0% found this document useful (0 votes)
82 views38 pages

Dell™ Enterprise Reporter 2.6: Quick Start Guide

Uploaded by

Pupsik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
82 views38 pages

Dell™ Enterprise Reporter 2.6: Quick Start Guide

Uploaded by

Pupsik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Dell™ Enterprise Reporter 2.

6
Quick Start Guide
Copyright© 2016 Dell Inc. All rights reserved.
This product is protected by U.S. and international copyright and intellectual property laws. Dell™ and the Dell logo are
trademarks of Dell Inc. in the United States and/or other jurisdictions.AMD is a trademark of Advanced Micro Devices, Inc. EMC,
EMC Celerr anda, Isilon OneFS are registered trademarks or trademarks of EMC Corporation in the United States and other
countries. Intel is a trademark of Intel Corporation in the U.S. and/or other countries. Microsoft, Active Directory, SQL Server,
Visual C++, Excel, Windows, Windows Server, and Windows Vista are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries. NetApp, the NetApp logo, and Data ONTAP are trademarks or
registered trademarks of NetApp, Inc. in the United States and/or other countries. Perl and the Perl logo are trademarks of the
Perl Foundation. Android is a trademark of Google, Inc. All other marks and names mentioned herein may be trademarks of
their respective companies.

Legend

CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.

WARNING: A WARNING icon indicates a potential for property damage, personal injury, or death.

IMPORTANT NOTE, NOTE, TIP, or VIDEO: An information icon indicates supporting information.

Enterprise Reporter Quick Start Guide


Updated - June 2016
Software Version - 2.6
Contents

Introducing Dell™ Enterprise Reporter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4


Key Features of Enterprise Reporter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Enterprise Reporter Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Enterprise Reporter Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
System Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... .... ..... 6
Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... .... ..... 6
Supported Operating Systems . . . . . . . . . . . . . . . . . . . . . . . . . . ... .... ..... 7
Active Roles Supported Versions . . . . . . . . . . . . . . . . . . . . . . . . ... .... . . . . .11
SQL Server Supported Versions . . . . . . . . . . . . . . . . . . . . . . . . . ... .... . . . . .11
Required Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... .... . . . . .12
Required Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... .... . . . . .13
Minimum Permissions for Initially Installing Enterprise Reporter . . . ... .... . . . . .13
Port Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ... .... . . . . .14
Installing Enterprise Reporter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
Create/Connect Your Enterprise Reporter Database . . . . . . . . . . . . . . . . . . . . . . .17
Configure Enterprise Reporter Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
Create Your First Enterprise Reporter Cluster and Node . . . . . . . . . . . . . . . . . . . .19
Set Up Access Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Create Your Access Explorer Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
Setting up your first Managed Domain (includes the Service Account) . . . . . . . . . . .21
Step-By-Step Walkthroughs . . . . . . . . .... ....... ... .... .... ... .... . . . . .21
Pre- and Post-Migration Assessment .... ....... ... .... .... ... .... . . . . .22
Manage Compliance . . . . . . . . . . .... ....... ... .... .... ... .... . . . . .24
Change History Reporting . . . . . . .... ....... ... .... .... ... .... . . . . .28
Real-time Access Assessment . . . . .... ....... ... .... .... ... .... . . . . .31
File Storage Consolidation . . . . . . .... ....... ... .... .... ... .... . . . . .34

About Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Contacting Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
Technical support resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38

Dell Enterprise Reporter 2.6 Quick Start Guide


3
Contents
Introducing Dell™ Enterprise Reporter
Dell Enterprise Reporter provides administrators, security officers, help desk staff, and other stakeholders with
insight into their network environment. Reporting on your network environment provides:
• General visibility into the security and configuration of your environment.
• Validation against your security policies to ensure objects are configured as expected. This helps you
detect security violations such as identifying users with inappropriate access.
• An easy way to respond to inquiries from internal and external auditors requesting security and
configuration information.
Enterprise Reporter provides scalability, security, and customizability by:
• Allowing you to deploy Enterprise Reporter to take advantage of both your network structure and
available hardware or virtual computers. You can scale your deployment up or down as your needs
change.
• Separating data collection from reporting, allowing less technical users to easily generate the reports
they need from stored data.
• Using role-based security to provide and revoke access to your Dell Enterprise Reporter deployment.
• Providing granular credentials management, allowing you to access information using different accounts
for performing different tasks and accessing different parts of your environment. Accounts are stored in
a central Credential Manager, making it easy for you to see what accounts are in use and to keep them up
to date.
• Providing a full featured report designer. You can easily customize the included reports by adding
attributes and using advanced filtering, or you can build new reports to satisfy the unique requirements
of your organization.
• Automating the collection of data and the generation and delivery of reports.

Key Features of Enterprise Reporter


Organizations worldwide are struggling to keep up with corporate policies, changing government regulations,
and industry standards. Generating reports that prove compliance, and deciding what data to include is a time
consuming and difficult process. In order to meet compliance requirements or initiate IT best practices,
organizations must know exactly what is in the IT infrastructure at any moment in time, how it is configured,
and who has access to it. Dell presents Enterprise Reporter as a solution to these problems.
Enterprise Reporter provides a unified solution for data discovery and report generation. Using the Enterprise
Reporter Configuration Manager, administrators can easily configure and deploy discoveries to collect and store
data. Once the data has been collected, the Report Manager allows users to produce reports that help
organizations to ensure that they comply with industry regulations and standards, adhere to internal security
policies, monitor hardware and software requirements, and fulfill many other reporting requirements.
Using the Configuration Manager, you can:
• Configure your collection environment to minimize network traffic and optimize performance.
• Create discoveries to collect data that will be made available to the Report Manager:

• information about your Active Directory® environment.

• information about files and folders from domains, OUs, computers, NetApp® and EMC® filers,
shares, and DFS shares and clusters.
• information about the computers in your environment.

• data from specified SQL Server® computers, instances, and databases.


• general and registry information from selected computers.

Dell Enterprise Reporter 2.6 Quick Start Guide


4
Introducing Dell™ Enterprise Reporter
• high-level summary information on file storage.

• high-level summary information and permissions in your Exchange® and Exchange Online™
environments.
• Schedule discoveries to run automatically.
• Track the progress of discoveries, and pinpoint any errors in the collection.
• Configure Access Explorer to scan and index security access information on files, folders, and shares to
provide up-to-date insights into the account permissions on these resources by exploring and reporting.
Using the Report Manager, you can:
• Run reports on the data you have collected.
• Make predefined reports available to reporting users by publishing them.
• Create your own customized reports.
• Customize the appearance of your reports.
• Schedule reports to run when you need them.
• Publish reports to Knowledge Portal.
• Use the Explore view to easily and quickly view permissions associated with shares, folders, and files for
specified accounts and to run permission and summary reports on the access the account has.
• Use the File Storage Analysis summary reports, with meaningful charts and graphs and the ability to drill
down for more detailed information, to answer challenging administrative questions about file storage.
• Use the Exchange summary reports, with meaningful charts and graphs and the ability to drill down for
more detailed information, to answer challenging administrative questions about your Exchange® and
Exchange Online™ environments.
• Use the Exchange reports to monitor and update the access permissions of accounts in an efficient and
timely manner to ensure mailbox information security.

Enterprise Reporter Components


An Enterprise Reporter deployment includes (at minimum):
• An Enterprise Reporter server and database
• At least one Configuration Manager installation
• At least one deployed node
• At least one Report Manager installation
• An Access Explorer database
• At least one agent for Access Explorer
For information on installation, see Installing Enterprise Reporter on page 16, Create Your Access Explorer
Database on page 20, and Add Managed Computers on page 31.

Dell Enterprise Reporter 2.6 Quick Start Guide


5
Key Features of Enterprise Reporter
Enterprise Reporter Architecture
Figure 1. Enterprise Reporter architecture

System Requirements
Before installing Enterprise Reporter 2.6, ensure that your system meets the following minimum hardware and
software requirements.

