Dell™ Enterprise Reporter 2.6: Quick Start Guide
Dell™ Enterprise Reporter 2.6: Quick Start Guide
6
Quick Start Guide
Copyright© 2016 Dell Inc. All rights reserved.
This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are
trademarks of Dell Inc. in the United States and/or other jurisdictions.AMD is a trademark of Advanced Micro Devices, Inc. EMC,
EMC Celerr anda, Isilon OneFS are registered trademarks or trademarks of EMC Corporation in the United States and other
countries. Intel is a trademark of Intel Corporation in the U.S. and/or other countries. Microsoft, Active Directory, SQL Server,
Visual C++, Excel, Windows, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries. NetApp, the NetApp logo, and Data ONTAP are trademarks or
registered trademarks of NetApp, Inc. in the United States and/or other countries. Perl and the Perl logo are trademarks of the
Perl Foundation. Android is a trademark of Google, Inc. All other marks and names mentioned herein may be trademarks of
their respective companies.
Legend
CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.
WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.
IMPORTANT NOTE, NOTE, TIP, or VIDEO: An information icon indicates supporting information.
About Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Contacting Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Technical support resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
• information about files and folders from domains, OUs, computers, NetApp® and EMC® filers,
shares, and DFS shares and clusters.
• information about the computers in your environment.
• high-level summary information and permissions in your Exchange® and Exchange Online™
environments.
• Schedule discoveries to run automatically.
• Track the progress of discoveries, and pinpoint any errors in the collection.
• Configure Access Explorer to scan and index security access information on files, folders, and shares to
provide up-to-date insights into the account permissions on these resources by exploring and reporting.
Using the Report Manager, you can:
• Run reports on the data you have collected.
• Make predefined reports available to reporting users by publishing them.
• Create your own customized reports.
• Customize the appearance of your reports.
• Schedule reports to run when you need them.
• Publish reports to Knowledge Portal.
• Use the Explore view to easily and quickly view permissions associated with shares, folders, and files for
specified accounts and to run permission and summary reports on the access the account has.
• Use the File Storage Analysis summary reports, with meaningful charts and graphs and the ability to drill
down for more detailed information, to answer challenging administrative questions about file storage.
• Use the Exchange summary reports, with meaningful charts and graphs and the ability to drill down for
more detailed information, to answer challenging administrative questions about your Exchange® and
Exchange Online™ environments.
• Use the Exchange reports to monitor and update the access permissions of accounts in an efficient and
timely manner to ensure mailbox information security.
System Requirements
Before installing Enterprise Reporter 2.6, ensure that your system meets the following minimum hardware and
software requirements.
Hardware Requirements
For each component you need the following minimum hardware:
NOTE: New Dynamic Access Control (DAC) features are not supported for Access Explorer Managed
Computers (Targets).
Agent Service
ER Server
(Targets)
Consoles
Nodes
Enterprise Access
Operating Systems Reporter Explorer
Computers
Windows Server® 2012 R2 X X X X X
Managed Computers
Agent Service
ER Server
(Targets)
Consoles
Nodes
Enterprise Access
Operating Systems Reporter Explorer
Windows Server® Core 2008 R2 with Service Pack 1 (64 bit) Cluster X X X X
Windows Server® 2008 with Service Pack 2 (64 bit and 32 bit) X X X X X
Windows Server® 2008 with Service Pack 2 (64 bit and 32 bit) Cluster X
Windows Server® 2003 with Service Pack 2 (64 bit and 32 bit) X
Windows® 8.1 X
Managed Computers
Agent Service
ER Server
(Targets)
Consoles
Nodes
Enterprise Access
Operating Systems Reporter Explorer
The following operating systems are supported for Enterprise Reporter discovery targets.
