SlideShare ist ein Scribd-Unternehmen logo
1 von 23
How the software operates Atrium Discovery Overview
Atrium Object-Mesh Database ,[object Object]
Atrium Discovery usernames, passwords, community strings logs in, runs commands stores collected data in the datastore as “Directly Discovered Data” (DDD) credential vault Your IT estate discovery process 1 2 3 datastore
Windows Discovery ,[object Object],[object Object],[object Object],[object Object],[object Object]
Windows Discovery – Credential Slave usernames, passwords Connects to estate with supplied username/password Delegates discovery to Windows slave Your IT estate discovery process 1 3 credential vault Credential Slave 2
Windows Discovery – AD/Workgroup Slave Connects to the estate using the slave’s Windows Service account  Delegates discovery to the slave Your IT estate discovery process 2 AD/Workgroup Slave 1
Atrium Discovery Reasoning Platform Discovery stores DDD in the datastore Reasoning applies patterns to DDD Inferred data is written back to the datastore Patterns make inferences discovery process 1 datastore reasoning platform 2 patterns 4 3
Inferred Data Hosts Business Applications The reasoning platform infers the presence of hosts, software instances and business applications from the DDD Directly Discovered Data Software Instances
Patterns Are Really Powerful ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Search Everything ,[object Object],[object Object]
Interactive Analysis ,[object Object],[object Object],Report Dashboard Search
Analysis UI Overview
UI Navigation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Navigation bars: Tabs and Buttons ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Home Page: Dashboard Intro ,[object Object],[object Object],[object Object]
Applications Appearance ,[object Object],[object Object],[object Object]
Infrastructure Appearance
Infrastructure Tab Key Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discovery Appearance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Reports Appearance
Administration Appearance
Administration Tab Key Points ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Further Resources ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Weitere ähnliche Inhalte

Was ist angesagt?

Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
sibidlegend
 
Introduction To Corba
Introduction To CorbaIntroduction To Corba
Introduction To Corba
rajianju
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecture
mmubashirkhan
 

Was ist angesagt? (14)

Tableau powerpoint
Tableau powerpointTableau powerpoint
Tableau powerpoint
 
Towards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloudTowards secure and dependable storage service in cloud
Towards secure and dependable storage service in cloud
 
High level design document template
High level design document templateHigh level design document template
High level design document template
 
Software design
Software designSoftware design
Software design
 
Nordic Sugcon xdb crash course
Nordic Sugcon xdb crash courseNordic Sugcon xdb crash course
Nordic Sugcon xdb crash course
 
70 640 Lesson06 Ppt 041009
70 640 Lesson06 Ppt 04100970 640 Lesson06 Ppt 041009
70 640 Lesson06 Ppt 041009
 
Software Design Document
Software Design DocumentSoftware Design Document
Software Design Document
 
Other Systems & Application Software
Other Systems & Application SoftwareOther Systems & Application Software
Other Systems & Application Software
 
Introduction To Corba
Introduction To CorbaIntroduction To Corba
Introduction To Corba
 
Saa s multitenant database architecture
Saa s multitenant database architectureSaa s multitenant database architecture
Saa s multitenant database architecture
 
DB2 Security Model
DB2 Security ModelDB2 Security Model
DB2 Security Model
 
Best Practices for Data Sharing (CHPC 2019 - South Africa)
Best Practices for Data Sharing (CHPC 2019 - South Africa)Best Practices for Data Sharing (CHPC 2019 - South Africa)
Best Practices for Data Sharing (CHPC 2019 - South Africa)
 
Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...Implementing Active Directory and Information Security Audit also VAPT in Fin...
Implementing Active Directory and Information Security Audit also VAPT in Fin...
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate Learning
 

Ähnlich wie Addmi 02-addm overview

Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxEvaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
SANSKAR20
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
Concentrated Technology
 

Ähnlich wie Addmi 02-addm overview (20)

Grasping The LightSwitch Paradigm
Grasping The LightSwitch ParadigmGrasping The LightSwitch Paradigm
Grasping The LightSwitch Paradigm
 
Essay On Active Directory
Essay On Active DirectoryEssay On Active Directory
Essay On Active Directory
 
SplunkLive! - Getting started with Splunk
SplunkLive! - Getting started with SplunkSplunkLive! - Getting started with Splunk
SplunkLive! - Getting started with Splunk
 
