Escolar Documentos
Profissional Documentos
Cultura Documentos
Planning Toolkit
Software Usage Tracker User Guide
Version 5.5
If you are using this documentation solely for non-commercial purposes internally within YOUR company or
organization, then this documentation is licensed to you under the Creative Commons Attribution-
NonCommercial License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc/2.5/ or
send a letter to Creative Commons, 543 Howard Street, 5th Floor, San Francisco, California, 94105, USA.
This documentation is provided to you for informational purposes only, and is provided to you entirely "AS IS".
Your use of the documentation cannot be understood as substituting for customized service and information
that might be developed by Microsoft Corporation for a particular user based upon that user’s particular
environment. To the extent permitted by law, MICROSOFT MAKES NO WARRANTY OF ANY KIND, DISCLAIMS
ALL EXPRESS, IMPLIED AND STATUTORY WARRANTIES, AND ASSUMES NO LIABILITY TO YOU FOR ANY
DAMAGES OF ANY TYPE IN CONNECTION WITH THESE MATERIALS OR ANY INTELLECTUAL PROPERTY IN THEM.
Microsoft may have patents, patent applications, trademarks, or other intellectual property rights covering
subject matter within this documentation. Except as provided in a separate agreement from Microsoft, your
use of this document does not give you any license to these patents, trademarks or other intellectual property.
Information in this document, including URL and other Internet Web site references, is subject to change
without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-
mail addresses, logos, people, places and events depicted herein are fictitious.
Microsoft, Active Directory, Excel, SharePoint, Windows, Windows Server and Windows Vista are either
registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries and
regions.
The names of actual companies and products mentioned herein may be the trademarks of their respective
owners.
You have no obligation to give Microsoft any suggestions, comments or other feedback ("Feedback") relating to
the documentation. However, if you do provide any Feedback to Microsoft then you provide to Microsoft,
without charge, the right to use, share and commercialize your Feedback in any way and for any purpose. You
also give to third parties, without charge, any patent rights needed for their products, technologies and
services to use or interface with any specific parts of a Microsoft software or service that includes the Feedback.
You will not give Feedback that is subject to a license that requires Microsoft to license its software or
documentation to third parties because we include your Feedback in them.
microsoft.com/solutionaccelerators
Contents
microsoft.com/solutionaccelerators
Over view
The Software Usage Tracker feature in the Microsoft® Assessment and Planning (MAP)
Toolkit helps gather data on users and devices that access Microsoft core server
products in your environment. This data can significantly simplify the inventory process
for client access license (CAL) reporting.
This document provides instructions on how to use the Usage Tracker. For more
information about which Microsoft server product versions Usage Tracker reports on, see
Appendix A, “Supported Server Products.”
Reporting Limitations
The information in the Software Usage Tracker reports that the MAP Toolkit generates
are subject to many limitations. The information these reports contain does not constitute
legal, accounting, or other professional advice. These reports are for informational
purposes only and should not be used as the sole source of information for determining
software license usage compliance.
Software Usage Tracker reports should be used as a baseline for CAL usage analysis
rather than as an authoritative summary of software usage. Due to the wide variety of
ways that software can be deployed and inventoried in your environment, the Software
Usage Tracker cannot always produce accurate counts of server software and access to
that software. For more information about scenarios that could lead to inaccurate
reporting, see Appendix B, “Examples of Limiting Scenarios.”
microsoft.com/solutionaccelerators
2 Microsoft Assessment and Planning Toolkit
USE MASTER
GO
/* Note: the name 'login_audit' is your choice */
CREATE SERVER AUDIT SPECIFICATION [login_audit]
FOR SERVER AUDIT Server_Audit
ADD (SUCCESSFUL_LOGIN_GROUP) WITH (STATE = ON);
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 3
microsoft.com/solutionaccelerators
4 Microsoft Assessment and Planning Toolkit
To stop monitoring SQL Server 2008 logon events to the Windows Security log
• If you want to stop monitoring logon events for SQL Server 2008, on each
SQL Server 2008 instance for which you want to stop monitoring events, run the
following SQL command.