Windows Server
SQL Server
Exchange
Supported Operating Systems for Discovery Targets L i c e n c e s
Domain Functional Levels
Windows Server® 2012 R2 Functional Level X
Windows Server® 2008 with Service Pack 2 (64 bit and 32 bit) X X
Windows Server® 2003 with Service Pack 2 (64 bit and 32 bit) X X
Windows® 10 X X
Windows® 8.1 X X
Windows Server
SQL Server
Exchange
Supported Operating Systems for Discovery Targets L i c e n c e s
®
Windows 8 (64 bit and 32 bit) X X
Exchange® 2013 X
Windows Server
SQL Server
Exchange
Supported Operating Systems for Discovery Targets L i c e n c e s
®
Exchange 2010 X
Exchange® 2007 X
• install the Certificates snap-in for the SQL Server® host computer
Required Software
To obtain links to the following required software, open the Enterprise Reporter Autorun.
• Microsoft® Visual C++® 2012 Service Pack 1 Redistributable Package (x64) version 11.0.60610.1
• Microsoft® Visual C++® 2012 Service Pack 1 Redistributable Package (x86) version 11.0.60610.1
• Microsoft® Visual C++® 2010 Service Pack 1 Redistributable Package (x64) version 10.0.40219
• Microsoft® Visual C++® 2010 Service Pack 1 Redistributable Package (x86) version 10.0.40219
• Microsoft® Visual C++® 2005 Service Pack 1 Redistributable Package (x64) version 8.0.59192
• Microsoft® Visual C++® 2005 Service Pack 1 Redistributable Package (x86) version 8.0.59193
To collect Exchange® 2007 information, the following additional considerations are required:
• Exchange® 2007 Management Tools must be installed on the computer where the Enterprise Reporter
node is installed and must be in the same forest as the 2007 Exchange Organization.
• It is highly recommended to put the computer where the Enterprise Reporter node is installed within the
target Exchange® 2007 domain.
Required Services
• Remote Registry service enabled on discovery targets for collections
• Net.TCP Port Sharing service enabled on the Enterprise Reporter server and nodes
Port Requirements
For the Enterprise Reporter components to communicate, some ports must be open.
• The default port used for communication between the server and the consoles is 7738. This port is also
used by the nodes to access the server. The port is configured during installation of the server, and is
required in the connection dialog box for both the Configuration Manager and the Report Manager.
You can view the port currently in use on the System | Information page in the Configuration Manager,
and the System Information tab in the Report Manager.
• The default port used for communication from the Enterprise Reporter server to the nodes is port 7737.
This port may be configured during installation.
• The port used for communication from the console to the Access Explorer service is 8722. This is not
configurable.
• The port used for communication for the agent service is 8721 and 18530. In some environments, port
139 may need to be open on the firewall if you are accessing a NetApp device using NetBIOS.
This figure outlines the ports used by the Enterprise Reporter components.
This table outlines the ports used by all of the Enterprise Reporter components and discoveries.
Table 5. Ports Used by Enterprise Reporter
Configuration Manager
SQL Server
Computer
Exchange
Registry
NTFS
Configuration Manager
SQL Server
Computer
Exchange
Registry
NTFS
Application Port Type C o mpo nents D i s c o v e r i e s
TCP
LDAP 389 UDP X X X X X X X X X
SMB / Remote Registry 445 TCP X X X X X
LDAP Secure 636 TCP X
DCOM on XP/2003 and below 1024 TCP
(uses an open port in this range) - 5000 UDP X X X X X X
SQL 1433 TCP X X X X X X X X X X
TCP
SQL Server Browser Service 1434 UDP X X
LDAP GC 3268 TCP X X X
Enterprise Reporter Node 7737 TCP X X X X X X X X
Enterprise Reporter Server 7738 TCP X X X
8721,
Access Explorer Agent 18530 TCP X
Access Explorer Service 8722 TCP X X X
Exchange PowerShell 12067 TCP X**
DCOM on Vista/2008 and above 49152 TCP
(uses an open port in this range) - 65535 UDP X X X X X X
*Exchange
2010 and higher, **Exchange 2007 only
This service account must be able to access the SQL Server® where the Enterprise Reporter database
resides.
9 If you are installing the Enterprise Reporter server, verify the default port of 7738 to be used for the
Enterprise Reporter server, and click Next.