Getting Started with Iron Speed Designer
Getting Started with Iron Speed DesignerGetting Started with Iron Speed Designer
Getting Started with Iron Speed Designer
 
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docxEvaluate a Health WebsiteName Click here to enter text.Course Cli.docx
Evaluate a Health WebsiteName Click here to enter text.Course Cli.docx
 
Managing SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBAManaging SQLserver for the reluctant DBA
Managing SQLserver for the reluctant DBA
 
DSpace: Technical Basics
DSpace: Technical BasicsDSpace: Technical Basics
DSpace: Technical Basics
 
Arc Ready Cloud Computing
Arc Ready Cloud ComputingArc Ready Cloud Computing
Arc Ready Cloud Computing
 
PowerShell-and-DSC-Enables-DSCDevOps-1.pptx
PowerShell-and-DSC-Enables-DSCDevOps-1.pptxPowerShell-and-DSC-Enables-DSCDevOps-1.pptx
PowerShell-and-DSC-Enables-DSCDevOps-1.pptx
 
Lasefiche Products Family Presentation
Lasefiche Products Family PresentationLasefiche Products Family Presentation
Lasefiche Products Family Presentation
 
What is going on? Application Diagnostics on Azure - Copenhagen .NET User Group
What is going on? Application Diagnostics on Azure - Copenhagen .NET User GroupWhat is going on? Application Diagnostics on Azure - Copenhagen .NET User Group
What is going on? Application Diagnostics on Azure - Copenhagen .NET User Group
 
Final viva
Final vivaFinal viva
Final viva
 
RavenDB overview
RavenDB overviewRavenDB overview
RavenDB overview
 
Livebase: a database for the web 2.0
Livebase: a database for the web 2.0Livebase: a database for the web 2.0
Livebase: a database for the web 2.0
 
Apache Spark Streaming -Real time web server log analytics
Apache Spark Streaming -Real time web server log analyticsApache Spark Streaming -Real time web server log analytics
Apache Spark Streaming -Real time web server log analytics
 
Intro to Application Express
Intro to Application ExpressIntro to Application Express
Intro to Application Express
 
Monitoring as an entry point for collaboration
Monitoring as an entry point for collaborationMonitoring as an entry point for collaboration
Monitoring as an entry point for collaboration
 
Digital Asset Management Forum Chicago 2011
Digital Asset Management Forum Chicago 2011Digital Asset Management Forum Chicago 2011
Digital Asset Management Forum Chicago 2011
 
Chapter 7)
Chapter 7)Chapter 7)
Chapter 7)
 
Wcl310 Raiders of the Elevated Token
Wcl310 Raiders of the Elevated TokenWcl310 Raiders of the Elevated Token
Wcl310 Raiders of the Elevated Token
 

Mehr von odanyboy

Addmi 18-appliance baseline
Addmi 18-appliance baselineAddmi 18-appliance baseline
Addmi 18-appliance baseline
odanyboy
 
Addmi 17-snapshot
Addmi 17-snapshotAddmi 17-snapshot
Addmi 17-snapshot
odanyboy
 
Addmi 16-discovery monitoring
Addmi 16-discovery monitoringAddmi 16-discovery monitoring
Addmi 16-discovery monitoring
odanyboy
 
Addmi 16.5-discovery troubleshooting
Addmi 16.5-discovery troubleshootingAddmi 16.5-discovery troubleshooting
Addmi 16.5-discovery troubleshooting
odanyboy
 
Addmi 15-discovery scripts
Addmi 15-discovery scriptsAddmi 15-discovery scripts
Addmi 15-discovery scripts
odanyboy
 
Addmi 14-discovery credentials
Addmi 14-discovery credentialsAddmi 14-discovery credentials
Addmi 14-discovery credentials
odanyboy
 
Addmi 13-discovery overview
Addmi 13-discovery overviewAddmi 13-discovery overview
Addmi 13-discovery overview
odanyboy
 
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
odanyboy
 
Addmi 12-basic scan
Addmi 12-basic scanAddmi 12-basic scan
Addmi 12-basic scan
odanyboy
 
Addmi 11-intro to-patterns
Addmi 11-intro to-patternsAddmi 11-intro to-patterns
Addmi 11-intro to-patterns
odanyboy
 