Hardware Requirements
For each component you need the following minimum hardware:

Table 1. Hardware Requirements

Enterprise Reporter Access Explorer Agent Service


Memory • Minimum: 16 GB RAM • Minimum: 2 GB RAM
• Recommended: 16 GB RAM • Recommended: 4 GB RAM
Processor • Intel®_or AMD 2 GHz multiprocessor • 500 MHz+ Processor
• 64-bit processor (recommended) or
32-bit processor

Dell Enterprise Reporter 2.6 Quick Start Guide


6
System Requirements
Table 1. Hardware Requirements

Enterprise Reporter Access Explorer Agent Service


Hard disk Disk space requirements will vary with the • 100 MB free disk space for every
space Enterprise Reporter components you install: 1,000,000 files/folders scanned
• Server—10 GB
• Configuration Manager—2 GB
• Discovery Node—10 GB for installed
files, plus extra space for processing
discoveries. Space required varies with
the amount of data collected.
• Report Manager—10 GB
• Database size varies with the amount of
data you collect
• The file share that you use for the
Shared Data Location will require space
for storage of collected data. Space
required varies with the amount of data
collected.
• Total disk size if all components and
databases are on the same system—100
GB
Policies When an agent service is installed on Windows
Server® 2012, you must disable the following
local policy: User Account Control: run all
Administrators in Admin Approval Mode.
Other Windows® clusters and NAS devices need to be
managed by a remote agent, located on a
computer running a Windows® O/S that is
supported by Enterprise Reporter.

Supported Operating Systems


The following operating systems are supported for Enterprise Reporter components and Access Explorer.
NOTE: It is not recommended that the server or console be installed on a domain controller.

NOTE: New Dynamic Access Control (DAC) features are not supported for Access Explorer Managed
Computers (Targets).

Table 2. Supported Operating Systems


Managed Computers

Agent Service
ER Server

(Targets)
Consoles

Nodes

Enterprise Access
Operating Systems Reporter Explorer
Computers
Windows Server® 2012 R2 X X X X X

Windows Server® 2012 X X X X X

Dell Enterprise Reporter 2.6 Quick Start Guide


7
System Requirements
Table 2. Supported Operating Systems

Managed Computers

Agent Service
ER Server

(Targets)
Consoles

Nodes
Enterprise Access
Operating Systems Reporter Explorer

Windows Server® 2012 R2 Cluster X

Windows Server® 2012 Cluster X

Windows Server® Core 2012 R2 X X X X

Windows Server® Core 2012 R2 Cluster X X X X

Windows Server® Core 2012 X X X X

Windows Server® Core 2012 Cluster X X X X

Windows Server® 2008 R2 with Service Pack 1 X X X X X

Windows Server® 2008 R2 with Service Pack 1 Cluster X

Windows Server® Core 2008 R2 with Service Pack 1 X X X X

Windows Server® Core 2008 R2 with Service Pack 1 (64 bit) Cluster X X X X

Windows Server® 2008 with Service Pack 2 (64 bit and 32 bit) X X X X X

Windows Server® 2008 with Service Pack 2 (64 bit and 32 bit) Cluster X

Windows Server® 2003 with Service Pack 2 (64 bit and 32 bit) X

Windows Server® 2003 R2 with Service Pack 2 (64 bit) X

Windows® 8.1 X

Windows® 8 (64 bit and 32 bit) X

Windows® 7 with Service Pack 1 (64 bit and 32 bit) X

Windows Vista® with Service Pack 2 (64 bit and 32 bit) X

Windows® XP Professional with Service Pack 3 (64 bit and 32 bit)


Network Attached Storage (NAS) Devices
NetApp® Filer - Data ONTAP® 8.3 C-Mode X

NetApp® Filer - Data ONTAP® 8.2 C-Mode X

NetApp® Filer - Data ONTAP® 8.1 C-Mode X

NetApp® Filer - Data ONTAP® 8.1 7-Mode X

NetApp® Filer - Data ONTAP® 8.0.1 X

NetApp® Filer - Data ONTAP® 8.X and above X

NetApp® Filer - Data ONTAP® 7.3.4 X

EMC® Celerra® 7.0.52.1 X

EMC® Celerra® 6.0.36.4 X

EMC® Celerra® 5.6 with Server Message Block 1.0 X

EMC® VNX 7.1.47.5 X

Dell Enterprise Reporter 2.6 Quick Start Guide


8
System Requirements
Table 2. Supported Operating Systems

Managed Computers

Agent Service
ER Server

(Targets)
Consoles

Nodes
Enterprise Access
Operating Systems Reporter Explorer

EMC® VNX 7.0.35.3 X

Isilon® OneFS® 7.1.0.0 X


Dell FluidFS 5.0.002821 X
Dell FluidFS 4.0 X

The following operating systems are supported for Enterprise Reporter discovery targets.

Table 3. Supported Operating Systems for Discovery Targets

File Storage Analysis


Active Directory

Windows Server

SQL Server

Exchange
Supported Operating Systems for Discovery Targets L i c e n c e s
Domain Functional Levels
Windows Server® 2012 R2 Functional Level X

Windows Server® 2012 Functional Level X

Windows Server® 2008 R2 Functional Level X

Windows Server® 2008 Functional Level X

Windows Server® 2003 Functional Level X


Computers
Windows Server® 2012 R2 X X

Windows Server® 2012 X X

Windows Server® Core 2012 X X

Windows Server® 2008 R2 with Service Pack 1 X X

Windows Server® Core 2008 R2 with Service Pack 1 X X

Windows Server® 2008 with Service Pack 2 (64 bit and 32 bit) X X

Windows Server® 2003 R2 with Service Pack 2 (64 bit) X X

Windows Server® 2003 with Service Pack 2 (64 bit and 32 bit) X X

Windows® 10 X X

Windows® 8.1 X X

Dell Enterprise Reporter 2.6 Quick Start Guide


9
System Requirements
File Storage Analysis
Active Directory

Windows Server

SQL Server

Exchange
Supported Operating Systems for Discovery Targets L i c e n c e s
®
Windows 8 (64 bit and 32 bit) X X

Windows® 7 with Service Pack 1 (64 bit and 32 bit) X X

Windows Vista® with Service Pack 2 (64 bit and 32 bit) X X

Windows® XP Professional with Service Pack 3 (64 bit and 32 bit) X X


Network Attached Storage (NAS) Devices
Dell FluidFS 5.0.002821 X X
Dell FluidFS 4.0 X X
EMC® Celerra® 7.0.52.1 X
® ®
EMC Celerra 6.0.36.4 X

EMC® Celerra® 5.6 with Server Message Block 1.0 X

EMC® VNX 7.1.47.5 X

EMC® VNX 7.0.35.3 X

Isilon® OneFS® 7.1.0.0 X

NetApp® Filer - Data ONTAP® 8.3 C-Mode X X

NetApp® Filer - Data ONTAP® 8.2 C-Mode X X

NetApp® Filer - Data ONTAP® 8.1 C-Mode X X

NetApp® Filer - Data ONTAP® 8.1 7-Mode X X

NetApp® Filer - Data ONTAP® 8.0.1 X X

NetApp® Filer - Data ONTAP® 8.X and above X X

NetApp® Filer - Data ONTAP® 7.3.4 X X


SQL Server Instances
SQL Server® Clusters X

SQL Server® 2016 X

SQL Server® 2014 X

SQL Server® 2012 X

SQL Server® 2008 R2 X

SQL Server® 2008 with Service Pack 2 X

SQL Server® 2005 with Express Service Pack 3 X

SQL Server® 2005 with Service Pack 3 X


Exchange Servers
Exchange Online™ X
Exchange® 2016 X

Exchange® 2013 X

Dell Enterprise Reporter 2.6 Quick Start Guide


10
System Requirements
File Storage Analysis
Active Directory

Windows Server

SQL Server

Exchange
Supported Operating Systems for Discovery Targets L i c e n c e s
®
Exchange 2010 X

Exchange® 2007 X

Exchange® Mixed Modes (2007-2010, 2010-2013, 2007-2013) X

Active Roles Supported Versions


The following versions of Active Roles are supported as targets of Active Directory discoveries. See the Active
Roles web site for the hardware and software requirements for your version of Active Roles:
• Active Roles v7.0.2
• Active Roles v6.9.0

SQL Server Supported Versions


The following versions of SQL Server® are supported for the Enterprise Reporter database. See the Microsoft®
web site for the hardware and software requirements for your version of SQL Server®:

• SQL Server® 2016

• SQL Server® 2014

• SQL Server® 2012

• SQL Server® 2008 R2

• SQL Server® 2008 with Service Pack 2


• SQL clusters and database mirroring are supported for your deployment, including

• SQL Server® 2014 Always On

• SQL Server® 2012 Always On

Using SQL Server Certificates


SSL Encryption of SQL Server Connections using Certificates
Enterprise Reporter can be configured to work with a SQL Server® instance. To secure communications while
working with Enterprise Reporter, data sent over connections to the SQL Server can be encrypted using an SSL
certificate.
The steps required to configure this encryption are as follows.
• Using the Microsoft Management Console (MMC):

• install the Certificates snap-in for the SQL Server® host computer

Dell Enterprise Reporter 2.6 Quick Start Guide


11
System Requirements
• import the certificate to the SQL Server® host computer
• Using SQL Server Configuration manager:

• configure the SQL Server® to use the certificate

• configure the SQL Server® to force encryption

• Restart the SQL Server® host computer


• Import the certificate to all Enterprise Reporter computers that will need to communicate with the SQL
Server®, such as:
• Enterprise Reporter server host computer
• Enterprise Reporter nodes
• Enterprise Reporter Configuration Manager host computer
• Enterprise Reporter Report Manager host computer
• Install Enterprise Reporter on a host computer

Required Software
To obtain links to the following required software, open the Enterprise Reporter Autorun.