- OR -
If the default port 7738 is in use, specify an alternate port for the server, and click Next.
10 Select the country where you are installing the product, and click Next.
11 Review the Software Improvement Program overview, and click Next.
- OR -
If you are presented with the option to opt in or opt out of the Software Improvement Program, make
your selection, and click Next.
You may also opt in or opt out of the program after installation is complete. Select Configuration
Manager | System | Configuration or Report Manager | System Configuration, and click Change
software improvement preferences.
12 Click Install.
13 Click Close.
If errors were encountered during installation they are listed on this page.
14 If you have installed the server, you need to configure the database.
- OR -
If you have installed the Configuration Manager or Report Manager without the server, you must add the
required user to the proper security group, or they will not be able to open the console.
For more information, see Role Based Security in Enterprise Reporter in the Dell Enterprise Reporter Installation
and Deployment Guide in the Technical Documentation.
You can either type the instance name or browse to it. If you browse, you will see all SQL Servers® in
your subnet that are configured to advertise their presence. If you do not see your server on the list, you
must type the name.
3 Type a name for your database.
- OR -
Type the name of the existing empty database to be connected, or browse to it.
4 Select the preferred type of authentication to use to connect to the SQL Server®, and click Next.
Enterprise Reporter connects to the SQL Server® using Windows® authentication by default. If you want
to connect using SQL credentials, enter them before clicking Next.
Enterprise Reporter validates the SQL Server® and your right to create a database on the instance before
you can proceed to the next step.
5 If necessary, adjust the initial database size or file paths, and click Next.
6 If required, enter the domain of the Enterprise Reporter server’s service account.
7 Enter the names for the security groups, and click Next.
Using the default group names is recommended.
For more information, see Security Groups in Enterprise Reporter in the Dell Enterprise Reporter Installation and
Deployment Guide in the Technical Documentation.
8 Review the message box, and click OK to continue.
- OR -
Click Cancel to further modify the Security Group Names.
9 Optionally, accept the default to open Configuration Manager.
Once the database is created, you will use the Configuration Manager to enter the Enterprise Reporter
licences and configure the collection of network information.
10 Optionally, accept the default to start the Reporter Server.
This option starts the Enterprise Reporter Server service that must be running for Enterprise Reporter to
function.
11 Click Finish to create the database.
If errors were encountered during database creation, an error dialog box displays.
For help troubleshooting errors, see Database Configuration Issues in the Dell Enterprise Reporter Installation
and Deployment Guide in the Technical Documentation.
For more information, see Using the Credential Manager in the Dell Enterprise Reporter Configuration Manager
User Guide in the Technical Documentation.
8 To use SQL credentials to connect to the database, select Database Credential, choose SQL
Authentication, and select the SQL account from the Credential Manager.
9 Configure the number of concurrent tasks the node can process.
For more information, see Nodes in the Dell Enterprise Reporter Configuration Manager User Guide in the
Technical Documentation.
10 Click Add.
You can add more than one node at a time to the same cluster. Repeat steps 6 through 9 until you have
added all of your nodes.
By default, nodes are enabled after they are created. If you prefer to manually enable the nodes, clear
the Enable Node check box. At least one node must be enabled in order for your cluster to be functional.
11 Click Finish.
NOTE: When a node is deployed and enabled, the cluster is also enabled. If you deployed the node
without enabling it, you have to manually enable the cluster.
For more information, see Enabling a Cluster in the Dell Enterprise Reporter Configuration Manager User
Guide in the Technical Documentation.
6 Click OK.
Once the Access Explorer database setup is complete, the database icon is displayed with a green check mark to
show that it is configured.
Step-By-Step Walkthroughs
Enterprise Reporter is a very flexible reporting tool, that can be used for many different purposes. This section
uses examples of common uses to highlight how to set up Enterprise Reporter to maximize its potential.
• Pre- and Post-Migration Assessment — Assess your network environment before migrating to identify any
issues, and re-assess once the migration is complete to ensure that everything went as planned.
• Manage Compliance — Set up reports to automatically generate and be delivered, minimizing the time
you have to spend demonstrating compliance.