Addmi 10-query builder
Addmi 10-query  builderAddmi 10-query  builder
Addmi 10-query builder
odanyboy
 
Addmi 10.5-basic query-language
Addmi 10.5-basic query-languageAddmi 10.5-basic query-language
Addmi 10.5-basic query-language
odanyboy
 
Addmi 09-analysis ui-reporting
Addmi 09-analysis ui-reportingAddmi 09-analysis ui-reporting
Addmi 09-analysis ui-reporting
odanyboy
 
Addmi 09.5-analysis ui-host-grouping
Addmi 09.5-analysis ui-host-groupingAddmi 09.5-analysis ui-host-grouping
Addmi 09.5-analysis ui-host-grouping
odanyboy
 
Addmi 08-dashboards
Addmi 08-dashboardsAddmi 08-dashboards
Addmi 08-dashboards
odanyboy
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmt
odanyboy
 
Addmi 04-va installation
Addmi 04-va installationAddmi 04-va installation
Addmi 04-va installation
odanyboy
 
Addmi 01-why addm
Addmi 01-why addmAddmi 01-why addm
Addmi 01-why addm
odanyboy
 

Mehr von odanyboy (18)

Addmi 18-appliance baseline
Addmi 18-appliance baselineAddmi 18-appliance baseline
Addmi 18-appliance baseline
 
Addmi 17-snapshot
Addmi 17-snapshotAddmi 17-snapshot
Addmi 17-snapshot
 
Addmi 16-discovery monitoring
Addmi 16-discovery monitoringAddmi 16-discovery monitoring
Addmi 16-discovery monitoring
 
Addmi 16.5-discovery troubleshooting
Addmi 16.5-discovery troubleshootingAddmi 16.5-discovery troubleshooting
Addmi 16.5-discovery troubleshooting
 
Addmi 15-discovery scripts
Addmi 15-discovery scriptsAddmi 15-discovery scripts
Addmi 15-discovery scripts
 
Addmi 14-discovery credentials
Addmi 14-discovery credentialsAddmi 14-discovery credentials
Addmi 14-discovery credentials
 
Addmi 13-discovery overview
Addmi 13-discovery overviewAddmi 13-discovery overview
Addmi 13-discovery overview
 
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
Addmi 13-discovery overview (patrick ryan's conflicted copy 2011-01-27)
 
Addmi 12-basic scan
Addmi 12-basic scanAddmi 12-basic scan
Addmi 12-basic scan
 
Addmi 11-intro to-patterns
Addmi 11-intro to-patternsAddmi 11-intro to-patterns
Addmi 11-intro to-patterns
 
Addmi 10-query builder
Addmi 10-query  builderAddmi 10-query  builder
Addmi 10-query builder
 
Addmi 10.5-basic query-language
Addmi 10.5-basic query-languageAddmi 10.5-basic query-language
Addmi 10.5-basic query-language
 
Addmi 09-analysis ui-reporting
Addmi 09-analysis ui-reportingAddmi 09-analysis ui-reporting
Addmi 09-analysis ui-reporting
 
Addmi 09.5-analysis ui-host-grouping
Addmi 09.5-analysis ui-host-groupingAddmi 09.5-analysis ui-host-grouping
Addmi 09.5-analysis ui-host-grouping
 
Addmi 08-dashboards
Addmi 08-dashboardsAddmi 08-dashboards
Addmi 08-dashboards
 
Addmi 06-security mgmt
Addmi 06-security mgmtAddmi 06-security mgmt
Addmi 06-security mgmt
 
Addmi 04-va installation
Addmi 04-va installationAddmi 04-va installation
Addmi 04-va installation
 
Addmi 01-why addm
Addmi 01-why addmAddmi 01-why addm
Addmi 01-why addm
 

Kürzlich hochgeladen

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Kürzlich hochgeladen (20)

Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Buy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptxBuy Epson EcoTank L3210 Colour Printer Online.pptx
Buy Epson EcoTank L3210 Colour Printer Online.pptx
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024Enterprise Knowledge Graphs - Data Summit 2024
Enterprise Knowledge Graphs - Data Summit 2024
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 