• Microsoft®.NET Framework 4.0 (Full)

• Microsoft®.NET Framework 3.5 Service Pack 1

• Microsoft® Visual C++® 2012 Service Pack 1 Redistributable Package (x64) version 11.0.60610.1

• Microsoft® Visual C++® 2012 Service Pack 1 Redistributable Package (x86) version 11.0.60610.1

• Microsoft® Visual C++® 2010 Service Pack 1 Redistributable Package (x64) version 10.0.40219

• Microsoft® Visual C++® 2010 Service Pack 1 Redistributable Package (x86) version 10.0.40219

• Microsoft® Visual C++® 2005 Service Pack 1 Redistributable Package (x64) version 8.0.59192

• Microsoft® Visual C++® 2005 Service Pack 1 Redistributable Package (x86) version 8.0.59193

Other Required Software


Microsoft® Excel® (required to view reports exported as spreadsheets)

• Microsoft® Excel® 2013

• Microsoft® Excel® 2010

Active Roles Required Software


To collect Active Roles information, the following software is required on the computer where the Enterprise
Reporter Configuration Manager is installed and on the computer where the Enterprise Reporter node is
installed:
• ADSI Provider (the version must match the Active Roles version)
For more information and installation instructions, see the Active Roles Quick Start Guide.
The following additional considerations are required:
• There must be a trust between the Enterprise Reporter domain and the Active Roles domain.
• The credentials used for the Active Roles discovery must have access to the Active Roles domain.

Dell Enterprise Reporter 2.6 Quick Start Guide


12
System Requirements
Exchange Required Software
To collect Exchange® information, the following software is required on the computer where the node is
installed:
• PowerShell 2.0

To collect Exchange® 2007 information, the following additional considerations are required:

• Exchange® 2007 Management Tools must be installed on the computer where the Enterprise Reporter
node is installed and must be in the same forest as the 2007 Exchange Organization.
• It is highly recommended to put the computer where the Enterprise Reporter node is installed within the
target Exchange® 2007 domain.

Required Services
• Remote Registry service enabled on discovery targets for collections
• Net.TCP Port Sharing service enabled on the Enterprise Reporter server and nodes

Minimum Permissions for Initially Installing


Enterprise Reporter
During your first installation, when you install the Enterprise Reporter server, there are two sets of credentials
that you need to supply, as well as optional SQL credentials. This table outlines what the credentials are used
for, and what permissions they require.

Table 4. Credential Use and Required Permissions

Credentials Used For Permissions Needed


Logged in user Installing the components of Enterprise Administrator access on the local
Reporter computer.
Creating the Reporter and Access Explorer Must have the right to create databases,
databases, roles and logins on the SQL logins and groups.
Server® (unless SQL credentials are
provided)
Creating the security groups Depends on the type of groups that are
chosen, but must have the right to
create groups in the chosen
environment.
Securing the Configuration Manager and
the Report Manager. The logged in user is
added to the Reporter_Discovery_Admins,
Reporter_Reporting_Admins,
Reporter_Reporting_Operators, and
Reporter_Exploring_Operators security
groups as an administrator for both
consoles when installing the server.

Dell Enterprise Reporter 2.6 Quick Start Guide


13
System Requirements
Table 4. Credential Use and Required Permissions

Credentials Used For Permissions Needed


Service Account Installing and running the Reporter server Login as service right is conferred on the
Supplied during and Access Explorer agent services service account by the logged in
installation credentials during installation.
Connecting to the Reporter and Access Read and write permissions are
Explorer databases (unless SQL permissions automatically granted during database
are provided) creation.
Securing the Configuration Manager and
Report Manager. The service account is
automatically added to the
Reporter_Discovery_Admins,
Reporter_Reporting_Admins,
Reporter_Reporting_Operators, and
Reporter_Exploring_Operators security
groups when installing the server.
Optional SQL Can be used to create the Reporter Must have the right to create databases,
credentials database logins and groups.
Supplied during If supplied, are used to connect the Read and write permissions are
installation database by the Enterprise Reporter automatically granted during database
server. creation.

Port Requirements
For the Enterprise Reporter components to communicate, some ports must be open.
• The default port used for communication between the server and the consoles is 7738. This port is also
used by the nodes to access the server. The port is configured during installation of the server, and is
required in the connection dialog box for both the Configuration Manager and the Report Manager.

You can view the port currently in use on the System | Information page in the Configuration Manager,
and the System Information tab in the Report Manager.
• The default port used for communication from the Enterprise Reporter server to the nodes is port 7737.
This port may be configured during installation.
• The port used for communication from the console to the Access Explorer service is 8722. This is not
configurable.
• The port used for communication for the agent service is 8721 and 18530. In some environments, port
139 may need to be open on the firewall if you are accessing a NetApp device using NetBIOS.
This figure outlines the ports used by the Enterprise Reporter components.

Dell Enterprise Reporter 2.6 Quick Start Guide


14
System Requirements
Figure 2. Ports used by Enterprise Reporter components.

This table outlines the ports used by all of the Enterprise Reporter components and discoveries.
Table 5. Ports Used by Enterprise Reporter
Configuration Manager

File Storage Analysis


Active Directory
Reporter Server
Report Manager
Access Explorer

SQL Server
Computer

Exchange

Registry
NTFS

Application Port Type C o mpo nents D i s c o v e r i e s


FTP 20, 21 TCP X
SMTP 25 TCP X
TCP
WINS / NetBiOS Name Resolution 42 UDP X X X X X X X X X
TCP
DNS FQDN Resolution 53 UDP X X X X X X X X X X X
HTTP to Exchange PowerShell 80 TCP X*
TCP
Kerberos 88 UDP X X X*
TCP
RPC Service & Endpoint Mapper / WMI 135 UDP X X X** X X X X
NetBiOS Name Service 137 UDP X X X X X X X X X
NetBiOS Datagram (browsing) 138 UDP X
Remote Registry 139 TCP X X X X X X X
ICMP X X X X X

Dell Enterprise Reporter 2.6 Quick Start Guide


15
System Requirements
Table 5. Ports Used by Enterprise Reporter

Configuration Manager

File Storage Analysis


Active Directory
Reporter Server
Report Manager
Access Explorer

SQL Server
Computer

Exchange

Registry
NTFS
Application Port Type C o mpo nents D i s c o v e r i e s
TCP
LDAP 389 UDP X X X X X X X X X
SMB / Remote Registry 445 TCP X X X X X
LDAP Secure 636 TCP X
DCOM on XP/2003 and below 1024 TCP
(uses an open port in this range) - 5000 UDP X X X X X X
SQL 1433 TCP X X X X X X X X X X
TCP
SQL Server Browser Service 1434 UDP X X
LDAP GC 3268 TCP X X X
Enterprise Reporter Node 7737 TCP X X X X X X X X
Enterprise Reporter Server 7738 TCP X X X
8721,
Access Explorer Agent 18530 TCP X
Access Explorer Service 8722 TCP X X X
Exchange PowerShell 12067 TCP X**
DCOM on Vista/2008 and above 49152 TCP
(uses an open port in this range) - 65535 UDP X X X X X X

*Exchange
2010 and higher, **Exchange 2007 only

Installing Enterprise Reporter


Once you have ensured that your computers meet the system requirements, you can install the Enterprise
Reporter server and consoles, and set up the Enterprise Reporter database. For full information on installing
Enterprise Reporter, see Installing and Configuring Enterprise Reporter in the Dell Enterprise Reporter
Configuration Manager User Guide in the Technical Documentation.

To install Enterprise Reporter components


1 Open the Autorun.
You can access all product documentation on the Documentation tab of the Autorun. You can also use the
Autorun to set up the Knowledge Portal.
2 On the Home page, click the Enterprise Reporter Setup tab.
3 Click Open next to the edition of Dell Enterprise Reporter for your operating system (32 bit or 64 bit).
4 On the Welcome screen of the Setup Wizard, click Next.
5 Click View License Agreement and scroll to review the entire license agreement.

