The computer window displays selected records from the computers table. The computer table contains a record for every computer that has used the KeyAccess client software to connect to the KeyServer, including records representing both physical and virtual computers. In addition to the obvious fields necessary to identify distinct computers, numerous hardware attributes are available for display in the Computers window using the customizable columns feature.
See also our Short Burst Training Video on this topic.
The Computers window is included in the "Standard View" from the KeyConfigure Windows menu. It directly supports various reports that summarize computer deployment information including hardware capabilities, internet location, last login, etc. Links to the Computers table from the software Audit and management Policy tables support management of license compliance for specific computers, computer divisions, computer sections, and computer groups.
Example Computers Window configured with Divisions and Sections
The Display column on the left of the Computers window is used to restrict the computer list on the right to a selected subset. By enabling check marks for Dedicated and Leased only, you can restrict the display to just the records that require a KeyServer ‘seat’ – the number of such records cannot exceed the number of ‘seats’ enabled by your KeyServer license.
The Display column is divided into four panels. Each one classifies the computer records on the right according to various attributes. Multiple check marks within the same panel increase the selection set — the conditions are OR'd together. Check marks in separate panels decrease the selection set — the conditions are AND'd together. Clicking on the double-check icon that appears between the Display column (left) and the Computer list column (right) will toggle between the current selection and all selected.
Login panel: the four states listed in the login pane classify computers according to which KeyServer services are available or in use. Read Sassafras Licensing for information on how the login types affect licensing of the Sassafras KeyServer Platform.
Divisions panel: by default, there is a single Uncategorized division which includes all computer records. To create your own Divisions, use right click in the white area to bring up the context menu item, “New Division....” . Computers can be organized into the various Divisions either explicitly (by dragging selected records) or implicitly based on rules (explained below). In the table view of computer records on the right, the “Division” column will display the division membership for each computer (except for Uncategorized computers, which are listed with a blank value). In order to assign management responsibility for various subsets of these divisions, a subset can be aggregated into a Section and assigned to a limited admin account as explained in the Sections document.
Filters panel: there is always at least one filter named Discovered. In addition, there are a number of other sample filters that are configured by default. You can also use the “New Filter....” menu item under a right click in the white area to create a new filter, defining your own search criteria. Clicking to the left of a filter will select it. Only one filter can be selected at once.
Tags panel: Tags are arbitrary strings that are assigned to computers, policies, products, and users. This panel lists all Computer Tags, and will initially be empty until you have added some tags. For more, read the Tags documentation.
The default item in the Filters panel labeled Discovered is actually a Rule – it includes actions that, by default, set newly discovered computers to Login as Dedicated clients with Auditing enabled. To add or change an action defined in a rule, double click to see the filter details and click the 'triangle button' to disclose its configuration details. You can change the the default Login type and Audit behavior specified in the Discovered rule, but the division assignment, Uncategorized, cannot be changed.
Filters with an action, i.e. Rules, are distinguished with a pink cross-hatch icon and always appear above Filters which have no action. They appear with small icons to the right of the name as an indication of which actions are active. The Discovered rule is the final rule, appearing just above the line separating Rules from plain Filters (if any).
A hierarchy of Rules descending down to the final Rule, Discovered, can be configured so that newly discovered computers are automatically categorized into an appropriate Division and the desired Audit behavior is specified. Computer records are matched against the Rules starting from the top — as soon as a rule matches, that rule's action(s) are applied, and no further rules are checked for that Computer. If the matching rule does not specify both Division and Audit behavior, the unspecified attribute will be set according to the the Discovered rule (acting as the default).
If you are using Active Directory for Client Authentication, it is also possible to populate Divisions based on each Computer's OU (similar functionality exists for LDAP and Kerberos authentication). This functionality is configured in the Active Directory authentication dialog. Using this means when a computer creates a session with the server, it will be put into a Division that matches the OU, based upon the options set in the Client Authentication module. Note that you can opt to let rules override mapping so you can augment your OU structure with custom Rules per the above section.
Rules are evaluated every time a client computer establishes a session with the KeyServer. If a given computer should not be moved to a different division by any rules it can be Anchored, either by manually dragging it into the desired division, by right-clicking on it to "Anchor in Division", or by checking the Anchored option in computer details. An Anchored computer will no longer be moved from its division by any Rules or by OU Mapping. Its Division will remain fixed unless subsequently changed by an administrator. Other automatic settings made by rules will still apply. The Login and Audit settings for an Anchored computer can still change automatically by a Rule.
Computer that are Anchored are indicated in the computer list by an anchor icon in the Division column. When a computer is first discovered, it is not Anchored, and will not show this icon. In order to bring an Anchored computer back under the influence of rules, drag it onto the Discovered rule (filter), or open the Computer Details window and un-check the "Anchored" checkbox. You will see the anchor icon go away, indicating that it is once again un-Anchored. Whenever rules are changed and reapplied, they will affect all such un-Anchored computers, in order to easily recategorize them.
If a Division contains automatically allocated computers only (by Rule or client authentication) its icon will be pink. If it contains any anchored systems (or no computers) it will be blue.
The columns shown on the right display various hardware characteristics and other attributes for each computer (or virtual computer) that has connected to the KeyServer using the KeyAccess client. Use right-click in the column header in order to customize which columns are included for display. The few columns displayed in the Computers window by default are described below:
When you double-click on a computer record, its Computer Details Window will open showing all the field values for this record along with panels that show related Policy and Audit information. Note: various versions of KeyAccess have added the ability to gather additional hardware properties — older clients do not gather all possible hardware properties.
Reports are available via right-click that summarize computer data for the set of currently displayed records – however, Audit reports (for software) will never include Dormant or Excluded computers. To report on a single computer record, select just this one record and use right-click, or use right-click from its Computer Details window.
Double-click on any selector (Login type, Division, Rule or Filter) in the left column of the Computers window and a separate window opens listing all the matching computer records. In the case of a filter (or rule), you can show or hide the filter conditions under the disclosure triangle icon at the top.
Right-clicking on a computer in the computers window will allow you to configure or show audit information, depending on how the computer is currently configured. It will additionally show any reports that can be run for just this computer.
Right-clicking anywhere in the filters section allows you to create a new filter (New Filter...).
In addition to context menus, whenever you see the icon representing a computer anywhere in the KeyConfigure interface, it will generally be clickable to expose relevant context or detail and it will be dragable into other user interface elements whenever such a drag has an obvious meaning.
Computers in the computers window can be Dragged and Dropped to the following locations, among others:
It is possible to import computers from a CSV rather than have them populate from a client login. This is especially useful for adding offline systems to KeyServer for inventory purposes. As long as you make these systems Dormant, they do not count against your license use, but you can still include them in various reports.
To do this, simply drag your CSV with header row included into the Computers Window. You will be prompted to choose Import Instructions. Select New to create a new mapping and call it whatever you like for later use. Drag the header names from your Source under the appropriate Column name to create the mappings, and save the file. Make sure it's selected in the Import window and click OK to see a confirmation of the import mapping. Click Done and all your computers will now be imported. You can edit these records just like any other computer. You can repeat this process to update records in the future. Be aware that if you do this for any system that has KeyAccess, the client will update and replace fields as needed when it checks in.