Deploying Agents in Advanced Environments
The following sections describe how to deploy agents in complex scenarios. Table 7.1 provides an overview of the scenarios covered in these sections.
Table 7.1 Summary of Discovery and Monitoring Feature Support for Complex Scenarios
Scenario |
ComputerDiscovery |
Agentless Managed |
Agent-Managed |
Notes |
---|---|---|---|---|
Clustered computers |
YES |
YES |
YES |
Discovery and agents installation supported only on physical nodes. Turn off event log replication. Note MOM can discover the physical servers within a cluster. |
Multiple non-trusted domains |
YES |
NO |
YES |
Use the Install/Uninstall Agent Wizard in the MOM Administrator console to install the agent on the computer. For more information, see the "Multiple Domains with a Non-Trust Relationship" section later in this chapter. |
Workgroups |
YES |
NO |
YES |
Use the Install/Uninstall Agent Wizard in the MOM Administrator console to install the agent on the computer. For more information, see the "Workgroups" section later in this chapter. |
Firewalls |
YES |
NO |
YES |
Install the agent manually, and set the control level to None. Open port 1270. |
Slow links |
YES |
NO |
YES |
Use a dedicated Management Server, and adjust the heartbeat and polling settings. |
ManualMC.txt file |
YES1 |
NO |
YES |
Use this file to define the computers to be discovered and have agents installed on them. |
Windows NT 4.0 |
YES |
YES |
NO |
Windows NT 4.0 SP 6.0a and later versions only. |
YES = Supported
NO = Not supported
N/A = Not applicable
1 - Using the ManualMC.txt file to install agents always designates computers as Agent-managed. Do not include computers already discovered by other means.