Welcome to LANDesk Management Suite 9.0, a stand-alone management application that lets you maintain the availability of devices throughout your organization.
Designed with an emphasis on low resource impact, this product has several "on-demand" agents and services that run only when they are needed, thus freeing memory and CPU cycles for other tasks. LANDesk knows device availability is critical for your company, so the product is designed for stability, running in 24/7 environments. It leaves you in control of the software running on your devices. You can install the full agent, select specific components, or move devices to your device list without installing any agents.
NOTE: For dialogs and windows to display properly, the Management Suite Web site must be added to the allowed list of the browser's popup blocker.
Management Suite enables you to choose your level of management coverage, from simple information gathering to extended performance analysis, security and configuration control. Management Suite includes the following:
Easy access with the Web console: Use a Web-based console for selected tasks. You can run it from your primary workstation or from a workstation in another location with no install. Simply browse to the product URL, http://coreserver/remote. You "target" specific devices for actions such as software distribution by placing them in the Targeted devices list, similar to the "shopping cart" model in many Web applications.
Health dashboard: The health dashboard provides a quick real-time assessment of your managed devices. You can see if any devices configured with the LANDesk monitoring agent have reached a Critical threshold on a given measurement, such as disk space or memory usage. The health dashboard indicates how many devices are at each different status, and you can right-click a device to see a summary of its current condition or launch troubleshooting tools such as ping, trace route, or remote control. Double-click a device's icon to open its summary page, or if you have deployed agents to the device, a Web console opens with additional management features..
Scheduled task view: View all scheduled and completed tasks, such as agent deployment, vulnerability, software distribution, discovery, OS deployment, software update, and custom script tasks from one location. You can reschedule the task, modify it, or make it a recurring event.
Remote control: You can remotely troubleshoot and resolve problems on Windows devices via application layer ring 3 remote control, providing increased stability over driver-level remote control solutions. For Linux devices, you can get quick remote access via SSH or SFTP. Remote control uses your own keyboard layout, so if you are using a Spanish language keyboard and need to remote to a device in the France office, your keystrokes will be "translated" to the French keyboard layout.
Health monitoring / Alerts: Monitoring the overall health of devices by setting thresholds for measurements such as disk space or CPU usage, and configure how you want to be alerted in the event a threshold is exceeded. You can see health concerns of the selected device and initiate action to resolve the problem before users experience sluggish performance or downtime because of the problem.
Provisioning: Provisioning lets you define all the attributes and features of your devices before they are introduced into your environment. Provisioning uses automation to apply this set of attributes and features to the devices. Provisioning reduces downtime and makes sure new devices are reliable and predictable when they go into your production environment. You can access the provisioning history of each device to find out when and with what it was provisioned. Provisioning runs on both Windows and Linux, with template creating the same for all platforms.
Agentless device management: Manage devices in the My devices view without installing a management agent on them, when they are enabled with an out-of-band management technology such as Intel vPro, IPMI, or Dell DRAC.
Software license monitoring: Inventory the software being used to assist you in implementing complete, effective software asset management and license compliance policies.
Performance monitoring: You can monitor the real-time performance of your managed devices, using a wide range of attributes. You can even track these attributes and see historical performance data reported over several days. You can monitor devices that have the monitoring agent installed, and you can also monitor out-of-band IPMI-enabled devices without an agent.
Reporting: You can run reports on any device in the database showing usage statistics, resource allocation, and many other measurements. This product includes several canned (pre-formulated) reports. These reports run quickly by directly accessing the database to gather information and represent data in two- or three-dimensional pie and bar graphs. You can create additional reports by creating custom queries.
Hardware-specific configuration: This tool lets you configure options for devices with Intel vPro, IPMI, Dell DRAC, and Dell OMCI capabilities. You can generate IDs for provisioning Intel vPro devices, view the generated IDs, and export them to a USB drive for provisioning. You can change configuration options related to provisioning your Intel AMT devices. You can also define system defense policies, which detect and block suspicious network activity on the devices. Wireless management of devices with Intel Centrino Pro is included, as is remote configuration for devices outside your network. Similarly, you can change BMC configuration options for IPMI devices, and you can view Dell DRAC logs and manage usernames for Dell DRAC devices.
Patch manager: You can receive automated software updates from industry sources such as Microsoft, as well as user-created custom vulnerability definitions, vulnerability detection, and assessment. You can manually deploy the desired, tested patches using the software distribution capabilities.
Software distribution: Software distribution enables you to deploy a variety of software and file packages to Linux and Windows devices at your convenience. You can send a software package immediately or schedule it for off-peak hours. You can group distribution packages into custom groups for concurrent distribution.
Role-based administration: Add users and configure their access to tools and other devices based on their administrative role. With role-based administration, you assign a scope to determine the devices a user can view and manage, and rights to determine the tasks they can perform, such as reporting only users. You can also narrow the remote control feature so that a user can only execute certain remote control tasks (file transfer, chat, reboot machine, and so forth), and you can assign rights based on days of the week and hours within the day.
Inventory: Using the inventory scanning tool, the product compiles a wealth of hardware and software information into the core database. You can then view, print, and export this data. You can place cumulative inventory data onto another server to lessen the resource requirement on the core server (off-core inventory service).
Unmanaged device discovery: Be sure of what is on your network. Device discovery gathers basic information on all devices in your environment, enabling greater control and speeding agent deployment to targeted devices.