o Total queued users
- o Percent utilization
-
- Beneath all of the above information about each application, the
- following detailed information is provided about each user who used
- the application:
- o Date and time of usage
- o User name
- o Status (whether the user was granted access or queued)
- o Total time in minutes of usage
-
- NOTE: The above information is provided each time a user accesses the
- application.
-
- 7.5.4 Application with User Summary
-
- The Application with User Summary report provides a summary of all
- the activity for each metered application, as well as an overview of
- a network user's use of each metered application.
-
- The report heading details:
- o Date of report generation
- o Report type
- o Date range for which report was generated
- o The server on which the report was generated
- o The applications on which the report was generated (will be either
- one application name or All)
-
- The report provides the following information for each application
- included in the report:
- o Path and file name being metered
- o Metered application name
- o Number of licenses available
- o Peak number of concurrent users
- o Peak number of queued users
- o Total number of users
- o Total usage time
- o Total queued users
- o Percent utilization
-
- Beneath all of the above information about each application, the
- following summary information is provided about each user who used
- the application:
- o User name
- o Total usage
- o Total usage time
- o Total number of times queued
- o Total average queue time
-
- 7.5.5 User Summary
-
- The User Summary report provides the network manager with a listing
- of all the users who used metered applications. It offers crucial
- information, such as the number of times a user was queued.
-
- The report heading details:
- o Date of report generation
- o Report type
- o Date range for which report was generated
- o The server on which the report was generated
- o The users on which the report was generated
- (will be either one user name or All)
-
- The report provides the following information about each user on
- which the report was generated:
- o User name
- o Total number of times queued
- o Total usage
- o Total usage time
- o Percent utilization
-
- This report also provides a grand summary for each of the above
- categories for each user included in the report.
-
- 7.5.6 User with Application Detail
-
- The User with Application Detail report provides information about
- each time a user accessed a metered application.
-
- The report heading details:
- o Date of report generation
- o Report type
- o Date range for which report was generated
- o The server on which the report was generated
- o The users on which the report was generated
- (will be either one user name or All)
-
- The report provides the following information about each user on
- which the report was generated:
- o User name
- o Total number of times queued
- o Total usage time
- o Percent utilization
-
- Beneath all of the above information about each user, the following
- detailed information is provided about each application this user used:
- o Date and time of usage
- o Application name
- o Status (whether the user was granted access or queued)
- o Total time in minutes of usage
-
- NOTE: The above information is provided for each time the user accessed an
- application.
-
- 7.5.7 User with Application Summary
-
- The User with Application Summary report provides summarized information
- for each metered application that a user used.
-
- The report heading details:
- o Date of report generation
- o Report type
- o Date range for which report was generated
- o The server on which the report was generated
- o The users on which the report was generated
- (will be either one user name or All)
-
- The report provides the following information about each user on
- which the report was generated:
- o User name
- o Total number of times queued
- o Total usage
- o Total usage time
- o Percent utilization
-
- Beneath all of the above information about each user, the following
- summary information is provided about each application the user used:
- o Path and file name being metered
- o Metered application name
- o Number of licenses available
- o Total number of times queued
- o Total usage
- o Total usage time
- o Percent utilization
-
- 7.5.8 File Integrity Activity Report
-
- The File Integrity Activity report provides a listing of all the
- activity on the virus secured files and applications. It also gives
- details about who used the secured files, where these files were
- used and the actions taken by SiteMeter on these files.
-
- The report heading details:
- o Date of report generation
- o Report type
- o Date range for which report was generated
- o The server on which the report was generated
- o The users on which the report was generated
- (will be either one user name or All)
- o The applications on which the report was generated (will be either one
- application name or All)
-
- This report provides the following information about the software
- security violations:
- o Action detected
- o User
- o File name
- o Date and time
- o Network name
- o Station
-
- 7.5.9 SPA Compliance
-
- The SPA Compliance report is accepted by the Software Publisher's
- Association in conjunction with software purchase records as proof
- of software license compliance in networked environments.
-
- The report heading details:
- o Date of report generation
- o Report type
- o The server on which the report was generated
- o The applications on which the report was generated (will be either one
- application name or All)
-
- The report provides the following information about metered applications:
- o Metered application name
- o File name
- o Number of licenses available
- o Peak queued users
- o Peak usage
-
- 7.5.10 Software Purchase Forecast
-
- The Software Purchase Forecast report recommends software purchases
- for metered applications based on user activity and the perceived
- user need as indicated by the number of queued users.
