YouTube Icon

Interview Questions.

Ibm Bigfix Placement Papers - Ibm Bigfix Interview Questions and Answers - Jul 28, 2022

fluid

Ibm Bigfix Placement Papers - Ibm Bigfix Interview Questions and Answers

Q1. Do I Need To Re-import Every Time I Make A Change To My Software Catalog?

Yes. Click Import Options beneath Datasource in the Control Panel, and click on Run Now, or anticipate the following scheduled import. Some changes to the catalog require that you Reset Import Sequences, reachable on the Import Options tab of the Control Panel.

Q2. What Kind Of Machine Should The Management Extender Be?

For medium to large length deployments, the primary limiting thing is maximum probably going to be the CPU. As lengthy as it's miles some thing running quad cores, the device need to be able to handle all of the management extender responsibilities.

Q3. What Impact Does Running Bigfix On My Server Have On System Performance?

The default CPU utilization settings are optimized to keep away from the usage of too much CPU for your server. You can assume the BigFix consumer to apply at maximum 2% of the CPU, calculated primarily based on a unmarried processor, so when you have more than one processors, the overall % of agent CPU is reduced drastically.

Q4. What To Expect After Installing Bigfix?

The BigFix icon will appear on the System Tray (Windows) or Menu Bar (Mac OS X. The BigFix Client will run in the historical past and file the preliminary fame of your system to the BigFix Server. If the gadget wishes patching, you will be brought about to accept the patching assignment. You can defer the challenge, but if the project is deferred for too long, the patching undertaking window will live in the foreground, and you'll not be capable of brush aside it. The device will reboot after the patching project has completed. If the system is notably at the back of in patching, more than one reboots may be vital. BigFix will run in the history, consuming minimum CPU resources, periodically checking in with the server to offer ongoing updates of the machine status as well as check for brand spanking new duties.

Q5. How Does The Unmanaged Asset Importer Match Previously Scanned Assets With Newly Scanned Assets?

The algorithm for determining if  scanned gadgets healthy is as follows:

    if they each have mac addresses that are identical, then they suit

    in the event that they each have hostnames which can be equal, then they match

    in the event that they have neither mac cope with facts nor hostname records, then they in shape if their ip addresses in shape

Finally, if the newly scanned asset does no longer suit on any of the above, it is going to be taken into consideration a new asset.

Q6. Why Does The Name Of The Install Application On My Android Device Show Up As Unreadable Characters?

The Android Agent (IBM Mobile Client app) will don't have any know-how of the code page (language) of the TEM Deployment, even after it is enrolled. The contemporary IANA customer setting on Android devices defaults to English (Windows-1252), except it's far configured. If this setting isn't always the same as the TEM deployment, records sent from the Android gadgets can be unreadable even if the gadgets have the identical code web page (language) as the TEM deployment.

To set the IANA Client placing mechanically for all Android gadgets upon enrollment, create a policy motion from the Android Device Language Setting wizard. Click Create Policy Action.

The list underneath highlights the currently supported languages/IANA settings:

ENU - windows-1252

CHS - gh2312

JPN - Shift_JIS

ESN - home windows-1252

ITA - home windows-1252

FRA - home windows-1252

DEU - home windows-1252

CHT - big5

KOR - ks_c_5601-1987

Q7. What Should I Configure To Have A Running Offline Window?

Check that you have the subsequent items setup:

   The TEM agent is hooked up on each of the machines centered by using the offline patch window.

   A patch window is about via the offline patch window dashboard.

   The Enforce Offline Patch window mission is ready as a policy motion.

Q8. What Is The Difference Between Itam And Software Asset Management?

ITAM stands for data technology asset management, which includes an accounting of all IT belongings, along with hardware, software program, network centers, telecommunications, and virtual property. SAM, then again, stands for software asset management, a exercise that usually specializes in the “software program” asset region of ITAM.

Q9. What Is The Difference Between The Bigfix Client And The Scanner?

