Browse by Tags

Tagged Content List
  • Blog Post: DCM Solution Troubleshooting Steps

    Here are some troubleshooting steps that you might want to perform for a successful DCM deployment / execution: 1. Install DCM Solution and ensure that all the files were deployed and the DCM Solution database created. 1. Create an SMS package / program and advertise it to any of the client machines...
  • Blog Post: DCM File System Data Source Properties

    Hello, I have got several requests regarding the File System data source properties and what they mean. Hence I decided to post the info in here... Here you go... File System Data Source Properties: Name -> name for the data source Absolute Path -> the absolute path to the file or folder...
  • Blog Post: DCM v 2.0 Download Updated

    Overview Microsoft Systems Management Server (SMS) 2003 Desired Configuration Monitoring (DCM) 2.0 now supports configuration monitoring of desktops and servers. The accelerator allows the user to define desired hardware, operating system, and application configuration settings in multiple configuration...
  • Blog Post: DCMSolution Database not created during installation

    There was a known issue in Desired Configuration Monitoring (DCM) Solution Accelerator v 1.0 where the DCMSolution database was not created during installation in specific cases. The issue occurred because the v 1.0 installer retrieved SQL information from a different registry path. However it happens...
  • Blog Post: XMLToDCMTransfer DTS package requires 3 mandatory files for proper execution

    In DCM v 2.0, the functionality of the XMLToDCMTransfer DTS package has been altered. In the current version (v 2.0), the DTS package requires the following three files to be present in the DCM UI folder for successful execution: DCM.xsd DCMXMLValidator.exe <machinename>_Mapping.xml...
  • Blog Post: Now Available: SMS 2003 Desired Configuration Monitoring Version 2.0

    DCM v2.0 automates the configuration management audits between desired or defined configuration settings and actual configuration settings. DCM accomplishes this by allowing the user to define desired hardware, operating system and application configuration settings in multiple configuration data sources...
  • Blog Post: New 3rd Party Offerings for DCM

    Alpha Tech Solutions has recently released training for SMS 2003 DCM and they also offer an automatic rule generator to help create configuration manifests. I have not yet used or tested the rule generator tool, but I have seen the training and it combines useful audio and video instruction across multiple...
  • Blog Post: Sample DCM Manifests Available!

    Visit http://connect.microsoft.com to register for the DCM Configuration Manifest Beta program ! This program has been established to test and validate sample configuration files for Microsoft Internet Security and Acceleration Server 2004, Microsoft Windows Server 2003 and Microsoft Exchange Server...
  • Blog Post: Windows Server Deployment Automation Survey

    The Solutions for Infrastructure and Management team in the Core Infrastructure Solutions group wants to better understand customer needs around installation and configuration for Longhorn server deployment. We would appreciate it if you would complete a short survey on this topic. Your feedback will...
  • Blog Post: The Role of DTS packages in DCM Solution

    The Desired Configuration Monitoring Solution Accelerator (DCM Solution) comes with two DTS Packages: SMSToDCMTransfer and XMLToDCMTransfer . The reports are rendered based on data available in the DCMSolution database. The two DTS Packages transfer data from the SMS Database and the XML mapping file...
  • Blog Post: Check if a Registry value Exists using the Desired Configuration Monitoring Solution

    The Desired Configuration Monitoring Solution (DCM Solution) ignores any rules under a Setting if the Setting does not exist. Let us take the case where you are trying to figure out the data of a registry value and do a compliance check on the same. If the registry value does not exist at all, it might...
  • Blog Post: Files required to execute the Desired Configuration Monitoring (DCM) Engine

    The DCM Engine (also called the DCM Command Line Wrapper), DCMCmd.exe, requires the following supporting files for its execution: · BPA.Common.dll · BPA.ConfigCollector.dll · BPA.NetworkCollector.dll · BPA.UserInterface.DLL · DCMIssueProcessor.dll · Utility.DLL · DCM.MOF In...
  • Blog Post: Version Control of Manifests used with the Desired Configuration Monitoring Solution