Dell Enterprise Reporter 2.6 Quick Start Guide


16
Installing Enterprise Reporter
Optionally, click Print to send a copy of the agreement to the printer.
6 Select I accept these terms to accept the agreement, click OK to close the agreement, and click Next
to continue the installation.
- OR -
Select I do not accept these terms to reject the agreement, click OK to close the agreement, and click
Cancel to exit the installation.
7 To install all components, click Next.
- OR -
To install individual components, click the drive icon for each component, select the desired option, and
click Next.
Clicking Reset restores the default setting of installing all components.
8 If you are installing the Enterprise Reporter server, specify the credentials that will be used by the
Enterprise Reporter server service, and click Next.

This service account must be able to access the SQL Server® where the Enterprise Reporter database
resides.
9 If you are installing the Enterprise Reporter server, verify the default port of 7738 to be used for the
Enterprise Reporter server, and click Next.
- OR -
If the default port 7738 is in use, specify an alternate port for the server, and click Next.
10 Select the country where you are installing the product, and click Next.
11 Review the Software Improvement Program overview, and click Next.
- OR -
If you are presented with the option to opt in or opt out of the Software Improvement Program, make
your selection, and click Next.
You may also opt in or opt out of the program after installation is complete. Select Configuration
Manager | System | Configuration or Report Manager | System Configuration, and click Change
software improvement preferences.
12 Click Install.
13 Click Close.
If errors were encountered during installation they are listed on this page.
14 If you have installed the server, you need to configure the database.
- OR -
If you have installed the Configuration Manager or Report Manager without the server, you must add the
required user to the proper security group, or they will not be able to open the console.
For more information, see Role Based Security in Enterprise Reporter in the Dell Enterprise Reporter Installation
and Deployment Guide in the Technical Documentation.

Create/Connect Your Enterprise Reporter


Database
Next, you must create the Enterprise Reporter database. The Database Wizard appears automatically when you
install the Enterprise Reporter server.
1 Choose Create/Connect New Database, and click Next.
Dell Enterprise Reporter 2.6 Quick Start Guide
17
Installing Enterprise Reporter
2 Enter the target SQL Server® instance.

You can either type the instance name or browse to it. If you browse, you will see all SQL Servers® in
your subnet that are configured to advertise their presence. If you do not see your server on the list, you
must type the name.
3 Type a name for your database.
- OR -
Type the name of the existing empty database to be connected, or browse to it.

4 Select the preferred type of authentication to use to connect to the SQL Server®, and click Next.

Enterprise Reporter connects to the SQL Server® using Windows® authentication by default. If you want
to connect using SQL credentials, enter them before clicking Next.

Enterprise Reporter validates the SQL Server® and your right to create a database on the instance before
you can proceed to the next step.
5 If necessary, adjust the initial database size or file paths, and click Next.
6 If required, enter the domain of the Enterprise Reporter server’s service account.
7 Enter the names for the security groups, and click Next.
Using the default group names is recommended.
For more information, see Security Groups in Enterprise Reporter in the Dell Enterprise Reporter Installation and
Deployment Guide in the Technical Documentation.
8 Review the message box, and click OK to continue.
- OR -
Click Cancel to further modify the Security Group Names.
9 Optionally, accept the default to open Configuration Manager.
Once the database is created, you will use the Configuration Manager to enter the Enterprise Reporter
licences and configure the collection of network information.
10 Optionally, accept the default to start the Reporter Server.
This option starts the Enterprise Reporter Server service that must be running for Enterprise Reporter to
function.
11 Click Finish to create the database.
If errors were encountered during database creation, an error dialog box displays.
For help troubleshooting errors, see Database Configuration Issues in the Dell Enterprise Reporter Installation
and Deployment Guide in the Technical Documentation.

Configure Enterprise Reporter Licenses


You need either a trial or full license to use Enterprise Reporter. Activate or update your license in the
Configuration Manager on the System | Information page. You must have a valid license to use the Configuration
Manager; no license is required for the Report Manager. If you have questions about your license, contact your
sales representative.

To activate your license


1 Install and open the Configuration Manager.
2 Connect to your Enterprise Reporter server.
If no license has been installed, the licensing dialog box appears.
3 Click Update License and navigate to your license file.

Dell Enterprise Reporter 2.6 Quick Start Guide


18
Installing Enterprise Reporter
4 Click Open.
5 In the licensing dialog box, click OK.

Create Your First Enterprise Reporter Cluster


and Node
The Configuration Manager contains a wizard that walks you through the process of creating clusters and nodes.
You can create a cluster without a node, and add the nodes later, but you will not be able to run a discovery
without an enabled node.

To create your first cluster and node


1 On the Manage Discovery Clusters pane, click Create Cluster.
2 Enter a name for the cluster.
A default name, First Cluster, is provided, but you should change this to something meaningful, such as
the location of your cluster.
3 Browse to your shared data location, and click OK.
- OR -
Select No network share specified.
For more information, see Things to Consider Before Creating a Cluster in the Dell Enterprise Reporter
Configuration Manager User Guide in the Technical Documentation.
4 If desired provide a description.
5 Click Next.
If you do not wish to add any nodes at this time, skip to step 11.
6 Browse to the computer where the node is to be created, and click OK.
If you do not change the default entry, the first node is created on the current computer.
7 Select an account from the Credential Manager.
If the account you want is not on the list, click Add, enter the account, and select it from the list.
NOTE: These credentials are also used to access the target computers during a discovery, unless
alternate credentials are specified for a discovery.

For more information, see Using the Credential Manager in the Dell Enterprise Reporter Configuration Manager
User Guide in the Technical Documentation.
8 To use SQL credentials to connect to the database, select Database Credential, choose SQL
Authentication, and select the SQL account from the Credential Manager.
9 Configure the number of concurrent tasks the node can process.
For more information, see Nodes in the Dell Enterprise Reporter Configuration Manager User Guide in the
Technical Documentation.

10 Click Add.
You can add more than one node at a time to the same cluster. Repeat steps 6 through 9 until you have
added all of your nodes.
By default, nodes are enabled after they are created. If you prefer to manually enable the nodes, clear
the Enable Node check box. At least one node must be enabled in order for your cluster to be functional.
11 Click Finish.

Dell Enterprise Reporter 2.6 Quick Start Guide


19
Installing Enterprise Reporter
If you chose to create a cluster without any nodes, click Yes.
The new node appears on the Discovery Nodes tab. Your node will be enabled, unless you cleared the Enable the
nodes check box.
For a listing of possible node statuses, see What does the status of a node or cluster indicate? in the Dell
Enterprise Reporter Configuration Manager User Guide in the Technical Documentation.

NOTE: When a node is deployed and enabled, the cluster is also enabled. If you deployed the node
without enabling it, you have to manually enable the cluster.
For more information, see Enabling a Cluster in the Dell Enterprise Reporter Configuration Manager User
Guide in the Technical Documentation.

Set Up Access Explorer


Setting up Access Explorer involves creating a database and adding the first managed domain.
• Create Your Access Explorer Database
• Setting up your first Managed Domain (includes the Service Account)

Create Your Access Explorer Database


The Access Explorer service scans and indexes security access information on files, folders, and shares on
managed computers in managed domains. The data is stored in the Access Explorer database.

To set up the Access Explorer database


1 Navigate to Access Explorer Management | Configuration | set up database.
2 Click set up now.

3 Enter the target SQL Server® instance.


4 Enter a name for your database.
The default database name is dbReporter_AccessExplorer.
5 Enter database access credentials.
NOTE: These credentials must have the right to create databases on the target SQL Server®
instance. They are subsequently used to access the database to store permission information
collected from managed computers.

6 Click OK.
Once the Access Explorer database setup is complete, the database icon is displayed with a green check mark to
show that it is configured.

Dell Enterprise Reporter 2.6 Quick Start Guide


20
Set Up Access Explorer
Setting up your first Managed Domain (includes
the Service Account)
Before you can start managing computers, you must first add a domain in which those computers reside. This
domain must be associated with a service account with credentials that can perform operations on those
computers.
NOTE: Only domains that have a trust relationship with the Access Explorer service domain can be
managed.

To set up the first Managed Domain


1 Navigate to Access Explorer Management | Configuration | set up managed domain.
2 Click set up now.
3 Enter a managed domain DNS name.
4 Enter the service account credentials.
The service account must have administrative access to the specified domain.
5 Click OK.
Once the Access Explorer managed domain setup is complete, the domain icon is displayed with a green
check mark to show that it is configured.
An option to Click for more configuration options is displayed. Selecting this option closes the one-time
setup screen permanently and opens Access Explorer Management | Configuration.
You are now ready to deploy Access Explorer agent services to manage computers and scan your network for
security information. See Real-time Access Assessment on page 31.