Note For more information about how to configure these security settings, see How to: Write
Server Audit Events to the Security Log at http://msdn.microsoft.com/en-
us/library/cc645889.aspx.
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 5
Specify Credentials
The process of identifying server roles and tracking usage in your environment
requires different types of collector technology, depending on the software usage you
choose to report on. Each technology requires its own credentials.
Note For more information about how to specify credentials, see the “Discovery Methods”
section in MAP Help.
These technologies are:
• Windows Management Instrumentation (WMI). Product information is found in
WMI on discovered computers. The Inventory and Assessment Wizard uses this
information to locate the servers that have the software you chose to track.
• System Center Configuration Manager. MAP can discover and collect hardware,
software, and usage details from System Center Configuration Manager. If you want
to use this method, you need to provide credentials for the SMS Provider of the
Configuration Manager server you want to use for discovery. MAP collects
information about all the clients managed by any Configuration Manager site known
by the Configuration Manager server for which credentials are provided. To learn
more about the required permissions for accessing the SMS Provider, see About the
SMS Admins Group on Microsoft TechNet.
• SQL Server. In addition to WMI, MAP collects certain information directly from each
SQL Server instance. If you need to collect usage information from SQL Server, you
need to provide credentials to SQL Servers running on your network.
• Active Directory® Domain Services (AD DS). Microsoft Exchange mailbox and
server configuration information is located in AD DS. The MAP Toolkit requires
credentials that have access to read the Active Directory schema from the root forest
of your environment.
microsoft.com/solutionaccelerators
6 Microsoft Assessment and Planning Toolkit
Note To assess Exchange Server usage, the MAP Toolkit collects information about active
mailboxes in Active Directory Domain Services (AD DS). The credentials that you provide should
have the required privileges to enumerate mailboxes, groups, and users in AD DS.
To assess Configuration Manager agent count, the MAP Toolkit collects information from the
Configuration Manager servers. The credentials that you provide should have adequate privileges
to collect data from the Configuration Manager server you supply.
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 7
microsoft.com/solutionaccelerators
8 Microsoft Assessment and Planning Toolkit
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 9
On the SCCM Server and Credentials page, in the appropriate text boxes, enter the
name of the Configuration Manager primary site server at the top of the System Center
Configuration Manager hiearchy against which you want to track usage. The primary site
entered and all of its child sites will be included in Configuration Manager software usage
reports. Enter the credentials required to access the Configuration Manager WMI
provider on the site server you provided. Click Next.
microsoft.com/solutionaccelerators
10 Microsoft Assessment and Planning Toolkit
Figure 5. The All Computers Credentials page before you create accounts
On the All Computers Credentials page, click Create to create the accounts that the
Inventory and Assessment Wizard uses to complete the inventory process for the
collector technologies (WMI, SQL Server, and so on) that you need to use, as specified
earlier.
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 11
Par se Logs
Note You only need to parse logs for the software listed in the “Configure Log Files” section of
this guide. If you are tracking usage on server software that does not require log files, you can
skip this section and move on to the “Analyze the Results” section.
For accurate analysis of software usage in your environment, you will need to ensure that
your computers have generated logs for the appropriate time period. We recommend that
you have 90 days of log files generated prior to proceeding.
After you confirm that your logs have been accumulated for the appropriate amount of
time, and you have finished the inventory process, you are ready to parse the logs and
analyze software usage. To proceed, copy all relevant Windows and IIS logs from your
servers, and store them in a location that is accessible by the computer that is running
the MAP Toolkit (and by the logged on user).
Important Before you parse the log files, ensure that you inventory the servers that created
the log files you want to parse. You must connect the MAP Toolkit to the appropriate MAP
database (the database that contains the inventory data of the servers from which the logs
came.) This is necessary because, for proper data processing, the data from parsing the logs
must be mapped to the inventoried servers. Only parse log files for supported software versions
and editions. See Appendix A, “Supported Server Products,” in this document for a complete list
of supported software.
