34
ePolicy Orchestrator
®
3.6 Walkthrough Guide
Deploying the Agent and Products
Distributing agents
4
Agent activity logs
The agent log files are useful when determining agent status or troubleshooting
problems. There are two log files that record agent activity, both are located in the
agent installation folders on the managed system running Windows 95, Windows 98,
or Windows NT systems. On managed systems running Windows 2000, Windows
2003, and Windows XP, these files are located in the
Common Framework
folder (within
Documents and Settings
):
Agent activity log
The agent activity log is an
XML
file named
AGENT
_<
SYSTEM
>.
XML
where <
SYSTEM
>
is the NetBIOS name of the system on which the agent is installed. This log file
records agent activity related to such things as policy enforcement, agent-to-server
communication, and event forwarding. You can define a size limit of this log file.
You can configure the level of logging of agent activity on the
Logging
tab of the
ePO
Agent 3.5.0 | Configuration
policy pages.
Detailed agent activity log
The detailed agent activity log (
AGENT
_<
SYSTEM
>.
LOG
) file contains troubleshooting
message in addition to the content of the agent activity log. This file has a 1MB size
limit. When this log file reaches 1MB, a backup copy is made
(
AGENT
_<
COMPUTER
>_
BACKUP
.
LOG
).
Distributing agents
Due to the variety of scenarios and requirements of different environments, there are
several methods you can use to distribute the agent to the systems you want to
manage. Before using any of these methods, you should consider each.
The following table details the advantages and disadvantages of the different methods
to distribute the agent.
Table 4-2 Advantages and disadvantages of agent distribution methods
Method
Advantages
Disadvantages
Deploying agents
while creating
Directory
By deploying the agent
automatically while creating the
sites and groups of the Directory,
you don’t have to complete any
additional steps.
If you are creating sites by importing
large NT domains or Active Directory
containers, too much network traffic
may be generated for your network
resources.
Deploying agents
from ePolicy
Orchestrator
This is an efficient method for
distributing the agent.
You must embed user credentials
with administrator rights to the
desired systems. Also, you must
ensure that systems running
Microsoft XP Service Pack 2, have
File and Printer sharing added to the
firewall exceptions list.
Using login scripts
This is an efficient method for an
environment where systems log
onto the network frequently. You
do the work once, and the agent
is deployed automatically.
Systems that don’t log onto the
network frequently, may not be
running the most up-to-date agent.
Summary of Contents for ePolicy Orchestrator
Page 2: ......