The BigFix client is not unusual for all IBM products that are primarily based at the BigFix platform, and it's miles used to carry out multiple duties at the endpoints. The consumer provides facts about a set of laptop properties like the host name or the IP cope with, and it is a tool that is used to put in the scanner on the computers, and manipulate the scanner thru fixlets.

The scanner, then again, is an impartial component this is used by LMT/BFI. It collects records about the hardware and software this is established at the computer systems to your infrastructure. The information that is then sent to the BigFix server, may be imported to the LMT/BFI server.

Q10. What Kind Of Best Practices Or Highly Suggested Settings Do You Have For This Management Extender?

The device refresh interval ought to be as a minimum 5 minutes. On a medium to massive size deployment, this refresh c programming language time ought to be set to fifteen minutes or beyond. The Enforce Management Extender coverage movement need to be set to however lengthy it takes to run a widespread quantity of TEM actions earlier than it's far compelled to electricity down. The maximum time restrict that may be set is an hour long.

Q11. Can Two Management Extenders Be Installed On One Relay?

Yes. You can have  exceptional control extenders at the same relay, however they cannot be the same kind of extender. For instance, you could have iOS and Lotus Traveler extenders at the same relay, but no longer  iOS extenders.

Q12. My Virtual Machines Are No Longer Powering On During A Patch Window. What Happened?

Check to see if you are on the maximum variety of concurrent going for walks machines. That setting can be discovered by default in this listing: C:Program Files BigFix Enterprise Management Extender Plugins VMware ESXi Patch Windows. For sixty four-bit structures, it's far observed in C:Program Files BigFix Enterprise Management Extender Plugins VMware ESXi Patch Windows. The range interior represents the wide variety of concurrently walking digital machines according to host. If the number is on the limit that became to start with set, don't forget putting a better concurrent digital machine quantity.

Q13. Why Are Some Fields Different Between What A Proxied Vm Reports And What The Tem Agent Reports?

The vCenter plug-in grabs statistics immediately from the VMware APIs after which trlates them into TEM residences. However, due to the fact a number of those fields are set by the consumer, sometimes they can mismatch what gets reported inside the TEM Agent. For example, it's miles feasible to set the Guest Operating System version to be something very one of a kind from what's truly mounted on virtual machine.

Q14. Why Is Ucsf Requiring The Installation Of Bigfix On All Desktops And Laptops On The Network?

Having visibility into all gadgets on the community is important to protecting UCSF data and computing assets. This will provide UCSF IT with an correct stock of what gadgets are on the community, their patch fame, and to whom they belong. Unknown or unidentified (i.E. Unregistered) devices on the UCSF community are a danger to each other tool on the UCSF network and could be concern to elimination from the U.S. Network.

Q15. How Do Software License Trade Associations And Regulatory Agencies Decide Who And When To Audit? Are Agencies Contacted By Software Publishers?

Very often, license regulators provoke software license investigations primarily based on client leads. Each affiliation and agency has their personal criteria. To learn about these and a way to preserve your business enterprise blanketed, check their man or woman web sites.

Q16. How Come A Previously Discovered Asset Will Not Be Discovered On Subsequent Sc, Disappear From My Unmanaged Assets List Only To Appear On A New Scan?

Any quantity of things ought to motive this conduct – for example:

 

    The asset has been deleted and ignoredeletedassets is about to 1 within the registry (HKLMSOFTWAREBigFixEnterprise ServerAssetDiscoveryNMAP)

    The asset has become controlled, then unmanaged from test to test.

    Firewall guidelines changed on stated workstations from scan to scan.

If you scan one asset that is unmanaged – that asset will be saved within the database and seem inside the unmanaged property table. If you scan the same asset while it's far down (e.G. That IP is unresponsive to ping), it's going to still persist inside the unmanaged asset table. If the asset is scanned another time, it's going to once more, nonetheless remain inside the desk but have an updated closing experiment time.

Q17. Is Sua Designed To Be Used In Lieu Of An Audit?