-
- The report heading details:
- o Date of report generation
- o Report type
- o The server on which the report was generated
- o The applications on which the report was generated
- (will be either one application name or All)
-
- The report provides the following information about each application
- on which the report was generated:
- o Metered application name
- o File name
- o Number of licenses installed
- o Peak queued users
- o Number of surplus licenses (number of purchases to accommodate current
- need)
- o 10% Surplus Recommendation (purchase required to accommodate the current
- need plus a 10% increase)
- o 20% Surplus Recommendation (purchase required to accommodate the current
- need plus a 20% increase)
-
- 7.5.11 Upgrade Purchase Forecast
-
- The Upgrade Purchase Forecast report recommends software upgrades
- for metered applications based on user activity and the perceived
- user need as indicated by the number of queued users.
-
- The report heading details:
- o Date of report generation
- o Report type
- o The server on which the report was generated
- o The applications on which the report was generated (will be either
- one application name or All)
-
- The report provides the following information about each application
- on which the report was generated:
- o Metered application name
- o File name
- o Number of licenses installed
- o Peak usage
- o Number of surplus licenses (number of purchases to accommodate current
- need)
- o 10% Surplus Recommendation (purchase required to accommodate the current
- need plus a 10% increase)
- o 20% Surplus Recommendation (purchase required to accommodate the current
- need plus a 20% increase)
-
-
- That concludes this chapter. The next chapter describes the monitoring
- capabilities available for network users.
-
-
-
- 8.0 Monitoring Tools for Network Users
-
- Chapter 7 explained how to generate reports detailing application
- usage. This chapter explains how network users can monitor the use
- of the software applications on the LAN.
-
-
- 8.1 Introduction
-
- SiteMeter provides utilities that enable your network users to monitor
- application usage and view user activity. These features enhance the users'
- ability to work effectively with the network's licensed software. Network
- users access these utilities through the Usage Monitor, as described in this
- chapter.
-
- 8.1.1 Access to the Monitoring Functions
-
- The Usage Monitor's functions are accessed in several ways:
- o by choosing Monitoring from the Tools menu or
- o by choosing the Hide/Show command from the Console menu.
-
- 8.1.2 What's in this Chapter
-
- The following chart describes the sections in this chapter:
-
- SECTION DESCRIPTION
- Viewing Application Usage Describes procedures for accessing the
- application usage graph, viewing user
- information, and sending messages to both
- current and queued users.
-
- Modifying and Updating the Describes procedures for changing the usage
- Usage Graph scale, changing the colors on the graph,
- concealing the status bar, performing a query
- and setting the query timer.
-
-
- 8.2 Viewing Application Usage
-
- SiteMeter's Usage Monitor allows network users without SUPERVISOR rights to
- view the application usage graph. This section explains how network users
- can use this function to get valuable information about application usage by
- other network users. The Usage Monitor allows ANY networked user to determine
- who is using a particular metered application in real time. This is very
- useful when locked out of an application because the Usage Monitor
- shows you which users are using an application.
-
- To use the Usage Monitor, you must first access the utility. The network
- administrator must put USAGE.EXE (and the associated .DLLs) in a public
- place. Users then create a new icon on their Windows desktops with the
- Windows file utility. Finally, the users can choose the Usage icon.
-
- This section is divided into three parts:
- o Monitoring Application Usage
- o Monitoring Current Users
- o Monitoring Queued Users
-
- 8.2.1 Monitoring Application Usage
-
- Networked users can use this utility to see what applications are being
- used, which ones have queued users, etc.
-
- Use the following procedure to view application usage.
-
- 1. Choose the View Application Usage command from the Console menu.
-
- The View Application Usage dialog box is displayed.
-
- 2. Select the desired file server.
-
- If you are not currently attached to the desired file server, choose
- the Attach button. Refer to "Attaching to and Detaching from File
- Servers" in Chapter 4 for more information.
-
- 3. Choose the OK button.
-
- The Application Usage window for the file server you have selected is
- displayed. From this window you can view the following information in
- graph form. Number of:
- o Current users of all metered applications
- o Queued users of all metered applications
- o Peak users of all metered applications (the total number of
- current users plus the total number of queued users)
- o Maximum Number of Concurrent Users of all metered applications
- (the total number of licenses purchased for this application)
-
- 8.2.2 Viewing Application Information
-
- You can view the following application information from this window:
- o Number of Current Users
- o Number of Queued Users
- o Number of Peak Users
- o Number of Licenses
-
- This information can be viewed either on the graph itself or with pop-up
- boxes.