Step-By-Step Walkthroughs
Enterprise Reporter is a very flexible reporting tool, that can be used for many different purposes. This section
uses examples of common uses to highlight how to set up Enterprise Reporter to maximize its potential.
• Pre- and Post-Migration Assessment — Assess your network environment before migrating to identify any
issues, and re-assess once the migration is complete to ensure that everything went as planned.
• Manage Compliance — Set up reports to automatically generate and be delivered, minimizing the time
you have to spend demonstrating compliance.
• Change History Reporting — Track changes in your network environment using Change History Reporting.
You can monitor changes to hardware, SQL databases, files, folders and so on.
• Real-time Access Assessment — Interactively browse permissions of selected users and groups across the
entire population of file servers and network filers. Know who has access to what files, folders and
shares.
• File Storage Consolidation — Prepare for storage migration by identifying and excluding from migration
files that are unused, orphaned, or are in violation of your storage usage policy.
This walkthrough will guide you through each of these use cases for Enterprise Reporter. Each scenario shows
you how to leverage Enterprise Reporter to get the information you want when you need it.
NOTE: These scenarios assume you have installed Enterprise Reporter, set up the database, and
configured Access Explorer. For more information, see Installing Enterprise Reporter on page 16.

Dell Enterprise Reporter 2.6 Quick Start Guide


21
Step-By-Step Walkthroughs
Pre- and Post-Migration Assessment
Before you migrate computers and users to a new environment, you should assess their current state. Using
reports generated by Enterprise Reporter, you can ensure that everything is ready to be migrated. Once the
migration is complete, you can re-assess to ensure your environment is as you expect, and identify any issues
that need resolving.

Scenario
You have received a request to identify all users, groups, and group memberships for a particular domain, and
to provide it in Excel format for tracking purposes. This same report will be required after migrating all users to
a new domain.
You will need to take the following steps:
1 Configure a Cluster to Perform the Data Discovery
2 Create a Discovery to Define the Data Collection
3 Run the Discovery to Collect the Data
4 Run the Reports You Need and Export Them to Excel

Configure a Cluster to Perform the Data Discovery


You must configure at least one cluster. A cluster is a logical collection of one or more computers (nodes) on
which discoveries are executed. A discovery must be assigned to a cluster. A cluster can access an optional
shared data location for discovery data. This reduces network traffic, and the processing load on the server.
TIP: In order to reduce network traffic and avoid delays in communication, a cluster should serve a single
geographic location.

Clusters are created in the Configuration Manager. To ensure you have the necessary access to the consoles and
reports, make sure you are still logged in to your computer with the same user account that you used to install
Enterprise Reporter.
If you do not have the Configuration Manager open, perform the following steps:

To connect to a server
1 Click the Start menu and select All Programs | Dell | Enterprise Reporter | Configuration Manager.
2 Type the name of the server.
- OR -
Click Browse, and locate the computer where the server is installed.
Once you have connected to a server, the server name is stored in the list for future use.
3 If necessary, type in the port number.
4 Click Connect.
If this is your first time opening the console, you will need to provide your country so your status in the
Software Improvement Program can be determined. You can choose to participate by configuring the
software improvement settings on the System | Configuration page.

The Create Cluster wizard walks you through the process of setting up a cluster. If you want to create a new
Cluster, see To create your first cluster and node on page 19.

Dell Enterprise Reporter 2.6 Quick Start Guide


22
Step-By-Step Walkthroughs
Create a Discovery to Define the Data Collection
Once you have configured a cluster, you can begin setting up discoveries. Discoveries define the targets from
which you will be collecting data. Enterprise Reporter uses a "collect all" model. After you run a discovery, you
can run reports that include the data you have collected.
In this scenario, you need to collect all users, groups, and group memberships for a particular domain, therefore
you need to create an Active Directory® discovery. You will assign the discovery to the cluster you just created.

To create an Active Directory® discovery


1 On the Manage Discoveries page of the Configuration Manager, select New Discovery | Active Directory.
2 On the name page, enter AD - [Domain Name] so you can identify the discovery easily once you have a
list of discoveries.
3 Since you only have one cluster, it is automatically selected, and you can click Next.
4 On the Scopes page, click Add to choose your domain.
5 Browse to the domain for which you want to collect data, click Include, and click OK to close the Browse
dialog box.
If you only wanted to know about a specific OU, you can drill into the domain and select it. The parent
domain is automatically included, but only the OU will be collected.
6 To shorten collection time, you can select only the options you want to collect. Clear the following
options: Computers, Domain Controllers, Permissions, Trusts, Sites, Deleted Objects, and Active
Roles Virtual Attributes.
7 For the Users option and the Groups and Members option, select the main heading and clear all sub-
options.
By carefully considering the data your reporting users require, you can ensure that collection time is
minimized.
8 Click Next.
9 Since we want to run this discovery right away, no schedule is necessary and you can click Finish.

Run the Discovery to Collect the Data


You can schedule discoveries or run them on demand. In this case, we want to collect this data right away. Each
discovery is broken down into tasks, which are assigned to the node for processing. If you have more than one
node, Enterprise Reporter uses load balancing to ensure the most efficient processing. You can track the
progress of your discovery.

To run a discovery
1 On the Manage Discoveries page, select the discovery AD - [Domain Name].
2 Click Run.
3 To view the progress of the discovery, click the Processing link in the Next Run column.
When the discovery is complete, the status in the Last Run Status column will change. If there were any
errors during collection, click the status to view the details of the last run.

Run the Reports You Need and Export Them to Excel


Once data is collected, you can run reports against it. When you run a report, it returns data based on the most
recent data collected by the discoveries, the selected fields, and any parameter values you enter. Some reports
may have required parameters; in this case, the report will not run unless you enter valid parameter values.
To produce the requested information, you must run three reports that are included in Enterprise Reporter:

Dell Enterprise Reporter 2.6 Quick Start Guide


23
Step-By-Step Walkthroughs
• Domain Groups — shows all the groups in the domain.
• Domain Groups and Members — shows the members of all groups in the selected domain.
• Domain Users — shows all the users in the domain
Once you have run a report, you can export it to the Excel format.

To run each report


1 Open the Report Manager by selecting Start | All Programs | Dell | Enterprise Reporter | Report
Manager.
2 In the connection dialog box, enter the name of the computer where the server is hosted and click
Connect.
3 On the Report Explorer tab, expand Report Library | Active Directory and select your first report, for
example Domain Groups.
4 In the Include the following domains parameter, type the domain name, and click Add.
You also can click Search, locate and add the domain, and click OK.
5 Click Run Report.
The report appears in a new window. Depending on the amount of data, it may take a few minutes to
generate.
6 On the tool bar, click the Export Document drop-down arrow, and choose XLS (older versions of Excel or
XLSX (Excel 2007 and later).
7 In the Export Options dialog box, click OK.
8 In the Save As dialog box, select a location for the report, and change the name if desired.
9 Click Save.
10 Click Yes to view the report in Excel.
You can now use the spreadsheet as needed to perform pre- and post-migration analysis.
You can repeat this process for the other two reports. Once you have completed the migration, you can create a
new discovery to run against the new domain, and ensure that the migration was successful.

Manage Compliance
If you are required to regularly show compliance with corporate or regulatory security requirements, Enterprise
Reporter can be of great assistance by automatically gathering information and reporting on it.

Scenario
At the beginning of each month, you must deliver a report that shows that users who have been inactive for
three months have their accounts disabled, in line with your corporate security policy. You are going to use two
reports to do this: one report for yourself, in order to identify accounts that are not compliant, and one report
that is sent to the stakeholders showing compliance. You will automate the delivery of the monthly report, to
ensure it is always on time. You will need to take the following steps:
1 Modify an Existing Report
2 Schedule the Discovery
3 Schedule Report Delivery to Stakeholders

Dell Enterprise Reporter 2.6 Quick Start Guide


24
Step-By-Step Walkthroughs
Modify an Existing Report
You need to modify an existing report to only show accounts that have been inactive for 90 days and are not
disabled. You should manually run an appropriate Active Directory® discovery right before you run the report to
ensure you are getting up to date data. This will allow you to address any issues before your compliance report
is sent out. To do this, you must perform the following steps:
1 Copy the report from the Library to My Reports, which is the only container in which you can edit
reports.
2 Edit the report to remove unnecessary fields from the report, and to create a hidden parameter to filter
disabled accounts.
3 Modify the report layout to remove unnecessary fields.
4 Run the report to identify issues.

To copy the report so you can edit it


1 On the Report Explorer page of the Report Manager, expand Report Library | Active Directory.
2 Locate the Domain Users without Recent Logons report, and drag it into the My Reports container.

