Changes for page Abfragen auswerten

Last modified by Sabrina V. on 2025/03/31 09:22

From version 5.1
edited by Sabrina V.
on 2025/03/31 09:22
Change comment: There is no comment for this version
To version 3.1
edited by Sabrina V.
on 2025/03/31 06:43
Change comment: There is no comment for this version

Summary

Details

Page properties
Content
... ... @@ -28,7 +28,7 @@
28 28  )))|(% style="width:698px" %)This is a Windows Mobile Client (Smartphone OS)
29 29  
30 30  {{aagon.infobox}}
31 - If you see a warning triangle icon ([[image:DoppelteClientId Hinweisbox Hintergrund Icon.png||height="19" width="20"]]) instead of the associated Client, it is a [[suspicious Client>>doc:||anchor="HSpecialfeature:SuspiciousClientsinthesystem"]].
31 + If you see a warning triangle icon ([[image:DoppelteClientId Hinweisbox Hintergrund Icon.png||height="19" width="20"]]) instead of the associated Client, it is a [[suspicious Client>>doc:||anchor="HBesonderheit:VerdE4chtigeClientsimSystem"]].
32 32  {{/aagon.infobox}}
33 33  
34 34  
... ... @@ -74,7 +74,7 @@
74 74  
75 75  You can either open the Client Details directly by double-clicking on a Client in a Query Result, or highlight one or more Clients, right-click to open the context menu and then click on //Open Client Details//.
76 76  
77 -The Client Details are always opened as a vertical tab for each respective Client. Each open Client Details tab contains its own machine name as a caption, so that a clear distinction is possible. The Client Details are organised in a tree structure. On the left side of the split window, you will find all categories with the respective query values. As soon as you have clicked on a category, the available values are displayed in the right window area, along with a detailed list of the fields.
77 +The Client Details are always opened as a vertical tab for each respective Client. Each open Client Details tab contains its own machine name as a caption, so that a clear distinction is possible. The client details are organised in a tree structure. On the left side of the split window, you will find all categories with the respective query values. As soon as you have clicked on a category, the available values are displayed in the right window area, along with a detailed list of the fields.
78 78  
79 79  {{aagon.infobox}}
80 80  If no data is assigned to a field, the empty details are filled in with "not available", for example.
... ... @@ -95,7 +95,7 @@
95 95  |[[image:image-20240703105133-7.png]]|A submenu for managing your Clients will open. In the system selection, you have quick access to the most common query actions.
96 96  |[[image:image-20240703105148-16.png]]|A submenu for managing Windows Update Actions opens. In this menu, you can make specific changes from Windows Update Management and, among other things, install or uninstall Updates.
97 97  |[[image:image-20240703105133-9.png]]|Choose action [[Defender Management>>doc:ACMP.67.ACMP-Solutions.Security.Defender Management.WebHome]] if you want to start a Defender Scan or Update via the quick access or assign or remove Configuration Profiles.
98 -|[[image:image-20240703105133-10.png]]|You can create and distribute certificates for selected Clients or revoke them via the [[ACMP Gateway>>doc:ACMP.67.ACMP-Solutions.System.Gateway.WebHome]].
98 +|[[image:image-20240703105133-10.png]]|You can create and distribute certificates for selected clients or revoke them via the [[ACMP Gateway>>doc:ACMP.67.ACMP-Solutions.System.Gateway.WebHome]].
99 99  |[[image:image-20240703105154-17.png]]|You can use [[BitLocker Management>>doc:ACMP.67.ACMP-Solutions.Security.BitLocker Management.WebHome]] to disable BitLocker or change drive passwords on selected Clients. In addition, you can also assign or remove Configuration Profiles.
100 100  |[[image:image-20240703105158-18.png]]|A submenu opens with all the [[Intune>>doc:ACMP.67.ACMP-Solutions.Client-Management.ACMP Intune Connector.WebHome]]-specific actions that you can execute on a Client..
101 101  |[[image:image-20240703105204-19.png]]|This opens a wizard for the execution of jobs. This allows you to distribute Client Commands, Job Collections, System Jobs, Managed Software or Windows Update Collections, which are then to be executed on the selected Clients.
... ... @@ -105,7 +105,7 @@
105 105  
106 106  == Special feature: Suspicious Clients in the system ==
107 107  
108 -If you come across a warning triangle icon in a query while working with ACMP, there are //suspicious //Clients in your system. A suspicious Client is a Client whose Client ID is not unique and is used by at least one other agent. Suspicious Clients can appear in all Client-based queries (e.g. in the containers, Assets or linked tickets).
108 +If you come across a warning triangle icon in a query while working with ACMP, there are //suspicious //clients in your system. A suspicious client is a client whose Client ID is not unique and is used by at least one other agent. Suspicious Clients can appear in all client-based queries (e.g. in the containers, Assets or linked tickets).
109 109  
110 110  {{figure}}
111 111  [[image:66_ClientManagement_Abfrageverwaltung_Client_Details_1288.png||alt="63_ClientManagement_Abfrageverwaltung_Client_Details_1288.png" data-xwiki-image-style-alignment="center"]]
... ... @@ -115,12 +115,12 @@
115 115  {{/figureCaption}}
116 116  {{/figure}}
117 117  
118 -If multiple agents use the same Client ID, all these agents save their data under the same dataset in the database. This means that only the values of the last entered Client are displayed in a query. When entering scan data, the computer name is regularly overwritten by the agents. These changes are registered and saved. If a particular computer name is saved at least twice for a Client ID due to this name change, this Client ID is considered a suspicious Client. All computer names previously registered with this ID are then listed in the list of suspicious Clients in the Client Details.
