0% found this document useful (0 votes)
10 views

CA Client Automation Overview

Uploaded by

Jorge Cabello
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

CA Client Automation Overview

Uploaded by

Jorge Cabello
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

CA Client Automation

Product Overview

Lifecycle Management for


Desktops and Servers
CA Client Automation

§ Asset inventory and discovery


– Automated discovery, inventory,
configuration, usage and reporting of
hardware and software assets
§ Asset Intelligence
– Business analytics reporting
§ Software distribution
– Policy-based software and patch deployment
§ OS installation management
§ Remote desktop control
– Access, control, view, manage and modify
remote systems
§ Patch research and management
– Monitor, research, test and deploy
§ Desktop migration
– Refresh, OS deployment and desktop
recovery
2 Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Client Automation
Operational Efficiency in a Complex World

Full automation capabilities across heterogeneous physical and virtual environments


§ Full automation capabilities in a comprehensive and integrated solution
§ Lifecycle management of desktops, laptops, servers and peripheral hardware and
software assets

Discovery Inventory Configuration OS Provisioning


Management

Software Delivery
Intelligence

Lifecycle Management
Remote Access
Reporting

Patch
Upgrade / Migrations Patch
Administration
Refresh Content
3 Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Hardware Inventory

Comprehensive and detailed hardware / system inventory

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
4 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Software Inventory

Three methods of detection for accurate and thorough software inventory


§ Heuristics – searching in well known places – MSI database, RPM database, Add/remove
software, desktop shortcuts
§ Signature – CA Content service supplies signatures to recognize software installed on a
system. One signature per software release or patch level. Typically detected via registry
settings and presence of files with particular attributes. Custom signatures are supported.
§ Intellisigs – CA Content service supplies Intellisigs. An Intellisig is a script that determines
which versions and component parts of a software application are installed. Can be used to
detect traditional and non-traditionally installed software. Custom Intellisigs are
supported.

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
5 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
FDCC Scanner

Federal Desktop Core Configuration


compliance scanning and reporting
§ Independently certified by a
NIST compliant test lab

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
6 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Non Resident / Elective Inventory

Detect and inventory systems that are not actively managed

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
7 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Agent-less Platform Virtualization Inventory

How remote inventory works


§ AM Remote (RVI) agent is installed on one
or more existing Windows agent systems.
Domain
Manager
§ The RVI Agents are configured to collect
inventory from the virtual hosts using SSH
or Web Services calls
– Specify the virtual hosts in a collect task for the Scalability
Server
machine running the RVI agent, along with
credentials to authenticate to each host
ITCM Agent + RVI
– The RVI Agents connect to the configured hosts Agent Add-On

and collect inventory information remotely


– A relationship will automatically be established
Remote Collect via SSH or web service API
between the host and the guests
– Full ITCM agents can be installed on the guests
for full inventory of the guest systems on each
virtual host

8 Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Software Distribution and Management

Flexible, policy driven automation of software distribution and management


§ Centrally distribute software to target systems
– Fixed list of targets, possibly identified through a static group definition
– Dynamic list of targets identified through matching system attributes

§ Specify any job interdependencies and any pre and post actions. Define download
and installation times.
§ Group a bundle of software packages together for easier job specification/creation.
§ Define Software Policies to enforce systems that match certain criteria to have a
defined set of software installed
§ Reinstall After Crash (RAC) – if it is detected that a computer has been rebuilt, any
software packages installed prior the rebuild are automatically redistributed

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
9 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Elective Software Distribution

Enable user self-management based on entitlements


§ Enable software packages to be electively downloaded and installed by end-user by
picking from a Software Catalog
§ Catalog Groups enable access to be restricted to specified computers or users

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
10 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
OS Installation Management (OSIM)

Bare metal provisioning for physical and virtual systems


§ Uses PXE or Linux boot technology to provision an OS
§ VMs can be provisioned as well as physical machines
§ New computers detected by the boot server are recorded into the DSM Manager and
visualized in the GUI
§ Two phase provisioning
– First an Bootimage is downloaded
§ Bootimage configures the machine in preparation for download and installation of an image
– Pre-defined configuration parameters are passed to and used by the OS installation

§ OS installation options
– Unattended OS setup from install media
– Pre-created image from ImageX or Ghost

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
11 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
software management for virtual desktop infrastructures

§ Golden (Template) Image


management for Linked Clones

§ Automated deployment and re-


deployment of software for Linked
Clones
– Policy based deployment across
physical and virtual desktops
– User requested software packages
§ Other areas of consideration
– Emergency patch management
Incorporating dynamic virtual desktops
into a policy-based and automated
– Consistent system and software
inventory
management paradigm

12 Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Remote Control Functionality

Provide on-going hands on end user support


§ Centrally Managed or Peer to Peer connections
– Centrally Managed has user authorizations pre-established through Global and Local
address books.

§ Various modes of control


– View, Shared Control, Exclusive Control, Secure Control (actions not visible to end-user),
Stealth View (end-user unaware of a remote access), Classroom, Meeting Mode

§ Recording and replaying


§ Support for viewing Windows, Linux and MacOS X systems

13 Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Extended Network Connectivity (ENC)

Comprehensive lifecycle management regardless of network location


§ ENC is a means of extending the reach of CA Client Automation over the Internet or
isolated internal networks
§ ENC allows secure traversal of firewalls – both personal and corporate
§ Also handles NAT, proxies and SOCKS
§ Use it as an alternative to VPN when you need to have Internet facing
communications to manage end points
– Branch offices
– Managed service providers
– Remote systems / users

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
14 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
CA Business Intelligence Reporting

Enables operational and


executive level reporting
§ Access to all data elements in the
CA Client Automation MDB
§ Ability to integrate across
products to any other BOXI
universe
§ Full set of out of the box reports
§ Ability to customize, schedule and
publish reports

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
15 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Patch Manager

Unifies and simplifies the enterprise patch management lifecycle


§ Administrator Dashboard
provides the controls and
information needed to manage
the patch management lifecycle
across the enterprise.
§ Patch Policy technology defines
the patch level requirements for
each software component
§ Patch policies automatically
initiate patch deployments
§ Pre and Post dependencies are automatically addressed
§ Uniform Best Practice Patch Process includes formal testing phase

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
16 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
CA Content Update Service

24 / 7 Patch research and publication


§ Patch research performed by
dedicated CA Content Update Service
research team.
§ Roll-Up Patch Technology allows
multiple patches to be rolled up into a
single patch package with a single
reboot.
§ Ability to edit the roll-up patches to
customize your patch process to fit
unique needs

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
17 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Desktop Migration Manager

Seamlessly manage the end user experience during change initiatives

§ Ease the transition when upgrading a user from one environment to another
– Same OS, hardware upgrade
– OS upgrade, same hardware
– OS upgrade, new hardware
– Factor in any application upgrades

§ Automate the migration of system settings, application settings and the movement
of user data
§ Configurable templates determine the user data to move and settings that are
reinstated

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
18 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.
Integrated with rest of Client Automation for complete
Process driven Automated Migration solution

Run Assessment on Create Windows 7 Initiate Windows 7


target asset group group Redeployment

DNA CA Process Automation


Repository BOXI
Workflow, Notification and approvals Reports MDB
Work List, SDM, Email etc…

Take backup of user Apply the Windows 7 Deploy required Apply Desktop DNA
data, settings and image (OSIM) software (SD) (DMM)
profile (DMM)

CA Client Automation

Copyright © 2013 CA. All rights reserved. All trademarks, trade names, service marks and logos referenced herein belong
19 to their respective companies. CA confidential and proprietary. No unauthorized copying or distribution permitted.

You might also like