• Change History Reporting — Track changes in your network environment using Change History Reporting.
You can monitor changes to hardware, SQL databases, files, folders and so on.
• Real-time Access Assessment — Interactively browse permissions of selected users and groups across the
entire population of file servers and network filers. Know who has access to what files, folders and
shares.
• File Storage Consolidation — Prepare for storage migration by identifying and excluding from migration
files that are unused, orphaned, or are in violation of your storage usage policy.
This walkthrough will guide you through each of these use cases for Enterprise Reporter. Each scenario shows
you how to leverage Enterprise Reporter to get the information you want when you need it.
NOTE: These scenarios assume you have installed Enterprise Reporter, set up the database, and
configured Access Explorer. For more information, see Installing Enterprise Reporter on page 16.
Scenario
You have received a request to identify all users, groups, and group memberships for a particular domain, and
to provide it in Excel format for tracking purposes. This same report will be required after migrating all users to
a new domain.
You will need to take the following steps:
1 Configure a Cluster to Perform the Data Discovery
2 Create a Discovery to Define the Data Collection
3 Run the Discovery to Collect the Data
4 Run the Reports You Need and Export Them to Excel
Clusters are created in the Configuration Manager. To ensure you have the necessary access to the consoles and
reports, make sure you are still logged in to your computer with the same user account that you used to install
Enterprise Reporter.
If you do not have the Configuration Manager open, perform the following steps:
To connect to a server
1 Click the Start menu and select All Programs | Dell | Enterprise Reporter | Configuration Manager.
2 Type the name of the server.
- OR -
Click Browse, and locate the computer where the server is installed.
Once you have connected to a server, the server name is stored in the list for future use.
3 If necessary, type in the port number.
4 Click Connect.
If this is your first time opening the console, you will need to provide your country so your status in the
Software Improvement Program can be determined. You can choose to participate by configuring the
software improvement settings on the System | Configuration page.
The Create Cluster wizard walks you through the process of setting up a cluster. If you want to create a new
Cluster, see To create your first cluster and node on page 19.
To run a discovery
1 On the Manage Discoveries page, select the discovery AD - [Domain Name].
2 Click Run.
3 To view the progress of the discovery, click the Processing link in the Next Run column.
When the discovery is complete, the status in the Last Run Status column will change. If there were any
errors during collection, click the status to view the details of the last run.
Manage Compliance
If you are required to regularly show compliance with corporate or regulatory security requirements, Enterprise
Reporter can be of great assistance by automatically gathering information and reporting on it.
Scenario
At the beginning of each month, you must deliver a report that shows that users who have been inactive for
three months have their accounts disabled, in line with your corporate security policy. You are going to use two
reports to do this: one report for yourself, in order to identify accounts that are not compliant, and one report
that is sent to the stakeholders showing compliance. You will automate the delivery of the monthly report, to
ensure it is always on time. You will need to take the following steps:
1 Modify an Existing Report
2 Schedule the Discovery
3 Schedule Report Delivery to Stakeholders
7 Click Create.
8 Set the Usage to Hidden.
9 Set the associated field to IsDisabled.
10 Set the operator to Equals and the value to No.
11 Click OK.
Leave the dialog box open so you can modify the layout.
To run the report and save the parameter values for future report runs
1 If necessary, in the My Reports container, select the Domain Users to be Disabled report.
2 In the Include the following domains parameter, type the domain name, and click Add.
You can also click Search, locate and add the domain, and click OK.
3 In the Users not logged on in the last (days) parameter, change the number of days to 90.
4 To make these the default parameter values, click Save parameters as default, and click OK in the
confirmation dialog box.
5 Click Run report.
Your report appears, listing all users who are not in compliance. You can now make any changes you need prior
to the sending the compliance report to your stakeholders.
If you did not create an Active Directory® discovery that collects accounts, follow the steps in Create a
Discovery to Define the Data Collection on page 23, but stop on the Schedule page.
