Create a new configuration

  1. In the category menu, click Configurations.

  2. Click Create new.

    The New configuration wizard appears.

General

On the General page:

  1. Type a Name of the new configuration.

  2. Type a Site name for the new configuration, or select an existing site in the list.

Server

On the Server page, add the Snow Inventory servers that the computers with this configuration can communicate with. Add one or several servers.

  1. Click Add.

    The Server dialog box appears.

  2. Enter a server Address, or select an existing address in the list. When a new address is entered, the server address must be in the following format:

    • http://[server name]:[port]/

  3. Optionally in the Proxy settings section, enter a Server name along with a User name and Password for accessing the proxy server.

  4. Optionally in the Server Public Key Hash section, enter the public key hash value for this server. For information on how to extract the public key for pinning, read User Guide: Snow Inventory Server 6 as available in the Snow Knowledgebase.

  5. Optionally in the Client certificate section, enter a File path to the certificate and the Password for the private key.

  6. Click Add to add the server and close the Server dialog box.

    The server is added to the list.

Schedule

Note

  • The settings on the Schedule page only apply to the Windows agent. The other agents do not handle scheduling via the configuration file, and will ignore any settings made here.

On the Schedule page, set a time and an interval for when clients with this configuration will run a scan. Use the Randomization functionality to spread the start time of the scan among the agents. The agents will then run a scan at a randomly selected time 90 minutes (default) after the defined Time of day.

Example 42.

The scan is set to start at 09:00 with a default randomization of 90 minutes. This means that the agent randomly will select a start time for the scan between 09:00 and 10:30.



To add a schedule:

  1. Click Add.

    The Schedule dialog box appears.

  2. Select Schedule interval in the list.

    • For the Daily schedule, also set Time of day.

      Optionally, select the Randomization check box.

    • For the Weekly schedule, also set Weekday and Time of day.

      Optionally, select the Randomization check box.

    • For the Monthly schedule, also set Day and Time of day.

      Optionally, select the Randomization check box.

  3. Click Add to save the changes and close the Schedule dialog box.

    The schedule is added to the list.

Software settings

On the Software settings page settings can be made for what directories, file systems, and file types to include in, or exclude from, the scan. All Include and Exclude rules use wildcard matches, so use * for unknown characters.

In the Include section:

  • Use the Recursive functionality to scan subdirectories of the specified directory

  • For Unix, use the Unconditional functionality to include all files. This will override any settings that have been defined for Exclude.

  • For Windows, use the check box to select whether or not to Include software information from any locally attached (or mounted) disk.

Note

  • A value must be set for the Include command, or no scan will run.

  • For the Snow Inventory Agents for Linux and macOS, some file systems are excluded from the scan by default, and cannot be included using include criteria. For detailed information, refer to the Configuration Guide, Snow Inventory Agents.

Include

In the Include section, specify all directories to be included in the scan. Repeat the steps for all directories to be included.

  1. Click Add.

    The Include dialog box appears.

  2. In the Path box, type a directory by specifying it from the root.

  3. When applicable, select the Recursive check box.

  4. When applicable, select the Unconditional check box.

  5. Click Add to save and close the Include dialog box.

Include criteria - File system

In the File system section, specify all file systems to be included in the scan. Repeat the steps for all file systems to be included.

  1. Click Add.

    The Include criteria dialog box appears.

  2. In the File system box, type the file system to be included.

  3. Click Add to save and close the Include criteria dialog box.

Include criteria - File type

In the File type section, specify the file types to be included in the scan. Repeat the steps for all file types to be included.

  1. Click Add.

    The Include criteria dialog box appears.

  2. In the File type box, type the file type to be included.

  3. Click Add to save and close the Include criteria dialog box.

Exclude - Path

In the Exclude section, specify the directories to be excluded from the scan. Repeat the steps for all directories to be excluded.

  1. Click Add.

    The Exclude dialog box appears.

  2. In the Path box, type a directory by specifying it from the root.

  3. Click Add to save and close the Exclude dialog box.

Exclude – File system

In the Exclude section, specify the file systems to be excluded from the scan. Repeat the steps for all file systems to be excluded.

  1. Click Add.

    The Exclude dialog box appears.

  2. In the File system box, type the file system to be excluded.

  3. Click Add to save and close the Exclude dialog box.

Logging

On the Logging page, general log settings for the inventory scan and system events can be set.

Inventory scan log

  1. Select Log level in the list.

  2. Type a Max log size in the box.

  3. To log external tasks that are run with elevated privileges, select the Privileged operation (privop) check box.

Note

The log file is by default cleared before a new scan is started. Use the system setting log.append to have new log entries appended to the log file instead.