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 13
To parse logs
1. In the MAP Toolkit, click the Software Usage Tracker wunderbar, and then, in
the navigation pane, click Log Parsing Overview.
microsoft.com/solutionaccelerators
14 Microsoft Assessment and Planning Toolkit
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 15
microsoft.com/solutionaccelerators
16 Microsoft Assessment and Planning Toolkit
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 17
microsoft.com/solutionaccelerators
18 Microsoft Assessment and Planning Toolkit
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 19
Interpret Reports
You can use Software Usage reports to help verify compliance and analyze current
licensing needs. Summary reports provide a count of users or devices for all servers of a
given type for the date range that you configure. Detailed reports provide information
about specific users or devices and the servers they accessed. You can use these
reports to analyze software usage to determine whether device CALs or user CALs would
more effectively meet your needs.
Software Usage reports should be used as a baseline for CAL usage analysis rather than
as an authoritative summary of software usage. Additionally, the number of servers from
which software usage is reported might differ from the number of servers inventoried if
the security event logs for all servers are not configured to log success logon events.
Generate Reports
At any time while viewing reports in the Software Usage Summary pane or in a specific
server product pane, you can generate a report. To create a report, in the Actions pane,
click the Generate Report task.
If you click the Generate Report task while viewing the Software Usage Summary pane,
the tool will generate a report for each server product. The Combined Products Distinct
Usage summary data is not generated as a report.
To generate a report on only one product, in the navigation pane, browse to the node for
the product for which you want to generate a report, and then, in the Actions pane, click
Generate Report.
Note To ensure you have the most accurate information, run an inventory just prior to parsing
log files and generating reports.
Summary Results
To view a summary of the data before generating a full software usage report, expand
the Software Usage Summary node in the navigation pane, and then click the name of a
server product. The results pane displays an overview of the usage data for each server
product version and edition.
Detailed Reports
For each server product for which you configured usage tracking, there will be a detailed
report. The detailed reports, which are generated as Excel® workbooks, have inventory
and usage data detailed for each server on which the product is installed. You can use
the detailed report to filter for the information required for determining license usage for
server product and client access.
Each detailed report has several worksheets. The following sections describe the
information listed in each worksheet.
SharePoint Server was discovered on the server, but no IIS log file for usage data was
parsed for that server. If a row lists Yes for Log File Availability and No for Sites Found
in Parsed Logs, one or more log files were parsed for this server, but no accesses were
recorded by Software Usage Tracker.
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 21
microsoft.com/solutionaccelerators
22 Microsoft Assessment and Planning Toolkit
Windows Server
• Windows Server 2008 R2
• Windows Server 2008
• Windows Server 2003 R2
• Windows Server 2003
• Windows Server 2000
Additional Information
All editions of the listed server products that require a server license are reported in the
Software Usage Tracker report for that server product.
SQL Server 2008 Enterprise and Datacenter editions are the only SQL Server editions
that MAP Toolkit will report usage on. All other editions will be reported on for server
license information.
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 23
The discovery methods you choose in the Inventory and Assessment Wizard are
not able to find all computers in your environment. For example, if you choose the IP
Address Range method and the IP addresses for some servers are outside of the
configured range, those servers would not be inventoried.
One or more servers did not accept the credentials provided to log on to WMI. If no
configured credentials are accepted by the remote server, the inventory for installed
server software cannot occur and no server products will be associated with the
computer name.
Missing log files. Missing log files for Windows Server, SQL Server, and Office
SharePoint Server can cause the count of users and devices that access those servers to
be incorrect.
Incorrectly configured log files. Windows event and IIS log files that are not configured
to the specifications described in this guide will prevent the correct usage count to be
parsed from these logs.
Computers aren’t connected to the network. The inventory process determines which
computers have a System Center Configuration Manager agent running on them. If the
inventory occurs when one of these computers is not connected to the network, such as
when a mobile computer is used outside of the network, agents running on these
computers will not be counted.
microsoft.com/solutionaccelerators
24 Microsoft Assessment and Planning Toolkit
microsoft.com/solutionaccelerators
Software Usage Tracker User Guide 25
If your farm is Enterprise, the Current License section will indicate SharePoint
Server with Enterprise Client Access License.
microsoft.com/solutionaccelerators