To edit the report name, fields, and parameters


1 In the My Report container, select the Domain Users without Recent Logons report, and click Edit
Report.
2 Change the report name to Domain Users to be Disabled.
3 Change the report description to Shows users in the selected domains who have not logged on in the
past 90 days and whose accounts are still enabled.
4 Select the Fields tab.
5 In the Selected Fields list, select Is Locked and Number of Logons, and click Remove.
A warning dialog box appears, indicating that the report layout needs to be updated. Click Yes.
You could skip this step, however your report will be more usable if it contains only the required
information.
6 Select the Parameters tab.

7 Click Create.
8 Set the Usage to Hidden.
9 Set the associated field to IsDisabled.
10 Set the operator to Equals and the value to No.
11 Click OK.
Leave the dialog box open so you can modify the layout.

To modify the report layout


1 In the Edit Report dialog box, click the Layout tab.
It may take a few seconds for the layout to generate.
2 Click Edit.
3 To change the report title, double-click in the text box containing the current title, and replace the text
with Domain Users to be Disabled.
4 In the detailHeader row of the report layout, right-click Number of Logons, and select Delete.
5 Repeat for IsDisabled and IsLocked.

Dell Enterprise Reporter 2.6 Quick Start Guide


25
Step-By-Step Walkthroughs
6 In the detailBand row of the report layout, remove all fields except Account Name and Last Logon
(Domain User).
7 Check your report layout to ensure it is accurate:

8 Click OK to close the Edit Report dialog box.


9 Click OK to close the Edit Report Definition dialog box, and finish editing the report.

To run the report and save the parameter values for future report runs
1 If necessary, in the My Reports container, select the Domain Users to be Disabled report.
2 In the Include the following domains parameter, type the domain name, and click Add.
You can also click Search, locate and add the domain, and click OK.
3 In the Users not logged on in the last (days) parameter, change the number of days to 90.
4 To make these the default parameter values, click Save parameters as default, and click OK in the
confirmation dialog box.
5 Click Run report.
Your report appears, listing all users who are not in compliance. You can now make any changes you need prior
to the sending the compliance report to your stakeholders.

Schedule the Discovery


In this scenario, the Active Directory® collection previously configured collects the necessary data. We will edit
it to run on a scheduled basis, so that the scheduled reports have up-to-date data. You can also run it manually
before you run the report you modified that identifies any compliance issues.

To edit a discovery and create a schedule


1 On the Manage Discoveries page of the Configuration Manager, select the AD - [Domain Name] discovery
you created, and click Edit.
- OR -

If you did not create an Active Directory® discovery that collects accounts, follow the steps in Create a
Discovery to Define the Data Collection on page 23, but stop on the Schedule page.
2 If necessary, click the Schedule tab.
3 Click Monthly, and select the last Friday of the month.

Dell Enterprise Reporter 2.6 Quick Start Guide


26
Step-By-Step Walkthroughs
4 Click Add.
5 Click OK if you edited an existing discovery.
- OR -
Click Finish if you created a new discovery.

Schedule Report Delivery to Stakeholders


Once the data has been collected, the reports can be generated. Using the Schedule Explorer, you can create a
schedule that will automatically deliver the desired reports to your specified recipients.
To do this, you must:
1 Copy the Domain Users without Recent Logons report to My Reports, the only container from which you
can schedule a report.
2 Create a report schedule.
3 Configure your SMTP server.
4 Schedule the report, and provide parameter values.

To copy the report so you can schedule it


1 On the Report Explorer page of the Report Manager, expand Report Library | Active Directory.
2 Locate the Domain Users without Recent Logons report, and drag it into the My Reports container.
If you did not rename the report when you modified an existing report (see Modify an Existing Report),
the report will have a (1) after its name so you can differentiate them.

To create a report schedule


1 In the Report Manager, click the Schedule Explorer tab.

2 Click New Schedule.


3 Name the schedule Compliance Reports.
4 Click Monthly, and select day 1 of the month.
5 Launch the Credential Manager, and add an account that has read access to the database.
6 In the Delivery section, choose a network share where the reports will be delivered.
Ensure the credentials provided in the previous step have write access to this share.
Leave the dialog box open to configure email delivery.

To configure email delivery


1 In the Delivery section of the Create or Edit Schedule dialog box, enable the Send Email option.
2 Click Configure mail server, and enter the server name and port number.
3 Launch the Credential Manager, and select the account used to access the mail server.
If your SMTP server is configured to accept anonymous connections, you do not need to provide an
account.
You can test your connection to ensure the mail server is properly configured.
4 In the From field, type the email address of the sender.
5 In the To field, type the email addresses of the recipients, separated by a comma or semicolon.
6 Click OK.

Dell Enterprise Reporter 2.6 Quick Start Guide


27
Step-By-Step Walkthroughs
The schedule card is created.

To schedule a report

1 On the Compliance Reports schedule card, click Schedule Report.


2 Select Domain Users without Recent Logons, and click OK.
3 In the Parameters pane, in the Description text box, type [Domain Name] Users not logged in for 90
days to identify the parameter values you will use.
4 In the Include the following domains parameter, type the domain name, and click Add.
You can also click Search, locate and add the domain, and click OK.
5 In the Users not logged on in the last (days) parameter, change the number of days to 90.
6 Click Save.
Your report will now run automatically, reporting on the data from your scheduled discovery.

Change History Reporting


Enterprise Reporter can help you quickly identify changes that have occurred in your environment. If you enable
change history, a record of all changes over time is kept. You can then report on these changes, and ensure that
required changes have been made, or investigate unwanted changes. You can track changes to:
• Group membership

• Active Directory® domains


• Computers
• NTFS files, folders or shares
• Registry keys or values
• SQL servers or databases

Scenario
As part of your job, you are responsible for monitoring changes to critical services. Once a week, you must
generate a report to ensure only expected changes are being made. Since collecting change history involves
more data, you want to scale up your cluster to handle the increased traffic. You will need to take the following
steps:
• Add Another Node to a Cluster
• Enable Change History for the Computer Discovery Type
• Create and Schedule a Discovery
• Schedule the Report

Add Another Node to a Cluster


Each target is assigned to a node, balancing the distribution across the nodes until all the nodes are processing
as many tasks as they are able. If no nodes are available to process the task, it must wait until a node becomes
available.
When you run a computer discovery, each computer in the discovery is separate task that can be assigned to a
node. In this case, adding nodes will speed up the performance of your discovery. This is particularly important
as we are collecting change history data as well, which will increase the time taken to process each task.

Dell Enterprise Reporter 2.6 Quick Start Guide


28
Step-By-Step Walkthroughs
In this scenario, you are going to add another node to handle collecting more data from a larger number of
targets.

To create a node
1 On the Manage Discovery Clusters pane, select the cluster you created.
2 In the bottom pane, on the Discovery Nodes tab, click Add Node.
3 Browse to the computer where the node is to be created, and click OK.
4 Select the service account from the Credential Manager.
If you want to use a different account, you can add it to the Credential Manager.
5 Click Add.
All other configuration is optional.

Enable Change History for the Computer Discovery Type


You configure change history at a global level for each discovery. All discoveries of that type will collect this
data. When you create a discovery, the Name page indicates whether change history is enabled for the
discovery type.
In this scenario, it is important to enable change history before running the first discovery, so that all changes
are captured.

To enable history for a computer discovery


1 On the Discovery Management | Configuration page, click Configure global change history settings.
A button shows the current status of the change history configuration for each discovery type.
2 For the Computer discovery type, click Disabled to toggle the setting.
The button changes to Enabled, indicating that Change History data will be collected.
3 Click Close.

Create and Schedule a Discovery


Since you need this weekly, you can create a weekly discovery. In this simple case, we are assuming that the
targeted computers are located relatively close together. If they were very dispersed, you would create
different discoveries in the appropriate cluster to ensure faster collections. Each computer should only be in
one discovery, so while we are going to configure the discovery to collect the minimal needed data, if at a later
time more information is needed, this discovery should be expanded, rather than creating a new one to gather
the new data.

To create and schedule a computer discovery


1 On the Manage Discoveries page of the Configuration Manager, select New Discovery | Computer.
2 On the name page, enter Computer Services so you can identify the discovery easily once you have a list
of discoveries.
3 Since you only have one cluster, it is automatically selected, and you can click Next.
4 On the Scopes page, click Add to choose your computers.
Browse to locate the computers, click Include, and click OK to close the Browse dialog box.
- OR -
On the Scopes page, click Import to add computers from a file.
Browse to locate the file containing the computers to add, select the file, click Open to start the import,
review the import results, and click OK to close the results screen. For more information, see the

Dell Enterprise Reporter 2.6 Quick Start Guide


29
Step-By-Step Walkthroughs
Importing Computers to Your Scopes section of the Dell Enterprise Reporter Configuration Manager User
Guide in the Technical Documentation.
5 To shorten collection time, you can select only the options you want to collect. Click Deselect All and
then select the Services check box.
Remember that if you later decide to collect more information from the targeted computers, you should
edit this discovery, not create a new one.
6 Click Next.
7 Click Weekly and schedule the discovery to run once a week.
8 Click Finish.