    It has become a common concern about how to maintain different versions of manifests used with the Desired Configuration Monitoring Solution (DCM Solution). The current version of the DCM Solution does not provide a way to store version numbers within the manifest or report on the version number (in...
  • Blog Post: Check if a File Exists using the Desired Configuration Monitoring Solution

    The Desired Configuration Monitoring Solution (DCM Solution) ignores any rules under a Setting if the Setting does not exist. Let us take the case where you are trying to figure out the version of a file and do a compliance check on the same. If the file does not exist at all, it might be alarming to...
  • Blog Post: Now Available - Beta Program for SMS 2003 DCM Configuration Manifests

    Visit http://connect.microsoft.com to register for the DCM Configuration Manifest Beta program ! This program has been established to test and validate sample configuration files for Microsoft Internet Security and Acceleration Server 2004, Microsoft Windows Server 2003 and Microsoft Exchange Server...
  • Blog Post: Extending Reporting capabilities of the Desired Configuration Monitoring Solution - DCM Solution

    As you are already aware, the DCM Solution comes out of the box with four out-of-compliance and ten in-compliance reports. You can get access to all these reports by deploying the Reports Component of the DCM Solution. Now, the questions still remain... Can I extend the reporting component of DCM? In...
  • Blog Post: Rule Referencing in Desired Configuration Monitoring Solution

    Rule-referencing is one of the most helpful features in the DCM Solution which can help you frame complex queries! This post explains about the rule referencing feature in the DCM Authoring tool. Well, as the name suggests, it basically means referencing another rule from a rule and so on. There...
  • Blog Post: Architecture of the Desired Configuration Monitoring - DCM Solution

    The diagram below gives an overview of the DCM Solution architecture. This post basically explains what the different components of the DCM Architecture are and how they talk to each other to get the whole stuff working! 1. Install DCM. You can install the solution by using the Microsoft...
  • Blog Post: Rules are ignored by the DCM Solution when a Setting does not exist!!!

    In the current version of the DCM Solution, when a Setting is not found, all the rules under that Setting are ignored. Let us take a scenario. Let’s say you are creating a rule to check the anti virus version. So you would create a data source, setting and a rule to validate the version of the Anti Virus...
  • Blog Post: Remotely Monitoring Servers for Compliance using the DCM Solution

    Its pretty easy to get into a situation where you would like to run the DCM Solution on a server for compliance monitoring but the server which you are targeting might not have the dot net framework v 1.1 installed. The DCM Engine (command line wrapper) is a dot net based console application. Hence it...
  • Blog Post: DCM Command Line Wrapper Switches / Usage

    The DCM Command Line Wrapper supports a few command line switches. Following are the list of supported switches for the DCM Command Line Wrapper: · -cfg (used to specify the input manifest file) · -dat (used to specify the output file) · -p (used to specify the issue processors) · -trace...
  • Blog Post: Compliance Checks for ranges using the Desired Configuration Monitoring (DCM) Solution

    There might be several scenarios where you might want to check if a particular value lies within a range. Examples: Like a file version should be between 1.0.29.0 and 1.0.34.0 OR Antivirus version between 7.1 and 7.4 OR CPU processing power between 1GHz and 3 GHz Scenarios like these...
  • Blog Post: Case Sensitiveness of Desired Configuration Monitoring (DCM) Solution

    DCM is case-sensitive! Having said that, what aspects of DCM are case-sensitive? The tags in the xml manifest file which is created by the DCM Authoring tool are all case-sensitive. You might not be required to open up the xml file as such. But this is just an fyi. Oh, by the way, be aware...
  • Blog Post: Active vs Passive Rules in Desired Configuration Monitoring (DCM) Solution

    If you look at the Rule creation screen in the DCM Authoring tool, you will see that the DCM UI tool lets you to create two types of rules. They are the Active Rule or the Passive Rule. Now what’s the difference between these two, how can they be used and in what scenario would you use these different...
  • Blog Post: Why do not DCM Reports show the data from a recent run of DCM?

    Well, there can be several reasons why the data is not being shown in the DCM Reports. DCM Reporting is not real-time. In this post, I am attempting to address all the valid reasons. The Desired Configuration Monitoring (DCM) Solution Accelerator comes with four (4) out-of-compliance and ten (10)...
Page 1 of 2 (30 items) 12