HP TopTools User Manual

Page 46

Advertising
background image

HP Toptools for Unicenter

User Guide


Protect/Unprotect System access to the system front panel and power controls (see Figure 5-5).

Set Identification String, also referred to as the “tattoo” string, is useful for configuring your environment to

support asset management.

Add Printer allows you to remotely configure a printer on the system.

e-Diagtools lets you perform system diagnostics remotely.

The most important menu item for each HP device is Properties. For PCs such as HP
Kayaks, Vectras, or Omnibooks, Property pages are generated with information collected
through a connection to a Toptools agent running on the PC. Property pages are similar
for HP Kayaks, Vectras, and Omnibooks. See the section on Vectras for a more in-depth
overview of Property pages.

The remaining menu items invoke management operations such as “Reboot”, “Lock
system”, or “Manage Drivers/Firmware”. Figure 5-3 shows the screen that is displayed
after selecting the reboot menu entry.

HINT:

The Properties page is
generated on the
Toptools Server by DMI
or WMI requests to the
PC.

If the PC is down, the
Toptools Server uses
entries stored in its
database to generate a
minimal page, with only
two tabs of information.

Figure 5-3. One or more HP PCs can be rebooted.

Figure 5-4 shows the Lock system dialog, which has several useful applications such as restricting access to a
system during a remote control session, or when implementing organizational security policies. Example: An
unauthorized user is trying to log into a critical PC as the local Administrator to change configuration settings. The
HP PC generates and sends DMI alerts to indicate an unauthorized user is making several unsuccessful attempts to
log in as the local Administrator. The OpenView NNM event log provides notification of this event. In response,
the NNM console operator can invoke the Toptools action “Lock System”. This action dynamically locks the
keyboard and mouse of the selected system preventing further unauthorized access.

Toptools actions can be performed against single or multiple targets. For example, a group of PC’s can be
prevented from a power-off via the front panel prior to a network-wide backup routine.

Page 46

Advertising