-
- Use the following procedure to view this information with the pop-up boxes.
-
- 1. Select the desired application from the list along the left hand side
- of the window.
-
- When the cursor is in this area, it changes to a magnifying glass.
-
- 2. Hold down the left mouse button to display an information box that
- contains the above information.
-
- 8.2.3 Viewing Current Users
-
- Use the following procedure to view the names of the users who are currently
- using an application.
-
- 1. In the application usage graph, position the cursor in the area to the
- right of the application name within the graphic display.
-
- A small menu box should be attached to the bottom right of the arrow. If
- there is no menu box, the cursor is not pointing to a place where
- information is available. Information is available where the number of
- users (queued, peak and current) are displayed with graph bars.
-
- 2. Click here to display a pop-up menu.
-
- When the pop-up menu is displayed, the application in question is
- outlined in the list along the left hand side of the window.
-
- This menu contains the following items:
- o View Current Users - the list of users currently using this
- application
- o View Queued Users - the list of users who are currently waiting
- to use this application
-
- 3. Choose the View Current Users command.
-
- The Current Users window is displayed. This window lists all the users
- who are currently using this application. From this window you can:
- o Send a Message - send a Novell message to a user.
- o View User Information - view a user's login information.
-
- 8.2.4 Sending a Message to a Current User
-
- You can send messages to current users from the Current Users window. This
- is useful if you want to know when a user will be finished using an
- application that you want to use.
-
- Use the following procedure to send a NetWare Send message to a user
- who is currently using an application.
-
- 1. From the Current Users window, choose the user to whom you wish to send
- the message.
-
- A pop-up menu is displayed.
-
- 2. Choose the Send Message command.
-
- The Send Message To User dialog box is displayed.
-
- 3. Enter the message in the text box provided.
-
- 4. Choose the OK button to send the message.
-
- 8.2.5 Viewing Current Users' Information
-
- From the Current Users window, you can find out important information about
- users using applications on your network.
-
- The following information can be displayed about a selected current user:
- o Login Name - user's login name
- o Full Name - user's full name
- o Server - file server to which this user is attached
- o Logical Station - the station number that is arbitrarily assigned to a
- workstation
- o Network - network number of the workstation where this user is located
- o Station Address - node address of the workstation where this user is
- located
- o Time into Network - length of time this user has been logged in to the
- network
- o Application - application which the user is currently using
- o Time into Application - date and time that the user launched the
- application
-
- Use the following procedure to view this information.
-
- 1. From the Current Users window, select the desired user.
-
- A pop-up menu is displayed.
-
- 2. Choose the User Information command.
-
- The Current User Information dialog box is displayed.
-
- 3. Choose the Close button to exit this dialog box.
-
- 8.2.6 Viewing Queued Users
-
- Use the following procedure to view the users who are waiting to use an
- application.
-
- 1. In the application usage graph, position the cursor in the area to the
- right of the application name within the graphic display.
-
- A small menu box should be attached to the bottom right of the arrow.
- If there is no menu box, the cursor is not pointing to a place where
- information is available. Information is available where the number of
- users (queued, peak and current) is displayed with graph bars.
-
- 2. Click here to display a pop-up menu.
-
- When the pop-up menu is displayed, the application in question is
- outlined in the list along the left hand side of the window.
-
- 3. Choose the View Queued Users command.
-
- The Queued Users window is displayed. This window lists all the users
- who are waiting to use this application. From this window you can:
- o Send Message - send a Novell message to a queued user.
- o View User Information - view a queued user's login information.
-
- 8.2.7 Sending a Message to a Queued User
-
- If there are users waiting for an application you can send them messages.
- Use the following procedure to send a NetWare Send message to a user
- who is currently waiting to use the application.
-
- 1. From the Queued Users window, choose the user to whom you wish to send
- the message.
-
- A pop-up menu is displayed.
-
- 2. Choose the Send Message command.
-
- The Send Message To User dialog box is displayed.
-
- 3. Enter the message in the text box provided.
-
- 4. Choose the OK button to send the message.
-
- 8.2.8 Viewing Queued Users' Information
-
- The following information can be displayed about a selected queued user:
- o Login Name - user's login name
- o Full Name - user's full name
- o Server - file server to which this user is attached
- o Logical Station - the station number that is arbitrarily assigned to a
- workstation
- o Network - network number of the workstation where this user is located
- o Station Address - node address of the workstation where this user is
- located
- o Time into Network - length of time this user has been logged in to the
- network
- o Application - application which the user is currently waiting to use
-
- Use the following procedure to view this information.
