Installing the scanner and gathering initial data

Available from 9.2.7. After you copied the installation files and the software catalog to the endpoints, start the installation and the initial scans.

Before you begin

  • To perform this task, you must have the appropriate privileges.
    • UNIX root
    • Windows administrative privileges with elevation
  • If you use License Metric Tool or Tivoli® Asset Discovery for Distributed 7.x, remember that the installation of the disconnected scanner stops the 7.x agent. You need to restart the 7.x agent after the setup.

Procedure

  1. Go to the directory where you copied the installation files.
  2. Run the setup file.
    • UNIX setup.sh
    • Windows setup.bat
    It automatically performs the following steps:
    • Installs the scanner
    • Runs the initial capacity scan, and creates the computer.yml file.

      The initial capacity scan is needed to collect data about your system, and to create the computer.yml file that will identify this system. The file is added to each package with scan results and it helps to catalog and correctly display them in the user interface. It contains information about the operating system, such as host name, and a unique computer ID.

      Note: Linux For older versions of Red Hat Linux on s390 mainframe, it can be required to manually provide machine type, processor type, shared pool capacity, and system active processors. The script will ask you to specify these parameters if the scanner cannot collect these details automatically.

      Solaris For Solaris systems that run on SPARC, it is required to specify if the system is in Dynamic System Domains.

    • Schedules regular capacity scans.

      The capacity scan is scheduled to run every 30 minutes to gather current results for virtualized environments where the capacity can dynamically change depending on the allocated resources. If you want to collect the scan data only once, run the setup file with the -noschedule option.

Results

The scanner is set up now, and ready to run the software scan and gather results. During installation, the endpoint_id.txt file was created in the config directory. The file contains the host name, and the time stamp of the first setup. The combination of these two elements becomes an endpoint identifier that can be modified by the user if needed. In case of scanner upgrade, or re-installation, the existing endpoint identifier from the file will be used.

What to do next

Run the software scan and gather scan results.