Schedule the Report


When you are scheduling a report with time-sensitive information in it, you must make sure the discovery has
time to finish collecting all of its data before you run the report. For small, simple discoveries, this should be
easy to predict, but for large discoveries, or discoveries that are slowed down by network issues, such as nodes
placed far from their targets or connectivity problems, it may take a few runs to learn how long it will take.
For more details on the steps to take to schedule a report, see Schedule Report Delivery to Stakeholders on
page 27.

To copy the report so you can schedule it


1 On the Report Explorer page of the Report Manager, expand Report Library | Change History and drag
the Computer Change History report to My Reports.

2 On the Schedule Explorer tab, click New Schedule, and enter Service Changes as the schedule
name.
3 Create a weekly schedule for a time after the discovery will complete.
4 Launch the Credential Manager, and add an account that has read access to the database.
5 In the Delivery section, choose a network share where the reports will be delivered.
Ensure the credentials provided in the previous step have write access to this share.
6 In the From field, type the email address of the sender.
This assumes that the mail server delivery has already been set up as outlined in Schedule Report
Delivery to Stakeholders on page 27.
7 In the To field, type the email addresses of the recipients, separated by a comma or semicolon.
8 Click OK.
The schedule card is created.

To add the report

1 On the Service Changes schedule card, click Schedule Report.


2 Select Computer Change History, and click OK.
3 In the Parameters pane, in the Description text box, type Changed services on [computer names] to
identify the parameter values you will use.
4 In the Include the following domains parameter, type the domain name, and click Add.
You also can click Search, locate and add the domain, and click OK.
5 In the Include the following computers parameter, click Search, and add the computers you targeted.
If you want to add all computers in the selected domains, you can use the * wildcard, and click Add
instead of searching for specific computers.

Dell Enterprise Reporter 2.6 Quick Start Guide


30
Step-By-Step Walkthroughs
6 In the Include the following changes parameter, click Search and add Services.
7 Click Save.
Your report will now run automatically, reporting on the data from your scheduled discovery.

Real-time Access Assessment


Access Explorer allows you to interactively browse permissions of selected users and groups across the entire
population of file servers and network filers. You can print reports or export permission data to a CSV file.

Scenario
Human Resources has notified you of an employee who recently left the company. Their account is now disabled
and you want to search the network to discover where this employee had permissions on resources so you can
delete their account .
NOTE: Before you begin, be sure you have completed the two tasks to set up Access Explorer. See Set Up
Access Explorer on page 20.

Add Managed Computers


A managed computer is one that you want to explore to gather security information. Access Explorer requires an
agent service to scan and collect account security information. The agent service must be installed on a server,
but a managed computer can be a Windows Server®, a Windows® cluster, or an NAS server. With a local
installation, you can install the agent service on the same computer you want to explore. With a remote
installation, the agent service resides on a server that goes out to explore other designated computers in your
network.

With computers running Windows Server®, you can select either a local or a remote installation. With Windows®
clusters and NAS servers, you must choose remote installation. In this scenario, you will install the agent service
locally on one server and remotely for an NAS server.

To deploy local agent to a file server


1 Navigate to Access Explorer Management | Manage Computers.
2 Click New Managed Computer, and choose Windows Server.
3 Choose Locally Managed, and click Next.
4 Choose Automatic installation by Enterprise Reporter, and click Next.
5 Choose the domain that contains the computers you want to manage.
The only domains that display are those you add as managed domains. For more information, see Setting
up your first Managed Domain (includes the Service Account) on page 21.
6 Select the computers you want to manage, and click Add.
For this walk-through, you can select just one. If the list of computers is long, you can type in the blank
row at the top to sort the list.
7 Click Finish.
The agent will now be installed on the selected computers.
As the agent is installed, the status changes to reflect the progress of the installation. When the Status
column is OK the agent is installed. When the initial scan is complete, the Data State column displays
Data Available.
By default, the Access Explorer agent service scans the entire root drive of the managed computer. You
can change the scope once the agent service is installed.

Dell Enterprise Reporter 2.6 Quick Start Guide


31
Step-By-Step Walkthroughs
To deploy a remote agent to a NetApp® Server
1 Click New Managed Computer, and choose NAS Server.
2 Choose the domain that contains the computers you want to manage.
The only domains that display are those you add as managed domains. For more information, see Setting
up your first Managed Domain (includes the Service Account) on page 21.
3 Select the computer to manage, and click Next.
The computers you select are those computers you want to explore for security information. The agent
service is not installed on these computers.
If the list of computers is long, you can type in the blank row at the top to filter the list.
You cannot select multiple computers to manage. You must install the agent service on one computer at
a time.
4 Select the root folders for the Access Explorer service to scan for data, and click Next.
Only the root folder is marked as selected, but all folders and files beneath the root are included in the
selection.
5 Click Browse to select a server (Agent Computer) on which to install the Access Explorer service.
6 Select a service account that has the necessary permissions to install the Access Explorer service on the
designated Agent Computer.
7 Create a schedule for when the Access Explorer agent service scans the managed computer for data.
For remote agents, you must enable the Immediately scan on agent restart or scope change option if you
want the agent service to scan immediately when it is added. This option is cleared by default.
8 Click Finish.
As the agent is installed, the status changes to reflect the progress of the installation. When the Status
column is OK the agent is installed. When the initial scan is complete, the Data State column displays
Data Available.
Now that you have installed the agent service and data is available, you can switch to the Report Manager to
explore accounts for security information.

Explore an Account
For this scenario, you want to look for the account of a person who has recently left the company. The account
is disabled and you want to search for where this person had permissions so you can remove them.

To explore an account
1 Open the Report Manager, and click the Explore tab.
2 On the Accounts tab, click Add Accounts, and select Domain Account or Local Account depending on
the type of account you need.
3 Locate the disabled account.
In this walk-through, you do not necessarily have to perform any action on the account, so if you cannot
locate a disabled account, select any account.
4 Click OK.
The account is listed. From here you can drill down to locate the permissions. You are going to explore
both servers you added as managed computers to see where the disabled user has explicit permissions on
resources.
5 Right-click the account, and choose Show Member of.
A list of all the groups of which the account is a member displays.
Now you will drill-down on the account to view the permissions.

Dell Enterprise Reporter 2.6 Quick Start Guide


32
Step-By-Step Walkthroughs
6 Click Close to close the Show Member of dialog box.
7 Double-click the account.
The computers on which the account has explicit permissions on resources are listed. Select one
computer to further drill-down. If you wanted to compare several computers, right-click a computer and
choose Open in New Tab. You can continue to drill-down on each computer in separate tabs so you easily
can switch among all the computers.
For this walk-through you will continue to drill-down in one tab.
8 Double-click a computer.
Listed are the accounts through which the account you are exploring has been permissioned to access
resources on the computer you are exploring. You could drill-down on each account individually. For this
walk-through you will drill-down on all the accounts.
9 Double-click All Accounts.
If there are more than 50,000 results, you are presented with an opportunity to filter the results. This
value is configurable if you want to change the number of results to trigger a warning.
10 If you receive a filter warning, click Yes to narrow the results that appear.
- OR -
If you click No or Continue, or you do not see the filter warning, click Filters, and choose Create Filter.
The list of resources that appear next contain the files, folders, and shares to which the selected
account has explicit resources. To narrow the list, let us look at just the folders.
11 In the Filter Editor box, click [Name], and choose Type.
12 Click <enter a value>, and choose Folder.
13 Click OK.
The list of resources in the top pane show only the folders on which the selected account has explicit
permissions.
Click Refresh at any time to retrieve up to date access information from the Access Explorer agent
service.
The filter remains applied until you clear it.
14 Click any folder to view the explicit permissions in the bottom pane.
15 Select Show full permissions to display all permissions on the folder.
At this point, you can choose to generate a permissions report or export the permission data to a csv file.
16 Click Run Reports, and choose Permissions Report.
Because you selected All Accounts and applied a filter, the report will list all the folders on which the
selected accounts have explicit permissions.
Now that you have the data you need, you can run native tools to manage the disabled accounts.

File Storage Consolidation


Before you migrate computers to a new environment, you should assess their file storage. Using reports
generated by Enterprise Reporter, you can ensure that only the required data is moved.