No. SUA procedures and packages are designed as a device to shield your organisation inside the occasion of an audit, and to ensure your ongoing compliance.

Q18. How Can I Track These Savings?

Perform an internal audit on how a great deal your corporation currently spends on the continued renovation of software program asset control and software program writer license compliance. Create earlier than and after metrics to tune how lots the automation of your SUA utility is saving you typical in phrases of direct fees, hard work fees, and renovation.

Q19. Will Bigfix Cause Any Harm To My Computer? Will It Uninstall Any Of My Existing Programs?

The BigFix client will no longer damage your PC or uninstall your programs. In a totally small wide variety of incidents (less than 1%), BigFix can be incompatible with an application and motive a few minor problem. We will paintings with you to clear up these as problems as vital.

Q20. Are There Compliance Evaluation Reports Or Mechanisms That Compare A Laptop Or Server Against Fisma/nist/disa Standards?

Tivoli Endpoint Manager Configuration Management assesses servers, laptops, and computer systems towards a predefined set of configuration standards which includes DISA STIG (Standard Technical Implementation Guides) and FDCC (Federal Desktop Core Configuration). Tivoli Endpoint Manager can also support configuration requirements from NIST, NSA, and different standards companies. Regulatory compliance guidelines along with FISMA, PCI, and others can be supported by using the usage of the standard configuration controls provided via the Tivoli Endpoint Manager across Windows and UNIX environments.

Q21. What Are Some Of The Things I Cannot Do Using This Content?

The Tivoli Endpoint Manager Confirmation Management answer is designed to be flexible. However, the remediation functionality on each Windows and UNIX is limited to unique configuration settings. In some instances, there are controls that cannot be remediated. The parameter functionality on both Windows and UNIX is likewise restricted to unique configuration settings. Similar to remediation, now not the whole thing can and have to be parameterized.

Q22. I've Set Up An Offline Patch Window But I'm Seeing Unusual Behavior. What Might Be Wrong?

Check to look that a TEM agent is hooked up on each of the machines focused by way of the offline patch window. Check to peer if you have more than one moves within the movement history of the 'Enforce Offline Patch Window project' affecting the same endpoints.

Q23. How Do I Import A Custom .Wim File?

You can import from the Image Library dashboard underneath Manage Images within the navigation tree. You can manually enter running gadget, structure, and length on disk.

Size on disk in this case indicates the extracted size of the .Wim document. This is usually approximately  and a half of instances the dimensions of the actual .Wim record.

Q24. Why Can't I Apply Any Esxi Patches?

The Patches for ESXi content is audit only. In order to remedy ESXi problems, use the VMware Update Manager or download and observe patches manually from the VMware internet site.

Q25. How Do I Enable Or Disable Data Usage Tracking On Ios Devices?

You can use Fixlets 195 and 196 to enable or disable statistics utilization monitoring by developing a consumer putting on a focused iOS device. To get right of entry to these Fixlets, click on All Mobile Device Management Content from the navigation tree, click on Fixlets and Tasks and type the Fixlet quantity in the search container at the right.

If you disable area tracking on an iOS App, it'll additionally disable the data monitoring, which me that the iOS App will no longer track any data utilization.

Q26. Should The Lmt/bfi Server Run All The Time?

Yes. The LMT/BFI server ought to run all the time to method facts from endpoints in actual time and ensure reporting accuracy. IBM pricing requires the ability test to run every thirty minutes on all endpoints for sub-capability licensing. The capacity sc for up to 5 days again are stored on the BigFix server. Consequently, the server should no longer be stopped for a period longer than 5 days. The remaining successful software program scan from every endpoint is also stored at the BigFix server. If new software program sc are executed more than as soon as all through server maintenance, no longer most of these sc are processed after restart.

Q27. Why Do I Have To Issue A Zero-dollar Purchase Order To Obtain Lmt?

Customers can keep away from the want to issue a zero-greenback PO with the aid of having their PA/PAE web page contact place an order through PA Online. For records on PA Online and control of web page touch records, discuss with IBM Passport Advantage Online for Customers.