-
- 1. From the Queued Users window, select the desired user.
-
- A pop-up menu is displayed.
-
- 2. Choose the User Information command.
-
- The Queued User Information dialog box is displayed with all of the
- above information.
-
- 3. Choose the Close button to exit this dialog box.
-
-
- 8.3 Modifying and Updating the Usage Graph
-
- Networked users can alter the usage graph to best suit their viewing
- needs. In addition to changing the usage scale and the colors, they
- can also perform queries to keep the graph up-to-date.
-
- 8.3.1 Changing the Usage Scale
-
- The Usage Scale is the scale displayed across the top of the
- Application Usage window. By changing the high value for the graph,
- you can increase or decrease the number of users shown. For example,
- if you have 250 workstations on your network, you can set the high
- value to 250 to allow the bars to indicate usage by all your network
- users. If your network is large, but the number of licenses and
- concurrent users is small, you can set the value lower. With this
- flexibility, you can change the graph to best suit your viewing needs.
-
- Use the following procedure to change the usage scale.
-
- 1. While displaying the usage graph, position the cursor in the scale bar
- directly beneath the title bar.
-
- The cursor itself should change to a scale.
-
- 2. Double click to display the Edit View Usage Scale dialog box.
-
- 3. Choose either Auto-scaled or User-defined.
- o Auto-scaled - allows the Usage Monitor to determine the maximum
- value of the scale.
- o User-defined - allows you to determine the maximum value of the
- scale.
-
- 4. If you chose User-defined and wish to enter a high value, select the
- High text box and type the value you wish to use.
-
- NOTE: This value cannot exceed the maximum number of users for the file
- server.
-
- 5. Choose the OK button to save your changes and exit this dialog box.
-
- The usage scale beneath the title bar now reflects the new maximum you
- specified.
-
- 8.3.2 Changing the Colors Used in the Status Bar
-
- You can change the colors used in the status bar of the application usage
- window that reflect the number of current, queued, peak and licensed users.
- Change these colors to best suit your viewing needs.
-
- Use the following procedure to change these colors.
-
- 1. In the application usage graph, position the cursor to one of the colors
- in the status bar.
-
- The cursor changes to a transparent arrow.
-
- 2. Double click at this point.
-
- The standard Windows color palette for that key is displayed.
-
- 3. Select a new color.
-
- 4. Choose the OK button.
-
- The new color is shown on the graph bars as chosen.
-
- The colors can be changed for each item in the status bar.
-
- 8.3.3 Hiding or Showing the Status Bar
-
- You can hide or show the status bar on the usage graph. Showing the
- status bar lets you know which colors indicate current users, queued
- users, etc., as well as the count when you are changing the number
- of maximum concurrent users.
-
- Hiding it gives you more room to display the usage graph.
-
- Use the following procedure to conceal or reveal the status bar.
- From the Console menu, choose the Hide Status Bar command.
-
- This toggles the status bar on and off. When the status bar is
- hidden, this command in the File menu changes to Show Status Bar.
- By choosing the Show command, you can display the status bar again.
-
- 8.3.4 Updating the Usage Graph
-
- The usage graph reflects the application usage on your network. You can
- update the graph to reflect any changes by performing queries.
-
- Every time a query is issued, either manually or automatically, the
- Usage Monitor updates the usage information on the graph. The Query
- Indicator is the last item on the status bar. The indicator is displayed for
- either manual or automatic queries. The Query Now option allows you to
- update the application usage information.
-
- Use the following procedure to instruct the Usage Monitor to perform
- a query at that point.
-
- 1. Select the Query Now command from the Console menu.
-
- SiteMeter performs a query and updates the Application Usage graph
- accordingly. The status bar at the right bottom of the window reflects
- the query's progress.
-
- NOTE: You can also access this feature by pressing <CTRL><Q>.
-
- The Set Timer option allows you to determine how often the Usage Monitor
- checks with the file server for application usage information.
-
- Use the following procedure to set the timer.
-
- 1. Choose the Set Timer command from the Console menu.
-
- The Set Monitor Timer dialog box is displayed.
-
- 2. Enter the desired value.
-
- You can enter a value in seconds from 0 to 9999.
-
- 3. Choose the OK button.
-
- NOTE: You can also access this option by pressing <CTRL><T>.
-
-