Deploying Agents in Advanced Environments

The following sections describe how to deploy agents in complex scenarios. Table 7.1 provides an overview of the scenarios covered in these sections.

Table 7.1 Summary of Discovery and Monitoring Feature Support for Complex Scenarios

Scenario

ComputerDiscovery

Agentless Managed

Agent-Managed

Notes

Clustered computers

YES

YES

YES

Discovery and agents installation supported only on physical nodes. Turn off event log replication.

Note    MOM can discover the physical servers within a cluster.

Multiple non-trusted domains

YES

NO

YES

Use the Install/Uninstall Agent Wizard in the MOM Administrator console to install the agent on the computer. For more information, see the "Multiple Domains with a Non-Trust Relationship" section later in this chapter.

Workgroups

YES

NO

YES

Use the Install/Uninstall Agent Wizard in the MOM Administrator console to install the agent on the computer. For more information, see the "Workgroups" section later in this chapter.

Firewalls

YES

NO

YES

Install the agent manually, and set the control level to None. Open port 1270.

Slow links

YES

NO

YES

Use a dedicated Management Server, and adjust the heartbeat and polling settings.

ManualMC.txt file

YES1

NO

YES

Use this file to define the computers to be discovered and have agents installed on them.

Windows NT 4.0

YES

YES

NO

Windows NT 4.0 SP 6.0a and later versions only.

YES = Supported

NO = Not supported

N/A = Not applicable

1 - Using the ManualMC.txt file to install agents always designates computers as Agent-managed. Do not include computers already discovered by other means.