Q28. Why Do I Need To Order Lmt? Why Can't I Just Download It?

Most simple down load products provide little, if any, technical aid. They are supplied on the "as-is" foundation. IBM gives the same support for LMT that we do for our other mission-vital middleware. Even although LMT is a no-rate product providing, an order have to be still placed to establish an IBM entitlement report for the license as well as software program subscription and technical aid.

Q29. Who Has Access To The Administrator Controls For Bigfix System?

Designated UCSF IT Staff has access to the administrator controls for BigFix. All get entry to to BigFix, and actions finished within, are logged and frequently audited.

Q30. What Processes Are In Place To Prevent Unauthorized Use Of The Bigfix System Both From Internal And External Users?

In accordance with the University of California Electronic Communication Policy, administrator rights are confined to professional IT staff that observe industry excellent practices for device administration, such as getting access to the minimal quantity of records to do their paintings. The BigFix gadget is housed within the Data Center with constrained physical get admission to and continuous monitoring. Regular patches are implemented to ensure device integrity. Administrator access logs are reviewed regularly to make certain appropriate get right of entry to.

Q31. Do The Requirements And Tools Used To Protect Patient Data Differ For Students From Faculty And Staff?

No, the gear are the same and allow parity and efficiency for reporting at the posture of UCSF protection and threat. The same regulations and procedures follow to all college students, faculty and team of workers.

Q32. What Is The Difference Between Proxied Machines And Normal Machines On The Tem Console?

Normal machines have a complete TEM agent established on them, with the entire fashionable set of inspectors and moves. Instead of a full TEM agent, proxied machines use APIs to tug back facts about devices and feed that records into the console as a laptop document. Proxied machines have a greater constrained set of inspectors and actions.

Q33. What Is Bigfix?

BigFix, formerly IBM Tivoli Endpoint Manager is software program that runs in your laptop and collects records about your pc. BigFix collects hardware and software program statistics to help IT inventory gadgets which might be connected to the community. Knowing what's attached to the USA network is critical to pick out and remediate safety vulnerabilities.  At UCSF, registration of computer systems and laptops related to the community is finished through installing BigFix.

Q34. What Will It Be Doing With Bigfix On My Server?

BigFix will gather system configuration statistics consisting of working device, CPU, RAM, difficult force area, patch fame, and listing of nearby bills at the server. BigFix will not accumulate any private data or information, including browser history or consumer facts, saved at the server. IT will now not deploy patches, or modify documents, without consulting with the machine proprietor. However, IT reserves the right to disconnect servers from the community or install patches if the machine proprietor has no longer spoke back in a timely way.

Q35. How Do I Un-delete A Deleted Software Artifact?

You would possibly see that objects had been deleted while you look at the Audit Log under Catalog Tools inside the left pane of the Software Catalog tab. Each stage inside the Catalog hierarchy carries a View Deleted movement. Click this link to view and then restore the deleted items.

Q36. How Can I Determine Which Type Of Server Installation Would Suit My Environment?

See the IBM Endpoint Manager for Remote Control Installation Guide for some hints for attention whilst making plans your set up.

Q37. How Do I Recognize Or See A Definitive Package In My Catalog?

When you are including package information to a software title version,Note discipline to indicate the package deal datasource (belongings) that this facts comes from.

Q38. How Compatible Is Bigfix With Other Processes/services That Typically Run On Most Servers?

BigFix is a widely used device management tool with a proven track record to no longer interfere other server techniques. UCSF has skilled going for walks BigFix on tens of heaps of desktops and loads of servers over the last few years with minimal troubles.

Q39. What Kinds Of User Accounts Should I Set Up For My Deployment?

Ideally you have got one area consumer account with the subsequent permissions:

    Permission to put in the utility on your SUA server.

    Permission to hook up with your database server and create databases.

    Permission to connect to your IBM Endpoint Manager database and study statistics.

    Permission to study information from the IBM Endpoint Manager server upload supervisor directory.




CFG