2 If necessary, click the Schedule tab.
3 Click Monthly, and select the last Friday of the month.
To schedule a report
Scenario
As part of your job, you are responsible for monitoring changes to critical services. Once a week, you must
generate a report to ensure only expected changes are being made. Since collecting change history involves
more data, you want to scale up your cluster to handle the increased traffic. You will need to take the following
steps:
• Add Another Node to a Cluster
• Enable Change History for the Computer Discovery Type
• Create and Schedule a Discovery
• Schedule the Report
To create a node
1 On the Manage Discovery Clusters pane, select the cluster you created.
2 In the bottom pane, on the Discovery Nodes tab, click Add Node.
3 Browse to the computer where the node is to be created, and click OK.
4 Select the service account from the Credential Manager.
If you want to use a different account, you can add it to the Credential Manager.
5 Click Add.
All other configuration is optional.
2 On the Schedule Explorer tab, click New Schedule, and enter Service Changes as the schedule
name.
3 Create a weekly schedule for a time after the discovery will complete.
4 Launch the Credential Manager, and add an account that has read access to the database.
5 In the Delivery section, choose a network share where the reports will be delivered.
Ensure the credentials provided in the previous step have write access to this share.
6 In the From field, type the email address of the sender.
This assumes that the mail server delivery has already been set up as outlined in Schedule Report
Delivery to Stakeholders on page 27.
7 In the To field, type the email addresses of the recipients, separated by a comma or semicolon.
8 Click OK.
The schedule card is created.
Scenario
Human Resources has notified you of an employee who recently left the company. Their account is now disabled
and you want to search the network to discover where this employee had permissions on resources so you can
delete their account .
NOTE: Before you begin, be sure you have completed the two tasks to set up Access Explorer. See Set Up
Access Explorer on page 20.
With computers running Windows Server®, you can select either a local or a remote installation. With Windows®
clusters and NAS servers, you must choose remote installation. In this scenario, you will install the agent service
locally on one server and remotely for an NAS server.
Explore an Account
For this scenario, you want to look for the account of a person who has recently left the company. The account
is disabled and you want to search for where this person had permissions so you can remove them.
To explore an account
1 Open the Report Manager, and click the Explore tab.
2 On the Accounts tab, click Add Accounts, and select Domain Account or Local Account depending on
the type of account you need.
3 Locate the disabled account.
In this walk-through, you do not necessarily have to perform any action on the account, so if you cannot
locate a disabled account, select any account.
4 Click OK.
The account is listed. From here you can drill down to locate the permissions. You are going to explore
both servers you added as managed computers to see where the disabled user has explicit permissions on
resources.
5 Right-click the account, and choose Show Member of.
A list of all the groups of which the account is a member displays.
Now you will drill-down on the account to view the permissions.
Scenario
You have received a request to get ready for storage migration and consolidation by identifying (and excluding
from migration) files that are duplicate, unused, orphaned or that violate storage usage policy.
You will need to take the following steps:
Clusters are created in the Configuration Manager. To ensure you have the necessary access to the consoles and
reports, make sure you are still logged in to your computer with the same user account that you used to install
Enterprise Reporter.
If you do not have the Configuration Manager open, perform the following steps:
To connect to a server
1 Click the Start menu and select All Programs | Dell | Enterprise Reporter | Configuration Manager.
2 Type the name of the server.
- OR -
Click Browse, and locate the computer where the server is installed.
Once you have connected to a server, the server name is stored in the list for future use.
3 If necessary, type in the port number.
4 Click Connect.
If this is your first time opening the console, you will need to provide your country so your status in the
Software Improvement Program can be determined. You can choose to participate by configuring the
software improvement settings on the System | Configuration page.
The Create Cluster wizard walks you through the process of setting up a cluster. If you want to create a new
Cluster, see To create your first cluster and node on page 19.
Dell listens to customers and delivers worldwide innovative technology, business solutions, and services they
trust and value. For more information, visit http://www.software.dell.com.
Contacting Dell
For sales or other inquiries, visit http://software.dell.com/company/contact-us.aspx or call 1-949-754-8000.