118 +If multiple agents use the same Client ID, all these agents save their data under the same dataset in the database. This means that only the values of the last entered client are displayed in a query. When entering scan data, the computer name is regularly overwritten by the agents. These changes are registered and saved. If a particular computer name is saved at least twice for a Client ID due to this name change, this Client ID is considered a suspicious client. All computer names previously registered with this ID are then listed in the list of suspicious clients in the Client Details.
119 119  
120 -When you open the Client Details for the suspicious Client, you will be taken automatically to the "Duplicate Client ID" (//Software// > //Computer// > //Duplicate Client ID//) where all previous computer names of the Client ID are listed.
120 +When you open the Client Details for the suspicious client, you will be taken automatically to the "Duplicate Client ID" (//Software// > //Computer// > //Duplicate Client ID//) where all previous computer names of the Client ID are listed.
121 121  
122 122  {{aagon.infobox}}
123 -Please note that this menu option is only visible if a suspicious Client has been registered. Otherwise, the list entry does not appear.
123 +Please note that this menu option is only visible if a suspicious client has been registered. Otherwise, the list entry does not appear.
124 124  {{/aagon.infobox}}
125 125  
126 126  {{figure}}
... ... @@ -131,7 +131,7 @@
131 131  {{/figureCaption}}
132 132  {{/figure}}
133 133  
134 -You can select one or more entries directly from the Client Details and execute a new installation of the agent with a new Client ID on the computers of the agents to remove the suspicious Clients. The correction causes the entries to disappear from the list of Client IDs and the system no longer registers them as ‘suspicious’.
134 +You can select one or more entries directly from the client details and execute a new installation of the agent with a new client ID on the computers of the agents to remove the suspicious clients. The correction causes the entries to disappear from the list of client IDs and the system no longer registers them as ‘suspicious’.
135 135  
136 136  You can use the display field //"Is a candidate for a duplicate ClientID"// to build targeted Queries that automatically notify you of the occurrence of //suspicious //Clients.
137 137  
... ... @@ -150,16 +150,16 @@
150 150  All the fields you have defined are displayed here with the respective values. You have the option to customise the values. To apply your changes, click on //Save.//
151 151  )))
152 152  |Documents|All documents linked to the Client are displayed. You can, for example, change the descriptions of the document or add or delete a document link.
153 -|Master dara|In the Master Data section, you can store the Master Data for the selected Client. If you click on one of the fields, a small window will open in which you can select, edit, add and delete existing Master Data.
153 +|Master dara|In the Master Data section, you can store the Master Data for the selected client. If you click on one of the fields, a small window will open in which you can select, edit, add and delete existing Master Data.
154 154  )))
155 155  |**Client Commands**|(((
156 156  This area shows Client Command information that affects the Client.
157 157  
158 -|Attached files|All files that have been added as Client Commands are displayed. Various actions are available to you.
159 -|Logs|All log files of Client Commands executed on this Client are stored here. This requires activated logging for the Client Commands in order to also delete or save the logs.
158 +|Attached fiels|All files that have been added as Client Commands are displayed. Various actions are available to you.
159 +|Logs|All log files of Client Commands executed on this client are stored here. This requires activated logging for the Client Commands in order to also delete or save the logs.
160 160  )))
161 161  |**Hardware**|(((
162 -This section provides a quick overview of the inventoried data of the Client, which is divided into the categories of computer, drives and mainboard. It is not possible to customise the data.
162 +This section provides a quick overview of the inventoried data of the client, which is divided into the categories of computer, drives and mainboard. It is not possible to customise the data.
163 163  
164 164  {{aagon.infobox}}
165 165  You can find all hard drive values for S.M.A.R.T under //Hardware// > //Drives// > //Hard Drives//.
... ... @@ -170,9 +170,9 @@
170 170  )))
171 171  |**Contacts**|Contacts linked to the Client are displayed here, where you can add, delete or reset shortcuts.
172 172  |**Licence Managament**|This section shows you which licences are being used by the Client. It is not possible to customise this.
173 -|**Managed Software**|This entry allows you to display the Managed Software of this Client and manage items.
173 +|**Managed Software**|This entry allows you to display the Managed Software of this client and manage items.
174 174  |**Mobile Device Management**|This is where you can find information about the inventoried mobile device. It provides general information as well as specific information about the hardware, the SIM card or the network.
175 -|**Software**|This section contains all the information about the software available on the Client. For this purpose, details about the operating system, the computer and the installed software are displayed. The OS Deployment section provides you with an overview of the assigned values, while the Security section can be used to display vulnerabilities and the BitLocker and Defender Management.
175 +|**Software**|This section contains all the information about the software available on the client. For this purpose, details about the operating system, the computer and the installed software are displayed. The OS Deployment section provides you with an overview of the assigned values, while the Security section can be used to display vulnerabilities and the BitLocker and Defender Management.
176 176  |**Virtualization**|(((
177 177  In this area, you can set the virtualisation options for the selected Client.
178 178  
© Aagon GmbH 2025
Besuchen Sie unsere neue Aagon-Community