Addmi 02-addm overview

  • 1. How the software operates Atrium Discovery Overview
  • 2.
  • 3. Atrium Discovery usernames, passwords, community strings logs in, runs commands stores collected data in the datastore as “Directly Discovered Data” (DDD) credential vault Your IT estate discovery process 1 2 3 datastore
  • 4.
  • 5. Windows Discovery – Credential Slave usernames, passwords Connects to estate with supplied username/password Delegates discovery to Windows slave Your IT estate discovery process 1 3 credential vault Credential Slave 2
  • 6. Windows Discovery – AD/Workgroup Slave Connects to the estate using the slave’s Windows Service account Delegates discovery to the slave Your IT estate discovery process 2 AD/Workgroup Slave 1
  • 7. Atrium Discovery Reasoning Platform Discovery stores DDD in the datastore Reasoning applies patterns to DDD Inferred data is written back to the datastore Patterns make inferences discovery process 1 datastore reasoning platform 2 patterns 4 3
  • 8. Inferred Data Hosts Business Applications The reasoning platform infers the presence of hosts, software instances and business applications from the DDD Directly Discovered Data Software Instances
  • 9.
  • 10.
  • 11.
  • 13.
  • 14.
  • 15.
  • 16.
  • 18.
  • 19.
  • 22.
  • 23.

Hinweis der Redaktion

  1. This presentation gives you an overview of how BMC Atrium Discovery works.
  2. One of BMC Atrium Discoverys key differentiators is the fact that we use an object mesh database. From here on we'll refer to this database as the data store. Its important because the data we need to store represents the real world which is complex, interconnected and changing all the time. each object stored represents a real thing. The datastore can be extended on the fly and is great at representing the dynamic and changing relationships between all the objects we discover. We are often asked why we don't use a relational database, well for the user its poor choice because the data is represented in a way that is not natural, the database is harder to extend and its very hard to make sense of the data where complex relationships are important .
  3. Lets take a look at the logical end to end process of discovery. We begin by securing credentials on the appliance in what's known as the credential vault. These crednetials are used to log into the hosts in various ways for example SSH, Telnet, WMI and SNMP. The discovery process then logs onto hosts and executes commands. The collected data is stored in the datastore as directly discovered data or DDD.
  4. Windows discovery takes a slightly different approach as we require an external service running on a dedicated windows server to log into and scan all other Windows hosts within the estate. Typically the Windows server running the discovery slave is administered and maintained by the customer. Credentials are handled slightly different as well. There three different discovery slave types: Credential slaves which hold credentials within the credential vault. And Active Directory and Workgroup slaves which runs the slave service as the user that can gain access to the target windows hosts.
  5. Here we see a similar diagram to the one we looked at earlier. It highlights the fact that the Windows credential slave relies on credentials stored in the credential vault on the BMC Atrium Discovery appliance. When the appliance discovers a Windows host it delegates the discovery task to the Windows discovery slave. The discovery slave then goes off and logs into the target host and runs the necessary discovery commands.
  6. Active Directory and the Workgroup slave hold credentials on the server running the discovery slave service. So here we see the same discovery process but the credentials are no longer stored within the credential vault.
  7. We've described the fact that data discovered by Atrium Discovery returns to the appliance in the form of directly discovered data or DDD. This process of adding DDD to the datastore triggers events within the Reasoning Platform. The Reasoning Platform has access to a set of patterns. each pattern is a chunk of knowledge about something in particular. For example: Let's say we discover a host that is running a process called "MySQLD" we can then work out that its running an instance of MySQL Server. Executing the MySQL executable with command line switch of "version" will give you the version number. The original discovery data plus the new data received from the pattern is all written to the datastore as DDD.
  8. At the bottom of this diagram we have our directly discovered data. As DDD is written to the datastore the Reasoning Engine uses rules to infer hosts and patterns to infer software instances and business applications. Simply put the reasoning engine converts data into information in the form of inferred data.
  9. The patterns that we have been referring to are powerful but they are also flexible. BMC will release new patterns on a monthly basis. You can also create your own custom patterns to extend discovery, or to find bespoke software running within your environment. It is also possible to write patterns to query databases
  10. Data written to the datastore is instantly indexed allowing the user to quickly search for items of interest. Atrium Discovery's keyword search means that is not always necessary to know exactly what you are searching for.
  11. Along with keyword search, dashboards and reports provide jumping off points for data analysis and exploration. Result lists include powerful navigation like sorting, filtering, visualization and charts. All data including provenance is available for analysis.