System log

  1. To enable logging to the system event log, select the Enable system logging check box.

  2. Select Log level in the list.

  3. To log external tasks that are run with elevated privileges, select the Privileged operation (privop) check box.

Drop location

On the Drop Location page, select how the agent will deliver the result files of the inventory scan. Configure one or several drop locations.

Networks

Add a location on another client computer on the network:

  1. Click Add.

    The Drop networks dialog box appears.

  2. Type a network Location in the box.

    Example: \\[servername]\ or \\[ip address]\

  3. Type information on User name and Password for accessing the network location.

  4. Click Add to save and close the Drop networks dialog box.

Paths

Add a path on the client computer:

  1. Click Add.

    The Drop paths dialog box appears.

  2. Type the folder Path in the box.

  3. Click Add to save and close the Drop paths dialog box.

Endpoints

Add an Inventory server (Master Server or Service Gateway):

  1. Click Add.

    The Endpoints dialog box appears.

  2. Type the server Address including port number.

    Example: http://[servername]:[port] or https://[servername]:[port]

  3. Optionally in the Proxy settings section, type a Server name along with a User name and Password for accessing the proxy server.

  4. Click Add to save and close the Endpoints dialog box.

Deny

Note

  • The settings on the Deny page only apply to the Windows agent.

On the Deny page, one or several rules can be defined to prevent certain software, such as inappropriate or illegal software, from running on the client computers.

When a rule is created a Path, a File description, and a Company name (manufacturer name) of the software executable must specified. If any of these properties is unknown or could be multiple, use * as a wildcard character. However, at least one of the three properties must be specified.

Example 43.
  • A filter that will prevent Notepad from being used (this is only an example for testing purposes, it is not a practical one):

    Path = C:\Windows\System32\notepad.exe

    File description = *

    Company name = *

  • A filter that will prevent any software that is described as "poker" software from being used:

    Path = *

    File description = *poker*

    Company name = *

  • A filter that will prevent any software from a company with a name that starts with "BitTorrent" from being used:

    Path = *

    File description = *

    Company name = BitTorrent*

    This last example will result in the following lines in the agent configuration file (snowagent.config): 

    Example_DenySoftware.jpg


To enable the deny rules and add software:

  1. Select the Enable deny rules checkbox.

  2. Click Add .

    The Deny dialog box appears.

  3. Type the directory Path to the software executable.

    Example 44.

    C:\Windows\System32\notepad.exe



  4. Type the File description of the software executable.

    To find the file description; right-click the the executable, select Properties , and then look for the Description on the General tab.

    Example 45.

    Notepad



  5. Type the Company name of the software manufacturer.

    To find the company name; add the Company column to the File explorer view of the folder where the executable is located.

    Example 46.

    Microsoft Corporation



  6. Click Add to save and close the Deny dialog box.

Note

The Snow Inventory Agent will monitor system processes where blocked (denied) applications are launched. The agent will not prevent the blocked application from being launched, but after a short while it will end the process and the application will close.

Oracle

Note

  • The settings on the Oracle page only apply to the Linux, Unix, and Windows agents.

On the Oracle page, settings can be made for running a scan in an Oracle environment. Default credentials for Oracle access can be set while, if any, specific credentials required for a certain Oracle instance are set on the instance directly.

Select to scan All instances, or specify the instances individually in the Include section. Another option is to enable the All instances option, and then specify instances to exclude from the scan.

To enable an Oracle scan:

  • Select the Enable Oracle scan check box.

In the Default credentials section:

  1. Type information on User name and Password for accessing the Oracle environment.

  2. Select whether to include All instances in the scan, or to specify the instances individually.

In the Include instances section, it is possible to specify and include instances individually. To include an individual Oracle instance:

  1. Click Add.

    The Include instance dialog box appears.

  2. Type the Oracle Sid and Oracle Home for the instance.

  3. If specific credentials are required, type information on User name and Password for accessing the instance.

  4. Click Add to save and close the Include instance dialog box.

In the Exclude instances section, it is possible to excluded instances from the scan, when the All instances option is enabled. To exclude an individual Oracle instance:

  1. Click Add.

    The Exclude instance dialog box appears.

  2. Type the Sid for the instance to be excluded.

  3. Click Add to save and close the Exclude instance dialog box.

System Settings

On the System Settings page, a number of low level system variables can be set.

For information on functionality of each respective system setting, refer to the document configuration–doc.html that is included in the agent installation files.

Note

  • System variables should be used with caution.

To set a system variable:

  1. Click Add.

    The System setting dialog box appears.

  2. Select Key from the list.

  3. Use the Value checkbox for Boolean variables, or type a Value in the box.

  4. Click Add to save and close the System setting dialog box.