Scenario
You have received a request to get ready for storage migration and consolidation by identifying (and excluding
from migration) files that are duplicate, unused, orphaned or that violate storage usage policy.
You will need to take the following steps:

Dell Enterprise Reporter 2.6 Quick Start Guide


33
Step-By-Step Walkthroughs
1 Configure a Cluster to Perform the Data Discovery
2 Create Discoveries to Define the Data Collection
3 Run the Discoveries to Collect the Data
4 Run the Reports You Need

Configure a Cluster to Perform the Data Discovery


You must configure at least one cluster. A cluster is a logical collection of one or more computers (nodes) on
which discoveries are executed. A discovery must be assigned to a cluster. A cluster can access an optional
shared data location for discovery data. This reduces network traffic, and the processing load on the server.
TIP: In order to reduce network traffic and avoid delays in communication, a cluster should serve a single
geographic location.

Clusters are created in the Configuration Manager. To ensure you have the necessary access to the consoles and
reports, make sure you are still logged in to your computer with the same user account that you used to install
Enterprise Reporter.
If you do not have the Configuration Manager open, perform the following steps:

To connect to a server
1 Click the Start menu and select All Programs | Dell | Enterprise Reporter | Configuration Manager.
2 Type the name of the server.
- OR -
Click Browse, and locate the computer where the server is installed.
Once you have connected to a server, the server name is stored in the list for future use.
3 If necessary, type in the port number.
4 Click Connect.
If this is your first time opening the console, you will need to provide your country so your status in the
Software Improvement Program can be determined. You can choose to participate by configuring the
software improvement settings on the System | Configuration page.

The Create Cluster wizard walks you through the process of setting up a cluster. If you want to create a new
Cluster, see To create your first cluster and node on page 19.

Create Discoveries to Define the Data Collection


Once you have configured a cluster, you can begin setting up discoveries. Discoveries define the targets from
which you will be collecting data. Enterprise Reporter uses a "collect all" model. After you run a discovery, you
can run reports that include the data you have collected.
In this scenario, you need to collect information about the files and folders stored on particular servers and
then analyze it. Since there is information you will need at the server level, the folder level, and the file level,
and then you will analyze it, you need to create multiple discoveries targeting the same computers to collect
each type of information.
• File Storage Analysis discovery to assess the file storage information
• Computer discovery to collect server information
• NTFS discovery to collect file and folder information

Dell Enterprise Reporter 2.6 Quick Start Guide


34
Step-By-Step Walkthroughs
To create a File Storage Analysis discovery
1 On the Manage Discoveries page of the Configuration Manager, select New Discovery | File Storage
Analysis.
2 To name the discovery, enter File Storage Analysis - [Server Name] so you can identify the discovery
easily once you have a list of discoveries.
3 Since you only have one cluster, it is automatically selected, and you can click Next.
4 On the Scopes page, click Add to choose the computer to analyze.
5 Browse to the computer for which you want to collect data, click Include, and click OK to close the
Browse dialog box.
If you want to include additional computers, navigate to each one and include it.
6 To populate reports with the applicable information to analyze, select the following collection options:
Files, Folders Shares, Owners.
7 Click Next.
8 Since we want to run this discovery right away, no schedule is necessary and you can click Finish.

To create a Computer discovery


1 On the Manage Discoveries page of the Configuration Manager, select New Discovery | Computer.
2 To name the discovery, enter Computer - [Server Name] so you can identify the discovery easily once
you have a list of discoveries.
3 Since you only have one cluster, it is automatically selected, and you can click Next.
4 On the Scopes page, click Add to choose your computer.
5 Browse to the same computers as the File Storage Analysis Discovery as you want to collect information
from the same computers, click Include, and click OK to close the Browse dialog box.
If you included additional computers in the File Storage Analysis discovery, navigate to each one and
include it in this discovery as well.
6 To populate reports with the applicable information to analyze, select the following collection options:
Shares, Volumes, and Accounts.
7 Click Next.
8 Since we want to run this discovery right away, no schedule is necessary and you can click Finish.

To create an NTFS discovery


1 On the Manage Discoveries page of the Configuration Manager, select New Discovery | NTFS.
2 On the name page, enter NTFS - [Server Name] so you can identify the discovery easily once you have a
list of discoveries.
3 Since you only have one cluster, it is automatically selected, and you can click Next.
4 On the Scopes page, click Add to choose your computer.
5 Browse to the same computers as the File Storage Analysis Discovery as you want to collect information
from the same computers, click Include, and click OK to close the Browse dialog box.
If you included additional computers in the File Storage Analysis discovery, navigate to each one and
include it in this discovery as well.
To populate reports with the applicable information to analyze, select only the following options:
• For all computers resolved in the discovery, collect: Folders on all volumes
• For this discovery, collect through: The network share
• Recursion Options: All folder levels
6 Click Next.

Dell Enterprise Reporter 2.6 Quick Start Guide


35
Step-By-Step Walkthroughs
7 Optionally, you could narrow the discovery by selecting specific files; however, we will collect all files
for this scenario.
8 Click Next.
9 Since we want to run this discovery right away, no schedule is necessary and you can click Finish.

Run the Discoveries to Collect the Data


You can schedule discoveries or run them on demand. In this case, we want to collect this data right away. Each
discovery is broken down into tasks, which are assigned to the node for processing. If you have more than one
node, Enterprise Reporter uses load balancing to ensure the most efficient processing. You can track the
progress of your discovery.

To run the discoveries


1 On the Manage Discoveries page, select the discovery File Storage Analysis - [Server Name].
2 Click Run.
3 Repeat steps 1 and 2 for each of the other discoveries.
4 To view the progress of a discovery, click the Processing link in the Next Run column.
When a discovery is complete, the status in the Last Run Status column will change. If there were any
errors during collection, click the status to view the details of the last run.

Run the Reports You Need


Once the discovery information is collected, you can run reports against it. When you run a report, it returns
data based on the most recent data collected by the discoveries, the selected fields, and any parameter values
you enter. Some reports may have required parameters; in this case, the report will not run unless you enter
valid parameter values.
To produce the requested information, you must run a File Storage Analysis report in Enterprise Reporter. The
Files and Folders report contains the following sections:
• Storage Cleanup Summary - space recommended for cleanup on all servers
• Duplicate Files - space wasted by duplicate files on the servers
• Against Policy File Category - space used by against policy files on the servers (includes wasted space and
media files)
• Orphaned Files- space used by files for which the owner is unknown
• Old Data - spaced used by files which have not been accessed in over a year
You can drill down from this report to more detailed reports for each specific section within this report. The
following example illustrates this process starting with the Against Policy File Category.

To drill down from this report to more detailed reports


1 On the Storage Cleanup report, scroll to the Against Policy File Category.
2 Click any server name and the FSA - Files by Category report is displayed showing the number of files,
size, and size on disk for the Against Policy category on that server.
3 Click the Against Policy category link and the FSA - File Category Details report is displayed showing the
10 file types that are using the most space.
4 Scroll down to the corresponding table and click on any file extension link (such as JPG) and the NTFS -
File Information by Extension report is displayed showing all files with this extension on the selected
computers.

Dell Enterprise Reporter 2.6 Quick Start Guide


36
Step-By-Step Walkthroughs
5 Optionally, click the Next Report or Previous Report buttons in the toolbar to navigate between
reports you have viewed.
You can repeat this process starting with the File Storage Analysis Files and Folders report. You can drill down
through the various sections of the report to identify files that are duplicate, unused, orphaned or that violate
storage usage policy.

Dell Enterprise Reporter 2.6 Quick Start Guide


37
Step-By-Step Walkthroughs
About Dell

Dell listens to customers and delivers worldwide innovative technology, business solutions, and services they
trust and value. For more information, visit http://www.software.dell.com.

Contacting Dell
For sales or other inquiries, visit http://software.dell.com/company/contact-us.aspx or call 1-949-754-8000.

Technical support resources


Technical support is available to customers who have purchased Dell software with a valid maintenance
contract and to customers who have trial versions. To access the Support Portal, go to
https://support.software.dell.com.
The Support Portal provides self-help tools you can use to solve problems quickly and independently, 24 hours a
day, 365 days a year. In addition, the Support Portal provides direct access to product support engineers through
an online Service Request system.
The Support Portal enables you to:
• Create, update, and manage Service Requests (cases).
• View Knowledge Base articles.
• Obtain product notifications.
• Download software. For trial software, go to http://software.dell.com/trials.
• View how-to videos.
• Engage in community discussions.
• Chat with a support engineer.

Dell Enterprise Reporter 2.6 Quick Start Guide


38
About Dell

You might also like